Sample records for minimizing malicious behavior

  1. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors

    DTIC Science & Technology

    2015-09-28

    malicious behavior found in our dataset and (ii) to create ground truth to evaluate the system proposed in Section V. We begin by removing those cases that...2011. [10] S. Hao, N. Feamster, and R. Pandrangi, “Monitoring the Initial DNS Behavior of Malicious Domains,” in ACM IMC , 2011. [11] R. Perdisci et...distribution is unlimited. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors The views, opinions and/or findings contained in

  2. Deterring Malicious Behavior in Cyberspace

    DTIC Science & Technology

    2015-01-01

    Malicious Behavior in Cyberspace Strategic Studies Quarterly ♦ Spring 2015 [ 79 ] 8. Chris Pepper, ed., Defending against Denial of Service Attacks...Jackson Higgins , “Chinese Cyberespionage Tool Updated for Traditional Cyber- crime,” Dark Reading, 27 November 2012, http://www.darkreading.com/attacks...content /uploads/sites/43/vlpdfs/kaspersky-the-net-traveler-part1-final.pdf. 13. Kelly Jackson Higgins , “ ‘NetTraveler’ Cyberespionage Campaign

  3. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kalafut, Andrew J.; Shue, Craig A; Gupta, Prof. Minaxi

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using 12 popular blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted and others account for large fractions of blacklisted IPs. Overall, we conclude that examining malicious activity at the AS granularity can unearth networks with lax security or thosemore » that harbor cybercrime.« less

  4. Behavioral analysis of malicious code through network traffic and system call monitoring

    NASA Astrophysics Data System (ADS)

    Grégio, André R. A.; Fernandes Filho, Dario S.; Afonso, Vitor M.; Santos, Rafael D. C.; Jino, Mario; de Geus, Paulo L.

    2011-06-01

    Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.

  5. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment

    PubMed Central

    King, Zoe M.; Henshel, Diane S.; Flora, Liberty; Cains, Mariana G.; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual’s intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing

  6. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.

    PubMed

    King, Zoe M; Henshel, Diane S; Flora, Liberty; Cains, Mariana G; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual's intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing malicious

  7. Spy the Lie: Detecting Malicious Insiders

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Noonan, Christine F.

    Insider threat is a hard problem. There is no ground truth, there are innumerable variables, and the data is sparse. The types of crimes and abuses associated with insider threats are significant; the most serious include espionage, sabotage, terrorism, embezzlement, extortion, bribery, and corruption. Malicious activities include an even broader range of exploits, such as negligent use of classified data, fraud, cybercrime, unauthorized access to sensitive information, and illicit communications with unauthorized recipients. Inadvertent action or inaction without malicious intent (e.g., disposing of sensitive documents incorrectly) can also cause harm to an organization. This review article will explore insider threat,more » specifically behaviors, beliefs, and current debates within the field. Additionally particular focus is given to deception, a significant behavioral component of the malicious insider. Finally, research and policy implications for law enforcement and the intelligence community are addressed.« less

  8. Abnormally Malicious Autonomous Systems and their Internet Connectivity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shue, Craig A; Kalafut, Prof. Andrew; Gupta, Prof. Minaxi

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularlymore » peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.« less

  9. Behavioral biometrics for verification and recognition of malicious software agents

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  10. Identification of Malicious Web Pages by Inductive Learning

    NASA Astrophysics Data System (ADS)

    Liu, Peishun; Wang, Xuefang

    Malicious web pages are an increasing threat to current computer systems in recent years. Traditional anti-virus techniques focus typically on detection of the static signatures of Malware and are ineffective against these new threats because they cannot deal with zero-day attacks. In this paper, a novel classification method for detecting malicious web pages is presented. This method is generalization and specialization of attack pattern based on inductive learning, which can be used for updating and expanding knowledge database. The attack pattern is established from an example and generalized by inductive learning, which can be used to detect unknown attacks whose behavior is similar to the example.

  11. DROP: Detecting Return-Oriented Programming Malicious Code

    NASA Astrophysics Data System (ADS)

    Chen, Ping; Xiao, Hai; Shen, Xiaobin; Yin, Xinchun; Mao, Bing; Xie, Li

    Return-Oriented Programming (ROP) is a new technique that helps the attacker construct malicious code mounted on x86/SPARC executables without any function call at all. Such technique makes the ROP malicious code contain no instruction, which is different from existing attacks. Moreover, it hides the malicious code in benign code. Thus, it circumvents the approaches that prevent control flow diversion outside legitimate regions (such as W ⊕ X ) and most malicious code scanning techniques (such as anti-virus scanners). However, ROP has its own intrinsic feature which is different from normal program design: (1) uses short instruction sequence ending in "ret", which is called gadget, and (2) executes the gadgets contiguously in specific memory space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.

  12. Elucidating the Dark Side of Envy: Distinctive Links of Benign and Malicious Envy With Dark Personalities

    PubMed Central

    Lange, Jens; Paulhus, Delroy L.; Crusius, Jan

    2017-01-01

    Researchers have recently drawn a contrast between two forms of envy: benign and malicious envy. In three studies (total N = 3,123), we challenge the assumption that malicious envy is destructive, whereas benign envy is entirely constructive. Instead, both forms have links with the Dark Triad of personality. Benign envy is associated with Machiavellian behaviors, whereas malicious envy is associated with both Machiavellian and psychopathic behaviors. In Study 1, this pattern emerged from meta-analyzed trait correlations. In Study 2, a manipulation affecting the envy forms mediated an effect on antisocial behavioral intentions. Study 3 replicated these patterns by linking envy to specific antisocial behaviors and their impact on status in the workplace. Together, our correlational and experimental results suggest that the two forms of envy can both be malevolent. Instead of evaluating envy’s morality, we propose to focus on its functional value. PMID:29271287

  13. Dispositional envy revisited: unraveling the motivational dynamics of benign and malicious envy.

    PubMed

    Lange, Jens; Crusius, Jan

    2015-02-01

    Previous research has conceptualized dispositional envy as a unitary construct. Recently however, episodic envy has been shown to emerge in two qualitatively different forms. Benign envy is related to the motivation to move upward, whereas malicious envy is related to pulling superior others down. In four studies (N = 1,094)--using the newly developed Benign and Malicious Envy Scale (BeMaS)--we show that dispositional envy is also characterized by two independent dimensions related to distinct motivational dynamics and behavioral consequences. Dispositional benign and malicious envy uniquely predict envious responding following upward social comparisons. Furthermore, they are differentially connected to hope for success and fear of failure. Corresponding to these links, dispositional benign envy predicted faster race performance of marathon runners mediated via higher goal setting. In contrast, dispositional malicious envy predicted race goal disengagement. The findings highlight that disentangling the two sides of envy opens up numerous research avenues. © 2014 by the Society for Personality and Social Psychology, Inc.

  14. Awareness of Malicious Social Engineering among Facebook Users

    ERIC Educational Resources Information Center

    Slonka, Kevin J.

    2014-01-01

    With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The…

  15. Analysis of Malicious Traffic in Modbus/TCP Communications

    NASA Astrophysics Data System (ADS)

    Kobayashi, Tiago H.; Batista, Aguinaldo B.; Medeiros, João Paulo S.; Filho, José Macedo F.; Brito, Agostinho M.; Pires, Paulo S. Motta

    This paper presents the results of our analysis about the influence of Information Technology (IT) malicious traffic on an IP-based automation environment. We utilized a traffic generator, called MACE (Malicious trAffic Composition Environment), to inject malicious traffic in a Modbus/TCP communication system and a sniffer to capture and analyze network traffic. The realized tests show that malicious traffic represents a serious risk to critical information infrastructures. We show that this kind of traffic can increase latency of Modbus/TCP communication and that, in some cases, can put Modbus/TCP devices out of communication.

  16. A Learning System for Discriminating Variants of Malicious Network Traffic

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Symons, Christopher T; Gillen, Rob

    Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacksmore » and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.« less

  17. Leveling up and down: the experiences of benign and malicious envy.

    PubMed

    van de Ven, Niels; Zeelenberg, Marcel; Pieters, Rik

    2009-06-01

    Envy is the painful emotion caused by the good fortune of others. This research empirically supports the distinction between two qualitatively different types of envy, namely benign and malicious envy. It reveals that the experience of benign envy leads to a moving-up motivation aimed at improving one's own position, whereas the experience of malicious envy leads to a pulling-down motivation aimed at damaging the position of the superior other. Study 1 used guided recall of the two envy types in a culture (the Netherlands) that has separate words for benign and malicious envy. Analyses of the experiential content of these emotions found the predicted differences. Study 2 and 3 used one sample from the United States and one from Spain, respectively, where a single word exists for both envy types. A latent class analysis based on the experiential content of envy confirmed the existence of separate experiences of benign and malicious envy in both these cultures as well. The authors discuss the implications of distinguishing the two envy types for theories of cooperation, group performance, and Schadenfreude.

  18. Malicious Use of Nonpharmaceuticals in Children

    ERIC Educational Resources Information Center

    Yin, Shan

    2011-01-01

    Objective: The objective of this study was to describe malicious nonpharmaceutical exposures in children reported to US poison centers. Methods: We performed a retrospective study of all nonpharmaceutical exposures involving children 7 years old reported to the US National Poison Data System (NPDS) from 2000 to 2008 for which the reason for…

  19. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support.

    PubMed

    Xiang, Yanhui; Chao, Xiaomei; Ye, Yanyan

    2018-01-01

    Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign). We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support.

  20. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support

    PubMed Central

    Xiang, Yanhui; Chao, Xiaomei; Ye, Yanyan

    2018-01-01

    Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign). We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support. PMID:29867595

  1. A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations.

    PubMed

    Khan, Aihab; Husain, Syed Afaq

    2013-01-01

    We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully.

  2. Minimizing liability during internal investigations.

    PubMed

    Morris, Cole

    2010-01-01

    Today's security professional must appreciate the potential landmines in any investigative effort and work collaboratively with others to minimize liability risks, the author points out. In this article he examines six civil torts that commonly arise from unprofessionally planned or poorly executed internal investigations-defamation, false imprisonment. intentional infliction of emotional distress, assault and battery, invasion of privacy, and malicious prosecution and abuse of process.

  3. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

    NASA Astrophysics Data System (ADS)

    Lee, Kijeong; Tolentino, Randy S.; Park, Gil-Cheol; Kim, Yong-Tae

    Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

  4. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  5. Preventing and Profiling Malicious Insider Attacks

    DTIC Science & Technology

    2012-04-01

    malicious insiders. This research program could also be extended to look at general human factors issues surrounding information security behaviours ... behaviours . This research also draws on corresponding studies into fraud and espionage in non IT scenarios. A range of preventative measures is...This includes motivating factors, personality traits and observable behaviours that may assist organisations in the detection and profiling of

  6. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  7. Accuracy comparison among different machine learning techniques for detecting malicious codes

    NASA Astrophysics Data System (ADS)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  8. Evidence for surprise minimization over value maximization in choice behavior

    PubMed Central

    Schwartenbeck, Philipp; FitzGerald, Thomas H. B.; Mathys, Christoph; Dolan, Ray; Kronbichler, Martin; Friston, Karl

    2015-01-01

    Classical economic models are predicated on the idea that the ultimate aim of choice is to maximize utility or reward. In contrast, an alternative perspective highlights the fact that adaptive behavior requires agents’ to model their environment and minimize surprise about the states they frequent. We propose that choice behavior can be more accurately accounted for by surprise minimization compared to reward or utility maximization alone. Minimizing surprise makes a prediction at variance with expected utility models; namely, that in addition to attaining valuable states, agents attempt to maximize the entropy over outcomes and thus ‘keep their options open’. We tested this prediction using a simple binary choice paradigm and show that human decision-making is better explained by surprise minimization compared to utility maximization. Furthermore, we replicated this entropy-seeking behavior in a control task with no explicit utilities. These findings highlight a limitation of purely economic motivations in explaining choice behavior and instead emphasize the importance of belief-based motivations. PMID:26564686

  9. Impact of malicious servers over trust and reputation models in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Verma, Vinod Kumar; Singh, Surinder; Pathak, N. P.

    2016-03-01

    This article deals with the impact of malicious servers over different trust and reputation models in wireless sensor networks. First, we analysed the five trust and reputation models, namely BTRM-WSN, Eigen trust, peer trust, power trust, linguistic fuzzy trust model. Further, we proposed wireless sensor network design for optimisation of these models. Finally, influence of malicious servers on the behaviour of above mentioned trust and reputation models is discussed. Statistical analysis has been carried out to prove the validity of our proposal.

  10. Statistics attack on `quantum private comparison with a malicious third party' and its improvement

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Ho, Chih-Yung; Hwang, Tzonelih

    2018-02-01

    Recently, Sun et al. (Quantum Inf Process:14:2125-2133, 2015) proposed a quantum private comparison protocol allowing two participants to compare the equality of their secrets via a malicious third party (TP). They designed an interesting trap comparison method to prevent the TP from knowing the final comparison result. However, this study shows that the malicious TP can use the statistics attack to reveal the comparison result. A simple modification is hence proposed to solve this problem.

  11. Non-developmental item computer systems and the malicious software threat

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software; computer system unique attributes; positive feedback to commercial computer systems vendors; and NDI (Non-Development Item) computers and software safety.

  12. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  13. Job Analysis Results for Malicious-Code Reverse Engineers: A Case Study

    DTIC Science & Technology

    2014-05-01

    Testing in Personnel Selection: Contemporary Issues in Cognitive Ability and Personality Testing .” Journal of Business Inquiry: Research , Edu- cation, and...federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of...predict the develop- ment of expertise is important. Currently, job analysis research on teams of malicious-code re- verse engineers is lacking. Therefore

  14. Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders

    NASA Astrophysics Data System (ADS)

    White, Jonathan; Panda, Brajendra

    A major concern for computer system security is the threat from malicious insiders who target and abuse critical data items in the system. In this paper, we propose a solution to enable automatic identification of critical data items in a database by way of data dependency relationships. This identification of critical data items is necessary because insider threats often target mission critical data in order to accomplish malicious tasks. Unfortunately, currently available systems fail to address this problem in a comprehensive manner. It is more difficult for non-experts to identify these critical data items because of their lack of familiarity and due to the fact that data systems are constantly changing. By identifying the critical data items automatically, security engineers will be better prepared to protect what is critical to the mission of the organization and also have the ability to focus their security efforts on these critical data items. We have developed an algorithm that scans the database logs and forms a directed graph showing which items influence a large number of other items and at what frequency this influence occurs. This graph is traversed to reveal the data items which have a large influence throughout the database system by using a novel metric based formula. These items are critical to the system because if they are maliciously altered or stolen, the malicious alterations will spread throughout the system, delaying recovery and causing a much more malignant effect. As these items have significant influence, they are deemed to be critical and worthy of extra security measures. Our proposal is not intended to replace existing intrusion detection systems, but rather is intended to complement current and future technologies. Our proposal has never been performed before, and our experimental results have shown that it is very effective in revealing critical data items automatically.

  15. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  16. Detecting Malicious Tweets in Twitter Using Runtime Monitoring With Hidden Information

    DTIC Science & Technology

    2016-06-01

    text mining using Twitter streaming API and python [Online]. Available: http://adilmoujahid.com/posts/2014/07/twitter-analytics/ [22] M. Singh, B...sites with 645,750,000 registered users [3] and has open source public tweets for data mining . 2. Malicious Users and Tweets In the modern world...want to data mine in Twitter, and presents the natural language assertions and corresponding rule patterns. It then describes the steps performed using

  17. Evil acts and malicious gossip: a multiagent model of the effects of gossip in socially distributed person perception.

    PubMed

    Smith, Eliot R

    2014-11-01

    Although person perception is central to virtually all human social behavior, it is ordinarily studied in isolated individual perceivers. Conceptualizing it as a socially distributed process opens up a variety of novel issues, which have been addressed in scattered literatures mostly outside of social psychology. This article examines some of these issues using a series of multiagent models. Perceivers can use gossip (information from others about social targets) to improve their ability to detect targets who perform rare negative behaviors. The model suggests that they can simultaneously protect themselves against being influenced by malicious gossip intended to defame specific targets. They can balance these potentially conflicting goals by using specific strategies including disregarding gossip that differs from a personally obtained impression. Multiagent modeling demonstrates the outcomes produced by different combinations of assumptions about gossip, and suggests directions for further research and theoretical development. © 2014 by the Society for Personality and Social Psychology, Inc.

  18. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    ERIC Educational Resources Information Center

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  19. The effects of collaboration and minimal-group membership on children's prosocial behavior, liking, affiliation, and trust.

    PubMed

    Plötner, Maria; Over, Harriet; Carpenter, Malinda; Tomasello, Michael

    2015-11-01

    Recent theoretical work has highlighted potential links between interpersonal collaboration and group membership in the evolution of human sociality. Here we compared the effects of collaboration and minimal-group membership on young children's prosocial behavior (i.e., helping and resource allocation), liking, affiliation, and trust. In a design that matched as closely as possible these two ways of connecting with others, we showed that 5-year-olds' behavior was affected similarly by collaboration and minimal-group membership; both increased children's preference for their partners on multiple dimensions and produced overall effects of a similar magnitude. In contrast, 3.5-year-olds did not have a strong preference for either collaborators or minimal in-group members. Thus, both collaboration and minimal-group membership are similarly effective in their influence on children's prosocial behavior and social preferences. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy

    PubMed Central

    Roma-Rodrigues, Catarina; Raposo, Luís R.; Cabral, Rita; Paradinha, Fabiana; Baptista, Pedro V.; Fernandes, Alexandra R.

    2017-01-01

    Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes’ release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs) make them suitable vehicles to pursuit this goal. AuNPs’ properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs’ role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression. PMID:28098821

  1. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy.

    PubMed

    Roma-Rodrigues, Catarina; Raposo, Luís R; Cabral, Rita; Paradinha, Fabiana; Baptista, Pedro V; Fernandes, Alexandra R

    2017-01-14

    Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes' release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs) make them suitable vehicles to pursuit this goal. AuNPs' properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs' role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression.

  2. Neural Detection of Malicious Network Activities Using a New Direct Parsing and Feature Extraction Technique

    DTIC Science & Technology

    2015-09-01

    intrusion detection systems , neural networks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF... detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of...BACKGROUND The growing threat of malicious network activities and intrusion attempts makes intrusion detection systems (IDS) a

  3. Minimizing deviant behavior in healthcare organizations: the effects of supportive leadership and job design.

    PubMed

    Chullen, C Logan; Dunford, Benjamin B; Angermeier, Ingo; Boss, R Wayne; Boss, Alan D

    2010-01-01

    In an era when healthcare organizations are beset by intense competition, lawsuits, and increased administrative costs, it is essential that employees perform their jobs efficiently and without distraction. Deviant workplace behavior among healthcare employees is especially threatening to organizational effectiveness, and healthcare managers must understand the antecedents of such behavior to minimize its prevalence. Deviant employee behavior has been categorized into two major types, individual and organizational, according to the intended target of the behavior. Behavior directed at the individual includes such acts as harassment and aggression, whereas behavior directed at the organization includes such acts as theft, sabotage, and voluntary absenteeism, to name a few (Robinson and Bennett 1995). Drawing on theory from organizational behavior, we examined two important features of supportive leadership, leader-member exchange (LMX) and perceived organizational support (POS), and two important features of job design, intrinsic motivation and depersonalization, as predictors of subsequent deviant behavior in a sample of over 1,900 employees within a large US healthcare organization. Employees who reported weaker perceptions of LMX and greater perceptions of depersonalization were more likely to engage in deviant behavior directed at the individual, whereas employees who reported weaker perceptions of POS and intrinsic motivation were more likely to engage in deviant behavior directed at the organization. These findings give rise to specific prescriptions for healthcare managers to prevent or minimize the frequency of deviant behavior in the workplace.

  4. Detecting malicious chaotic signals in wireless sensor network

    NASA Astrophysics Data System (ADS)

    Upadhyay, Ranjit Kumar; Kumari, Sangeeta

    2018-02-01

    In this paper, an e-epidemic Susceptible-Infected-Vaccinated (SIV) model has been proposed to analyze the effect of node immunization and worms attacking dynamics in wireless sensor network. A modified nonlinear incidence rate with cyrtoid type functional response has been considered using sleep and active mode approach. Detailed stability analysis and the sufficient criteria for the persistence of the model system have been established. We also established different types of bifurcation analysis for different equilibria at different critical points of the control parameters. We performed a detailed Hopf bifurcation analysis and determine the direction and stability of the bifurcating periodic solutions using center manifold theorem. Numerical simulations are carried out to confirm the theoretical results. The impact of the control parameters on the dynamics of the model system has been investigated and malicious chaotic signals are detected. Finally, we have analyzed the effect of time delay on the dynamics of the model system.

  5. Limit behavior of mass critical Hartree minimization problems with steep potential wells

    NASA Astrophysics Data System (ADS)

    Guo, Yujin; Luo, Yong; Wang, Zhi-Qiang

    2018-06-01

    We consider minimizers of the following mass critical Hartree minimization problem: eλ(N ) ≔inf {u ∈H1(Rd ) , ‖u‖2 2=N } Eλ(u ) , where d ≥ 3, λ > 0, and the Hartree energy functional Eλ(u) is defined by Eλ(u ) ≔∫Rd|∇u (x ) |2d x +λ ∫Rdg (x ) u2(x ) d x -1/2 ∫Rd∫Rdu/2(x ) u2(y ) |x -y |2 d x d y . Here the steep potential g(x) satisfies 0 =g (0 ) =infRdg (x ) ≤g (x ) ≤1 and 1 -g (x ) ∈Ld/2(Rd ) . We prove that there exists a constant N* > 0, independent of λg(x), such that if N ≥ N*, then eλ(N) does not admit minimizers for any λ > 0; if 0 < N < N*, then there exists a constant λ*(N) > 0 such that eλ(N) admits minimizers for any λ > λ*(N) and eλ(N) does not admit minimizers for 0 < λ < λ*(N). For any given 0 < N < N*, the limit behavior of positive minimizers for eλ(N) is also studied as λ → ∞, where the mass concentrates at the bottom of g(x).

  6. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    PubMed

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  7. Protecting software agents from malicious hosts using quantum computing

    NASA Astrophysics Data System (ADS)

    Reisner, John; Donkor, Eric

    2000-07-01

    We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.

  8. FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jared Stimson

    FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contentsmore » of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to

  9. Sensory Behaviors in Minimally Verbal Children with Autism Spectrum Disorder: How and When Do Caregivers Respond?

    ERIC Educational Resources Information Center

    Harrop, Clare; Tu, Nicole; Landa, Rebecca; Kasier, Ann; Kasari, Connie

    2018-01-01

    Sensory behaviors are widely reported in autism spectrum disorder (ASD). However, the impact of these behaviors on families remains largely unknown. This study explored how caregivers of minimally verbal children with ASD responded to their child's sensory behaviors. Using a mixed-methods approach, we examined two variables for each endorsed child…

  10. Price-Minimizing Behaviors in Response to Increasing Tobacco Price: A Cross-Sectional Study of Students

    ERIC Educational Resources Information Center

    Rutter, Lucy; Britton, John; Langley, Tessa

    2017-01-01

    Background: The public health benefits of tobacco taxation are undermined when smokers engage in price-minimizing behaviors other than quitting in response to rising prices. Methods: 314 students at the University of Nottingham, UK, completed an online survey about their smoking behavior and their likely responses to hypothetical tobacco price…

  11. Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens

    NASA Astrophysics Data System (ADS)

    Chandrakant, N.; Shenoy, P. Deepa; Venugopal, K. R.; Patnaik, L. M.

    A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect the wireless networks and mobile computing applications. In this paper, we examine the nodes that come under the vicinity of base node and members of the network and communication is provided to genuine nodes only. It is found that the proposed algorithm is a effective algorithm for security in MANETs.

  12. Intense or malicious? The decoding of eyebrow-lowering frowning in laughter animations depends on the presentation mode.

    PubMed

    Hofmann, Jennifer

    2014-01-01

    Joyful laughter is the only laughter type that has received sufficient validation in terms of morphology (i.e., face, voice). Still, it is unclear whether joyful laughter involves one prototypical facial-morphological configuration (Duchenne Display and mouth opening) to be decoded as such, or whether qualitatively distinct facial markers occur at different stages of laughter intensity. It was proposed that intense laughter goes along with eyebrow-lowering frowning, but in decoding studies of pictures, these "frowns" were associated with perceived maliciousness rather than higher intensity. Thus, two studies were conducted to investigate the influence of the presentation mode (static, dynamic) and eyebrow-lowering frowning on the perception of laughter animations of different intensity. In Study 1, participants (N = 110) were randomly assigned to two presentation modes (static pictures vs. dynamic videos) to watch animations of Duchenne laughter and laughter with added eyebrow-lowering frowning. Ratings on the intensity, valence, and contagiousness of the laughter were completed. In Study 2, participants (N = 55) saw both animation types in both presentation modes sequentially. Results confirmed that the static presentation lead to eyebrow-lowering frowning in intense laughter being perceived as more malicious, less intense, less benevolent, and less contagious compared to the dynamic presentation. This was replicated for maliciousness in Study 2, although participants could potentially infer the "frown" as a natural element of the laugh, as they had seen the video and the picture. Thus, a dynamic presentation is necessary for detecting graduating intensity markers in the joyfully laughing face. While this study focused on the decoding, future studies should investigate the encoding of frowning in laughter. This is important, as tools assessing facially expressed joy might need to account for laughter intensity markers that differ from the Duchenne Display.

  13. Intense or malicious? The decoding of eyebrow-lowering frowning in laughter animations depends on the presentation mode

    PubMed Central

    Hofmann, Jennifer

    2014-01-01

    Joyful laughter is the only laughter type that has received sufficient validation in terms of morphology (i.e., face, voice). Still, it is unclear whether joyful laughter involves one prototypical facial-morphological configuration (Duchenne Display and mouth opening) to be decoded as such, or whether qualitatively distinct facial markers occur at different stages of laughter intensity. It was proposed that intense laughter goes along with eyebrow-lowering frowning, but in decoding studies of pictures, these “frowns” were associated with perceived maliciousness rather than higher intensity. Thus, two studies were conducted to investigate the influence of the presentation mode (static, dynamic) and eyebrow-lowering frowning on the perception of laughter animations of different intensity. In Study 1, participants (N = 110) were randomly assigned to two presentation modes (static pictures vs. dynamic videos) to watch animations of Duchenne laughter and laughter with added eyebrow-lowering frowning. Ratings on the intensity, valence, and contagiousness of the laughter were completed. In Study 2, participants (N = 55) saw both animation types in both presentation modes sequentially. Results confirmed that the static presentation lead to eyebrow-lowering frowning in intense laughter being perceived as more malicious, less intense, less benevolent, and less contagious compared to the dynamic presentation. This was replicated for maliciousness in Study 2, although participants could potentially infer the “frown” as a natural element of the laugh, as they had seen the video and the picture. Thus, a dynamic presentation is necessary for detecting graduating intensity markers in the joyfully laughing face. While this study focused on the decoding, future studies should investigate the encoding of frowning in laughter. This is important, as tools assessing facially expressed joy might need to account for laughter intensity markers that differ from the Duchenne Display

  14. Phantom behavior bounce with tachyon and non-minimal derivative coupling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Banijamali, A.; Fazlpour, B., E-mail: a.banijamali@nit.ac.ir, E-mail: b.fazlpour@umz.ac.ir

    2012-01-01

    The bouncing cosmology provides a successful solution of the cosmological singularity problem. In this paper, we study the bouncing behavior of a single scalar field model with tachyon field non-minimally coupled to itself, its derivative and to the curvature. By utilizing the numerical calculations we will show that the bouncing solution can appear in the universe dominated by such a quintom matter with equation of state crossing the phantom divide line. We also investigate the classical stability of our model using the phase velocity of the homogeneous perturbations of the tachyon scalar field.

  15. Collision-avoidance behaviors of minimally restrained flying locusts to looming stimuli

    PubMed Central

    Chan, R. WM.; Gabbiani, F.

    2013-01-01

    SUMMARY Visually guided collision avoidance is of paramount importance in flight, for instance to allow escape from potential predators. Yet, little is known about the types of collision-avoidance behaviors that may be generated by flying animals in response to an impending visual threat. We studied the behavior of minimally restrained locusts flying in a wind tunnel as they were subjected to looming stimuli presented to the side of the animal, simulating the approach of an object on a collision course. Using high-speed movie recordings, we observed a wide variety of collision-avoidance behaviors including climbs and dives away from – but also towards – the stimulus. In a more restrained setting, we were able to relate kinematic parameters of the flapping wings with yaw changes in the trajectory of the animal. Asymmetric wing flapping was most strongly correlated with changes in yaw, but we also observed a substantial effect of wing deformations. Additionally, the effect of wing deformations on yaw was relatively independent of that of wing asymmetries. Thus, flying locusts exhibit a rich range of collision-avoidance behaviors that depend on several distinct aerodynamic characteristics of wing flapping flight. PMID:23364572

  16. How do price minimizing behaviors impact smoking cessation? Findings from the International Tobacco Control (ITC) Four Country Survey.

    PubMed

    Licht, Andrea S; Hyland, Andrew J; O'Connor, Richard J; Chaloupka, Frank J; Borland, Ron; Fong, Geoffrey T; Nargis, Nigar; Cummings, K Michael

    2011-05-01

    This paper examines how price minimizing behaviors impact efforts to stop smoking. Data on 4,988 participants from the International Tobacco Control Policy Evaluation (ITC) Four-Country Survey who were smokers at baseline (wave 5) and interviewed at a 1 year follow-up were used. We examined whether price minimizing behaviors at baseline predicted: (1) cessation, (2) quit attempts, and (3) successful quit attempts at one year follow up using multivariate logistic regression modeling. A subset analysis included 3,387 participants who were current smokers at waves 5 and 6 and were followed through wave 7 to explore effects of changing purchase patterns on cessation. Statistical tests for interaction were performed to examine the joint effect of SES and price/tax avoidance behaviors on cessation outcomes. Smokers who engaged in any price/tax avoidance behaviors were 28% less likely to report cessation. Persons using low/untaxed sources were less likely to quit at follow up, those purchasing cartons were less likely to make quit attempts and quit, and those using discount cigarettes were less likely to succeed, conditional on making attempts. Respondents who utilized multiple behaviors simultaneously were less likely to make quit attempts and to succeed. SES did not modify the effects of price minimizing behaviors on cessation outcomes. The data from this paper indicate that the availability of lower priced cigarette alternatives may attenuate public health efforts aimed at to reduce reducing smoking prevalence through price and tax increases among all SES groups.

  17. How Do Price Minimizing Behaviors Impact Smoking Cessation? Findings from the International Tobacco Control (ITC) Four Country Survey

    PubMed Central

    Licht, Andrea S.; Hyland, Andrew J.; O’Connor, Richard J.; Chaloupka, Frank J.; Borland, Ron; Fong, Geoffrey T.; Nargis, Nigar; Cummings, K. Michael

    2011-01-01

    This paper examines how price minimizing behaviors impact efforts to stop smoking. Data on 4,988 participants from the International Tobacco Control Policy Evaluation (ITC) Four-Country Survey who were smokers at baseline (wave 5) and interviewed at a 1 year follow-up were used. We examined whether price minimizing behaviors at baseline predicted: (1) cessation, (2) quit attempts, and (3) successful quit attempts at one year follow up using multivariate logistic regression modeling. A subset analysis included 3,387 participants who were current smokers at waves 5 and 6 and were followed through wave 7 to explore effects of changing purchase patterns on cessation. Statistical tests for interaction were performed to examine the joint effect of SES and price/tax avoidance behaviors on cessation outcomes. Smokers who engaged in any price/tax avoidance behaviors were 28% less likely to report cessation. Persons using low/untaxed sources were less likely to quit at follow up, those purchasing cartons were less likely to make quit attempts and quit, and those using discount cigarettes were less likely to succeed, conditional on making attempts. Respondents who utilized multiple behaviors simultaneously were less likely to make quit attempts and to succeed. SES did not modify the effects of price minimizing behaviors on cessation outcomes. The data from this paper indicate that the availability of lower priced cigarette alternatives may attenuate public health efforts aimed at to reduce reducing smoking prevalence through price and tax increases among all SES groups. PMID:21655144

  18. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  19. Minimization of lumen depreciation in LED lamps using thermal transient behavior analysis and design optimizations.

    PubMed

    Khan, M Nisa

    2016-02-10

    We expansively investigate thermal behaviors of various general-purpose light-emitting diode (LED) lamps and apply our measured results, validated by simulation, to establish lamp design rules for optimizing their optical and thermal properties. These design rules provide the means to minimize lumen depreciation over time by minimizing the periods for lamps to reach thermal steady-state while maintaining their high luminous efficacy and omnidirectional light distribution capability. While it is well known that minimizing the junction temperature of an LED leads to a longer lifetime and an increased lumen output, our study demonstrates, for the first time, to the best of our knowledge, that it is also important to minimize the time it takes to reach thermal equilibrium because doing so minimizes lumen depreciation and enhances light output and color stability during operation. Specifically, we have found that, in addition to inadequate heat-sink fin areas for a lamp configuration, LEDs mounted on multiple boards, as opposed to a single board, lead to longer periods for reaching thermal equilibrium contributing to larger lumen depreciation.

  20. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.

    PubMed

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-04-06

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  1. 76 FR 22925 - Assumption Buster Workshop: Abnormal Behavior Detection Finds Malicious Actors

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... Technology Research and Development (NITRD) Program, National Science Foundation. ACTION: Call for... NATIONAL SCIENCE FOUNDATION Assumption Buster Workshop: Abnormal Behavior Detection Finds...: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an...

  2. Incentives, Behavior, and Risk Management

    ERIC Educational Resources Information Center

    Liu, Debin

    2011-01-01

    Insiders are one of the most serious threats to an organization's information assets. Generally speaking, there are two types of insider threats based on the insiders' intents. Malicious Insiders are individuals with varying degrees of harmful intentions. Inadvertent Insiders are individuals without malicious intent. In this dissertation, I…

  3. Detecting and classifying method based on similarity matching of Android malware behavior with profile.

    PubMed

    Jang, Jae-Wook; Yun, Jaesung; Mohaisen, Aziz; Woo, Jiyoung; Kim, Huy Kang

    2016-01-01

    Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples.

  4. In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers' Judgments in Counterterrorism Models.

    PubMed

    Sri Bhashyam, Sumitra; Montibeller, Gilberto

    2016-04-01

    A key objective for policymakers and analysts dealing with terrorist threats is trying to predict the actions that malicious agents may take. A recent trend in counterterrorism risk analysis is to model the terrorists' judgments, as these will guide their choices of such actions. The standard assumptions in most of these models are that terrorists are fully rational, following all the normative desiderata required for rational choices, such as having a set of constant and ordered preferences, being able to perform a cost-benefit analysis of their alternatives, among many others. However, are such assumptions reasonable from a behavioral perspective? In this article, we analyze the types of assumptions made across various counterterrorism analytical models that represent malicious agents' judgments and discuss their suitability from a descriptive point of view. We then suggest how some of these assumptions could be modified to describe terrorists' preferences more accurately, by drawing knowledge from the fields of behavioral decision research, politics, philosophy of choice, public choice, and conflict management in terrorism. Such insight, we hope, might help make the assumptions of these models more behaviorally valid for counterterrorism risk analysis. © 2016 The Authors Wound Repair and Regeneration published by Wiley Periodicals, Inc. on behalf of The Wound Healing Society.

  5. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Control Environmental Stimulation through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang; Shih, Ching-Tien; Lin, Kun-Tsan; Chiang, Ming-Shan

    2009-01-01

    This study assessed whether two people with profound multiple disabilities and minimal motor behavior would be able to control environmental stimulation using thumb poke ability with a mouse wheel and a newly developed mouse driver (i.e., a new mouse driver replacing standard mouse driver, and turning a mouse into a precise thumb poke detector).…

  6. The Impact of Emotions and Empathy-Related Traits on Punishment Behavior: Introduction and Validation of the Inequality Game

    PubMed Central

    Klimecki, Olga M.; Vuilleumier, Patrik; Sander, David

    2016-01-01

    In the prevention and resolution of conflicts in social contexts, an important step is to understand how different emotions and empathic traits are linked to punishment behaviors. Unfortunately, few paradigms exist to study these phenomena. Here, we developed the Inequality Game (IG) as an economic and verbal interaction paradigm in which participants are faced with an “unfair other” as opposed to a “fair other” and subsequently have the opportunity to engage in a range of social behaviors. These social behaviors include cooperative or competitive economic choices and nice or derogatory verbal behavior toward the unfair and fair other. Participants could thus engage in punishment or forgiveness behavior toward the unfair other as well as in cooperative or aggressive behavior toward the fair other. We validated the IG through multimodal measures comprising the assessment of personality traits, emotions (by means of facial expressions and self-reports), arousal (by means of skin conductance responses), physical effort (force exertion), and behavioral reactions. Second, we examined the influence of emotions and empathy-related traits on punishment behavior. With regard to emotions, we observed a positive relation between malicious joy and punishment behavior. This result highlights the role of reward-related mechanisms in favoring punishment behavior. In addition, different empathic traits had opposing effects on antisocial behavior. Whereas personal distress predicted aggressive verbal behavior, perspective taking and empathic concern predicted a reduction in punishment behavior. Empathic traits also modulated emotional experience and person evaluations, such that perspective taking was related to more positive affect (less frowning and more smiling) and a more favorable evaluation of the unfair other. The current data validate the IG, reveal that malicious joy is positively related to punishment behavior, and show that different types of empathic traits can

  7. The Impact of Emotions and Empathy-Related Traits on Punishment Behavior: Introduction and Validation of the Inequality Game.

    PubMed

    Klimecki, Olga M; Vuilleumier, Patrik; Sander, David

    2016-01-01

    In the prevention and resolution of conflicts in social contexts, an important step is to understand how different emotions and empathic traits are linked to punishment behaviors. Unfortunately, few paradigms exist to study these phenomena. Here, we developed the Inequality Game (IG) as an economic and verbal interaction paradigm in which participants are faced with an "unfair other" as opposed to a "fair other" and subsequently have the opportunity to engage in a range of social behaviors. These social behaviors include cooperative or competitive economic choices and nice or derogatory verbal behavior toward the unfair and fair other. Participants could thus engage in punishment or forgiveness behavior toward the unfair other as well as in cooperative or aggressive behavior toward the fair other. We validated the IG through multimodal measures comprising the assessment of personality traits, emotions (by means of facial expressions and self-reports), arousal (by means of skin conductance responses), physical effort (force exertion), and behavioral reactions. Second, we examined the influence of emotions and empathy-related traits on punishment behavior. With regard to emotions, we observed a positive relation between malicious joy and punishment behavior. This result highlights the role of reward-related mechanisms in favoring punishment behavior. In addition, different empathic traits had opposing effects on antisocial behavior. Whereas personal distress predicted aggressive verbal behavior, perspective taking and empathic concern predicted a reduction in punishment behavior. Empathic traits also modulated emotional experience and person evaluations, such that perspective taking was related to more positive affect (less frowning and more smiling) and a more favorable evaluation of the unfair other. The current data validate the IG, reveal that malicious joy is positively related to punishment behavior, and show that different types of empathic traits can have

  8. Probabilistic Characterization of Adversary Behavior in Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  9. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Improve Computer Pointing Efficiency through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang; Chang, Man-Ling; Shih, Ching-Tien

    2009-01-01

    This study evaluated whether two people with multiple disabilities and minimal motor behavior would be able to improve their pointing performance using finger poke ability with a mouse wheel through a Dynamic Pointing Assistive Program (DPAP) and a newly developed mouse driver (i.e., a new mouse driver replaces standard mouse driver, changes a…

  10. Children with Multiple Disabilities and Minimal Motor Behavior Using Chin Movements to Operate Microswitches to Obtain Environmental Stimulation

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Tota, Alessia; Antonucci, Massimo; Oliva, Doretta

    2006-01-01

    In these two studies, two children with multiple disabilities and minimal motor behavior were assessed to see if they could use chin movements to operate microswitches to obtain environmental stimulation. In Study I, we applied an adapted version of a recently introduced electronic microswitch [Lancioni, G. E., O'Reilly, M. F., Singh, N. N.,…

  11. Test and Evaluation of the Malicious Activity Simulation Tool (MAST) in a Local Area Network (LAN) Running the Common PC Operating System Environment (COMPOSE)

    DTIC Science & Technology

    2013-09-01

    Malicious Activity Simulation Tool MMORPG Massively Multiplayer Online Role-Playing Game MMS Mission Management Server MOA Memorandum of Agreement MS...conferencing, and massively multiplayer online role- playing games (MMORPG). During all of these Internet-based exchanges and transactions, the Internet user...In its 2011 Internet Crime Report, the Internet Crime Complaint Center (IC3) stated there were more than 300,000 complaints of online criminal

  12. An Overview of Intervention Options for Promoting Adaptive Behavior of Persons with Acquired Brain Injury and Minimally Conscious State

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Bosco, Andrea; Belardinelli, Marta Olivetti; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff

    2010-01-01

    This paper presents an overview of the studies directed at helping post-coma persons with minimally conscious state improve their adaptive behavior. Twenty-one studies were identified for the 2000-2010 period (i.e., a period in which an intense debate has occurred about diagnostic, rehabilitative, prognostic, and ethical issues concerning people…

  13. Minimization In Digital Design As A Meta-Planning Problem

    NASA Astrophysics Data System (ADS)

    Ho, William P. C.; Wu, Jung-Gen

    1987-05-01

    In our model-based expert system for automatic digital system design, we formalize the design process into three sub-processes - compiling high-level behavioral specifications into primitive behavioral operations, grouping primitive operations into behavioral functions, and grouping functions into modules. Consideration of design minimization explicitly controls decision-making in the last two subprocesses. Design minimization, a key task in the automatic design of digital systems, is complicated by the high degree of interaction among the time sequence and content of design decisions. In this paper, we present an AI approach which directly addresses these interactions and their consequences by modeling the minimization prob-lem as a planning problem, and the management of design decision-making as a meta-planning problem.

  14. Behavioral tradeoff in estuarine larvae favors seaward migration over minimizing visibility to predators

    PubMed Central

    Morgan, Steven G.; Anastasia, Jean R.

    2008-01-01

    The ability of microscopic larvae to control their fate and replenish populations in dynamic marine environments has been a long-running topic of debate of central importance to understanding the ecology and evolution of life in the sea and managing resources in a changing global environment. After decades of research documenting behaviors that keep larvae close to natal populations, it is becoming apparent that larval behaviors in a broader spectrum of species promote long-distance migrations to offshore nursery grounds. Larvae must exert considerable control over their movements. We now show that larval emigration from estuaries is favored even over minimizing visibility to predators. An endogenous tidal vertical migration that would expedite seaward migration of Uca pugilator larvae was maintained experimentally across two tidal regimes. The periodicity of the rhythm doubled to match the local tidal regime, but larvae ascended to the surface during the daytime rather than at night. This process would conserve larval emigration but increase the visibility to predators across part of the species range. The periodicity of tidal vertical migration by Sesarma cinereum larvae failed to double and was inappropriately timed relative to both environmental cycles in the absence of a diel cycle. The timing system regulating tidally timed behaviors in these two species of crabs evidently differed. Phenotypic plasticity can conserve larval transport of both species when tidal and diel cycles are present. It may be widespread in the sea where diverse habitats are encountered across extensive species ranges. PMID:18172217

  15. Behavioral tradeoff in estuarine larvae favors seaward migration over minimizing visibility to predators.

    PubMed

    Morgan, Steven G; Anastasia, Jean R

    2008-01-08

    The ability of microscopic larvae to control their fate and replenish populations in dynamic marine environments has been a long-running topic of debate of central importance to understanding the ecology and evolution of life in the sea and managing resources in a changing global environment. After decades of research documenting behaviors that keep larvae close to natal populations, it is becoming apparent that larval behaviors in a broader spectrum of species promote long-distance migrations to offshore nursery grounds. Larvae must exert considerable control over their movements. We now show that larval emigration from estuaries is favored even over minimizing visibility to predators. An endogenous tidal vertical migration that would expedite seaward migration of Uca pugilator larvae was maintained experimentally across two tidal regimes. The periodicity of the rhythm doubled to match the local tidal regime, but larvae ascended to the surface during the daytime rather than at night. This process would conserve larval emigration but increase the visibility to predators across part of the species range. The periodicity of tidal vertical migration by Sesarma cinereum larvae failed to double and was inappropriately timed relative to both environmental cycles in the absence of a diel cycle. The timing system regulating tidally timed behaviors in these two species of crabs evidently differed. Phenotypic plasticity can conserve larval transport of both species when tidal and diel cycles are present. It may be widespread in the sea where diverse habitats are encountered across extensive species ranges.

  16. Effects of malicious ocular laser exposure in commercial airline pilots.

    PubMed

    Palakkamanil, Mathew M; Fielden, Michael P

    2015-12-01

    Intentional malicious laser strikes on commercial pilots are committed by individuals who target a laser into airplane cockpits during takeoff and landing. Because laser exposure to pilots is a relatively new but growing occurrence, our study investigates the ocular effect of this laser exposure in pilots. Retrospective chart review by a single ophthalmologist. All commercial airline pilots (58 male, 3 female) who experienced a laser strike while flying between April 2012 and November 2014 who presented to our clinic were included. A retrospective chart review was performed in a retinal specialist's practice. Ocular assessment was performed within 3 days of laser exposure. A complete ophthalmic evaluation was conducted, including Early Treatment Diabetic Retinopathy Study visual acuity, colour vision, visual fields, intraocular pressure, slit-lamp examination, dilated fundus examination, colour fundus photographs, and ocular coherence tomography. Sixty-four laser strike incidents involving commercial pilots were included. All pilots in the study experienced some degree of immediate ocular irritation or light sensitivity. No definite cases of ocular damage were attributed to laser strikes. No pilot had any functional ocular deficits. Our study revealed that laser strikes on aircraft did not result in permanent visual functional or structural deficits. However, laser strikes cause immediate visual effects, including glare, flash blindness, and ocular irritation that can interfere with a pilot's visual function. Given the widespread accessibility of high-power lasers and the rapid increase in incidents, laser strikes threaten to jeopardize aviation safety unless effective preventative measures are put in place. Copyright © 2015 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  17. Insider Threat Detection on the Windows Operating System using Virtual Machine Introspection

    DTIC Science & Technology

    2012-06-14

    by a malicious insider. HBSS systems running on a user’s workstation could be disabled either due to misconfiguration, privilege escalation , or by a...potential malicious insider threat, organizations must develop use cases which categorize possible attack techniques, such as data exfiltration via...hardware and contain any type of data an attacker may be looking for. Minimal Resources Since honeypots do not provide any network services, they

  18. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Improve Computer Drag-and-Drop Efficiency through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang

    2011-01-01

    This study evaluated whether two people with multiple disabilities and minimal motor behavior would be able to improve their Drag-and-Drop (DnD) performance using their finger/thumb poke ability with a mouse scroll wheel through a Dynamic Drag-and-Drop Assistive Program (DDnDAP). A multiple probe design across participants was used in this study…

  19. Improving the performance of minimizers and winnowing schemes

    PubMed Central

    Marçais, Guillaume; Pellow, David; Bork, Daniel; Orenstein, Yaron; Shamir, Ron; Kingsford, Carl

    2017-01-01

    Abstract Motivation: The minimizers scheme is a method for selecting k-mers from sequences. It is used in many bioinformatics software tools to bin comparable sequences or to sample a sequence in a deterministic fashion at approximately regular intervals, in order to reduce memory consumption and processing time. Although very useful, the minimizers selection procedure has undesirable behaviors (e.g. too many k-mers are selected when processing certain sequences). Some of these problems were already known to the authors of the minimizers technique, and the natural lexicographic ordering of k-mers used by minimizers was recognized as their origin. Many software tools using minimizers employ ad hoc variations of the lexicographic order to alleviate those issues. Results: We provide an in-depth analysis of the effect of k-mer ordering on the performance of the minimizers technique. By using small universal hitting sets (a recently defined concept), we show how to significantly improve the performance of minimizers and avoid some of its worse behaviors. Based on these results, we encourage bioinformatics software developers to use an ordering based on a universal hitting set or, if not possible, a randomized ordering, rather than the lexicographic order. This analysis also settles negatively a conjecture (by Schleimer et al.) on the expected density of minimizers in a random sequence. Availability and Implementation: The software used for this analysis is available on GitHub: https://github.com/gmarcais/minimizers.git. Contact: gmarcais@cs.cmu.edu or carlk@cs.cmu.edu PMID:28881970

  20. Improving the performance of minimizers and winnowing schemes.

    PubMed

    Marçais, Guillaume; Pellow, David; Bork, Daniel; Orenstein, Yaron; Shamir, Ron; Kingsford, Carl

    2017-07-15

    The minimizers scheme is a method for selecting k -mers from sequences. It is used in many bioinformatics software tools to bin comparable sequences or to sample a sequence in a deterministic fashion at approximately regular intervals, in order to reduce memory consumption and processing time. Although very useful, the minimizers selection procedure has undesirable behaviors (e.g. too many k -mers are selected when processing certain sequences). Some of these problems were already known to the authors of the minimizers technique, and the natural lexicographic ordering of k -mers used by minimizers was recognized as their origin. Many software tools using minimizers employ ad hoc variations of the lexicographic order to alleviate those issues. We provide an in-depth analysis of the effect of k -mer ordering on the performance of the minimizers technique. By using small universal hitting sets (a recently defined concept), we show how to significantly improve the performance of minimizers and avoid some of its worse behaviors. Based on these results, we encourage bioinformatics software developers to use an ordering based on a universal hitting set or, if not possible, a randomized ordering, rather than the lexicographic order. This analysis also settles negatively a conjecture (by Schleimer et al. ) on the expected density of minimizers in a random sequence. The software used for this analysis is available on GitHub: https://github.com/gmarcais/minimizers.git . gmarcais@cs.cmu.edu or carlk@cs.cmu.edu. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  1. Neurophysiological and Behavioral Responses to Music Therapy in Vegetative and Minimally Conscious States

    PubMed Central

    O’Kelly, Julian; James, L.; Palaniappan, R.; Taborin, J.; Fachner, J.; Magee, W. L.

    2013-01-01

    Assessment of awareness for those with disorders of consciousness is a challenging undertaking, due to the complex presentation of the population. Debate surrounds whether behavioral assessments provide greatest accuracy in diagnosis compared to neuro-imaging methods, and despite developments in both, misdiagnosis rates remain high. Music therapy may be effective in the assessment and rehabilitation with this population due to effects of musical stimuli on arousal, attention, and emotion, irrespective of verbal or motor deficits. However, an evidence base is lacking as to which procedures are most effective. To address this, a neurophysiological and behavioral study was undertaken comparing electroencephalogram (EEG), heart rate variability, respiration, and behavioral responses of 20 healthy subjects with 21 individuals in vegetative or minimally conscious states (VS or MCS). Subjects were presented with live preferred music and improvised music entrained to respiration (procedures typically used in music therapy), recordings of disliked music, white noise, and silence. ANOVA tests indicated a range of significant responses (p ≤ 0.05) across healthy subjects corresponding to arousal and attention in response to preferred music including concurrent increases in respiration rate with globally enhanced EEG power spectra responses (p = 0.05–0.0001) across frequency bandwidths. Whilst physiological responses were heterogeneous across patient cohorts, significant post hoc EEG amplitude increases for stimuli associated with preferred music were found for frontal midline theta in six VS and four MCS subjects, and frontal alpha in three VS and four MCS subjects (p = 0.05–0.0001). Furthermore, behavioral data showed a significantly increased blink rate for preferred music (p = 0.029) within the VS cohort. Two VS cases are presented with concurrent changes (p ≤ 0.05) across measures indicative of discriminatory responses to both music therapy

  2. Cyber Moat: Adaptive Virtualized Network Framework for Deception and Disinformation

    DTIC Science & Technology

    2016-12-12

    As one type of bots, web crawlers have been leveraged by search engines (e.g., Googlebot by Google) to popularize websites through website indexing...However, the number of malicious bots is increasing too. To regulate the behavior of crawlers, most websites include a file called "robots.txt" that...However, "robots.txt" only provides a guideline, and almost all malicious robots ignore it. Moreover, since this file is publicly available, malicious

  3. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    PubMed

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  4. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    PubMed Central

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  5. Genetic background effects in Neuroligin-3 mutant mice: Minimal behavioral abnormalities on C57 background.

    PubMed

    Jaramillo, Thomas C; Escamilla, Christine Ochoa; Liu, Shunan; Peca, Lauren; Birnbaum, Shari G; Powell, Craig M

    2018-02-01

    Neuroligin-3 (NLGN3) is a postsynaptic cell adhesion protein that interacts with presynaptic ligands including neurexin-1 (NRXN1) [Ichtchenko et al., Journal of Biological Chemistry, 271, 2676-2682, 1996]. Mice harboring a mutation in the NLGN3 gene (NL3R451C) mimicking a mutation found in two brothers with autism spectrum disorder (ASD) were previously generated and behaviorally phenotyped for autism-related behaviors. In these NL3R451C mice generated and tested on a hybrid C57BL6J/129S2/SvPasCrl background, we observed enhanced spatial memory and reduced social interaction [Tabuchi et al., Science, 318, 71-76, 2007]. Curiously, an independently generated second line of mice harboring the same mutation on a C57BL6J background exhibited minimal aberrant behavior, thereby providing apparently discrepant results. To investigate the origin of the discrepancy, we previously replicated the original findings of Tabuchi et al. by studying the same NL3R451C mutation on a pure 129S2/SvPasCrl genetic background. Here we complete the behavioral characterization of the NL3R451C mutation on a pure C57BL6J genetic background to determine if background genetics play a role in the discrepant behavioral outcomes involving NL3R451C mice. NL3R451C mutant mice on a pure C57BL6J background did not display spatial memory enhancements or social interaction deficits. We only observed a decreased startle response and mildly increased locomotor activity in these mice suggesting that background genetics influences behavioral outcomes involving the NL3R451C mutation. Autism Res 2018, 11: 234-244. © 2017 International Society for Autism Research, Wiley Periodicals, Inc. Behavioral symptoms of autism can be highly variable, even in cases that involve identical genetic mutations. Previous studies in mice with a mutation of the Neuroligin-3 gene showed enhanced learning and social deficits. We replicated these findings on the same and different genetic backgrounds. In this study, however, the

  6. Minimizing Bullying Behavior of Middle School Students through Behavioral Intervention and Instruction

    ERIC Educational Resources Information Center

    Drosopoulos, J. Dan; Heald, A. Zachariah; McCue, M. John

    2008-01-01

    This action research project report examined all forms of bullying behaviors and ways to reduce those behaviors. The project included 63 students from both a high school health class and a 6th and 7th grade middle school homeroom. The research was conducted from September 17, 2007 through December 14, 2007. In the specified locations, female to…

  7. Approximate solution of the p-median minimization problem

    NASA Astrophysics Data System (ADS)

    Il'ev, V. P.; Il'eva, S. D.; Navrotskaya, A. A.

    2016-09-01

    A version of the facility location problem (the well-known p-median minimization problem) and its generalization—the problem of minimizing a supermodular set function—is studied. These problems are NP-hard, and they are approximately solved by a gradient algorithm that is a discrete analog of the steepest descent algorithm. A priori bounds on the worst-case behavior of the gradient algorithm for the problems under consideration are obtained. As a consequence, a bound on the performance guarantee of the gradient algorithm for the p-median minimization problem in terms of the production and transportation cost matrix is obtained.

  8. Conducting research with minimally verbal participants with autism spectrum disorder.

    PubMed

    Tager-Flusberg, Helen; Plesa Skwerer, Daniela; Joseph, Robert M; Brukilacchio, Brianna; Decker, Jessica; Eggleston, Brady; Meyer, Steven; Yoder, Anne

    2017-10-01

    A growing number of research groups are now including older minimally verbal individuals with autism spectrum disorder in their studies to encompass the full range of heterogeneity in the population. There are numerous barriers that prevent researchers from collecting high-quality data from these individuals, in part because of the challenging behaviors with which they present alongside their very limited means for communication. In this article, we summarize the practices that we have developed, based on applied behavioral analysis techniques, and have used in our ongoing research on behavioral, eye-tracking, and electrophysiological studies of minimally verbal children and adolescents with autism spectrum disorder. Our goal is to provide the field with useful guidelines that will promote the inclusion of the entire spectrum of individuals with autism spectrum disorder in future research investigations.

  9. From the volcano effect to banding: a minimal model for bacterial behavioral transitions near chemoattractant sources.

    PubMed

    Javens, Gregory; Jashnsaz, Hossein; Pressé, Steve

    2018-04-30

    Sharp chemoattractant (CA) gradient variations near food sources may give rise to dramatic behavioral changes of bacteria neighboring these sources. For instance, marine bacteria exhibiting run-reverse motility are known to form distinct bands around patches (large sources) of chemoattractant such as nutrient-soaked beads while run-and-tumble bacteria have been predicted to exhibit a 'volcano effect' (spherical shell-shaped density) around a small (point) source of food. Here we provide the first minimal model of banding for run-reverse bacteria and show that, while banding and the volcano effect may appear superficially similar, they are different physical effects manifested under different source emission rate (and thus effective source size). More specifically, while the volcano effect is known to arise around point sources from a bacterium's temporal differentiation of signal (and corresponding finite integration time), this effect alone is insufficient to account for banding around larger patches as bacteria would otherwise cluster around the patch without forming bands at some fixed radial distance. In particular, our model demonstrates that banding emerges from the interplay of run-reverse motility and saturation of the bacterium's chemoreceptors to CA molecules and our model furthermore predicts that run-reverse bacteria susceptible to banding behavior should also exhibit a volcano effect around sources with smaller emission rates.

  10. Practical Strategies for Minimizing Challenging Behaviors in the Preschool Classroom

    ERIC Educational Resources Information Center

    Jiang, Hui S.; Jones, Sarah Y.

    2016-01-01

    Challenging behaviors can happen to children with a variety of abilities in all kinds of settings, and children's early experiences as members of classroom communities serve as the foundation on which lifelong patterns of social behaviors are constructed. Therefore, helping children with challenging behaviors become fully included is essential for…

  11. Warding off the evil eye: when the fear of being envied increases prosocial behavior.

    PubMed

    van de Ven, Niels; Zeelenberg, Marcel; Pieters, Rik

    2010-11-01

    The fear of being envied makes people act prosocially, in an attempt to ward off the potentially destructive effects of envy. In three experiments, people who were in a superior position and could be envied were more likely than control participants to give time-consuming advice to a potentially envious person or to help a potentially envious person pick up erasers she had accidentally scattered. However, helping behavior increased only if envy was likely to be malicious rather than benign. People who were better off did not increase their helping behavior toward people in general, but increased their helping only toward the potentially envious. This finding is consistent with the idea that the better off act more prosocially as an appeasement strategy. The fear of being envied serves useful group functions, because it triggers prosocial behavior that is likely to dampen the potentially destructive effects of envy and simultaneously helps to improve the situation of people who are worse off.

  12. New Technologies and Emerging Threats: Personnel Security Adjudicative Guidelines in the Age of Social Networking

    DTIC Science & Technology

    2012-12-01

    behavior unless it becomes criminal or involves the publishing of sensitive information. This means that malicious doxing, cyberbullying or other...workplace or background investigation realms, as well as the many forms of cyberbullying and malicious rumor-spreading online could be addressed. Doxing...None Sexually harass another person online None Engage in cyberbullying by using the Internet to send offensive, inappropriate verbal allack

  13. Identifying compromised systems through correlation of suspicious traffic from malware behavioral analysis

    NASA Astrophysics Data System (ADS)

    Camilo, Ana E. F.; Grégio, André; Santos, Rafael D. C.

    2016-05-01

    Malware detection may be accomplished through the analysis of their infection behavior. To do so, dynamic analysis systems run malware samples and extract their operating system activities and network traffic. This traffic may represent malware accessing external systems, either to steal sensitive data from victims or to fetch other malicious artifacts (configuration files, additional modules, commands). In this work, we propose the use of visualization as a tool to identify compromised systems based on correlating malware communications in the form of graphs and finding isomorphisms between them. We produced graphs from over 6 thousand distinct network traffic files captured during malware execution and analyzed the existing relationships among malware samples and IP addresses.

  14. From the volcano effect to banding: a minimal model for bacterial behavioral transitions near chemoattractant sources

    NASA Astrophysics Data System (ADS)

    Javens, Gregory; Jashnsaz, Hossein; Pressé, Steve

    2018-07-01

    Sharp chemoattractant (CA) gradient variations near food sources may give rise to dramatic behavioral changes of bacteria neighboring these sources. For instance, marine bacteria exhibiting run-reverse motility are known to form distinct bands around patches (large sources) of chemoattractant such as nutrient-soaked beads while run-and-tumble bacteria have been predicted to exhibit a ‘volcano effect’ (spherical shell-shaped density) around a small (point) source of food. Here we provide the first minimal model of banding for run-reverse bacteria and show that, while banding and the volcano effect may appear superficially similar, they are different physical effects manifested under different source emission rate (and thus effective source size). More specifically, while the volcano effect is known to arise around point sources from a bacterium’s temporal differentiation of signal (and corresponding finite integration time), this effect alone is insufficient to account for banding around larger patches as bacteria would otherwise cluster around the patch without forming bands at some fixed radial distance. In particular, our model demonstrates that banding emerges from the interplay of run-reverse motility and saturation of the bacterium’s chemoreceptors to CA molecules and our model furthermore predicts that run-reverse bacteria susceptible to banding behavior should also exhibit a volcano effect around sources with smaller emission rates.

  15. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    PubMed

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

  16. Striking a balance in communicating pharmacogenetic test results: promoting comprehension and minimizing adverse psychological and behavioral response.

    PubMed

    Haga, Susanne B; Mills, Rachel; Bosworth, Hayden

    2014-10-01

    Pharmacogenetic (PGx) testing can provide information about a patient's likelihood to respond to a medication or experience an adverse event, and be used to inform medication selection and/or dosing. Promoting patient comprehension of PGx test results will be important to improving engagement and understanding of treatment decisions. The discussion in this paper is based on our experiences and the literature on communication of genetic test results for disease risk and broad risk communication strategies. Clinical laboratory reports often describe PGx test results using standard terminology such as 'poor metabolizer' or 'ultra-rapid metabolizer.' While this type of terminology may promote patient recall with its simple, yet descriptive nature, it may be difficult for some patients to comprehend and/or cause adverse psychological or behavioral responses. The language used to communicate results and their significance to patients will be important to consider in order to minimize confusion and potential psychological consequences such as increased anxiety that can adversely impact medication-taking behaviors. Due to patients' unfamiliarity with PGx testing and the potential for confusion, adverse psychological effects, and decreased medication adherence, health providers need to be cognizant of the language used in discussing PGx test results with patients. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  17. Modeling Human Behavior to Anticipate Insider Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach providesmore » automated support for the detection of high-risk behavioral “triggers” to help focus the analyst’s attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.« less

  18. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    DTIC Science & Technology

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  19. Short- and long-term effects of conscious, minimally conscious and unconscious brand logos.

    PubMed

    Muscarella, Charlotte; Brintazzoli, Gigliola; Gordts, Sarah; Soetens, Eric; Van den Bussche, Eva

    2013-01-01

    Unconsciously presented information can influence our behavior in an experimental context. However, whether these effects can be translated to a daily life context, such as advertising, is strongly debated. What hampers this translation is the widely accepted notion of the short-livedness of unconscious representations. The effect of unconscious information on behavior is assumed to rapidly vanish within a few hundreds of milliseconds. Using highly familiar brand logos (e.g., the logo of McDonald's) as subliminal and supraliminal primes in two priming experiments, we assessed whether these logos were able to elicit behavioral effects after a short (e.g., 350 ms), a medium (e.g., 1000 ms), and a long (e.g., 5000 ms) interval. Our results demonstrate that when real-life information is presented minimally consciously or even unconsciously, it can influence our subsequent behavior, even when more than five seconds pass between the presentation of the minimally conscious or unconscious information and the behavior on which it exerts its influence.

  20. Short- and Long-Term Effects of Conscious, Minimally Conscious and Unconscious Brand Logos

    PubMed Central

    Gordts, Sarah; Soetens, Eric; Van den Bussche, Eva

    2013-01-01

    Unconsciously presented information can influence our behavior in an experimental context. However, whether these effects can be translated to a daily life context, such as advertising, is strongly debated. What hampers this translation is the widely accepted notion of the short-livedness of unconscious representations. The effect of unconscious information on behavior is assumed to rapidly vanish within a few hundreds of milliseconds. Using highly familiar brand logos (e.g., the logo of McDonald's) as subliminal and supraliminal primes in two priming experiments, we assessed whether these logos were able to elicit behavioral effects after a short (e.g., 350 ms), a medium (e.g., 1000 ms), and a long (e.g., 5000 ms) interval. Our results demonstrate that when real-life information is presented minimally consciously or even unconsciously, it can influence our subsequent behavior, even when more than five seconds pass between the presentation of the minimally conscious or unconscious information and the behavior on which it exerts its influence. PMID:23658681

  1. How do we assign punishment? The impact of minimal and maximal standards on the evaluation of deviants.

    PubMed

    Kessler, Thomas; Neumann, Jörg; Mummendey, Amélie; Berthold, Anne; Schubert, Thomas; Waldzus, Sven

    2010-09-01

    To explain the determinants of negative behavior toward deviants (e.g., punishment), this article examines how people evaluate others on the basis of two types of standards: minimal and maximal. Minimal standards focus on an absolute cutoff point for appropriate behavior; accordingly, the evaluation of others varies dichotomously between acceptable or unacceptable. Maximal standards focus on the degree of deviation from that standard; accordingly, the evaluation of others varies gradually from positive to less positive. This framework leads to the prediction that violation of minimal standards should elicit punishment regardless of the degree of deviation, whereas punishment in response to violations of maximal standards should depend on the degree of deviation. Four studies assessed or manipulated the type of standard and degree of deviation displayed by a target. Results consistently showed the expected interaction between type of standard (minimal and maximal) and degree of deviation on punishment behavior.

  2. Identifying Time Periods of Minimal Thermal Gradient for Temperature-Driven Structural Health Monitoring.

    PubMed

    Reilly, John; Glisic, Branko

    2018-03-01

    Temperature changes play a large role in the day to day structural behavior of structures, but a smaller direct role in most contemporary Structural Health Monitoring (SHM) analyses. Temperature-Driven SHM will consider temperature as the principal driving force in SHM, relating a measurable input temperature to measurable output generalized strain (strain, curvature, etc.) and generalized displacement (deflection, rotation, etc.) to create three-dimensional signatures descriptive of the structural behavior. Identifying time periods of minimal thermal gradient provides the foundation for the formulation of the temperature-deformation-displacement model. Thermal gradients in a structure can cause curvature in multiple directions, as well as non-linear strain and stress distributions within the cross-sections, which significantly complicates data analysis and interpretation, distorts the signatures, and may lead to unreliable conclusions regarding structural behavior and condition. These adverse effects can be minimized if the signatures are evaluated at times when thermal gradients in the structure are minimal. This paper proposes two classes of methods based on the following two metrics: (i) the range of raw temperatures on the structure, and (ii) the distribution of the local thermal gradients, for identifying time periods of minimal thermal gradient on a structure with the ability to vary the tolerance of acceptable thermal gradients. The methods are tested and validated with data collected from the Streicker Bridge on campus at Princeton University.

  3. Identifying Time Periods of Minimal Thermal Gradient for Temperature-Driven Structural Health Monitoring

    PubMed Central

    Reilly, John; Glisic, Branko

    2018-01-01

    Temperature changes play a large role in the day to day structural behavior of structures, but a smaller direct role in most contemporary Structural Health Monitoring (SHM) analyses. Temperature-Driven SHM will consider temperature as the principal driving force in SHM, relating a measurable input temperature to measurable output generalized strain (strain, curvature, etc.) and generalized displacement (deflection, rotation, etc.) to create three-dimensional signatures descriptive of the structural behavior. Identifying time periods of minimal thermal gradient provides the foundation for the formulation of the temperature–deformation–displacement model. Thermal gradients in a structure can cause curvature in multiple directions, as well as non-linear strain and stress distributions within the cross-sections, which significantly complicates data analysis and interpretation, distorts the signatures, and may lead to unreliable conclusions regarding structural behavior and condition. These adverse effects can be minimized if the signatures are evaluated at times when thermal gradients in the structure are minimal. This paper proposes two classes of methods based on the following two metrics: (i) the range of raw temperatures on the structure, and (ii) the distribution of the local thermal gradients, for identifying time periods of minimal thermal gradient on a structure with the ability to vary the tolerance of acceptable thermal gradients. The methods are tested and validated with data collected from the Streicker Bridge on campus at Princeton University. PMID:29494496

  4. Proactive malware detection

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty

    2014-06-01

    Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.

  5. Minimal Models for Dyadic Processes: a Review

    NASA Astrophysics Data System (ADS)

    Rinaldi, Sergio; Gragnani, Alessandra

    This paper is a survey of a few recent contributions in which dyadic processes are studied as formal dynamical systems. For this, a general minimal model composed of two ordinary differential equations is first considered as a possible formal tool to mimic the dynamics of the feelings between two persons. The equations take into account three mechanisms of love growth and decay: the pleasure of being loved (return), the reaction to partner's appeal (instinct), and the forgetting process (oblivion). Under extremely simple assumptions on the behavior of the individuals, the minimal model turns out to be a positive linear system enjoying, as such, a number of remarkable properties, which are in agreement with common wisdom on the argument. These properties are used to explore the consequences that individual behavior can have on community structure. The main result along this line is that individual appeal is the driving force that creates order in the community. Then, in order to make the assumptions more realistic, in accordance with attachment theory, individuals are divided into secure and non secure individuals, and into synergic and non synergic individuals, for a total of four different classes. Using always the same minimal model, it is shown that couples composed of secure individuals, as well as couples composed of non synergic individuals can only have stationary modes of behavior. By contrast, couples composed of a secure and synergic individual and a non secure and non synergic individual can experience cyclic dynamics. In other words, the coexistence of insecurity and synergism in the couple is the minimum ingredient for cyclic love dynamics. Finally, a slightly more complex model, composed of three ordinary differential equations, proposed to study the dynamics of love between Petrarch, a celebrated Italian poet of the 14-th century, and Laura, a beautiful but married lady, is also reviewed. Possible extensions are mentioned at the end of the paper.

  6. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks †

    PubMed Central

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-01-01

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712

  7. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.

    PubMed

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-02-02

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

  8. Bringing out the Best Board Behavior

    ERIC Educational Resources Information Center

    Caruso, Nicholas

    2004-01-01

    The author's advice for for a school board superintendent is to assume incompetence instead of malevolence. Board members who behave inappropriately are a minority, and those with malicious intent are extremely rare. Most misbehaving board members act out of frustration. They may not understand the appropriate role of a board member.…

  9. Sodium fluoroacetate toxicity: a case report of malicious poisoning in dogs across a Phoenix, Arizona neighborhood.

    PubMed

    Brower, Alexandra; Struthers, Jason; Schmidt, Jemima

    2017-12-01

    In May 2016, thirteen dogs housed in backyards within a single neighborhood were reported to have developed convulsions and died within a 24 h period. An investigation of the scene by law enforcement resulted in submission of eight dogs for postmortem examination. It was suspected that a rapid acting toxin was the cause of death. A gas chromatography-mass spectrophotometry (GC-MS) protocol combined with thin-layer chromatography that allows screening for common convulsants failed to identify a toxin in either pooled gastric content or liver samples from select cases. After consultation with a veterinary toxicologist, sodium fluoroacetate poisoning was investigated. Sodium fluoroacetate, also known as 1080, is a pesticide that was available in the United States from the 1940's to the 1970's, but since 1972 has been banned or under EPA restricted use. When gastric content was re-tested using a GC-MS protocol with selective fluoroacetate ion monitoring and carbon 14 radiolabeling to facilitate quantification, 379 ppb sodium fluoroacetate was detected in a pooled gastric content sample. In spite of its banned status, sodium fluoroacetate remains a rarely reported cause of malicious poisoning in domestic dogs in the United Sates. This compound is highly toxic and is capable of causing death in dogs, humans, other mammals, and insects in ingested quantities as small as a few droplets. Even when geographic or historical proximity to a source is not evident, this intoxication should be considered in dogs exhibiting compatible clinical signs.

  10. Effectively Utilizing the "Behavioral" in Cognitive-Behavioral Group Therapy of Sex Offenders

    ERIC Educational Resources Information Center

    Jennings, Jerry L.; Deming, Adam

    2013-01-01

    Although cognitive-behavioral therapy (CBT) is touted as the predominant approach in sex offender-specific group treatment, a review of the field shows that the "behavioral" part of CBT has become minimal in relation to that which is cognitive. The authors show how a revitalized "behavioral sensibility" may help to enhance…

  11. Socio-Economic Variation in Price Minimizing Behaviors: Findings from the International Tobacco Control (ITC) Four Country Survey

    PubMed Central

    Licht, Andrea S.; Hyland, Andrew J.; O’Connor, Richard J.; Chaloupka, Frank J.; Borland, Ron; Fong, Geoffrey T.; Nargis, Nigar; Cummings, K. Michael

    2011-01-01

    This paper examines how socio-economic status (SES) modifies how smokers adjust to changes in the price of tobacco products through utilization of multiple price minimizing techniques. Data come from the International Tobacco Control Policy Evaluation (ITC) Four Country Survey, nationally representative samples of adult smokers and includes respondents from Canada, the United States, the United Kingdom and Australia. Cross-sectional analyses were completed among 8,243 respondents (7,038 current smokers) from the survey wave conducted between October 2006 and February 2007. Analyses examined predictors of purchasing from low/untaxed sources, using discount cigarettes or roll-your-own (RYO) tobacco, purchasing cigarettes in cartons, and engaging in high levels of price and tax avoidance at last purchase. All analyses tested for interactions with SES and were weighted to account for changing and under-represented demographics. Relatively high levels of price and tax avoidance behaviors were present; 8% reported buying from low or untaxed source; 36% used discount or generic brands, 13.5% used RYO tobacco, 29% reported purchasing cartons, and 63% reported using at least one of these high price avoidance behaviors. Respondents categorized as having low SES were approximately 26% less likely to report using low or untaxed sources and 43% less likely to purchase tobacco by the carton. However, respondents with low SES were 85% more likely to report using discount brands/RYO compared to participants with higher SES. Overall, lower SES smokers were 25% more likely to engage in at least one or more tax avoidance behaviors compared to their higher SES counterparts. Price and tax avoidance behaviors are relatively common among smokers of all SES strata, but strategies differed with higher SES groups more likely to report traveling to a low-tax location to avoid paying higher prices, purchase duty free tobacco, and purchase by cartons instead of packs all of which were less

  12. Socio-economic variation in price minimizing behaviors: findings from the International Tobacco Control (ITC) Four Country Survey.

    PubMed

    Licht, Andrea S; Hyland, Andrew J; O'Connor, Richard J; Chaloupka, Frank J; Borland, Ron; Fong, Geoffrey T; Nargis, Nigar; Cummings, K Michael

    2011-01-01

    This paper examines how socio-economic status (SES) modifies how smokers adjust to changes in the price of tobacco products through utilization of multiple price minimizing techniques. Data come from the International Tobacco Control Policy Evaluation (ITC) Four Country Survey, nationally representative samples of adult smokers and includes respondents from Canada, the United States, the United Kingdom and Australia. Cross-sectional analyses were completed among 8,243 respondents (7,038 current smokers) from the survey wave conducted between October 2006 and February 2007. Analyses examined predictors of purchasing from low/untaxed sources, using discount cigarettes or roll-your-own (RYO) tobacco, purchasing cigarettes in cartons, and engaging in high levels of price and tax avoidance at last purchase. All analyses tested for interactions with SES and were weighted to account for changing and under-represented demographics. Relatively high levels of price and tax avoidance behaviors were present; 8% reported buying from low or untaxed source; 36% used discount or generic brands, 13.5% used RYO tobacco, 29% reported purchasing cartons, and 63% reported using at least one of these high price avoidance behaviors. Respondents categorized as having low SES were approximately 26% less likely to report using low or untaxed sources and 43% less likely to purchase tobacco by the carton. However, respondents with low SES were 85% more likely to report using discount brands/RYO compared to participants with higher SES. Overall, lower SES smokers were 25% more likely to engage in at least one or more tax avoidance behaviors compared to their higher SES counterparts. Price and tax avoidance behaviors are relatively common among smokers of all SES strata, but strategies differed with higher SES groups more likely to report traveling to a low-tax location to avoid paying higher prices, purchase duty free tobacco, and purchase by cartons instead of packs all of which were less

  13. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  14. Price-Minimizing Behaviors in a Cohort of Smokers before and after a Cigarette Tax Increase.

    PubMed

    Betzner, Anne; Boyle, Raymond G; St Claire, Ann W

    2016-06-17

    Cigarette tax increases result in a reduced demand for cigarettes and increased efforts by smokers to reduce their cost of smoking. Less is known about how smokers think about their expenditures for cigarettes and the possible mechanisms that underlie price-minimizing behaviors. In-depth longitudinal interviews were conducted with Minnesota smokers to explore the factors that influence smokers' decisions one month prior to a $1.75 cigarette tax increase and again one and three months after the increase. A total of 42 were sampled with 35 completed interviews at all three time points, resulting in 106 interviews across all participants at all time points. A qualitative descriptive approach examined smoking and buying habits, as well as reasons behind these decisions. A hierarchy of ways to save money on cigarettes included saving the most money by changing to roll your own pipe tobacco, changing to a cheaper brand, cutting down or quitting, changing to cigarillos, and buying online. Using coupons, shopping around, buying by the carton, changing the style of cigarette, and stocking up prior to the tax increase were described as less effective. Five factors emerged as impacting smokers' efforts to save money on cigarettes after the tax: brand loyalty, frugality, addiction, stress, and acclimation.

  15. Price-Minimizing Behaviors in a Cohort of Smokers before and after a Cigarette Tax Increase

    PubMed Central

    Betzner, Anne; Boyle, Raymond G.; St. Claire, Ann W.

    2016-01-01

    Cigarette tax increases result in a reduced demand for cigarettes and increased efforts by smokers to reduce their cost of smoking. Less is known about how smokers think about their expenditures for cigarettes and the possible mechanisms that underlie price-minimizing behaviors. In-depth longitudinal interviews were conducted with Minnesota smokers to explore the factors that influence smokers’ decisions one month prior to a $1.75 cigarette tax increase and again one and three months after the increase. A total of 42 were sampled with 35 completed interviews at all three time points, resulting in 106 interviews across all participants at all time points. A qualitative descriptive approach examined smoking and buying habits, as well as reasons behind these decisions. A hierarchy of ways to save money on cigarettes included saving the most money by changing to roll your own pipe tobacco, changing to a cheaper brand, cutting down or quitting, changing to cigarillos, and buying online. Using coupons, shopping around, buying by the carton, changing the style of cigarette, and stocking up prior to the tax increase were described as less effective. Five factors emerged as impacting smokers’ efforts to save money on cigarettes after the tax: brand loyalty, frugality, addiction, stress, and acclimation. PMID:27322301

  16. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    PubMed

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  17. Behavior-based network management: a unique model-based approach to implementing cyber superiority

    NASA Astrophysics Data System (ADS)

    Seng, Jocelyn M.

    2016-05-01

    Behavior-Based Network Management (BBNM) is a technological and strategic approach to mastering the identification and assessment of network behavior, whether human-driven or machine-generated. Recognizing that all five U.S. Air Force (USAF) mission areas rely on the cyber domain to support, enhance and execute their tasks, BBNM is designed to elevate awareness and improve the ability to better understand the degree of reliance placed upon a digital capability and the operational risk.2 Thus, the objective of BBNM is to provide a holistic view of the digital battle space to better assess the effects of security, monitoring, provisioning, utilization management, allocation to support mission sustainment and change control. Leveraging advances in conceptual modeling made possible by a novel advancement in software design and implementation known as Vector Relational Data Modeling (VRDM™), the BBNM approach entails creating a network simulation in which meaning can be inferred and used to manage network behavior according to policy, such as quickly detecting and countering malicious behavior. Initial research configurations have yielded executable BBNM models as combinations of conceptualized behavior within a network management simulation that includes only concepts of threats and definitions of "good" behavior. A proof of concept assessment called "Lab Rat," was designed to demonstrate the simplicity of network modeling and the ability to perform adaptation. The model was tested on real world threat data and demonstrated adaptive and inferential learning behavior. Preliminary results indicate this is a viable approach towards achieving cyber superiority in today's volatile, uncertain, complex and ambiguous (VUCA) environment.

  18. Gas permeability and thermal behavior of polypropylene films used for packaging minimally processed fresh-cut potatoes: a case study.

    PubMed

    Siracusa, Valentina; Blanco, Ignazio; Romani, Santina; Tylewicz, Urszula; Dalla Rosa, Marco

    2012-10-01

    This work reports an experimental study on the permeability and thermal behavior of commercial polypropylene (PP) film used for fresh-cut potatoes packaging. The permeability was tested using oxygen, carbon dioxide, nitrogen, mix of these 3 gases, normally used for modified atmosphere packaging (MAP) and Air, to understand if it would be possible to extend the shelf life of this food product designed for the catering field in respect to the packaging behavior. The temperature influence on permeability data, from 5 to 40 °C, was analyzed, before and after 4, 8, 12, 15, and 20 d of food contact, pointing out the dependence between temperature and gas transmission rate (GTR), solubility (S), diffusion coefficient (D), and time lag (t(L)) parameters. The activation energies (E) of the permeation process were determined with the different gases used in the experiments. The thermal behavior of PP film was studied by differential scanning calorimetry (DSC) and thermogravimetric analysis (TG) to well understand its thermal stability. Fourier transformed-infrared with attenuated total reflectance (FT-IR/ATR) spectroscopy was also performed in order to study the influence of the food contact on the chemical characteristics of the polymer film. The results obtained were discussed and compared each other. Studied samples showed, for all investigated gases, an increase of gas permeability and S values at higher temperature. Heat resistance classification among the sample as it is and stored in modified atmospheres was made. Finally all performed experiments have showed good polymer stability for the shelf-life storage potatoes under study. Study of packaging material was performed in a range of temperature, which can simulate the service condition to assess the suitability of a commercial polymer film for modified atmosphere packaging of fresh-cut potatoes minimally processed designed for catering purpose. © 2012 Institute of Food Technologists®

  19. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    PubMed Central

    Abdalzaher, Mohamed S.; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-01-01

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs. PMID:27367700

  20. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    PubMed

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  1. Effect of soaking in noni (Morinda citrifolia) juice on the microbiological and color behavior of Haden minimally processed mango.

    PubMed

    Ulloa, José Armando; González Tapia, Noemí T; Rosas Ulloa, Petra; Ramírez Ramírez, José Carmen; Ulloa Rangel, Blanca E

    2015-05-01

    The purpose of this study was to evaluate the effect of soaking in noni juice on the microbiological and color behavior of minimally processed mango. Two batches of Haden mango cubes were treated by immersion in noni juice for 2.5 or 5.0 min. Each batch was packed in polypropylene boxes and stored at 6 °C for up to 15 days; in addition, a control group of mango cubes was prepared by immersion in sterile water for the same duration. According to the results, the soaking of mango cubes in noni juice had an antimicrobial effect on mesophilic aerobic bacteria, molds and yeasts during storage at 6 °C for 15 days, without significantly (P < 0.05) affecting the CIE L*, a*, b*, chroma and hue angle values, in comparison with the control after 12 days of storage. The noni juice soaking treatment was demonstrated to be a potentially valuable technology for decontamination of fresh-cut fruit surfaces.

  2. The Transition to Minimal Consciousness through the Evolution of Associative Learning

    PubMed Central

    Bronfman, Zohar Z.; Ginsburg, Simona; Jablonka, Eva

    2016-01-01

    The minimal state of consciousness is sentience. This includes any phenomenal sensory experience – exteroceptive, such as vision and olfaction; interoceptive, such as pain and hunger; or proprioceptive, such as the sense of bodily position and movement. We propose unlimited associative learning (UAL) as the marker of the evolutionary transition to minimal consciousness (or sentience), its phylogenetically earliest sustainable manifestation and the driver of its evolution. We define and describe UAL at the behavioral and functional level and argue that the structural-anatomical implementations of this mode of learning in different taxa entail subjective feelings (sentience). We end with a discussion of the implications of our proposal for the distribution of consciousness in the animal kingdom, suggesting testable predictions, and revisiting the ongoing debate about the function of minimal consciousness in light of our approach. PMID:28066282

  3. Development and evaluation of devices designed to minimize deer-vehicle collisions : phase II.

    DOT National Transportation Integrated Search

    2010-12-01

    We evaluated behavioral responses of captive white-tailed deer to visual and physical barriers designed to minimize deer-vehicle collisions, determined effects of exclusion fencing on movements of free-ranging deer, and further tested the visual capa...

  4. Representations in Dynamical Embodied Agents: Re-Analyzing a Minimally Cognitive Model Agent

    ERIC Educational Resources Information Center

    Mirolli, Marco

    2012-01-01

    Understanding the role of "representations" in cognitive science is a fundamental problem facing the emerging framework of embodied, situated, dynamical cognition. To make progress, I follow the approach proposed by an influential representational skeptic, Randall Beer: building artificial agents capable of minimally cognitive behaviors and…

  5. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks

    PubMed Central

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A.; Zulkarnain, Zuriati A.

    2016-01-01

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol’s semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery. PMID:27338411

  6. The minimal local-asperity hypothesis of early retinal lateral inhibition.

    PubMed

    Balboa, R M; Grzywacz, N M

    2000-07-01

    Recently we found that the theories related to information theory existent in the literature cannot explain the behavior of the extent of the lateral inhibition mediated by retinal horizontal cells as a function of background light intensity. These theories can explain the fall of the extent from intermediate to high intensities, but not its rise from dim to intermediate intensities. We propose an alternate hypothesis that accounts for the extent's bell-shape behavior. This hypothesis proposes that the lateral-inhibition adaptation in the early retina is part of a system to extract several image attributes, such as occlusion borders and contrast. To do so, this system would use prior probabilistic knowledge about the biological processing and relevant statistics in natural images. A key novel statistic used here is the probability of the presence of an occlusion border as a function of local contrast. Using this probabilistic knowledge, the retina would optimize the spatial profile of lateral inhibition to minimize attribute-extraction error. The two significant errors that this minimization process must reduce are due to the quantal noise in photoreceptors and the straddling of occlusion borders by lateral inhibition.

  7. Esophagectomy - minimally invasive

    MedlinePlus

    Minimally invasive esophagectomy; Robotic esophagectomy; Removal of the esophagus - minimally invasive; Achalasia - esophagectomy; Barrett esophagus - esophagectomy; Esophageal cancer - esophagectomy - laparoscopic; Cancer of the ...

  8. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    ERIC Educational Resources Information Center

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  9. Modeling Security Aspects of Network

    NASA Astrophysics Data System (ADS)

    Schoch, Elmar

    With more and more widespread usage of computer systems and networks, dependability becomes a paramount requirement. Dependability typically denotes tolerance or protection against all kinds of failures, errors and faults. Sources of failures can basically be accidental, e.g., in case of hardware errors or software bugs, or intentional due to some kind of malicious behavior. These intentional, malicious actions are subject of security. A more complete overview on the relations between dependability and security can be found in [31]. In parallel to the increased use of technology, misuse also has grown significantly, requiring measures to deal with it.

  10. Rovers minimize human disturbance in research on wild animals.

    PubMed

    Le Maho, Yvon; Whittington, Jason D; Hanuise, Nicolas; Pereira, Louise; Boureau, Matthieu; Brucker, Mathieu; Chatelain, Nicolas; Courtecuisse, Julien; Crenner, Francis; Friess, Benjamin; Grosbellet, Edith; Kernaléguen, Laëtitia; Olivier, Frédérique; Saraux, Claire; Vetter, Nathanaël; Viblanc, Vincent A; Thierry, Bernard; Tremblay, Pascale; Groscolas, René; Le Bohec, Céline

    2014-12-01

    Investigating wild animals while minimizing human disturbance remains an important methodological challenge. When approached by a remote-operated vehicle (rover) which can be equipped to make radio-frequency identifications, wild penguins had significantly lower and shorter stress responses (determined by heart rate and behavior) than when approached by humans. Upon immobilization, the rover-unlike humans-did not disorganize colony structure, and stress rapidly ceased. Thus, rovers can reduce human disturbance of wild animals and the resulting scientific bias.

  11. Correlates of minimal dating.

    PubMed

    Leck, Kira

    2006-10-01

    Researchers have associated minimal dating with numerous factors. The present author tested shyness, introversion, physical attractiveness, performance evaluation, anxiety, social skill, social self-esteem, and loneliness to determine the nature of their relationships with 2 measures of self-reported minimal dating in a sample of 175 college students. For women, shyness, introversion, physical attractiveness, self-rated anxiety, social self-esteem, and loneliness correlated with 1 or both measures of minimal dating. For men, physical attractiveness, observer-rated social skill, social self-esteem, and loneliness correlated with 1 or both measures of minimal dating. The patterns of relationships were not identical for the 2 indicators of minimal dating, indicating the possibility that minimal dating is not a single construct as researchers previously believed. The present author discussed implications and suggestions for future researchers.

  12. Convergence of Weak Kähler-Ricci Flows on Minimal Models of Positive Kodaira Dimension

    NASA Astrophysics Data System (ADS)

    Eyssidieux, Phylippe; Guedj, Vincent; Zeriahi, Ahmed

    2018-02-01

    Studying the behavior of the Kähler-Ricci flow on mildly singular varieties, one is naturally lead to study weak solutions of degenerate parabolic complex Monge-Ampère equations. In this article, the third of a series on this subject, we study the long term behavior of the normalized Kähler-Ricci flow on mildly singular varieties of positive Kodaira dimension, generalizing results of Song and Tian who dealt with smooth minimal models.

  13. Increasingly minimal bias routing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bataineh, Abdulla; Court, Thomas; Roweth, Duncan

    2017-02-21

    A system and algorithm configured to generate diversity at the traffic source so that packets are uniformly distributed over all of the available paths, but to increase the likelihood of taking a minimal path with each hop the packet takes. This is achieved by configuring routing biases so as to prefer non-minimal paths at the injection point, but increasingly prefer minimal paths as the packet proceeds, referred to herein as Increasing Minimal Bias (IMB).

  14. Minimally Invasive Dentistry

    MedlinePlus

    ... geta poker friv Home InfoBites Find an AGD Dentist Your Family's Oral Health About the AGD Dental ... structure. It focuses on prevention, remineralization, and minimal dentist intervention. Using scientific advances, minimally invasive dentistry allows ...

  15. A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory.

    PubMed

    Feng, Renjian; Xu, Xiaofeng; Zhou, Xiang; Wan, Jiangwen

    2011-01-01

    For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that 'hard to acquire and easy to lose'. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation.

  16. Insights for Exercise Adherence from a Minimal Planning Intervention to Increase Physical Activity

    ERIC Educational Resources Information Center

    Chapman, Janine; Campbell, Marianne; Wilson, Carlene

    2015-01-01

    Objective: To test the impact of a minimal, online planning intervention on physical activity in Australian office workers. Method: Employees were randomized to an implementation intention intervention (n = 124) or health information control group (n = 130). Measures of physical activity, past behavior, and motivation were taken at baseline and 6…

  17. Analytical solution of Schrödinger equation in minimal length formalism for trigonometric potential using hypergeometry method

    NASA Astrophysics Data System (ADS)

    Nurhidayati, I.; Suparmi, A.; Cari, C.

    2018-03-01

    The Schrödinger equation has been extended by applying the minimal length formalism for trigonometric potential. The wave function and energy spectra were used to describe the behavior of subatomic particle. The wave function and energy spectra were obtained by using hypergeometry method. The result showed that the energy increased by the increasing both of minimal length parameter and the potential parameter. The energy were calculated numerically using MatLab.

  18. Minimal agent based model for financial markets I. Origin and self-organization of stylized facts

    NASA Astrophysics Data System (ADS)

    Alfi, V.; Cristelli, M.; Pietronero, L.; Zaccaria, A.

    2009-02-01

    We introduce a minimal agent based model for financial markets to understand the nature and self-organization of the stylized facts. The model is minimal in the sense that we try to identify the essential ingredients to reproduce the most important deviations of price time series from a random walk behavior. We focus on four essential ingredients: fundamentalist agents which tend to stabilize the market; chartist agents which induce destabilization; analysis of price behavior for the two strategies; herding behavior which governs the possibility of changing strategy. Bubbles and crashes correspond to situations dominated by chartists, while fundamentalists provide a long time stability (on average). The stylized facts are shown to correspond to an intermittent behavior which occurs only for a finite value of the number of agents N. Therefore they correspond to finite size effects which, however, can occur at different time scales. We propose a new mechanism for the self-organization of this state which is linked to the existence of a threshold for the agents to be active or not active. The feedback between price fluctuations and number of active agents represents a crucial element for this state of self-organized intermittency. The model can be easily generalized to consider more realistic variants.

  19. Simulation of minimally invasive vascular interventions for training purposes.

    PubMed

    Alderliesten, Tanja; Konings, Maurits K; Niessen, Wiro J

    2004-01-01

    To master the skills required to perform minimally invasive vascular interventions, proper training is essential. A computer simulation environment has been developed to provide such training. The simulation is based on an algorithm specifically developed to simulate the motion of a guide wire--the main instrument used during these interventions--in the human vasculature. In this paper, the design and model of the computer simulation environment is described and first results obtained with phantom and patient data are presented. To simulate minimally invasive vascular interventions, a discrete representation of a guide wire is used which allows modeling of guide wires with different physical properties. An algorithm for simulating the propagation of a guide wire within a vascular system, on the basis of the principle of minimization of energy, has been developed. Both longitudinal translation and rotation are incorporated as possibilities for manipulating the guide wire. The simulation is based on quasi-static mechanics. Two types of energy are introduced: internal energy related to the bending of the guide wire, and external energy resulting from the elastic deformation of the vessel wall. A series of experiments were performed on phantom and patient data. Simulation results are qualitatively compared with 3D rotational angiography data. The results indicate plausible behavior of the simulation.

  20. Does Minimally Invasive Spine Surgery Minimize Surgical Site Infections?

    PubMed

    Kulkarni, Arvind Gopalrao; Patel, Ravish Shammi; Dutta, Shumayou

    2016-12-01

    Retrospective review of prospectively collected data. To evaluate the incidence of surgical site infections (SSIs) in minimally invasive spine surgery (MISS) in a cohort of patients and compare with available historical data on SSI in open spinal surgery cohorts, and to evaluate additional direct costs incurred due to SSI. SSI can lead to prolonged antibiotic therapy, extended hospitalization, repeated operations, and implant removal. Small incisions and minimal dissection intrinsic to MISS may minimize the risk of postoperative infections. However, there is a dearth of literature on infections after MISS and their additional direct financial implications. All patients from January 2007 to January 2015 undergoing posterior spinal surgery with tubular retractor system and microscope in our institution were included. The procedures performed included tubular discectomies, tubular decompressions for spinal stenosis and minimal invasive transforaminal lumbar interbody fusion (TLIF). The incidence of postoperative SSI was calculated and compared to the range of cited SSI rates from published studies. Direct costs were calculated from medical billing for index cases and for patients with SSI. A total of 1,043 patients underwent 763 noninstrumented surgeries (discectomies, decompressions) and 280 instrumented (TLIF) procedures. The mean age was 52.2 years with male:female ratio of 1.08:1. Three infections were encountered with fusion surgeries (mean detection time, 7 days). All three required wound wash and debridement with one patient requiring unilateral implant removal. Additional direct cost due to infection was $2,678 per 100 MISS-TLIF. SSI increased hospital expenditure per patient 1.5-fold after instrumented MISS. Overall infection rate after MISS was 0.29%, with SSI rate of 0% in non-instrumented MISS and 1.07% with instrumented MISS. MISS can markedly reduce the SSI rate and can be an effective tool to minimize hospital costs.

  1. Minimal basilar membrane motion in low-frequency hearing

    PubMed Central

    Warren, Rebecca L.; Ramamoorthy, Sripriya; Ciganović, Nikola; Zhang, Yuan; Wilson, Teresa M.; Petrie, Tracy; Wang, Ruikang K.; Jacques, Steven L.; Reichenbach, Tobias; Nuttall, Alfred L.; Fridberger, Anders

    2016-01-01

    Low-frequency hearing is critically important for speech and music perception, but no mechanical measurements have previously been available from inner ears with intact low-frequency parts. These regions of the cochlea may function in ways different from the extensively studied high-frequency regions, where the sensory outer hair cells produce force that greatly increases the sound-evoked vibrations of the basilar membrane. We used laser interferometry in vitro and optical coherence tomography in vivo to study the low-frequency part of the guinea pig cochlea, and found that sound stimulation caused motion of a minimal portion of the basilar membrane. Outside the region of peak movement, an exponential decline in motion amplitude occurred across the basilar membrane. The moving region had different dependence on stimulus frequency than the vibrations measured near the mechanosensitive stereocilia. This behavior differs substantially from the behavior found in the extensively studied high-frequency regions of the cochlea. PMID:27407145

  2. How Minimal Grade Goals and Self-Control Capacity Interact in Predicting Test Grades

    ERIC Educational Resources Information Center

    Bertrams, Alex

    2012-01-01

    The present research examined the prediction of school students' grades in an upcoming math test via their minimal grade goals (i.e., the minimum grade in an upcoming test one would be satisfied with). Due to its significance for initiating and maintaining goal-directed behavior, self-control capacity was expected to moderate the relation between…

  3. Minimally Verbal School-Aged Children with Autism: Communication, Academic Engagement and Classroom Quality

    ERIC Educational Resources Information Center

    Krueger, Kathryne Kelley

    2013-01-01

    Minimally verbal school aged children with autism (MVSACwA) receive the bulk of their behavioral and academic support in schools yet we know little about the environments to which they are exposed. This population of children has often been excluded from studies and thus, underrepresented in current data on autism. As increasing numbers of…

  4. Hexavalent Chromium Minimization Strategy

    DTIC Science & Technology

    2011-05-01

    Logistics 4 Initiative - DoD Hexavalent Chromium Minimization Non- Chrome Primer IIEXAVAJ ENT CHRO:M I~UMI CHROMIUM (VII Oil CrfVli.J CANCEfl HAnRD CD...Management Office of the Secretary of Defense Hexavalent Chromium Minimization Strategy Report Documentation Page Form ApprovedOMB No. 0704-0188...00-2011 4. TITLE AND SUBTITLE Hexavalent Chromium Minimization Strategy 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  5. Minimal traumatic brain injury causes persistent changes in DNA methylation at BDNF gene promoters in rat amygdala: A possible role in anxiety-like behaviors.

    PubMed

    Sagarkar, Sneha; Bhamburkar, Tanmayi; Shelkar, Gajanan; Choudhary, Amit; Kokare, Dadasaheb M; Sakharkar, Amul J

    2017-10-01

    Minimal traumatic brain injury (MTBI) often transforms into chronic neuropsychiatric conditions including anxiety, the underlying mechanisms of which are largely unknown. In the present study, we employed the closed-head injury paradigm to induce MTBI in rats and examined whether DNA methylation can explain long-term changes in the expression of the brain-derived neurotrophic factor (BDNF) in the amygdala as well as trauma-induced anxiety-like behaviors. The MTBI caused anxiety-like behaviors and altered the expression of DNA methyltransferase (DNMT) isoforms (DNMT1, DNMT3a, and DNMT3b) and factors involved in DNA demethylation such as the growth arrest and DNA damage 45 (GADD45a and GADD45b). After 30days of MTBI, the over-expression of DNMT3a and DNMT3b corresponded to heightened DNMT activity, whereas the mRNA levels of GADD45a and GADD45b were declined. The methylated cytosine levels at the BDNF promoters (Ip, IVp and IXp) were increased in the amygdala of the trauma-induced animals; these coincided negatively with the mRNA levels of exon IV and IXa, but not of exon I. Interestingly, treatment with 5-azacytidine, a pan DNMT inhibitor, normalized the MTBI-induced DNMT activity and DNA hypermethylation at exon IVp and IXp. Furthermore, 5-azacytidine also corrected the deficits in the expression of exons IV and IXa and reduced the anxiety-like behaviors. These results suggest that the DNMT-mediated DNA methylation at the BDNF IVp and IXp might be involved in the regulation of BDNF gene expression in the amygdala. Further, it could also be related to MTBI-induced anxiety-like behaviors via the regulation of synaptic plasticity. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Wang, Jinlong; Feng, Shuo; Wu, Qihui; Zheng, Xueqiang; Xu, Yuhua; Ding, Guoru

    2014-12-01

    Cognitive radio (CR) is a promising technology that brings about remarkable improvement in spectrum utilization. To tackle the hidden terminal problem, cooperative spectrum sensing (CSS) which benefits from the spatial diversity has been studied extensively. Since CSS is vulnerable to the attacks initiated by malicious secondary users (SUs), several secure CSS schemes based on Dempster-Shafer theory have been proposed. However, the existing works only utilize the current difference of SUs, such as the difference in SNR or similarity degree, to evaluate the trustworthiness of each SU. As the current difference is only one-sided and sometimes inaccurate, the statistical information contained in each SU's historical behavior should not be overlooked. In this article, we propose a robust CSS scheme based on Dempster-Shafer theory and trustworthiness degree calculation. It is carried out in four successive steps, which are basic probability assignment (BPA), trustworthiness degree calculation, selection and adjustment of BPA, and combination by Dempster-Shafer rule, respectively. Our proposed scheme evaluates the trustworthiness degree of SUs from both current difference aspect and historical behavior aspect and exploits Dempster-Shafer theory's potential to establish a `soft update' approach for the reputation value maintenance. It can not only differentiate malicious SUs from honest ones based on their historical behaviors but also reserve the current difference for each SU to achieve a better real-time performance. Abundant simulation results have validated that the proposed scheme outperforms the existing ones under the impact of different attack patterns and different number of malicious SUs.

  7. Developmental pathways from maltreatment to risk behavior: Sexual behavior as a catalyst.

    PubMed

    Negriff, Sonya

    2018-05-01

    Although delinquency, substance use, and sexual activity are established to be highly intercorrelated, the extant research provides minimal evidence in support of one particular sequence of risk behavior or on the cascade effects from maltreatment. The present study tested a longitudinal model incorporating maltreatment, deviant peers, sexual behavior, delinquency, and substance use to elucidate the sequential pathway(s) from maltreatment to each specific risk behavior throughout adolescence. Data came from a longitudinal study on the effects of maltreatment on adolescent development (N = 454) with four study assessments from early (Time 1 M age = 10.98) to late adolescence (Time 4 M age = 18.22). Results from the cross-lagged model showed a sequence from maltreatment to sexual behavior (Time 1), to delinquency (Time 2), to sexual behavior (Time 3), to substance use and delinquency (Time 4). These findings support sexual behavior as the initial risk behavior that is the catalyst for engagement in more advanced risk behaviors across adolescence.

  8. Periodic minimal surfaces

    NASA Astrophysics Data System (ADS)

    Mackay, Alan L.

    1985-04-01

    A minimal surface is one for which, like a soap film with the same pressure on each side, the mean curvature is zero and, thus, is one where the two principal curvatures are equal and opposite at every point. For every closed circuit in the surface, the area is a minimum. Schwarz1 and Neovius2 showed that elements of such surfaces could be put together to give surfaces periodic in three dimensions. These periodic minimal surfaces are geometrical invariants, as are the regular polyhedra, but the former are curved. Minimal surfaces are appropriate for the description of various structures where internal surfaces are prominent and seek to adopt a minimum area or a zero mean curvature subject to their topology; thus they merit more complete numerical characterization. There seem to be at least 18 such surfaces3, with various symmetries and topologies, related to the crystallographic space groups. Recently, glyceryl mono-oleate (GMO) was shown by Longley and McIntosh4 to take the shape of the F-surface. The structure postulated is shown here to be in good agreement with an analysis of the fundamental geometry of periodic minimal surfaces.

  9. An Original Behavior Modification Program for Weight Reduction: Minimal Intervention and Permanent Habit Change.

    ERIC Educational Resources Information Center

    Lublin, Irwin; Kirkish, Patricia

    This description of a weight reduction program, based on generalizations derived from eight years of work with overweight persons, discusses the clients' rationalization of overeating behaviors. In this behavior modification program, the client is required to permanently give up one high calorie food and to write down all foods eaten before actual…

  10. Optimal design method to minimize users' thinking mapping load in human-machine interactions.

    PubMed

    Huang, Yanqun; Li, Xu; Zhang, Jie

    2015-01-01

    The discrepancy between human cognition and machine requirements/behaviors usually results in serious mental thinking mapping loads or even disasters in product operating. It is important to help people avoid human-machine interaction confusions and difficulties in today's mental work mastered society. Improving the usability of a product and minimizing user's thinking mapping and interpreting load in human-machine interactions. An optimal human-machine interface design method is introduced, which is based on the purpose of minimizing the mental load in thinking mapping process between users' intentions and affordance of product interface states. By analyzing the users' thinking mapping problem, an operating action model is constructed. According to human natural instincts and acquired knowledge, an expected ideal design with minimized thinking loads is uniquely determined at first. Then, creative alternatives, in terms of the way human obtains operational information, are provided as digital interface states datasets. In the last, using the cluster analysis method, an optimum solution is picked out from alternatives, by calculating the distances between two datasets. Considering multiple factors to minimize users' thinking mapping loads, a solution nearest to the ideal value is found in the human-car interaction design case. The clustering results show its effectiveness in finding an optimum solution to the mental load minimizing problems in human-machine interaction design.

  11. Web malware spread modelling and optimal control strategies

    NASA Astrophysics Data System (ADS)

    Liu, Wanping; Zhong, Shouming

    2017-02-01

    The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice.

  12. Web malware spread modelling and optimal control strategies.

    PubMed

    Liu, Wanping; Zhong, Shouming

    2017-02-10

    The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice.

  13. Web malware spread modelling and optimal control strategies

    PubMed Central

    Liu, Wanping; Zhong, Shouming

    2017-01-01

    The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice. PMID:28186203

  14. The Dominant Folding Route Minimizes Backbone Distortion in SH3

    PubMed Central

    Lammert, Heiko; Noel, Jeffrey K.; Onuchic, José N.

    2012-01-01

    Energetic frustration in protein folding is minimized by evolution to create a smooth and robust energy landscape. As a result the geometry of the native structure provides key constraints that shape protein folding mechanisms. Chain connectivity in particular has been identified as an essential component for realistic behavior of protein folding models. We study the quantitative balance of energetic and geometrical influences on the folding of SH3 in a structure-based model with minimal energetic frustration. A decomposition of the two-dimensional free energy landscape for the folding reaction into relevant energy and entropy contributions reveals that the entropy of the chain is not responsible for the folding mechanism. Instead the preferred folding route through the transition state arises from a cooperative energetic effect. Off-pathway structures are penalized by excess distortion in local backbone configurations and contact pair distances. This energy cost is a new ingredient in the malleable balance of interactions that controls the choice of routes during protein folding. PMID:23166485

  15. Live minimal path for interactive segmentation of medical images

    NASA Astrophysics Data System (ADS)

    Chartrand, Gabriel; Tang, An; Chav, Ramnada; Cresson, Thierry; Chantrel, Steeve; De Guise, Jacques A.

    2015-03-01

    Medical image segmentation is nowadays required for medical device development and in a growing number of clinical and research applications. Since dedicated automatic segmentation methods are not always available, generic and efficient interactive tools can alleviate the burden of manual segmentation. In this paper we propose an interactive segmentation tool based on image warping and minimal path segmentation that is efficient for a wide variety of segmentation tasks. While the user roughly delineates the desired organs boundary, a narrow band along the cursors path is straightened, providing an ideal subspace for feature aligned filtering and minimal path algorithm. Once the segmentation is performed on the narrow band, the path is warped back onto the original image, precisely delineating the desired structure. This tool was found to have a highly intuitive dynamic behavior. It is especially efficient against misleading edges and required only coarse interaction from the user to achieve good precision. The proposed segmentation method was tested for 10 difficult liver segmentations on CT and MRI images, and the resulting 2D overlap Dice coefficient was 99% on average..

  16. Minimal Marking: A Success Story

    ERIC Educational Resources Information Center

    McNeilly, Anne

    2014-01-01

    The minimal-marking project conducted in Ryerson's School of Journalism throughout 2012 and early 2013 resulted in significantly higher grammar scores in two first-year classes of minimally marked university students when compared to two traditionally marked classes. The "minimal-marking" concept (Haswell, 1983), which requires…

  17. The Relationship between Personality and Computer Deviance

    ERIC Educational Resources Information Center

    Burns, Cardra E.

    2013-01-01

    Computer deviance by employees, defined as malicious and nonmalicious computer use behaviors, has contributed to billions of dollars of monetary and productivity losses for public and private sector organizations. The purpose of this correlational study was to examine the relationship between personality characteristics and employees' computer…

  18. Minimal but non-minimal inflation and electroweak symmetry breaking

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marzola, Luca; Institute of Physics, University of Tartu,Ravila 14c, 50411 Tartu; Racioppi, Antonio

    2016-10-07

    We consider the most minimal scale invariant extension of the standard model that allows for successful radiative electroweak symmetry breaking and inflation. The framework involves an extra scalar singlet, that plays the rôle of the inflaton, and is compatibile with current experimental bounds owing to the non-minimal coupling of the latter to gravity. This inflationary scenario predicts a very low tensor-to-scalar ratio r≈10{sup −3}, typical of Higgs-inflation models, but in contrast yields a scalar spectral index n{sub s}≃0.97 which departs from the Starobinsky limit. We briefly discuss the collider phenomenology of the framework.

  19. Ice polyamorphism in the minimal Mercedes-Benz model of water.

    PubMed

    Cartwright, Julyan H E; Piro, Oreste; Sánchez, Pedro A; Sintes, Tomás

    2012-12-28

    We investigate ice polyamorphism in the context of the two-dimensional Mercedes-Benz model of water. We find a first-order phase transition between a crystalline phase and a high-density amorphous phase. Furthermore, we find a reversible transformation between two amorphous structures of high and low density; however, we find this to be a continuous and not an abrupt transition, as the low-density amorphous phase does not show structural stability. We discuss the origin of this behavior and its implications with regard to the minimal generic modeling of polyamorphism.

  20. Ice polyamorphism in the minimal Mercedes-Benz model of water

    NASA Astrophysics Data System (ADS)

    Cartwright, Julyan H. E.; Piro, Oreste; Sánchez, Pedro A.; Sintes, Tomás

    2012-12-01

    We investigate ice polyamorphism in the context of the two-dimensional Mercedes-Benz model of water. We find a first-order phase transition between a crystalline phase and a high-density amorphous phase. Furthermore, we find a reversible transformation between two amorphous structures of high and low density; however, we find this to be a continuous and not an abrupt transition, as the low-density amorphous phase does not show structural stability. We discuss the origin of this behavior and its implications with regard to the minimal generic modeling of polyamorphism.

  1. Obesity: can behavioral economics help?

    PubMed

    Just, David R; Payne, Collin R

    2009-12-01

    Consumers regularly and predictably behave in ways that contradict standard assumptions of economic analysis such that they make decisions that prevent them from reaching rationally intended goals. These contradictions play a significant role with respect to consumers' food decisions and the effect these decisions have on their health. Food decisions that are rationally derived include those that trade short-term gains of sensory pleasure (hedonic) for longer term gains of health and wellness (utilitarian). However, extra-rational food decisions are much more common. They can occur because of the contexts in which they are made--such as being distracted or pressed for time. In these contexts, heuristics (or rules of thumb) are used. Because food decisions are made with little cognitive involvement, food policies designed to appeal to highly cognitive thought (e.g., fat taxes, detailed information labels) are likely to have little impact. Furthermore, food marketing environments influence not only what foods consumers buy but also how much. As a general principle, when individuals do not behave in their own interest, markets will feed perverse and sub-optimal behaviors. Given the limited ability of individuals to retain and use accurate health information coupled with varying levels of self control, profit motivations of marketers can become predatory--though not necessarily malicious. Alternative policy options that do not restrict choice are outlined, which enable consumers to make better decisions. These options allow for profit motivations of marketers to align with the long-term well being of the consumer.

  2. CYBER SUPPLY CHAIN SECURITY: CAN THE BACKDOOR BE CLOSED WITH TRUSTED DESIGN, MANUFACTURING AND SUPPLY

    DTIC Science & Technology

    2016-08-01

    components from making it into DoD systems. The benefits of trusted design and manufacturing would likely cost more, but would confidently minimize DoD...compromise products too high for an attacker. If the costs and effort needed are greater than the benefit to conduct an attack, malicious actors are...simplicity may be a better approach. While there are potential benefits to built-in hardware and software security, there may be just as many

  3. Effects of a multifaceted minimal-lift environment for nursing staff: pilot results.

    PubMed

    Zadvinskis, Inga M; Salsbury, Susan L

    2010-02-01

    Nursing staff are at risk for musculoskeletal injuries because of the physical nature of patient handling. The purpose of this study is to examine the effectiveness of a multifaceted minimal-lift environment on reported equipment use, musculoskeletal injury rates, and workers' compensation costs for patient-handling injuries. The pilot study consists of a mixed measures design, with both descriptive and quasi-experimental design elements. The intervention consists of engineering (minimal-lift equipment), administrative (nursing policy), and behavioral (peer coach program) controls. The comparison nursing unit has received engineering controls only. The convenience sample includes nursing staff employed on two medical-surgical nursing units, who provide direct patient care at least 50% of the time. Nursing staff employed in a multifaceted lift environment report greater lift equipment use and experience less injury, with reduced worker's compensation costs.

  4. A System of ODEs for a Perturbation of a Minimal Mass Soliton

    NASA Astrophysics Data System (ADS)

    Marzuola, Jeremy L.; Raynor, Sarah; Simpson, Gideon

    2010-08-01

    We study soliton solutions to the nonlinear Schrödinger equation (NLS) with a saturated nonlinearity. NLS with such a nonlinearity is known to possess a minimal mass soliton. We consider a small perturbation of a minimal mass soliton and identify a system of ODEs extending the work of Comech and Pelinovsky (Commun. Pure Appl. Math. 56:1565-1607, 2003), which models the behavior of the perturbation for short times. We then provide numerical evidence that under this system of ODEs there are two possible dynamical outcomes, in accord with the conclusions of Pelinovsky et al. (Phys. Rev. E 53(2):1940-1953, 1996). Generically, initial data which supports a soliton structure appears to oscillate, with oscillations centered on a stable soliton. For initial data which is expected to disperse, the finite dimensional dynamics initially follow the unstable portion of the soliton curve.

  5. Security-Enhanced Push Button Configuration for Home Smart Control.

    PubMed

    Han, Junghee; Park, Taejoon

    2017-06-08

    With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.

  6. Security-Enhanced Push Button Configuration for Home Smart Control †

    PubMed Central

    Han, Junghee; Park, Taejoon

    2017-01-01

    With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment. PMID:28594370

  7. Encryption and the loss of patient data.

    PubMed

    Miller, Amalia R; Tucker, Catherine E

    2011-01-01

    Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment.

  8. Cognitive-Behavioral and Pharmacologic Interventions for Children's Distress during Painful Medical Procedures.

    ERIC Educational Resources Information Center

    Jay, Susan M.; And Others

    1987-01-01

    Evaluated efficacy of cognitive-behavioral intervention package and low-risk pharmacologic intervention (oral Valium) as compared with minimal treatment-attention control condition, in reducing children leukemia patients' distress during bone marrow aspirations. The cognitive-behavioral therapy reduced behavioral distress, pain ratings and pulse…

  9. Radial Symmetry of p-Harmonic Minimizers

    NASA Astrophysics Data System (ADS)

    Koski, Aleksis; Onninen, Jani

    2018-03-01

    "It is still not known if the radial cavitating minimizers obtained by uc(Ball) (Philos Trans R Soc Lond A 306:557-611, 1982) (and subsequently by many others) are global minimizers of any physically reasonable nonlinearly elastic energy". This quotation is from uc(Sivaloganathan) and uc(Spector) (Ann Inst Henri Poincaré Anal Non Linéaire 25(1):201-213, 2008) and seems to be still accurate. The model case of the p-harmonic energy is considered here. We prove that the planar radial minimizers are indeed the global minimizers provided we prescribe the admissible deformations on the boundary. In the traction free setting, however, even the identity map need not be a global minimizer.

  10. NAVAIR Hexavalent Chromium Minimization Status

    DTIC Science & Technology

    2010-11-01

    NAVAIR  Hexavalent  Chromium Minimization Status  SERDP/ESTCP Symposium 2010 Cr6+ Session Bill C Nickerson AIR 4.3.4 Report Documentation Page Form...COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE NAVAIR Hexavalent Chromium Minimization Status 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ANSI Std Z39-18 Minimizing Hexavalent Chromium Use in DoD Operations Technical Session No. 2B C-39 NAVAIR NON-CHROMATE MATERIALS STATUS MR

  11. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.

    PubMed

    Lin, W Sabrina; Zhao, H Vicky; Liu, K J Ray

    2010-07-01

    Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on video sharing systems. Users watching live streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus, they might want to cooperate with each other to obtain better video quality. These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others. This paper focuses on providing incentives for user cooperation. We propose a game-theoretic framework to model user behavior and to analyze the optimal strategies for user cooperation simulation in wireless live streaming. We first analyze the Pareto optimality and the time-sensitive bargaining equilibrium of the two-person game. We then extend the solution to the multiuser scenario. We also consider potential selfish users' cheating behavior and malicious users' attacking behavior and analyze the performance of the proposed strategies with the existence of cheating users and malicious attackers. Both our analytical and simulation results show that the proposed strategies can effectively stimulate user cooperation, achieve cheat free and attack resistance, and help provide reliable services for wireless live streaming applications.

  12. Non-minimally coupled f(R) cosmology

    NASA Astrophysics Data System (ADS)

    Thakur, Shruti; Sen, Anjan A.; Seshadri, T. R.

    2011-02-01

    We investigate the consequences of non-minimal gravitational coupling to matter and study how it differs from the case of minimal coupling by choosing certain simple forms for the nature of coupling. The values of the parameters are specified at z=0 (present epoch) and the equations are evolved backwards to calculate the evolution of cosmological parameters. We find that the Hubble parameter evolves more slowly in non-minimal coupling case as compared to the minimal coupling case. In both the cases, the universe accelerates around present time, and enters the decelerating regime in the past. Using the latest Union2 dataset for supernova Type Ia observations as well as the data for baryon acoustic oscillation (BAO) from SDSS observations, we constraint the parameters of Linder exponential model in the two different approaches. We find that there is an upper bound on model parameter in minimal coupling. But for non-minimal coupling case, there is range of allowed values for the model parameter.

  13. Building and Vegetation Rasterization for the Three-dimensional Wind Field (3DWF) Model

    DTIC Science & Technology

    2010-12-01

    Maps API. By design, JavaScript limits access to local resources. This is done to protect against the execution of malicious code. However, ActiveX ...to only use these types of objects ( ActiveX or XPCOM) from a trusted source in order to minimize the exposure of a computer system to malware...Microsoft ActiveX . There is also a need to restructure and rethink the implementation of the JavaScript code. It would be desirable to save the digitized

  14. Essays on Information Assurance: Examination of Detrimental Consequences of Information Security, Privacy, and Extreme Event Concerns on Individual and Organizational Use of Systems

    ERIC Educational Resources Information Center

    Park, Insu

    2010-01-01

    The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…

  15. Daunorubicin and gambogic acid coloaded cysteamine-CdTe quantum dots minimizing the multidrug resistance of lymphoma in vitro and in vivo

    PubMed Central

    Zhou, Yi; Wang, Ruju; Chen, Bing; Sun, Dan; Hu, Yong; Xu, Peipei

    2016-01-01

    To minimize the side effects and the multidrug resistance (MDR) arising from daunorubicin (DNR) treatment of malignant lymphoma, a chemotherapy formulation of cysteamine-modified cadmium tellurium (Cys-CdTe) quantum dots coloaded with DNR and gambogic acid (GA) nanoparticles (DNR-GA-Cys-CdTe NPs) was developed. The physical property, drug-loading efficiency and drug release behavior of these DNR-GA-Cys-CdTe NPs were evaluated, and their cytotoxicity was explored by 3-[4,5-dimethylthiazol-2-y1]-2,5-diphenyltetrazolium bromide assay. These DNR-GA-Cys-CdTe NPs possessed a pH-responsive behavior, and displayed a dose-dependent antiproliferative activity on multidrug-resistant lymphoma Raji/DNR cells. The accumulation of DNR inside the cells, revealed by flow cytometry assay, and the down-regulated expression of P-glycoprotein inside the Raji/DNR cells measured by Western blotting assay indicated that these DNR-GA-Cys-CdTe NPs could minimize the MDR of Raji/DNR cells. This multidrug delivery system would be a promising strategy for minimizing MDR against the lymphoma. PMID:27799767

  16. A behavioral strategy to minimize air pollution exposure in pregnant women: a randomized controlled trial.

    PubMed

    Araban, Marzieh; Tavafian, Sedigheh Sadat; Zarandi, Saeed Motesaddi; Hidarnia, Ali Reza; Burri, Andrea; Montazeri, Ali

    2017-04-04

    Pregnant women and their fetus belong to a sensitive group in response to air pollution hazards. The aim of this study was to evaluate the effectiveness of a theory-based educational program to change pollution exposure behavior in pregnant women. In this randomized controlled trial, pregnant women attending a prenatal clinic in Tehran, Iran were selected and randomized into the experimental and control groups. The inclusion criteria were age between 18 and 35 years, having a history of pregnancies without adverse outcomes and not suffering from chronic diseases. Data collected at baseline and 2-month follow-up. At baseline face-to-face interviews were conducted using a valid and reliable questionnaire including items on demographic characteristics, stages of change, self-efficacy, decisional balance and practice regarding air pollution preventive behaviors. The intervention composed of three parts: motivational interviewing, a booklet and daily small message service (SMS). The control group received no intervention except receiving usual care. Follow-up data were collected after the intervention. Data were analyzed performing t-test, Mann-Whitney U test, and chi-squared. In all the data for 104 pregnant women (53 in the intervention and 51 in the control group) were analyzed. The mean age of participants was 27.2 (SD = 4.11) years and it was 22.89 (SD = 8.75) weeks for gestational age. At baseline there were no significant statistical differences between intervention and control groups on the study measures while we found significant group differences in terms of stages of change, self-efficacy, perceived benefits and practice regarding air pollution preventive behaviors at follow-up assessment (P < 0.05). The findings indicated that the TTM-based intervention was effective in increasing air pollution preventive behaviors among pregnant women. This study provided a framework to modify some psychosocial determinants of air pollution preventive behavior

  17. Taxonomic minimalism.

    PubMed

    Beattle, A J; Oliver, I

    1994-12-01

    Biological surveys are in increasing demand while taxonomic resources continue to decline. How much formal taxonomy is required to get the job done? The answer depends on the kind of job but it is possible that taxonomic minimalism, especially (1) the use of higher taxonomic ranks, (2) the use of morphospecies rather than species (as identified by Latin binomials), and (3) the involvement of taxonomic specialists only for training and verification, may offer advantages for biodiversity assessment, environmental monitoring and ecological research. As such, formal taxonomy remains central to the process of biological inventory and survey but resources may be allocated more efficiently. For example, if formal Identification is not required, resources may be concentrated on replication and increasing sample sizes. Taxonomic minimalism may also facilitate the inclusion in these activities of important but neglected groups, especially among the invertebrates, and perhaps even microorganisms. Copyright © 1994. Published by Elsevier Ltd.

  18. Minimally invasive periodontal therapy

    PubMed Central

    Dannan, Aous

    2011-01-01

    Minimally invasive dentistry is a concept that preserves dentition and supporting structures. However, minimally invasive procedures in periodontal treatment are supposed to be limited within periodontal surgery, the aim of which is to represent alternative approaches developed to allow less extensive manipulation of surrounding tissues than conventional procedures, while accomplishing the same objectives. In this review, the concept of minimally invasive periodontal surgery (MIPS) is firstly explained. An electronic search for all studies regarding efficacy and effectiveness of MIPS between 2001 and 2009 was conducted. For this purpose, suitable key words from Medical Subject Headings on PubMed were used to extract the required studies. All studies are demonstrated and important results are concluded. Preliminary data from case cohorts and from many studies reveal that the microsurgical access flap, in terms of MIPS, has a high potential to seal the healing wound from the contaminated oral environment by achieving and maintaining primary closure. Soft tissues are mostly preserved and minimal gingival recession is observed, an important feature to meet the demands of the patient and the clinician in the esthetic zone. However, although the potential efficacy of MIPS in the treatment of deep intrabony defects has been proved, larger studies are required to confirm and extend the reported positive preliminary outcomes. PMID:22368356

  19. New minimally access hydrocelectomy.

    PubMed

    Saber, Aly

    2011-02-01

    To ascertain the acceptability of minimally access hydrocelectomy through a 2-cm incision and the outcome in terms of morbidity reduction and recurrence rate. Although controversy exists regarding the treatment of hydrocele, hydrocelectomy remains the treatment of choice for hydroceles. However, the standard surgical procedures for hydrocele can cause postoperative discomfort and complications. A total of 42 adult patients, aged 18-56 years, underwent hydrocelectomy as an outpatient procedure using a 2-cm scrotal skin incision and excision of only a small disk of the parietal tunica vaginalis. The operative time was 12-18 minutes (mean 15). The outcome measures included patient satisfaction and postoperative complications. This procedure requires minor dissection and minimal manipulation during treatment. It also resulted in no recurrence and minimal complications and required a short operative time. Copyright © 2011 Elsevier Inc. All rights reserved.

  20. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    PubMed Central

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2014-01-01

    Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior. PMID:24451471

  1. The minimal axion minimal linear σ model

    NASA Astrophysics Data System (ADS)

    Merlo, L.; Pobbe, F.; Rigolin, S.

    2018-05-01

    The minimal SO(5) / SO(4) linear σ model is extended including an additional complex scalar field, singlet under the global SO(5) and the Standard Model gauge symmetries. The presence of this scalar field creates the conditions to generate an axion à la KSVZ, providing a solution to the strong CP problem, or an axion-like-particle. Different choices for the PQ charges are possible and lead to physically distinct Lagrangians. The internal consistency of each model necessarily requires the study of the scalar potential describing the SO(5)→ SO(4), electroweak and PQ symmetry breaking. A single minimal scenario is identified and the associated scalar potential is minimised including counterterms needed to ensure one-loop renormalizability. In the allowed parameter space, phenomenological features of the scalar degrees of freedom, of the exotic fermions and of the axion are illustrated. Two distinct possibilities for the axion arise: either it is a QCD axion with an associated scale larger than ˜ 105 TeV and therefore falling in the category of the invisible axions; or it is a more massive axion-like-particle, such as a 1 GeV axion with an associated scale of ˜ 200 TeV, that may show up in collider searches.

  2. Behavioral toxicity of selected radioprotectors

    NASA Astrophysics Data System (ADS)

    Landauer, M. R.; Davis, H. D.; Kumar, K. S.; Weiss, J. F.

    1992-10-01

    Effective radioprotection with minimal behavioral disruption is essential for the selection of protective agents to be used in manned spaceflight. This overview summarizes the studies on the behavioral toxicity of selected radioprotectors classified as phosphorothioates (WR-2721, WR-3689), bioactive lipids (16, 16 dimethylprostaglandin E2(DiPGE2), platelet activating factor (PAF), leukotriene C4), and immunomodulators (glucan, synthetic trehalose dicorynomycolate, and interleukin-1). Behavioral toxicity was examined in laboratory mice using a locomotor activity test. For all compounds tested, there was a dose-dependent decrease in locomotor behavior that paralleled the dose-dependent increase in radioprotection. While combinations of radioprotective compounds (DiPGE2 plus WR-2721) increased radioprotection, they also decreased locomotor activity. The central nervous system stimulant, caffeine, was able to mitigate the locomotor decrement produced by WR-3689 or PAF.

  3. Local empathy provides global minimization of congestion in communication networks

    NASA Astrophysics Data System (ADS)

    Meloni, Sandro; Gómez-Gardeñes, Jesús

    2010-11-01

    We present a mechanism to avoid congestion in complex networks based on a local knowledge of traffic conditions and the ability of routers to self-coordinate their dynamical behavior. In particular, routers make use of local information about traffic conditions to either reject or accept information packets from their neighbors. We show that when nodes are only aware of their own congestion state they self-organize into a hierarchical configuration that delays remarkably the onset of congestion although leading to a sharp first-order-like congestion transition. We also consider the case when nodes are aware of the congestion state of their neighbors. In this case, we show that empathy between nodes is strongly beneficial to the overall performance of the system and it is possible to achieve larger values for the critical load together with a smooth, second-order-like, transition. Finally, we show how local empathy minimize the impact of congestion as much as global minimization. Therefore, here we present an outstanding example of how local dynamical rules can optimize the system’s functioning up to the levels reached using global knowledge.

  4. Minimal Reduplication

    ERIC Educational Resources Information Center

    Kirchner, Jesse Saba

    2010-01-01

    This dissertation introduces Minimal Reduplication, a new theory and framework within generative grammar for analyzing reduplication in human language. I argue that reduplication is an emergent property in multiple components of the grammar. In particular, reduplication occurs independently in the phonology and syntax components, and in both cases…

  5. Minimally invasive lumbar foraminotomy.

    PubMed

    Deutsch, Harel

    2013-07-01

    Lumbar radiculopathy is a common problem. Nerve root compression can occur at different places along a nerve root's course including in the foramina. Minimal invasive approaches allow easier exposure of the lateral foramina and decompression of the nerve root in the foramina. This video demonstrates a minimally invasive approach to decompress the lumbar nerve root in the foramina with a lateral to medial decompression. The video can be found here: http://youtu.be/jqa61HSpzIA.

  6. Sonic-boom minimization.

    NASA Technical Reports Server (NTRS)

    Seebass, R.; George, A. R.

    1972-01-01

    There have been many attempts to reduce or eliminate the sonic boom. Such attempts fall into two categories: (1) aerodynamic minimization and (2) exotic configurations. In the first category changes in the entropy and the Bernoulli constant are neglected and equivalent body shapes required to minimize the overpressure, the shock pressure rise and the impulse are deduced. These results include the beneficial effects of atmospheric stratification. In the second category, the effective length of the aircraft is increased or its base area decreased by modifying the Bernoulli constant a significant fraction of the flow past the aircraft. A figure of merit is introduced which makes it possible to judge the effectiveness of the latter schemes.

  7. Vital area identification for U.S. Nuclear Regulatory Commission nuclear power reactor licensees and new reactor applicants.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitehead, Donnie Wayne; Varnado, G. Bruce

    2008-09-01

    U.S. Nuclear Regulatory Commission nuclear power plant licensees and new reactor applicants are required to provide protection of their plants against radiological sabotage, including the placement of vital equipment in vital areas. This document describes a systematic process for the identification of the minimum set of areas that must be designated as vital areas in order to ensure that all radiological sabotage scenarios are prevented. Vital area identification involves the use of logic models to systematically identify all of the malicious acts or combinations of malicious acts that could lead to radiological sabotage. The models available in the plant probabilisticmore » risk assessment and other safety analyses provide a great deal of the information and basic model structure needed for the sabotage logic model. Once the sabotage logic model is developed, the events (or malicious acts) in the model are replaced with the areas in which the events can be accomplished. This sabotage area logic model is then analyzed to identify the target sets (combinations of areas the adversary must visit to cause radiological sabotage) and the candidate vital area sets (combinations of areas that must be protected against adversary access to prevent radiological sabotage). Any one of the candidate vital area sets can be selected for protection. Appropriate selection criteria will allow the licensee or new reactor applicant to minimize the impacts of vital area protection measures on plant safety, cost, operations, or other factors of concern.« less

  8. A long-term intensive behavioral treatment study in patients with persistent vegetative state or minimally conscious state.

    PubMed

    Lotze, Martin; Schertel, Karin; Birbaumer, Niels; Kotchoubey, Boris

    2011-02-01

    Persistent vegetative state is regarded as "permanent", if it persists for more than 1 year for traumatic aetiology, or for more than 3 months for other aetiologies. This is also the case for patients in a minimally conscious state. In order to investigate possible improvements after this period we treated and observed 7 such patients over a period of 6 months. An ABA-BAB study design was used, with sensory stimulation and social-tactile intervention as treatment regimes. Changes were documented by clinical evaluation and blind behavioural assessment through video monitoring. Clinical scores improved significantly after treatment. Video assessment also indicated significant changes in the patients' behaviour. During the initial period of therapy, social tactile interaction improved patients' activity, while sensory stimulation impaired activity. During the main part of therapy, both types of treatment yielded similar positive results. This study indicates the possibility of achieving behavioural improvements with regard to the responsiveness of patients with long-lasting persistent vegetative state and minimally conscious state by use of long-term treatment.

  9. [Minimally invasive approach for cervical spondylotic radiculopathy].

    PubMed

    Ding, Liang; Sun, Taicun; Huang, Yonghui

    2010-01-01

    To summarize the recent minimally invasive approach for cervical spondylotic radiculopathy (CSR). The recent literature at home and abroad concerning minimally invasive approach for CSR was reviewed and summarized. There were two techniques of minimally invasive approach for CSR at present: percutaneous puncture techniques and endoscopic techniques. The degenerate intervertebral disc was resected or nucleolysis by percutaneous puncture technique if CSR was caused by mild or moderate intervertebral disc herniations. The cervical microendoscopic discectomy and foraminotomy was an effective minimally invasive approach which could provide a clear view. The endoscopy techniques were suitable to treat CSR caused by foraminal osteophytes, lateral disc herniations, local ligamentum flavum thickening and spondylotic foraminal stenosis. The minimally invasive procedure has the advantages of simple handling, minimally invasive and low incidence of complications. But the scope of indications is relatively narrow at present.

  10. Weight minimization of structural components for launch in space shuttle

    NASA Technical Reports Server (NTRS)

    Patnaik, Surya N.; Gendy, Atef S.; Hopkins, Dale A.; Berke, Laszlo

    1994-01-01

    Minimizing the weight of structural components of the space station launched into orbit in a space shuttle can save cost, reduce the number of space shuttle missions, and facilitate on-orbit fabrication. Traditional manual design of such components, although feasible, cannot represent a minimum weight condition. At NASA Lewis Research Center, a design capability called CometBoards (Comparative Evaluation Test Bed of Optimization and Analysis Routines for the Design of Structures) has been developed especially for the design optimization of such flight components. Two components of the space station - a spacer structure and a support system - illustrate the capability of CometBoards. These components are designed for loads and behavior constraints that arise from a variety of flight accelerations and maneuvers. The optimization process using CometBoards reduced the weights of the components by one third from those obtained with traditional manual design. This paper presents a brief overview of the design code CometBoards and a description of the space station components, their design environments, behavior limitations, and attributes of their optimum designs.

  11. Nutrition and behavior of fennec foxes (Vulpes zerda).

    PubMed

    Dempsey, Janet L; Hanna, Sherilyn J; Asa, Cheryl S; Bauman, Karen L

    2009-05-01

    Fennec foxes make popular pets because of their small size, minimal odor, and highly social behaviors. They are kept in zoos for conservation and educational programs. The exotic animal practitioner is most likely to be presented with fennec foxes that are overweight because of inappropriate diets or excessive feeding. Clients attempting to hand-rear fennec foxes need advice about formula selection, amounts to feed, protocols for keeping pups warm, and weaning. This article provides information on social behavior, reproduction, and parental behavior, nutrition, and hand-rearing.

  12. Determination of minimal steady-state plasma level of diazepam causing seizure threshold elevation in rats.

    PubMed

    Dhir, Ashish; Rogawski, Michael A

    2018-05-01

    Diazepam, administered by the intravenous, oral, or rectal routes, is widely used for the management of acute seizures. Dosage forms for delivery of diazepam by other routes of administration, including intranasal, intramuscular, and transbuccal, are under investigation. In predicting what dosages are necessary to terminate seizures, the minimal exposure required to confer seizure protection must be known. Here we administered diazepam by continuous intravenous infusion to obtain near-steady-state levels, which allowed an assessment of the minimal levels that elevate seizure threshold. The thresholds for various behavioral seizure signs (myoclonic jerk, clonus, and tonus) were determined with the timed intravenous pentylenetetrazol seizure threshold test in rats. Diazepam was administered to freely moving animals by continuous intravenous infusion via an indwelling jugular vein cannula. Blood samples for assay of plasma levels of diazepam and metabolites were recovered via an indwelling cannula in the contralateral jugular vein. The pharmacokinetic parameters of diazepam following a single 80-μg/kg intravenous bolus injection were determined using a noncompartmental pharmacokinetic approach. The derived parameters V d , CL, t 1/2α (distribution half-life) and t 1/2β (terminal half-life) for diazepam were, respectively, 608 mL, 22.1 mL/min, 13.7 minutes, and 76.8 minutes, respectively. Various doses of diazepam were continuously infused without or with an initial loading dose. At the end of the infusions, the thresholds for various behavioral seizure signs were determined. The minimal plasma diazepam concentration associated with threshold elevations was estimated at approximately 70 ng/mL. The active metabolites nordiazepam, oxazepam, and temazepam achieved levels that are expected to make only minor contributions to the threshold elevations. Diazepam elevates seizure threshold at steady-state plasma concentrations lower than previously recognized. The

  13. Interaction of reinforcement schedules, a behavioral prosthesis, and work-related behavior in adults with mental retardation.

    PubMed

    Saunders, Richard R; McEntee, Julie E; Saunders, Muriel D

    2005-01-01

    The effects of variable-interval (VI) and fixed-ratio (FR) schedules of reinforcement for work-related behavior and an organizer for the work materials (behavioral prosthesis) were evaluated with 3 adults with severe or profound mental retardation. The participants had been recommended for study because of high rates of off-task and aberrant behavior in their daily vocational training programs. For 2 participants, VI and FR schedules resulted in the same outcome: more aberrant behavior than on-task and off-task behavior combined. The FR schedule nearly eliminated emission of aberrant and off-task behavior by the 3rd participant. Combining the behavioral prosthesis with FR reinforcement (FR+O) increased the proportion of time spent in on-task behavior by all participants under certain FR schedule parameters. Second-by-second analyses of the observation records revealed that FR schedules reduced off-task and aberrant behavior during work sequences (i.e., ratio runs), and FR+O led to a further reduction of these behaviors during postreinforcement pauses. Overall, the results show how organizer and schedule parameters can be adjusted to produce an optimized balance between productivity and reinforcement while undesirable behavior is minimized.

  14. Minimal string theories and integrable hierarchies

    NASA Astrophysics Data System (ADS)

    Iyer, Ramakrishnan

    Well-defined, non-perturbative formulations of the physics of string theories in specific minimal or superminimal model backgrounds can be obtained by solving matrix models in the double scaling limit. They provide us with the first examples of completely solvable string theories. Despite being relatively simple compared to higher dimensional critical string theories, they furnish non-perturbative descriptions of interesting physical phenomena such as geometrical transitions between D-branes and fluxes, tachyon condensation and holography. The physics of these theories in the minimal model backgrounds is succinctly encoded in a non-linear differential equation known as the string equation, along with an associated hierarchy of integrable partial differential equations (PDEs). The bosonic string in (2,2m-1) conformal minimal model backgrounds and the type 0A string in (2,4 m) superconformal minimal model backgrounds have the Korteweg-de Vries system, while type 0B in (2,4m) backgrounds has the Zakharov-Shabat system. The integrable PDE hierarchy governs flows between backgrounds with different m. In this thesis, we explore this interesting connection between minimal string theories and integrable hierarchies further. We uncover the remarkable role that an infinite hierarchy of non-linear differential equations plays in organizing and connecting certain minimal string theories non-perturbatively. We are able to embed the type 0A and 0B (A,A) minimal string theories into this single framework. The string theories arise as special limits of a rich system of equations underpinned by an integrable system known as the dispersive water wave hierarchy. We find that there are several other string-like limits of the system, and conjecture that some of them are type IIA and IIB (A,D) minimal string backgrounds. We explain how these and several other string-like special points arise and are connected. In some cases, the framework endows the theories with a non

  15. Perceptions of Sexual Orientation From Minimal Cues.

    PubMed

    Rule, Nicholas O

    2017-01-01

    People derive considerable amounts of information about each other from minimal nonverbal cues. Apart from characteristics typically regarded as obvious when encountering another person (e.g., age, race, and sex), perceivers can identify many other qualities about a person that are typically rather subtle. One such feature is sexual orientation. Here, I review the literature documenting the accurate perception of sexual orientation from nonverbal cues related to one's adornment, acoustics, actions, and appearance. In addition to chronicling studies that have demonstrated how people express and extract sexual orientation in each of these domains, I discuss some of the basic cognitive and perceptual processes that support these judgments, including how cues to sexual orientation manifest in behavioral (e.g., clothing choices) and structural (e.g., facial morphology) signals. Finally, I attend to boundary conditions in the accurate perception of sexual orientation, such as the states, traits, and group memberships that moderate individuals' ability to reliably decipher others' sexual orientation.

  16. Minimal change disease

    MedlinePlus

    Minimal change nephrotic syndrome; Nil disease; Lipoid nephrosis; Idiopathic nephrotic syndrome of childhood ... disease is the most common cause of nephrotic syndrome in children. It is also seen in adults ...

  17. Individualized Behavioral Health Monitoring Tool

    NASA Technical Reports Server (NTRS)

    Mollicone, Daniel

    2015-01-01

    Behavioral health risks during long-duration space exploration missions are among the most difficult to predict, detect, and mitigate. Given the anticipated extended duration of future missions and their isolated, extreme, and confined environments, there is the possibility that behavior conditions and mental disorders will develop among astronaut crew. Pulsar Informatics, Inc., has developed a health monitoring tool that provides a means to detect and address behavioral disorders and mental conditions at an early stage. The tool integrates all available behavioral measures collected during a mission to identify possible health indicator warning signs within the context of quantitatively tracked mission stressors. It is unobtrusive and requires minimal crew time and effort to train and utilize. The monitoring tool can be deployed in space analog environments for validation testing and ultimate deployment in long-duration space exploration missions.

  18. Anesthesia for minimally invasive neurosurgery.

    PubMed

    Prabhakar, Hemanshu; Mahajan, Charu; Kapoor, Indu

    2017-10-01

    With an ultimate aim of improving patients overall outcome and satisfaction, minimally invasive surgical approach is becoming more of a norm. The related anesthetic evidence has not expanded at the same rate as surgical and technological advancement. This article reviews the recent evidence on anesthesia and perioperative concerns for patients undergoing minimally invasive neurosurgery. Minimally invasive cranial and spinal surgeries have been made possible only by vast technological development. Points of surgical interest can be precisely located with the help of stereotaxy and neuronavigation and special endoscopes which decrease the tissue trauma. The principles of neuroanethesia remain the same, but few concerns are specific for each technique. Dexmedetomidine has a favorable profile for procedures carried out under sedation technique. As the new surgical techniques are coming up, lesser known anesthetic concerns may also come into light. Over the last year, little new information has been added to existing literature regarding anesthesia for minimally invasive neurosurgeries. Neuroanesthesia goals remain the same and less invasive surgical techniques do not translate into safe anesthesia. Specific concerns for each procedure should be taken into consideration.

  19. Controlling molecular transport in minimal emulsions

    NASA Astrophysics Data System (ADS)

    Gruner, Philipp; Riechers, Birte; Semin, Benoît; Lim, Jiseok; Johnston, Abigail; Short, Kathleen; Baret, Jean-Christophe

    2016-01-01

    Emulsions are metastable dispersions in which molecular transport is a major mechanism driving the system towards its state of minimal energy. Determining the underlying mechanisms of molecular transport between droplets is challenging due to the complexity of a typical emulsion system. Here we introduce the concept of `minimal emulsions', which are controlled emulsions produced using microfluidic tools, simplifying an emulsion down to its minimal set of relevant parameters. We use these minimal emulsions to unravel the fundamentals of transport of small organic molecules in water-in-fluorinated-oil emulsions, a system of great interest for biotechnological applications. Our results are of practical relevance to guarantee a sustainable compartmentalization of compounds in droplet microreactors and to design new strategies for the dynamic control of droplet compositions.

  20. Communication interventions for minimally verbal children with autism: a sequential multiple assignment randomized trial.

    PubMed

    Kasari, Connie; Kaiser, Ann; Goods, Kelly; Nietfeld, Jennifer; Mathy, Pamela; Landa, Rebecca; Murphy, Susan; Almirall, Daniel

    2014-06-01

    This study tested the effect of beginning treatment with a speech-generating device (SGD) in the context of a blended, adaptive treatment design for improving spontaneous, communicative utterances in school-aged, minimally verbal children with autism. A total of 61 minimally verbal children with autism, aged 5 to 8 years, were randomized to a blended developmental/behavioral intervention (JASP+EMT) with or without the augmentation of a SGD for 6 months with a 3-month follow-up. The intervention consisted of 2 stages. In stage 1, all children received 2 sessions per week for 3 months. Stage 2 intervention was adapted (by increased sessions or adding the SGD) based on the child's early response. The primary outcome was the total number of spontaneous communicative utterances; secondary measures were the total number of novel words and total comments from a natural language sample. Primary aim results found improvements in spontaneous communicative utterances, novel words, and comments that all favored the blended behavioral intervention that began by including an SGD (JASP+EMT+SGD) as opposed to spoken words alone (JASP+EMT). Secondary aim results suggest that the adaptive intervention beginning with JASP+EMT+SGD and intensifying JASP+EMT+SGD for children who were slow responders led to better posttreatment outcomes. Minimally verbal school-aged children can make significant and rapid gains in spoken spontaneous language with a novel, blended intervention that focuses on joint engagement and play skills and incorporates an SGD. Future studies should further explore the tailoring design used in this study to better understand children's response to treatment. Clinical trial registration information-Developmental and Augmented Intervention for Facilitating Expressive Language (CCNIA); http://clinicaltrials.gov/; NCT01013545. Copyright © 2014 American Academy of Child and Adolescent Psychiatry. Published by Elsevier Inc. All rights reserved.

  1. Economic impact of minimally invasive lumbar surgery.

    PubMed

    Hofstetter, Christoph P; Hofer, Anna S; Wang, Michael Y

    2015-03-18

    Cost effectiveness has been demonstrated for traditional lumbar discectomy, lumbar laminectomy as well as for instrumented and noninstrumented arthrodesis. While emerging evidence suggests that minimally invasive spine surgery reduces morbidity, duration of hospitalization, and accelerates return to activites of daily living, data regarding cost effectiveness of these novel techniques is limited. The current study analyzes all available data on minimally invasive techniques for lumbar discectomy, decompression, short-segment fusion and deformity surgery. In general, minimally invasive spine procedures appear to hold promise in quicker patient recovery times and earlier return to work. Thus, minimally invasive lumbar spine surgery appears to have the potential to be a cost-effective intervention. Moreover, novel less invasive procedures are less destabilizing and may therefore be utilized in certain indications that traditionally required arthrodesis procedures. However, there is a lack of studies analyzing the economic impact of minimally invasive spine surgery. Future studies are necessary to confirm the durability and further define indications for minimally invasive lumbar spine procedures.

  2. Linking brain, mind and behavior.

    PubMed

    Makeig, Scott; Gramann, Klaus; Jung, Tzyy-Ping; Sejnowski, Terrence J; Poizner, Howard

    2009-08-01

    Cortical brain areas and dynamics evolved to organize motor behavior in our three-dimensional environment also support more general human cognitive processes. Yet traditional brain imaging paradigms typically allow and record only minimal participant behavior, then reduce the recorded data to single map features of averaged responses. To more fully investigate the complex links between distributed brain dynamics and motivated natural behavior, we propose the development of wearable mobile brain/body imaging (MoBI) systems that continuously capture the wearer's high-density electrical brain and muscle signals, three-dimensional body movements, audiovisual scene and point of regard, plus new data-driven analysis methods to model their interrelationships. The new imaging modality should allow new insights into how spatially distributed brain dynamics support natural human cognition and agency.

  3. Tumor necrosis factor-α synthesis inhibitor, 3’6,dithiothalidomide, reverses behavioral impairments induced by minimal traumatic brain injury in mice

    PubMed Central

    Baratz, Renana; Tweedie, David; Rubovitch, Vardit; Luo, Weiming; Yoon, Jeong Seon; Hoffer, Barry J.; Greig, Nigel H.; Pick, Chaim G.

    2012-01-01

    Mild traumatic brain injury (mTBI) patients do not show clear structural brain defects and, in general, do not require hospitalization, but frequently suffer from long-lasting cognitive, behavioral and emotional difficulties. Although there is no current effective treatment or cure for mTBI, tumor necrosis factor-alpha (TNF-α), a cytokine fundamental in the systemic inflammatory process, represents a potential drug target. TNF-α levels increase after mTBI and may induce or exacerbate secondary damage to brain tissue. The present study evaluated the efficacy of the experimental TNF-α synthesis inhibitor, 3,6'-dithiothalidomide, on recovery of mice from mTBI in a closed head weight-drop model that induces an acute elevation in brain TNF-α and an impairment in cognitive performance, as assessed by the Y-maze, by novel object recognition and by passive avoidance paradigms at 72 hr and 7 days after injury. These impairments were fully ameliorated in mice that received a one time administration of 3,6'-dithiothalidomide at either a low (28 mg/kg) or high (56 mg/kg) dose provided either 1 hr prior to injury, or at 1 or 12 hr post injury. Together, these results implicate TNF-α as a drug target for mTBI and suggests that 3,6'-dithiothalidomide may act as a neuroprotective drug to minimize impairment. PMID:21740439

  4. The re-emergence of the minimal running shoe.

    PubMed

    Davis, Irene S

    2014-10-01

    The running shoe has gone through significant changes since its inception. The purpose of this paper is to review these changes, the majority of which have occurred over the past 50 years. Running footwear began as very minimal, then evolved to become highly cushioned and supportive. However, over the past 5 years, there has been a reversal of this trend, with runners seeking more minimal shoes that allow their feet more natural motion. This abrupt shift toward footwear without cushioning and support has led to reports of injuries associated with minimal footwear. In response to this, the running footwear industry shifted again toward the development of lightweight, partial minimal shoes that offer some support and cushioning. In this paper, studies comparing the mechanics between running in minimal, partial minimal, and traditional shoes are reviewed. The implications for injuries in all 3 conditions are examined. The use of minimal footwear in other populations besides runners is discussed. Finally, areas for future research into minimal footwear are suggested.

  5. Mixed-order phase transition in a minimal, diffusion-based spin model.

    PubMed

    Fronczak, Agata; Fronczak, Piotr

    2016-07-01

    In this paper we exactly solve, within the grand canonical ensemble, a minimal spin model with the hybrid phase transition. We call the model diffusion based because its Hamiltonian can be recovered from a simple dynamic procedure, which can be seen as an equilibrium statistical mechanics representation of a biased random walk. We outline the derivation of the phase diagram of the model, in which the triple point has the hallmarks of the hybrid transition: discontinuity in the average magnetization and algebraically diverging susceptibilities. At this point, two second-order transition curves meet in equilibrium with the first-order curve, resulting in a prototypical mixed-order behavior.

  6. Human Handling Promotes Compliant Behavior in Adult Laboratory Rabbits

    PubMed Central

    Swennes, Alton G; Alworth, Leanne C; Harvey, Stephen B; Jones, Carolyn A; King, Christopher S; Crowell-Davis, Sharon L

    2011-01-01

    Routine laboratory procedures can be stressful for laboratory animals. We wanted to determine whether human handling of adult rabbits could induce a degree of habituation, reducing stress and facilitating research-related manipulation. To this end, adult New Zealand white rabbits were handled either frequently or minimally. After being handled over 3 wk, these rabbits were evaluated by novel personnel and compared with minimally handled controls. Evaluators subjectively scored the rabbits for their relative compliance or resistance to being scruffed and removed from their cages, being transported to a treatment room, and their behavior at all stages of the exercise. Upon evaluation, handled rabbits scored significantly more compliant than nontreated controls. During evaluation, behaviors that the rabbits displayed when they were approached in their cages and while being handled outside their cages were recorded and compared between study groups. Handled rabbits displayed behavior consistent with a reduction in human-directed fear. This study illustrates the potential for handling to improve compliance in laboratory procedures and reduce fear-related behavior in laboratory rabbits. Such handling could be used to improve rabbit welfare through the reduction of stress and exposure to novel stimuli. PMID:21333162

  7. Exploring the Link between Pet Abuse and Controlling Behaviors in Violent Relationships

    ERIC Educational Resources Information Center

    Simmons, Catherine A.; Lehmann, Peter

    2007-01-01

    Domestic violence is not as simple as one partner physically harming another. Instead, it consists of a complex range of controlling behaviors including physical, emotional, sexual, and economic maltreatment as well as isolation, male privilege, blaming, intimidation, threats, and minimizing/denying behaviors. In addition to the controlling…

  8. Licensing Behavior Analysts: Risks and Alternatives

    PubMed Central

    Green, Gina; Johnston, James M

    2009-01-01

    Under certain conditions, obtaining state laws to license practitioners of behavior analysis might be feasible and could produce benefits for practitioners and consumers. Those conditions are not yet in place in most states, however, and pursuing licensure prematurely carries substantial risks for the entire field. We describe the most serious risks and the conditions that make it more or less likely that licensure initiatives will succeed. Finally, we recommend strategies for securing recognition of practitioners of behavior analysis in laws, regulations, and policies that can minimize risks. PMID:22477698

  9. Minimal excitation states for heat transport in driven quantum Hall systems

    NASA Astrophysics Data System (ADS)

    Vannucci, Luca; Ronetti, Flavio; Rech, Jérôme; Ferraro, Dario; Jonckheere, Thibaut; Martin, Thierry; Sassetti, Maura

    2017-06-01

    We investigate minimal excitation states for heat transport into a fractional quantum Hall system driven out of equilibrium by means of time-periodic voltage pulses. A quantum point contact allows for tunneling of fractional quasiparticles between opposite edge states, thus acting as a beam splitter in the framework of the electron quantum optics. Excitations are then studied through heat and mixed noise generated by the random partitioning at the barrier. It is shown that levitons, the single-particle excitations of a filled Fermi sea recently observed in experiments, represent the cleanest states for heat transport since excess heat and mixed shot noise both vanish only when Lorentzian voltage pulses carrying integer electric charge are applied to the conductor. This happens in the integer quantum Hall regime and for Laughlin fractional states as well, with no influence of fractional physics on the conditions for clean energy pulses. In addition, we demonstrate the robustness of such excitations to the overlap of Lorentzian wave packets. Even though mixed and heat noise have nonlinear dependence on the voltage bias, and despite the noninteger power-law behavior arising from the fractional quantum Hall physics, an arbitrary superposition of levitons always generates minimal excitation states.

  10. Comparisons of Adolescent and Parent Willingness to Participate in Minimal and Above Minimal Risk Pediatric Asthma Research Protocols

    PubMed Central

    Brody, Janet L.; Annett, Robert D.; Scherer, David G.; Perryman, Mandy L.; Cofrin, Keely M. W.

    2007-01-01

    Purpose Much has been written about conceptual concern for voluntary assent with children and adolescents. However, little empirical data exists examining the frequency with which, or context in which, adolescents and parents disagree on research participation decisions. The purpose of this study was to compare parent and adolescent willingness to participate in minimal and above minimal risk pediatric asthma research protocols. Method 36 adolescents diagnosed with asthma and one of their parents independently rated their willingness to participate in 9 pediatric asthma research protocol vignettes. The selected protocols were chosen by an expert panel as representative of typical minimal and above minimal risk pediatric asthma studies. Results Parents and adolescents were significantly less likely to agree to enroll in above minimal risk studies. However, this was qualified by a finding that adolescents were significantly more willing than parents to enroll in above minimal risk research. Across all 9 studies, parents and adolescents held concordant views on participation decisions approximately 60% of the time. Perception of potential study benefit was the most frequent reason provided for participation decisions by both parents and adolescents. Conclusion Parents and their adolescents report a consistent 40% discordance in their views about participating in asthma research across a variety of asthma research protocols, with adolescents more willing than their parents to enroll in above minimal risk studies. These differences of opinion highlight the need to carefully consider the process by which families are offered the option of adolescent research participation. PMID:16109343

  11. Minimal measures on surfaces of higher genus

    NASA Astrophysics Data System (ADS)

    Wang, Fang

    We study the minimal measures for positive definite autonomous Lagrangian systems defined on the tangent bundles of compact surfaces with genus greater than one. We present some results on the structure of minimal measures on compact surfaces. Specifically, we give a finer description of the structure of minimal measures with rational rotation vectors for geodesic flows on compact surfaces.

  12. Privacy and Integrity in the Untrusted Cloud

    DTIC Science & Technology

    2012-06-01

    TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4 . TITLE AND SUBTITLE Privacy and Integrity in the Untrusted Cloud 5a. CONTRACT NUMBER 5b...54 4 Frientegrity 55 4.1 Introduction...but still showing them to the user [105]. This behavior is 4 an example of provider equivocation [74, 67], in which a malicious service presents

  13. Automated EEG entropy measurements in coma, vegetative state/unresponsive wakefulness syndrome and minimally conscious state

    PubMed Central

    Gosseries, Olivia; Schnakers, Caroline; Ledoux, Didier; Vanhaudenhuyse, Audrey; Bruno, Marie-Aurélie; Demertzi, Athéna; Noirhomme, Quentin; Lehembre, Rémy; Damas, Pierre; Goldman, Serge; Peeters, Erika; Moonen, Gustave; Laureys, Steven

    Summary Monitoring the level of consciousness in brain-injured patients with disorders of consciousness is crucial as it provides diagnostic and prognostic information. Behavioral assessment remains the gold standard for assessing consciousness but previous studies have shown a high rate of misdiagnosis. This study aimed to investigate the usefulness of electroencephalography (EEG) entropy measurements in differentiating unconscious (coma or vegetative) from minimally conscious patients. Left fronto-temporal EEG recordings (10-minute resting state epochs) were prospectively obtained in 56 patients and 16 age-matched healthy volunteers. Patients were assessed in the acute (≤1 month post-injury; n=29) or chronic (>1 month post-injury; n=27) stage. The etiology was traumatic in 23 patients. Automated online EEG entropy calculations (providing an arbitrary value ranging from 0 to 91) were compared with behavioral assessments (Coma Recovery Scale-Revised) and outcome. EEG entropy correlated with Coma Recovery Scale total scores (r=0.49). Mean EEG entropy values were higher in minimally conscious (73±19; mean and standard deviation) than in vegetative/unresponsive wakefulness syndrome patients (45±28). Receiver operating characteristic analysis revealed an entropy cut-off value of 52 differentiating acute unconscious from minimally conscious patients (sensitivity 89% and specificity 90%). In chronic patients, entropy measurements offered no reliable diagnostic information. EEG entropy measurements did not allow prediction of outcome. User-independent time-frequency balanced spectral EEG entropy measurements seem to constitute an interesting diagnostic – albeit not prognostic – tool for assessing neural network complexity in disorders of consciousness in the acute setting. Future studies are needed before using this tool in routine clinical practice, and these should seek to improve automated EEG quantification paradigms in order to reduce the remaining false

  14. The Oral Minimal Model Method

    PubMed Central

    Cobelli, Claudio; Dalla Man, Chiara; Toffolo, Gianna; Basu, Rita; Vella, Adrian; Rizza, Robert

    2014-01-01

    The simultaneous assessment of insulin action, secretion, and hepatic extraction is key to understanding postprandial glucose metabolism in nondiabetic and diabetic humans. We review the oral minimal method (i.e., models that allow the estimation of insulin sensitivity, β-cell responsivity, and hepatic insulin extraction from a mixed-meal or an oral glucose tolerance test). Both of these oral tests are more physiologic and simpler to administer than those based on an intravenous test (e.g., a glucose clamp or an intravenous glucose tolerance test). The focus of this review is on indices provided by physiological-based models and their validation against the glucose clamp technique. We discuss first the oral minimal model method rationale, data, and protocols. Then we present the three minimal models and the indices they provide. The disposition index paradigm, a widely used β-cell function metric, is revisited in the context of individual versus population modeling. Adding a glucose tracer to the oral dose significantly enhances the assessment of insulin action by segregating insulin sensitivity into its glucose disposal and hepatic components. The oral minimal model method, by quantitatively portraying the complex relationships between the major players of glucose metabolism, is able to provide novel insights regarding the regulation of postprandial metabolism. PMID:24651807

  15. Influence of boundary conditions on the existence and stability of minimal surfaces of revolution made of soap films

    NASA Astrophysics Data System (ADS)

    Salkin, Louis; Schmit, Alexandre; Panizza, Pascal; Courbin, Laurent

    2014-09-01

    Because of surface tension, soap films seek the shape that minimizes their surface energy and thus their surface area. This mathematical postulate allows one to predict the existence and stability of simple minimal surfaces. After briefly recalling classical results obtained in the case of symmetric catenoids that span two circular rings with the same radius, we discuss the role of boundary conditions on such shapes, working with two rings having different radii. We then investigate the conditions of existence and stability of other shapes that include two portions of catenoids connected by a planar soap film and half-symmetric catenoids for which we introduce a method of observation. We report a variety of experimental results including metastability—an hysteretic evolution of the shape taken by a soap film—explained using simple physical arguments. Working by analogy with the theory of phase transitions, we conclude by discussing universal behaviors of the studied minimal surfaces in the vicinity of their existence thresholds.

  16. Physiology in Medicine: Understanding dynamic alveolar physiology to minimize ventilator-induced lung injury.

    PubMed

    Nieman, Gary F; Satalin, Josh; Kollisch-Singule, Michaela; Andrews, Penny; Aiash, Hani; Habashi, Nader M; Gatto, Louis A

    2017-06-01

    Acute respiratory distress syndrome (ARDS) remains a serious clinical problem with the main treatment being supportive in the form of mechanical ventilation. However, mechanical ventilation can be a double-edged sword: if set improperly, it can exacerbate the tissue damage caused by ARDS; this is known as ventilator-induced lung injury (VILI). To minimize VILI, we must understand the pathophysiologic mechanisms of tissue damage at the alveolar level. In this Physiology in Medicine paper, the dynamic physiology of alveolar inflation and deflation during mechanical ventilation will be reviewed. In addition, the pathophysiologic mechanisms of VILI will be reviewed, and this knowledge will be used to suggest an optimal mechanical breath profile (MB P : all airway pressures, volumes, flows, rates, and the duration that they are applied at both inspiration and expiration) necessary to minimize VILI. Our review suggests that the current protective ventilation strategy, known as the "open lung strategy," would be the optimal lung-protective approach. However, the viscoelastic behavior of dynamic alveolar inflation and deflation has not yet been incorporated into protective mechanical ventilation strategies. Using our knowledge of dynamic alveolar mechanics (i.e., the dynamic change in alveolar and alveolar duct size and shape during tidal ventilation) to modify the MB P so as to minimize VILI will reduce the morbidity and mortality associated with ARDS. Copyright © 2017 the American Physiological Society.

  17. Blackfolds, plane waves and minimal surfaces

    NASA Astrophysics Data System (ADS)

    Armas, Jay; Blau, Matthias

    2015-07-01

    Minimal surfaces in Euclidean space provide examples of possible non-compact horizon geometries and topologies in asymptotically flat space-time. On the other hand, the existence of limiting surfaces in the space-time provides a simple mechanism for making these configurations compact. Limiting surfaces appear naturally in a given space-time by making minimal surfaces rotate but they are also inherent to plane wave or de Sitter space-times in which case minimal surfaces can be static and compact. We use the blackfold approach in order to scan for possible black hole horizon geometries and topologies in asymptotically flat, plane wave and de Sitter space-times. In the process we uncover several new configurations, such as black helicoids and catenoids, some of which have an asymptotically flat counterpart. In particular, we find that the ultraspinning regime of singly-spinning Myers-Perry black holes, described in terms of the simplest minimal surface (the plane), can be obtained as a limit of a black helicoid, suggesting that these two families of black holes are connected. We also show that minimal surfaces embedded in spheres rather than Euclidean space can be used to construct static compact horizons in asymptotically de Sitter space-times.

  18. Minimally Invasive Mitral Valve Procedures: The Current State

    PubMed Central

    Ritwick, Bhuyan; Chaudhuri, Krishanu; Crouch, Gareth; Edwards, James R. M.; Worthington, Michael; Stuklis, Robert G.

    2013-01-01

    Since its early days, cardiac surgery has typically involved large incisions with complete access to the heart and the great vessels. After the popularization of the minimally invasive techniques in general surgery, cardiac surgeons began to experiment with minimal access techniques in the early 1990s. Although the goals of minimally invasive cardiac surgery (MICS) are fairly well established as decreased pain, shorter hospital stay, accelerated recuperation, improved cosmesis, and cost effectiveness, a strict definition of minimally invasive cardiac surgery has been more elusive. Minimally invasive cardiac surgery started with mitral valve procedures and then gradually expanded towards other valve procedures, coronary artery bypass grafting, and various types of simple congenital heart procedures. In this paper, the authors attempt to focus on the evolution, techniques, results, and the future perspective of minimally invasive mitral valve surgery (MIMVS). PMID:24382998

  19. Matthew Arnold and Minimal Competency Testing.

    ERIC Educational Resources Information Center

    Tuman, Myron C.

    1979-01-01

    Presents arguments by Robert Lowe and Matthew Arnold on the 19th century British "Payment by Results" Plan, whereby schools received funds for students who passed minimal competency tests. Emphasizes that the Victorian experience produced acrimonious teachers with low morale and encourages contemporary minimal testing advocates not to…

  20. Minimal modeling of the extratropical general circulation

    NASA Technical Reports Server (NTRS)

    O'Brien, Enda; Branscome, Lee E.

    1989-01-01

    The ability of low-order, two-layer models to reproduce basic features of the mid-latitude general circulation is investigated. Changes in model behavior with increased spectral resolution are examined in detail. Qualitatively correct time-mean heat and momentum balances are achieved in a beta-plane channel model which includes the first and third meridional modes. This minimal resolution also reproduces qualitatively realistic surface and upper-level winds and mean meridional circulations. Higher meridional resolution does not result in substantial changes in the latitudinal structure of the circulation. A qualitatively correct kinetic energy spectrum is produced when the resolution is high enough to include several linearly stable modes. A model with three zonal waves and the first three meridional modes has a reasonable energy spectrum and energy conversion cycle, while also satisfying heat and momentum budget requirements. This truncation reproduces the basic mechanisms and zonal circulation features that are obtained at higher resolution. The model performance improves gradually with higher resolution and is smoothly dependent on changes in external parameters.

  1. Disrupted resting-state functional connectivity in minimally treated chronic schizophrenia.

    PubMed

    Wang, Xijin; Xia, Mingrui; Lai, Yunyao; Dai, Zhengjia; Cao, Qingjiu; Cheng, Zhang; Han, Xue; Yang, Lei; Yuan, Yanbo; Zhang, Yong; Li, Keqing; Ma, Hong; Shi, Chuan; Hong, Nan; Szeszko, Philip; Yu, Xin; He, Yong

    2014-07-01

    The pathophysiology of chronic schizophrenia may reflect long term brain changes related to the disorder. The effect of chronicity on intrinsic functional connectivity patterns in schizophrenia without the potentially confounding effect of antipsychotic medications, however, remains largely unknown. We collected resting-state fMRI data in 21 minimally treated chronic schizophrenia patients and 20 healthy controls. We computed regional functional connectivity strength for each voxel in the brain, and further divided regional functional connectivity strength into short-range regional functional connectivity strength and long-range regional functional connectivity strength. General linear models were used to detect between-group differences in these regional functional connectivity strength metrics and to further systematically investigate the relationship between these differences and clinical/behavioral variables in the patients. Compared to healthy controls, the minimally treated chronic schizophrenia patients showed an overall reduced regional functional connectivity strength especially in bilateral sensorimotor cortex, right lateral prefrontal cortex, left insula and right lingual gyrus, and these regional functional connectivity strength decreases mainly resulted from disruption of short-range regional functional connectivity strength. The minimally treated chronic schizophrenia patients also showed reduced long-range regional functional connectivity strength in the bilateral posterior cingulate cortex/precuneus, and increased long-range regional functional connectivity strength in the right lateral prefrontal cortex and lingual gyrus. Notably, disrupted short-range regional functional connectivity strength mainly correlated with duration of illness and negative symptoms, whereas disrupted long-range regional functional connectivity strength correlated with neurocognitive performance. All of the results were corrected using Monte-Carlo simulation. This

  2. Minimal intervention dentistry - a new frontier in clinical dentistry.

    PubMed

    Mm, Jingarwar; Nk, Bajwa; A, Pathak

    2014-07-01

    Minimally invasive procedures are the new paradigm in health care. Everything from heart bypasses to gall bladder, surgeries are being performed with these dynamic new techniques. Dentistry is joining this exciting revolution as well. Minimally invasive dentistry adopts a philosophy that integrates prevention, remineralisation and minimal intervention for the placement and replacement of restorations. Minimally invasive dentistry reaches the treatment objective using the least invasive surgical approach, with the removal of the minimal amount of healthy tissues. This paper reviews in brief the concept of minimal intervention in dentistry.

  3. Minimal-change nephropathy and malignant thymoma.

    PubMed

    Varsano, S; Bruderman, I; Bernheim, J L; Rathaus, M; Griffel, B

    1980-05-01

    A 56-year-old man had fever, precordial pain, and a mediastinal mass. The mass disappeared two months later and the patient remained asymptomatic for 2 1/2 years. At that time a full-blown nephrotic syndrome developed, with minimal-change glomerulopathy. The chest x-ray film showed the reappearance of a giant mediastinal mass. On biopsy of the mass, malignant thymoma was diagnosed. Association between minimal-change disease and Hodgkin's disease is well known, while the association with malignant thymoma has not been previously reported. The relationship between malignant thymoma and minimal-change disease is discussed, and a possible pathogenic mechanism involving cell-mediated immunity is proposed.

  4. Relationship between Effective Application of Machine Learning and Malware Detection: A Quantitative Study

    ERIC Educational Resources Information Center

    Enfinger, Kerry Wayne

    2016-01-01

    The number of malicious files present in the public domain continues to rise at a substantial rate. Current anti-malware software utilizes a signature-based method to detect the presence of malicious software. Generating these pattern signatures is time consuming due to malicious code complexity and the need for expert analysis, however, by making…

  5. Using the CABLES model to assess and minimize risk in research: control group hazards.

    PubMed

    Koocher, G P

    2002-01-01

    CABLES is both an acronym and metaphor for conceptualizing research participation risk by considering 6 distinct domains in which risks of harm to research participants may exist: cognitive, affective, biological, legal, economic, and social/cultural. These domains are described and illustrated, along with suggestions for minimizing or eliminating the potential hazards to human participants in biomedical and behavioral science research. Adoption of a thoughtful ethical analysis addressing all 6 CABLES strands in designing research provides a strong protective step toward safeguarding and promoting the well-being of study participants.

  6. Debugging classification and anti-debugging strategies

    NASA Astrophysics Data System (ADS)

    Gao, Shang; Lin, Qian; Xia, Mingyuan; Yu, Miao; Qi, Zhengwei; Guan, Haibing

    2011-12-01

    Debugging, albeit useful for software development, is also a double-edge sword since it could also be exploited by malicious attackers. This paper analyzes the prevailing debuggers and classifies them into 4 categories based on the debugging mechanism. Furthermore, as an opposite, we list 13 typical anti-debugging strategies adopted in Windows. These methods intercept specific execution points which expose the diagnostic behavior of debuggers.

  7. SQTrust: Social and QoS Trust Management and Its Application to Mission-Oriented Mobile Groups

    DTIC Science & Technology

    2012-08-15

    ground truth status over a wide range of operational and environment conditions with high resiliency to malicious attacks and misbehaving nodes...attacks and misbehaving nodes. Furthermore, using mission-oriented mobile groups as an application, we identify the best trust formation model under...describe dy- namic behaviors of nodes in MANETs in the presence of misbehaving nodes with the objective to validate subjective trust evaluation with

  8. Toward a Mobile Agent Relay Network

    DTIC Science & Technology

    2010-03-01

    in the study of particle movement. In computer science, flocking movement has been adapted for use in the collective, cooperative movement of...MARN). For our approach, we utilize a mod- ified flocking behavior to generate cooperative movement that utilizes the agent’s re- lay capability. We...Summary Our testing focuses on measuring effective cooperative movement and robustness against malicious agents. The movement testing demonstrated that a

  9. Minimally inconsistent reasoning in Semantic Web.

    PubMed

    Zhang, Xiaowang

    2017-01-01

    Reasoning with inconsistencies is an important issue for Semantic Web as imperfect information is unavoidable in real applications. For this, different paraconsistent approaches, due to their capacity to draw as nontrivial conclusions by tolerating inconsistencies, have been proposed to reason with inconsistent description logic knowledge bases. However, existing paraconsistent approaches are often criticized for being too skeptical. To this end, this paper presents a non-monotonic paraconsistent version of description logic reasoning, called minimally inconsistent reasoning, where inconsistencies tolerated in the reasoning are minimized so that more reasonable conclusions can be inferred. Some desirable properties are studied, which shows that the new semantics inherits advantages of both non-monotonic reasoning and paraconsistent reasoning. A complete and sound tableau-based algorithm, called multi-valued tableaux, is developed to capture the minimally inconsistent reasoning. In fact, the tableaux algorithm is designed, as a framework for multi-valued DL, to allow for different underlying paraconsistent semantics, with the mere difference in the clash conditions. Finally, the complexity of minimally inconsistent description logic reasoning is shown on the same level as the (classical) description logic reasoning.

  10. Weight change among people randomized to minimal intervention control groups in weight loss trials.

    PubMed

    Johns, David J; Hartmann-Boyce, Jamie; Jebb, Susan A; Aveyard, Paul

    2016-04-01

    Evidence on the effectiveness of behavioral weight management programs often comes from uncontrolled program evaluations. These frequently make the assumption that, without intervention, people will gain weight. The aim of this study was to use data from minimal intervention control groups in randomized controlled trials to examine the evidence for this assumption and the effect of frequency of weighing on weight change. Data were extracted from minimal intervention control arms in a systematic review of multicomponent behavioral weight management programs. Two reviewers classified control arms into three categories based on intensity of minimal intervention and calculated 12-month mean weight change using baseline observation carried forward. Meta-regression was conducted in STATA v12. Thirty studies met the inclusion criteria, twenty-nine of which had usable data, representing 5,963 participants allocated to control arms. Control arms were categorized according to intensity, as offering leaflets only, a single session of advice, or more than one session of advice from someone without specialist skills in supporting weight loss. Mean weight change at 12 months across all categories was -0.8 kg (95% CI -1.1 to -0.4). In an unadjusted model, increasing intensity by moving up a category was associated with an additional weight loss of -0.53 kg (95% CI -0.96 to -0.09). Also in an unadjusted model, each additional weigh-in was associated with a weight change of -0.42 kg (95% CI -0.81 to -0.03). However, when both variables were placed in the same model, neither intervention category nor number of weigh-ins was associated with weight change. Uncontrolled evaluations of weight loss programs should assume that, in the absence of intervention, their population would weigh up to a kilogram on average less than baseline at the end of the first year of follow-up. © 2016 The Authors Obesity published by Wiley Periodicals, Inc. on behalf of The Obesity Society (TOS).

  11. One-dimensional Gromov minimal filling problem

    NASA Astrophysics Data System (ADS)

    Ivanov, Alexandr O.; Tuzhilin, Alexey A.

    2012-05-01

    The paper is devoted to a new branch in the theory of one-dimensional variational problems with branching extremals, the investigation of one-dimensional minimal fillings introduced by the authors. On the one hand, this problem is a one-dimensional version of a generalization of Gromov's minimal fillings problem to the case of stratified manifolds. On the other hand, this problem is interesting in itself and also can be considered as a generalization of another classical problem, the Steiner problem on the construction of a shortest network connecting a given set of terminals. Besides the statement of the problem, we discuss several properties of the minimal fillings and state several conjectures. Bibliography: 38 titles.

  12. Systems Biology Perspectives on Minimal and Simpler Cells

    PubMed Central

    Xavier, Joana C.; Patil, Kiran Raosaheb

    2014-01-01

    SUMMARY The concept of the minimal cell has fascinated scientists for a long time, from both fundamental and applied points of view. This broad concept encompasses extreme reductions of genomes, the last universal common ancestor (LUCA), the creation of semiartificial cells, and the design of protocells and chassis cells. Here we review these different areas of research and identify common and complementary aspects of each one. We focus on systems biology, a discipline that is greatly facilitating the classical top-down and bottom-up approaches toward minimal cells. In addition, we also review the so-called middle-out approach and its contributions to the field with mathematical and computational models. Owing to the advances in genomics technologies, much of the work in this area has been centered on minimal genomes, or rather minimal gene sets, required to sustain life. Nevertheless, a fundamental expansion has been taking place in the last few years wherein the minimal gene set is viewed as a backbone of a more complex system. Complementing genomics, progress is being made in understanding the system-wide properties at the levels of the transcriptome, proteome, and metabolome. Network modeling approaches are enabling the integration of these different omics data sets toward an understanding of the complex molecular pathways connecting genotype to phenotype. We review key concepts central to the mapping and modeling of this complexity, which is at the heart of research on minimal cells. Finally, we discuss the distinction between minimizing the number of cellular components and minimizing cellular complexity, toward an improved understanding and utilization of minimal and simpler cells. PMID:25184563

  13. Systems biology perspectives on minimal and simpler cells.

    PubMed

    Xavier, Joana C; Patil, Kiran Raosaheb; Rocha, Isabel

    2014-09-01

    The concept of the minimal cell has fascinated scientists for a long time, from both fundamental and applied points of view. This broad concept encompasses extreme reductions of genomes, the last universal common ancestor (LUCA), the creation of semiartificial cells, and the design of protocells and chassis cells. Here we review these different areas of research and identify common and complementary aspects of each one. We focus on systems biology, a discipline that is greatly facilitating the classical top-down and bottom-up approaches toward minimal cells. In addition, we also review the so-called middle-out approach and its contributions to the field with mathematical and computational models. Owing to the advances in genomics technologies, much of the work in this area has been centered on minimal genomes, or rather minimal gene sets, required to sustain life. Nevertheless, a fundamental expansion has been taking place in the last few years wherein the minimal gene set is viewed as a backbone of a more complex system. Complementing genomics, progress is being made in understanding the system-wide properties at the levels of the transcriptome, proteome, and metabolome. Network modeling approaches are enabling the integration of these different omics data sets toward an understanding of the complex molecular pathways connecting genotype to phenotype. We review key concepts central to the mapping and modeling of this complexity, which is at the heart of research on minimal cells. Finally, we discuss the distinction between minimizing the number of cellular components and minimizing cellular complexity, toward an improved understanding and utilization of minimal and simpler cells. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  14. Shapes of embedded minimal surfaces

    PubMed Central

    Colding, Tobias H.; Minicozzi, William P.

    2006-01-01

    Surfaces that locally minimize area have been extensively used to model physical phenomena, including soap films, black holes, compound polymers, protein folding, etc. The mathematical field dates to the 1740s but has recently become an area of intense mathematical and scientific study, specifically in the areas of molecular engineering, materials science, and nanotechnology because of their many anticipated applications. In this work, we show that all minimal surfaces are built out of pieces of the surfaces in Figs. 1 and 2. PMID:16847265

  15. Minimal measures for Euler-Lagrange flows on finite covering spaces

    NASA Astrophysics Data System (ADS)

    Wang, Fang; Xia, Zhihong

    2016-12-01

    In this paper we study the minimal measures for positive definite Lagrangian systems on compact manifolds. We are particularly interested in manifolds with more complicated fundamental groups. Mather’s theory classifies the minimal or action-minimizing measures according to the first (co-)homology group of a given manifold. We extend Mather’s notion of minimal measures to a larger class for compact manifolds with non-commutative fundamental groups, and use finite coverings to study the structure of these extended minimal measures. We also define action-minimizers and minimal measures in the homotopical sense. Our program is to study the structure of homotopical minimal measures by considering Mather’s minimal measures on finite covering spaces. Our goal is to show that, in general, manifolds with a non-commutative fundamental group have a richer set of minimal measures, hence a richer dynamical structure. As an example, we study the geodesic flow on surfaces of higher genus. Indeed, by going to the finite covering spaces, the set of minimal measures is much larger and more interesting.

  16. Space filling minimal surfaces and sphere packings

    NASA Astrophysics Data System (ADS)

    Elser, Veit

    1994-05-01

    A space filling minimal surface is defined to be any embedded minimal surface without boundary with the property that the area and genus enclosed by any large spherical region scales in proportion to the volume of the region. The triply periodic minimal surfaces are one realization, but not necessarily the only one. By using the genus per unit volume of the surface, a meaningful comparison of surface areas can be made even in cases where there is no unit cell. Of the known periodic minimal surfaces this measure of the surface area is smallest for Schoen's FRD surface. This surface is one of several that is closely related to packings of spheres. Its low area is largely due to the fact that the corresponding sphere packing (fcc) has the maximal kissing number.

  17. Cigarette Price-Minimization Strategies by U.S. Smokers

    PubMed Central

    Xu, Xin; Pesko, Michael F.; Tynan, Michael A.; Gerzoff, Robert B.; Malarcher, Ann M.; Pechacek, Terry F.

    2015-01-01

    Background Smokers may react to cigarette excise tax increases by engaging in price-minimization strategies (i.e., finding ways to reduce the cost of cigarette smoking) rather than by quitting or reducing their cigarette use, thereby reducing the public health benefits of such tax increases. Purpose To evaluate the state and national prevalence of five common cigarette price-minimization strategies and the size of price reductions obtained from these strategies. Methods Using data from the 2009–2010 National Adult Tobacco Survey, the prevalence of five common price-minimization strategies by type of strategy and by smoker’s cigarette consumption level were estimated. The price reductions associated with these price-minimization strategies also were evaluated. Analyses took place in November 2012. Results Approximately 55.4% of U.S. adult smokers used at least one of five price-minimization strategies in the previous year, with an average reduction of $1.27 per pack (22.0%). Results varied widely by state. Conclusions Cigarette price-minimization strategies are practiced widely among current smokers, and resulting price reductions are relatively large. Policies that decrease opportunities to effectively apply cigarette price-minimization strategies would increase the public health gains of cigarette excise tax increases. PMID:23597810

  18. Joint Data Analysis in Nutritional Epidemiology: Identification of Observational Studies and Minimal Requirements.

    PubMed

    Pinart, Mariona; Nimptsch, Katharina; Bouwman, Jildau; Dragsted, Lars O; Yang, Chen; De Cock, Nathalie; Lachat, Carl; Perozzi, Giuditta; Canali, Raffaella; Lombardo, Rosario; D'Archivio, Massimo; Guillaume, Michèle; Donneau, Anne-Françoise; Jeran, Stephanie; Linseisen, Jakob; Kleiser, Christina; Nöthlings, Ute; Barbaresko, Janett; Boeing, Heiner; Stelmach-Mardas, Marta; Heuer, Thorsten; Laird, Eamon; Walton, Janette; Gasparini, Paolo; Robino, Antonietta; Castaño, Luis; Rojo-Martínez, Gemma; Merino, Jordi; Masana, Luis; Standl, Marie; Schulz, Holger; Biagi, Elena; Nurk, Eha; Matthys, Christophe; Gobbetti, Marco; de Angelis, Maria; Windler, Eberhard; Zyriax, Birgit-Christiane; Tafforeau, Jean; Pischon, Tobias

    2018-02-01

    Joint data analysis from multiple nutrition studies may improve the ability to answer complex questions regarding the role of nutritional status and diet in health and disease. The objective was to identify nutritional observational studies from partners participating in the European Nutritional Phenotype Assessment and Data Sharing Initiative (ENPADASI) Consortium, as well as minimal requirements for joint data analysis. A predefined template containing information on study design, exposure measurements (dietary intake, alcohol and tobacco consumption, physical activity, sedentary behavior, anthropometric measures, and sociodemographic and health status), main health-related outcomes, and laboratory measurements (traditional and omics biomarkers) was developed and circulated to those European research groups participating in the ENPADASI under the strategic research area of "diet-related chronic diseases." Information about raw data disposition and metadata sharing was requested. A set of minimal requirements was abstracted from the gathered information. Studies (12 cohort, 12 cross-sectional, and 2 case-control) were identified. Two studies recruited children only and the rest recruited adults. All studies included dietary intake data. Twenty studies collected blood samples. Data on traditional biomarkers were available for 20 studies, of which 17 measured lipoproteins, glucose, and insulin and 13 measured inflammatory biomarkers. Metabolomics, proteomics, and genomics or transcriptomics data were available in 5, 3, and 12 studies, respectively. Although the study authors were willing to share metadata, most refused, were hesitant, or had legal or ethical issues related to sharing raw data. Forty-one descriptors of minimal requirements for the study data were identified to facilitate data integration. Combining study data sets will enable sufficiently powered, refined investigations to increase the knowledge and understanding of the relation between food

  19. Behavioral Marital Bibliotherapy: An Initial Investigation of Therapeutic Efficacy.

    ERIC Educational Resources Information Center

    Bornstein, Philip H.; And Others

    1984-01-01

    Reports an attempt to validate a self-help behavioral marital bibliotherapy program. Evaluated five clinical distressed couples via a multiple baseline analysis. Treatment involved reading and exercises covering communications, problem solving, and sexual dysfunction. Results were highly variable and reflected minimal change. (BH)

  20. Power-law modeling based on least-squares minimization criteria.

    PubMed

    Hernández-Bermejo, B; Fairén, V; Sorribas, A

    1999-10-01

    The power-law formalism has been successfully used as a modeling tool in many applications. The resulting models, either as Generalized Mass Action or as S-systems models, allow one to characterize the target system and to simulate its dynamical behavior in response to external perturbations and parameter changes. The power-law formalism was first derived as a Taylor series approximation in logarithmic space for kinetic rate-laws. The especial characteristics of this approximation produce an extremely useful systemic representation that allows a complete system characterization. Furthermore, their parameters have a precise interpretation as local sensitivities of each of the individual processes and as rate-constants. This facilitates a qualitative discussion and a quantitative estimation of their possible values in relation to the kinetic properties. Following this interpretation, parameter estimation is also possible by relating the systemic behavior to the underlying processes. Without leaving the general formalism, in this paper we suggest deriving the power-law representation in an alternative way that uses least-squares minimization. The resulting power-law mimics the target rate-law in a wider range of concentration values than the classical power-law. Although the implications of this alternative approach remain to be established, our results show that the predicted steady-state using the least-squares power-law is closest to the actual steady-state of the target system.

  1. Graphical approach for multiple values logic minimization

    NASA Astrophysics Data System (ADS)

    Awwal, Abdul Ahad S.; Iftekharuddin, Khan M.

    1999-03-01

    Multiple valued logic (MVL) is sought for designing high complexity, highly compact, parallel digital circuits. However, the practical realization of an MVL-based system is dependent on optimization of cost, which directly affects the optical setup. We propose a minimization technique for MVL logic optimization based on graphical visualization, such as a Karnaugh map. The proposed method is utilized to solve signed-digit binary and trinary logic minimization problems. The usefulness of the minimization technique is demonstrated for the optical implementation of MVL circuits.

  2. Family Cognitive Behavioral Therapy for Child Anxiety Disorders

    ERIC Educational Resources Information Center

    Wood, Jeffrey J.; Piacentini, John C.; Southam-Gerow, Michael; Chu, Brian C.; Sigman, Marian

    2006-01-01

    Objective: This study compared family-focused cognitive behavioral therapy (CBT: the Building Confidence Program) with traditional child-focused CBT with minimal family involvement for children with anxiety disorders. Method: Forty clinically anxious youth (6-13 years old) were randomly assigned to a family- or child-focused cognitive-behavioral…

  3. Minimal entropy approximation for cellular automata

    NASA Astrophysics Data System (ADS)

    Fukś, Henryk

    2014-02-01

    We present a method for the construction of approximate orbits of measures under the action of cellular automata which is complementary to the local structure theory. The local structure theory is based on the idea of Bayesian extension, that is, construction of a probability measure consistent with given block probabilities and maximizing entropy. If instead of maximizing entropy one minimizes it, one can develop another method for the construction of approximate orbits, at the heart of which is the iteration of finite-dimensional maps, called minimal entropy maps. We present numerical evidence that the minimal entropy approximation sometimes outperforms the local structure theory in characterizing the properties of cellular automata. The density response curve for elementary CA rule 26 is used to illustrate this claim.

  4. Minimizing the cost of translocation failure with decision-tree models that predict species' behavioral response in translocation sites.

    PubMed

    Ebrahimi, Mehregan; Ebrahimie, Esmaeil; Bull, C Michael

    2015-08-01

    The high number of failures is one reason why translocation is often not recommended. Considering how behavior changes during translocations may improve translocation success. To derive decision-tree models for species' translocation, we used data on the short-term responses of an endangered Australian skink in 5 simulated translocations with different release conditions. We used 4 different decision-tree algorithms (decision tree, decision-tree parallel, decision stump, and random forest) with 4 different criteria (gain ratio, information gain, gini index, and accuracy) to investigate how environmental and behavioral parameters may affect the success of a translocation. We assumed behavioral changes that increased dispersal away from a release site would reduce translocation success. The trees became more complex when we included all behavioral parameters as attributes, but these trees yielded more detailed information about why and how dispersal occurred. According to these complex trees, there were positive associations between some behavioral parameters, such as fight and dispersal, that showed there was a higher chance, for example, of dispersal among lizards that fought than among those that did not fight. Decision trees based on parameters related to release conditions were easier to understand and could be used by managers to make translocation decisions under different circumstances. © 2015 Society for Conservation Biology.

  5. Minimalism in Art, Medical Science and Neurosurgery.

    PubMed

    Okten, Ali Ihsan

    2018-01-01

    The word "minimalism" is a word derived from French the word "minimum". Whereas the lexical meaning of minimum is "the least or the smallest quantity necessary for something", its expression in mathematics can be described as "the lowest step a variable number can descend, least, minimal". Minimalism, which advocates an extreme simplicity of the artistic form, is a current in modern art and music whose origins go to 1960s and which features simplicity and objectivity. Although art, science and philosophy are different disciplines, they support each other from time to time, sometimes they intertwine and sometimes they copy each other. A periodic schools or teaching in one of them can take the others into itself, so, they proceed on their ways empowering each other. It is also true for the minimalism in art and the minimal invasive surgical approaches in science. Concepts like doing with less, avoiding unnecessary materials and reducing the number of the elements in order to increase the effect in the expression which are the main elements of the minimalism in art found their equivalents in medicine and neurosurgery. Their equivalents in medicine or neurosurgery have been to protect the physical integrity of the patient with less iatrogenic injury, minimum damage and the same therapeutic effect in the most effective way and to enable the patient to regain his health in the shortest span of time. As an anticipation, we can consider that the minimal approaches started by Richard Wollheim and Barbara Rose in art and Lars Leksell, Gazi Yaşargil and other neurosurgeons in neurosurgery in the 1960s are the present day equivalents of the minimalist approaches perhaps unconsciously started by Kazimir Malevich in art and Victor Darwin L"Espinasse in neurosurgery in the early 1900s. We can also consider that they have developed interacting with each other, not by chance.

  6. Minimally conscious state or cortically mediated state?

    PubMed

    Naccache, Lionel

    2018-04-01

    Durable impairments of consciousness are currently classified in three main neurological categories: comatose state, vegetative state (also recently coined unresponsive wakefulness syndrome) and minimally conscious state. While the introduction of minimally conscious state, in 2002, was a major progress to help clinicians recognize complex non-reflexive behaviours in the absence of functional communication, it raises several problems. The most important issue related to minimally conscious state lies in its criteria: while behavioural definition of minimally conscious state lacks any direct evidence of patient's conscious content or conscious state, it includes the adjective 'conscious'. I discuss this major problem in this review and propose a novel interpretation of minimally conscious state: its criteria do not inform us about the potential residual consciousness of patients, but they do inform us with certainty about the presence of a cortically mediated state. Based on this constructive criticism review, I suggest three proposals aiming at improving the way we describe the subjective and cognitive state of non-communicating patients. In particular, I present a tentative new classification of impairments of consciousness that combines behavioural evidence with functional brain imaging data, in order to probe directly and univocally residual conscious processes.

  7. Minimally inconsistent reasoning in Semantic Web

    PubMed Central

    Zhang, Xiaowang

    2017-01-01

    Reasoning with inconsistencies is an important issue for Semantic Web as imperfect information is unavoidable in real applications. For this, different paraconsistent approaches, due to their capacity to draw as nontrivial conclusions by tolerating inconsistencies, have been proposed to reason with inconsistent description logic knowledge bases. However, existing paraconsistent approaches are often criticized for being too skeptical. To this end, this paper presents a non-monotonic paraconsistent version of description logic reasoning, called minimally inconsistent reasoning, where inconsistencies tolerated in the reasoning are minimized so that more reasonable conclusions can be inferred. Some desirable properties are studied, which shows that the new semantics inherits advantages of both non-monotonic reasoning and paraconsistent reasoning. A complete and sound tableau-based algorithm, called multi-valued tableaux, is developed to capture the minimally inconsistent reasoning. In fact, the tableaux algorithm is designed, as a framework for multi-valued DL, to allow for different underlying paraconsistent semantics, with the mere difference in the clash conditions. Finally, the complexity of minimally inconsistent description logic reasoning is shown on the same level as the (classical) description logic reasoning. PMID:28750030

  8. Mobile code security

    NASA Astrophysics Data System (ADS)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  9. Opportunistic Behavior in Motivated Learning Agents.

    PubMed

    Graham, James; Starzyk, Janusz A; Jachyra, Daniel

    2015-08-01

    This paper focuses on the novel motivated learning (ML) scheme and opportunistic behavior of an intelligent agent. It extends previously developed ML to opportunistic behavior in a multitask situation. Our paper describes the virtual world implementation of autonomous opportunistic agents learning in a dynamically changing environment, creating abstract goals, and taking advantage of arising opportunities to improve their performance. An opportunistic agent achieves better results than an agent based on ML only. It does so by minimizing the average value of all need signals rather than a dominating need. This paper applies to the design of autonomous embodied systems (robots) learning in real-time how to operate in a complex environment.

  10. Greybody factors for a minimally coupled scalar field in a three-dimensional Einstein-power-Maxwell black hole background

    NASA Astrophysics Data System (ADS)

    Panotopoulos, Grigoris; Rincón, Ángel

    2018-04-01

    In the present work we study the propagation of a probe minimally coupled scalar field in Einstein-power-Maxwell charged black hole background in (1 +2 ) dimensions. We find analytical expressions for the reflection coefficient as well as for the absorption cross section in the low energy regime, and we show graphically their behavior as functions of the frequency for several values of the free parameters of the theory.

  11. Minimal invasive treatments for liver malignancies.

    PubMed

    Orsi, Franco; Varano, Gianluca

    2015-11-01

    Minimal invasive therapies have proved useful in the management of primary and secondary hepatic malignancies. The most relevant aspects of all these therapies are their minimal toxicity profiles and highly effective tumor responses without affecting the normal hepatic parenchyma. These unique characteristics coupled with their minimally invasive nature provide an attractive therapeutic option for patients who previously may have had few alternatives. Combination of these therapies might extend indications to bring curative treatment to a wider selected population. The results of various ongoing combination trials of intraarterial therapies with targeted therapies are awaited to further improve survival in this patient group. This review focuses on the application of ablative and intra-arterial therapies in the management of hepatocellular carcinoma and hepatic colorectal metastasis. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Minimally-aggressive gestational trophoblastic neoplasms.

    PubMed

    Cole, Laurence A

    2012-04-01

    We have previously defined a new syndrome "Minimally-aggressive gestational trophoblastic neoplasms" in which choriocarcinoma or persistent hydatidiform mole has a minimal growth rate and becomes chemorefractory. Previously we described a new treatment protocol, waiting for hCG rise to >3000 mIU/ml and disease becomes more advanced, then using combination chemotherapy. Initially we found this treatment successful in 8 of 8 cases, here we find this protocol appropriate in a further 16 cases. Initially we used hyperglycosylated hCG, a limited availability test, to identify this syndrome. Here we propose also using hCG doubling rate to detect this syndrome. Minimally aggressive gestational trophoblastic disease can be detected by chemotherapy resistance or low hyperglycosylated hCG, <40% of total hCG. It can also be identified by hCG doubling rate, with doubling time greater than 2 weeks. Nineteen new cases were identified as having minimally aggressive gestational trophoblastic disease by hyperglycosylated hCG and by hCG doubling test. All were recommended to hold off further chemotherapy until hCG >3000mIU/ml. One case died prior to the start of the study, one case withdrew because of a lung nodule and one withdrew refusing the suggested combination chemotherapy. The remaining 16 women were all successfully treated. A total of 8 plus 16 or 24 of 24 women were successfully treated using the proposed protocol, holding back on chemotherapy until hCG >3000mIU/ml. Copyright © 2011 Elsevier Inc. All rights reserved.

  13. Minimizing electrode contamination in an electrochemical cell

    DOEpatents

    Kim, Yu Seung; Zelenay, Piotr; Johnston, Christina

    2014-12-09

    An electrochemical cell assembly that is expected to prevent or at least minimize electrode contamination includes one or more getters that trap a component or components leached from a first electrode and prevents or at least minimizes them from contaminating a second electrode.

  14. Behavior analysis and the study of human aging

    PubMed Central

    Derenne, Adam; Baron, Alan

    2002-01-01

    As the population of older adults continues to rise, psychologists along with other behavioral and social scientists have shown increasing interest in this age group. Although behavior analysts have contributed to research on aging, the focus has been on applications that remedy age-related deficits, rather than a concern with aging as a developmental process. In particular, there has been little interest in the central theoretical questions that have guided gerontologists. How does behavior change with advancing years, and what are the sources of those changes? We consider the possibility that this neglect reflects the long-standing commitment of behavior analysts to variables that can be experimentally manipulated, a requirement that excludes the key variable—age itself. We review the options available to researchers and present strategies that minimize deviations from the traditional features of behavior-analytic designs. Our comments are predicated on the view that aging issues within contemporary society are far too important for behavior analysts to ignore. PMID:22478383

  15. GlobalTrust: An Attack Resilient Reputation System for Tactical Networks

    DTIC Science & Technology

    2014-07-03

    MSA): Some malicious nodes misbehave while other malicious nodes, called malicious spies, behave normally by providing proper services. These...disseminate conflicting (or inconsistent) LTOs. For example, they may misbehave only to a subset of honest nodes (referred to as target nodes) to... misbehaving with prob. α honestly reporting LTOs NRA misbehaving with prob. α reporting opposite LTOs, 1− α CRA misbehaving with prob. α reporting

  16. A Prospective Randomized Study on Operative Treatment for Simple Distal Tibial Fractures-Minimally Invasive Plate Osteosynthesis Versus Minimal Open Reduction and Internal Fixation.

    PubMed

    Kim, Ji Wan; Kim, Hyun Uk; Oh, Chang-Wug; Kim, Joon-Woo; Park, Ki Chul

    2018-01-01

    To compare the radiologic and clinical results of minimally invasive plate osteosynthesis (MIPO) and minimal open reduction and internal fixation (ORIF) for simple distal tibial fractures. Randomized prospective study. Three level 1 trauma centers. Fifty-eight patients with simple and distal tibial fractures were randomized into a MIPO group (treatment with MIPO; n = 29) or a minimal group (treatment with minimal ORIF; n = 29). These numbers were designed to define the rate of soft tissue complication; therefore, validation of superiority in union time or determination of differences in rates of delayed union was limited in this study. Simple distal tibial fractures treated with MIPO or minimal ORIF. The clinical outcome measurements included operative time, radiation exposure time, and soft tissue complications. To evaluate a patient's function, the American Orthopedic Foot and Ankle Society ankle score (AOFAS) was used. Radiologic measurements included fracture alignment, delayed union, and union time. All patients acquired bone union without any secondary intervention. The mean union time was 17.4 weeks and 16.3 weeks in the MIPO and minimal groups, respectively. There was 1 case of delayed union and 1 case of superficial infection in each group. The radiation exposure time was shorter in the minimal group than in the MIPO group. Coronal angulation showed a difference between both groups. The American Orthopedic Foot and Ankle Society ankle scores were 86.0 and 86.7 in the MIPO and minimal groups, respectively. Minimal ORIF resulted in similar outcomes, with no increased rate of soft tissue problems compared to MIPO. Both MIPO and minimal ORIF have high union rates and good functional outcomes for simple distal tibial fractures. Minimal ORIF did not result in increased rates of infection and wound dehiscence. Therapeutic Level II. See Instructions for Authors for a complete description of levels of evidence.

  17. Minimally Invasive Surgery (MIS) Approaches to Thoracolumbar Trauma.

    PubMed

    Kaye, Ian David; Passias, Peter

    2018-03-01

    Minimally invasive surgical (MIS) techniques offer promising improvements in the management of thoracolumbar trauma. Recent advances in MIS techniques and instrumentation for degenerative conditions have heralded a growing interest in employing these techniques for thoracolumbar trauma. Specifically, surgeons have applied these techniques to help manage flexion- and extension-distraction injuries, neurologically intact burst fractures, and cases of damage control. Minimally invasive surgical techniques offer a means to decrease blood loss, shorten operative time, reduce infection risk, and shorten hospital stays. Herein, we review thoracolumbar minimally invasive surgery with an emphasis on thoracolumbar trauma classification, minimally invasive spinal stabilization, surgical indications, patient outcomes, technical considerations, and potential complications.

  18. Mesonic spectroscopy of minimal walking technicolor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Del Debbio, Luigi; Lucini, Biagio; Patella, Agostino

    2010-07-01

    We investigate the structure and the novel emerging features of the mesonic nonsinglet spectrum of the minimal walking technicolor theory. Precision measurements in the nonsinglet pseudoscalar and vector channels are compared to the expectations for an IR-conformal field theory and a QCD-like theory. Our results favor a scenario in which minimal walking technicolor is (almost) conformal in the infrared, while spontaneous chiral symmetry breaking seems less plausible.

  19. Minimal Intervention Dentistry – A New Frontier in Clinical Dentistry

    PubMed Central

    NK., Bajwa; A, Pathak

    2014-01-01

    Minimally invasive procedures are the new paradigm in health care. Everything from heart bypasses to gall bladder, surgeries are being performed with these dynamic new techniques. Dentistry is joining this exciting revolution as well. Minimally invasive dentistry adopts a philosophy that integrates prevention, remineralisation and minimal intervention for the placement and replacement of restorations. Minimally invasive dentistry reaches the treatment objective using the least invasive surgical approach, with the removal of the minimal amount of healthy tissues. This paper reviews in brief the concept of minimal intervention in dentistry. PMID:25177659

  20. 40 CFR 262.27 - Waste minimization certification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 26 2011-07-01 2011-07-01 false Waste minimization certification. 262.27 Section 262.27 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS APPLICABLE TO GENERATORS OF HAZARDOUS WASTE The Manifest § 262.27 Waste minimization...

  1. 40 CFR 262.27 - Waste minimization certification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 27 2012-07-01 2012-07-01 false Waste minimization certification. 262.27 Section 262.27 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS APPLICABLE TO GENERATORS OF HAZARDOUS WASTE The Manifest § 262.27 Waste minimization...

  2. 40 CFR 262.27 - Waste minimization certification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Waste minimization certification. 262.27 Section 262.27 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS APPLICABLE TO GENERATORS OF HAZARDOUS WASTE The Manifest § 262.27 Waste minimization...

  3. 40 CFR 262.27 - Waste minimization certification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 27 2013-07-01 2013-07-01 false Waste minimization certification. 262.27 Section 262.27 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS APPLICABLE TO GENERATORS OF HAZARDOUS WASTE The Manifest § 262.27 Waste minimization...

  4. 40 CFR 262.27 - Waste minimization certification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 26 2014-07-01 2014-07-01 false Waste minimization certification. 262.27 Section 262.27 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS APPLICABLE TO GENERATORS OF HAZARDOUS WASTE The Manifest § 262.27 Waste minimization...

  5. 10 CFR 20.1406 - Minimization of contamination.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Minimization of contamination. 20.1406 Section 20.1406 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Radiological Criteria for License Termination § 20.1406 Minimization of contamination. (a) Applicants for licenses, other than early...

  6. 10 CFR 20.1406 - Minimization of contamination.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Minimization of contamination. 20.1406 Section 20.1406 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Radiological Criteria for License Termination § 20.1406 Minimization of contamination. (a) Applicants for licenses, other than early...

  7. Pricing health benefits: a cost-minimization approach.

    PubMed

    Miller, Nolan H

    2005-09-01

    We study the role of health benefits in an employer's compensation strategy, given the overall goal of minimizing total compensation cost (wages plus health-insurance cost). When employees' health status is private information, the employer's basic benefit package consists of a base wage and a moderate health plan, with a generous plan available for an additional charge. We show that in setting the charge for the generous plan, a cost-minimizing employer should act as a monopolist who sells "health plan upgrades" to its workers, and we discuss ways tax policy can encourage efficiency under cost-minimization and alternative pricing rules.

  8. Learning from physics-based earthquake simulators: a minimal approach

    NASA Astrophysics Data System (ADS)

    Artale Harris, Pietro; Marzocchi, Warner; Melini, Daniele

    2017-04-01

    Physics-based earthquake simulators are aimed to generate synthetic seismic catalogs of arbitrary length, accounting for fault interaction, elastic rebound, realistic fault networks, and some simple earthquake nucleation process like rate and state friction. Through comparison of synthetic and real catalogs seismologists can get insights on the earthquake occurrence process. Moreover earthquake simulators can be used to to infer some aspects of the statistical behavior of earthquakes within the simulated region, by analyzing timescales not accessible through observations. The develoment of earthquake simulators is commonly led by the approach "the more physics, the better", pushing seismologists to go towards simulators more earth-like. However, despite the immediate attractiveness, we argue that this kind of approach makes more and more difficult to understand which physical parameters are really relevant to describe the features of the seismic catalog at which we are interested. For this reason, here we take an opposite minimal approach and analyze the behavior of a purposely simple earthquake simulator applied to a set of California faults. The idea is that a simple model may be more informative than a complex one for some specific scientific objectives, because it is more understandable. The model has three main components: the first one is a realistic tectonic setting, i.e., a fault dataset of California; the other two components are quantitative laws for earthquake generation on each single fault, and the Coulomb Failure Function for modeling fault interaction. The final goal of this work is twofold. On one hand, we aim to identify the minimum set of physical ingredients that can satisfactorily reproduce the features of the real seismic catalog, such as short-term seismic cluster, and to investigate on the hypothetical long-term behavior, and faults synchronization. On the other hand, we want to investigate the limits of predictability of the model itself.

  9. A cost-minimization analysis in minimally invasive spine surgery using a national cost scale method.

    PubMed

    Maillard, Nicolas; Buffenoir-Billet, Kevin; Hamel, Olivier; Lefranc, Benoit; Sellal, Olivier; Surer, Nathalie; Bord, Eric; Grimandi, Gael; Clouet, Johann

    2015-03-01

    The last decade has seen the emergence of minimally invasive spine surgery. However, there is still no consensus on whether percutaneous osteosynthesis (PO) or open surgery (OS) is more cost-effective in treatment of traumatic fractures and degenerative lesions. The objective of this study is to compare the clinical results and hospitalization costs of OS and PO for degenerative lesions and thoraco-lumbar fractures. This cost-minimization study was performed in patients undergoing OS or PO on a 36-month period. Patient data, surgical and clinical results, as well as cost data were collected and analyzed. The financial costs were calculated based on diagnosis related group reimbursement and the French national cost scale, enabling the evaluation of charges for each hospital stay. 46 patients were included in this cost analysis, 24 patients underwent OS and 22 underwent PO. No significant difference was found between surgical groups in terms of patient's clinical features and outcomes during the patient hospitalization. The use of PO was significantly associated with a decrease in Length Of Stay (LOS). The cost-minimization revealed that PO is associated with decreased hospital charges and shorten LOS for patients, with similar clinical outcomes and medical device cost to OS. This medico-economic study has leaded to choose preferentially the use of minimally invasive surgery techniques. This study also illustrates the discrepancy between the national health system reimbursement and real hospital charges. The medico-economic is becoming critical in the current context of sustainable health resource allocation. Copyright © 2015 Surgical Associates Ltd. Published by Elsevier Ltd. All rights reserved.

  10. Modeling the Impact of Motivation, Personality, and Emotion on Social Behavior

    NASA Astrophysics Data System (ADS)

    Miller, Lynn C.; Read, Stephen J.; Zachary, Wayne; Rosoff, Andrew

    Models seeking to predict human social behavior must contend with multiple sources of individual and group variability that underlie social behavior. One set of interrelated factors that strongly contribute to that variability - motivations, personality, and emotions - has been only minimally incorporated in previous computational models of social behavior. The Personality, Affect, Culture (PAC) framework is a theory-based computational model that addresses this gap. PAC is used to simulate social agents whose social behavior varies according to their personalities and emotions, which, in turn, vary according to their motivations and underlying motive control parameters. Examples involving disease spread and counter-insurgency operations show how PAC can be used to study behavioral variability in different social contexts.

  11. A minimal model for multiple epidemics and immunity spreading.

    PubMed

    Sneppen, Kim; Trusina, Ala; Jensen, Mogens H; Bornholdt, Stefan

    2010-10-18

    Pathogens and parasites are ubiquitous in the living world, being limited only by availability of suitable hosts. The ability to transmit a particular disease depends on competing infections as well as on the status of host immunity. Multiple diseases compete for the same resource and their fate is coupled to each other. Such couplings have many facets, for example cross-immunization between related influenza strains, mutual inhibition by killing the host, or possible even a mutual catalytic effect if host immunity is impaired. We here introduce a minimal model for an unlimited number of unrelated pathogens whose interaction is simplified to simple mutual exclusion. The model incorporates an ongoing development of host immunity to past diseases, while leaving the system open for emergence of new diseases. The model exhibits a rich dynamical behavior with interacting infection waves, leaving broad trails of immunization in the host population. This obtained immunization pattern depends only on the system size and on the mutation rate that initiates new diseases.

  12. Minimal perceptrons for memorizing complex patterns

    NASA Astrophysics Data System (ADS)

    Pastor, Marissa; Song, Juyong; Hoang, Danh-Tai; Jo, Junghyo

    2016-11-01

    Feedforward neural networks have been investigated to understand learning and memory, as well as applied to numerous practical problems in pattern classification. It is a rule of thumb that more complex tasks require larger networks. However, the design of optimal network architectures for specific tasks is still an unsolved fundamental problem. In this study, we consider three-layered neural networks for memorizing binary patterns. We developed a new complexity measure of binary patterns, and estimated the minimal network size for memorizing them as a function of their complexity. We formulated the minimal network size for regular, random, and complex patterns. In particular, the minimal size for complex patterns, which are neither ordered nor disordered, was predicted by measuring their Hamming distances from known ordered patterns. Our predictions agree with simulations based on the back-propagation algorithm.

  13. Best practices for minimally invasive procedures.

    PubMed

    Ulmer, Brenda C

    2010-05-01

    Techniques and instrumentation for minimally invasive surgical procedures originated in gynecologic surgery, but the benefits of surgery with small incisions or no incisions at all have prompted the expansion of these techniques into numerous specialties. Technologies such as robotic assistance, single-incision laparoscopic surgery, natural orifice transluminal endoscopic surgery, and video-assisted thoracoscopic surgery have led to the continued expansion of minimally invasive surgery into new specialties. With this expansion, perioperative nurses and other members of the surgical team are required to continue to learn about new technology and instrumentation, as well as the techniques and challenges involved in using new technology, to help ensure the safety of their patients. This article explores the development of minimally invasive procedures and offers suggestions for increasing patient safety. Copyright 2010 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  14. Approximate error conjugation gradient minimization methods

    DOEpatents

    Kallman, Jeffrey S

    2013-05-21

    In one embodiment, a method includes selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, calculating an approximate error using the subset of rays, and calculating a minimum in a conjugate gradient direction based on the approximate error. In another embodiment, a system includes a processor for executing logic, logic for selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, logic for calculating an approximate error using the subset of rays, and logic for calculating a minimum in a conjugate gradient direction based on the approximate error. In other embodiments, computer program products, methods, and systems are described capable of using approximate error in constrained conjugate gradient minimization problems.

  15. Minimally invasive optical biopsy for oximetry

    NASA Astrophysics Data System (ADS)

    van der Putten, Marieke A.; Brewer, James M.; Harvey, Andrew R.

    2017-02-01

    The study of localised oxygen saturation in blood vessels can shed light on the etiology and progression of many diseases with which hypoxia is associated. For example, hypoxia in the tendon has been linked to early stages of rheumatoid arthritis, an auto-immune inflammatory disease. Vascular oximetry of deep tissue presents significant challenges as vessels are not optically accessible. In this paper, we present a novel multispectral imaging technique for vascular oximetry, and recent developments made towards its adaptation for minimally invasive imaging. We present proof-of-concept of the system and illumination scheme as well as the analysis technique. We present results of a validation study performed in vivo on mice with acutely inflamed tendons. Adaptation of the technique for minimally invasive microendoscopy is also presented, along with preliminary results of minimally invasive ex vivo vascular oximetry.

  16. Methods to Improve Reliability of Video Recorded Behavioral Data

    PubMed Central

    Haidet, Kim Kopenhaver; Tate, Judith; Divirgilio-Thomas, Dana; Kolanowski, Ann; Happ, Mary Beth

    2009-01-01

    Behavioral observation is a fundamental component of nursing practice and a primary source of clinical research data. The use of video technology in behavioral research offers important advantages to nurse scientists in assessing complex behaviors and relationships between behaviors. The appeal of using this method should be balanced, however, by an informed approach to reliability issues. In this paper, we focus on factors that influence reliability, such as the use of sensitizing sessions to minimize participant reactivity and the importance of training protocols for video coders. In addition, we discuss data quality, the selection and use of observational tools, calculating reliability coefficients, and coding considerations for special populations based on our collective experiences across three different populations and settings. PMID:19434651

  17. Making the Most of Minimalism in Music.

    ERIC Educational Resources Information Center

    Geiersbach, Frederick J.

    1998-01-01

    Describes the minimalist movement in music. Discusses generations of minimalist musicians and, in general, the minimalist approach. Considers various ways that minimalist strategies can be integrated into the music classroom focusing on (1) minimalism and (2) student-centered composition and principles of minimalism for use with elementary band…

  18. Minimally invasive surgery. Future developments.

    PubMed

    Wickham, J E

    1994-01-15

    The rapid development of minimally invasive surgery means that there will be fundamental changes in interventional treatment. Technological advances will allow new minimally invasive procedures to be developed. Application of robotics will allow some procedures to be done automatically, and coupling of slave robotic instruments with virtual reality images will allow surgeons to perform operations by remote control. Miniature motors and instruments designed by microengineering could be introduced into body cavities to perform operations that are currently impossible. New materials will allow changes in instrument construction, such as use of memory metals to make heat activated scissors or forceps. With the reduced trauma associated with minimally invasive surgery, fewer operations will require long hospital stays. Traditional surgical wards will become largely redundant, and hospitals will need to cope with increased through-put of patients. Operating theatres will have to be equipped with complex high technology equipment, and hospital staff will need to be trained to manage it. Conventional nursing care will be carried out more in the community. Many traditional specialties will be merged, and surgical training will need fundamental revision to ensure that surgeons are competent to carry out the new procedures.

  19. Minimally invasive paediatric cardiac surgery.

    PubMed

    Bacha, Emile; Kalfa, David

    2014-01-01

    The concept of minimally invasive surgery for congenital heart disease in paediatric patients is broad, and has the aim of reducing the trauma of the operation at each stage of management. Firstly, in the operating room using minimally invasive incisions, video-assisted thoracoscopic and robotically assisted surgery, hybrid procedures, image-guided intracardiac surgery, and minimally invasive cardiopulmonary bypass strategies. Secondly, in the intensive-care unit with neuroprotection and 'fast-tracking' strategies that involve early extubation, early hospital discharge, and less exposure to transfused blood products. Thirdly, during postoperative mid-term and long-term follow-up by providing the children and their families with adequate support after hospital discharge. Improvement of these strategies relies on the development of new devices, real-time multimodality imaging, aids to instrument navigation, miniaturized and specialized instrumentation, robotic technology, and computer-assisted modelling of flow dynamics and tissue mechanics. In addition, dedicated multidisciplinary co-ordinated teams involving congenital cardiac surgeons, perfusionists, intensivists, anaesthesiologists, cardiologists, nurses, psychologists, and counsellors are needed before, during, and after surgery to go beyond apparent technological and medical limitations with the goal to 'treat more while hurting less'.

  20. A Cross-Layer, Anomaly-Based IDS for WSN and MANET

    PubMed Central

    Amouri, Amar; Manthena, Raju

    2018-01-01

    Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks. PMID:29470446

  1. A Cross-Layer, Anomaly-Based IDS for WSN and MANET.

    PubMed

    Amouri, Amar; Morgera, Salvatore D; Bencherif, Mohamed A; Manthena, Raju

    2018-02-22

    Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks.

  2. Minimalism. Clip and Save.

    ERIC Educational Resources Information Center

    Hubbard, Guy

    2002-01-01

    Provides background information on the art movement called "Minimalism" discussing why it started and its characteristics. Includes learning activities and information on the artist, Donald Judd. Includes a reproduction of one of his art works and discusses its content. (CMK)

  3. Gelotophobia and the Challenges of Implementing Laughter into Virtual Agents Interactions

    PubMed Central

    Ruch, Willibald F.; Platt, Tracey; Hofmann, Jennifer; Niewiadomski, Radosław; Urbain, Jérôme; Mancini, Maurizio; Dupont, Stéphane

    2014-01-01

    This study investigated which features of AVATAR laughter are perceived threatening for individuals with a fear of being laughed at (gelotophobia), and individuals with no gelotophobia. Laughter samples were systematically varied (e.g., intensity, laughter pitch, and energy for the voice, intensity of facial actions of the face) in three modalities: animated facial expressions, synthesized auditory laughter vocalizations, and motion capture generated puppets displaying laughter body movements. In the online study 123 adults completed, the GELOPH <15 > (Ruch and Proyer, 2008a,b) and rated randomly presented videos of the three modalities for how malicious, how friendly, how real the laughter was (0 not at all to 8 extremely). Additionally, an open question asked which markers led to the perception of friendliness/maliciousness. The current study identified features in all modalities of laughter stimuli that were perceived as malicious in general, and some that were gelotophobia specific. For facial expressions of AVATARS, medium intensity laughs triggered highest maliciousness in the gelotophobes. In the auditory stimuli, the fundamental frequency modulations and the variation in intensity were indicative of maliciousness. In the body, backwards and forward movements and rocking vs. jerking movements distinguished the most malicious from the least malicious laugh. From the open answers, the shape and appearance of the lips curling induced feelings that the expression was malicious for non-gelotophobes and that the movement round the eyes, elicited the face to appear as friendly. This was opposite for gelotophobes. Gelotophobia savvy AVATARS should be of high intensity, containing lip and eye movements and be fast, non-repetitive voiced vocalization, variable and of short duration. It should not contain any features that indicate a down-regulation in the voice or body, or indicate voluntary/cognitive modulation. PMID:25477803

  4. The Spectrum of Reversible Minimizers

    NASA Astrophysics Data System (ADS)

    Ureña, Antonio J.

    2018-05-01

    Poincaré and, later on, Carathéodory, showed that the Floquet multipliers of 1-dimensional periodic curves minimizing the Lagrangian action are real and positive. Even though Carathéodory himself observed that this result loses its validity in the general higherdimensional case, we shall show that it remains true for systems which are reversible in time. In this way, we also generalize a previous result by Offin on the hyperbolicity of nondegenerate symmetric minimizers. Our arguments rely on the higher-dimensional generalizations of the Sturm theory which were developed during the second half of the twentieth century by several authors, including Hartman, Morse or Arnol'd.

  5. Energy minimization on manifolds for docking flexible molecules

    PubMed Central

    Mirzaei, Hanieh; Zarbafian, Shahrooz; Villar, Elizabeth; Mottarella, Scott; Beglov, Dmitri; Vajda, Sandor; Paschalidis, Ioannis Ch.; Vakili, Pirooz; Kozakov, Dima

    2015-01-01

    In this paper we extend a recently introduced rigid body minimization algorithm, defined on manifolds, to the problem of minimizing the energy of interacting flexible molecules. The goal is to integrate moving the ligand in six dimensional rotational/translational space with internal rotations around rotatable bonds within the two molecules. We show that adding rotational degrees of freedom to the rigid moves of the ligand results in an overall optimization search space that is a manifold to which our manifold optimization approach can be extended. The effectiveness of the method is shown for three different docking problems of increasing complexity. First we minimize the energy of fragment-size ligands with a single rotatable bond as part of a protein mapping method developed for the identification of binding hot spots. Second, we consider energy minimization for docking a flexible ligand to a rigid protein receptor, an approach frequently used in existing methods. In the third problem we account for flexibility in both the ligand and the receptor. Results show that minimization using the manifold optimization algorithm is substantially more efficient than minimization using a traditional all-atom optimization algorithm while producing solutions of comparable quality. In addition to the specific problems considered, the method is general enough to be used in a large class of applications such as docking multidomain proteins with flexible hinges. The code is available under open source license (at http://cluspro.bu.edu/Code/Code_Rigtree.tar), and with minimal effort can be incorporated into any molecular modeling package. PMID:26478722

  6. Crying Behavior and the "Nonviolent" Leboyer Method of Delivery.

    ERIC Educational Resources Information Center

    Hamilton, Joan Safran

    This paper reports on a 3-month longitudinal study comparing the crying behavior of a group of babies delivered by the "nonviolent" Leboyer method with a control group delivered by traditional methods. Subjects were 24 white, middle class infants delivered by minimally medicated, multiparous and primiparous mothers. Fourteen newborns…

  7. Using Regrets to Elicit Behavior Change in Student-Athletes

    ERIC Educational Resources Information Center

    Madrigal, Leilani A.; Robbins, Jamie E.; Stanley, Christopher

    2017-01-01

    The main objective of this article is to support the notion of regret as a useful tool rather than merely a negative emotion. The article introduces means for using feelings of regret to change past behaviors, increase motivation to reach goals, and minimize future regrets in athletes and teams.

  8. Image denoising by a direct variational minimization

    NASA Astrophysics Data System (ADS)

    Janev, Marko; Atanacković, Teodor; Pilipović, Stevan; Obradović, Radovan

    2011-12-01

    In this article we introduce a novel method for the image de-noising which combines a mathematically well-posdenes of the variational modeling with the efficiency of a patch-based approach in the field of image processing. It based on a direct minimization of an energy functional containing a minimal surface regularizer that uses fractional gradient. The minimization is obtained on every predefined patch of the image, independently. By doing so, we avoid the use of an artificial time PDE model with its inherent problems of finding optimal stopping time, as well as the optimal time step. Moreover, we control the level of image smoothing on each patch (and thus on the whole image) by adapting the Lagrange multiplier using the information on the level of discontinuities on a particular patch, which we obtain by pre-processing. In order to reduce the average number of vectors in the approximation generator and still to obtain the minimal degradation, we combine a Ritz variational method for the actual minimization on a patch, and a complementary fractional variational principle. Thus, the proposed method becomes computationally feasible and applicable for practical purposes. We confirm our claims with experimental results, by comparing the proposed method with a couple of PDE-based methods, where we get significantly better denoising results specially on the oscillatory regions.

  9. Future of Minimally Invasive Colorectal Surgery

    PubMed Central

    Whealon, Matthew; Vinci, Alessio; Pigazzi, Alessio

    2016-01-01

    Minimally invasive surgery is slowly taking over as the preferred operative approach for colorectal diseases. However, many of the procedures remain technically difficult. This article will give an overview of the state of minimally invasive surgery and the many advances that have been made over the last two decades. Specifically, we discuss the introduction of the robotic platform and some of its benefits and limitations. We also describe some newer techniques related to robotics. PMID:27582647

  10. Characterization of fatigue behavior of 2-D woven fabric reinforced ceramic matrix composite at elevated temperature. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Groner, D.J.

    This study investigated the fatigue behavior and associated damage mechanisms in notched and unnotched enhanced SiC/SiC ceramic matrix composite specimens at 1100 deg C. Stiffness degradation, strain variation, and hysteresis were evaluated to characterize material behavior. Microscopic examination was performed to characterize damage mechanisms. During high cycle/low stress fatigue tests, far less fiber/matrix interface debond was evident than in low cycle/high stress fatigue tests. Notched specimens exhibited minimal stress concentration during monotonic tensile testing and minimal notch sensitivity during fatigue testing. Damage mechanisms were also similar to unnotched.

  11. Non-minimal gravitational reheating during kination

    NASA Astrophysics Data System (ADS)

    Dimopoulos, Konstantinos; Markkanen, Tommi

    2018-06-01

    A new mechanism is presented which can reheat the Universe in non-oscillatory models of inflation, where the inflation period is followed by a period dominated by the kinetic density for the inflaton field (kination). The mechanism considers an auxiliary field non-minimally coupled to gravity. The auxiliary field is a spectator during inflation, rendered heavy by the non-minimal coupling to gravity. During kination however, the non-minimal coupling generates a tachyonic mass, which displaces the field, until its bare mass becomes important, leading to coherent oscillations. Then, the field decays into the radiation bath of the hot big bang. The model is generic and predictive, in that the resulting reheating temperature is a function only of the model parameters (masses and couplings) and not of initial conditions. It is shown that reheating can be very efficient also when considering only the Standard Model.

  12. Minimally invasive versus conventional extracorporeal circulation in minimally invasive cardiac valve surgery.

    PubMed

    Baumbach, Hardy; Rustenbach, Christian; Michaelsen, Jens; Hipp, Gernot; Pressmar, Markus; Leinweber, Marco; Franke, Ulrich Friedrich Wilhelm

    2014-02-01

    Minimally invasive extracorporeal circulation (MECC) technology was applied predominantly in coronary surgery. Data regarding the application of MECC in minimally invasive valve surgery are missing largely. Patients undergoing isolated minimally invasive mitral or aortic valve procedures were allocated either to conventional extracorporeal circulation (CECC) group (n = 63) or MECC group (n = 105), and their prospectively generated data were analyzed. Demographic data were comparable between the groups regarding age (CECC vs. MECC: 71.0 ± 7.5 vs. 66.2 ± 10.1 years, p = 0.091) and logistic EuroSCORE I (6.2 ± 2.5 vs. 5.4 ± 3.0, p = 0.707). Hospital mortality was one patient in each group (1.6 vs. 1.0%, p = 0.688). The levels of leukocytes were lower in the MECC group (11.6 ± 3.2 vs. 9.4 ± 4.3 109/L, p = 0.040). Levels of platelets (137.2 ± 45.5 vs. 152.4 ± 50.3 109/L, p = 0.015) and hemoglobin (103.3 ± 11.3 vs. 107.3 ± 14.7 g/L, p = 0.017) were higher in the MECC group. Renal function was better preserved (creatinine: 1.1 ± 0.4 vs. 0.9 ± 0.2 mg/dL, p = 0.019). We were able to validate shorter time of postoperative ventilation (9.5 ± 15.1 vs. 6.3 ± 3.4 h, p = 0.054) as well as significantly shorter intensive care unit (ICU) stay (1.8 ± 1.3 vs. 1.2 ± 1.0 d, p = 0.005) for MECC patients. The course of C-reactive protein did not differ between the groups. We were able to prove the feasibility of MECC even in minimally invasive performed mitral and aortic valve procedures. In addition, the use of MECC provides decreased platelet consumption and less hemodilution. The use of MECC in these selected patients lead to a shorter ventilation time and ICU stay. Georg Thieme Verlag KG Stuttgart · New York.

  13. Minimal supervision out-patient clinical teaching.

    PubMed

    Figueiró-Filho, Ernesto Antonio; Amaral, Eliana; McKinley, Danette; Bezuidenhout, Juanita; Tekian, Ara

    2014-08-01

    Minimal faculty member supervision of students refers to a method of instruction in which the patient-student encounter is not directly supervised by a faculty member, and presents a feasible solution in clinical teaching. It is unclear, however, how such practices are perceived by patients and how they affect student learning. We aimed to assess patient and medical student perceptions of clinical teaching with minimal faculty member supervision. Questionnaires focusing on the perception of students' performance were administered to patients pre- and post-consultation. Students' self-perceptions on their performance were obtained using a questionnaire at the end of the consultation. Before encounters with students, 22 per cent of the 95 patients were not sure if they would feel comfortable or trust the students; after the consultation, almost all felt comfortable (97%) and relied on the students (99%). The 81 students surveyed agreed that instruction with minimal faculty member supervision encouraged their participation and engagement (86%). They expressed interest in knowing patients' opinions about their performance (94%), and they felt comfortable about being assessed by the patients (86%). The minimal faculty member supervision model was well accepted by patients. Responses from the final-year students support the use of assessments that incorporate feedback from patients in their overall clinical evaluations. © 2014 John Wiley & Sons Ltd.

  14. An experimental study of human pilot's scanning behavior

    NASA Technical Reports Server (NTRS)

    Washizu, K.; Tanaka, K.; Osawa, T.

    1982-01-01

    The scanning behavior and the control behavior of the pilot who manually controls the two-variable system, which is the most basic one of multi-variable systems are investigated. Two control tasks which simulate the actual airplane attitude and airspeed control were set up. In order to simulate the change of the situation where the pilot is placed, such as changes of flight phase, mission and others, the subject was requested to vary the weightings, as his control strategy, upon each task. Changes of human control dynamics and his canning properties caused by the modification of the situation were investigated. By making use of the experimental results, the optimal model of the control behavior and the scanning behavior of the pilot in the two-variable system is proposed from the standpoint of making the performance index minimal.

  15. Responsiveness and minimal clinically important changes for the Tampa Scale of Kinesiophobia after lumbar fusion during cognitive behavioral rehabilitation.

    PubMed

    Monticone, Marco; Ambrosini, Emilia; Rocca, Barbara; Foti, Calogero; Ferrante, Simona

    2017-06-01

    The Tampa Scale of Kinesiophobia (TSK) is a commonly-used measure for the assessment of fear of movement beliefs in chronic complaints, but its responsiveness in subjects after lumbar fusion has been never reported. Evaluating the responsiveness and minimal clinically important differences (MCIDs) for the TSK and its subscales after lumbar fusion. Population-based cohort study. Secondary care rehabilitation hospital. In-patients undergoing rehabilitation after lumbar fusion. At the beginning and end of a four-week motor and cognitive-behavioral rehabilitation program, 180 patients completed the TSK. After the intervention, the global perceived effect (GPE) was analyzed to produce a dichotomous outcome (improved vs. stable). Responsiveness for the TSK and its subscales were calculated by distribution (effect size [ES], standardized response mean [SRM]) and anchor-based methods (receiver operating characteristics (ROC) curves; correlations between change scores of the TSK and its subscales and GPE). ROC curves were also used to compute MCID values. The ES ranged from 1.63 to 1.77 and the SRM from 1.25 to 1.39 for TSK and its subscales. The ROC analyses revealed a value of area under the curve (0.999 [95% CI: 0.978; 1.000], 0.998 [95% CI: 0.975; 1.000], 0.990 [95% CI: 0.962; 0.999] for the TSK, Harm and Activity Avoidance subscales, respectively). MCID values greater than 6 (95% CI: >5; >6), 4 (95% CI: >3; >5), and 2 (95% CI: >2; >2) were achieved for the TSK, Harm and Activity Avoidance subscales, respectively. Correlations between change scores of the TSK and its subscales and GPE were high (0.786-0.830). The TSK and its subscales were sensitive in detecting clinical changes in subjects undergoing rehabilitation after lumbar fusion. The obtained MCID values will help in the design of future randomized controlled trials and in the interpretation of the clinical impact of a rehabilitation program after lumbar fusion.

  16. Benefit from the minimally invasive sinus technique.

    PubMed

    Salama, N; Oakley, R J; Skilbeck, C J; Choudhury, N; Jacob, A

    2009-02-01

    Sinus drainage is impeded by the transition spaces that the anterior paranasal sinuses drain into, not the ostia themselves. Addressing the transition spaces and leaving the ostia intact, using the minimally invasive sinus technique, should reverse chronic rhinosinusitis. To assess patient benefit following use of the minimally invasive sinus technique for chronic rhinosinusitis. One hundred and forty-three consecutive patients underwent the minimally invasive sinus technique for chronic rhinosinusitis. Symptoms (i.e. blocked nose, poor sense of smell, rhinorrhoea, post-nasal drip, facial pain and sneezing) were recorded using a visual analogue scale, pre-operatively and at six and 12 weeks post-operatively. Patients were also surveyed using the Glasgow benefit inventory, one and three years post-operatively. We found a significant reduction in all nasal symptom scores at six and 12 weeks post-operatively, and increased total quality of life scores at one and three years post-operatively (25.2 and 14.8, respectively). The patient benefits of treatment with the minimally invasive sinus technique compare with the published patient benefits for functional endoscopic sinus surgery.

  17. [Minimally invasive coronary artery surgery].

    PubMed

    Zalaquett, R; Howard, M; Irarrázaval, M J; Morán, S; Maturana, G; Becker, P; Medel, J; Sacco, C; Lema, G; Canessa, R; Cruz, F

    1999-01-01

    There is a growing interest to perform a left internal mammary artery (LIMA) graft to the left anterior descending coronary artery (LAD) on a beating heart through a minimally invasive access to the chest cavity. To report the experience with minimally invasive coronary artery surgery. Analysis of 11 patients aged 48 to 79 years old with single vessel disease that, between 1996 and 1997, had a LIMA graft to the LAD performed through a minimally invasive left anterior mediastinotomy, without cardiopulmonary bypass. A 6 to 10 cm left parasternal incision was done. The LIMA to the LAD anastomosis was done after pharmacological heart rate and blood pressure control and a period of ischemic pre conditioning. Graft patency was confirmed intraoperatively by standard Doppler techniques. Patients were followed for a mean of 11.6 months (7-15 months). All patients were extubated in the operating room and transferred out of the intensive care unit on the next morning. Seven patients were discharged on the third postoperative day. Duplex scanning confirmed graft patency in all patients before discharge; in two patients, it was confirmed additionally by arteriography. There was no hospital mortality, no perioperative myocardial infarction and no bleeding problems. After follow up, ten patients were free of angina, in functional class I and pleased with the surgical and cosmetic results. One patient developed atypical angina on the seventh postoperative month and a selective arteriography confirmed stenosis of the anastomosis. A successful angioplasty of the original LAD lesion was carried out. A minimally invasive left anterior mediastinotomy is a good surgical access to perform a successful LIMA to LAD graft without cardiopulmonary bypass, allowing a shorter hospital stay and earlier postoperative recovery. However, a larger experience and a longer follow up is required to define its role in the treatment of coronary artery disease.

  18. Principle of minimal work fluctuations.

    PubMed

    Xiao, Gaoyang; Gong, Jiangbin

    2015-08-01

    Understanding and manipulating work fluctuations in microscale and nanoscale systems are of both fundamental and practical interest. For example, in considering the Jarzynski equality 〈e-βW〉=e-βΔF, a change in the fluctuations of e-βW may impact how rapidly the statistical average of e-βW converges towards the theoretical value e-βΔF, where W is the work, β is the inverse temperature, and ΔF is the free energy difference between two equilibrium states. Motivated by our previous study aiming at the suppression of work fluctuations, here we obtain a principle of minimal work fluctuations. In brief, adiabatic processes as treated in quantum and classical adiabatic theorems yield the minimal fluctuations in e-βW. In the quantum domain, if a system initially prepared at thermal equilibrium is subjected to a work protocol but isolated from a bath during the time evolution, then a quantum adiabatic process without energy level crossing (or an assisted adiabatic process reaching the same final states as in a conventional adiabatic process) yields the minimal fluctuations in e-βW, where W is the quantum work defined by two energy measurements at the beginning and at the end of the process. In the classical domain where the classical work protocol is realizable by an adiabatic process, then the classical adiabatic process also yields the minimal fluctuations in e-βW. Numerical experiments based on a Landau-Zener process confirm our theory in the quantum domain, and our theory in the classical domain explains our previous numerical findings regarding the suppression of classical work fluctuations [G. Y. Xiao and J. B. Gong, Phys. Rev. E 90, 052132 (2014)].

  19. Perceived Maternal Behavioral Control, Infant Behavior, and Milk Supply: A Qualitative Study.

    PubMed

    Peacock-Chambers, Elizabeth; Dicks, Kaitlin; Sarathy, Leela; Brown, Allison A; Boynton-Jarrett, Renée

    Disparities persist in breastfeeding exclusivity and duration despite increases in breastfeeding initiation. The objective of this study was to examine factors that influence maternal decision making surrounding infant feeding practices over time in a diverse inner-city population. We conducted a prospective qualitative study with 20 mothers recruited from 2 urban primary care clinics. Participants completed open-ended interviews and demographic questionnaires in English or Spanish administered at approximately 2 weeks and 6 months postpartum. Transcripts were analyzed using a combined technique of inductive (data-driven) and deductive (theory-driven, based on the Theory of Planned Behavior) thematic analysis using 3 independent coders and iterative discussion to reach consensus. All women initiated breastfeeding, and 65% reported perceived insufficient milk (PIM). An association between PIM and behavioral control emerged as the overarching theme impacting early breastfeeding cessation and evolved over time. Early postpartum, PIM evoked maternal distress-strong emotional responses to infant crying and need to control infant behaviors. Later, mothers accepted a perceived lack of control over milk supply with minimal distress or as a natural process. Decisions to stop breastfeeding occurred through an iterative process, informed by trials of various strategies and observations of subsequent changes in infant behavior, strongly influenced by competing psychosocial demands. Infant feeding decisions evolve over time and are influenced by perceptions of control over infant behavior and milk supply. Tailored anticipatory guidance is needed to provide time-sensitive strategies to cope with challenging infant behaviors and promote maternal agency over breastfeeding in low-income populations.

  20. Plateau inflation from random non-minimal coupling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Broy, Benedict J.; Coone, Dries; Theoretische Natuurkunde,Vrije Universiteit Brussel and The International Solvay Institutes,Pleinlaan 2, B-1050 Brussels

    A generic non-minimal coupling can push any higher-order terms of the scalar potential sufficiently far out in field space to yield observationally viable plateau inflation. We provide analytic and numerical evidence that this generically happens for a non-minimal coupling strength ξ of the order N{sub e}{sup 2}. In this regime, the non-minimally coupled field is sub-Planckian during inflation and is thus protected from most higher-order terms. For larger values of ξ, the inflationary predictions converge towards the sweet spot of PLANCK. The latter includes ξ≃10{sup 4} obtained from CMB normalization arguments, thus providing a natural explanation for the inflationary observablesmore » measured.« less

  1. Adolescent Defense Style as Correlate of Problem Behavior.

    PubMed

    Huemer, Julia; Shaw, Richard J; Prunas, Antonio; Hall, Rebecca; Gross, James; Steiner, Hans

    2015-09-01

    Adolescent problem behaviors are often the visible results of intrapsychic distress. Defensive reactions are the unconscious means of managing intrapsychic distress. This cross-sectional study examines the strength of defensive style as measured by self-report on the Response Evaluation Measure (REM-71) relative to age, sex, and SES, as a correlate of internalizing and externalizing problem behaviors, as assessed by the Youth Self Report (YSR). A sample of 1,487 students from two suburban high schools completed self-report measures of defense style, self-esteem, and internalizing and externalizing problem behaviors. Demographic variables (age, sex, and SES) were included as covariates. Mature and immature defense style correlated as expected with problem behaviors. Demographic variables contributed minimally to the variance in the outcome variable. Defense style, as assessed by the REM-71, is a significant correlate of clinically elevated internalizing and externalizing problem behaviors in youth as in adults. This study adds to the convergent validity of the REM-71.

  2. [Total hip arthroplasty through anterior "minimal invasive" approach].

    PubMed

    Moerenhout, Kevin G; Cherix, Stéphane; Rüdiger, Hannes A

    2012-12-19

    Total hip replacement has seen a tremendous development and has become one of the most successful surgical interventions in orthopaedics. While during the first decades of development of total hip arthroplasty the fixation of the implant into the bone was the main concern, the focus has shifted towards surgical technique and soft tissue handling. In order to avoid permanent soft tissue damage, muscular dysfunction and concerns in regards to cosmetics, minimal invasive and anatomic approaches have been developed. We here provide a short overview on various methods of total hip replacements and we describe our technique through a minimal invasive direct anterior approach. While muscle and nerve damage is minimal, this technique allows for a rapid rehabilitation and is associated with an excellent functional outcome and a minimal risk for dislocation.

  3. Minimally invasive surgery. Future developments.

    PubMed Central

    Wickham, J. E.

    1994-01-01

    The rapid development of minimally invasive surgery means that there will be fundamental changes in interventional treatment. Technological advances will allow new minimally invasive procedures to be developed. Application of robotics will allow some procedures to be done automatically, and coupling of slave robotic instruments with virtual reality images will allow surgeons to perform operations by remote control. Miniature motors and instruments designed by microengineering could be introduced into body cavities to perform operations that are currently impossible. New materials will allow changes in instrument construction, such as use of memory metals to make heat activated scissors or forceps. With the reduced trauma associated with minimally invasive surgery, fewer operations will require long hospital stays. Traditional surgical wards will become largely redundant, and hospitals will need to cope with increased through-put of patients. Operating theatres will have to be equipped with complex high technology equipment, and hospital staff will need to be trained to manage it. Conventional nursing care will be carried out more in the community. Many traditional specialties will be merged, and surgical training will need fundamental revision to ensure that surgeons are competent to carry out the new procedures. Images Fig 1 Fig 2 Fig 3 Fig 4 Fig 5 PMID:8312776

  4. Energy barriers, entropy barriers, and non-Arrhenius behavior in a minimal glassy model.

    PubMed

    Du, Xin; Weeks, Eric R

    2016-06-01

    We study glassy dynamics using a simulation of three soft Brownian particles confined to a two-dimensional circular region. If the circular region is large, the disks freely rearrange, but rearrangements are rarer for smaller system sizes. We directly measure a one-dimensional free-energy landscape characterizing the dynamics. This landscape has two local minima corresponding to the two distinct disk configurations, separated by a free-energy barrier that governs the rearrangement rate. We study several different interaction potentials and demonstrate that the free-energy barrier is composed of a potential-energy barrier and an entropic barrier. The heights of both of these barriers depend on temperature and system size, demonstrating how non-Arrhenius behavior can arise close to the glass transition.

  5. [Development and future of minimally invasive surgery in western China].

    PubMed

    Yu, Peiwu; Hao, Yingxue

    2017-03-25

    There are vast land and lots of people in western China, but the economy developing is relatively slow. However, the minimally invasive surgery was carried out firstly in China. Moreover, the type, number and difficulty of the minimally invasive surgery increased year by year. Especially, in the western area of China, Dr Zhou Zongguang, Yu Peiwu and Zheng Shuguo et al. have performed much pioneering work in laparoscopic surgery for rectal cancer, gastric cancer and laparoscopic liver resection. They led the standard development of minimally invasive in China. In the future, western China should continue to strengthen the standardized training of minimally invasive surgery, make great effort to carry out evidence-based research of minimally invasive surgery, provide evidences of high level of clinical application in minimally invasive surgery. At the same time, we should carry out the robotic and 3D laparoscopic surgery actively, leading the development of minimally invasive surgery more standardized and more widespread in western China.

  6. Surveying FIFA Instructors' Behavioral Intention toward the Multimedia Teaching Materials

    ERIC Educational Resources Information Center

    Armenteros, M.; Liaw, Shu-Sheng; Fernandez, M.; Diaz, R. Flores; Sanchez, R. Arteaga

    2013-01-01

    Instruction delivered via multimedia applications is changing the way elite football refereeing instructors teach the Laws of the Game. Although e-learning applications are popular, there is minimal research on instructors' attitudes toward these teaching materials. The purpose of this research is to explore instructors' behavioral intentions…

  7. Next-to-minimal SOFTSUSY

    NASA Astrophysics Data System (ADS)

    Allanach, B. C.; Athron, P.; Tunstall, Lewis C.; Voigt, A.; Williams, A. G.

    2014-09-01

    We describe an extension to the SOFTSUSY program that provides for the calculation of the sparticle spectrum in the Next-to-Minimal Supersymmetric Standard Model (NMSSM), where a chiral superfield that is a singlet of the Standard Model gauge group is added to the Minimal Supersymmetric Standard Model (MSSM) fields. Often, a Z3 symmetry is imposed upon the model. SOFTSUSY can calculate the spectrum in this case as well as the case where general Z3 violating (denoted as =) terms are added to the soft supersymmetry breaking terms and the superpotential. The user provides a theoretical boundary condition for the couplings and mass terms of the singlet. Radiative electroweak symmetry breaking data along with electroweak and CKM matrix data are used as weak-scale boundary conditions. The renormalisation group equations are solved numerically between the weak scale and a high energy scale using a nested iterative algorithm. This paper serves as a manual to the NMSSM mode of the program, detailing the approximations and conventions used. Catalogue identifier: ADPM_v4_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADPM_v4_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 154886 No. of bytes in distributed program, including test data, etc.: 1870890 Distribution format: tar.gz Programming language: C++, fortran. Computer: Personal computer. Operating system: Tested on Linux 3.x. Word size: 64 bits Classification: 11.1, 11.6. Does the new version supersede the previous version?: Yes Catalogue identifier of previous version: ADPM_v3_0 Journal reference of previous version: Comput. Phys. Comm. 183 (2012) 785 Nature of problem: Calculating supersymmetric particle spectrum and mixing parameters in the next-to-minimal supersymmetric standard model. The solution to the

  8. Markovian robots: Minimal navigation strategies for active particles

    NASA Astrophysics Data System (ADS)

    Nava, Luis Gómez; Großmann, Robert; Peruani, Fernando

    2018-04-01

    We explore minimal navigation strategies for active particles in complex, dynamical, external fields, introducing a class of autonomous, self-propelled particles which we call Markovian robots (MR). These machines are equipped with a navigation control system (NCS) that triggers random changes in the direction of self-propulsion of the robots. The internal state of the NCS is described by a Boolean variable that adopts two values. The temporal dynamics of this Boolean variable is dictated by a closed Markov chain—ensuring the absence of fixed points in the dynamics—with transition rates that may depend exclusively on the instantaneous, local value of the external field. Importantly, the NCS does not store past measurements of this value in continuous, internal variables. We show that despite the strong constraints, it is possible to conceive closed Markov chain motifs that lead to nontrivial motility behaviors of the MR in one, two, and three dimensions. By analytically reducing the complexity of the NCS dynamics, we obtain an effective description of the long-time motility behavior of the MR that allows us to identify the minimum requirements in the design of NCS motifs and transition rates to perform complex navigation tasks such as adaptive gradient following, detection of minima or maxima, or selection of a desired value in a dynamical, external field. We put these ideas in practice by assembling a robot that operates by the proposed minimalistic NCS to evaluate the robustness of MR, providing a proof of concept that is possible to navigate through complex information landscapes with such a simple NCS whose internal state can be stored in one bit. These ideas may prove useful for the engineering of miniaturized robots.

  9. Behavior Therapy for Pediatric Trichotillomania: A Randomized Controlled Trial

    ERIC Educational Resources Information Center

    Franklin, Martin E.; Edson, Aubrey L.; Ledley, Deborah A.; Cahill, Shawn P.

    2011-01-01

    Objective: To examine the efficacy and durability of a behavioral therapy (BT) protocol for pediatric TTM compared with a minimal attention control (MAC) condition. It was hypothesized that the BT condition would be superior to MAC at the end of acute treatment, and would also demonstrate durability of gains through the maintenance treatment…

  10. Mitigating Inadvertent Insider Threats with Incentives

    NASA Astrophysics Data System (ADS)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  11. General minimal surface solution for gravitational instantons

    NASA Astrophysics Data System (ADS)

    Aliev, A. N.; Kalaycı, J.; Nutku, Y.

    1997-07-01

    We construct the general instanton metric obtained from Weierstrass' general local solution for minimal surfaces using the correspondence between minimal surfaces in three-dimensional Euclidean space and gravitational instantons admitting two Killing vectors. The resulting metric contains one arbitrary analytic function and we show that it can be transformed to the Gibbons-Hawking form of an instanton metric that was reported earlier.

  12. Flattening the inflaton potential beyond minimal gravity

    NASA Astrophysics Data System (ADS)

    Lee, Hyun Min

    2018-01-01

    We review the status of the Starobinsky-like models for inflation beyond minimal gravity and discuss the unitarity problem due to the presence of a large non-minimal gravity coupling. We show that the induced gravity models allow for a self-consistent description of inflation and discuss the implications of the inflaton couplings to the Higgs field in the Standard Model.

  13. Self-esteem, self-serving cognitions, and health risk behavior.

    PubMed

    Gerrard, M; Gibbons, F X; Reis-Bergan, M; Russell, D W

    2000-12-01

    The current article reviews prospective and experimental research on the relation between self-esteem and perceptions of vulnerability. These studies demonstrate that individuals with high self-esteem who engage in risk behavior often utilize a variety of self-serving cognitive strategies that protect them from fully acknowledging their vulnerability to the potential negative consequences of their behavior; e.g., they minimize their estimates of personal risk and overestimate the prevalence of the risk behavior among their peers. The article also provides data on an additional self-serving cognitive strategy employed by adolescents with high self-esteem--alteration of perceptions of others' reactions to their own risk behavior. Finally, the article reviews the emerging literature on the relation between these cognitive strategies and maladaptive health behavior, and proposes that whether these strategies are maladaptive depends on the nature of the threat and the availability of opportunities to engage in compensatory self-enhancement.

  14. Minimal Absent Words in Four Human Genome Assemblies

    PubMed Central

    Garcia, Sara P.; Pinho, Armando J.

    2011-01-01

    Minimal absent words have been computed in genomes of organisms from all domains of life. Here, we aim to contribute to the catalogue of human genomic variation by investigating the variation in number and content of minimal absent words within a species, using four human genome assemblies. We compare the reference human genome GRCh37 assembly, the HuRef assembly of the genome of Craig Venter, the NA12878 assembly from cell line GM12878, and the YH assembly of the genome of a Han Chinese individual. We find the variation in number and content of minimal absent words between assemblies more significant for large and very large minimal absent words, where the biases of sequencing and assembly methodologies become more pronounced. Moreover, we find generally greater similarity between the human genome assemblies sequenced with capillary-based technologies (GRCh37 and HuRef) than between the human genome assemblies sequenced with massively parallel technologies (NA12878 and YH). Finally, as expected, we find the overall variation in number and content of minimal absent words within a species to be generally smaller than the variation between species. PMID:22220210

  15. Crystal growth and annealing for minimized residual stress

    DOEpatents

    Gianoulakis, Steven E.

    2002-01-01

    A method and apparatus for producing crystals that minimizes birefringence even at large crystal sizes, and is suitable for production of CaF.sub.2 crystals. The method of the present invention comprises annealing a crystal by maintaining a minimal temperature gradient in the crystal while slowly reducing the bulk temperature of the crystal. An apparatus according to the present invention includes a thermal control system added to a crystal growth and annealing apparatus, wherein the thermal control system allows a temperature gradient during crystal growth but minimizes the temperature gradient during crystal annealing.

  16. Entrepreneur environment management behavior evaluation method derived from environmental economy.

    PubMed

    Zhang, Lili; Hou, Xilin; Xi, Fengru

    2013-12-01

    Evaluation system can encourage and guide entrepreneurs, and impel them to perform well in environment management. An evaluation method based on advantage structure is established. It is used to analyze entrepreneur environment management behavior in China. Entrepreneur environment management behavior evaluation index system is constructed based on empirical research. Evaluation method of entrepreneurs is put forward, from the point of objective programming-theory to alert entrepreneurs concerned to think much of it, which means to take minimized objective function as comprehensive evaluation result and identify disadvantage structure pattern. Application research shows that overall behavior of Chinese entrepreneurs environmental management are good, specially, environment strategic behavior are best, environmental management behavior are second, cultural behavior ranks last. Application results show the efficiency and feasibility of this method. Copyright © 2013 The Research Centre for Eco-Environmental Sciences, Chinese Academy of Sciences. Published by Elsevier B.V. All rights reserved.

  17. Resveratrol in Patients with Minimal Hepatic Encephalopathy

    PubMed Central

    Bertino, Gaetano; Motta, Massimo; Borzì, Antonio Maria; Vicari, Enzo; Bella, Rita; Drago, Filippo

    2018-01-01

    Background: Minimal Hepatic Encephalopathy (MHE) is characterized by an impairment of social interaction, emotional behavior, sleep disorders, physical and mental symptoms, and diminished Quality of Life (QoL). The aim of our study is evaluating the potential liver health promoting a perspective of Resveratrol (RV) activities and evaluate whether RV treatment may improve health related quality of life (HRQL) and reduce depression and anxiety in patients with MHE. Methods: We evaluated depression using the Beck Depression Inventory test, anxiety with State-trait anxiety inventory test, quality of life through SF-36 test, and ammonia serum levels in 70 MHE patients that were randomized into two groups. Results: In the comparison between RV group and placebo group we observed a decrease in Back Depression Inventory (BDI) (p < 0.001), in State-trait anxiety inventory (STAI) (p < 0.001), and improve in physical function (p < 0.001), in role physical (p < 0.05), in body pain (p < 0.05), in general health (p < 0.001), in vitality (p < 0.05), and in social function (p < 0.001). Conclusions: Resveratrol showed efficacy in the treatment of depression, anxiety, and ammonia serum levels, and improved the quality of life Of MHE patients. PMID:29522439

  18. Gravitational instantons from minimal surfaces

    NASA Astrophysics Data System (ADS)

    Aliev, A. N.; Hortaçsu, M.; Kalayci, J.; Nutku, Y.

    1999-02-01

    Physical properties of gravitational instantons which are derivable from minimal surfaces in three-dimensional Euclidean space are examined using the Newman-Penrose formalism for Euclidean signature. The gravitational instanton that corresponds to the helicoid minimal surface is investigated in detail. This is a metric of Bianchi type 0264-9381/16/2/024/img9, or E(2), which admits a hidden symmetry due to the existence of a quadratic Killing tensor. It leads to a complete separation of variables in the Hamilton-Jacobi equation for geodesics, as well as in Laplace's equation for a massless scalar field. The scalar Green function can be obtained in closed form, which enables us to calculate the vacuum fluctuations of a massless scalar field in the background of this instanton.

  19. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications

    PubMed Central

    Karim, Ahmad; Salleh, Rosli; Khan, Muhammad Khurram

    2016-01-01

    Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks’ back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps’ detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies. PMID:26978523

  20. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications.

    PubMed

    Karim, Ahmad; Salleh, Rosli; Khan, Muhammad Khurram

    2016-01-01

    Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks' back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps' detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies.

  1. Effects of Behavioral and Pharmacological Treatment on Smokeless Tobacco Users.

    ERIC Educational Resources Information Center

    Hatsukami, Dorothy; And Others

    1996-01-01

    Examined the effects of 2 mg of nicotine polacrilex versus placebo gum and a group behavioral treatment versus minimal contact on cessation of smokeless tobacco use. Participants (n=210) were randomly assigned 1 of the 4 treatment conditions. Withdrawal symptoms were assessed throughout the treatment. Discusses findings. (KW)

  2. A videoscope for use in minimally invasive periodontal surgery.

    PubMed

    Harrel, Stephen K; Wilson, Thomas G; Rivera-Hidalgo, Francisco

    2013-09-01

    Minimally invasive periodontal procedures have been reported to produce excellent clinical results. Visualization during minimally invasive procedures has traditionally been obtained by the use of surgical telescopes, surgical microscopes, glass fibre endoscopes or a combination of these devices. All of these methods for visualization are less than fully satisfactory due to problems with access, magnification and blurred imaging. A videoscope for use with minimally invasive periodontal procedures has been developed to overcome some of the difficulties that exist with current visualization approaches. This videoscope incorporates a gas shielding technology that eliminates the problems of fogging and fouling of the optics of the videoscope that has previously prevented the successful application of endoscopic visualization to periodontal surgery. In addition, as part of the gas shielding technology the videoscope also includes a moveable retractor specifically adapted for minimally invasive surgery. The clinical use of the videoscope during minimally invasive periodontal surgery is demonstrated and discussed. The videoscope with gas shielding alleviates many of the difficulties associated with visualization during minimally invasive periodontal surgery. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  3. On the minimal risk threshold in research with children.

    PubMed

    Binik, Ariella

    2014-01-01

    To protect children in research, procedures that are not administered in the medical interests of a child must be restricted. The risk threshold for these procedures is generally measured according to the concept of minimal risk. Minimal risk is often defined according to the risks of "daily life." But it is not clear whose daily life should serve as the baseline; that is, it is not clear to whom minimal risk should refer. Commentators in research ethics often argue that "minimal risk" should refer to healthy children or the subjects of the research. I argue that neither of these interpretations is successful. I propose a new interpretation in which minimal risk refers to children who are not unduly burdened by their daily lives. I argue that children are not unduly burdened when they fare well, and I defend a substantive goods account of children's welfare.

  4. Local Risk-Minimization for Defaultable Claims with Recovery Process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Biagini, Francesca, E-mail: biagini@mathematik.uni-muenchen.de; Cretarola, Alessandra, E-mail: alessandra.cretarola@dmi.unipg.it

    We study the local risk-minimization approach for defaultable claims with random recovery at default time, seen as payment streams on the random interval [0,{tau} Logical-And T], where T denotes the fixed time-horizon. We find the pseudo-locally risk-minimizing strategy in the case when the agent information takes into account the possibility of a default event (local risk-minimization with G-strategies) and we provide an application in the case of a corporate bond. We also discuss the problem of finding a pseudo-locally risk-minimizing strategy if we suppose the agent obtains her information only by observing the non-defaultable assets.

  5. Behavior of flavonols and carotenoids of minimally processed kale leaves during storage in passive modified atmosphere packaging.

    PubMed

    Kobori, C N; Huber, L S; Sarantópoulos, C I G L; Rodriguez-Amaya, D B

    2011-03-01

    Minimally processed kale leaves were packed in passive modified atmosphere and stored at 3 conditions: 1 °C in the dark and 11 °C with or without light exposure. The products were evaluated during storage in terms of headspace gas composition, sensory attributes, flavonol, and carotenoid contents. The sensory quality decreased slightly during 17 d at 1 °C in the dark. At 11 °C, the vegetable shelf life was predicted to be 6 d in the dark and 3 d with light. Quercetin and kaempferol were stable during storage for 15 d at 1 °C in the absence of light. At 11 °C in the dark, quercetin was stable during 10 d, increasing slightly on the 8th day. Kaempferol decreased up to the 5th day but increased on the 8th day, decreasing again on the 10th day. After 5 d at 11 °C under light, the flavonol levels were significantly higher than those of the initial values. Neoxanthin and violaxanthin did not change significantly after 15 d at 1 °C in the dark. Lutein and β-carotene, however, decreased 7.1% and 11.3%, respectively. At 11 °C in the dark, neoxanthin, violaxanthin, lutein, and β-carotene decreased 16.1%, 13.2%, 24.1%, and 23.7% after 10 d, respectively. At 11 °C under light, neoxanthin and lutein had a slight increase while violaxanthin and β-carotene decreased 23.1% and 16.5% after 5 d. Practical Application:  Passive modified atmosphere packaging together with refrigeration can extend the shelf life of minimally processed kale, retaining the health-promoting compounds, flavonols and carotenoids. Quercetin, kaempferol, neoxanthin, and violaxanthin are stable and lutein and β-carotene slightly reduced.

  6. WASTE MINIMIZATION AUDIT REPORT: CASE STUDIES OF MINIMIZATION OF CYANIDE WASTE FROM ELECTROPLATING OPERATIONS

    EPA Science Inventory

    To promote waste minimization activities in accordance with the national policy objectives established under the 1984 Hazardous and Solid Waste Amendments to the Resource Conservation and Recovery Act of 1976 (RCRA), the Hazardous Waste Engineering Research Laboratory (HWERL) of ...

  7. Minimal Length Scale Scenarios for Quantum Gravity.

    PubMed

    Hossenfelder, Sabine

    2013-01-01

    We review the question of whether the fundamental laws of nature limit our ability to probe arbitrarily short distances. First, we examine what insights can be gained from thought experiments for probes of shortest distances, and summarize what can be learned from different approaches to a theory of quantum gravity. Then we discuss some models that have been developed to implement a minimal length scale in quantum mechanics and quantum field theory. These models have entered the literature as the generalized uncertainty principle or the modified dispersion relation, and have allowed the study of the effects of a minimal length scale in quantum mechanics, quantum electrodynamics, thermodynamics, black-hole physics and cosmology. Finally, we touch upon the question of ways to circumvent the manifestation of a minimal length scale in short-distance physics.

  8. Minimal Competency Exam Program.

    ERIC Educational Resources Information Center

    Griffith, E. H.

    The high school minimal competency examination described in this document is part one of a three-part program that requires that all students satisfactorily complete tests in reading, language arts, and mathematics prior to receiving a high school diploma. The document outlines the test development and assessment program and describes the plan for…

  9. Rasmussen's model of human behavior in laparoscopy training.

    PubMed

    Wentink, M; Stassen, L P S; Alwayn, I; Hosman, R J A W; Stassen, H G

    2003-08-01

    Compared to aviation, where virtual reality (VR) training has been standardized and simulators have proven their benefits, the objectives, needs, and means of VR training in minimally invasive surgery (MIS) still have to be established. The aim of the study presented is to introduce Rasmussen's model of human behavior as a practical framework for the definition of the training objectives, needs, and means in MIS. Rasmussen distinguishes three levels of human behavior: skill-, rule-, and knowledge-based behaviour. The training needs of a laparoscopic novice can be determined by identifying the specific skill-, rule-, and knowledge-based behavior that is required for performing safe laparoscopy. Future objectives of VR laparoscopy trainers should address all three levels of behavior. Although most commercially available simulators for laparoscopy aim at training skill-based behavior, especially the training of knowledge-based behavior during complications in surgery will improve safety levels. However, the cost and complexity of a training means increases when the training objectives proceed from the training of skill-based behavior to the training of complex knowledge-based behavior. In aviation, human behavior models have been used successfully to integrate the training of skill-, rule-, and knowledge-based behavior in a full flight simulator. Understanding surgeon behavior is one of the first steps towards a future full-scale laparoscopy simulator.

  10. Cognitive-Behavioral Therapy for Anxiety in Youth with an Autism Spectrum Disorder: A Follow-Up Study

    ERIC Educational Resources Information Center

    Selles, Robert R.; Arnold, Elysse B.; Phares, Vicky; Lewin, Adam B.; Murphy, Tanya K.; Storch, Eric A.

    2015-01-01

    Cognitive-behavioral therapy for anxiety in youth with an autism spectrum disorder appears efficacious; however, maintenance of treatment gains has not yet been studied. Using a sample of 32 youth who had benefited at least minimally from a past trial of cognitive-behavioral therapy for anxiety in autism spectrum disorder, this study assessed…

  11. Charge and energy minimization in electrical/magnetic stimulation of nervous tissue

    NASA Astrophysics Data System (ADS)

    Jezernik, Sašo; Sinkjaer, Thomas; Morari, Manfred

    2010-08-01

    In this work we address the problem of stimulating nervous tissue with the minimal necessary energy at reduced/minimal charge. Charge minimization is related to a valid safety concern (avoidance and reduction of stimulation-induced tissue and electrode damage). Energy minimization plays a role in battery-driven electrical or magnetic stimulation systems (increased lifetime, repetition rates, reduction of power requirements, thermal management). Extensive new theoretical results are derived by employing an optimal control theory framework. These results include derivation of the optimal electrical stimulation waveform for a mixed energy/charge minimization problem, derivation of the charge-balanced energy-minimal electrical stimulation waveform, solutions of a pure charge minimization problem with and without a constraint on the stimulation amplitude, and derivation of the energy-minimal magnetic stimulation waveform. Depending on the set stimulus pulse duration, energy and charge reductions of up to 80% are deemed possible. Results are verified in simulations with an active, mammalian-like nerve fiber model.

  12. Charge and energy minimization in electrical/magnetic stimulation of nervous tissue.

    PubMed

    Jezernik, Saso; Sinkjaer, Thomas; Morari, Manfred

    2010-08-01

    In this work we address the problem of stimulating nervous tissue with the minimal necessary energy at reduced/minimal charge. Charge minimization is related to a valid safety concern (avoidance and reduction of stimulation-induced tissue and electrode damage). Energy minimization plays a role in battery-driven electrical or magnetic stimulation systems (increased lifetime, repetition rates, reduction of power requirements, thermal management). Extensive new theoretical results are derived by employing an optimal control theory framework. These results include derivation of the optimal electrical stimulation waveform for a mixed energy/charge minimization problem, derivation of the charge-balanced energy-minimal electrical stimulation waveform, solutions of a pure charge minimization problem with and without a constraint on the stimulation amplitude, and derivation of the energy-minimal magnetic stimulation waveform. Depending on the set stimulus pulse duration, energy and charge reductions of up to 80% are deemed possible. Results are verified in simulations with an active, mammalian-like nerve fiber model.

  13. Theory of invasion extinction dynamics in minimal food webs

    NASA Astrophysics Data System (ADS)

    Haerter, Jan O.; Mitarai, Namiko; Sneppen, Kim

    2018-02-01

    When food webs are exposed to species invasion, secondary extinction cascades may be set off. Although much work has gone into characterizing the structure of food webs, systematic predictions on their evolutionary dynamics are still scarce. Here we present a theoretical framework that predicts extinctions in terms of an alternating sequence of two basic processes: resource depletion by or competitive exclusion between consumers. We first propose a conceptual invasion extinction model (IEM) involving random fitness coefficients. We bolster this IEM by an analytical, recursive procedure for calculating idealized extinction cascades after any species addition and simulate the long-time evolution. Our procedure describes minimal food webs where each species interacts with only a single resource through the generalized Lotka-Volterra equations. For such food webs ex- tinction cascades are determined uniquely and the system always relaxes to a stable steady state. The dynamics and scale invariant species life time resemble the behavior of the IEM, and correctly predict an upper limit for trophic levels as observed in the field.

  14. Theory of invasion extinction dynamics in minimal food webs.

    PubMed

    Haerter, Jan O; Mitarai, Namiko; Sneppen, Kim

    2018-02-01

    When food webs are exposed to species invasion, secondary extinction cascades may be set off. Although much work has gone into characterizing the structure of food webs, systematic predictions on their evolutionary dynamics are still scarce. Here we present a theoretical framework that predicts extinctions in terms of an alternating sequence of two basic processes: resource depletion by or competitive exclusion between consumers. We first propose a conceptual invasion extinction model (IEM) involving random fitness coefficients. We bolster this IEM by an analytical, recursive procedure for calculating idealized extinction cascades after any species addition and simulate the long-time evolution. Our procedure describes minimal food webs where each species interacts with only a single resource through the generalized Lotka-Volterra equations. For such food webs ex- tinction cascades are determined uniquely and the system always relaxes to a stable steady state. The dynamics and scale invariant species life time resemble the behavior of the IEM, and correctly predict an upper limit for trophic levels as observed in the field.

  15. Mitral valve surgery - minimally invasive

    MedlinePlus

    ... flow. Your valve has developed an infection (infectious endocarditis). You have severe mitral valve prolapse that is ... function. Damage to your heart valve from infection (endocarditis). A minimally invasive procedure has many benefits. There ...

  16. On the convergence of nonconvex minimization methods for image recovery.

    PubMed

    Xiao, Jin; Ng, Michael Kwok-Po; Yang, Yu-Fei

    2015-05-01

    Nonconvex nonsmooth regularization method has been shown to be effective for restoring images with neat edges. Fast alternating minimization schemes have also been proposed and developed to solve the nonconvex nonsmooth minimization problem. The main contribution of this paper is to show the convergence of these alternating minimization schemes, based on the Kurdyka-Łojasiewicz property. In particular, we show that the iterates generated by the alternating minimization scheme, converges to a critical point of this nonconvex nonsmooth objective function. We also extend the analysis to nonconvex nonsmooth regularization model with box constraints, and obtain similar convergence results of the related minimization algorithm. Numerical examples are given to illustrate our convergence analysis.

  17. Minimally invasive PCNL-MIP.

    PubMed

    Zanetti, Stefano Paolo; Boeri, Luca; Gallioli, Andrea; Talso, Michele; Montanari, Emanuele

    2017-01-01

    Miniaturized percutaneous nephrolithotomy (mini-PCNL) has increased in popularity in recent years and is now widely used to overcome the therapeutic gap between conventional PCNL and less-invasive procedures such as shock wave lithotripsy (SWL) or flexible ureterorenoscopy (URS) for the treatment of renal stones. However, despite its minimally invasive nature, the superiority in terms of safety, as well as the similar efficacy of mini-PCNL compared to conventional procedures, is still under debate. The aim of this chapter is to present one of the most recent advancements in terms of mini-PCNL: the Karl Storz "minimally invasive PCNL" (MIP). A literature search for original and review articles either published or e-published up to December 2016 was performed using Google and the PubMed database. Keywords included: minimally invasive PCNL; MIP. The retrieved articles were gathered and examined. The complete MIP set is composed of different sized rigid metallic fiber-optic nephroscopes and different sized metallic operating sheaths, according to which the MIP is categorized into extra-small (XS), small (S), medium (M) and large (L). Dilation can be performed either in one-step or with a progressive technique, as needed. The reusable devices of the MIP and vacuum cleaner efect make PCNL with this set a cheap procedure. The possibility to shift from a small to a larger instrument within the same set (Matrioska technique) makes MIP a very versatile technique suitable for the treatment of almost any stone. Studies in the literature have shown that MIP is equally effective, with comparable rates of post-operative complications, as conventional PCNL, independently from stone size. MIP does not represent a new technique, but rather a combination of the last ten years of PCNL improvements in a single system that can transversally cover all available techniques in the panorama of percutaneous stone treatment.

  18. Evolved Minimal Frustration in Multifunctional Biomolecules.

    PubMed

    Röder, Konstantin; Wales, David J

    2018-05-25

    Protein folding is often viewed in terms of a funnelled potential or free energy landscape. A variety of experiments now indicate the existence of multifunnel landscapes, associated with multifunctional biomolecules. Here, we present evidence that these systems have evolved to exhibit the minimal number of funnels required to fulfil their cellular functions, suggesting an extension to the principle of minimum frustration. We find that minimal disruptive mutations result in additional funnels, and the associated structural ensembles become more diverse. The same trends are observed in an atomic cluster. These observations suggest guidelines for rational design of engineered multifunctional biomolecules.

  19. Optimal minimal measurements of mixed states

    NASA Astrophysics Data System (ADS)

    Vidal, G.; Latorre, J. I.; Pascual, P.; Tarrach, R.

    1999-07-01

    The optimal and minimal measuring strategy is obtained for a two-state system prepared in a mixed state with a probability given by any isotropic a priori distribution. We explicitly construct the specific optimal and minimal generalized measurements, which turn out to be independent of the a priori probability distribution, obtaining the best guesses for the unknown state as well as a closed expression for the maximal mean-average fidelity. We do this for up to three copies of the unknown state in a way that leads to the generalization to any number of copies, which we then present and prove.

  20. Energy-efficient ECG compression on wireless biosensors via minimal coherence sensing and weighted ℓ₁ minimization reconstruction.

    PubMed

    Zhang, Jun; Gu, Zhenghui; Yu, Zhu Liang; Li, Yuanqing

    2015-03-01

    Low energy consumption is crucial for body area networks (BANs). In BAN-enabled ECG monitoring, the continuous monitoring entails the need of the sensor nodes to transmit a huge data to the sink node, which leads to excessive energy consumption. To reduce airtime over energy-hungry wireless links, this paper presents an energy-efficient compressed sensing (CS)-based approach for on-node ECG compression. At first, an algorithm called minimal mutual coherence pursuit is proposed to construct sparse binary measurement matrices, which can be used to encode the ECG signals with superior performance and extremely low complexity. Second, in order to minimize the data rate required for faithful reconstruction, a weighted ℓ1 minimization model is derived by exploring the multisource prior knowledge in wavelet domain. Experimental results on MIT-BIH arrhythmia database reveals that the proposed approach can obtain higher compression ratio than the state-of-the-art CS-based methods. Together with its low encoding complexity, our approach can achieve significant energy saving in both encoding process and wireless transmission.

  1. Adoption of waste minimization technology to benefit electroplaters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ching, E.M.K.; Li, C.P.H.; Yu, C.M.K.

    Because of increasingly stringent environmental legislation and enhanced environmental awareness, electroplaters in Hong Kong are paying more heed to protect the environment. To comply with the array of environmental controls, electroplaters can no longer rely solely on the end-of-pipe approach as a means for abating their pollution problems under the particular local industrial environment. The preferred approach is to adopt waste minimization measures that yield both economic and environmental benefits. This paper gives an overview of electroplating activities in Hong Kong, highlights their characteristics, and describes the pollution problems associated with conventional electroplating operations. The constraints of using pollution controlmore » measures to achieve regulatory compliance are also discussed. Examples and case studies are given on some low-cost waste minimization techniques readily available to electroplaters, including dragout minimization and water conservation techniques. Recommendations are given as to how electroplaters can adopt and exercise waste minimization techniques in their operations. 1 tab.« less

  2. Quantifying and minimizing entropy generation in AMTEC cells

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hendricks, T.J.; Huang, C.

    1997-12-31

    Entropy generation in an AMTEC cell represents inherent power loss to the AMTEC cell. Minimizing cell entropy generation directly maximizes cell power generation and efficiency. An internal project is on-going at AMPS to identify, quantify and minimize entropy generation mechanisms within an AMTEC cell, with the goal of determining cost-effective design approaches for maximizing AMTEC cell power generation. Various entropy generation mechanisms have been identified and quantified. The project has investigated several cell design techniques in a solar-driven AMTEC system to minimize cell entropy generation and produce maximum power cell designs. In many cases, various sources of entropy generation aremore » interrelated such that minimizing entropy generation requires cell and system design optimization. Some of the tradeoffs between various entropy generation mechanisms are quantified and explained and their implications on cell design are discussed. The relationship between AMTEC cell power and efficiency and entropy generation is presented and discussed.« less

  3. Cost-effectiveness analysis in minimally invasive spine surgery.

    PubMed

    Al-Khouja, Lutfi T; Baron, Eli M; Johnson, J Patrick; Kim, Terrence T; Drazin, Doniel

    2014-06-01

    Medical care has been evolving with the increased influence of a value-based health care system. As a result, more emphasis is being placed on ensuring cost-effectiveness and utility in the services provided to patients. This study looks at this development in respect to minimally invasive spine surgery (MISS) costs. A literature review using PubMed, the Cost-Effectiveness Analysis (CEA) Registry, and the National Health Service Economic Evaluation Database (NHS EED) was performed. Papers were included in the study if they reported costs associated with minimally invasive spine surgery (MISS). If there was no mention of cost, CEA, cost-utility analysis (CUA), quality-adjusted life year (QALY), quality, or outcomes mentioned, then the article was excluded. Fourteen studies reporting costs associated with MISS in 12,425 patients (3675 undergoing minimally invasive procedures and 8750 undergoing open procedures) were identified through PubMed, the CEA Registry, and NHS EED. The percent cost difference between minimally invasive and open approaches ranged from 2.54% to 33.68%-all indicating cost saving with a minimally invasive surgical approach. Average length of stay (LOS) for minimally invasive surgery ranged from 0.93 days to 5.1 days compared with 1.53 days to 12 days for an open approach. All studies reporting EBL reported lower volume loss in an MISS approach (range 10-392.5 ml) than in an open approach (range 55-535.5 ml). There are currently an insufficient number of studies published reporting the costs of MISS. Of the studies published, none have followed a standardized method of reporting and analyzing cost data. Preliminary findings analyzing the 14 studies showed both cost saving and better outcomes in MISS compared with an open approach. However, more Level I CEA/CUA studies including cost/QALY evaluations with specifics of the techniques utilized need to be reported in a standardized manner to make more accurate conclusions on the cost effectiveness of

  4. Applications of minimal physiologically-based pharmacokinetic models

    PubMed Central

    Cao, Yanguang

    2012-01-01

    Conventional mammillary models are frequently used for pharmacokinetic (PK) analysis when only blood or plasma data are available. Such models depend on the quality of the drug disposition data and have vague biological features. An alternative minimal-physiologically-based PK (minimal-PBPK) modeling approach is proposed which inherits and lumps major physiologic attributes from whole-body PBPK models. The body and model are represented as actual blood and tissue usually total body weight) volumes, fractions (fd) of cardiac output with Fick’s Law of Perfusion, tissue/blood partitioning (Kp), and systemic or intrinsic clearance. Analyzing only blood or plasma concentrations versus time, the minimal-PBPK models parsimoniously generate physiologically-relevant PK parameters which are more easily interpreted than those from mam-millary models. The minimal-PBPK models were applied to four types of therapeutic agents and conditions. The models well captured the human PK profiles of 22 selected beta-lactam antibiotics allowing comparison of fitted and calculated Kp values. Adding a classical hepatic compartment with hepatic blood flow allowed joint fitting of oral and intravenous (IV) data for four hepatic elimination drugs (dihydrocodeine, verapamil, repaglinide, midazolam) providing separate estimates of hepatic intrinsic clearance, non-hepatic clearance, and pre-hepatic bioavailability. The basic model was integrated with allometric scaling principles to simultaneously describe moxifloxacin PK in five species with common Kp and fd values. A basic model assigning clearance to the tissue compartment well characterized plasma concentrations of six monoclonal antibodies in human subjects, providing good concordance of predictions with expected tissue kinetics. The proposed minimal-PBPK modeling approach offers an alternative and more rational basis for assessing PK than compartmental models. PMID:23179857

  5. A review of technology-assisted self-help and minimal contact therapies for drug and alcohol abuse and smoking addiction: is human contact necessary for therapeutic efficacy?

    PubMed

    Newman, Michelle G; Szkodny, Lauren E; Llera, Sandra J; Przeworski, Amy

    2011-02-01

    Technology-based self-help and minimal contact therapies have been proposed as effective and low-cost interventions for addictive disorders, such as nicotine, alcohol, and drug abuse and addiction. The present article reviews the literature published before 2010 on computerized treatments for drug and alcohol abuse and dependence and smoking addiction. Treatment studies are examined by disorder as well as amount of therapist contact, ranging from self-administered therapy and predominantly self-help interventions to minimal contact therapy where the therapist is actively involved in treatment but to a lesser degree than traditional therapy and predominantly therapist-administered treatments involving regular contact with a therapist for a typical number of sessions. In the treatment of substance use and abuse it is concluded that self-administered and predominantly self-help computer-based cognitive and behavioral interventions are efficacious, but some therapist contact is important for greater and more sustained reductions in addictive behavior. Copyright © 2010 Elsevier Ltd. All rights reserved.

  6. Minimal norm constrained interpolation. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Irvine, L. D.

    1985-01-01

    In computational fluid dynamics and in CAD/CAM, a physical boundary is usually known only discreetly and most often must be approximated. An acceptable approximation preserves the salient features of the data such as convexity and concavity. In this dissertation, a smooth interpolant which is locally concave where the data are concave and is locally convex where the data are convex is described. The interpolant is found by posing and solving a minimization problem whose solution is a piecewise cubic polynomial. The problem is solved indirectly by using the Peano Kernal theorem to recast it into an equivalent minimization problem having the second derivative of the interpolant as the solution. This approach leads to the solution of a nonlinear system of equations. It is shown that Newton's method is an exceptionally attractive and efficient method for solving the nonlinear system of equations. Examples of shape-preserving interpolants, as well as convergence results obtained by using Newton's method are also shown. A FORTRAN program to compute these interpolants is listed. The problem of computing the interpolant of minimal norm from a convex cone in a normal dual space is also discussed. An extension of de Boor's work on minimal norm unconstrained interpolation is presented.

  7. Cogging Torque Minimization in Transverse Flux Machines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Husain, Tausif; Hasan, Iftekhar; Sozer, Yilmaz

    2017-02-16

    This paper presents the design considerations in cogging torque minimization in two types of transverse flux machines. The machines have a double stator-single rotor configuration with flux concentrating ferrite magnets. One of the machines has pole windings across each leg of an E-Core stator. Another machine has quasi-U-shaped stator cores and a ring winding. The flux in the stator back iron is transverse in both machines. Different methods of cogging torque minimization are investigated. Key methods of cogging torque minimization are identified and used as design variables for optimization using a design of experiments (DOE) based on the Taguchi method.more » A three-level DOE is performed to reach an optimum solution with minimum simulations. Finite element analysis is used to study the different effects. Two prototypes are being fabricated for experimental verification.« less

  8. 7 CFR 983.53 - Testing of minimal quantities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., ARIZONA, AND NEW MEXICO Regulations § 983.53 Testing of minimal quantities. (a) Aflatoxin. Handlers who... § 983.50. (b) Quality. The committee may, with the approval of the Secretary, establish regulations regarding the testing of minimal quantities of pistachios for quality. [74 FR 56540, Nov. 2, 2009] ...

  9. Perturbed Yukawa textures in the minimal seesaw model

    NASA Astrophysics Data System (ADS)

    Rink, Thomas; Schmitz, Kai

    2017-03-01

    We revisit the minimal seesaw model, i.e., the type-I seesaw mechanism involving only two right-handed neutrinos. This model represents an important minimal benchmark scenario for future experimental updates on neutrino oscillations. It features four real parameters that cannot be fixed by the current data: two CP -violating phases, δ and σ, as well as one complex parameter, z, that is experimentally inaccessible at low energies. The parameter z controls the structure of the neutrino Yukawa matrix at high energies, which is why it may be regarded as a label or index for all UV completions of the minimal seesaw model. The fact that z encompasses only two real degrees of freedom allows us to systematically scan the minimal seesaw model over all of its possible UV completions. In doing so, we address the following question: suppose δ and σ should be measured at particular values in the future — to what extent is one then still able to realize approximate textures in the neutrino Yukawa matrix? Our analysis, thus, generalizes previous studies of the minimal seesaw model based on the assumption of exact texture zeros. In particular, our study allows us to assess the theoretical uncertainty inherent to the common texture ansatz. One of our main results is that a normal light-neutrino mass hierarchy is, in fact, still consistent with a two-zero Yukawa texture, provided that the two texture zeros receive corrections at the level of O (10%). While our numerical results pertain to the minimal seesaw model only, our general procedure appears to be applicable to other neutrino mass models as well.

  10. Endometrioid adenocarcinoma of the uterus with a minimal deviation invasive pattern.

    PubMed

    Landry, D; Mai, K T; Senterman, M K; Perkins, D G; Yazdi, H M; Veinot, J P; Thomas, J

    2003-01-01

    Minimal deviation adenocarcinoma of endometrioid type is a rare pathological entity. We describe a variant of typical endometrioid adenocarcinoma associated with minimal deviation adenocarcinoma of endometrioid type. One 'pilot' case of minimal deviation adenocarcinoma of endometrioid type associated with typical endometrioid adenocarcinoma was encountered at our institution in 2001. A second case of same type was received in consultation. We reviewed 168 consecutive hysterectomy specimens diagnosed with 'endometrioid adenocarcinoma' specifically to identify areas of minimal deviation adenocarcinoma of endometrioid type. Immunohistochemistry was done with the following antibodies: MIB1, p53, oestrogen receptor (ER), progesterone receptor (PR), cytokeratin 7 (CK7), cytokeratin 20 (CK20), carcinoembryonic antigen (CEA), and vimentin (VIM). Four additional cases of minimal deviation adenocarcinoma of endometrioid type were identified. All six cases of minimal deviation adenocarcinoma of endometrioid type were associated with superficial endometrioid adenocarcinoma. In two cases with a large amount of minimal deviation adenocarcinoma of endometrioid type, the cervix was involved. The immunoprofile of two representative cases was ER+, PR+, CK7+, CK20-, CEA-, VIM+. MIB1 immunostaining of four cases revealed little proliferative activity of the minimal deviation adenocarcinoma of endometrioid type glandular cells (0-1%) compared with the associated 'typical' endometrioid adenocarcinoma (20-30%). The same four cases showed no p53 immunostaining in minimal deviation adenocarcinoma of endometrioid type compared with a range of positive staining in the associated endometrioid adenocarcinoma. Minimal deviation adenocarcinoma of endometrioid type more often develops as a result of differentiation from typical endometrioid adenocarcinoma than de novo. Due to its deceptively benign microscopic appearance, minimal deviation adenocarcinoma of endometrioid type may be overlooked and

  11. Correlation between the norm and the geometry of minimal networks

    NASA Astrophysics Data System (ADS)

    Laut, I. L.

    2017-05-01

    The paper is concerned with the inverse problem of the minimal Steiner network problem in a normed linear space. Namely, given a normed space in which all minimal networks are known for any finite point set, the problem is to describe all the norms on this space for which the minimal networks are the same as for the original norm. We survey the available results and prove that in the plane a rotund differentiable norm determines a distinctive set of minimal Steiner networks. In a two-dimensional space with rotund differentiable norm the coordinates of interior vertices of a nondegenerate minimal parametric network are shown to vary continuously under small deformations of the boundary set, and the turn direction of the network is determined. Bibliography: 15 titles.

  12. Friends Indeed? Coalition Burden Sharing and the War In Iraq. Volume 1

    DTIC Science & Technology

    2008-08-05

    Malici, "Germans as Venutians: The Culture of German Foreign Policy Behavior." 36 Joachim Krause , "The Role of the Bundestag in German Foreign Policy...Hampshire ; New York: Palgrave, 2001), 159. 37 Erb, German Foreign Policy: Navigating a New Era, 191. 38 Krause , "The Role of the Bundestag in German...policy expert Wolfgang Schaeuble accused the German government of “creating a bogey” and weakening the United Nations in the Iraq debate for its

  13. Increasing organizational energy conservation behaviors: Comparing the theory of planned behavior and reasons theory for identifying specific motivational factors to target for change

    NASA Astrophysics Data System (ADS)

    Finlinson, Scott Michael

    Social scientists frequently assess factors thought to underlie behavior for the purpose of designing behavioral change interventions. Researchers commonly identify these factors by examining relationships between specific variables and the focal behaviors being investigated. Variables with the strongest relationships to the focal behavior are then assumed to be the most influential determinants of that behavior, and therefore often become the targets for change in a behavioral change intervention. In the current proposal, multiple methods are used to compare the effectiveness of two theoretical frameworks for identifying influential motivational factors. Assessing the relative influence of all factors and sets of factors for driving behavior should clarify which framework and methodology is the most promising for identifying effective change targets. Results indicated each methodology adequately predicted the three focal behaviors examined. However, the reasons theory approach was superior for predicting factor influence ratings compared to the TpB approach. While common method variance contamination had minimal impact on the results or conclusions derived from the present study's findings, there were substantial differences in conclusions depending on the questionnaire design used to collect the data. Examples of applied uses of the present study are discussed.

  14. The Blueprint of a Minimal Cell: MiniBacillus

    PubMed Central

    Reuß, Daniel R.; Commichau, Fabian M.; Gundlach, Jan; Zhu, Bingyao

    2016-01-01

    SUMMARY Bacillus subtilis is one of the best-studied organisms. Due to the broad knowledge and annotation and the well-developed genetic system, this bacterium is an excellent starting point for genome minimization with the aim of constructing a minimal cell. We have analyzed the genome of B. subtilis and selected all genes that are required to allow life in complex medium at 37°C. This selection is based on the known information on essential genes and functions as well as on gene and protein expression data and gene conservation. The list presented here includes 523 and 119 genes coding for proteins and RNAs, respectively. These proteins and RNAs are required for the basic functions of life in information processing (replication and chromosome maintenance, transcription, translation, protein folding, and secretion), metabolism, cell division, and the integrity of the minimal cell. The completeness of the selected metabolic pathways, reactions, and enzymes was verified by the development of a model of metabolism of the minimal cell. A comparison of the MiniBacillus genome to the recently reported designed minimal genome of Mycoplasma mycoides JCVI-syn3.0 indicates excellent agreement in the information-processing pathways, whereas each species has a metabolism that reflects specific evolution and adaptation. The blueprint of MiniBacillus presented here serves as the starting point for a successive reduction of the B. subtilis genome. PMID:27681641

  15. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  16. Rudimentary Reading Repertoires via Stimulus Equivalence and Recombination of Minimal Verbal Units

    PubMed Central

    Matos, Maria Amelia; Avanzi, Alessandra Lopes; McIlvane, William J

    2006-01-01

    We report a study with sixteen low-SES Brazilian children that sought to establish a repertoire of relations involving dictated words, printed words, and corresponding pictures. Children were taught: (1) in response to dictated words, to select corresponding pictures; (2) in response to syllables presented in both visual and auditory formats, to select words which contained a corresponding syllable in either the first or the last position; (3) in response to dictated-word samples, to “construct” corresponding printed words via arranging their constituent syllabic components; and (4) in response to printed word samples, to construct identical printed words by arranging their syllabic constituents. After training on the first two types of tasks, children were given tests for potentially emergent relations involving printed words and pictures. Almost all exhibited relations consistent with stimulus equivalence. They also displayed emergent naming performances––not only with training words but also with new words that were recombinations of their constituent syllables. The present work was inspired by Sidman's stimulus equivalence paradigm and by Skinner's functional analysis of verbal relations, particularly as applied to conceptions of minimal behavioral units and creativity (i.e., behavioral flexibility) in the analytical units applied to verbal relations. PMID:22477340

  17. Conscious visual memory with minimal attention.

    PubMed

    Pinto, Yair; Vandenbroucke, Annelinde R; Otten, Marte; Sligte, Ilja G; Seth, Anil K; Lamme, Victor A F

    2017-02-01

    Is conscious visual perception limited to the locations that a person attends? The remarkable phenomenon of change blindness, which shows that people miss nearly all unattended changes in a visual scene, suggests the answer is yes. However, change blindness is found after visual interference (a mask or a new scene), so that subjects have to rely on working memory (WM), which has limited capacity, to detect the change. Before such interference, however, a much larger capacity store, called fragile memory (FM), which is easily overwritten by newly presented visual information, is present. Whether these different stores depend equally on spatial attention is central to the debate on the role of attention in conscious vision. In 2 experiments, we found that minimizing spatial attention almost entirely erases visual WM, as expected. Critically, FM remains largely intact. Moreover, minimally attended FM responses yield accurate metacognition, suggesting that conscious memory persists with limited spatial attention. Together, our findings help resolve the fundamental issue of how attention affects perception: Both visual consciousness and memory can be supported by only minimal attention. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. Stabilization of a locally minimal forest

    NASA Astrophysics Data System (ADS)

    Ivanov, A. O.; Mel'nikova, A. E.; Tuzhilin, A. A.

    2014-03-01

    The method of partial stabilization of locally minimal networks, which was invented by Ivanov and Tuzhilin to construct examples of shortest trees with given topology, is developed. According to this method, boundary vertices of degree 2 are not added to all edges of the original locally minimal tree, but only to some of them. The problem of partial stabilization of locally minimal trees in a finite-dimensional Euclidean space is solved completely in the paper, that is, without any restrictions imposed on the number of edges remaining free of subdivision. A criterion for the realizability of such stabilization is established. In addition, the general problem of searching for the shortest forest connecting a finite family of boundary compact sets in an arbitrary metric space is formalized; it is shown that such forests exist for any family of compact sets if and only if for any finite subset of the ambient space there exists a shortest tree connecting it. The theory developed here allows us to establish further generalizations of the stabilization theorem both for arbitrary metric spaces and for metric spaces with some special properties. Bibliography: 10 titles.

  19. What energy functions can be minimized via graph cuts?

    PubMed

    Kolmogorov, Vladimir; Zabih, Ramin

    2004-02-01

    In the last few years, several new algorithms based on graph cuts have been developed to solve energy minimization problems in computer vision. Each of these techniques constructs a graph such that the minimum cut on the graph also minimizes the energy. Yet, because these graph constructions are complex and highly specific to a particular energy function, graph cuts have seen limited application to date. In this paper, we give a characterization of the energy functions that can be minimized by graph cuts. Our results are restricted to functions of binary variables. However, our work generalizes many previous constructions and is easily applicable to vision problems that involve large numbers of labels, such as stereo, motion, image restoration, and scene reconstruction. We give a precise characterization of what energy functions can be minimized using graph cuts, among the energy functions that can be written as a sum of terms containing three or fewer binary variables. We also provide a general-purpose construction to minimize such an energy function. Finally, we give a necessary condition for any energy function of binary variables to be minimized by graph cuts. Researchers who are considering the use of graph cuts to optimize a particular energy function can use our results to determine if this is possible and then follow our construction to create the appropriate graph. A software implementation is freely available.

  20. Neuropsychological Disorders in Children: Effects of Medication on Learning and Behavior in Hyperactivity.

    ERIC Educational Resources Information Center

    Hartlage, Lawrence C.; Telzrow, Cathy Fultz

    1982-01-01

    Hyperactivity is defined, and the relationships among minimal brain dysfunction, cerebral stimulants, and student characteristics such as activity level, attention and learning, and behavior are discussed. Hyperactive children's responses to the use of Ritalin and methylphenidate are reported. (CJ)

  1. Responsible gambling: general principles and minimal requirements.

    PubMed

    Blaszczynski, Alex; Collins, Peter; Fong, Davis; Ladouceur, Robert; Nower, Lia; Shaffer, Howard J; Tavares, Hermano; Venisse, Jean-Luc

    2011-12-01

    Many international jurisdictions have introduced responsible gambling programs. These programs intend to minimize negative consequences of excessive gambling, but vary considerably in their aims, focus, and content. Many responsible gambling programs lack a conceptual framework and, in the absence of empirical data, their components are based only on general considerations and impressions. This paper outlines the consensus viewpoint of an international group of researchers suggesting fundamental responsible gambling principles, roles of key stakeholders, and minimal requirements that stakeholders can use to frame and inform responsible gambling programs across jurisdictions. Such a framework does not purport to offer value statements regarding the legal status of gambling or its expansion. Rather, it proposes gambling-related initiatives aimed at government, industry, and individuals to promote responsible gambling and consumer protection. This paper argues that there is a set of basic principles and minimal requirements that should form the basis for every responsible gambling program.

  2. Clinical evaluation of three restorative materials applied in a minimal intervention caries treatment approach.

    PubMed

    Zanata, Regia L; Navarro, Maria F L; Barbosa, Silvia H; Lauris, Jose R P; Franco, Eduardo B

    2003-01-01

    This paper reports on a longitudinal evaluation of three materials (glass ionomer, zinc oxide-eugenol cement, and composite) employed in a minimal restorative intervention approach of 81 high caries-active pregnant women selected for a preventive oral health program in Brazil. The aim of the study was to evaluate the clinical behavior of the glass ionomer cement, currently indicated in programs for control of carious lesions. The patients were randomly divided into two groups. Both groups were engaged in an oral health promotion approach. In Group 1, 417 glass ionomer restorations were placed in 43 individuals, involving all types and sizes of cavities. In the second group, 213 posterior zinc oxide-eugenol (ZOE) restorations and 127 anterior composite restorations were placed in 38 patients. Minimal cavity preparations were made, in which only soft or infected dentin was removed, on the basis of clinical judgment. After two years, the restorations were clinically evaluated by two examiners for marginal integrity, amount of wear, presence of fracture, carious lesions, and lost restorations. Statistical analysis (chi-square test) identified statistically significant difference between glass ionomer and ZOE (90.6% vs 9.2%). Comparing glass ionomer and composite, similar survival rates were observed. The success rate observed for the glass ionomer cement ranged from 77.1 percent to 92.5 percent, depending on the type and size of cavity in which it was applied. Four teeth restored with glass ionomer cement and one tooth restored with composite showed caries signs. Regarding the ZOE restorations, caries was always associated with other causes of failure such as excessive wear, restoration loss, or marginal defects, with no possibility of separate evaluation. Despite the preventive and therapeutic measurements employed, a mean increase of 2.15 new surfaces with cavities was observed in Group 1, as well as 2.83 surfaces presenting the same status in Group 2. This study

  3. Many Denjoy minimal sets for monotone recurrence relations

    NASA Astrophysics Data System (ADS)

    Wang, Ya-Nan; Qin, Wen-Xin

    2014-09-01

    We extend Mather's work (1985 Comment. Math. Helv. 60 508-57) to high-dimensional cylinder maps defined by monotone recurrence relations, e.g. the generalized Frenkel-Kontorova model with finite range interactions. We construct uncountably many Denjoy minimal sets provided that the Birkhoff minimizers with some irrational rotation number ω do not form a foliation.

  4. Investigating the Evolution of Ingroup Favoritism Using a Minimal Group Interaction Paradigm: The Effects of Inter- and Intragroup Interdependence

    PubMed Central

    Quayle, Michael; Tredoux, Colin G.; Titlestad, Kim; Tooke, Larry

    2016-01-01

    We investigated the effect of structural interdependencies between groups (especially inequality), and interdependencies between individuals on ingroup favoritism in minimal group situations. Previous research has attempted to determine whether ingroup favoritism is produced by categorization or intragroup interdependencies (reciprocation expectations), but recent literature suggests that it is not possible to tease these influences apart. We report two studies that investigate how ingroup favoritism evolves over time in social interaction. The levels of ingroup favoritism were affected by categorization and inequality, and the level of ingroup favoritism changed over time, increasing or decreasing depending on the nature of the initial intergroup structure. We conclude by providing two explanations for this change: emergent norms, and changes to the intergroup situation produced by interaction. Our experiments confirm the value of studying the evolution of minimal group behavior, especially for explaining why low status groups act to preserve intergroup inequalities. PMID:27851791

  5. Casual Set Approach to a Minimal Invariant Length

    NASA Astrophysics Data System (ADS)

    Raut, Usha

    2007-04-01

    Any attempt to quantize gravity would necessarily introduce a minimal observable length scale of the order of the Planck length. This conclusion is based on several different studies and thought experiments and appears to be an inescapable feature of all quantum gravity theories, irrespective of the method used to quantize gravity. Over the last few years there has been growing concern that such a minimal length might lead to a contradiction with the basic postulates of special relativity, in particular the Lorentz-Fitzgerald contraction. A few years ago, Rovelli et.al, attempted to reconcile an invariant minimal length with Special Relativity, using the framework of loop quantum gravity. However, the inherently canonical formalism of the loop quantum approach is plagued by a variety of problems, many brought on by separation of space and time co-ordinates. In this paper we use a completely different approach. Using the framework of the causal set paradigm, along with a statistical measure of closeness between Lorentzian manifolds, we re-examine the issue of introducing a minimal observable length that is not at odds with Special Relativity postulates.

  6. Blow-up behavior of ground states for a nonlinear Schrödinger system with attractive and repulsive interactions

    NASA Astrophysics Data System (ADS)

    Guo, Yujin; Zeng, Xiaoyu; Zhou, Huan-Song

    2018-01-01

    We consider a nonlinear Schrödinger system arising in a two-component Bose-Einstein condensate (BEC) with attractive intraspecies interactions and repulsive interspecies interactions in R2. We get ground states of this system by solving a constrained minimization problem. For some kinds of trapping potentials, we prove that the minimization problem has a minimizer if and only if the attractive interaction strength ai (i = 1 , 2) of each component of the BEC system is strictly less than a threshold a*. Furthermore, as (a1 ,a2) ↗ (a* ,a*), the asymptotical behavior for the minimizers of the minimization problem is discussed. Our results show that each component of the BEC system concentrates at a global minimum of the associated trapping potential.

  7. Behavioral Treatment and Normal Educational and Intellectual Functioning in Young Autistic Children.

    ERIC Educational Resources Information Center

    Lovaas, O. Ivar

    1987-01-01

    Reports the results of behavior modification treatment for two groups of similarly constituted, young autistic children. Pretreatment measures revealed no significant differences between the intensively treated experimental group and the minimally treated control groups. At follow-up, experimental group subjects (N=19) did significantly better…

  8. Influence of Inorganic Ions and Aggregation and Adsorption Behaviors of Human Adenovirus

    EPA Science Inventory

    In this study, influence of solution chemistries to the transport properties (aggregation and attachment behavior) of human adenovirus (HAdV) was investigated. Results showed isoelectric point (IEP) of HAdV in different salt conditions varied minimally, and it ranged from pH 3.5 ...

  9. An information geometric approach to least squares minimization

    NASA Astrophysics Data System (ADS)

    Transtrum, Mark; Machta, Benjamin; Sethna, James

    2009-03-01

    Parameter estimation by nonlinear least squares minimization is a ubiquitous problem that has an elegant geometric interpretation: all possible parameter values induce a manifold embedded within the space of data. The minimization problem is then to find the point on the manifold closest to the origin. The standard algorithm for minimizing sums of squares, the Levenberg-Marquardt algorithm, also has geometric meaning. When the standard algorithm fails to efficiently find accurate fits to the data, geometric considerations suggest improvements. Problems involving large numbers of parameters, such as often arise in biological contexts, are notoriously difficult. We suggest an algorithm based on geodesic motion that may offer improvements over the standard algorithm for a certain class of problems.

  10. Minimal energy configurations of gravitationally interacting rigid bodies

    NASA Astrophysics Data System (ADS)

    Moeckel, Richard

    2017-05-01

    Consider a collection of n rigid, massive bodies interacting according to their mutual gravitational attraction. A relative equilibrium motion is one where the entire configuration rotates rigidly and uniformly about a fixed axis in R^3. Such a motion is possible only for special positions and orientations of the bodies. A minimal energy motion is one which has the minimum possible energy in its fixed angular momentum level. While every minimal energy motion is a relative equilibrium motion, the main result here is that a relative equilibrium motion of n≥3 disjoint rigid bodies is never an energy minimizer. This generalizes a known result about point masses to the case of rigid bodies.

  11. Development of analysis technique to predict the material behavior of blowing agent

    NASA Astrophysics Data System (ADS)

    Hwang, Ji Hoon; Lee, Seonggi; Hwang, So Young; Kim, Naksoo

    2014-11-01

    In order to numerically simulate the foaming behavior of mastic sealer containing the blowing agent, a foaming and driving force model are needed which incorporate the foaming characteristics. Also, the elastic stress model is required to represent the material behavior of co-existing phase of liquid state and the cured polymer. It is important to determine the thermal properties such as thermal conductivity and specific heat because foaming behavior is heavily influenced by temperature change. In this study, three models are proposed to explain the foaming process and material behavior during and after the process. To obtain the material parameters in each model, following experiments and the numerical simulations are performed: thermal test, simple shear test and foaming test. The error functions are defined as differences between the experimental measurements and the numerical simulation results, and then the parameters are determined by minimizing the error functions. To ensure the validity of the obtained parameters, the confirmation simulation for each model is conducted by applying the determined parameters. The cross-verification is performed by measuring the foaming/shrinkage force. The results of cross-verification tended to follow the experimental results. Interestingly, it was possible to estimate the micro-deformation occurring in automobile roof surface by applying the proposed model to oven process analysis. The application of developed analysis technique will contribute to the design with minimized micro-deformation.

  12. Communication Growth in Minimally Verbal Children with Autism

    ERIC Educational Resources Information Center

    Mucchetti, Charlotte Alcestis

    2013-01-01

    Very little is known about language and communication development in minimally verbal children with autism, especially those who remain minimally verbal past the age of five. This population is rarely reported on in research and although there is evidence that some children do learn to speak after the age of five, we lack information on the course…

  13. Massively parallel GPU-accelerated minimization of classical density functional theory

    NASA Astrophysics Data System (ADS)

    Stopper, Daniel; Roth, Roland

    2017-08-01

    In this paper, we discuss the ability to numerically minimize the grand potential of hard disks in two-dimensional and of hard spheres in three-dimensional space within the framework of classical density functional and fundamental measure theory on modern graphics cards. Our main finding is that a massively parallel minimization leads to an enormous performance gain in comparison to standard sequential minimization schemes. Furthermore, the results indicate that in complex multi-dimensional situations, a heavy parallel minimization of the grand potential seems to be mandatory in order to reach a reasonable balance between accuracy and computational cost.

  14. A robust trust establishment scheme for wireless sensor networks.

    PubMed

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  15. When envy leads to schadenfreude.

    PubMed

    van de Ven, Niels; Hoogland, Charles E; Smith, Richard H; van Dijk, Wilco W; Breugelmans, Seger M; Zeelenberg, Marcel

    2015-01-01

    Previous research has yielded inconsistent findings concerning the relationship between envy and schadenfreude. Three studies examined whether the distinction between benign and malicious envy can resolve this inconsistency. We found that malicious envy is related to schadenfreude, while benign envy is not. This result held both in the Netherlands where benign and malicious envy are indicated by separate words (Study 1: Sample A, N = 139; Sample B, N = 150), and in the USA where a single word is used to denote both types (Study 2, N = 180; Study 3, N = 349). Moreover, the effect of malicious envy on schadenfreude was independent of other antecedents of schadenfreude (such as feelings of inferiority, disliking the target person, anger, and perceived deservedness). These findings improve our understanding of the antecedents of schadenfreude and help reconcile seemingly contradictory findings on the relationship between envy and schadenfreude.

  16. A generic minimization random allocation and blinding system on web.

    PubMed

    Cai, Hongwei; Xia, Jielai; Xu, Dezhong; Gao, Donghuai; Yan, Yongping

    2006-12-01

    Minimization is a dynamic randomization method for clinical trials. Although recommended by many researchers, the utilization of minimization has been seldom reported in randomized trials mainly because of the controversy surrounding the validity of conventional analyses and its complexity in implementation. However, both the statistical and clinical validity of minimization were demonstrated in recent studies. Minimization random allocation system integrated with blinding function that could facilitate the implementation of this method in general clinical trials has not been reported. SYSTEM OVERVIEW: The system is a web-based random allocation system using Pocock and Simon minimization method. It also supports multiple treatment arms within a trial, multiple simultaneous trials, and blinding without further programming. This system was constructed with generic database schema design method, Pocock and Simon minimization method and blinding method. It was coded with Microsoft Visual Basic and Active Server Pages (ASP) programming languages. And all dataset were managed with a Microsoft SQL Server database. Some critical programming codes were also provided. SIMULATIONS AND RESULTS: Two clinical trials were simulated simultaneously to test the system's applicability. Not only balanced groups but also blinded allocation results were achieved in both trials. Practical considerations for minimization method, the benefits, general applicability and drawbacks of the technique implemented in this system are discussed. Promising features of the proposed system are also summarized.

  17. An Architectural Concept for Intrusion Tolerance in Air Traffic Networks

    NASA Technical Reports Server (NTRS)

    Maddalon, Jeffrey M.; Miner, Paul S.

    2003-01-01

    The goal of an intrusion tolerant network is to continue to provide predictable and reliable communication in the presence of a limited num ber of compromised network components. The behavior of a compromised network component ranges from a node that no longer responds to a nod e that is under the control of a malicious entity that is actively tr ying to cause other nodes to fail. Most current data communication ne tworks do not include support for tolerating unconstrained misbehavio r of components in the network. However, the fault tolerance communit y has developed protocols that provide both predictable and reliable communication in the presence of the worst possible behavior of a limited number of nodes in the system. One may view a malicious entity in a communication network as a node that has failed and is behaving in an arbitrary manner. NASA/Langley Research Center has developed one such fault-tolerant computing platform called SPIDER (Scalable Proces sor-Independent Design for Electromagnetic Resilience). The protocols and interconnection mechanisms of SPIDER may be adapted to large-sca le, distributed communication networks such as would be required for future Air Traffic Management systems. The predictability and reliabi lity guarantees provided by the SPIDER protocols have been formally v erified. This analysis can be readily adapted to similar network stru ctures.

  18. Moving beyond assumptions of deviance: The reconceptualization and measurement of workplace gossip.

    PubMed

    Brady, Daniel L; Brown, Douglas J; Liang, Lindie Hanyu

    2017-01-01

    Despite decades of research from other academic fields arguing that gossip is an important and potentially functional behavior, organizational research has largely assumed that gossip is malicious talk. This has resulted in the proliferation of gossip items in deviance scales, effectively subsuming workplace gossip research into deviance research. In this paper, the authors argue that organizational research has traditionally considered only a very narrow subset of workplace gossip, focusing almost exclusively on extreme negative cases which are not reflective of typical workplace gossip behavior. Instead of being primarily malicious, typical workplace gossip can be either positive or negative in nature and may serve important functions. It is therefore recommended that workplace gossip be studied on its own, independent of deviance. To facilitate this, the authors reconceptualize the workplace gossip construct and then develop a series of general-purpose English- and Chinese-language workplace gossip scales. Using 8 samples (including qualitative, multisource, multiwave, and multicultural data), the authors demonstrate the construct validity, reliability, cross-cultural measurement invariance, and acceptable psychometric properties of the workplace gossip scales. Relationships are demonstrated between workplace gossip and a variety of other organizational variables and processes, including uncertainty, emotion validation, self-esteem, norm enforcement, networking, influence, organizational justice, performance, deviance, and turnover. Future directions in workplace gossip research are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Minimal universal quantum heat machine.

    PubMed

    Gelbwaser-Klimovsky, D; Alicki, R; Kurizki, G

    2013-01-01

    In traditional thermodynamics the Carnot cycle yields the ideal performance bound of heat engines and refrigerators. We propose and analyze a minimal model of a heat machine that can play a similar role in quantum regimes. The minimal model consists of a single two-level system with periodically modulated energy splitting that is permanently, weakly, coupled to two spectrally separated heat baths at different temperatures. The equation of motion allows us to compute the stationary power and heat currents in the machine consistent with the second law of thermodynamics. This dual-purpose machine can act as either an engine or a refrigerator (heat pump) depending on the modulation rate. In both modes of operation, the maximal Carnot efficiency is reached at zero power. We study the conditions for finite-time optimal performance for several variants of the model. Possible realizations of the model are discussed.

  20. CSIRT Requirements for Situational Awareness

    DTIC Science & Technology

    2014-01-25

    deepsight-products http://www.symantec.com/security_response/publications/threatreport.jsp Verizon Verizon produces an annual data breach report...impact studies to the differences between malicious versus non-malicious data breaches . Ponemon also offers con- sulting services. Ponemon also

  1. How to start a minimal access mitral valve program.

    PubMed

    Hunter, Steven

    2013-11-01

    The seven pillars of governance established by the National Health Service in the United Kingdom provide a useful framework for the process of introducing new procedures to a hospital. Drawing from local experience, the author present guidance for institutions considering establishing a minimal access mitral valve program. The seven pillars of governance apply to the practice of minimally invasive mitral valve surgery, based on the principle of patient-centred practice. The author delineate the benefits of minimally invasive mitral valve surgery in terms of: "clinical effectiveness", including reduced length of hospital stay, "risk management effectiveness", including conversion to sternotomy and aortic dissection, "patient experience" including improved cosmesis and quicker recovery, and the effectiveness of communication, resources and strategies in the implementation of minimally invasive mitral valve surgery. Finally, the author have identified seven learning curves experienced by surgeons involved in introducing a minimal access mitral valve program. The learning curves are defined as: techniques of mitral valve repair, Transoesophageal Echocardiography-guided cannulation, incisions, instruments, visualization, aortic occlusion and cardiopulmonary bypass strategies. From local experience, the author provide advice on how to reduce the learning curves, such as practising with the specialised instruments and visualization techniques during sternotomy cases. Underpinning the NHS pillars are the principles of systems awareness, teamwork, communication, ownership and leadership, all of which are paramount to performing any surgery but more so with minimal access surgery, as will be highlighted throughout this paper.

  2. How to start a minimal access mitral valve program

    PubMed Central

    2013-01-01

    The seven pillars of governance established by the National Health Service in the United Kingdom provide a useful framework for the process of introducing new procedures to a hospital. Drawing from local experience, the author present guidance for institutions considering establishing a minimal access mitral valve program. The seven pillars of governance apply to the practice of minimally invasive mitral valve surgery, based on the principle of patient-centred practice. The author delineate the benefits of minimally invasive mitral valve surgery in terms of: “clinical effectiveness”, including reduced length of hospital stay, “risk management effectiveness”, including conversion to sternotomy and aortic dissection, “patient experience” including improved cosmesis and quicker recovery, and the effectiveness of communication, resources and strategies in the implementation of minimally invasive mitral valve surgery. Finally, the author have identified seven learning curves experienced by surgeons involved in introducing a minimal access mitral valve program. The learning curves are defined as: techniques of mitral valve repair, Transoesophageal Echocardiography-guided cannulation, incisions, instruments, visualization, aortic occlusion and cardiopulmonary bypass strategies. From local experience, the author provide advice on how to reduce the learning curves, such as practising with the specialised instruments and visualization techniques during sternotomy cases. Underpinning the NHS pillars are the principles of systems awareness, teamwork, communication, ownership and leadership, all of which are paramount to performing any surgery but more so with minimal access surgery, as will be highlighted throughout this paper. PMID:24349981

  3. Overcoming double-step CO2 adsorption and minimizing water co-adsorption in bulky diamine-appended variants of Mg2(dobpdc).

    PubMed

    Milner, Phillip J; Martell, Jeffrey D; Siegelman, Rebecca L; Gygi, David; Weston, Simon C; Long, Jeffrey R

    2018-01-07

    Alkyldiamine-functionalized variants of the metal-organic framework Mg 2 (dobpdc) (dobpdc 4- = 4,4'-dioxidobiphenyl-3,3'-dicarboxylate) are promising for CO 2 capture applications owing to their unique step-shaped CO 2 adsorption profiles resulting from the cooperative formation of ammonium carbamate chains. Primary , secondary (1°,2°) alkylethylenediamine-appended variants are of particular interest because of their low CO 2 step pressures (≤1 mbar at 40 °C), minimal adsorption/desorption hysteresis, and high thermal stability. Herein, we demonstrate that further increasing the size of the alkyl group on the secondary amine affords enhanced stability against diamine volatilization, but also leads to surprising two-step CO 2 adsorption/desorption profiles. This two-step behavior likely results from steric interactions between ammonium carbamate chains induced by the asymmetrical hexagonal pores of Mg 2 (dobpdc) and leads to decreased CO 2 working capacities and increased water co-adsorption under humid conditions. To minimize these unfavorable steric interactions, we targeted diamine-appended variants of the isoreticularly expanded framework Mg 2 (dotpdc) (dotpdc 4- = 4,4''-dioxido-[1,1':4',1''-terphenyl]-3,3''-dicarboxylate), reported here for the first time, and the previously reported isomeric framework Mg-IRMOF-74-II or Mg 2 (pc-dobpdc) (pc-dobpdc 4- = 3,3'-dioxidobiphenyl-4,4'-dicarboxylate, pc = para -carboxylate), which, in contrast to Mg 2 (dobpdc), possesses uniformally hexagonal pores. By minimizing the steric interactions between ammonium carbamate chains, these frameworks enable a single CO 2 adsorption/desorption step in all cases, as well as decreased water co-adsorption and increased stability to diamine loss. Functionalization of Mg 2 (pc-dobpdc) with large diamines such as N -( n -heptyl)ethylenediamine results in optimal adsorption behavior, highlighting the advantage of tuning both the pore shape and the diamine size for the development of

  4. Exchanging honest employment references: avoiding the traps of defamation and negligent hiring.

    PubMed

    McConnell, Charles R

    2015-01-01

    In present-day reference checking, many of the same organizations that seek as much information as possible about people they wish to hire resist giving out more than a bare minimum of information to other organizations. The strongest force driving this minimal reference information release is fear of legal action taken because of something said about an individual in a reference response. Many employers seem so frightened of being sued that they share nothing of substance, usually not realizing that in supposedly protecting themselves against defamation charges they are sometimes increasing the risk of negligent hiring charges. However, truthful reference information can be provided with minimal risk if it is provided in good faith, given only to those who have a legitimate need to know, is strictly job related, and is not communicated maliciously. References must always be provided objectively with information verifiable in personnel files.

  5. Exchanging honest employment references: tiptoeing between defamation and negligent hiring.

    PubMed

    McConnell, Charles R

    2007-01-01

    In present day reference checking, many of the same organizations that seek as much information as possible about people they wish to hire resist giving out more than a bare minimum of information to other organizations. The strongest force driving this minimal reference information release is fear of legal action taken because of something said about an individual ("defamation," supposedly). Many employers seem so frightened of being sued for libel or slander that they share nothing of substance, usually not realizing that in supposedly protecting themselves against defamation charges, they are increasing the risk of negligent hiring charges. However, truthful reference information can be provided with minimal risk if it is provided in good faith, given only to those who have a legitimate need to know, is strictly job related, and is not communicated maliciously. References must always be provided objectively with information verifiable in personnel files.

  6. Future directions of multiple behavior change research.

    PubMed

    Geller, Karly; Lippke, Sonia; Nigg, Claudio R

    2017-02-01

    Non-communicable diseases (i.e., chronic diseases including cardiovascular disease, cancer, chronic respiratory disease, diabetes and obesity) result in 36 million deaths each year. Individuals' habitual participation in a single health-risk behaviors substantially contribute to morbidity and mortality (e.g., tobacco use, daily fast food intake, etc.); however, more concerning is the impact of typically co-occurring or clustering of multiple health-risk behaviors. This burden can be minimized through successful cessation of health-risk behaviors and adoption of healthy behaviors; namely healthy lifestyle adoption or multiple health behavior change (MHBC). MHBC is a developing field and future research recommendations are provided to advance MHBC research. A valid measure of MHBC (i.e., lifestyle) is warranted to provide the needed basis for MHBC investigations and evaluations. MHBC is thought to occur through shared co-variation of underlying motivating mechanisms, but how these relationships influence behavior remains unclear. A better understanding of the relationship between behaviors and the related motivating mechanisms (and potential cross-relationship of influences) is needed. Future research should also aim to improve lifestyles through understanding how to change multiple health behaviors. Finally, MHBC research should target the development of sustainable interventions which result in lasting effects (e.g., capacity, systems, policy and environmental changes), with dissemination considered during development. Focusing MHBC research in these areas will increase our understanding and maximize the impact on the health of populations.

  7. Minimally invasive technology in the management of breast disease.

    PubMed

    Hung, W K; Ying, M; Chan, C M; Lam, H S; Mak, K L

    2009-01-01

    Minimally invasive surgery is gaining popularity around the world because it achieves the same or even superior results when compared to standard surgery but with less morbidity. Minimally invasive breast surgery is a broad concept encompassing new developments in the field of breast surgery that work on this minimally invasive principle. In this regard, breast-conserving surgery and sentinel lymph node biopsy are good illustrations of this concept. There are three major areas of progress in the minimally invasive management of breast disease. First, percutaneous excisional devices are now available that can replace the surgical excision of breast mass lesions. Second, various ablative treatments are capable of destroying breast cancers in situ instead of surgical excision. Third, mammary ductoscopy provides a new approach to the investigation of mammary duct pathology. Clinical experience and potential applications of these new technologies are reviewed.

  8. Adolescent Non-Involvement in Multiple Risk Behaviors: An Indicator of Successful Development?

    ERIC Educational Resources Information Center

    Willoughby, Teena; Chalmers, Heather; Busseri, Michael A.; Bosacki, Sandra; Dupont, Diane; Marini, Zopito; Rose-Krasnor, Linda; Sadava, Stan; Ward, Anthony; Woloshyn, Vera

    2007-01-01

    Based on the conceptualization of successful development as the joint maximization of desirable outcomes and minimization of undesirable outcomes (Baltes, 1997), the present study examined connections between adolescent non-involvement in multiple risk behaviors and positive developmental status. Results from a survey of 7290 high school students…

  9. Malware Memory Analysis of the Jynx2 Linux Rootkit (Part 1): Investigating a Publicly Available Linux Rootkit Using the Volatility Memory Analysis Framework

    DTIC Science & Technology

    2014-10-01

    indication that not a single scanner was able to detect the rootkit as malicious or infected. SHA256 ...clear indication that not a single scanner was able detect it as malicious, infected or associated to the Jynx2 rootkit. SHA256

  10. Adaptive Responses to Prochloraz Exposure That Alter Dose-Response and Time-Course Behaviors

    EPA Science Inventory

    Dose response and time-course (DRTC) are, along with exposure, the major determinants of health risk. Adaptive changes within exposed organisms in response to environmental stress are common, and alter DRTC behaviors to minimize the effects caused by stressors. In this project, ...

  11. Self-organization of intertidal snails facilitates evolution of aggregation behavior.

    PubMed

    Stafford, Richard; Davies, Mark S; Williams, Gray A

    2008-01-01

    Many intertidal snails form aggregations during emersion to minimize desiccation stress. Here we investigate possible mechanisms for the evolution of such behavior. Two behavioral traits (following of mucus trails, and crevice occupation), which both provide selective advantages to individuals that possess the traits over individuals that do not, result in self-organization of aggregations in crevices in the rock surface. We suggest that the existence of self-organizing aggregations provides a mechanism by which aggregation behavior can evolve. The inclusion of an explicitly coded third behavior, aggregation, in a simulated population produces patterns statistically similar to those found on real rocky shores. Allowing these three behaviors to evolve using an evolutionary algorithm, however, results in aggregation behavior being selected against on shores with high crevice density. The inclusion of broadcast spawning dispersal mechanisms in the simulation, however, results in aggregation behavior evolving as predicted on shores with both high crevice density and low crevice density (evolving in crevices first, and then both in crevices and on flat rock), indicating the importance of environmental interactions in understanding evolutionary processes. We propose that self-organization can be an important factor in the evolution of group behaviors.

  12. An Effective Risk Minimization Strategy Applied to an Outdoor Music Festival: A Multi-Agency Approach.

    PubMed

    Luther, Matt; Gardiner, Fergus; Lenson, Shane; Caldicott, David; Harris, Ryan; Sabet, Ryan; Malloy, Mark; Perkins, Jo

    2018-04-01

    Specific Event Identifiers a. Event type: Outdoor music festival. b. Event onset date: December 3, 2016. c. Location of event: Regatta Point, Commonwealth Park. d. Geographical coordinates: Canberra, Australian Capital Territory (ACT), Australia (-35.289002, 149.131957, 600m). e. Dates and times of observation in latitude, longitude, and elevation: December 3, 2016, 11:00-23:00. f. Response type: Event medical support. Abstract Introduction Young adult patrons are vulnerable to risk-taking behavior, including drug taking, at outdoor music festivals. Therefore, the aim of this field report is to discuss the on-site medical response during a music festival, and subsequently highlight observed strategies aimed at minimizing substance abuse harm. The observed outdoor music festival was held in Canberra (Australian Capital Territory [ACT], Australia) during the early summer of 2016, with an attendance of 23,008 patrons. First aid and on-site medical treatment data were gained from the relevant treatment area and service. The integrated first aid service provided support to 292 patients. Final analysis consisted of 286 patients' records, with 119 (41.6%) males and 167 (58.4%) females. Results from this report indicated that drug intoxication was an observed event issue, with 15 (5.1%) treated on site and 13 emergency department (ED) presentations, primarily related to trauma or medical conditions requiring further diagnostics. This report details an important public health need, which could be met by providing a coordinated approach, including a robust on-site medical service, accepting intrinsic risk-taking behavior. This may include on-site drug-checking, providing reliable information on drug content with associated education. Luther M , Gardiner F , Lenson S , Caldicott D , Harris R , Sabet R , Malloy M , Perkins J . An effective risk minimization strategy applied to an outdoor music festival: a multi-agency approach. Prehosp Disaster Med. 2018;33(2):220-224.

  13. Heart bypass surgery - minimally invasive - discharge

    MedlinePlus

    ... thrombosis, 9th ed: American College of Chest Physicians evidence-based clinical practice guidelines. Chest . 2012;141(2 ... bypass surgery - minimally invasive Heart failure - overview High blood cholesterol ...

  14. Coevolution of Epidemics, Social Networks, and Individual Behavior: A Case Study

    NASA Astrophysics Data System (ADS)

    Chen, Jiangzhuo; Marathe, Achla; Marathe, Madhav

    This research shows how a limited supply of antivirals can be distributed optimally between the hospitals and the market so that the attack rate is minimized and enough revenue is generated to recover the cost of the antivirals. Results using an individual based model find that prevalence elastic demand behavior delays the epidemic and change in the social contact network induced by isolation reduces the peak of the epidemic significantly. A microeconomic analysis methodology combining behavioral economics and agent-based simulation is a major contribution of this work. In this paper we apply this methodology to analyze the fairness of the stockpile distribution, and the response of human behavior to disease prevalence level and its interaction with the market.

  15. Maintaining oncologic integrity with minimally invasive resection of pediatric embryonal tumors.

    PubMed

    Phelps, Hannah M; Ayers, Gregory D; Ndolo, Josephine M; Dietrich, Hannah L; Watson, Katherine D; Hilmes, Melissa A; Lovvorn, Harold N

    2018-05-08

    Embryonal tumors arise typically in infants and young children and are often massive at presentation. Operative resection is a cornerstone in the multimodal treatment of embryonal tumors but potentially disrupts therapeutic timelines. When used appropriately, minimally invasive surgery can minimize treatment delays. The oncologic integrity and safety attainable with minimally invasive resection of embryonal tumors, however, remains controversial. Query of the Vanderbilt Cancer Registry identified all children treated for intracavitary, embryonal tumors during a 15-year period. Tumors were assessed radiographically to measure volume (mL) and image-defined risk factors (neuroblastic tumors only) at time of diagnosis, and at preresection and postresection. Patient and tumor characteristics, perioperative details, and oncologic outcomes were compared between minimally invasive surgery and open resection of tumors of comparable size. A total of 202 patients were treated for 206 intracavitary embryonal tumors, of which 178 were resected either open (n = 152, 85%) or with minimally invasive surgery (n = 26, 15%). The 5-year, relapse-free, and overall survival were not significantly different after minimally invasive surgery or open resection of tumors having a volume less than 100 mL, corresponding to the largest resected with minimally invasive surgery (P = .249 and P = .124, respectively). No difference in margin status or lymph node sampling between the 2 operative approaches was detected (p = .333 and p = .070, respectively). Advantages associated with minimally invasive surgery were decreased blood loss (P < .001), decreased operating time (P = .002), and shorter hospital stay (P < .001). Characteristically, minimally invasive surgery was used for smaller volume and earlier stage neuroblastic tumors without image-defined risk factors. When selected appropriately, minimally invasive resection of pediatric embryonal tumors, particularly

  16. Electromyographic monitoring and its anatomical implications in minimally invasive spine surgery.

    PubMed

    Uribe, Juan S; Vale, Fernando L; Dakwar, Elias

    2010-12-15

    Literature review. The objective of this article is to examine current intraoperative electromyography (EMG) neurophysiologic monitoring methods and their application in minimally invasive techniques. We will also discuss the recent application of EMG and its anatomic implications to the minimally invasive lateral transpsoas approach to the spine. Minimally invasive techniques require that the same goals of surgery be achieved, with the hope of decreased morbidity to the patient. Unlike standard open procedures, direct visualization of the anatomy is decreased. To increase the safety of minimally invasive spine surgery, neurophysiological monitoring techniques have been developed. Review of the literature was performed using the National Center for Biotechnology Information databases using PUBMED/MEDLINE. All articles in the English language discussing the use of intraoperative EMG monitoring and minimally invasive spine surgery were reviewed. The role of EMG monitoring in special reference to the minimally invasive lateral transpsoas approach is also described. In total, 76 articles were identified that discussed the role of neuromonitoring in spine surgery. The majority of articles on EMG and spine surgery discuss the use of intraoperative neurophysiological monitoring (IOM) for safe and accurate pedicle screw placement. In general, there is a paucity of literature that pertains to intraoperative EMG neuromonitoring and minimally invasive spine surgery. Recently, EMG has been used during minimally invasive lateral transpsoas approach to the lumbar spine for interbody fusion. The addition of EMG to the lateral approach has contributed to decrease the complication rate from 30% to less than 1%. In minimally invasive approaches to the spine, the use of EMG IOM might provide additional safety, such as percutaneous pedicle screw placement, where visualization is limited compared with conventional open procedures. In addition to knowledge of the anatomy and image

  17. Minimizing radiation damage in nonlinear optical crystals

    DOEpatents

    Cooke, D.W.; Bennett, B.L.; Cockroft, N.J.

    1998-09-08

    Methods are disclosed for minimizing laser induced damage to nonlinear crystals, such as KTP crystals, involving various means for electrically grounding the crystals in order to diffuse electrical discharges within the crystals caused by the incident laser beam. In certain embodiments, electrically conductive material is deposited onto or into surfaces of the nonlinear crystals and the electrically conductive surfaces are connected to an electrical ground. To minimize electrical discharges on crystal surfaces that are not covered by the grounded electrically conductive material, a vacuum may be created around the nonlinear crystal. 5 figs.

  18. Symmetry breaking for drag minimization

    NASA Astrophysics Data System (ADS)

    Roper, Marcus; Squires, Todd M.; Brenner, Michael P.

    2005-11-01

    For locomotion at high Reynolds numbers drag minimization favors fore-aft asymmetric slender shapes with blunt noses and sharp trailing edges. On the other hand, in an inertialess fluid the drag experienced by a body is independent of whether it travels forward or backward through the fluid, so there is no advantage to having a single preferred swimming direction. In fact numerically determined minimum drag shapes are known to exhibit almost no fore-aft asymmetry even at moderate Re. We show that asymmetry persists, albeit extremely weakly, down to vanishingly small Re, scaling asymptotically as Re^3. The need to minimize drag to maximize speed for a given propulsive capacity gives one possible mechanism for the increasing asymmetry in the body plans seen in nature, as organisms increase in size and swimming speed from bacteria like E-Coli up to pursuit predator fish such as tuna. If it is the dominant mechanism, then this signature scaling will be observed in the shapes of motile micro-organisms.

  19. A minimal multiconfigurational technique.

    PubMed

    Fernández Rico, J; Paniagua, M; GarcíA De La Vega, J M; Fernández-Alonso, J I; Fantucci, P

    1986-04-01

    A direct minimization method previously presented by the authors is applied here to biconfigurational wave functions. A very moderate increasing in the time by iteration with respect to the one-determinant calculation and good convergence properties have been found. So qualitatively correct studies on singlet systems with strong biradical character can be performed with a cost similar to that required by Hartree-Fock calculations. Copyright © 1986 John Wiley & Sons, Inc.

  20. Minimally invasive management of hepatic cysts: indications and complications.

    PubMed

    Vardakostas, D; Damaskos, C; Garmpis, N; Antoniou, E A; Kontzoglou, K; Kouraklis, G; Dimitroulis, D

    2018-03-01

    Liver cysts are divided into congenital and acquired. Congenital cystic lesions include polycystic liver disease, simple cysts, duct related and ciliated hepatic foregut cysts. Acquired cystic lesions are divided into infectious and non-infectious. The infectious cysts are the hydatid cyst, the amoebic abscess, and the pyogenic abscess, whereas the non-infectious cysts are neoplastic cysts and false cysts. While modern medicine provides a lot of minimally invasive therapeutic modalities, there has emerged a pressing need for understanding the various types of liver cysts, the possible minimal therapeutic options along with their indications and complications. We aim is to clarify the role of minimally invasive techniques in the management of hepatic cysts. A literature review was performed using the MEDLINE database. The search terms were: liver cyst, minimally invasive, laparoscopic, percutaneous, drainage and fenestration. We reviewed 82 English language publications articles, published until October 2017. Minimally invasive management of liver LC is an emerging field including many therapeutic modalities ranging from the percutaneous aspiration of pyogenic abscesses to laparoscopic hepatectomy for hepatic cystadenomas. The most used techniques are percutaneous drainage, laparoscopic fenestration, and laparoscopic hepatectomy. The application of the various minimally invasive approaches, as well as their indication and complications, depend on the type of the cystic lesion, its size and its position in the liver. Percutaneous drainage is mostly used in simple cysts, hydatid cysts, pyogenic abscesses and bilomas. Laparoscopic fenestration is mostly used in simple cysts and polycystic liver disease. Finally, laparoscopic hepatectomy is mostly used in polycystic liver disease, hydatid cysts, and cystadenomas.

  1. Waste Minimization Assessment for Multilayered Printed Circuit Board Manufacturing

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has funded a pilot project to assist small- and medium- size manu facturers who want to minimize their generation of hazardous waste but lack the expertise to do so. Waste Minimization Assessment Centers (WMACs) were established at s...

  2. WASTE MINIMIZATION ASSESSMENT FOR A MANUFACTURER OF PRINTED LABELS

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has funded a pilot project to assist small- and medium-size manufacturers who want to minimize their generation of hazardous waste but lack the expertise to do so. Waste Minimization Assessment Centers (WMACs) were established at sel...

  3. On the Support of Minimizers of Causal Variational Principles

    NASA Astrophysics Data System (ADS)

    Finster, Felix; Schiefeneder, Daniela

    2013-11-01

    A class of causal variational principles on a compact manifold is introduced and analyzed both numerically and analytically. It is proved under general assumptions that the support of a minimizing measure is either completely timelike, or it is singular in the sense that its interior is empty. In the examples of the circle, the sphere and certain flag manifolds, the general results are supplemented by a more detailed and explicit analysis of the minimizers. On the sphere, we get a connection to packing problems and the Tammes distribution. Moreover, the minimal action is estimated from above and below.

  4. Endoscopic ultrasound-guided transesophageal thoracentesis for minimal pleural effusion.

    PubMed

    Rana, Surinder Singh; Sharma, Ravi; Gupta, Rajesh

    2018-06-19

    Pleural effusion is a common finding both in patients with benign and malignant diseases of pleura and lung with diagnostic thoracentesis establishing the diagnosis in the majority of cases. The diagnostic thoracentesis can be done either blindly or under the guidance of ultrasound or computed tomography. However, minimal pleural effusion is difficult to sample even under image guidance. Endoscopic ultrasound (EUS) is known to detect smaller volume of pleural effusion and, thus, can help in guiding thoracentesis. To analyze the safety and efficacy of EUS-guided diagnostic thoracentesis in patients with undiagnosed minimal pleural effusion retrospectively. Retrospective analysis of the data of patients with minimal pleural effusion, who underwent EUS-guided transesophageal diagnostic thoracentesis over last 2 years, was performed. Thirteen patients (11 male; mean age 46.7 ± 16.2 years) with undiagnosed minimal pleural effusion underwent successful EUS-guided transesophageal diagnostic thoracentesis using a 22-G needle. Seven (53%) patients had fever on presentation whereas two presented with cough and loss of appetite. Eight to 54 mL fluid was aspirated with an attempt to completely empty the pleural cavity. There were no complications of the procedure. EUS-guided diagnostic thoracentesis is a safe and effective alternative for evaluating patients with minimal pleural effusion.

  5. Method for detecting core malware sites related to biomedical information systems.

    PubMed

    Kim, Dohoon; Choi, Donghee; Jin, Jonghyun

    2015-01-01

    Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%.

  6. Method for Detecting Core Malware Sites Related to Biomedical Information Systems

    PubMed Central

    Kim, Dohoon; Choi, Donghee; Jin, Jonghyun

    2015-01-01

    Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%. PMID:25821511

  7. Gravitational Instantons and Minimal Surfaces

    NASA Astrophysics Data System (ADS)

    Nutku, Y.

    1996-12-01

    We show that for every minimal surface in E3 there is a gravitational instanton, an exact solution of the Einstein field equations with Euclidean signature and anti-self-dual curvature. The explicit metric establishing this correspondence is presented and a new class of exact solutions are obtained.

  8. Minimal Left-Right Symmetric Dark Matter.

    PubMed

    Heeck, Julian; Patra, Sudhanwa

    2015-09-18

    We show that left-right symmetric models can easily accommodate stable TeV-scale dark matter particles without the need for an ad hoc stabilizing symmetry. The stability of a newly introduced multiplet either arises accidentally as in the minimal dark matter framework or comes courtesy of the remaining unbroken Z_{2} subgroup of B-L. Only one new parameter is introduced: the mass of the new multiplet. As minimal examples, we study left-right fermion triplets and quintuplets and show that they can form viable two-component dark matter. This approach is, in particular, valid for SU(2)×SU(2)×U(1) models that explain the recent diboson excess at ATLAS in terms of a new charged gauge boson of mass 2 TeV.

  9. Integrating knowledge across domains to advance the science of health behavior: overcoming challenges and facilitating success.

    PubMed

    Klein, William M P; Grenen, Emily G; O'Connell, Mary; Blanch-Hartigan, Danielle; Chou, Wen-Ying Sylvia; Hall, Kara L; Taber, Jennifer M; Vogel, Amanda L

    2017-03-01

    Health behaviors often co-occur and have common determinants at multiple levels (e.g., individual, relational, environmental). Nevertheless, research programs often examine single health behaviors without a systematic attempt to integrate knowledge across behaviors. This paper highlights the significant potential of cross-cutting behavioral research to advance our understanding of the mechanisms and causal factors that shape health behaviors. It also offers suggestions for how researchers could develop more effective interventions. We highlight barriers to such an integrative science along with potential steps that can be taken to address these barriers. With a more nuanced understanding of health behavior, redundancies in research can be minimized, and a stronger evidence base for the development of health behavior interventions can be realized.

  10. EPA issues interim final waste minimization guidance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bergeson, L.L.

    1993-08-01

    The U.S. Environmental Protection Agency (EPA) has released a new and detailed interim final guidance to assist hazardous waste generators in certifying they have a waste minimization program in place under the Resource Conservation and Recovery Act (RCRA). EPA's guidance identifies the basic elements of a waste minimization program in place that, if present, will allow people to certify they have implemented a program to reduce the volume and toxicity of hazardous waste to the extent economically practical. The guidance is directly applicable to generators of 1000 or more kilograms per month of hazardous waste, or large-quantity generators, and tomore » owners and operators of hazardous waste treatment, storage or disposal facilities who manage their own hazardous waste on site. Small-quantity generators that generate more than 100 kilograms, but less than 1,000 kilograms, per month of hazardous waste are not subject to the same program in place certification requirement. Rather, they must certify on their manifests that they have made a good faith effort to minimize their waste generation.« less

  11. Finite-element grid improvement by minimization of stiffness matrix trace

    NASA Technical Reports Server (NTRS)

    Kittur, Madan G.; Huston, Ronald L.; Oswald, Fred B.

    1989-01-01

    A new and simple method of finite-element grid improvement is presented. The objective is to improve the accuracy of the analysis. The procedure is based on a minimization of the trace of the stiffness matrix. For a broad class of problems this minimization is seen to be equivalent to minimizing the potential energy. The method is illustrated with the classical tapered bar problem examined earlier by Prager and Masur. Identical results are obtained.

  12. Finite-element grid improvement by minimization of stiffness matrix trace

    NASA Technical Reports Server (NTRS)

    Kittur, Madan G.; Huston, Ronald L.; Oswald, Fred B.

    1987-01-01

    A new and simple method of finite-element grid improvement is presented. The objective is to improve the accuracy of the analysis. The procedure is based on a minimization of the trace of the stiffness matrix. For a broad class of problems this minimization is seen to be equivalent to minimizing the potential energy. The method is illustrated with the classical tapered bar problem examined earlier by Prager and Masur. Identical results are obtained.

  13. Behavior Disorders and Learning Disabilities over 15 Years in Rural Vermont.

    ERIC Educational Resources Information Center

    Huessy, Hans R.

    Early identification of Minimal Brain Dysfunction (MBD) is now easier, partly as a result of a series of 3 studies made in rural Vermont over a period of 15 years. MBD victims exhibit different behaviors at different ages. "Fidgetiness", a "nuisance" factor, and poor learning are all strong predictors of MBD for children at the…

  14. Minimizing Sources of Airborne, Aerosolized, and Contact Contaminants in the OR Environment.

    PubMed

    Armellino, Donna

    2017-12-01

    Surgical site infections are unintended consequences of surgery that can cause harm to patients and place financial burdens on health care organizations. Extrinsic factors in the OR-including health care providers' behavior and practices that modify air movement, the physical environment, equipment, or surgical instruments-can increase microbial contamination. Microbes can be transported into the surgical incision by airborne or contact routes and contribute to a surgical site infection. Simple practices to prevent infection-such as minimizing airborne particles and contaminants, maintaining equipment according to the manufacturer's recommendations, cleaning and disinfecting the environment and surgical instruments, and performing proper hand hygiene-can reduce the degree of microbial contamination. Perioperative leaders and health care providers can help decrease the patient's risk of surgical site infection with proactive preventive practices that break the chain of infection. Copyright © 2017 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  15. Advances in understanding behavioral phenotypes in neurogenetic syndromes.

    PubMed

    Harris, James C

    2010-11-15

    Syndrome-specific behavior was proposed by Langdon Down in his first clinical descriptions. Research interest followed but waned during the eugenics era when antisocial behavior was attributed to people with intellectual disability (ID) and the US Supreme Court legalized involuntary sterilization. When these claims were refuted and behavioral treatments introduced, their focus on environmental determination minimized the importance of biological research. The modern era began with the recognition that patterned behavior, for example, self-injury in Lesch-Nyhan syndrome and hyperphagia in PWS, was syndrome-specific, and when parent support groups pointed out syndrome-specific behavioral similarities in their children. Syndrome-specific rating scales and methodologies followed to allow behavioral comparisons between syndromes. The focus initially was on specific behaviors but with refinements in neuropsychological tests has expanded to include neurocognitive profiles. Greater clarification in genetic diagnoses has led to mutant mouse behavioral models and neurophysiologic and neuroimaging strategies have made possible the study of brain circuits. There is growing interest in investigating the developmental trajectory of behaviors from infancy to adulthood and old age. Because anxiety, mood disturbance, repetitive behaviors, and social deficits commonly occur in people with severe ID, those affected are often given multiple psychiatric diagnoses. This has led to considerable confusion in the literature. It is critical to focus on specific behaviors and cognitive patterns in research and not confuse psychiatric symptoms that lack precise definitions and involve multiple genes, the so-called psychiatric phenotype, with the more specific behavioral phenotype. New treatments based on knowledge of underlying neurobiology call for more fine-grained definition of behavior. © 2010 Wiley-Liss, Inc.

  16. Minimal access surgery for mitral valve endocarditis.

    PubMed

    Barbero, Cristina; Marchetto, Giovanni; Ricci, Davide; Mancuso, Samuel; Boffini, Massimo; Cecchi, Enrico; De Rosa, Francesco Giuseppe; Rinaldi, Mauro

    2017-08-01

    Minimal access mitral valve surgery (MVS) has already proved to be feasible and effective with low perioperative mortality and excellent long-term outcomes. However, experience in more complex valve diseases such as infective endocarditis (IE) still remains limited. The aim of this retrospective study was to evaluate early and long-term results of minimal access MVS for IE. Data were entered into a dedicated database. Analysis was performed retrospectively for the 8-year period between January 2007 and April 2015. During the study period, 35 consecutive patients underwent minimal access MVS for IE at our department. Twenty-four had diagnosis of native MV endocarditis (68.6%) and 11 of mitral prosthesis endocarditis (31.4%).Thirty patients underwent early MVS (85.7%), and 5 patients were operated after the completion of antibiotic treatment (14.3%). Seven patients underwent MV repair (20%), 17 patients underwent MV replacement (48.6%), and 11 patients underwent mitral prosthesis replacement (31.4%). Thirty-day mortality was 11.4% (4 patients). No neurological or vascular complications were reported. One patient underwent reoperation for prosthesis IE relapse after 37 days. Overall actuarial survival rate at 1 and 5 years was 83%; freedom from MV reoperation and/or recurrence of IE at 1 and 5 years was 97%. Minimally invasive MVS for IE is feasible and associated with good early and long-term results. Preoperative accurate patient selection and transoesophageal echocardiography evaluation is mandatory for surgical planning. © The Author 2017. Published by Oxford University Press on behalf of the European Association for Cardio-Thoracic Surgery. All rights reserved.

  17. NEWSUMT: A FORTRAN program for inequality constrained function minimization, users guide

    NASA Technical Reports Server (NTRS)

    Miura, H.; Schmit, L. A., Jr.

    1979-01-01

    A computer program written in FORTRAN subroutine form for the solution of linear and nonlinear constrained and unconstrained function minimization problems is presented. The algorithm is the sequence of unconstrained minimizations using the Newton's method for unconstrained function minimizations. The use of NEWSUMT and the definition of all parameters are described.

  18. Esophageal surgery in minimally invasive era

    PubMed Central

    Bencini, Lapo; Moraldi, Luca; Bartolini, Ilenia; Coratti, Andrea

    2016-01-01

    The widespread popularity of new surgical technologies such as laparoscopy, thoracoscopy and robotics has led many surgeons to treat esophageal diseases with these methods. The expected benefits of minimally invasive surgery (MIS) mainly include reductions of postoperative complications, length of hospital stay, and pain and better cosmetic results. All of these benefits could potentially be of great interest when dealing with the esophagus due to the potentially severe complications that can occur after conventional surgery. Moreover, robotic platforms are expected to reduce many of the difficulties encountered during advanced laparoscopic and thoracoscopic procedures such as anastomotic reconstructions, accurate lymphadenectomies, and vascular sutures. Almost all esophageal diseases are approachable in a minimally invasive way, including diverticula, gastro-esophageal reflux disease, achalasia, perforations and cancer. Nevertheless, while the limits of MIS for benign esophageal diseases are mainly technical issues and costs, oncologic outcomes remain the cornerstone of any procedure to cure malignancies, for which the long-term results are critical. Furthermore, many of the minimally invasive esophageal operations should be compared to pharmacologic interventions and advanced pure endoscopic procedures; such a comparison requires a difficult literature analysis and leads to some confounding results of clinical trials. This review aims to examine the evidence for the use of MIS in both malignancies and more common benign disease of the esophagus, with a particular emphasis on future developments and ongoing areas of research. PMID:26843913

  19. Concurrent and Short-Term Longitudinal Associations between Peer Victimization and School and Recess Liking during Middle Childhood

    ERIC Educational Resources Information Center

    Boulton, Michael J.; Chau, Cam; Whitehand, Caroline; Amataya, Kishori; Murray, Lindsay

    2009-01-01

    Background: Prior studies outside of the UK have shown that peer victimization is negatively associated with school adjustment. Aims: To examine concurrent and short-term longitudinal associations between peer victimization (physical, malicious teasing, deliberate social exclusion, and malicious gossiping) and two measures of school adjustment…

  20. Computer Documentation: Effects on Students' Computing Behaviors, Attitudes, and Use of Computers.

    ERIC Educational Resources Information Center

    Duin, Ann Hill

    This study investigated the effects of a minimal manual version versus a cards version of documentation on students' computing behaviors while learning to use a telecommunication system (Appleshare), students' attitudes toward the documentation, and students' later use of the system. Guidelines from the work of Carroll and colleagues at the IBM…

  1. An overview of computer viruses in a research environment

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1991-01-01

    The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically threats aimed at subverting computer security. Here, computer viruses are examined as a malicious logic in a research and development environment. A relation is drawn between the viruses and various models of security and integrity. Current research techniques aimed at controlling the threats posed to computer systems by threatening viruses in particular and malicious logic in general are examined. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken.

  2. Free time minimizers for the three-body problem

    NASA Astrophysics Data System (ADS)

    Moeckel, Richard; Montgomery, Richard; Sánchez Morgado, Héctor

    2018-03-01

    Free time minimizers of the action (called "semi-static" solutions by Mañe in International congress on dynamical systems in Montevideo (a tribute to Ricardo Mañé), vol 362, pp 120-131, 1996) play a central role in the theory of weak KAM solutions to the Hamilton-Jacobi equation (Fathi in Weak KAM Theorem in Lagrangian Dynamics Preliminary Version Number 10, 2017). We prove that any solution to Newton's three-body problem which is asymptotic to Lagrange's parabolic homothetic solution is eventually a free time minimizer. Conversely, we prove that every free time minimizer tends to Lagrange's solution, provided the mass ratios lie in a certain large open set of mass ratios. We were inspired by the work of Da Luz and Maderna (Math Proc Camb Philos Soc 156:209-227, 1980) which showed that every free time minimizer for the N-body problem is parabolic and therefore must be asymptotic to the set of central configurations. We exclude being asymptotic to Euler's central configurations by a second variation argument. Central configurations correspond to rest points for the McGehee blown-up dynamics. The large open set of mass ratios are those for which the linearized dynamics at each Euler rest point has a complex eigenvalue.

  3. The Parisi Formula has a Unique Minimizer

    NASA Astrophysics Data System (ADS)

    Auffinger, Antonio; Chen, Wei-Kuo

    2015-05-01

    In 1979, Parisi (Phys Rev Lett 43:1754-1756, 1979) predicted a variational formula for the thermodynamic limit of the free energy in the Sherrington-Kirkpatrick model, and described the role played by its minimizer. This formula was verified in the seminal work of Talagrand (Ann Math 163(1):221-263, 2006) and later generalized to the mixed p-spin models by Panchenko (Ann Probab 42(3):946-958, 2014). In this paper, we prove that the minimizer in Parisi's formula is unique at any temperature and external field by establishing the strict convexity of the Parisi functional.

  4. Minimal Power Latch for Single-Slope ADCs

    NASA Technical Reports Server (NTRS)

    Hancock, Bruce R. (Inventor)

    2015-01-01

    A latch circuit that uses two interoperating latches. The latch circuit has the beneficial feature that it switches only a single time during a measurement that uses a stair step or ramp function as an input signal in an analog to digital converter. This feature minimizes the amount of power that is consumed in the latch and also minimizes the amount of high frequency noise that is generated by the latch. An application using a plurality of such latch circuits in a parallel decoding ADC for use in an image sensor is given as an example.

  5. Minimally invasive therapy of primary breast cancer

    NASA Astrophysics Data System (ADS)

    Robinson, David S.

    2000-01-01

    Treating disease with little alteration has long been a goal of medical science. During the past quarter century, technological advances have brought forth minimally invasive approaches to the surgical diagnosis and treatment of cancer. In the domain of breast cancer, a less invasive sentinel lymph node biopsy may replace axillary lymphadenectomy for many patients, and image guided core biopsies have minimalized the degree of surgical intervention needed for tissue diagnosis. This mirrors the primary treatment of breast cancer that over the past century has progressed from mastectomy to breast preservation with a progressively diminishing operative field.

  6. Qualifying and quantifying minimal hepatic encephalopathy.

    PubMed

    Morgan, Marsha Y; Amodio, Piero; Cook, Nicola A; Jackson, Clive D; Kircheis, Gerald; Lauridsen, Mette M; Montagnese, Sara; Schiff, Sami; Weissenborn, Karin

    2016-12-01

    Minimal hepatic encephalopathy is the term applied to the neuropsychiatric status of patients with cirrhosis who are unimpaired on clinical examination but show alterations in neuropsychological tests exploring psychomotor speed/executive function and/or in neurophysiological variables. There is no gold standard for the diagnosis of this syndrome. As these patients have, by definition, no recognizable clinical features of brain dysfunction, the primary prerequisite for the diagnosis is careful exclusion of clinical symptoms and signs. A large number of psychometric tests/test systems have been evaluated in this patient group. Of these the best known and validated is the Portal Systemic Hepatic Encephalopathy Score (PHES) derived from a test battery of five paper and pencil tests; normative reference data are available in several countries. The electroencephalogram (EEG) has been used to diagnose hepatic encephalopathy since the 1950s but, once popular, the technology is not as accessible now as it once was. The performance characteristics of the EEG are critically dependent on the type of analysis undertaken; spectral analysis has better performance characteristics than visual analysis; evolving analytical techniques may provide better diagnostic information while the advent of portable wireless headsets may facilitate more widespread use. A large number of other diagnostic tools have been validated for the diagnosis of minimal hepatic encephalopathy including Critical Flicker Frequency, the Inhibitory Control Test, the Stroop test, the Scan package and the Continuous Reaction Time; each has its pros and cons; strengths and weaknesses; protagonists and detractors. Recent AASLD/EASL Practice Guidelines suggest that the diagnosis of minimal hepatic encephalopathy should be based on the PHES test together with one of the validated alternative techniques or the EEG. Minimal hepatic encephalopathy has a detrimental effect on the well-being of patients and their care

  7. A randomized prospective study of desflurane versus isoflurane in minimal flow anesthesia using “equilibration time” as the change-over point to minimal flow

    PubMed Central

    Mallik, Tanuja; Aneja, S; Tope, R; Muralidhar, V

    2012-01-01

    Background: In the administration of minimal flow anesthesia, traditionally a fixed time period of high flow has been used before changing over to minimal flow. However, newer studies have used “equilibration time” of a volatile anesthetic agent as the change-over point. Materials and Methods: A randomized prospective study was conducted on 60 patients, who were divided into two groups of 30 patients each. Two volatile inhalational anesthetic agents were compared. Group I received desflurane (n = 30) and group II isoflurane (n = 30). Both the groups received an initial high flow till equilibration between inspired (Fi) and expired (Fe) agent concentration were achieved, which was defined as Fe/Fi = 0.8. The mean (SD) equilibration time was obtained for both the agent. Then, a drift in end-tidal agent concentration during the minimal flow anesthesia and recovery profile was noted. Results: The mean equilibration time obtained for desflurane and isoflurane were 4.96 ± 1.60 and 16.96 ± 9.64 min (P < 0.001). The drift in end-tidal agent concentration over time was minimal in the desflurane group (P = 0.065). Recovery time was 5.70 ± 2.78 min in the desflurane group and 8.06 ± 31 min in the isoflurane group (P = 0.004). Conclusion: Use of equilibration time of the volatile anesthetic agent as a change-over point, from high flow to minimal flow, can help us use minimal flow anesthesia, in a more efficient way. PMID:23225926

  8. Determination of the Core of a Minimal Bacterial Gene Set†

    PubMed Central

    Gil, Rosario; Silva, Francisco J.; Peretó, Juli; Moya, Andrés

    2004-01-01

    The availability of a large number of complete genome sequences raises the question of how many genes are essential for cellular life. Trying to reconstruct the core of the protein-coding gene set for a hypothetical minimal bacterial cell, we have performed a computational comparative analysis of eight bacterial genomes. Six of the analyzed genomes are very small due to a dramatic genome size reduction process, while the other two, corresponding to free-living relatives, are larger. The available data from several systematic experimental approaches to define all the essential genes in some completely sequenced bacterial genomes were also considered, and a reconstruction of a minimal metabolic machinery necessary to sustain life was carried out. The proposed minimal genome contains 206 protein-coding genes with all the genetic information necessary for self-maintenance and reproduction in the presence of a full complement of essential nutrients and in the absence of environmental stress. The main features of such a minimal gene set, as well as the metabolic functions that must be present in the hypothetical minimal cell, are discussed. PMID:15353568

  9. A Defense of Semantic Minimalism

    ERIC Educational Resources Information Center

    Kim, Su

    2012-01-01

    Semantic Minimalism is a position about the semantic content of declarative sentences, i.e., the content that is determined entirely by syntax. It is defined by the following two points: "Point 1": The semantic content is a complete/truth-conditional proposition. "Point 2": The semantic content is useful to a theory of…

  10. Minimal change disease in a patient with myasthenia gravis: A case report.

    PubMed

    Tsai, Jun-Li; Tsai, Shang-Feng

    2016-09-01

    Myasthenia gravis superimposed with proteinuria is a very rare disorder with only 39 cases reported so far. Of these cases, the most commonly associated disorder is minimal change disease. Myasthenia gravis and minimal change disease are both related to the dysfunction of T lymphocytes and hence the 2 disorders may be connected. Here we report the first case on a patient diagnosed with myasthenia gravis concurrently with the minimal change disease, and it was presented in the absence of thymoma or thymic hyperplasia. Treatment for myasthenia gravis also lowered proteinuria of minimal change disease. He ever experienced good control for myasthenia gravis and minimal change disease. However, pneumonia related septic shock occurred to him and finally he was dead. Minimal change disease is generally considered to occur subsequent to the onset of myasthenia gravis with causal association. After extensive literature review, we noted only 47.8% minimal change disease had occurred after the onset of myasthenia gravis. Minimal change disease mostly occurs in children and if diagnosed in adults, clinicians should search for a potential cause such as myasthenia gravis and other associated thymic disorders.

  11. An Overview of Randomization and Minimization Programs for Randomized Clinical Trials

    PubMed Central

    Saghaei, Mahmoud

    2011-01-01

    Randomization is an essential component of sound clinical trials, which prevents selection biases and helps in blinding the allocations. Randomization is a process by which subsequent subjects are enrolled into trial groups only by chance, which essentially eliminates selection biases. A serious consequence of randomization is severe imbalance among the treatment groups with respect to some prognostic factors, which invalidate the trial results or necessitate complex and usually unreliable secondary analysis to eradicate the source of imbalances. Minimization on the other hand tends to allocate in such a way as to minimize the differences among groups, with respect to prognostic factors. Pure minimization is therefore completely deterministic, that is, one can predict the allocation of the next subject by knowing the factor levels of a previously enrolled subject and having the properties of the next subject. To eliminate the predictability of randomization, it is necessary to include some elements of randomness in the minimization algorithms. In this article brief descriptions of randomization and minimization are presented followed by introducing selected randomization and minimization programs. PMID:22606659

  12. Minimally Invasive Surgery in Gastrointestinal Cancer: Benefits, Challenges, and Solutions for Underutilization

    PubMed Central

    Gusani, Niraj J.; Kimchi, Eric T.; Kavic, Stephen M.

    2014-01-01

    Background and Objectives: After the widespread application of minimally invasive surgery for benign diseases and given its proven safety and efficacy, minimally invasive surgery for gastrointestinal cancer has gained substantial attention in the past several years. Despite the large number of publications on the topic and level I evidence to support its use in colon cancer, minimally invasive surgery for most gastrointestinal malignancies is still underused. Methods: We explore some of the challenges that face the fusion of minimally invasive surgery technology in the management of gastrointestinal malignancies and propose solutions that may help increase the utilization in the future. These solutions are based on extensive literature review, observation of current trends and practices in this field, and discussion made with experts in the field. Results: We propose 4 different solutions to increase the use of minimally invasive surgery in the treatment of gastrointestinal malignancies: collaboration between surgical oncologists/hepatopancreatobiliary surgeons and minimally invasive surgeons at the same institution; a single surgeon performing 2 fellowships in surgical oncology/hepatopancreatobiliary surgery and minimally invasive surgery; establishing centers of excellence in minimally invasive gastrointestinal cancer management; and finally, using robotic technology to help with complex laparoscopic skills. Conclusions: Multiple studies have confirmed the utility of minimally invasive surgery techniques in dealing with patients with gastrointestinal malignancies. However, training continues to be the most important challenge that faces the use of minimally invasive surgery in the management of gastrointestinal malignancy; implementation of our proposed solutions may help increase the rate of adoption in the future. PMID:25489209

  13. Children's exercise behavior: the moderating role of habit processes within the theory of planned behavior.

    PubMed

    Hashim, H A; Jawis, M N; Wahat, A; Grove, J R

    2014-01-01

    The moderating effect of exercise habit strength and specific habit processes within the theory of planned behavior (TPB) was tested in children. Participants were primary school students (N = 380, mean age = 10.46 ± .52). The data were collected using self-report measures followed by one-mile run test performance. Data were analyzed using structural equation modeling. The findings revealed that 34, 57, and 9% of students could be classified as low, moderate, and high in PA, respectively. Path analysis for the overall model revealed significant path loadings (p = < .05), except for the attitude-intention path. Moderating effects results revealed that strong habit strength extinguished the effects of intention on PA. Habit strength has the potential to minimize the deliberate processes associated with intention to exercise, thereby increasing the probability of intention-behavior translation. For specific habit processes, only negative affect appears to moderate the relationships between the TPB variables.

  14. Providing intraosseous anesthesia with minimal invasion.

    PubMed

    Giffin, K M

    1994-08-01

    A new variation of intraosseous anesthesia--crestal anesthesia--that is rapid, site-specific and minimally invasive is presented. The technique uses alveolar crest nutrient canals for anesthetic delivery without penetrating either bone or periodontal ligament.

  15. Reach-to-grasp movement as a minimization process.

    PubMed

    Yang, Fang; Feldman, Anatol G

    2010-02-01

    It is known that hand transport and grasping are functionally different but spatially coordinated components of reach-to-grasp (RTG) movements. As an extension of this notion, we suggested that body segments involved in RTG movements are controlled as a coherent ensemble by a global minimization process associated with the necessity for the hand to reach the motor goal. Different RTG components emerge following this process without pre-programming. Specifically, the minimization process may result from the tendency of neuromuscular elements to diminish the spatial gap between the actual arm-hand configuration and its virtual (referent) configuration specified by the brain. The referent configuration is specified depending on the object shape, localization, and orientation. Since the minimization process is gradual, it can be interrupted and resumed following mechanical perturbations, at any phase during RTG movements, including hand closure. To test this prediction of the minimization hypothesis, we asked subjects to reach and grasp a cube placed within the reach of the arm. Vision was prevented during movement until the hand returned to its initial position. As predicted, by arresting wrist motion at different points of hand transport in randomly selected trials, it was possible to halt changes in hand aperture at any phase, not only during hand opening but also during hand closure. Aperture changes resumed soon after the wrist was released. Another test of the minimization hypothesis was made in RTG movements to an object placed beyond the reach of the arm. It has previously been shown (Rossi et al. in J Physiol 538:659-671, 2002) that in such movements, the trunk motion begins to contribute to hand transport only after a critical phase when the shifts in the referent arm configuration have finished (at about the time when hand velocity is maximal). The minimization rule suggests that when the virtual contribution of the arm to hand transport is completed

  16. [Minimally invasive approaches to hip and knee joints for total joint replacement].

    PubMed

    Rittmeister, M; König, D P; Eysel, P; Kerschbaumer, F

    2004-11-01

    The manuscript features the different minimally invasive approaches to the hip for joint replacement. These include medial, anterior, anterolateral, and posterior approaches. The concept of minimally invasive hip arthroplasty makes sense if it is an integral part of a larger concept to lower postoperative morbidity. Besides minimal soft tissue trauma, this concept involves preoperative patient education, preemptive analgesia, and postoperative physiotherapy. It is our belief that minimal incision techniques for the hip are not suited for all patients and all surgeons. The different minimally invasive approaches to the knee joint for implantation of a knee arthroplasty are described and discussed. There have been no studies published yet that fulfill EBM criteria. The data so far show that minimally invasive approaches and implantation techniques for total knee replacements lead to quicker rehabilitation of patients.

  17. Validation of a Behavioral Approach for Measuring Saccades in Parkinson's Disease.

    PubMed

    Turner, Travis H; Renfroe, Jenna B; Duppstadt-Delambo, Amy; Hinson, Vanessa K

    2017-01-01

    Speed and control of saccades are related to disease progression and cognitive functioning in Parkinson's disease (PD). Traditional eye-tracking complexities encumber application for individual evaluations and clinical trials. The authors examined psychometric properties of standalone tasks for reflexive prosaccade latency, volitional saccade initiation, and saccade inhibition (antisaccade) in a heterogeneous sample of 65 PD patients. Demographics had minimal impact on task performance. Thirty-day test-retest reliability estimates for behavioral tasks were acceptable and similar to traditional eye tracking. Behavioral tasks demonstrated concurrent validity with traditional eye-tracking measures; discriminant validity was less clear. Saccade initiation and inhibition discriminated PD patients with cognitive impairment. The present findings support further development and use of the behavioral tasks for assessing latency and control of saccades in PD.

  18. Minimally Invasive Surgical Pulmonary Embolectomy: A Potential Alternative to Conventional Sternotomy.

    PubMed

    Pasrija, Chetan; Shah, Aakash; Sultanik, Elliot; Rouse, Michael; Ghoreishi, Mehrdad; Bittle, Gregory J; Boulos, Francesca; Griffith, Bartley P; Kon, Zachary N

    Surgical pulmonary embolectomy has gained increasing popularity over the past decade with multiple series reporting excellent outcomes in the treatment of submassive pulmonary embolism. However, a significant barrier to the broader adoption of surgical pulmonary embolectomy remains the large incision and long recovery after a full sternotomy. We report the safety and efficacy of using a minimally invasive approach to surgical pulmonary embolectomy. All consecutive patients undergoing surgical pulmonary embolectomy for a submassive pulmonary embolism (2015-2017) were reviewed. Patients were stratified as conventional or minimally invasive. The minimally invasive approach included a 5- to 7-cm skin incision with upper hemisternotomy to the third intercostal space. The primary outcomes were in-hospital and 90-day survival. Thirty patients (conventional = 20, minimally invasive = 10) were identified. Operative time was similar between the two groups, but cardiopulmonary bypass time was significantly longer in the minimally invasive group (58 vs 94 minutes, P = 0.04). While ventilator time and intensive care unit length of stay were similar between groups, hospital length of stay was 4.5 days shorter in the minimally invasive group, and there was a trend toward less blood product use. In-hospital and 90-day survival was 100%. Within the minimally invasive cohort, median right ventricular dysfunction at discharge was none-mild and no patient experienced postoperative renal failure, deep sternal wound infection, sepsis, or stroke. Minimally invasive surgical pulmonary embolectomy appears to be a feasible approach in the treatment of patients with a submassive pulmonary embolism. A larger, prospective analysis comparing this modality with conventional surgical pulmonary embolectomy may be warranted.

  19. Design of an Intervention to Minimize Ingestion of Fecal Microbes by Young Children in Rural Zimbabwe.

    PubMed

    Mbuya, Mduduzi N N; Tavengwa, Naume V; Stoltzfus, Rebecca J; Curtis, Valerie; Pelto, Gretel H; Ntozini, Robert; Kambarami, Rukundo A; Fundira, Dadirai; Malaba, Thokozile R; Maunze, Diana; Morgan, Peter; Mangwadu, Goldberg; Humphrey, Jean H

    2015-12-15

    We sought to develop a water, sanitation, and hygiene (WASH) intervention to minimize fecal-oral transmission among children aged 0-18 months in the Sanitation Hygiene Infant Nutrition Efficacy (SHINE) trial. We undertook 4 phases of formative research, comprising in-depth interviews, focus group discussions, behavior trials, and a combination of observations and microbiological sampling methods. The resulting WASH intervention comprises material inputs and behavior change communication to promote stool disposal, handwashing with soap, water treatment, protected exploratory play, and hygienic infant feeding. Nurture and disgust were found to be key motivators, and are used as emotional triggers. The concept of a safe play space for young children was particularly novel, and families were eager to implement this after learning about the risks of unprotected exploratory play. An iterative process of formative research was essential to create a sequenced and integrated longitudinal intervention for a SHINE household as it expects (during pregnancy) and then cares for a new child. © The Author 2015. Published by Oxford University Press for the Infectious Diseases Society of America.

  20. Evolution of quality characteristics of minimally processed asparagus during storage in different lighting conditions.

    PubMed

    Sanz, S; Olarte, C; Ayala, F; Echávarri, J F

    2009-08-01

    The effect of different types of lighting (white, green, red, and blue light) on minimally processed asparagus during storage at 4 degrees C was studied. The gas concentrations in the packages, pH, mesophilic counts, and weight loss were also determined. Lighting caused an increase in physiological activity. Asparagus stored under lighting achieved atmospheres with higher CO(2) and lower O(2) content than samples kept in the dark. This activity increase explains the greater deterioration experienced by samples stored under lighting, which clearly affected texture and especially color, accelerating the appearance of greenish hues in the tips and reddish-brown hues in the spears. Exposure to light had a negative effect on the quality parameters of the asparagus and it caused a significant reduction in shelf life. Hence, the 11 d shelf life of samples kept in the dark was reduced to only 3 d in samples kept under red and green light, and to 7 d in those kept under white and blue light. However, quality indicators such as the color of the tips and texture showed significantly better behavior under blue light than with white light, which allows us to state that it is better to use this type of light or blue-tinted packaging film for the display of minimally processed asparagus to consumers.

  1. The Study of Intelligent Vehicle Navigation Path Based on Behavior Coordination of Particle Swarm.

    PubMed

    Han, Gaining; Fu, Weiping; Wang, Wen

    2016-01-01

    In the behavior dynamics model, behavior competition leads to the shock problem of the intelligent vehicle navigation path, because of the simultaneous occurrence of the time-variant target behavior and obstacle avoidance behavior. Considering the safety and real-time of intelligent vehicle, the particle swarm optimization (PSO) algorithm is proposed to solve these problems for the optimization of weight coefficients of the heading angle and the path velocity. Firstly, according to the behavior dynamics model, the fitness function is defined concerning the intelligent vehicle driving characteristics, the distance between intelligent vehicle and obstacle, and distance of intelligent vehicle and target. Secondly, behavior coordination parameters that minimize the fitness function are obtained by particle swarm optimization algorithms. Finally, the simulation results show that the optimization method and its fitness function can improve the perturbations of the vehicle planning path and real-time and reliability.

  2. Sequentially reweighted TV minimization for CT metal artifact reduction.

    PubMed

    Zhang, Xiaomeng; Xing, Lei

    2013-07-01

    Metal artifact reduction has long been an important topic in x-ray CT image reconstruction. In this work, the authors propose an iterative method that sequentially minimizes a reweighted total variation (TV) of the image and produces substantially artifact-reduced reconstructions. A sequentially reweighted TV minimization algorithm is proposed to fully exploit the sparseness of image gradients (IG). The authors first formulate a constrained optimization model that minimizes a weighted TV of the image, subject to the constraint that the estimated projection data are within a specified tolerance of the available projection measurements, with image non-negativity enforced. The authors then solve a sequence of weighted TV minimization problems where weights used for the next iteration are computed from the current solution. Using the complete projection data, the algorithm first reconstructs an image from which a binary metal image can be extracted. Forward projection of the binary image identifies metal traces in the projection space. The metal-free background image is then reconstructed from the metal-trace-excluded projection data by employing a different set of weights. Each minimization problem is solved using a gradient method that alternates projection-onto-convex-sets and steepest descent. A series of simulation and experimental studies are performed to evaluate the proposed approach. Our study shows that the sequentially reweighted scheme, by altering a single parameter in the weighting function, flexibly controls the sparsity of the IG and reconstructs artifacts-free images in a two-stage process. It successfully produces images with significantly reduced streak artifacts, suppressed noise and well-preserved contrast and edge properties. The sequentially reweighed TV minimization provides a systematic approach for suppressing CT metal artifacts. The technique can also be generalized to other "missing data" problems in CT image reconstruction.

  3. Fostering Multiple Healthy Lifestyle Behaviors for Primary Prevention of Cancer

    PubMed Central

    Spring, Bonnie; King, Abby; Pagoto, Sherry; Van Horn, Linda; Fisher, Jeffery

    2015-01-01

    Synopsis The odds of developing cancer are increased by specific lifestyle behaviors (tobacco use, excess energy and alcohol intakes, low fruit and vegetable intake, physical inactivity, risky sexual behaviors, and inadequate sun protection). These behaviors are largely absent in childhood, emerge and tend to cluster over the lifespan, and show an increased prevalence among those disadvantaged by low education or income or minority status. Even though risk behaviors are modifiable, few are diminishing in the population over time. We review the prevalence and population distribution of these behaviors and apply an ecological model to describe effective or promising healthy lifestyle interventions targeted to the individual, the sociocultural context, or environmental and policy influences. We suggest that implementing multiple health behavior change interventions across several ecological levels could substantially reduce the prevalence of cancer and the burden it places on the public and the health care system. We note important still unresolved questions about which behaviors can be intervened upon simultaneously in order to maximize positive behavioral synergies, minimize negative ones, and effectively engage underserved populations. We conclude that interprofessional collaboration is needed to appropriately evaluate and convey the value of primary prevention of cancer and other chronic diseases. PMID:25730716

  4. Quasiprobability Representations of Quantum Mechanics with Minimal Negativity

    NASA Astrophysics Data System (ADS)

    Zhu, Huangjun

    2016-09-01

    Quasiprobability representations, such as the Wigner function, play an important role in various research areas. The inevitable appearance of negativity in such representations is often regarded as a signature of nonclassicality, which has profound implications for quantum computation. However, little is known about the minimal negativity that is necessary in general quasiprobability representations. Here we focus on a natural class of quasiprobability representations that is distinguished by simplicity and economy. We introduce three measures of negativity concerning the representations of quantum states, unitary transformations, and quantum channels, respectively. Quite surprisingly, all three measures lead to the same representations with minimal negativity, which are in one-to-one correspondence with the elusive symmetric informationally complete measurements. In addition, most representations with minimal negativity are automatically covariant with respect to the Heisenberg-Weyl groups. Furthermore, our study reveals an interesting tradeoff between negativity and symmetry in quasiprobability representations.

  5. Non-minimal derivative couplings of the composite metric

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heisenberg, Lavinia, E-mail: laviniah@kth.se

    2015-11-01

    In the context of massive gravity, bi-gravity and multi-gravity non-minimal matter couplings via a specific composite effective metric were investigated recently. Even if these couplings generically reintroduce the Boulware-Deser ghost, this composite metric is unique in the sense that the ghost reemerges only beyond the decoupling limit and the matter quantum loop corrections do not detune the potential interactions. We consider non-minimal derivative couplings of the composite metric to matter fields for a specific subclass of Horndeski scalar-tensor interactions. We first explore these couplings in the mini-superspace and investigate in which scenario the ghost remains absent. We further study thesemore » non-minimal derivative couplings in the decoupling-limit of the theory and show that the equation of motion for the helicity-0 mode remains second order in derivatives. Finally, we discuss preliminary implications for cosmology.« less

  6. Non-minimal derivative couplings of the composite metric

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heisenberg, Lavinia; Department of Physics & The Oskar Klein Centre,AlbaNova University Centre, 10691 Stockholm

    2015-11-04

    In the context of massive gravity, bi-gravity and multi-gravity non-minimal matter couplings via a specific composite effective metric were investigated recently. Even if these couplings generically reintroduce the Boulware-Deser ghost, this composite metric is unique in the sense that the ghost reemerges only beyond the decoupling limit and the matter quantum loop corrections do not detune the potential interactions. We consider non-minimal derivative couplings of the composite metric to matter fields for a specific subclass of Horndeski scalar-tensor interactions. We first explore these couplings in the mini-superspace and investigate in which scenario the ghost remains absent. We further study thesemore » non-minimal derivative couplings in the decoupling-limit of the theory and show that the equation of motion for the helicity-0 mode remains second order in derivatives. Finally, we discuss preliminary implications for cosmology.« less

  7. Mathematical Analysis for Non-reciprocal-interaction-based Model of Collective Behavior

    NASA Astrophysics Data System (ADS)

    Kano, Takeshi; Osuka, Koichi; Kawakatsu, Toshihiro; Ishiguro, Akio

    2017-12-01

    In many natural and social systems, collective behaviors emerge as a consequence of non-reciprocal interaction between their constituents. As a first step towards understanding the core principle that underlies these phenomena, we previously proposed a minimal model of collective behavior based on non-reciprocal interactions by drawing inspiration from friendship formation in human society, and demonstrated via simulations that various non-trivial patterns emerge by changing parameters. In this study, a mathematical analysis of the proposed model wherein the system size is small is performed. Through the analysis, the mechanism of the transition between several patterns is elucidated.

  8. Minimally invasive functional approach for cholesteatoma surgery.

    PubMed

    Hanna, Bassem M; Kivekäs, Ilkka; Wu, Yi-Hsuan; Guo, Lee J; Lin, Huang; Guidi, Jessica; Poe, Dennis

    2014-10-01

    Report the efficacy of a functional minimally invasive approach for cholesteatoma surgery. Retrospective review of surgical cases performed between 1996 and 2008. One hundred sixty-nine patient charts were reviewed in which ears with primary cholesteatomas that extended beyond the mesotympanum were operated on with a plan for canal wall up (CWU) mastoidectomy. The surgical approach consisted of progressive exposure from transcanal to postauricular tympanoplasty to CWU mastoidectomy, as needed, to identify and lyse the fibrous attachments that bind the capsule to the surrounding mucosa. Endoscopic guidance was employed as appropriate to minimize exposure needs. Any planned second-stage operations were attempted with a transcanal approach if appropriate and with endoscopic assistance. One hundred eighty-four ears of 169 patients were included. The median age was 32 years (range, 1-79 years). The mean follow-up was 3.2 years (range, 1-11 years). Eighty-three (45%) were planned for a second-look operation, and three (2%) required unplanned second operations. The overall recurrence rate was 24/184 (13%), and the unexpected residual rate was 5/184 (3%). The residual rate with endoscopy (5/119, 4%,) or without endoscopy (1/65, 2%), were not significantly different. Hearing results in 156 ears improved significantly, from a preoperative pure-tone average (PTA) of 41 dB to a postoperative PTA average of 29 dB (P < .0001). A functional minimally invasive approach to cholesteatoma surgery provided equivalent residual rates but higher recurrence rates compared to published canal wall down mastoidectomy. Endoscopic techniques were helpful in providing adequate views while minimizing exposure. © 2014 The American Laryngological, Rhinological and Otological Society, Inc.

  9. What is Quantum Mechanics? A Minimal Formulation

    NASA Astrophysics Data System (ADS)

    Friedberg, R.; Hohenberg, P. C.

    2018-03-01

    This paper presents a minimal formulation of nonrelativistic quantum mechanics, by which is meant a formulation which describes the theory in a succinct, self-contained, clear, unambiguous and of course correct manner. The bulk of the presentation is the so-called "microscopic theory", applicable to any closed system S of arbitrary size N, using concepts referring to S alone, without resort to external apparatus or external agents. An example of a similar minimal microscopic theory is the standard formulation of classical mechanics, which serves as the template for a minimal quantum theory. The only substantive assumption required is the replacement of the classical Euclidean phase space by Hilbert space in the quantum case, with the attendant all-important phenomenon of quantum incompatibility. Two fundamental theorems of Hilbert space, the Kochen-Specker-Bell theorem and Gleason's theorem, then lead inevitably to the well-known Born probability rule. For both classical and quantum mechanics, questions of physical implementation and experimental verification of the predictions of the theories are the domain of the macroscopic theory, which is argued to be a special case or application of the more general microscopic theory.

  10. Internet Training to Respond to Aggressive Resident Behaviors

    PubMed Central

    Irvine, A. Blair; Billow, Molly B.; Gates, Donna M.; Fitzwater, Evelyn L.; Seeley, John R.; Bourgeois, Michelle

    2012-01-01

    Purpose: This research evaluated an individualized Internet training designed to teach nurse aides (NAs) strategies to prevent or, if necessary, react to resident aggression in ways that are safe for the resident as well as the caregiver. Design and Methods: A randomized treatment and control design was implemented, with baseline, 1-, and 2-month assessments for 158 NAs. The training involved 2 weekly visits. The Internet intervention was a behaviorally focused and video-based training that included content on skills for safely dealing with physical aggression. Measures included video situation testing and assessment of psychosocial constructs associated with behavior change. Results: Analysis of covariance showed positive results for knowledge, attitudes, self-efficacy, and empathy, with medium–large effect sizes maintained after 2 months. The training was well received by participants. Implications: Internet training is a viable approach to shape appropriate NA reactions to aggressive resident behaviors. This format has future potential because it offers fidelity of presentation and automated documentation, with minimal supervision. PMID:22038338

  11. 12 CFR 264b.4 - Gifts of minimal value.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... RULES REGARDING FOREIGN GIFTS AND DECORATIONS § 264b.4 Gifts of minimal value. (a) Board employees may... occur on the same day. (b) Board employees may determine at the time a gift is offered whether it is of... for valuation. (c) Disagreements over whether a gift is of minimal value will be resolved by an...

  12. Minimal realization of right-handed gauge symmetry

    NASA Astrophysics Data System (ADS)

    Nomura, Takaaki; Okada, Hiroshi

    2018-01-01

    We propose a minimally extended gauge symmetry model with U (1 )R , where only the right-handed fermions have nonzero charges in the fermion sector. To achieve both anomaly cancellations and minimality, three right-handed neutrinos are naturally required, and the standard model Higgs has to have nonzero charge under this symmetry. Then we find that its breaking scale(Λ ) is restricted by precise measurement of neutral gauge boson in the standard model; therefore, O (10 ) TeV ≲Λ . We also discuss its testability of the new gauge boson and discrimination of U (1 )R model from U (1 )B-L one at collider physics such as LHC and ILC.

  13. Minimal scales from an extended Hilbert space

    NASA Astrophysics Data System (ADS)

    Kober, Martin; Nicolini, Piero

    2010-12-01

    We consider an extension of the conventional quantum Heisenberg algebra, assuming that coordinates as well as momenta fulfil nontrivial commutation relations. As a consequence, a minimal length and a minimal mass scale are implemented. Our commutators do not depend on positions and momenta and we provide an extension of the coordinate coherent state approach to noncommutative geometry. We explore, as a toy model, the corresponding quantum field theory in a (2+1)-dimensional spacetime. Then we investigate the more realistic case of a (3+1)-dimensional spacetime, foliated into noncommutative planes. As a result, we obtain propagators, which are finite in the ultraviolet as well as the infrared regime.

  14. A dynamic parking charge optimal control model under perspective of commuters' evolutionary game behavior

    NASA Astrophysics Data System (ADS)

    Lin, XuXun; Yuan, PengCheng

    2018-01-01

    In this research we consider commuters' dynamic learning effect by modeling the trip mode choice behavior from a new perspective of dynamic evolutionary game theory. We explore the behavior pattern of different types of commuters and study the evolution path and equilibrium properties under different traffic conditions. We further establish a dynamic parking charge optimal control (referred to as DPCOC) model to alter commuters' trip mode choice while minimizing the total social cost. Numerical tests show. (1) Under fixed parking fee policy, the evolutionary results are completely decided by the travel time and the only method for public transit induction is to increase the parking charge price. (2) Compared with fixed parking fee policy, DPCOC policy proposed in this research has several advantages. Firstly, it can effectively turn the evolutionary path and evolutionary stable strategy to a better situation while minimizing the total social cost. Secondly, it can reduce the sensitivity of trip mode choice behavior to traffic congestion and improve the ability to resist interferences and emergencies. Thirdly, it is able to control the private car proportion to a stable state and make the trip behavior more predictable for the transportation management department. The research results can provide theoretical basis and decision-making references for commuters' mode choice prediction, dynamic setting of urban parking charge prices and public transit induction.

  15. Employment references: walking scared between the minefield of defamation and the specter of negligent hiring.

    PubMed

    McConnell, C R

    2000-12-01

    In present day reference checking, many of the same organizations that seek as much information as possible about people they wish to hire resist giving out more than a bare minimum of information to other organizations. The strongest force driving this minimal reference information release is fear of legal action taken because of something said about an individual (defamation, supposedly). Many employers appear so frightened of being sued for libel or slander that they share nothing of substance, usually not realizing that in trying to protect themselves against defamation charges they are increasing their legal risk associated with negligent hiring charges. However, truthful reference information can be provided with minimal risk if it is provided in good faith, given only to someone who has a legitimate need to know, is related strictly to job in character, and is not communicated maliciously. Also, reference always must be answered completely objectively with information verifiable in the individual's personnel file.

  16. Generalized minimal principle for rotor filaments.

    PubMed

    Dierckx, Hans; Wellner, Marcel; Bernus, Olivier; Verschelde, Henri

    2015-05-01

    To a reaction-diffusion medium with an inhomogeneous anisotropic diffusion tensor D, we add a fourth spatial dimension such that the determinant of the diffusion tensor is constant in four dimensions. We propose a generalized minimal principle for rotor filaments, stating that the scroll wave filament strives to minimize its surface area in the higher-dimensional space. As a consequence, stationary scroll wave filaments in the original 3D medium are geodesic curves with respect to the metric tensor G=det(D)D(-1). The theory is confirmed by numerical simulations for positive and negative filament tension and a model with a non-stationary spiral core. We conclude that filaments in cardiac tissue with positive tension preferentially reside or anchor in regions where cardiac cells are less interconnected, such as portions of the cardiac wall with a large number of cleavage planes.

  17. Minimal Risk in Pediatric Research: A Philosophical Review and Reconsideration

    PubMed Central

    Rossi, John; Nelson, Robert M.

    2017-01-01

    Despite more than thirty years of debate, disagreement persists among research ethicists about the most appropriate way to interpret the U.S. regulations on pediatric research, specifically the categories of “minimal risk” and a “minor increase over minimal risk.” Focusing primarily on the definition of “minimal risk,” we argue in this article that the continued debate about the pediatric risk categories is at least partly because their conceptual status is seldom considered directly. Once this is done, it becomes clear that the most popular strategy for interpreting “minimal risk”—defining it as a specific set of risks—is indefensible and, from a pragmatic perspective, unlikely to resolve disagreement. Primarily this is because judgments about minimal risk are both normative and heavily intuitive in nature and thus cannot easily be captured by reductions to a given set of risks. We suggest instead that a more defensible approach to evaluating risk should incorporate room for reflection and deliberation. This dispositional, deliberative framework can nonetheless accommodate a number of intellectual resources for reducing reliance on sheer intuition and improving the quality of risk evaluations. PMID:28777661

  18. Action-minimizing solutions of the one-dimensional N-body problem

    NASA Astrophysics Data System (ADS)

    Yu, Xiang; Zhang, Shiqing

    2018-05-01

    We supplement the following result of C. Marchal on the Newtonian N-body problem: A path minimizing the Lagrangian action functional between two given configurations is always a true (collision-free) solution when the dimension d of the physical space R^d satisfies d≥2. The focus of this paper is on the fixed-ends problem for the one-dimensional Newtonian N-body problem. We prove that a path minimizing the action functional in the set of paths joining two given configurations and having all the time the same order is always a true (collision-free) solution. Considering the one-dimensional N-body problem with equal masses, we prove that (i) collision instants are isolated for a path minimizing the action functional between two given configurations, (ii) if the particles at two endpoints have the same order, then the path minimizing the action functional is always a true (collision-free) solution and (iii) when the particles at two endpoints have different order, although there must be collisions for any path, we can prove that there are at most N! - 1 collisions for any action-minimizing path.

  19. Past, Present, and Future of Minimally Invasive Abdominal Surgery

    PubMed Central

    Antoniou, George A.; Antoniou, Athanasios I.; Granderath, Frank-Alexander

    2015-01-01

    Laparoscopic surgery has generated a revolution in operative medicine during the past few decades. Although strongly criticized during its early years, minimization of surgical trauma and the benefits of minimization to the patient have been brought to our attention through the efforts and vision of a few pioneers in the recent history of medicine. The German gynecologist Kurt Semm (1927–2003) transformed the use of laparoscopy for diagnostic purposes into a modern therapeutic surgical concept, having performed the first laparoscopic appendectomy, inspiring Erich Mühe and many other surgeons around the world to perform a wide spectrum of procedures by minimally invasive means. Laparoscopic cholecystectomy soon became the gold standard, and various laparoscopic procedures are now preferred over open approaches, in the light of emerging evidence that demonstrates less operative stress, reduced pain, and shorter convalescence. Natural orifice transluminal endoscopic surgery (NOTES) and single-incision laparoscopic surgery (SILS) may be considered further steps toward minimization of surgical trauma, although these methods have not yet been standardized. Laparoscopic surgery with the use of a robotic platform constitutes a promising field of investigation. New technologies are to be considered under the prism of the history of surgery; they seem to be a step toward further minimization of surgical trauma, but not definite therapeutic modalities. Patient safety and medical ethics must be the cornerstone of future investigation and implementation of new techniques. PMID:26508823

  20. A comprehensive Reputation mechanism for ubiquitous healthcare environment exploiting cloud model.

    PubMed

    Athanasiou, Georgia; Lymberopoulos, Dimitrios

    2016-08-01

    Absence of trust foundations may outweigh benefits of ubiquitous and personalized mental healthcare supervision provided within a Ubiquitous Healthcare environment (UH). Trust is composed by patient's Personal Interaction Experience (PIE) and social entourage accumulated PIE, i.e. Reputation (R). In this paper, a cloud-based Reputation mechanism is proposed. Since PIE is the elementary trust information source, also an Updating mechanism of PIE, is introduced, in this paper. Cloud materialization of combined mechanisms provides adaptability to UH Providers' dynamic behavior, facilitates detection of milking behaviors and complex malicious attacks while meets the challenge of limited accuracy in case of data sparseness. The effectiveness of the proposed mechanisms is verified via simulation in MATLAB.

  1. Don't Wag the Dog: Extending the Reach of Applied Behavior Analysis

    PubMed Central

    Normand, Matthew P.; Kohn, Carolynn S.

    2013-01-01

    We argue that the field of behavior analysis would be best served if behavior analysts worked to extend the reach of behavioral services into a more diverse range of settings and with more varied populations, with an emphasis on the establishment of new career opportunities for graduating students. This is not a new proposal, but it is a tall order; it is not difficult to see why many would choose a surer route to gainful employment. Currently, the most fruitful career path for behavior analysts in practice is in the area of autism and developmental disabilities. For the continued growth of the field of behavior analysis, however, it is important to foster new career opportunities for those trained as behavior analysts. Toward this end, we identify several fields that seem well suited to behavior analysts and summarize the training requirements and likely professional outcomes for behavior analysts who pursue education and certification in these fields. These fields require relatively little additional formal training in the hopes of minimizing the response effort necessary for individuals who have already completed a rigorous program of graduate study in behavior analysis. PMID:25729134

  2. Minimally invasive vein therapy and treatment options for endovenous heat-induced thrombus.

    PubMed

    Frasier, Krista; Latessa, Victoria

    2008-06-01

    Radiofrequency ablation and endovenous laser therapy are types of minimally invasive techniques that have been used in the treatment of chronic venous insufficiency. In both procedures, high-intensity heat via thermal energy is produced and delivered via an endovenous catheter placed in the saphenous vein. This results in changes that therapeutically induce closure of the vein by denaturing the vessel wall with subsequent thrombus formation. Patients undergo ultrasound 48 to 72 hours postprocedure to confirm vessel occlusion and assess for possible extension of thrombus into the deep venous system. Thrombus is frequently visualized with the procedure in the tributaries, the venous dilations, and at times the saphenofemoral junction. In any other setting, thrombus at the saphenofemoral junction would warrant anticoagulation. However, the characteristics, composition, and behavior of endovenous heat-induced thrombus are different than de novo thrombosis. This postprocedure endovenous heat-induced thrombus is considered a normal consequence of the procedure and does not require traditional anticoagulation in most cases, depending on the location.

  3. Mesohysteresis model for ferromagnetic materials by minimization of the micromagnetic free energy

    NASA Astrophysics Data System (ADS)

    van den Berg, A.; Dupré, L.; Van de Wiele, B.; Crevecoeur, G.

    2009-04-01

    To study the connection between macroscopic hysteretic behavior and the microstructural properties, this paper presents and validates a new material dependent three-dimensional mesoscopic magnetic hysteresis model. In the presented mesoscopic description, the different micromagnetic energy terms are reformulated on the space scale of the magnetic domains. The sample is discretized in cubic cells, each with a local stress state, local bcc crystallographic axes, etc. The magnetization is assumed to align with one of the three crystallographic axes, in positive or negative sense, defining six volume fractions within each cell. The micromagnetic Gibbs free energy is described in terms of these volume fractions. Hysteresis loops are computed by minimizing the mesoscopic Gibbs free energy using a modified gradient search for a sequence of external applied fields. To validate the mesohysteresis model, we studied the magnetic memory properties. Numerical experiments reveal that (1) minor hysteresis loops are indeed closed and (2) the closed minor loops are erased from the memory.

  4. Imitation by social interaction? Analysis of a minimal agent-based model of the correspondence problem

    PubMed Central

    Froese, Tom; Lenay, Charles; Ikegami, Takashi

    2012-01-01

    One of the major challenges faced by explanations of imitation is the “correspondence problem”: how is an agent able to match its bodily expression to the observed bodily expression of another agent, especially when there is no possibility of external self-observation? Current theories only consider the possibility of an innate or acquired matching mechanism belonging to an isolated individual. In this paper we evaluate an alternative that situates the explanation of imitation in the inter-individual dynamics of the interaction process itself. We implemented a minimal model of two interacting agents based on a recent psychological study of imitative behavior during minimalist perceptual crossing. The agents cannot sense the configuration of their own body, and do not have access to other's body configuration, either. And yet surprisingly they are still capable of converging on matching bodily configurations. Analysis revealed that the agents solved this version of the correspondence problem in terms of collective properties of the interaction process. Contrary to the assumption that such properties merely serve as external input or scaffolding for individual mechanisms, it was found that the behavioral dynamics were distributed across the model as a whole. PMID:23060768

  5. Minimal sufficient positive-operator valued measure on a separable Hilbert space

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kuramochi, Yui, E-mail: kuramochi.yui.22c@st.kyoto-u.ac.jp

    We introduce a concept of a minimal sufficient positive-operator valued measure (POVM), which is the least redundant POVM among the POVMs that have the equivalent information about the measured quantum system. Assuming the system Hilbert space to be separable, we show that for a given POVM, a sufficient statistic called a Lehmann-Scheffé-Bahadur statistic induces a minimal sufficient POVM. We also show that every POVM has an equivalent minimal sufficient POVM and that such a minimal sufficient POVM is unique up to relabeling neglecting null sets. We apply these results to discrete POVMs and information conservation conditions proposed by the author.

  6. Steiner minimal trees in small neighbourhoods of points in Riemannian manifolds

    NASA Astrophysics Data System (ADS)

    Chikin, V. M.

    2017-07-01

    In contrast to the Euclidean case, almost no Steiner minimal trees with concrete boundaries on Riemannian manifolds are known. A result describing the types of Steiner minimal trees on a Riemannian manifold for arbitrary small boundaries is obtained. As a consequence, it is shown that for sufficiently small regular n-gons with n≥ 7 their boundaries without a longest side are Steiner minimal trees. Bibliography: 22 titles.

  7. Adaptive behaviors in multi-agent source localization using passive sensing.

    PubMed

    Shaukat, Mansoor; Chitre, Mandar

    2016-12-01

    In this paper, the role of adaptive group cohesion in a cooperative multi-agent source localization problem is investigated. A distributed source localization algorithm is presented for a homogeneous team of simple agents. An agent uses a single sensor to sense the gradient and two sensors to sense its neighbors. The algorithm is a set of individualistic and social behaviors where the individualistic behavior is as simple as an agent keeping its previous heading and is not self-sufficient in localizing the source. Source localization is achieved as an emergent property through agent's adaptive interactions with the neighbors and the environment. Given a single agent is incapable of localizing the source, maintaining team connectivity at all times is crucial. Two simple temporal sampling behaviors, intensity-based-adaptation and connectivity-based-adaptation, ensure an efficient localization strategy with minimal agent breakaways. The agent behaviors are simultaneously optimized using a two phase evolutionary optimization process. The optimized behaviors are estimated with analytical models and the resulting collective behavior is validated against the agent's sensor and actuator noise, strong multi-path interference due to environment variability, initialization distance sensitivity and loss of source signal.

  8. Envy Up, Scorn Down: How Comparison Divides Us

    PubMed Central

    Fiske, Susan T.

    2013-01-01

    Comparison compels people, even as it stresses, depresses, and divides us. Comparison is only natural, but the collateral damage reveals envy upward and scorn downward, and these emotions, arguably, poison people and their relationships. Summaries of several experiments—using questionnaire, psychometric, response-time, electromyographic, and neuroimaging data—illustrate the dynamics of envy up and scorn down, as well as proposing how to mitigate their effects. Initial studies suggest the importance of status. Other data show how scorn down minimizes thought about another’s mind; power deactivates mental concepts. Regarding envy up, other studies demonstrate that Schadenfreude (malicious joy) targets envied outgroups. However, counterstereotypic information, empathy, and outcome dependency can mitigate both scorn and envy. PMID:21058760

  9. 46 CFR 190.05-3 - Fire hazards to be minimized.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS CONSTRUCTION AND ARRANGEMENT General Fire Protection § 190.05-3 Fire hazards to be minimized. (a) The general construction of the vessel shall be such as to minimize fire hazards. ...

  10. Jerk Minimization Method for Vibration Control in Buildings

    NASA Technical Reports Server (NTRS)

    Abatan, Ayo O.; Yao, Leummim

    1997-01-01

    In many vibration minimization control problems for high rise buildings subject to strong earthquake loads, the emphasis has been on a combination of minimizing the displacement, the velocity and the acceleration of the motion of the building. In most cases, the accelerations that are involved are not necessarily large but the change in them (jerk) are abrupt. These changes in magnitude or direction are responsible for most building damage and also create discomfort like motion sickness for inhabitants of these structures because of the element of surprise. We propose a method of minimizing also the jerk which is the sudden change in acceleration or the derivative of the acceleration using classical linear quadratic optimal controls. This was done through the introduction of a quadratic performance index involving the cost due to the jerk; a special change of variable; and using the jerk as a control variable. The values of the optimal control are obtained using the Riccati equation.

  11. Gene Architectures that Minimize Cost of Gene Expression.

    PubMed

    Frumkin, Idan; Schirman, Dvir; Rotman, Aviv; Li, Fangfei; Zahavi, Liron; Mordret, Ernest; Asraf, Omer; Wu, Song; Levy, Sasha F; Pilpel, Yitzhak

    2017-01-05

    Gene expression burdens cells by consuming resources and energy. While numerous studies have investigated regulation of expression level, little is known about gene design elements that govern expression costs. Here, we ask how cells minimize production costs while maintaining a given protein expression level and whether there are gene architectures that optimize this process. We measured fitness of ∼14,000 E. coli strains, each expressing a reporter gene with a unique 5' architecture. By comparing cost-effective and ineffective architectures, we found that cost per protein molecule could be minimized by lowering transcription levels, regulating translation speeds, and utilizing amino acids that are cheap to synthesize and that are less hydrophobic. We then examined natural E. coli genes and found that highly expressed genes have evolved more forcefully to minimize costs associated with their expression. Our study thus elucidates gene design elements that improve the economy of protein expression in natural and heterologous systems. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Terrorism in Pakistan: a behavioral sciences perspective.

    PubMed

    Nizami, Asad Tamizuddin; Rana, Mowadat Hussain; Hassan, Tariq Mahmood; Minhas, Fareed Aslam

    2014-01-01

    This article reviews the behavioral science perspectives of terrorism in Pakistan. It can be argued that Pakistan has gained worldwide attention for "terrorism" and its role in the "war against terrorism". The region is well placed geopolitically for economic successes but has been plagued by terrorism in various shapes and forms. A behavioral sciences perspective of terrorism is an attempt to explain it in this part of the world as a complex interplay of historical, geopolitical, anthropological and psychosocial factors and forces. Drawing from theories by Western scholars to explain the behavioral and cognitive underpinnings of a terrorist mind, the authors highlight the peculiarities of similar operatives at individual and group levels. Thorny issues related to the ethical and human right dimensions of the topic are visited from the unique perspective of a society challenged by schisms and divergence of opinions at individual, family, and community levels. The authors have attempted to minimize the political descriptions, although this cannot be avoided entirely, because of the nature of terrorism. Copyright © 2014 John Wiley & Sons, Ltd.

  13. Minimal Data and Site Specific Approaches

    EPA Science Inventory

    As part of a workshop, Tools for Assessing Stream Dissolved Minerals, approaches and EPA tools are described for site specific development of water quality criteria based on observations from Arkansas streams using minimal data. Discussion topics will include site-specific appro...

  14. Minimizing both dropped formulas and concepts in knowledge fusion

    NASA Astrophysics Data System (ADS)

    Grégoire, Éric

    2006-04-01

    In this paper, a new family of approaches to fuse inconsistent knowledge sources is introduced in a standard logical setting. They combine two preference criteria to arbitrate between conflicting information: the minimization of falsified formulas and the minimization of the number of the different atoms that are involved in those formulas. Although these criteria exhibit a syntactical flavor, the approaches are semantically-defined.

  15. The soft constraints hypothesis: a rational analysis approach to resource allocation for interactive behavior.

    PubMed

    Gray, Wayne D; Sims, Chris R; Fu, Wai-Tat; Schoelles, Michael J

    2006-07-01

    Soft constraints hypothesis (SCH) is a rational analysis approach that holds that the mixture of perceptual-motor and cognitive resources allocated for interactive behavior is adjusted based on temporal cost-benefit tradeoffs. Alternative approaches maintain that cognitive resources are in some sense protected or conserved in that greater amounts of perceptual-motor effort will be expended to conserve lesser amounts of cognitive effort. One alternative, the minimum memory hypothesis (MMH), holds that people favor strategies that minimize the use of memory. SCH is compared with MMH across 3 experiments and with predictions of an Ideal Performer Model that uses ACT-R's memory system in a reinforcement learning approach that maximizes expected utility by minimizing time. Model and data support the SCH view of resource allocation; at the under 1000-ms level of analysis, mixtures of cognitive and perceptual-motor resources are adjusted based on their cost-benefit tradeoffs for interactive behavior. ((c) 2006 APA, all rights reserved).

  16. Cognitive Model of Animal Behavior to Comprehend an Aspect of Decision-Making

    NASA Astrophysics Data System (ADS)

    Migita, Masao; Moriyama, Tohru

    2004-08-01

    Most animal behaviors are considered to have been evolved through their own courses of natural selection. Since mechanisms of natural selection depend tightly on environments in which animals of interest inhabit, the environment for an animal appears a priori, and stimulus-response (S-R) relationships are stable as long as it returns constant benefit. We claim, however, no environment for an animal cannot be regarded as a priori and any animal can exhibit more elaborated behavior than S-R. In other words, every animal is more or less cognitive in terms that it may modify a meaning of stimulus. We introduce a minimal model to demonstrate the cognitive aspect of the pill bug's turn alternation (TA) behavior. The simulated pill bug can modify its own response pattern to the stimulus of water, though stable response appears to be prerequisite to TA behavior.

  17. Minimally processed vegetable salads: microbial quality evaluation.

    PubMed

    Fröder, Hans; Martins, Cecília Geraldes; De Souza, Katia Leani Oliveira; Landgraf, Mariza; Franco, Bernadette D G M; Destro, Maria Teresa

    2007-05-01

    The increasing demand for fresh fruits and vegetables and for convenience foods is causing an expansion of the market share for minimally processed vegetables. Among the more common pathogenic microorganisms that can be transmitted to humans by these products are Listeria monocytogenes, Escherichia coli O157:H7, and Salmonella. The aim of this study was to evaluate the microbial quality of a selection of minimally processed vegetables. A total of 181 samples of minimally processed leafy salads were collected from retailers in the city of Sao Paulo, Brazil. Counts of total coliforms, fecal coliforms, Enterobacteriaceae, psychrotrophic microorganisms, and Salmonella were conducted for 133 samples. L. monocytogenes was assessed in 181 samples using the BAX System and by plating the enrichment broth onto Palcam and Oxford agars. Suspected Listeria colonies were submitted to classical biochemical tests. Populations of psychrotrophic microorganisms >10(6) CFU/g were found in 51% of the 133 samples, and Enterobacteriaceae populations between 10(5) and 106 CFU/g were found in 42% of the samples. Fecal coliform concentrations higher than 10(2) CFU/g (Brazilian standard) were found in 97 (73%) of the samples, and Salmonella was detected in 4 (3%) of the samples. Two of the Salmonella-positive samples had <10(2) CFU/g concentrations of fecal coliforms. L. monocytogenes was detected in only 1 (0.6%) of the 181 samples examined. This positive sample was simultaneously detected by both methods. The other Listeria species identified by plating were L. welshimeri (one sample of curly lettuce) and L. innocua (2 samples of watercress). The results indicate that minimally processed vegetables had poor microbiological quality, and these products could be a vehicle for pathogens such as Salmonella and L. monocytogenes.

  18. Efficiency of unconstrained minimization techniques in nonlinear analysis

    NASA Technical Reports Server (NTRS)

    Kamat, M. P.; Knight, N. F., Jr.

    1978-01-01

    Unconstrained minimization algorithms have been critically evaluated for their effectiveness in solving structural problems involving geometric and material nonlinearities. The algorithms have been categorized as being zeroth, first, or second order depending upon the highest derivative of the function required by the algorithm. The sensitivity of these algorithms to the accuracy of derivatives clearly suggests using analytically derived gradients instead of finite difference approximations. The use of analytic gradients results in better control of the number of minimizations required for convergence to the exact solution.

  19. Real Time Network Monitoring and Reporting System

    ERIC Educational Resources Information Center

    Massengale, Ricky L., Sr.

    2009-01-01

    With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…

  20. Testing Alternative Hypotheses Regarding the Association Between Behavioral Inhibition and Language Development in Toddlerhood

    PubMed Central

    Watts, Ashley K. Smith; Patel, Deepika; Corley, Robin P.; Friedman, Naomi P.; Hewitt, John K.; Robinson, JoAnn L.; Rhee, Soo H.

    2014-01-01

    Studies have reported an inverse association between language development and behavioral inhibition or shyness across childhood, but the direction of this association is unclear. The present study tested alternative hypotheses regarding this association in a large sample of toddlers. Data on behavioral inhibition and expressive and receptive language abilities were collected from 816 twins at ages 14, 20, and 24 months. Growth and regression models were fit to the data to assess the longitudinal associations between behavioral inhibition and language development from 14 to 24 months. Overall, there were significant associations between behavioral inhibition and expressive language, and minimal associations with receptive language, indicating that the association is better explained by reticence to respond rather than deficient language development. PMID:24499266

  1. Direct Density Functional Energy Minimization using an Tetrahedral Finite Element Grid

    NASA Astrophysics Data System (ADS)

    Vaught, A.; Schmidt, K. E.; Chizmeshya, A. V. G.

    1998-03-01

    We describe an O(N) (N proportional to volume) technique for solving electronic structure problems using the finite element method (FEM). A real--space tetrahedral grid is used as a basis to represent the electronic density, of a free or periodic system and Poisson's equation is solved as a boundary value problem. Nuclear cusps are treated using a local grid consisting of radial elements. These features facilitate the implementation of complicated energy functionals and permit a direct (constrained) energy minimization with respect to the density. We demonstrate the usefulness of the scheme by calculating the binding trends and polarizabilities of a number of atoms and molecules using a number of recently proposed non--local, orbital--free kinetic energy functionals^1,2. Scaling behavior, computational efficiency and the generalization to band--structure will also be discussed. indent 0 pt øbeylines øbeyspaces skip 0 pt ^1 P. Garcia-Gonzalez, J.E. Alvarellos and E. Chacon, Phys. Rev. B 54, 1897 (1996). ^2 A. J. Thakkar, Phys.Rev.B 46, 6920 (1992).

  2. Minimizers with Bounded Action for the High-Dimensional Frenkel-Kontorova Model

    NASA Astrophysics Data System (ADS)

    Miao, Xue-Qing; Wang, Ya-Nan; Qin, Wen-Xin

    In Aubry-Mather theory for monotone twist maps or for one-dimensional Frenkel-Kontorova (FK) model with nearest neighbor interactions, each global minimizer (minimal energy configuration) is naturally Birkhoff. However, this is not true for the one-dimensional FK model with non-nearest neighbor interactions or for the high-dimensional FK model. In this paper, we study the Birkhoff property of minimizers with bounded action for the high-dimensional FK model.

  3. Symbolic Play in School-Aged Minimally Verbal Children with Autism Spectrum Disorder

    ERIC Educational Resources Information Center

    Chang, Ya-Chih; Shih, Wendy; Landa, Rebecca; Kaiser, Ann; Kasari, Connie

    2018-01-01

    Few interventions exist for school-aged minimally verbal children with autism spectrum disorder (ASD). Even though play skills are associated with children's production of language, few studies have focused on play for minimally verbal children. Fifty-eight minimally verbal children with ASD received a naturalistic developmental behavioral…

  4. Behavior-Specific Influences for Physical Activity Among African American Women.

    PubMed

    Jackson, Hope; Yates, Bernice C; Blanchard, Shirley; Zimmerman, Lani M; Hudson, Diane; Pozehl, Bunny

    2016-08-01

    The purpose of this study was to describe physical activity (PA) behaviors and physical functioning of prehypertensive and Stage I hypertensive African American Women (AAW) and to examine the relationships between PA behavior, physical functioning, personal factors, and behavior-specific influences. Pender's Health Promotion Model was the conceptual framework for the study. A cross-sectional design and convenience sample were used. The PA domain where the greatest amount of time was spent was in work-related activity, followed by household, leisure time, and transportation activity. Personal factors most strongly correlated to lower PA were greater body mass index and waist circumference. AAW perceived moderate barriers to PA and minimal family and friend social support for PA. Future interventions need to focus on removing barriers to and improving social support for PA among AAW. © The Author(s) 2016.

  5. Reducing software mass through behavior control. [of planetary roving robots

    NASA Technical Reports Server (NTRS)

    Miller, David P.

    1992-01-01

    Attention is given to the tradeoff between communication and computation as regards a planetary rover (both these subsystems are very power-intensive, and both can be the major driver of the rover's power subsystem, and therefore the minimum mass and size of the rover). Software techniques that can be used to reduce the requirements on both communciation and computation, allowing the overall robot mass to be greatly reduced, are discussed. Novel approaches to autonomous control, called behavior control, employ an entirely different approach, and for many tasks will yield a similar or superior level of autonomy to traditional control techniques, while greatly reducing the computational demand. Traditional systems have several expensive processes that operate serially, while behavior techniques employ robot capabilities that run in parallel. Traditional systems make extensive world models, while behavior control systems use minimal world models or none at all.

  6. Graph cuts via l1 norm minimization.

    PubMed

    Bhusnurmath, Arvind; Taylor, Camillo J

    2008-10-01

    Graph cuts have become an increasingly important tool for solving a number of energy minimization problems in computer vision and other fields. In this paper, the graph cut problem is reformulated as an unconstrained l1 norm minimization that can be solved effectively using interior point methods. This reformulation exposes connections between the graph cuts and other related continuous optimization problems. Eventually the problem is reduced to solving a sequence of sparse linear systems involving the Laplacian of the underlying graph. The proposed procedure exploits the structure of these linear systems in a manner that is easily amenable to parallel implementations. Experimental results obtained by applying the procedure to graphs derived from image processing problems are provided.

  7. The Study of Intelligent Vehicle Navigation Path Based on Behavior Coordination of Particle Swarm

    PubMed Central

    Han, Gaining; Fu, Weiping; Wang, Wen

    2016-01-01

    In the behavior dynamics model, behavior competition leads to the shock problem of the intelligent vehicle navigation path, because of the simultaneous occurrence of the time-variant target behavior and obstacle avoidance behavior. Considering the safety and real-time of intelligent vehicle, the particle swarm optimization (PSO) algorithm is proposed to solve these problems for the optimization of weight coefficients of the heading angle and the path velocity. Firstly, according to the behavior dynamics model, the fitness function is defined concerning the intelligent vehicle driving characteristics, the distance between intelligent vehicle and obstacle, and distance of intelligent vehicle and target. Secondly, behavior coordination parameters that minimize the fitness function are obtained by particle swarm optimization algorithms. Finally, the simulation results show that the optimization method and its fitness function can improve the perturbations of the vehicle planning path and real-time and reliability. PMID:26880881

  8. Re-appraisal and consideration of minimally invasive surgery in colorectal cancer

    PubMed Central

    Abu Gazala, Mahmoud

    2017-01-01

    Throughout history, surgeons have been on a quest to refine the surgical treatment options for their patients and to minimize operative trauma. During the last three decades, there have been tremendous advances in the field of minimally invasive colorectal surgery, with an explosion of different technologies and approaches offered to treat well-known diseases. Laparoscopic surgery has been shown to be equal or superior to open surgery. The boundaries of laparoscopy have been pushed further, in the form of single-incision laparoscopy, natural-orifice transluminal endoscopic surgery and robotics. This paper critically reviews the pathway of development of minimally invasive surgery, and appraises the different minimally invasive colorectal surgical approaches available to date. PMID:28567286

  9. Schedules of electric shock presentation in the behavioral control of imprinted ducklings.

    PubMed

    Barrett, J E

    1972-09-01

    The behavioral effects of various schedules of electric shock presentation were investigated during and after the imprinting of Peking ducklings to moving stimuli. The behavior of following a moving imprinted stimulus was differentially controlled by a multiple schedule of punishment and avoidance that respectively suppressed and maintained following behavior. Pole-pecking, reinforced by presentations of the imprinted stimulus, was suppressed by response-produced shock (punishment); various schedules of response-independent shock and delayed punishment had an overall minimal effect. The delivery of response-independent shock in the presence of one of two stimuli, both during and after imprinting, resulted in a marked reduction in choice of the stimulus paired with shock. The experiments provide no support for a differentiation of imprinting from learning on the basis of the behavioral effects of aversive stimuli. Instead, as is the case with other organisms, the schedule under which shock is delivered to imprinted ducklings appears to be an important determinant of the temporal patterning of subsequent behavior.

  10. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  11. A minimally invasive approach to long-term head fixation in behaving nonhuman primates

    PubMed Central

    Davis, T.S.; Torab, K.; House, P.; Greger, B.

    2009-01-01

    We have designed a device for long-term head fixation for use in behaving nonhuman primates that is robust yet minimally invasive and simple to use. This device is a modified version of the halo system that is used in humans for cervical traction and stabilization after spinal column injuries. This device consists of an aluminum halo with four titanium skull pins offset from the halo by aluminum posts. The titanium pins insert onto small segments of cranially reinforcing titanium plate, which are attached to the skull with titanium cortex screws. The surgery involves four scalp incisions, placement of the reinforcing plates, insertion of the pins for attachment of the halo, and incision closure. After the halo is attached, the animal’s head can be fixed to a primate chair using a custom-built attachment arm that provides three degrees of adjustability for proper positioning during behavioral tasks. We have installed this device on two Macaque monkeys weighing seven and ten kilograms. The halos have been in place on these animals for up to eight months without signs of discomfort or loss of fixation. Using this method of head fixation, we have been able to track the animals’ eye positions with an accuracy of less than two visual degrees while they perform behavioral tasks. PMID:19394360

  12. WASTE MINIMIZATION ASSESSMENT FOR A MANUFACTURER OF REFURBISHED RAILCAR ASSEMBLIES

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has funded a pilot project to assist small- and medium-size manufacturers who want to minimize their generation of waste but who lack the expertise to do so. Waste Minimization Assessment Centers (WMACs) were established at selected ...

  13. WASTE MINIMIZATION ASSESSMENT FOR A MANUFACTURER OF CAN-MANUFACTURING EQUIPMENT

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has funded a pilot project to assist small- and medium-size manufacturers who want to minimize their generation of hazardous waste but who lack the expertise to do so. aste Minimization Assessment Centers (WMACs) were established at ...

  14. WASTE MINIMIZATION ASSESSMENT FOR A MANUFACTURER OF SPEED REDUCTION EQUIPMENT

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has funded a pilot project to assist small- and medium-size manufacturers who want to minimize their generation of hazardous waste but lack the expertise to do so. Waste Minimization Assessment Centers (WMACs) were established at sel...

  15. Minimally Invasive Surgery for the Treatment of Colorectal Cancer

    PubMed Central

    Karcz, W. Konrad; von Braun, William

    2016-01-01

    Background Reduction in operative trauma along with an improvement in endoscopic access has undoubtedly occupied surgical minds for at least the past 3 decades. It is not at all surprising that minimally invasive colon surgery has come a long way since the first laparoscopic appendectomy by Semm in 1981. It is common knowledge that the recent developments in video and robotic technologies have significantly furthered advancements in laparoscopic and minimally invasive surgery. This has led to the overall acceptance of the treatment of benign colorectal pathology via the endoscopic route. Malignant disease, however, is still primarily treated by conventional approaches. Methods and Results This review article is based on a literature search pertaining to advances in minimally invasive colorectal surgery for the treatment of malignant pathology, as well as on personal experience in the field over the same period of time. Our search was limited to level I and II clinical papers only, according to the evidence-based medicine guidelines. We attempted to present our unbiased view on the subject relying only on the evidence available. Conclusion Focusing on advances in colorectal minimally invasive surgery, it has to be stated that there are still a number of unanswered questions regarding the surgical management of malignant diseases with this approach. These questions do not only relate to the area of boundaries set for the use of minimally invasive techniques in this field but also to the exact modality best suited to the treatment of every particular case whilst maintaining state-of-the-art oncological principles. PMID:27493947

  16. Restoration ecology: two-sex dynamics and cost minimization.

    PubMed

    Molnár, Ferenc; Caragine, Christina; Caraco, Thomas; Korniss, Gyorgy

    2013-01-01

    We model a spatially detailed, two-sex population dynamics, to study the cost of ecological restoration. We assume that cost is proportional to the number of individuals introduced into a large habitat. We treat dispersal as homogeneous diffusion in a one-dimensional reaction-diffusion system. The local population dynamics depends on sex ratio at birth, and allows mortality rates to differ between sexes. Furthermore, local density dependence induces a strong Allee effect, implying that the initial population must be sufficiently large to avert rapid extinction. We address three different initial spatial distributions for the introduced individuals; for each we minimize the associated cost, constrained by the requirement that the species must be restored throughout the habitat. First, we consider spatially inhomogeneous, unstable stationary solutions of the model's equations as plausible candidates for small restoration cost. Second, we use numerical simulations to find the smallest rectangular cluster, enclosing a spatially homogeneous population density, that minimizes the cost of assured restoration. Finally, by employing simulated annealing, we minimize restoration cost among all possible initial spatial distributions of females and males. For biased sex ratios, or for a significant between-sex difference in mortality, we find that sex-specific spatial distributions minimize the cost. But as long as the sex ratio maximizes the local equilibrium density for given mortality rates, a common homogeneous distribution for both sexes that spans a critical distance yields a similarly low cost.

  17. Restoration Ecology: Two-Sex Dynamics and Cost Minimization

    PubMed Central

    Molnár, Ferenc; Caragine, Christina; Caraco, Thomas; Korniss, Gyorgy

    2013-01-01

    We model a spatially detailed, two-sex population dynamics, to study the cost of ecological restoration. We assume that cost is proportional to the number of individuals introduced into a large habitat. We treat dispersal as homogeneous diffusion in a one-dimensional reaction-diffusion system. The local population dynamics depends on sex ratio at birth, and allows mortality rates to differ between sexes. Furthermore, local density dependence induces a strong Allee effect, implying that the initial population must be sufficiently large to avert rapid extinction. We address three different initial spatial distributions for the introduced individuals; for each we minimize the associated cost, constrained by the requirement that the species must be restored throughout the habitat. First, we consider spatially inhomogeneous, unstable stationary solutions of the model’s equations as plausible candidates for small restoration cost. Second, we use numerical simulations to find the smallest rectangular cluster, enclosing a spatially homogeneous population density, that minimizes the cost of assured restoration. Finally, by employing simulated annealing, we minimize restoration cost among all possible initial spatial distributions of females and males. For biased sex ratios, or for a significant between-sex difference in mortality, we find that sex-specific spatial distributions minimize the cost. But as long as the sex ratio maximizes the local equilibrium density for given mortality rates, a common homogeneous distribution for both sexes that spans a critical distance yields a similarly low cost. PMID:24204810

  18. Comprehensive Training Curricula for Minimally Invasive Surgery

    PubMed Central

    Palter, Vanessa N

    2011-01-01

    Background The unique skill set required for minimally invasive surgery has in part contributed to a certain portion of surgical residency training transitioning from the operating room to the surgical skills laboratory. Simulation lends itself well as a method to shorten the learning curve for minimally invasive surgery by allowing trainees to practice the unique motor skills required for this type of surgery in a safe, structured environment. Although a significant amount of important work has been done to validate simulators as viable systems for teaching technical skills outside the operating room, the next step is to integrate simulation training into a comprehensive curriculum. Objectives This narrative review aims to synthesize the evidence and educational theories underlining curricula development for technical skills both in a broad context and specifically as it pertains to minimally invasive surgery. Findings The review highlights the critical aspects of simulation training, such as the effective provision of feedback, deliberate practice, training to proficiency, the opportunity to practice at varying levels of difficulty, and the inclusion of both cognitive teaching and hands-on training. In addition, frameworks for integrating simulation training into a comprehensive curriculum are described. Finally, existing curricula on both laparoscopic box trainers and virtual reality simulators are critically evaluated. PMID:22942951

  19. Minimally invasive approaches for gastric cancer-Korean experience.

    PubMed

    Yang, Han-Kwang; Suh, Yun-Suhk; Lee, Hyuk-Joon

    2013-03-01

    Laparoscopic surgery in Korea increased rapidly because of the early detection of gastric cancer by the development of diagnostic tools and nationwide screening. The Korean Laparoscopic Gastrointestinal Surgery Study Group (KLASS group) played a leading role in various projects related with minimally invasive surgery. The justification of minimally invasive procedures including robotic surgery, sentinel-node biopsy, or single-port surgery/Natural Orifice Transluminal Endoscopic Surgery (NOTES) must be predetermined by the clinical trial before a wide application, and the medical industry as well as surgeons should have great responsibility. Copyright © 2012 Wiley Periodicals, Inc.

  20. Minimal entropy probability paths between genome families.

    PubMed

    Ahlbrandt, Calvin; Benson, Gary; Casey, William

    2004-05-01

    We develop a metric for probability distributions with applications to biological sequence analysis. Our distance metric is obtained by minimizing a functional defined on the class of paths over probability measures on N categories. The underlying mathematical theory is connected to a constrained problem in the calculus of variations. The solution presented is a numerical solution, which approximates the true solution in a set of cases called rich paths where none of the components of the path is zero. The functional to be minimized is motivated by entropy considerations, reflecting the idea that nature might efficiently carry out mutations of genome sequences in such a way that the increase in entropy involved in transformation is as small as possible. We characterize sequences by frequency profiles or probability vectors, in the case of DNA where N is 4 and the components of the probability vector are the frequency of occurrence of each of the bases A, C, G and T. Given two probability vectors a and b, we define a distance function based as the infimum of path integrals of the entropy function H( p) over all admissible paths p(t), 0 < or = t< or =1, with p(t) a probability vector such that p(0)=a and p(1)=b. If the probability paths p(t) are parameterized as y(s) in terms of arc length s and the optimal path is smooth with arc length L, then smooth and "rich" optimal probability paths may be numerically estimated by a hybrid method of iterating Newton's method on solutions of a two point boundary value problem, with unknown distance L between the abscissas, for the Euler-Lagrange equations resulting from a multiplier rule for the constrained optimization problem together with linear regression to improve the arc length estimate L. Matlab code for these numerical methods is provided which works only for "rich" optimal probability vectors. These methods motivate a definition of an elementary distance function which is easier and faster to calculate, works on non