Sample records for analysis key results

  1. Logistic Map for Cancellable Biometrics

    NASA Astrophysics Data System (ADS)

    Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr

    2017-08-01

    This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.

  2. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  3. Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map

    PubMed Central

    2014-01-01

    We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and substitution and Duffing map based on substitution. Comprehensive security analysis has been performed on the designed scheme using key space analysis, visual testing, histogram analysis, information entropy calculation, correlation coefficient analysis, differential analysis, key sensitivity test, and speed test. The study demonstrates that the proposed image encryption algorithm shows advantages of more than 10113 key space and desirable level of security based on the good statistical results and theoretical arguments. PMID:25143970

  4. Passage Key Inlet, Florida; CMS Modeling and Borrow Site Impact Analysis

    DTIC Science & Technology

    2016-06-01

    Impact Analysis by Kelly R. Legault and Sirisha Rayaprolu PURPOSE: This Coastal and Hydraulics Engineering Technical Note (CHETN) describes the...use of a nested Coastal Modeling System (CMS) model for Passage Key Inlet, which is one of the connections between the Gulf of Mexico and Tampa Bay...driven sediment transport at Passage Key Inlet. This analysis resulted in issuing a new Florida Department of Environmental Protection (FDEP) permit to

  5. A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system

    NASA Astrophysics Data System (ADS)

    Wang, Zhen; Huang, Xia; Li, Yu-Xia; Song, Xiao-Na

    2013-01-01

    We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system. While in the process of generating a key stream, the system parameters and the derivative order are embedded in the proposed algorithm to enhance the security. Such an algorithm is detailed in terms of security analyses, including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. The experimental results demonstrate that the proposed image encryption scheme has the advantages of large key space and high security for practical image encryption.

  6. APMP.QM-K111—propane in nitrogen

    NASA Astrophysics Data System (ADS)

    Lin, Tsai-Yin; Liu, Hsin-Wang; Huang, Chiung-Kun; Kang, Namgoo; Bae, Hyun Kil; Woo, Jin Chun; Bi, Zhe; Zhou, Zeyi; Sinweeruthai, Ratirat; Wongjuk, Arnuttachai; Li, Hou; Beng Keat, Teo; Hui, Liu; Wu, Thomas; Hock Ann, Chua; Smeulders, Damian; Briton McCallum, John; Tendai Satumba, Raymond; Shimosaka, Takuya; Matsumoto, Nobuhiro; Kadir, Haslina Abdul; Fauzi Ahmad, Mohamad; Nasir, Noor Hidaya Abdul; Nishino, Tomoe; Akima, Dai; Uehara, Shinji

    2018-01-01

    This document describes the result of a key comparison for propane in nitrogen. The nominal amount-of-substance fraction of propane is 1000 μmol/mol. The comparison aimed to assess the measurement capability of participants in gas analysis. Nine NMIs or DIs participated in the comparison. CERI participated in a key comparison CCQM-K111—propane in nitrogen, and coordinated this key comparison. Therefore, every participants' results of this comparison are linking to the CCQM-K111. Gravimetric values of the samples were used as key comparison reference values (KCRVs). Measured values of eight participants were within +/- 0.25 % of the KCRVs. Many participants reported purity or impurity analysis of materials. These results are also able to assess the participants' capability of the analysis. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  7. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  8. Key components of financial-analysis education for clinical nurses.

    PubMed

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  9. International comparison CCQM-K111—propane in nitrogen

    NASA Astrophysics Data System (ADS)

    van der Veen, Adriaan M. H.; Wouter van der Hout, J.; Ziel, Paul R.; Oudwater, Rutger J.; Fioravante, Andreia L.; Augusto, Cristiane R.; Coutinho Brum, Mariana; Uehara, Shinji; Akima, Dai; Bae, Hyun Kil; Kang, Namgoo; Woo, Jin-Chun; Liaskos, Christina E.; Rhoderick, George C.; Jozela, Mudalo; Tshilongo, James; Ntsasa, Napo G.; Botha, Angelique; Brewer, Paul J.; Brown, Andrew S.; Bartlett, Sam; Downey, Michael L.; Konopelko, L. A.; Kolobova, A. V.; Pankov, A. A.; Orshanskaya, A. A.; Efremova, O. V.

    2017-01-01

    This key comparison aims to assess the core capabilities of the participants in gas analysis. Such competences include, among others, the capabilities to prepare primary standard gas Mixtures (PSMs), perform the necessary purity analysis on the materials used in the gas mixture preparation, the verification of the composition of newly prepared PSMs against existing ones, and the capability of calibrating the composition of a gas mixture. According to the Strategy for Key Comparisons of the Gas Analysis Working Group, this key comparison is classified as a track A key comparison, which means that the results of this key comparison can be used to underpin calibration and measurement capabilities using the flexible scheme, and for propane under the default scheme. The artefacts were binary mixtures of propane in nitrogen at a nominal amount-of-substance fraction level of 1000 μmol/mol. The values and uncertainties from the gravimetric gas mixture preparation were used as key comparison reference values (KCRVs). Each transfer standard had its own KCRV. The results are generally good. All results but one are within +/- 0.2 % of the KCRV. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  10. Image encryption based on a delayed fractional-order chaotic logistic system

    NASA Astrophysics Data System (ADS)

    Wang, Zhen; Huang, Xia; Li, Ning; Song, Xiao-Na

    2012-05-01

    A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security.

  11. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  12. International comparison CCQM-K111.1—propane in nitrogen

    NASA Astrophysics Data System (ADS)

    van der Veen, Adriaan M. H.; Wouter van der Hout, J.; Ziel, Paul R.; Jozela, Mudalo; Tshilongo, James; Ntsasa, Napo G.; Botha, Angelique

    2017-01-01

    This key comparison aims to assess the core capabilities of the participants in gas analysis. Such competences include, among others, the capability of preparing Primary Standard gas Mixtures (PSMs), performing the necessary purity analysis on the materials used in the gas mixture preparation, the verification of the composition of newly prepared PSMs against existing ones, and the capability of calibrating the composition of a gas mixture. According to the Strategy for Key Comparisons of the Gas Analysis Working Group, this subsequent key comparison is classified as a track B key comparison, which means that the results of this key comparison can be used to underpin calibration and measurement capabilities for propane under the default scheme. The artefact was a binary mixture of propane in nitrogen at a nominal amount-of-substance fraction level of 1000 μmol/mol. The values and uncertainties from the gravimetric gas mixture preparation were used as key comparison reference values (KCRVs). Each transfer standard had its own KCRV. The result of the participating laboratory is consistent with the key comparison reference value within the respective expanded uncertainties and deviates less than 0.1 %. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  13. International comparison Euramet.QM-K111—propane in nitrogen

    NASA Astrophysics Data System (ADS)

    Wouter van der Hout, J.; van der Veen, Adriaan M. H.; Ziel, Paul R.; Kipphardt, Heinrich; Tuma, Dirk; Maiwald, Michael; Fernández, Teresa E.; Gómez, Concepción; Cieciora, Dariusz; Ochman, Grzegorz; Dias, Florbela; Silvino, Victor; Macé, Tatiana; Sutour, Christophe; Marioni, Fabrice; Ackermann, Andreas; Niederhauser, Bernhard; Fükő, Judit; Büki, Tamás; Nagyné Szilágyi, Zsófia; Tarhan, Tanıl; Engin, Erinç

    2017-01-01

    This key comparison aims to assess the core capabilities of the participants in gas analysis. Such competences include, among others, the capabilities to prepare Primary Standard gas Mixtures (PSMs), perform the necessary purity analysis on the materials used in the gas mixture preparation, the verification of the composition of newly prepared PSMs against existing ones, and the capability of calibrating the composition of a gas mixture. According to the Strategy for Key Comparisons of the Gas Analysis Working Group, this key comparison is classified as an RMO track A key comparison. The artefacts were binary mixtures of propane in nitrogen at a nominal amount-of-substance fraction level of 1000 μmol/mol. The values and uncertainties from the gravimetric gas mixture preparation were used as key comparison reference values (KCRVs). Each transfer standard had its own KCRV. The results are generally good. All results are within +/- 1 % of the KCRV. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  14. The comparison and analysis of extracting video key frame

    NASA Astrophysics Data System (ADS)

    Ouyang, S. Z.; Zhong, L.; Luo, R. Q.

    2018-05-01

    Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.

  15. Continuous QKD and high speed data encryption

    NASA Astrophysics Data System (ADS)

    Zbinden, Hugo; Walenta, Nino; Guinnard, Olivier; Houlmann, Raphael; Wen, Charles Lim Ci; Korzh, Boris; Lunghi, Tommaso; Gisin, Nicolas; Burg, Andreas; Constantin, Jeremy; Legré, Matthieu; Trinkler, Patrick; Caselunghe, Dario; Kulesza, Natalia; Trolliet, Gregory; Vannel, Fabien; Junod, Pascal; Auberson, Olivier; Graf, Yoan; Curchod, Gilles; Habegger, Gilles; Messerli, Etienne; Portmann, Christopher; Henzen, Luca; Keller, Christoph; Pendl, Christian; Mühlberghuber, Michael; Roth, Christoph; Felber, Norbert; Gürkaynak, Frank; Schöni, Daniel; Muheim, Beat

    2013-10-01

    We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.

  16. Lunar Exploration Architecture Level Key Drivers and Sensitivities

    NASA Technical Reports Server (NTRS)

    Goodliff, Kandyce; Cirillo, William; Earle, Kevin; Reeves, J. D.; Shyface, Hilary; Andraschko, Mark; Merrill, R. Gabe; Stromgren, Chel; Cirillo, Christopher

    2009-01-01

    Strategic level analysis of the integrated behavior of lunar transportation and lunar surface systems architecture options is performed to assess the benefit, viability, affordability, and robustness of system design choices. This analysis employs both deterministic and probabilistic modeling techniques so that the extent of potential future uncertainties associated with each option are properly characterized. The results of these analyses are summarized in a predefined set of high-level Figures of Merit (FOMs) so as to provide senior NASA Constellation Program (CxP) and Exploration Systems Mission Directorate (ESMD) management with pertinent information to better inform strategic level decision making. The strategic level exploration architecture model is designed to perform analysis at as high a level as possible but still capture those details that have major impacts on system performance. The strategic analysis methodology focuses on integrated performance, affordability, and risk analysis, and captures the linkages and feedbacks between these three areas. Each of these results leads into the determination of the high-level FOMs. This strategic level analysis methodology has been previously applied to Space Shuttle and International Space Station assessments and is now being applied to the development of the Constellation Program point-of-departure lunar architecture. This paper provides an overview of the strategic analysis methodology and the lunar exploration architecture analyses to date. In studying these analysis results, the strategic analysis team has identified and characterized key drivers affecting the integrated architecture behavior. These key drivers include inclusion of a cargo lander, mission rate, mission location, fixed-versus- variable costs/return on investment, and the requirement for probabilistic analysis. Results of sensitivity analysis performed on lunar exploration architecture scenarios are also presented.

  17. Analysis of the Department of Defense Pre-Award Contracting Process

    DTIC Science & Technology

    2014-12-01

    Justification and Approval JBSA Joint Base San Antonio KPIs Key Performance Indicators MAJCOMs Major Command MP Mandatory Commands NAVIAR...meets desired results. Results-based performance measurement establishes key performance indicators ( KPIs ) that determine whether procurement...or goals, and underlying business processes (Cullen, 2009, p. 38). Within each quadrant, Cullen provided examples of KPIs that serve to measure

  18. Are the Keys loved to death? A study of diver specialization levels and preferences in the Florida Keys

    Treesearch

    Shona Paterson; David K. Loomis

    2010-01-01

    This paper presents research conducted for the Florida Reef Resilience Program on nonresident recreational SCUBA divers in three zones of the Florida Keys. When divers were segmented into specialization subgroups for analysis, divers in different subgroups tended to use different geographic locations. These results suggest differences in user preferences; yet when...

  19. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  20. Screening of the key volatile organic compounds of Tuber melanosporum fermentation by aroma sensory evaluation combination with principle component analysis

    PubMed Central

    Liu, Rui-Sang; Jin, Guang-Huai; Xiao, Deng-Rong; Li, Hong-Mei; Bai, Feng-Wu; Tang, Ya-Jie

    2015-01-01

    Aroma results from the interplay of volatile organic compounds (VOCs) and the attributes of microbial-producing aromas are significantly affected by fermentation conditions. Among the VOCs, only a few of them contribute to aroma. Thus, screening and identification of the key VOCs is critical for microbial-producing aroma. The traditional method is based on gas chromatography-olfactometry (GC-O), which is time-consuming and laborious. Considering the Tuber melanosporum fermentation system as an example, a new method to screen and identify the key VOCs by combining the aroma evaluation method with principle component analysis (PCA) was developed in this work. First, an aroma sensory evaluation method was developed to screen 34 potential favorite aroma samples from 504 fermentation samples. Second, PCA was employed to screen nine common key VOCs from these 34 samples. Third, seven key VOCs were identified by the traditional method. Finally, all of the seven key VOCs identified by the traditional method were also identified, along with four others, by the new strategy. These results indicate the reliability of the new method and demonstrate it to be a viable alternative to the traditional method. PMID:26655663

  1. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.

    PubMed

    Mao, Chen-Chen; Zhou, Xing-Yu; Zhu, Jian-Rong; Zhang, Chun-Hui; Zhang, Chun-Mei; Wang, Qin

    2018-05-14

    Recently Zhang et al [ Phys. Rev. A95, 012333 (2017)] developed a new approach to estimate the failure probability for the decoy-state BB84 QKD system when taking finite-size key effect into account, which offers security comparable to Chernoff bound, while results in an improved key rate and transmission distance. Based on Zhang et al's work, now we extend this approach to the case of the measurement-device-independent quantum key distribution (MDI-QKD), and for the first time implement it onto the four-intensity decoy-state MDI-QKD system. Moreover, through utilizing joint constraints and collective error-estimation techniques, we can obviously increase the performance of practical MDI-QKD systems compared with either three- or four-intensity decoy-state MDI-QKD using Chernoff bound analysis, and achieve much higher level security compared with those applying Gaussian approximation analysis.

  2. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new technological opportunities. PMID:26599967

  3. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new technological opportunities.

  4. funRNA: a fungi-centered genomics platform for genes encoding key components of RNAi.

    PubMed

    Choi, Jaeyoung; Kim, Ki-Tae; Jeon, Jongbum; Wu, Jiayao; Song, Hyeunjeong; Asiegbu, Fred O; Lee, Yong-Hwan

    2014-01-01

    RNA interference (RNAi) is involved in genome defense as well as diverse cellular, developmental, and physiological processes. Key components of RNAi are Argonaute, Dicer, and RNA-dependent RNA polymerase (RdRP), which have been functionally characterized mainly in model organisms. The key components are believed to exist throughout eukaryotes; however, there is no systematic platform for archiving and dissecting these important gene families. In addition, few fungi have been studied to date, limiting our understanding of RNAi in fungi. Here we present funRNA http://funrna.riceblast.snu.ac.kr/, a fungal kingdom-wide comparative genomics platform for putative genes encoding Argonaute, Dicer, and RdRP. To identify and archive genes encoding the abovementioned key components, protein domain profiles were determined from reference sequences obtained from UniProtKB/SwissProt. The domain profiles were searched using fungal, metazoan, and plant genomes, as well as bacterial and archaeal genomes. 1,163, 442, and 678 genes encoding Argonaute, Dicer, and RdRP, respectively, were predicted. Based on the identification results, active site variation of Argonaute, diversification of Dicer, and sequence analysis of RdRP were discussed in a fungus-oriented manner. funRNA provides results from diverse bioinformatics programs and job submission forms for BLAST, BLASTMatrix, and ClustalW. Furthermore, sequence collections created in funRNA are synced with several gene family analysis portals and databases, offering further analysis opportunities. funRNA provides identification results from a broad taxonomic range and diverse analysis functions, and could be used in diverse comparative and evolutionary studies. It could serve as a versatile genomics workbench for key components of RNAi.

  5. Finite-size analysis of a continuous-variable quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grosshans, Frederic; Grangier, Philippe

    2010-06-15

    The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully securemore » secret keys in the finite-size scenario, over distances larger than 50 km.« less

  6. Space station data system analysis/architecture study. Task 3: Trade studies, DR-5, volume 1

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary objective of Task 3 is to provide additional analysis and insight necessary to support key design/programmatic decision for options quantification and selection for system definition. This includes: (1) the identification of key trade study topics; (2) the definition of a trade study procedure for each topic (issues to be resolved, key inputs, criteria/weighting, methodology); (3) conduct tradeoff and sensitivity analysis; and (4) the review/verification of results within the context of evolving system design and definition. The trade study topics addressed in this volume include space autonomy and function automation, software transportability, system network topology, communications standardization, onboard local area networking, distributed operating system, software configuration management, and the software development environment facility.

  7. An Empirical Analysis of the Cascade Secret Key Reconciliation Protocol for Quantum Key Distribution

    DTIC Science & Technology

    2011-09-01

    performance with the parity checks within each pass increasing and as a result, the processing time is expected to increase as well. A conclusion is drawn... timely manner has driven efforts to develop new key distribution methods. The most promising method is Quantum Key Distribution (QKD) and is...thank the QKD Project Team for all of the insight and support they provided in such a short time period. Thanks are especially in order for my

  8. A Novel Quantitative Approach to Concept Analysis: The Internomological Network

    PubMed Central

    Cook, Paul F.; Larsen, Kai R.; Sakraida, Teresa J.; Pedro, Leli

    2012-01-01

    Background When a construct such as patients’ transition to self-management of chronic illness is studied by researchers across multiple disciplines, the meaning of key terms can become confused. This results from inherent problems in language where a term can have multiple meanings (polysemy) and different words can mean the same thing (synonymy). Objectives To test a novel quantitative method for clarifying the meaning of constructs by examining the similarity of published contexts in which they are used. Method Published terms related to the concept transition to self-management of chronic illness were analyzed using the internomological network (INN), a type of latent semantic analysis to calculate the mathematical relationships between constructs based on the contexts in which researchers use each term. This novel approach was tested by comparing results to those from concept analysis, a best-practice qualitative approach to clarifying meanings of terms. By comparing results of the two methods, the best synonyms of transition to self-management, as well as key antecedent, attribute, and consequence terms, were identified. Results Results from INN analysis were consistent with those from concept analysis. The potential synonyms self-management, transition, and adaptation had the greatest utility. Adaptation was the clearest overall synonym, but had lower cross-disciplinary use. The terms coping and readiness had more circumscribed meanings. The INN analysis confirmed key features of transition to self-management, and suggested related concepts not found by the previous review. Discussion The INN analysis is a promising novel methodology that allows researchers to quantify the semantic relationships between constructs. The method works across disciplinary boundaries, and may help to integrate the diverse literature on self-management of chronic illness. PMID:22592387

  9. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  10. Budget impact analysis of medicines: updated systematic review and implications.

    PubMed

    Faleiros, Daniel Resende; Álvares, Juliana; Almeida, Alessandra Maciel; de Araújo, Vânia Eloisa; Andrade, Eli Iola Gurgel; Godman, Brian B; Acurcio, Francisco A; Guerra Júnior, Augusto A

    2016-01-01

    This evaluation determines whether published studies to date meet the key characteristics identified for budget impact analyses (BIA) for medicines, accomplished through a systematic review and assessment against identified key characteristics. Studies from 2001-2015 on 'budget impact analysis' with 'drug' interventions were assessed, selected based on their titles/abstracts and full texts, and their characteristics checked according to key criteria. Out of 1,984 studies, 92 were subsequently identified for review. Of these, 95% were published in Europe and the USA. 2012 saw the largest number of publications (16%) with a decline thereafter. 48% met up to 7 out of the 9 key characteristics. Only 22% stated no conflict of interest. The results indicate low adherence to the key characteristics that should be considered for BIAs and strong conflict of interest. This is an issue since BIAs can be of fundamental importance in managing the entry of new medicines including reimbursement decisions.

  11. Continuous variable quantum key distribution with a real local oscillator using simultaneous pilot signals.

    PubMed

    Kleis, Sebastian; Rueckmann, Max; Schaeffer, Christian G

    2017-04-15

    In this Letter, we propose a novel implementation of continuous variable quantum key distribution that operates with a real local oscillator placed at the receiver site. In addition, pulsing of the continuous wave laser sources is not required, leading to an extraordinary practical and secure setup. It is suitable for arbitrary schemes based on modulated coherent states and heterodyne detection. The shown results include transmission experiments, as well as an excess noise analysis applying a discrete 8-state phase modulation. Achievable key rates under collective attacks are estimated. The results demonstrate the high potential of the approach to achieve high secret key rates at relatively low effort and cost.

  12. Identification of key regulators of pancreatic cancer progression through multidimensional systems-level analysis.

    PubMed

    Rajamani, Deepa; Bhasin, Manoj K

    2016-05-03

    Pancreatic cancer is an aggressive cancer with dismal prognosis, urgently necessitating better biomarkers to improve therapeutic options and early diagnosis. Traditional approaches of biomarker detection that consider only one aspect of the biological continuum like gene expression alone are limited in their scope and lack robustness in identifying the key regulators of the disease. We have adopted a multidimensional approach involving the cross-talk between the omics spaces to identify key regulators of disease progression. Multidimensional domain-specific disease signatures were obtained using rank-based meta-analysis of individual omics profiles (mRNA, miRNA, DNA methylation) related to pancreatic ductal adenocarcinoma (PDAC). These domain-specific PDAC signatures were integrated to identify genes that were affected across multiple dimensions of omics space in PDAC (genes under multiple regulatory controls, GMCs). To further pin down the regulators of PDAC pathophysiology, a systems-level network was generated from knowledge-based interaction information applied to the above identified GMCs. Key regulators were identified from the GMC network based on network statistics and their functional importance was validated using gene set enrichment analysis and survival analysis. Rank-based meta-analysis identified 5391 genes, 109 miRNAs and 2081 methylation-sites significantly differentially expressed in PDAC (false discovery rate ≤ 0.05). Bimodal integration of meta-analysis signatures revealed 1150 and 715 genes regulated by miRNAs and methylation, respectively. Further analysis identified 189 altered genes that are commonly regulated by miRNA and methylation, hence considered GMCs. Systems-level analysis of the scale-free GMCs network identified eight potential key regulator hubs, namely E2F3, HMGA2, RASA1, IRS1, NUAK1, ACTN1, SKI and DLL1, associated with important pathways driving cancer progression. Survival analysis on individual key regulators revealed that higher expression of IRS1 and DLL1 and lower expression of HMGA2, ACTN1 and SKI were associated with better survival probabilities. It is evident from the results that our hierarchical systems-level multidimensional analysis approach has been successful in isolating the converging regulatory modules and associated key regulatory molecules that are potential biomarkers for pancreatic cancer progression.

  13. Asymmetry of perceived key movement in chorale sequences: converging evidence from a probe-tone analysis.

    PubMed

    Cuddy, L L; Thompson, W F

    1992-01-01

    In a probe-tone experiment, two groups of listeners--one trained, the other untrained, in traditional music theory--rated the goodness of fit of each of the 12 notes of the chromatic scale to four-voice harmonic sequences. Sequences were 12 simplified excerpts from Bach chorales, 4 nonmodulating, and 8 modulating. Modulations occurred either one or two steps in either the clockwise or the counterclockwise direction on the cycle of fifths. A consistent pattern of probe-tone ratings was obtained for each sequence, with no significant differences between listener groups. Two methods of analysis (Fourier analysis and regression analysis) revealed a directional asymmetry in the perceived key movement conveyed by modulating sequences. For a given modulation distance, modulations in the counterclockwise direction effected a clearer shift in tonal organization toward the final key than did clockwise modulations. The nature of the directional asymmetry was consistent with results reported for identification and rating of key change in the sequences (Thompson & Cuddy, 1989a). Further, according to the multiple-regression analysis, probe-tone ratings did not merely reflect the distribution of tones in the sequence. Rather, ratings were sensitive to the temporal structure of the tonal organization in the sequence.

  14. The social impacts of dams: A new framework for scholarly analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirchherr, Julian, E-mail: julian.kirchherr@sant.ox.ac.uk; Charles, Katrina J., E-mail: katrina.charles@ouce.ox.ac.uk

    No commonly used framework exists in the scholarly study of the social impacts of dams. This hinders comparisons of analyses and thus the accumulation of knowledge. The aim of this paper is to unify scholarly understanding of dams' social impacts via the analysis and aggregation of the various frameworks currently used in the scholarly literature. For this purpose, we have systematically analyzed and aggregated 27 frameworks employed by academics analyzing dams' social impacts (found in a set of 217 articles). A key finding of the analysis is that currently used frameworks are often not specific to dams and thus omitmore » key impacts associated with them. The result of our analysis and aggregation is a new framework for scholarly analysis (which we call ‘matrix framework’) specifically on dams' social impacts, with space, time and value as its key dimensions as well as infrastructure, community and livelihood as its key components. Building on the scholarly understanding of this topic enables us to conceptualize the inherently complex and multidimensional issues of dams' social impacts in a holistic manner. If commonly employed in academia (and possibly in practice), this framework would enable more transparent assessment and comparison of projects.« less

  15. A tandem regression-outlier analysis of a ligand cellular system for key structural modifications around ligand binding.

    PubMed

    Lin, Ying-Ting

    2013-04-30

    A tandem technique of hard equipment is often used for the chemical analysis of a single cell to first isolate and then detect the wanted identities. The first part is the separation of wanted chemicals from the bulk of a cell; the second part is the actual detection of the important identities. To identify the key structural modifications around ligand binding, the present study aims to develop a counterpart of tandem technique for cheminformatics. A statistical regression and its outliers act as a computational technique for separation. A PPARγ (peroxisome proliferator-activated receptor gamma) agonist cellular system was subjected to such an investigation. Results show that this tandem regression-outlier analysis, or the prioritization of the context equations tagged with features of the outliers, is an effective regression technique of cheminformatics to detect key structural modifications, as well as their tendency of impact to ligand binding. The key structural modifications around ligand binding are effectively extracted or characterized out of cellular reactions. This is because molecular binding is the paramount factor in such ligand cellular system and key structural modifications around ligand binding are expected to create outliers. Therefore, such outliers can be captured by this tandem regression-outlier analysis.

  16. Security Analysis and Improvements to the PsychoPass Method

    PubMed Central

    2013-01-01

    Background In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength. PMID:23942458

  17. A summary and integration of research concerning single pilot IFR operational problems

    NASA Technical Reports Server (NTRS)

    Chapman, G. C.

    1983-01-01

    A review of seven research studies pertaining to Single Pilot IFR (SPIFR) operations was performed. Two studies were based on questionnaire surveys; two based on National Transportation Safety Board (NTSB) reports; two were based on Aviation Safety Reporting System (ASRS) incident reports, and one report used event analysis and statistics to forecast problems. The results obtained in each study were extracted and integrated. Results were synthesized and key issues pertaining to SPIFR operations problems were identified. The research that was recommended by the studies and that addressed the key issues is catalogued for each key issue.

  18. Rail industry job analysis : passenger conductor.

    DOT National Transportation Integrated Search

    2013-02-01

    This document describes the results of a job analysis that was conducted for the position of railroad Passenger Conductor. Key aspects of the position were identified, including main tasks and knowledge, skills, abilities, and other characteristics (...

  19. Rail industry job analysis : freight conductor.

    DOT National Transportation Integrated Search

    2013-03-01

    This document describes the results from a job analysis that was conducted for the position of Freight Conductor. Key aspects of the position were identified, including main tasks and knowledge, skills, abilities, and other characteristics (KSAOs) ne...

  20. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  1. Translating Health Services Research into Practice in the Safety Net.

    PubMed

    Moore, Susan L; Fischer, Ilana; Havranek, Edward P

    2016-02-01

    To summarize research relating to health services research translation in the safety net through analysis of the literature and case study of a safety net system. Literature review and key informant interviews at an integrated safety net hospital. This paper describes the results of a comprehensive literature review of translational science literature as applied to health care paired with qualitative analysis of five key informant interviews conducted with senior-level management at Denver Health and Hospital Authority. Results from the literature suggest that implementing innovation may be more difficult in the safety net due to multiple factors, including financial and organizational constraints. Results from key informant interviews confirmed the reality of financial barriers to innovation implementation but also implied that factors, including institutional respect for data, organizational attitudes, and leadership support, could compensate for disadvantages. Translating research into practice is of critical importance to safety net providers, which are under increased pressure to improve patient care and satisfaction. Results suggest that translational research done in the safety net can better illuminate the special challenges of this setting; more such research is needed. © Health Research and Educational Trust.

  2. Development of an automated analysis system for data from flow cytometric intracellular cytokine staining assays from clinical vaccine trials

    PubMed Central

    Shulman, Nick; Bellew, Matthew; Snelling, George; Carter, Donald; Huang, Yunda; Li, Hongli; Self, Steven G.; McElrath, M. Juliana; De Rosa, Stephen C.

    2008-01-01

    Background Intracellular cytokine staining (ICS) by multiparameter flow cytometry is one of the primary methods for determining T cell immunogenicity in HIV-1 clinical vaccine trials. Data analysis requires considerable expertise and time. The amount of data is quickly increasing as more and larger trials are performed, and thus there is a critical need for high throughput methods of data analysis. Methods A web based flow cytometric analysis system, LabKey Flow, was developed for analyses of data from standardized ICS assays. A gating template was created manually in commercially-available flow cytometric analysis software. Using this template, the system automatically compensated and analyzed all data sets. Quality control queries were designed to identify potentially incorrect sample collections. Results Comparison of the semi-automated analysis performed by LabKey Flow and the manual analysis performed using FlowJo software demonstrated excellent concordance (concordance correlation coefficient >0.990). Manual inspection of the analyses performed by LabKey Flow for 8-color ICS data files from several clinical vaccine trials indicates that template gates can appropriately be used for most data sets. Conclusions The semi-automated LabKey Flow analysis system can analyze accurately large ICS data files. Routine use of the system does not require specialized expertise. This high-throughput analysis will provide great utility for rapid evaluation of complex multiparameter flow cytometric measurements collected from large clinical trials. PMID:18615598

  3. Identification of key factors affecting the water pollutant concentration in the sluice-controlled river reaches of the Shaying River in China via statistical analysis methods.

    PubMed

    Dou, Ming; Zhang, Yan; Zuo, Qiting; Mi, Qingbin

    2015-08-01

    The construction of sluices creates a strong disturbance in water environmental factors within a river. The change in water pollutant concentrations of sluice-controlled river reaches (SCRRs) is more complex than that of natural river segments. To determine the key factors affecting water pollutant concentration changes in SCRRs, river reaches near the Huaidian Sluice in the Shaying River of China were selected as a case study, and water quality monitoring experiments based on different regulating modes were implemented in 2009 and 2010. To identify the key factors affecting the change rates for the chemical oxygen demand of permanganate (CODMn) and ammonia nitrogen (NH3-N) concentrations in the SCRRs of the Huaidian Sluice, partial correlation analysis, principal component analysis and principal factor analysis were used. The results indicate four factors, i.e., the inflow quantity from upper reaches, opening size of sluice gates, water pollutant concentration from upper reaches, and turbidity before the sluice, which are the common key factors for the CODMn and NH3-N concentration change rates. Moreover, the dissolved oxygen before a sluice is a key factor for the permanganate concentration from CODMn change rate, and the water depth before a sluice is a key factor for the NH3-N concentration change rate. Multiple linear regressions between the water pollutant concentration change rate and key factors were established via multiple linear regression analyses, and the quantitative relationship between the CODMn and NH3-N concentration change rates and key affecting factors was analyzed. Finally, the mechanism of action for the key factors affecting the water pollutant concentration changes was analyzed. The results reveal that the inflow quantity from upper reaches, opening size of sluice gates, permanganate concentration from CODMn from upper reaches and dissolved oxygen before the sluice have a negative influence and the turbidity before the sluice has a positive influence on the permanganate concentration from CODMn change rates and that the opening size of sluice gates, NH3-N concentration from upper reaches, and water depth before the sluice have a negative influence and the inflow quantity from upper reaches and turbidity before the sluice have a positive influence on the NH3-N concentration change rates, which provides a scientific grounding for pollution control and sluice operations in SCRRs.

  4. Simulation Study of Evacuation Control Center Operations Analysis

    DTIC Science & Technology

    2011-06-01

    28 4.3 Baseline Manning (Runs 1, 2, & 3) . . . . . . . . . . . . 30 4.3.1 Baseline Statistics Interpretation...46 Appendix B. Key Statistic Matrix: Runs 1-12 . . . . . . . . . . . . . 48 Appendix C. Blue Dart...Completion Time . . . 33 11. Paired T result - Run 5 v. Run 6: ECC Completion Time . . . 35 12. Key Statistics : Run 3 vs. Run 9

  5. A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System

    PubMed Central

    Wu, Xiangjun; Li, Yang; Kurths, Jürgen

    2015-01-01

    The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks. PMID:25826602

  6. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  7. Uncertainty in the analysis of the overall equipment effectiveness on the shop floor

    NASA Astrophysics Data System (ADS)

    Rößler, M. P.; Abele, E.

    2013-06-01

    In this article an approach will be presented which supports transparency regarding the effectiveness of manufacturing equipment by combining the fuzzy set theory with the method of the overall equipment effectiveness analysis. One of the key principles of lean production and also a fundamental task in production optimization projects is the prior analysis of the current state of a production system by the use of key performance indicators to derive possible future states. The current state of the art in overall equipment effectiveness analysis is usually performed by cumulating different machine states by means of decentralized data collection without the consideration of uncertainty. In manual data collection or semi-automated plant data collection systems the quality of derived data often diverges and leads optimization teams to distorted conclusions about the real optimization potential of manufacturing equipment. The method discussed in this paper is to help practitioners to get more reliable results in the analysis phase and so better results of optimization projects. Under consideration of a case study obtained results are discussed.

  8. 2016 Federal Employee Viewpoint Survey Results and Analysis

    EPA Pesticide Factsheets

    The Office of Personnel Management’s Federal Employee Viewpoint Survey results are used to gauge the attitudes and perceptions of employees in key work experience areas that drive satisfaction and commitment.

  9. 2017 Federal Employee Viewpoint Survey Results and Analysis

    EPA Pesticide Factsheets

    The Office of Personnel Management’s Federal Employee Viewpoint Survey results are used to gauge the attitudes and perceptions of employees in key work experience areas that drive satisfaction and commitment.

  10. 2015 Federal Employee Viewpoint Survey Results and Analysis

    EPA Pesticide Factsheets

    The Office of Personnel Management’s Federal Employee Viewpoint Survey results are used to gauge the attitudes and perceptions of employees in key work experience areas that drive satisfaction and commitment.

  11. Roller Bearing Health Monitoring Using CPLE Frequency Analysis Method

    NASA Technical Reports Server (NTRS)

    Jong, Jen-Yi; Jones, Jess H.

    2007-01-01

    This paper describes a unique vibration signature analysis technique Coherence Phase Line Enhancer (CPLE) Frequency Analysis - for roller bearing health monitoring. Defects of roller bearing (e.g. wear, foreign debris, crack in bearing supporting structure, etc.) can cause small bearing characteristic frequency shifts due to minor changes in bearing geometry. Such frequency shifts are often too small to detect by the conventional Power Spectral Density (PSD) due to its frequency bandwidth limitation. This Coherent Phase Line Enhancer technology has been evolving over the last few years and has culminated in the introduction of a new and novel frequency spectrum which is fully described in this paper. This CPLE technology uses a "key phasor" or speed probe as a preprocessor for this analysis. With the aid of this key phasor, this CPLE technology can develop a two dimensional frequency spectrum that preserves both amplitude and phase that is not normally obtained using conventional frequency analysis. This two-dimensional frequency transformation results in several newly defined spectral functions; i. e. CPLE-PSD, CPLE-Coherence and the CPLE-Frequency. This paper uses this CPLE frequency analysis to detect subtle, low level bearing related signals in the High Pressure Fuel Pump (HPFP) of the Space Shuttle Main Engine (SSME). For many rotating machinery applications, a key phasor is an essential measurement that is used in the detection of bearing related signatures. There are times however, when a key phasor is not available; i. e. during flight of any of the SSME turbopumps or on the SSME High Pressure Oxygen Turbopump (HPOTP) where no speed probe is present. In this case, the CPLE analysis approach can still be achieved using a novel Pseudo Key Phasor (PKP) technique to reconstruct a 1/Rev PKP signal directly from external vibration measurements. This paper develops this Pseudo Key Phasor technique and applies it to the SSME vibration data.

  12. Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.

    PubMed

    Capmany, José

    2009-04-13

    We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.

  13. Pupil Mobility, Attainment and Progress in Primary School

    ERIC Educational Resources Information Center

    Strand, Steve; Demie, Feyisa

    2006-01-01

    This article presents an analysis of the association between pupil mobility and educational attainment in the 2002 national end of Key Stage 2 (KS2) tests for 11-year-old pupils in an inner London education authority. The results show that pupil mobility is strongly associated with low attainment in the end of key stage tests. However, the…

  14. 76 FR 72493 - ITS Joint Program Office Webinar on Alternative Organizational Structures for a Certificate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... over time. (This study is an institutional analysis only, not a technical analysis, and it is not... Adam Hopps at (202) 680-0091. The ITS JPO will present results from an early analysis of organizational models. This analysis will describe the functions that need to be performed by a CME; identify key...

  15. Communication scheme using a hyperchaotic semiconductor laser model: Chaos shift key revisited

    NASA Astrophysics Data System (ADS)

    Fataf, N. A. A.; Palit, Sanjay Kumar; Mukherjee, Sayan; Said, M. R. M.; Son, Doan Hoai; Banerjee, Santo

    2017-11-01

    Based on the Maxwell-Bloch equations, we considered a five-dimensional ODE system, describing the dynamics of a semiconductor laser. The system has rich dynamics with multi-periodic, chaotic and hyperchaotic states. In this analysis, we have investigated the hyperchaotic nature of the aforesaid model and proposed a communication scheme, the generalized form of chaos shift keys, where the coupled systems do not need to be in the synchronized state. The results are implemented with the hyperchaotic laser model followed by a comprehensive security analysis.

  16. Robustness Analysis of Integrated LPV-FDI Filters and LTI-FTC System for a Transport Aircraft

    NASA Technical Reports Server (NTRS)

    Khong, Thuan H.; Shin, Jong-Yeob

    2007-01-01

    This paper proposes an analysis framework for robustness analysis of a nonlinear dynamics system that can be represented by a polynomial linear parameter varying (PLPV) system with constant bounded uncertainty. The proposed analysis framework contains three key tools: 1) a function substitution method which can convert a nonlinear system in polynomial form into a PLPV system, 2) a matrix-based linear fractional transformation (LFT) modeling approach, which can convert a PLPV system into an LFT system with the delta block that includes key uncertainty and scheduling parameters, 3) micro-analysis, which is a well known robust analysis tool for linear systems. The proposed analysis framework is applied to evaluating the performance of the LPV-fault detection and isolation (FDI) filters of the closed-loop system of a transport aircraft in the presence of unmodeled actuator dynamics and sensor gain uncertainty. The robustness analysis results are compared with nonlinear time simulations.

  17. Key ingredients of anti-stigma programs for health care providers: a data synthesis of evaluative studies.

    PubMed

    Knaak, Stephanie; Modgill, Geeta; Patten, Scott B

    2014-10-01

    As part of its ongoing effort to combat stigma against mental illness among health care providers, the Mental Health Commission of Canada partnered with organizations conducting anti-stigma interventions. Our objective was to evaluate program effectiveness and to better understand what makes some programs more effective than others. Our paper reports the elements of these programs found to be most strongly associated with favourable outcomes. Our study employed a multi-phased, mixed-methods design. First, a grounded theory qualitative study was undertaken to identify key program elements. Next, each program (n = 22) was coded according to the presence or absence of the identified key program ingredients. Then, random-effects, meta-regression modelling was used to examine the association between program outcomes and the key ingredients. The qualitative analysis led to a 6-ingredient model of key program elements. Results of the quantitative analysis showed that programs that included all 6 of these ingredients performed significantly better than those that did not. Individual analyses of each of the 6 ingredients showed that including multiple forms of social contact and emphasizing recovery were characteristics of the most effective programs. The results provide a validation of a 6-ingredient model of key program elements for anti-stigma programming for health care providers. Emphasizing recovery and including multiple types of social contact are of particular importance for maximizing the effectiveness of anti-stigma programs for health care providers.

  18. [Audits across state borders for medical consulting agencies within the German healthcare insurance system].

    PubMed

    Schneider, T; Sommerfeld, W; Möller, J

    2003-06-01

    The Medizinischer Dienst der Krankenversicherung (MDK) is a non-profit medical consulting organisation serving the German Healthcare Insurance System. Despite its uniform commission throughout Germany, organisation and structure differ considerably between Provincial States which is reflected by differing results. A common nationwide system of key figures and indicators aims at analysing results and learning from one another. Development of an audit concept for analysing key figures and indicators within the MDK aiming at quality improvement. Development of a system of key figures and indicators covering five spheres (products, staff, costs, data analysis, structure). Analysis by means of audits carried out across provincial state borders in five steps (audit manual, training of auditors, visitation, audit report, repetition audit). The system of key figures and indicators assures relevant and comparable data. Audit manual, training of auditors, visitation, and audit report meet the needs of all people and institutions involved. Preparation of auditors as well as openness, and flow of information within audited organisations offer areas for improvement. There is as yet no assessment of the cost-benefit ratio of audits. The concept presented in this article consists of two parts: A system of key figures and indicators as well as a concept for audits. The concept is suitable for a) generating and analysing relevant key figures and indicators for each MDK, and b) providing information for benchmarking between different MDK. Further development of the concept to a comprehensive management concept is necessary.

  19. A Study on Environmental Research Trends Using Text-Mining Method - Focus on Spatial information and ICT -

    NASA Astrophysics Data System (ADS)

    Lee, M. J.; Oh, K. Y.; Joung-ho, L.

    2016-12-01

    Recently there are many research about analysing the interaction between entities by text-mining analysis in various fields. In this paper, we aimed to quantitatively analyse research-trends in the area of environmental research relating either spatial information or ICT (Information and Communications Technology) by Text-mining analysis. To do this, we applied low-dimensional embedding method, clustering analysis, and association rule to find meaningful associative patterns of key words frequently appeared in the articles. As the authors suppose that KCI (Korea Citation Index) articles reflect academic demands, total 1228 KCI articles that have been published from 1996 to 2015 were reviewed and analysed by Text-mining method. First, we derived KCI articles from NDSL(National Discovery for Science Leaders) site. And then we pre-processed their key-words elected from abstract and then classified those in separable sectors. We investigated the appearance rates and association rule of key-words for articles in the two fields: spatial-information and ICT. In order to detect historic trends, analysis was conducted separately for the four periods: 1996-2000, 2001-2005, 2006-2010, 2011-2015. These analysis were conducted with the usage of R-software. As a result, we conformed that environmental research relating spatial information mainly focused upon such fields as `GIS(35%)', `Remote-Sensing(25%)', `environmental theme map(15.7%)'. Next, `ICT technology(23.6%)', `ICT service(5.4%)', `mobile(24%)', `big data(10%)', `AI(7%)' are primarily emerging from environmental research relating ICT. Thus, from the analysis results, this paper asserts that research trends and academic progresses are well-structured to review recent spatial information and ICT technology and the outcomes of the analysis can be an adequate guidelines to establish environment policies and strategies. KEY WORDS: Big data, Test-mining, Environmental research, Spatial-information, ICT Acknowledgements: The authors appreciate the support that this study has received from `Building application frame of environmental issues, to respond to the latest ICT trends'.

  20. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    DTIC Science & Technology

    2014-05-23

    individuals in line management .... the key to effective execution of any contract is not the quality of the contract, it is the quality of the...yielded only limited results due in large part to poor workforce management . Most reports have concluded that the key to good acquisitions is having a...Supply Chain Management ......................................................................... 21 Figures Figure 1. Contract Obligations, by

  1. Analytical analysis and implementation of a low-speed high-torque permanent magnet vernier in-wheel motor for electric vehicle

    NASA Astrophysics Data System (ADS)

    Li, Jiangui; Wang, Junhua; Zhigang, Zhao; Yan, Weili

    2012-04-01

    In this paper, analytical analysis of the permanent magnet vernier (PMV) is presented. The key is to analytically solve the governing Laplacian/quasi-Poissonian field equations in the motor regions. By using the time-stepping finite element method, the analytical method is verified. Hence, the performances of the PMV machine are quantitatively compared with that of the analytical results. The analytical results agree well with the finite element method results. Finally, the experimental results are given to further show the validity of the analysis.

  2. Analysis of Plasma Detachment through Magnetic Nozzle via Canonical Field Theory

    NASA Astrophysics Data System (ADS)

    Takagaki, Yu

    In this paper, I have investigated the mechanism of plasma detachment through magnetic nozzle via canonical field theory, especially by considering canonical vorticity flux Psisigma contour and dissipative force vector Rsigma. As one of the most recent experimental proofs of plasma detachment, Olsen et al., observed and investigated three key indications of plasma detachment. However, after solving for numerical fits with their experimental data, I found that constant ion flux lines did not actually separate from constant magnetic flux lines. Thus, their first key indication becomes incorrect now. Whereas, my analytical results are consistent with the other two key indications. At the beginning, plasma detached from canonical vorticity flux contours due to non-zero dissipative force and attached on magnetic flux lines instead. However, vector Rsigma [is asymptotically equal to] 0 force makes plasma re-attach on canonical vorticity flux contours around the plume edge region. As the most significant and notable result through my analysis, I confirmed the existence of returning plasma flow around the plume edge region.

  3. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  4. A biometric method to secure telemedicine systems.

    PubMed

    Zhang, G H; Poon, Carmen C Y; Li, Ye; Zhang, Y T

    2009-01-01

    Security and privacy are among the most crucial issues for data transmission in telemedicine systems. This paper proposes a solution for securing wireless data transmission in telemedicine systems, i.e. within a body sensor network (BSN), between the BSN and server as well as between the server and professionals who have assess to the server. A unique feature of this solution is the generation of random keys by physiological data (i.e. a biometric approach) for securing communication at all 3 levels. In the performance analysis, inter-pulse interval of photoplethysmogram is used as an example to generate these biometric keys to protect wireless data transmission. The results of statistical analysis and computational complexity suggest that this type of key is random enough to make telemedicine systems resistant to attacks.

  5. Comparative analysis of dietary guidelines in the Spanish-Speaking Caribbean.

    PubMed

    Fuster, Melissa

    2016-03-01

    Dietary guidelines are important education and policy tools to address local nutrition concerns. The current paper presents a comparative analysis of nutrition messages from three Spanish-speaking Caribbean countries (Cuba, Puerto Rico and Dominican Republic) to explore how these dietary guidelines address common public health nutrition concerns, contextualized in different changing food environments and food culture similarities. Qualitative, comparative analysis of current dietary guideline documents and key recommendations. Key recommendations were categorized into sixteen themes (two diet-based, ten food-based and four 'other'). Only the Cuban dietary guidelines included diet-based key recommendations. Of the ten food-based key recommendations, only four themes overlapped across the three dietary guidelines (the encouragement of fruits and vegetables, addressing protein sources and fat). Other overlaps were found between dietary guideline pairs, except between Cuba and Puerto Rico. Further analysis revealed differences in levels of specificity and acknowledgement of local dietary patterns and issues, as well as the need to revise the guidelines to account for current scientific advances. The present study underscored the importance of context in the framing of dietary advice and the influence of national socio-economic and political situations on nutrition policy and education efforts. The results contribute to inform efforts to improve nutrition communication in the region and among migrant communities.

  6. STS-1 operational flight profile. Volume 6: Abort analysis

    NASA Technical Reports Server (NTRS)

    1980-01-01

    The abort analysis for the cycle 3 Operational Flight Profile (OFP) for the Space Transportation System 1 Flight (STS-1) is defined, superseding the abort analysis previously presented. Included are the flight description, abort analysis summary, flight design groundrules and constraints, initialization information, general abort description and results, abort solid rocket booster and external tank separation and disposal results, abort monitoring displays and discussion on both ground and onboard trajectory monitoring, abort initialization load summary for the onboard computer, list of the key abort powered flight dispersion analysis.

  7. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  8. Meta-analysis for explaining the variance in public transport demand elasticities in Europe

    DOT National Transportation Integrated Search

    1998-01-01

    Results from past studies on transport demand elasticities show a large variance. This paper assesses key factors that influence the sensitivity of public transport users to transport costs in Europe, by carrying out a comparative analysis of the dif...

  9. Nonlinear Analysis for High-temperature Composites: Turbine Blades/vanes

    NASA Technical Reports Server (NTRS)

    Hopkins, D. A.; Chamis, C. C.

    1984-01-01

    An integrated approach to nonlinear analysis of high-temperature composites in turbine blade/vane applications is presented. The overall strategy of this approach and the key elements comprising this approach are summarized. Preliminary results for a tungsten-fiber-reinforced superalloy (TFRS) composite are discussed.

  10. Empirical Analysis of Optical Attenuator Performance in Quantum Key Distribution Systems Using a Particle Model

    DTIC Science & Technology

    2012-03-01

    EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING A...DISTRIBUTION IS UNLIMITED AFIT/GCS/ENG/12-01 EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING ...challenging as the complexity of actual implementation specifics are considered. Two components common to most quantum key distribution

  11. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code.

    PubMed

    Lin, Chao; Shen, Xueju; Li, Baochen

    2014-08-25

    We demonstrate that all parameters of optical lightwave can be simultaneously designed as keys in security system. This multi-dimensional property of key can significantly enlarge the key space and further enhance the security level of the system. The single-shot off-axis digital holography with orthogonal polarized reference waves is employed to perform polarization state recording on object wave. Two pieces of polarization holograms are calculated and fabricated to be arranged in reference arms to generate random amplitude and phase distribution respectively. When reconstruction, original information which is represented with QR code can be retrieved using Fresnel diffraction with decryption keys and read out noise-free. Numerical simulation results for this cryptosystem are presented. An analysis on the key sensitivity and fault tolerance properties are also provided.

  12. Transforming Social Regularities in a Multicomponent Community-Based Intervention: A Case Study of Professionals' Adaptability to Better Support Parents to Meet Their Children's Needs.

    PubMed

    Quiroz Saavedra, Rodrigo; Brunson, Liesette; Bigras, Nathalie

    2017-06-01

    This paper presents an in-depth case study of the dynamic processes of mutual adjustment that occurred between two professional teams participating in a multicomponent community-based intervention (CBI). Drawing on the concept of social regularities, we focus on patterns of social interaction within and across the two microsystems involved in delivering the intervention. Two research strategies, narrative analysis and structural network analysis, were used to reveal the social regularities linking the two microsystems. Results document strategies and actions undertaken by the professionals responsible for the intervention to modify intersetting social regularities to deal with a problem situation that arose during the course of one intervention cycle. The results illustrate how key social regularities were modified in order to resolve the problem situation and allow the intervention to continue to function smoothly. We propose that these changes represent a transition to a new state of the ecological intervention system. This transformation appeared to be the result of certain key intervening mechanisms: changing key role relationships, boundary spanning, and synergy. The transformation also appeared to be linked to positive setting-level and individual-level outcomes: confidence of key team members, joint planning, decision-making and intervention activities, and the achievement of desired intervention objectives. © Society for Community Research and Action 2017.

  13. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  14. Toxicogenomics and cancer risk assessment: a framework for key event analysis and dose-response assessment for nongenotoxic carcinogens.

    PubMed

    Bercu, Joel P; Jolly, Robert A; Flagella, Kelly M; Baker, Thomas K; Romero, Pedro; Stevens, James L

    2010-12-01

    In order to determine a threshold for nongenotoxic carcinogens, the traditional risk assessment approach has been to identify a mode of action (MOA) with a nonlinear dose-response. The dose-response for one or more key event(s) linked to the MOA for carcinogenicity allows a point of departure (POD) to be selected from the most sensitive effect dose or no-effect dose. However, this can be challenging because multiple MOAs and key events may exist for carcinogenicity and oftentimes extensive research is required to elucidate the MOA. In the present study, a microarray analysis was conducted to determine if a POD could be identified following short-term oral rat exposure with two nongenotoxic rodent carcinogens, fenofibrate and methapyrilene, using a benchmark dose analysis of genes aggregated in Kyoto Encyclopedia of Genes and Genomes (KEGG) pathways and Gene Ontology (GO) biological processes, which likely encompass key event(s) for carcinogenicity. The gene expression response for fenofibrate given to rats for 2days was consistent with its MOA and known key events linked to PPARα activation. The temporal response from daily dosing with methapyrilene demonstrated biological complexity with waves of pathways/biological processes occurring over 1, 3, and 7days; nonetheless, the benchmark dose values were consistent over time. When comparing the dose-response of toxicogenomic data to tumorigenesis or precursor events, the toxicogenomics POD was slightly below any effect level. Our results suggest that toxicogenomic analysis using short-term studies can be used to identify a threshold for nongenotoxic carcinogens based on evaluation of potential key event(s) which then can be used within a risk assessment framework. Copyright © 2010 Elsevier Inc. All rights reserved.

  15. Employing SWOT Analysis in Coursework on the Geographies of Regional Economic Development and Trade

    ERIC Educational Resources Information Center

    Kalafsky, Ronald V.; Sonnichsen, Tyler

    2015-01-01

    The use of SWOT analysis is a means through which geography students can investigate key concepts in economic geography and essential topics in regional economic development. This article discusses the results of a course project where economic geography students employed SWOT analysis to explore medium-sized metropolitan areas across the southern…

  16. Conjoint Analysis of Study Abroad Preferences: Key Attributes, Segments and Implications for Increasing Student Participation

    ERIC Educational Resources Information Center

    Garver, Michael S.; Divine, Richard L.

    2008-01-01

    An adaptive conjoint analysis was performed on the study abroad preferences of a sample of undergraduate college students. The results indicate that trip location, cost, and time spent abroad are the three most important determinants of student preference for different study abroad trip scenarios. The analysis also uncovered four different study…

  17. Preliminary Rural Analysis of the Early Childhood Longitudinal Study--Kindergarten Cohort. Rural Early Childhood Brief Number 2

    ERIC Educational Resources Information Center

    National Center for Rural Early Childhood Learning Initiatives - Mississippi State University Early Childhood Institute, 2005

    2005-01-01

    This brief introduces the first results from a rural analysis of selected national datasets. Provided are key findings concerning kindergarten readiness of rural children from an analysis of the Kindergarten Cohort of the Early Childhood Longitudinal Study (ECLS). Future briefs will summarize the findings concerning the health of the Kindergarten…

  18. Initiating Event Analysis of a Lithium Fluoride Thorium Reactor

    NASA Astrophysics Data System (ADS)

    Geraci, Nicholas Charles

    The primary purpose of this study is to perform an Initiating Event Analysis for a Lithium Fluoride Thorium Reactor (LFTR) as the first step of a Probabilistic Safety Assessment (PSA). The major objective of the research is to compile a list of key initiating events capable of resulting in failure of safety systems and release of radioactive material from the LFTR. Due to the complex interactions between engineering design, component reliability and human reliability, probabilistic safety assessments are most useful when the scope is limited to a single reactor plant. Thus, this thesis will study the LFTR design proposed by Flibe Energy. An October 2015 Electric Power Research Institute report on the Flibe Energy LFTR asked "what-if?" questions of subject matter experts and compiled a list of key hazards with the most significant consequences to the safety or integrity of the LFTR. The potential exists for unforeseen hazards to pose additional risk for the LFTR, but the scope of this thesis is limited to evaluation of those key hazards already identified by Flibe Energy. These key hazards are the starting point for the Initiating Event Analysis performed in this thesis. Engineering evaluation and technical study of the plant using a literature review and comparison to reference technology revealed four hazards with high potential to cause reactor core damage. To determine the initiating events resulting in realization of these four hazards, reference was made to previous PSAs and existing NRC and EPRI initiating event lists. Finally, fault tree and event tree analyses were conducted, completing the logical classification of initiating events. Results are qualitative as opposed to quantitative due to the early stages of system design descriptions and lack of operating experience or data for the LFTR. In summary, this thesis analyzes initiating events using previous research and inductive and deductive reasoning through traditional risk management techniques to arrive at a list of key initiating events that can be used to address vulnerabilities during the design phases of LFTR development.

  19. KEY COMPARISON: Final report on CCQM-K69 key comparison: Testosterone glucuronide in human urine

    NASA Astrophysics Data System (ADS)

    Liu, Fong-Ha; Mackay, Lindsey; Murby, John

    2010-01-01

    The CCQM-K69 key comparison of testosterone glucuronide in human urine was organized under the auspices of the CCQM Organic Analysis Working Group (OAWG). The National Measurement Institute Australia (NMIA) acted as the coordinating laboratory for the comparison. The samples distributed for the key comparison were prepared at NMIA with funding from the World Anti-Doping Agency (WADA). WADA granted the approval for this material to be used for the intercomparison provided the distribution and handling of the material were strictly controlled. Three national metrology institutes (NMIs)/designated institutes (DIs) developed reference methods and submitted data for the key comparison along with two other laboratories who participated in the parallel pilot study. A good selection of analytical methods and sample workup procedures was displayed in the results submitted considering the complexities of the matrix involved. The comparability of measurement results was successfully demonstrated by the participating NMIs. Only the key comparison data were used to estimate the key comparison reference value (KCRV), using the arithmetic mean approach. The reported expanded uncertainties for results ranged from 3.7% to 6.7% at the 95% level of confidence and all results agreed within the expanded uncertainty of the KCRV. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  20. LatMix 2011 and 2012 Dispersion Analysis

    DTIC Science & Technology

    2017-05-15

    was to complete the analysis and write -up of additional manuscripts relating to LatMix, and to further strengthen the results for multiple manuscripts...versus a propagation of energy upwards from small mixing events (e.g., via generation of vo rtices). A key technical goal of our work was to develop...raw waveforms co llected during the LatMix 20 l I airborne lidar surveys, and completion of the analysis and write -up of major results stemming from

  1. Characterization of Factors Affecting Nanoparticle Tracking Analysis Results With Synthetic and Protein Nanoparticles.

    PubMed

    Krueger, Aaron B; Carnell, Pauline; Carpenter, John F

    2016-04-01

    In many manufacturing and research areas, the ability to accurately monitor and characterize nanoparticles is becoming increasingly important. Nanoparticle tracking analysis is rapidly becoming a standard method for this characterization, yet several key factors in data acquisition and analysis may affect results. Nanoparticle tracking analysis is prone to user input and bias on account of a high number of parameters available, contains a limited analysis volume, and individual sample characteristics such as polydispersity or complex protein solutions may affect analysis results. This study systematically addressed these key issues. The integrated syringe pump was used to increase the sample volume analyzed. It was observed that measurements recorded under flow caused a reduction in total particle counts for both polystyrene and protein particles compared to those collected under static conditions. In addition, data for polydisperse samples tended to lose peak resolution at higher flow rates, masking distinct particle populations. Furthermore, in a bimodal particle population, a bias was seen toward the larger species within the sample. The impacts of filtration on an agitated intravenous immunoglobulin sample and operating parameters including "MINexps" and "blur" were investigated to optimize the method. Taken together, this study provides recommendations on instrument settings and sample preparations to properly characterize complex samples. Copyright © 2016. Published by Elsevier Inc.

  2. Analytic Steering: Inserting Context into the Information Dialog

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bohn, Shawn J.; Calapristi, Augustin J.; Brown, Shyretha D.

    2011-10-23

    An analyst’s intrinsic domain knowledge is a primary asset in almost any analysis task. Unstructured text analysis systems that apply un-supervised content analysis approaches can be more effective if they can leverage this domain knowledge in a manner that augments the information discovery process without obfuscating new or unexpected content. Current unsupervised approaches rely upon the prowess of the analyst to submit the right queries or observe generalized document and term relationships from ranked or visual results. We propose a new approach which allows the user to control or steer the analytic view within the unsupervised space. This process ismore » controlled through the data characterization process via user supplied context in the form of a collection of key terms. We show that steering with an appropriate choice of key terms can provide better relevance to the analytic domain and still enable the analyst to uncover un-expected relationships; this paper discusses cases where various analytic steering approaches can provide enhanced analysis results and cases where analytic steering can have a negative impact on the analysis process.« less

  3. Simultaneous detection of landmarks and key-frame in cardiac perfusion MRI using a joint spatial-temporal context model

    NASA Astrophysics Data System (ADS)

    Lu, Xiaoguang; Xue, Hui; Jolly, Marie-Pierre; Guetter, Christoph; Kellman, Peter; Hsu, Li-Yueh; Arai, Andrew; Zuehlsdorff, Sven; Littmann, Arne; Georgescu, Bogdan; Guehring, Jens

    2011-03-01

    Cardiac perfusion magnetic resonance imaging (MRI) has proven clinical significance in diagnosis of heart diseases. However, analysis of perfusion data is time-consuming, where automatic detection of anatomic landmarks and key-frames from perfusion MR sequences is helpful for anchoring structures and functional analysis of the heart, leading toward fully automated perfusion analysis. Learning-based object detection methods have demonstrated their capabilities to handle large variations of the object by exploring a local region, i.e., context. Conventional 2D approaches take into account spatial context only. Temporal signals in perfusion data present a strong cue for anchoring. We propose a joint context model to encode both spatial and temporal evidence. In addition, our spatial context is constructed not only based on the landmark of interest, but also the landmarks that are correlated in the neighboring anatomies. A discriminative model is learned through a probabilistic boosting tree. A marginal space learning strategy is applied to efficiently learn and search in a high dimensional parameter space. A fully automatic system is developed to simultaneously detect anatomic landmarks and key frames in both RV and LV from perfusion sequences. The proposed approach was evaluated on a database of 373 cardiac perfusion MRI sequences from 77 patients. Experimental results of a 4-fold cross validation show superior landmark detection accuracies of the proposed joint spatial-temporal approach to the 2D approach that is based on spatial context only. The key-frame identification results are promising.

  4. Security analysis of orthogonal-frequency-division-multiplexing-based continuous-variable quantum key distribution with imperfect modulation

    NASA Astrophysics Data System (ADS)

    Zhang, Hang; Mao, Yu; Huang, Duan; Li, Jiawei; Zhang, Ling; Guo, Ying

    2018-05-01

    We introduce a reliable scheme for continuous-variable quantum key distribution (CV-QKD) by using orthogonal frequency division multiplexing (OFDM). As a spectrally efficient multiplexing technique, OFDM allows a large number of closely spaced orthogonal subcarrier signals used to carry data on several parallel data streams or channels. We place emphasis on modulator impairments which would inevitably arise in the OFDM system and analyze how these impairments affect the OFDM-based CV-QKD system. Moreover, we also evaluate the security in the asymptotic limit and the Pirandola-Laurenza-Ottaviani-Banchi upper bound. Results indicate that although the emergence of imperfect modulation would bring about a slight decrease in the secret key bit rate of each subcarrier, the multiplexing technique combined with CV-QKD results in a desirable improvement on the total secret key bit rate which can raise the numerical value about an order of magnitude.

  5. Screening key candidate genes and pathways involved in insulinoma by microarray analysis.

    PubMed

    Zhou, Wuhua; Gong, Li; Li, Xuefeng; Wan, Yunyan; Wang, Xiangfei; Li, Huili; Jiang, Bin

    2018-06-01

    Insulinoma is a rare type tumor and its genetic features remain largely unknown. This study aimed to search for potential key genes and relevant enriched pathways of insulinoma.The gene expression data from GSE73338 were downloaded from Gene Expression Omnibus database. Differentially expressed genes (DEGs) were identified between insulinoma tissues and normal pancreas tissues, followed by pathway enrichment analysis, protein-protein interaction (PPI) network construction, and module analysis. The expressions of candidate key genes were validated by quantitative real-time polymerase chain reaction (RT-PCR) in insulinoma tissues.A total of 1632 DEGs were obtained, including 1117 upregulated genes and 514 downregulated genes. Pathway enrichment results showed that upregulated DEGs were significantly implicated in insulin secretion, and downregulated DEGs were mainly enriched in pancreatic secretion. PPI network analysis revealed 7 hub genes with degrees more than 10, including GCG (glucagon), GCGR (glucagon receptor), PLCB1 (phospholipase C, beta 1), CASR (calcium sensing receptor), F2R (coagulation factor II thrombin receptor), GRM1 (glutamate metabotropic receptor 1), and GRM5 (glutamate metabotropic receptor 5). DEGs involved in the significant modules were enriched in calcium signaling pathway, protein ubiquitination, and platelet degranulation. Quantitative RT-PCR data confirmed that the expression trends of these hub genes were similar to the results of bioinformatic analysis.The present study demonstrated that candidate DEGs and enriched pathways were the potential critical molecule events involved in the development of insulinoma, and these findings were useful for better understanding of insulinoma genesis.

  6. Defense frontier analysis of quantum cryptographic systems.

    PubMed

    Slutsky, B; Rao, R; Sun, P C; Tancevski, L; Fainman, S

    1998-05-10

    When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.

  7. SU-E-T-191: PITSTOP: Process Improvement Techniques, Software Tools, and Operating Principles for a Quality Initiative Discovery Framework.

    PubMed

    Siochi, R

    2012-06-01

    To develop a quality initiative discovery framework using process improvement techniques, software tools and operating principles. Process deviations are entered into a radiotherapy incident reporting database. Supervisors use an in-house Event Analysis System (EASy) to discuss incidents with staff. Major incidents are analyzed with an in-house Fault Tree Analysis (FTA). A meta-Analysis is performed using association, text mining, key word clustering, and differential frequency analysis. A key operating principle encourages the creation of forcing functions via rapid application development. 504 events have been logged this past year. The results for the key word analysis indicate that the root cause for the top ranked key words was miscommunication. This was also the root cause found from association analysis, where 24% of the time that an event involved a physician it also involved a nurse. Differential frequency analysis revealed that sharp peaks at week 27 were followed by 3 major incidents, two of which were dose related. The peak was largely due to the front desk which caused distractions in other areas. The analysis led to many PI projects but there is still a major systematic issue with the use of forms. The solution we identified is to implement Smart Forms to perform error checking and interlocking. Our first initiative replaced our daily QA checklist with a form that uses custom validation routines, preventing therapists from proceeding with treatments until out of tolerance conditions are corrected. PITSTOP has increased the number of quality initiatives in our department, and we have discovered or confirmed common underlying causes of a variety of seemingly unrelated errors. It has motivated the replacement of all forms with smart forms. © 2012 American Association of Physicists in Medicine.

  8. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  9. Turbulence study in the vicinity of piano key weir: relevance, instrumentation, parameters and methods

    NASA Astrophysics Data System (ADS)

    Tiwari, Harinarayan; Sharma, Nayan

    2017-05-01

    This research paper focuses on the need of turbulence, instruments reliable to capture turbulence, different turbulence parameters and some advance methodology which can decompose various turbulence structures at different levels near hydraulic structures. Small-scale turbulence research has valid prospects in open channel flow. The relevance of the study is amplified as we introduce any hydraulic structure in the channel which disturbs the natural flow and creates discontinuity. To recover this discontinuity, the piano key weir (PKW) might be used with sloped keys. Constraints of empirical results in the vicinity of PKW necessitate extensive laboratory experiments with fair and reliable instrumentation techniques. Acoustic Doppler velocimeter was established to be best suited within range of some limitations using principal component analysis. Wavelet analysis is proposed to decompose the underlying turbulence structure in a better way.

  10. Mode-of-action evaluation for the effect of trans fatty acids on low-density lipoprotein cholesterol.

    PubMed

    Reichard, John F; Haber, Lynne T

    2016-12-01

    The purpose of this work is to systematically consider the data relating to the mode of action (MOA) for the effects of industrially produced trans fatty acid (iTFA) on plasma low-density lipoprotein (LDL) levels. The hypothesized MOA is composed of two key events: increased LDL production and decreased LDL clearance. A substantial database supports this MOA, although the key events are likely to be interdependent, rather than sequential. Both key events are functions of nonlinear biological processes including rate-limited clearance, receptor-mediated transcription, and both positive and negative feedback regulation. Each key event was evaluated based on weight-of-evidence analysis and for human relevance. We conclude that the data are inadequate for a detailed dose-response analysis in the context of the evolved Bradford Hill considerations; however, the weight of evidence is strong and the overall shape of the dose-response curves for markers of the key events and the key determinants of those relationships is well understood in many cases and is nonlinear. Feedback controls are responsible for maintaining homeostasis of cholesterol and triglyceride levels and underlie both of the key events, resulting in a less-than-linear or thresholded relationship between TFA and LDL-C. The inconsistencies and gaps in the database are discussed. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. Security Analysis of Measurement-Device-Independent Quantum Key Distribution in Collective-Rotation Noisy Environment

    NASA Astrophysics Data System (ADS)

    Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian

    2018-01-01

    Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.

  12. Current Status of the LOFAR EoR Key Science Project

    NASA Astrophysics Data System (ADS)

    Koopmans, L. V. E.; LOFAR EoR KSP Team

    2018-05-01

    A short status update on the LOFAR Epoch of Reionization (EoR) Key Science Project (KSP) is given, regarding data acquisition, data processing and analysis, and current power-spectrum limits on the redshifted 21-cm signal of neutral hydrogen at redshifts z = 8 - 10. With caution, we present a preliminary astrophysical analysis of ~60 hr of processed LOFAR data and their resulting power spectrum, showing that potentially already interesting limits on X-ray heating during the Cosmic Dawn can already be gained. This is by no means the final analysis of this sub-set of data, but illustrates the future potential when all nearly 3000 hr of data in hand on two EoR windows will have been processed.

  13. LACIE analyst interpretation keys

    NASA Technical Reports Server (NTRS)

    Baron, J. G.; Payne, R. W.; Palmer, W. F. (Principal Investigator)

    1979-01-01

    Two interpretation aids, 'The Image Analysis Guide for Wheat/Small Grains Inventories' and 'The United States and Canadian Great Plains Regional Keys', were developed during LACIE phase 2 and implemented during phase 3 in order to provide analysts with a better understanding of the expected ranges in color variation of signatures for individual biostages and of the temporal sequences of LANDSAT signatures. The keys were tested using operational LACIE data, and the results demonstrate that their use provides improved labeling accuracy in all analyst experience groupings, in all geographic areas within the U.S. Great Plains, and during all periods of crop development.

  14. Known-plaintext attack on a joint transform correlator encrypting system.

    PubMed

    Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto; Bolognini, Nestor

    2010-11-01

    We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.

  15. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  16. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this presentation is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  17. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  18. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    NASA Astrophysics Data System (ADS)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good, illustrating their ability to obtain accurate results for such analytes in a complex food matrix containing approximately 17 mg kg-1 Se. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  19. Reverse engineering of TLX oncogenic transcriptional networks identifies RUNX1 as tumor suppressor in T-ALL.

    PubMed

    Della Gatta, Giusy; Palomero, Teresa; Perez-Garcia, Arianne; Ambesi-Impiombato, Alberto; Bansal, Mukesh; Carpenter, Zachary W; De Keersmaecker, Kim; Sole, Xavier; Xu, Luyao; Paietta, Elisabeth; Racevskis, Janis; Wiernik, Peter H; Rowe, Jacob M; Meijerink, Jules P; Califano, Andrea; Ferrando, Adolfo A

    2012-02-26

    The TLX1 and TLX3 transcription factor oncogenes have a key role in the pathogenesis of T cell acute lymphoblastic leukemia (T-ALL). Here we used reverse engineering of global transcriptional networks to decipher the oncogenic regulatory circuit controlled by TLX1 and TLX3. This systems biology analysis defined T cell leukemia homeobox 1 (TLX1) and TLX3 as master regulators of an oncogenic transcriptional circuit governing T-ALL. Notably, a network structure analysis of this hierarchical network identified RUNX1 as a key mediator of the T-ALL induced by TLX1 and TLX3 and predicted a tumor-suppressor role for RUNX1 in T cell transformation. Consistent with these results, we identified recurrent somatic loss-of-function mutations in RUNX1 in human T-ALL. Overall, these results place TLX1 and TLX3 at the top of an oncogenic transcriptional network controlling leukemia development, show the power of network analyses to identify key elements in the regulatory circuits governing human cancer and identify RUNX1 as a tumor-suppressor gene in T-ALL.

  20. The experimental verification on the shear bearing capacity of exposed steel column foot

    NASA Astrophysics Data System (ADS)

    Xijin, LIU

    2017-04-01

    In terms of the shear bearing capacity of the exposed steel column foot, there are many researches both home and abroad. However, the majority of the researches are limited to the theoretical analysis sector and few of them make the experimental analysis. In accordance with the prototype of an industrial plant in Beijing, this paper designs the experimental model. The experimental model is composed of six steel structural members in two groups, with three members without shear key and three members with shear key. The paper checks the shear bearing capacity of two groups respectively under different axial forces. The experiment shows: The anchor bolt of the exposed steel column foot features relatively large shear bearing capacity which could not be neglected. The results deducted through calculation methods proposed by this paper under two situations match the experimental results in terms of the shear bearing capacity of the steel column foot. Besides, it also proposed suggestions on revising the Code for Design of Steel Structure in the aspect of setting the shear key in the steel column foot.

  1. Single-photon quantum key distribution in the presence of loss

    NASA Astrophysics Data System (ADS)

    Curty, Marcos; Moroder, Tobias

    2007-05-01

    We investigate two-way and one-way single-photon quantum key distribution (QKD) protocols in the presence of loss introduced by the quantum channel. Our analysis is based on a simple precondition for secure QKD in each case. In particular, the legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. We show that both criteria can be formulated as a convex optimization problem known as a semidefinite program, which can be efficiently solved. Moreover, we prove that the solution to the dual optimization corresponds to the evaluation of an optimal witness operator that belongs to the minimal verification set of them for the given two-way (or one-way) QKD protocol. A positive expectation value of this optimal witness operator states that no secret key can be distilled from the available measurements results. We apply such analysis to several well-known single-photon QKD protocols under losses.

  2. Mechanics analysis of the multi-point-load process for the thin film solar cell

    NASA Astrophysics Data System (ADS)

    Wang, Zhiming; Wei, Guangpu; Gong, Zhengbang

    2008-02-01

    The main element of thin film solar cell is silicon. Because of the special mechanical characteristic of silicon, the method of loading pressure on the thin film solar cell and the value of pressure is the key problem which must be solved during the manufacturing of thin film solar cell. This paper describes the special mechanical characteristic of silicon, discussed the test method overall; value of pressure on thin film solar cell; the elements and the method of load by ANSYS finite element, according to these theory analysis, we obtained the key conclusion in the actual operation, these result have a great meaning in industry.

  3. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  4. Efficient bit sifting scheme of post-processing in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Le, Dan; Wu, Xianyan; Niu, Xiamu; Guo, Hong

    2015-10-01

    Bit sifting is an important step in the post-processing of quantum key distribution (QKD). Its function is to sift out the undetected original keys. The communication traffic of bit sifting has essential impact on the net secure key rate of a practical QKD system. In this paper, an efficient bit sifting scheme is presented, of which the core is a lossless source coding algorithm. Both theoretical analysis and experimental results demonstrate that the performance of the scheme is approaching the Shannon limit. The proposed scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means the proposed scheme can decrease the secure key consumption for classical channel authentication and increase the net secure key rate of the QKD system, as demonstrated by analyzing the improvement on the net secure key rate. Meanwhile, some recommendations on the application of the proposed scheme to some representative practical QKD systems are also provided.

  5. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  6. Designing novel cellulase systems through agent-based modeling and global sensitivity analysis.

    PubMed

    Apte, Advait A; Senger, Ryan S; Fong, Stephen S

    2014-01-01

    Experimental techniques allow engineering of biological systems to modify functionality; however, there still remains a need to develop tools to prioritize targets for modification. In this study, agent-based modeling (ABM) was used to build stochastic models of complexed and non-complexed cellulose hydrolysis, including enzymatic mechanisms for endoglucanase, exoglucanase, and β-glucosidase activity. Modeling results were consistent with experimental observations of higher efficiency in complexed systems than non-complexed systems and established relationships between specific cellulolytic mechanisms and overall efficiency. Global sensitivity analysis (GSA) of model results identified key parameters for improving overall cellulose hydrolysis efficiency including: (1) the cellulase half-life, (2) the exoglucanase activity, and (3) the cellulase composition. Overall, the following parameters were found to significantly influence cellulose consumption in a consolidated bioprocess (CBP): (1) the glucose uptake rate of the culture, (2) the bacterial cell concentration, and (3) the nature of the cellulase enzyme system (complexed or non-complexed). Broadly, these results demonstrate the utility of combining modeling and sensitivity analysis to identify key parameters and/or targets for experimental improvement.

  7. Designing novel cellulase systems through agent-based modeling and global sensitivity analysis

    PubMed Central

    Apte, Advait A; Senger, Ryan S; Fong, Stephen S

    2014-01-01

    Experimental techniques allow engineering of biological systems to modify functionality; however, there still remains a need to develop tools to prioritize targets for modification. In this study, agent-based modeling (ABM) was used to build stochastic models of complexed and non-complexed cellulose hydrolysis, including enzymatic mechanisms for endoglucanase, exoglucanase, and β-glucosidase activity. Modeling results were consistent with experimental observations of higher efficiency in complexed systems than non-complexed systems and established relationships between specific cellulolytic mechanisms and overall efficiency. Global sensitivity analysis (GSA) of model results identified key parameters for improving overall cellulose hydrolysis efficiency including: (1) the cellulase half-life, (2) the exoglucanase activity, and (3) the cellulase composition. Overall, the following parameters were found to significantly influence cellulose consumption in a consolidated bioprocess (CBP): (1) the glucose uptake rate of the culture, (2) the bacterial cell concentration, and (3) the nature of the cellulase enzyme system (complexed or non-complexed). Broadly, these results demonstrate the utility of combining modeling and sensitivity analysis to identify key parameters and/or targets for experimental improvement. PMID:24830736

  8. Identification of gene expression profiles and key genes in subchondral bone of osteoarthritis using weighted gene coexpression network analysis.

    PubMed

    Guo, Sheng-Min; Wang, Jian-Xiong; Li, Jin; Xu, Fang-Yuan; Wei, Quan; Wang, Hai-Ming; Huang, Hou-Qiang; Zheng, Si-Lin; Xie, Yu-Jie; Zhang, Chi

    2018-06-15

    Osteoarthritis (OA) significantly influences the quality life of people around the world. It is urgent to find an effective way to understand the genetic etiology of OA. We used weighted gene coexpression network analysis (WGCNA) to explore the key genes involved in the subchondral bone pathological process of OA. Fifty gene expression profiles of GSE51588 were downloaded from the Gene Expression Omnibus database. The OA-associated genes and gene ontologies were acquired from JuniorDoc. Weighted gene coexpression network analysis was used to find disease-related networks based on 21756 gene expression correlation coefficients, hub-genes with the highest connectivity in each module were selected, and the correlation between module eigengene and clinical traits was calculated. The genes in the traits-related gene coexpression modules were subject to functional annotation and pathway enrichment analysis using ClusterProfiler. A total of 73 gene modules were identified, of which, 12 modules were found with high connectivity with clinical traits. Five modules were found with enriched OA-associated genes. Moreover, 310 OA-associated genes were found, and 34 of them were among hub-genes in each module. Consequently, enrichment results indicated some key metabolic pathways, such as extracellular matrix (ECM)-receptor interaction (hsa04512), focal adhesion (hsa04510), the phosphatidylinositol 3'-kinase (PI3K)-Akt signaling pathway (PI3K-AKT) (hsa04151), transforming growth factor beta pathway, and Wnt pathway. We intended to identify some core genes, collagen (COL)6A3, COL6A1, ITGA11, BAMBI, and HCK, which could influence downstream signaling pathways once they were activated. In this study, we identified important genes within key coexpression modules, which associate with a pathological process of subchondral bone in OA. Functional analysis results could provide important information to understand the mechanism of OA. © 2018 Wiley Periodicals, Inc.

  9. Geosynchronous platform definition study. Volume 4, Part 2: Traffic analysis and system requirements for the new traffic model

    NASA Technical Reports Server (NTRS)

    1973-01-01

    A condensed summary of the traffic analyses and systems requirements for the new traffic model is presented. The results of each study activity are explained, key analyses are described, and important results are highlighted.

  10. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  11. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  12. Conceptual parameters of acculturation within the Asian and Pacific Islander American populations: applications for nursing practice and research.

    PubMed

    Baker, Dian

    2011-01-01

    Asian and Pacific Islander Americans (A&PIAs) are experiencing health inequities. For example, A&PIA is the only racial/ethnic group in America to experience cancer as their leading cause of death. Several studies within the A&PIA population have pointed to acculturation as a significant variable to explain their health and health-seeking behaviors. Acculturation is a key construct in understanding the health of the A&PIA population. The purpose of this concept analysis is to provide a current conceptual understanding of the relationship between acculturation and health, especially within the A&PIA populations, which will serve as a pragmatic guideline for nursing practice and research. Understanding the contemporary issues surrounding the conceptual application of acculturation will aid in the development of appropriate programs to reduce health inequities. Acculturation was explored using the Morse method of concept analysis. An iterative historical and contemporary literature review across the disciplines of anthropology, sociology, psychology, medicine, and nursing was completed. Analytical questions asked of the resultant data provided the theoretical definition, antecedents, key attributes, outcomes, and implications. The concept analysis resulted in a new theoretical definition that includes multidimensional concepts of acculturation. Dilemmas in the measurement of key attributes of acculturation include unidirectional and bidirectional analysis, psychometric issues, and the appropriateness of proxy measurements. Outcomes of acculturation on health can be positive or negative and depend on an individual's or group's ability to navigate freely with necessary supports. Results of the conceptual analysis resulted in recommendations for nursing practice and future acculturation research. While debate continues about the appropriate use and definition of acculturation, researchers agree that it is an important construct in understanding the health of migrating individuals and groups. Currently there is no testable framework that delineates the role of acculturation in health. Further research is indicated to clarify the relationship between acculturation and health. © 2011 Wiley Periodicals, Inc.

  13. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  14. Modeling, Simulation and Analysis of Public Key Infrastructure

    NASA Technical Reports Server (NTRS)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  15. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  16. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  17. Structural equation modelling of lower back pain due to whole-body vibration exposure in the construction industry.

    PubMed

    Vitharana, Vitharanage Hashini Paramitha; Chinda, Thanwadee

    2017-09-21

    Whole-body vibration (WBV) exposure is a health hazard among workers, causing lower back pain (LBP) in the construction industry. This study examines key factors affecting LBP due to WBV exposure using exploratory factor analysis and structural equation modelling. The results confirm five key factors (equipment, job related, organizational, personal, social context) with their 17 associated items. The organizational factor is found the most important, as it influences the other four factors. The results also show that appropriate seat type, specific training programme, job rotation, workers' satisfaction and workers' physical condition are crucial in reducing LBP due to WBV exposure. Moreover, provision of new machines without proper training and good working condition might not help reduce LBP due to WBV exposure. The results help the construction companies to better understand key factors affecting LBP due to WBV exposure, and to plan for a better health improvement programme.

  18. The School Counselor Leadership Survey: Instrument Development and Exploratory Factor Analysis

    ERIC Educational Resources Information Center

    Young, Anita; Bryan, Julia

    2015-01-01

    This study examined the factor structure of the School Counselor Leadership Survey (SCLS). Survey development was a threefold process that resulted in a 39-item survey of 801 school counselors and school counselor supervisors. The exploratory factor analysis indicated a five-factor structure that revealed five key dimensions of school counselor…

  19. Model Uncertainty and Robustness: A Computational Framework for Multimodel Analysis

    ERIC Educational Resources Information Center

    Young, Cristobal; Holsteen, Katherine

    2017-01-01

    Model uncertainty is pervasive in social science. A key question is how robust empirical results are to sensible changes in model specification. We present a new approach and applied statistical software for computational multimodel analysis. Our approach proceeds in two steps: First, we estimate the modeling distribution of estimates across all…

  20. A Critical Analysis of Eight Informal Reading Inventories

    ERIC Educational Resources Information Center

    Nilsson, Nina L.

    2008-01-01

    For this content analysis study, the author examined and cross-compared the various ways in which eight informal reading inventories (IRIs) published from 2004 to 2008 address key issues relevant to new U.S. federal guidelines and the National Reading Panel's five critical components of reading instruction. Results suggest the IRIs range in…

  1. Trends in Distance Education: A Content Analysis of Master's Thesis

    ERIC Educational Resources Information Center

    Durak, Gürhan; Çankaya, Serkan; Yunkul, Eyup; Urfa, Mehmet; Toprakliklioglu, Kivanç; Arda, Yagmur; Inam, Nazmiye

    2017-01-01

    The present study aimed at presenting the results of content analysis on Master's Theses carried out in the field of distance education at higher education level in Turkey between 1986 and 2015. A total of 285 Master's Theses were examined to determine the key words, academic disciplines, research areas, theoretical frameworks, research designs…

  2. Practical Quantum Cryptography for Secure Free-Space Communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less

  3. FREE-SPACE QUANTUM CRYPTOGRAPHY IN DAYLIGHT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.

    2000-01-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less

  4. A new perspective on global mean sea level (GMSL) acceleration

    NASA Astrophysics Data System (ADS)

    Watson, Phil J.

    2016-06-01

    The vast body of contemporary climate change science is largely underpinned by the premise of a measured acceleration from anthropogenic forcings evident in key climate change proxies -- greenhouse gas emissions, temperature, and mean sea level. By virtue, over recent years, the issue of whether or not there is a measurable acceleration in global mean sea level has resulted in fierce, widespread professional, social, and political debate. Attempts to measure acceleration in global mean sea level (GMSL) have often used comparatively crude analysis techniques providing little temporal instruction on these key questions. This work proposes improved techniques to measure real-time velocity and acceleration based on five GMSL reconstructions spanning the time frame from 1807 to 2014 with substantially improved temporal resolution. While this analysis highlights key differences between the respective reconstructions, there is now more robust, convincing evidence of recent acceleration in the trend of GMSL.

  5. Parameterization of aquatic ecosystem functioning and its natural variation: Hierarchical Bayesian modelling of plankton food web dynamics

    NASA Astrophysics Data System (ADS)

    Norros, Veera; Laine, Marko; Lignell, Risto; Thingstad, Frede

    2017-10-01

    Methods for extracting empirically and theoretically sound parameter values are urgently needed in aquatic ecosystem modelling to describe key flows and their variation in the system. Here, we compare three Bayesian formulations for mechanistic model parameterization that differ in their assumptions about the variation in parameter values between various datasets: 1) global analysis - no variation, 2) separate analysis - independent variation and 3) hierarchical analysis - variation arising from a shared distribution defined by hyperparameters. We tested these methods, using computer-generated and empirical data, coupled with simplified and reasonably realistic plankton food web models, respectively. While all methods were adequate, the simulated example demonstrated that a well-designed hierarchical analysis can result in the most accurate and precise parameter estimates and predictions, due to its ability to combine information across datasets. However, our results also highlighted sensitivity to hyperparameter prior distributions as an important caveat of hierarchical analysis. In the more complex empirical example, hierarchical analysis was able to combine precise identification of parameter values with reasonably good predictive performance, although the ranking of the methods was less straightforward. We conclude that hierarchical Bayesian analysis is a promising tool for identifying key ecosystem-functioning parameters and their variation from empirical datasets.

  6. USSR and Eastern Europe Scientific Abstracts Biomedical and Behavioral Sciences No. 72

    DTIC Science & Technology

    1977-06-03

    of the hydrolyzate of coniferous wood contaminate the obtained furfural. The results of analysis of the water-insoluble portion of the terpene...psychology, psychiatry and related fields. 17. Key Words and Document Analysis . 17a. Descriptors USSR Aerospace Medicine Agrotechnology Biology...and Scientific Technics, Department of Cybernetic Systems] [Abstract] Mathematical methods are necessary for a logical summarization and analysis of

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hoogmartens, Rob, E-mail: rob.hoogmartens@uhasselt.be; Van Passel, Steven, E-mail: steven.vanpassel@uhasselt.be; Van Acker, Karel, E-mail: karel.vanacker@lrd.kuleuven.be

    Increasing interest in sustainability has led to the development of sustainability assessment tools such as Life Cycle Analysis (LCA), Life Cycle Costing (LCC) and Cost–Benefit Analysis (CBA). Due to methodological disparity of these three tools, conflicting assessment results generate confusion for many policy and business decisions. In order to interpret and integrate assessment results, the paper provides a framework that clarifies the connections and coherence between the included assessment methodologies. Building on this framework, the paper further focuses on key aspects to adapt any of the methodologies to full sustainability assessments. Aspects dealt with in the review are for examplemore » the reported metrics, the scope, data requirements, discounting, product- or project-related and approaches with respect to scarcity and labor requirements. In addition to these key aspects, the review shows that important connections exist: (i) the three tools can cope with social inequality, (ii) processes such as valuation techniques for LCC and CBA are common, (iii) Environmental Impact Assessment (EIA) is used as input in both LCA and CBA and (iv) LCA can be used in parallel with LCC. Furthermore, the most integrated sustainability approach combines elements of LCA and LCC to achieve the Life Cycle Sustainability Assessment (LCSA). The key aspects and the connections referred to in the review are illustrated with a case study on the treatment of end-of-life automotive glass. - Highlights: • Proliferation of assessment tools creates ambiguity and confusion. • The developed assessment framework clarifies connections between assessment tools. • Broadening LCA, key aspects are metric and data requirements. • Broadening LCC, key aspects are scope, time frame and discounting. • Broadening CBA, focus point, timespan, references, labor and scarcity are key.« less

  8. Identification of key micro-organisms involved in Douchi fermentation by statistical analysis and their use in an experimental fermentation.

    PubMed

    Chen, C; Xiang, J Y; Hu, W; Xie, Y B; Wang, T J; Cui, J W; Xu, Y; Liu, Z; Xiang, H; Xie, Q

    2015-11-01

    To screen and identify safe micro-organisms used during Douchi fermentation, and verify the feasibility of producing high-quality Douchi using these identified micro-organisms. PCR-denaturing gradient gel electrophoresis (DGGE) and automatic amino-acid analyser were used to investigate the microbial diversity and free amino acids (FAAs) content of 10 commercial Douchi samples. The correlations between microbial communities and FAAs were analysed by statistical analysis. Ten strains with significant positive correlation were identified. Then an experiment on Douchi fermentation by identified strains was carried out, and the nutritional composition in Douchi was analysed. Results showed that FAAs and relative content of isoflavone aglycones in verification Douchi samples were generally higher than those in commercial Douchi samples. Our study indicated that fungi, yeasts, Bacillus and lactic acid bacteria were the key players in Douchi fermentation, and with identified probiotic micro-organisms participating in fermentation, a higher quality Douchi product was produced. This is the first report to analyse and confirm the key micro-organisms during Douchi fermentation by statistical analysis. This work proves fermentation micro-organisms to be the key influencing factor of Douchi quality, and demonstrates the feasibility of fermenting Douchi using identified starter micro-organisms. © 2015 The Society for Applied Microbiology.

  9. Holo-analysis.

    PubMed

    Rosen, G D

    2006-06-01

    Meta-analysis is a vague descriptor used to encompass very diverse methods of data collection analysis, ranging from simple averages to more complex statistical methods. Holo-analysis is a fully comprehensive statistical analysis of all available data and all available variables in a specified topic, with results expressed in a holistic factual empirical model. The objectives and applications of holo-analysis include software production for prediction of responses with confidence limits, translation of research conditions to praxis (field) circumstances, exposure of key missing variables, discovery of theoretically unpredictable variables and interactions, and planning future research. Holo-analyses are cited as examples of the effects on broiler feed intake and live weight gain of exogenous phytases, which account for 70% of variation in responses in terms of 20 highly significant chronological, dietary, environmental, genetic, managemental, and nutrient variables. Even better future accountancy of variation will be facilitated if and when authors of papers routinely provide key data for currently neglected variables, such as temperatures, complete feed formulations, and mortalities.

  10. Success Factors of European Syndromic Surveillance Systems: A Worked Example of Applying Qualitative Comparative Analysis

    PubMed Central

    Ziemann, Alexandra; Fouillet, Anne; Brand, Helmut; Krafft, Thomas

    2016-01-01

    Introduction Syndromic surveillance aims at augmenting traditional public health surveillance with timely information. To gain a head start, it mainly analyses existing data such as from web searches or patient records. Despite the setup of many syndromic surveillance systems, there is still much doubt about the benefit of the approach. There are diverse interactions between performance indicators such as timeliness and various system characteristics. This makes the performance assessment of syndromic surveillance systems a complex endeavour. We assessed if the comparison of several syndromic surveillance systems through Qualitative Comparative Analysis helps to evaluate performance and identify key success factors. Materials and Methods We compiled case-based, mixed data on performance and characteristics of 19 syndromic surveillance systems in Europe from scientific and grey literature and from site visits. We identified success factors by applying crisp-set Qualitative Comparative Analysis. We focused on two main areas of syndromic surveillance application: seasonal influenza surveillance and situational awareness during different types of potentially health threatening events. Results We found that syndromic surveillance systems might detect the onset or peak of seasonal influenza earlier if they analyse non-clinical data sources. Timely situational awareness during different types of events is supported by an automated syndromic surveillance system capable of analysing multiple syndromes. To our surprise, the analysis of multiple data sources was no key success factor for situational awareness. Conclusions We suggest to consider these key success factors when designing or further developing syndromic surveillance systems. Qualitative Comparative Analysis helped interpreting complex, mixed data on small-N cases and resulted in concrete and practically relevant findings. PMID:27182731

  11. How to Make Nothing Out of Something: Analyses of the Impact of Study Sampling and Statistical Interpretation in Misleading Meta-Analytic Conclusions

    PubMed Central

    Cunningham, Michael R.; Baumeister, Roy F.

    2016-01-01

    The limited resource model states that self-control is governed by a relatively finite set of inner resources on which people draw when exerting willpower. Once self-control resources have been used up or depleted, they are less available for other self-control tasks, leading to a decrement in subsequent self-control success. The depletion effect has been studied for over 20 years, tested or extended in more than 600 studies, and supported in an independent meta-analysis (Hagger et al., 2010). Meta-analyses are supposed to reduce bias in literature reviews. Carter et al.’s (2015) meta-analysis, by contrast, included a series of questionable decisions involving sampling, methods, and data analysis. We provide quantitative analyses of key sampling issues: exclusion of many of the best depletion studies based on idiosyncratic criteria and the emphasis on mini meta-analyses with low statistical power as opposed to the overall depletion effect. We discuss two key methodological issues: failure to code for research quality, and the quantitative impact of weak studies by novice researchers. We discuss two key data analysis issues: questionable interpretation of the results of trim and fill and Funnel Plot Asymmetry test procedures, and the use and misinterpretation of the untested Precision Effect Test and Precision Effect Estimate with Standard Error (PEESE) procedures. Despite these serious problems, the Carter et al. (2015) meta-analysis results actually indicate that there is a real depletion effect – contrary to their title. PMID:27826272

  12. Meta‐analysis using individual participant data: one‐stage and two‐stage approaches, and why they may differ

    PubMed Central

    Ensor, Joie; Riley, Richard D.

    2016-01-01

    Meta‐analysis using individual participant data (IPD) obtains and synthesises the raw, participant‐level data from a set of relevant studies. The IPD approach is becoming an increasingly popular tool as an alternative to traditional aggregate data meta‐analysis, especially as it avoids reliance on published results and provides an opportunity to investigate individual‐level interactions, such as treatment‐effect modifiers. There are two statistical approaches for conducting an IPD meta‐analysis: one‐stage and two‐stage. The one‐stage approach analyses the IPD from all studies simultaneously, for example, in a hierarchical regression model with random effects. The two‐stage approach derives aggregate data (such as effect estimates) in each study separately and then combines these in a traditional meta‐analysis model. There have been numerous comparisons of the one‐stage and two‐stage approaches via theoretical consideration, simulation and empirical examples, yet there remains confusion regarding when each approach should be adopted, and indeed why they may differ. In this tutorial paper, we outline the key statistical methods for one‐stage and two‐stage IPD meta‐analyses, and provide 10 key reasons why they may produce different summary results. We explain that most differences arise because of different modelling assumptions, rather than the choice of one‐stage or two‐stage itself. We illustrate the concepts with recently published IPD meta‐analyses, summarise key statistical software and provide recommendations for future IPD meta‐analyses. © 2016 The Authors. Statistics in Medicine published by John Wiley & Sons Ltd. PMID:27747915

  13. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  14. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  15. Ball Bearing Analysis with the ORBIS Tool

    NASA Technical Reports Server (NTRS)

    Halpin, Jacob D.

    2016-01-01

    Ball bearing design is critical to the success of aerospace mechanisms. Key bearing performance parameters, such as load capability, stiffness, torque, and life all depend on accurate determination of the internal load distribution. Hence, a good analytical bearing tool that provides both comprehensive capabilities and reliable results becomes a significant asset to the engineer. This paper introduces the ORBIS bearing tool. A discussion of key modeling assumptions and a technical overview is provided. Numerous validation studies and case studies using the ORBIS tool are presented. All results suggest the ORBIS code closely correlates to predictions on bearing internal load distributions, stiffness, deflection and stresses.

  16. Focus groups to explore healthcare professionals' experiences of care coordination: towards a theoretical framework for the study of care coordination.

    PubMed

    Van Houdt, Sabine; Sermeus, Walter; Vanhaecht, Kris; De Lepeleire, Jan

    2014-12-24

    Strategies to improve care coordination between primary and hospital care do not always have the desired results. This is partly due to incomplete understanding of the key concepts of care coordination. An in-depth analysis of existing theoretical frameworks for the study of care coordination identified 14 interrelated key concepts. In another study, these 14 key concepts were further explored in patients' experiences. Additionally, "patient characteristics" was identified as a new key concept in patients' experiences and the previously identified key concept "quality of relationship" between healthcare professionals was extended to "quality of relationship" with the patient. Together, these 15 interrelated key concepts resulted in a new theoretical framework. The present study aimed at improving our understanding of the 15 previously identified key concepts and to explore potentially previous unidentified key concepts and the links between these by exploring how healthcare professionals experience care coordination. A qualitative design was used. Six focus groups were conducted including primary healthcare professionals involved in the care of patients who had breast cancer surgery at three hospitals in Belgium. Data were analyzed using constant comparative analysis. All 15 previously identified key concepts of care coordination were further explored in healthcare professionals' experiences. Links between these 15 concepts were identified, including 9 newly identified links. The concept "external factors" was linked with all 6 concepts relating to (inter)organizational mechanisms; "task characteristics", "structure", "knowledge and information technology", "administrative operational processes", "cultural factors" and "need for coordination". Five of these concepts related to 3 concepts of relational coordination; "roles", "quality of relationship" and "exchange of information". The concept of "task characteristics" was only linked with "roles" and "exchange of information". The concept "patient characteristics" related with the concepts "need for coordination" and "patient outcome". Outcome was influenced by "roles", "quality of relationship" and "exchange of information". External factors and the (inter)organizational mechanism should enhance "roles" and "quality of relationship" between healthcare professionals and with the patient as well as "exchange of information", and setting and sharing of common "goals" to improve care coordination and quality of care.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hovel, Harold; Prettyman, Kevin

    A side-by-side analysis was done on then currently available technology, along with roadmaps to push each particular option forward. Variations in turnkey line processes can and do result in finished solar device performance. Together with variations in starting material quality, the result is a distribution of effciencies. Forensic analysis and characterization of each crystalline Si based technology will determine the most promising approach with respect to cost, efficiency and reliability. Forensic analysis will also shed light on the causes of binning variations. Si solar cells were forensically analyzed from each turn key supplier using a host of techniques

  18. Considerations for the design, analysis and presentation of in vivo studies.

    PubMed

    Ranstam, J; Cook, J A

    2017-03-01

    To describe, explain and give practical suggestions regarding important principles and key methodological challenges in the study design, statistical analysis, and reporting of results from in vivo studies. Pre-specifying endpoints and analysis, recognizing the common underlying assumption of statistically independent observations, performing sample size calculations, and addressing multiplicity issues are important parts of an in vivo study. A clear reporting of results and informative graphical presentations of data are other important parts. Copyright © 2016 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.

  19. Operating Reserves and Wind Power Integration: An International Comparison; Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Milligan, M.; Donohoo, P.; Lew, D.

    2010-10-01

    This paper provides a high-level international comparison of methods and key results from both operating practice and integration analysis, based on an informal International Energy Agency Task 25: Large-scale Wind Integration.

  20. Relationships between authorship contributions and authors' industry financial ties among oncology clinical trials.

    PubMed

    Rose, Susannah L; Krzyzanowska, Monika K; Joffe, Steven

    2010-03-10

    PURPOSE To test the hypothesis that authors who play key scientific roles in oncology clinical trials, and who therefore have increased influence over the design, analysis, interpretation or reporting of trials, are more likely than those who do not play such roles to have financial ties to industry. METHODS Data were abstracted from all trials (n = 235) of drugs or biologic agents published in the Journal of Clinical Oncology between January 1, 2006 and June 30, 2007. Article-level data included sponsorship, age group (adult v pediatric), phase, single versus multicenter, country (United States v other), and number of authors. Author-level data (n = 2,927) included financial ties (eg, employment, consulting) and performance of key scientific roles (ie, conception/design, analysis/interpretation, or manuscript writing). Associations between performance of key roles and financial ties, adjusting for article-level covariates, were examined using generalized linear mixed models. Results One thousand eight hundred eighty-one authors (64%) reported performing at least one key role, and 842 authors (29%) reported at least one financial tie. Authors who reported performing a key role were more likely than other authors to report financial ties to industry (adjusted odds ratio [OR], 4.3; 99% CI, 3.0 to 6.0; P < .0001). The association was stronger among trials with, compared with those without, industry funding (OR, 5.0 [99% CI, 3.4 to 7.5] v OR, 2.5 [99% CI, 1.3 to 4.8]), but was present regardless of sponsorship. CONCLUSION Authors who perform key roles in the conception and design, analysis, and interpretation, or reporting of oncology clinical trials are more likely than authors who do not perform such roles to have financial ties to industry.

  1. Relationships Between Authorship Contributions and Authors' Industry Financial Ties Among Oncology Clinical Trials

    PubMed Central

    Rose, Susannah L.; Krzyzanowska, Monika K.; Joffe, Steven

    2010-01-01

    Purpose To test the hypothesis that authors who play key scientific roles in oncology clinical trials, and who therefore have increased influence over the design, analysis, interpretation or reporting of trials, are more likely than those who do not play such roles to have financial ties to industry. Methods Data were abstracted from all trials (n = 235) of drugs or biologic agents published in the Journal of Clinical Oncology between January 1, 2006 and June 30, 2007. Article-level data included sponsorship, age group (adult v pediatric), phase, single versus multicenter, country (United States v other), and number of authors. Author-level data (n = 2,927) included financial ties (eg, employment, consulting) and performance of key scientific roles (ie, conception/design, analysis/interpretation, or manuscript writing). Associations between performance of key roles and financial ties, adjusting for article-level covariates, were examined using generalized linear mixed models. Results One thousand eight hundred eighty-one authors (64%) reported performing at least one key role, and 842 authors (29%) reported at least one financial tie. Authors who reported performing a key role were more likely than other authors to report financial ties to industry (adjusted odds ratio [OR], 4.3; 99% CI, 3.0 to 6.0; P < .0001). The association was stronger among trials with, compared with those without, industry funding (OR, 5.0 [99% CI, 3.4 to 7.5] v OR, 2.5 [99% CI, 1.3 to 4.8]), but was present regardless of sponsorship. Conclusion Authors who perform key roles in the conception and design, analysis, and interpretation, or reporting of oncology clinical trials are more likely than authors who do not perform such roles to have financial ties to industry. PMID:20065190

  2. Data Transmission Signal Design and Analysis

    NASA Technical Reports Server (NTRS)

    Moore, J. D.

    1972-01-01

    The error performances of several digital signaling methods are determined as a function of a specified signal-to-noise ratio. Results are obtained for Gaussian noise and impulse noise. Performance of a receiver for differentially encoded biphase signaling is obtained by extending the results of differential phase shift keying. The analysis presented obtains a closed-form answer through the use of some simplifying assumptions. The results give an insight into the analysis problem, however, the actual error performance may show a degradation because of the assumptions made in the analysis. Bipolar signaling decision-threshold selection is investigated. The optimum threshold depends on the signal-to-noise ratio and requires the use of an adaptive receiver.

  3. Novel presentational approaches were developed for reporting network meta-analysis.

    PubMed

    Tan, Sze Huey; Cooper, Nicola J; Bujkiewicz, Sylwia; Welton, Nicky J; Caldwell, Deborah M; Sutton, Alexander J

    2014-06-01

    To present graphical tools for reporting network meta-analysis (NMA) results aiming to increase the accessibility, transparency, interpretability, and acceptability of NMA analyses. The key components of NMA results were identified based on recommendations by agencies such as the National Institute for Health and Care Excellence (United Kingdom). Three novel graphs were designed to amalgamate the identified components using familiar graphical tools such as the bar, line, or pie charts and adhering to good graphical design principles. Three key components for presentation of NMA results were identified, namely relative effects and their uncertainty, probability of an intervention being best, and between-study heterogeneity. Two of the three graphs developed present results (for each pairwise comparison of interventions in the network) obtained from both NMA and standard pairwise meta-analysis for easy comparison. They also include options to display the probability best, ranking statistics, heterogeneity, and prediction intervals. The third graph presents rankings of interventions in terms of their effectiveness to enable clinicians to easily identify "top-ranking" interventions. The graphical tools presented can display results tailored to the research question of interest, and targeted at a whole spectrum of users from the technical analyst to the nontechnical clinician. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Soft Power as a Policy Rationale for International Education in the UK: A Critical Analysis

    ERIC Educational Resources Information Center

    Lomer, Sylvie

    2017-01-01

    This article presents the results of a textual analysis conducted on policy discourses on international students in the UK between 1999 and 2013. A number of rationales for and against increasing their numbers have been made, which have largely remained consistent over changing political administrations. One key rationale is that international…

  5. Determinants of Educational Achievement in Morocco: A Micro-Econometric Analysis Applied to the TIMSS Study

    ERIC Educational Resources Information Center

    Ibourk, Aomar

    2013-01-01

    Based on data from international surveys measuring learning (TIMSS), this article focuses on the analysis of the academic performance Moroccan students. The results of the econometric model show that the students' characteristics, their family environment and school context are key determinants of these performances. The study also shows that the…

  6. Decision modeling for fire incident analysis

    Treesearch

    Donald G. MacGregor; Armando González-Cabán

    2009-01-01

    This paper reports on methods for representing and modeling fire incidents based on concepts and models from the decision and risk sciences. A set of modeling techniques are used to characterize key fire management decision processes and provide a basis for incident analysis. The results of these methods can be used to provide insights into the structure of fire...

  7. OAO battery data analysis

    NASA Technical Reports Server (NTRS)

    Gaston, S.; Wertheim, M.; Orourke, J. A.

    1973-01-01

    Summary, consolidation and analysis of specifications, manufacturing process and test controls, and performance results for OAO-2 and OAO-3 lot 20 Amp-Hr sealed nickel cadmium cells and batteries are reported. Correlation of improvements in control requirements with performance is a key feature. Updates for a cell/battery computer model to improve performance prediction capability are included. Applicability of regression analysis computer techniques to relate process controls to performance is checked.

  8. Design of an image encryption scheme based on a multiple chaotic map

    NASA Astrophysics Data System (ADS)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  9. Multi-party quantum key agreement with five-qubit brown states

    NASA Astrophysics Data System (ADS)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  10. Gene-to-metabolite network for biosynthesis of lignans in MeJA-elicited Isatis indigotica hairy root cultures

    PubMed Central

    Chen, Ruibing; Li, Qing; Tan, Hexin; Chen, Junfeng; Xiao, Ying; Ma, Ruifang; Gao, Shouhong; Zerbe, Philipp; Chen, Wansheng; Zhang, Lei

    2015-01-01

    Root and leaf tissue of Isatis indigotica shows notable anti-viral efficacy, and are widely used as “Banlangen” and “Daqingye” in traditional Chinese medicine. The plants' pharmacological activity is attributed to phenylpropanoids, especially a group of lignan metabolites. However, the biosynthesis of lignans in I. indigotica remains opaque. This study describes the discovery and analysis of biosynthetic genes and AP2/ERF-type transcription factors involved in lignan biosynthesis in I. indigotica. MeJA treatment revealed differential expression of three genes involved in phenylpropanoid backbone biosynthesis (IiPAL, IiC4H, Ii4CL), five genes involved in lignan biosynthesis (IiCAD, IiC3H, IiCCR, IiDIR, and IiPLR), and 112 putative AP2/ERF transcription factors. In addition, four intermediates of lariciresinol biosynthesis were found to be induced. Based on these results, a canonical correlation analysis using Pearson's correlation coefficient was performed to construct gene-to-metabolite networks and identify putative key genes and rate-limiting reactions in lignan biosynthesis. Over-expression of IiC3H, identified as a key pathway gene, was used for metabolic engineering of I. indigotica hairy roots, and resulted in an increase in lariciresinol production. These findings illustrate the utility of canonical correlation analysis for the discovery and metabolic engineering of key metabolic genes in plants. PMID:26579184

  11. Locks -- A Key to Violence?

    ERIC Educational Resources Information Center

    Raloff, Janet

    1983-01-01

    New research suggests that personalities prone to extreme violence can be predicted by analysis of chemical elements found in human hair. Methodology employed and results obtained are highlighted and discussed. Relationships between diet and human behavior are also discussed. (JN)

  12. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review

    PubMed Central

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-01-01

    Objective The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Design Thematic analysis review of CM studies. Methods We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004–December 2015 period, then updated to July 2017, with the keywords ‘CM’ and ‘frequent use’. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir’s implementation of health innovations framework was used to organise results into four broad levels of factors: (1) environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Results Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. Conclusions CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. PMID:29061623

  13. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rosa, Josianne Claudia Sales, E-mail: jcsrosa@usp.br; Sánchez, Luis E., E-mail: lsanchez@usp.br

    Considering ecosystem services (ES) could foster innovation and improve environmental and social impact assessment (ESIA) practice, but is the potential being fulfilled? In order to investigate how ES have been treated in recent international practice, three questions are asked: (i) were the tasks of an ES analysis carried out? (ii) how is such analysis integrated with other analysis presented in the ESIA? (iii) does ES analysis result in additional or improved mitigation or enhancement measures? These research questions were unfolded into 15 auxiliary questions for reviewing five ESIA reports prepared for mining, hydroelectric and transportation infrastructure projects in Africa, Asiamore » and South America. All cases incorporated ES into ESIA to meet a requirement of the International Finance Corporation's Performance Standards on Environmental and Social Sustainability. It was found that: (i) in only three cases most tasks recommended by current guidance were adopted (ii) all reports feature a dedicated ES chapter or section, but in three of them no evidence was found that the ES analysis was integrated within impact assessment (iii) in the two ESIAs that followed guidance, ES analysis resulted in specific mitigation measures. Few evidence was found that the ES concept is improving current ESIA practice. Key challenges are: (i) integrating ES analysis in such a way that it does not duplicate other analysis; (ii) adequately characterizing the beneficiaries of ES; and (iii) quantifying ES supply for impact prediction. - Highlights: • Incorporating ecosystem services analysis in impact assessment can improve results. • Additional impacts and mitigation were identified. • Challenges include developing appropriate indicators for impact prediction. • A key challenge is integrating the concept in such a way that it does not duplicate other analysis.« less

  15. Identifying Key Hospital Service Quality Factors in Online Health Communities

    PubMed Central

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain

    2015-01-01

    Background The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. Objective As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. Methods We defined social media–based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea’s two biggest online portals were used to test the effectiveness of detection of social media–based key quality factors for hospitals. Results To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and classification performance still has room for improvement, but the extraction results are applicable to more detailed analysis. Further analysis of the extracted information reveals that there are differences in the details of social media–based key quality factors for hospitals according to the regions in Korea, and the patterns of change seem to accurately reflect social events (eg, influenza epidemics). Conclusions These findings could be used to provide timely information to caregivers, hospital officials, and medical officials for health care policies. PMID:25855612

  16. Historic range of variability for upland vegetation in the Medicine Bow National Forest, Wyoming

    Treesearch

    Gregory K. Dillon; Dennis H. Knight; Carolyn B. Meyer

    2005-01-01

    An approach for synthesizing the results of ecological research pertinent to land management is the analysis of the historic range of variability (HRV) for key ecosystem variables that are affected by management activities. This report provides an HRV analysis for the upland vegetation of the Medicine Bow National Forest in southeastern Wyoming. The variables include...

  17. Historic range of variability for upland vegetation in the Bighorn National Forest, Wyoming

    Treesearch

    Carolyn B. Meyer; Dennis H. Knight; Gregory K. Dillon

    2005-01-01

    An approach for synthesizing the results of ecological research pertinent to land management is the analysis of the historic range of variability (HRV) for key ecosystem variables that are affected by management activities. This report provides an HRV analysis for the upland vegetation of the Bighorn National Forest in northcentral Wyoming. The variables include live...

  18. The "Trojan Horse" Affair and Radicalisation: An Analysis of Ofsted Reports

    ERIC Educational Resources Information Center

    Mogra, Imran

    2016-01-01

    This article provides an analysis of the frequency with which the word radicalisation appears in 21 Ofsted reports published as a result of inspections carried out in some Birmingham schools following the "Trojan Horse" affair. The technique of key-words-in-context was employed to study the range of its uses in the corpus of the reports.…

  19. The Crust of Mercury After the MESSENGER Gravity Investigation

    NASA Astrophysics Data System (ADS)

    Mazarico, E.; Genova, A.; Goossens, S.; Neumann, G. A.; Smith, D. E.; Zuber, M. T.

    2018-05-01

    We present the results of an improved analysis of the entire MESSENGER radio tracking dataset to derive key geophysical parameters of Mercury such as its gravity field. In particular, we derive and interpret a new crustal thickness model.

  20. LED traffic signal replacement schedules : facilitating smooth freight flows.

    DOT National Transportation Integrated Search

    2011-11-01

    This research details a field study of LED traffic signals in Missouri and develops a replacement schedule based on key findings. : Rates of degradation were statistically analyzed using Analysis of Variance (ANOVA). Results of this research will pro...

  1. Transportation Service Center Analysis Using GIS Technology

    DOT National Transportation Integrated Search

    1997-01-01

    The Transportation Service Center (TSC) concept originated as a result of the department's evaluation of its key business processes and its commitment to improve the quality of the goods and services it provides. TSCs are local Michigan Department of...

  2. ITS Architecture Wants And Needs Analysis

    DOT National Transportation Integrated Search

    1996-05-24

    THE PURPOSE OF THIS DOCUMENT IS TO SERVE AS A GUIDE IN THE PLANNING AND DEVELOPMENT OF INTELLIGENT TRANSPORTATION SYSTEMS (ITS) WITHIN THE STATE OF MINNESOTA. IT IDENTIFIES KEY ITS OPPORTUNITY AREAS BASED ON THE RESULTS OF STATEWIDE MARKET RESEARCH, ...

  3. Implementation of Point-of-Care Diagnostics in Rural Primary Healthcare Clinics in South Africa: Perspectives of Key Stakeholders

    PubMed Central

    Mashamba-Thompson, Tivani P.; Jama, Ngcwalisa A.; Sartorius, Benn; Drain, Paul K.; Thompson, Rowan M.

    2017-01-01

    Introduction: Key stakeholders’ involvement is crucial to the sustainability of quality point-of-care (POC) diagnostics services in low-and-middle income countries. The aim of this study was to explore key stakeholder perceptions on the implementation of POC diagnostics in rural primary healthcare (PHC) clinics in South Africa. Method: We conducted a qualitative study encompassing in-depth interviews with multiple key stakeholders of POC diagnostic services for rural and resource-limited PHC clinics. Interviews were digitally recorded and transcribed verbatim prior to thematic content analysis. Thematic content analysis was conducted using themes guided by the World Health Organisation (WHO) quality-ASSURED (Affordable, Sensitive, Specific, User friendly, Rapid and to enable treatment at first visit and Robust, Equipment free and Delivered to those who need it) criteria for POC diagnostic services in resource-limited settings. Results: 11 key stakeholders participated in the study. All stakeholders perceived the main advantage of POC diagnostics as enabling access to healthcare for rural patients. Stakeholders perceived the current POC diagnostic services to have an ability to meet patients’ needs, but recommended further improvement of the following areas: research on cost-effectiveness; improved quality management systems; development of affordable POC diagnostic and clinic-based monitoring and evaluation. Conclusions: Key stakeholders of POC diagnostics in rural PHC clinics in South Africa highlighted the need to assess affordability and ensure quality assurance of current services before adopting new POC diagnostics and scaling up current POC diagnostics. PMID:28075337

  4. Strategic Planning to Conduct Joint Force Network Operations: A Content Analysis of NETOPS Organizations Strategic Plans

    DTIC Science & Technology

    2007-03-01

    information dominance , Joint Network Operations (NETOPS) organizations need to be strategically aligned. As result, to enhance the capabilities-based effects of NETOPS and reduce our NETOP infrastructures susceptibility to compromise. Once the key organizations were identified, their strategic plans were analyzed using a structured content analysis framework. The results illustrated that the strategic plans were aligned with the community of interests tasking to conduct NETOPS. Further research is required into the strategic alignment beyond the strategic

  5. Oscillator Noise Analysis

    NASA Astrophysics Data System (ADS)

    Demir, Alper

    2005-08-01

    Oscillators are key components of many kinds of systems, particularly electronic and opto-electronic systems. Undesired perturbations, i.e. noise, that exist in practical systems adversely affect the spectral and timing properties of the signals generated by oscillators resulting in phase noise and timing jitter. These are key performance limiting factors, being major contributors to bit-error-rate (BER) of RF and optical communication systems, and creating synchronization problems in clocked and sampled-data electronic systems. In noise analysis for oscillators, the key is figuring out how the various disturbances and noise sources in the oscillator end up as phase fluctuations. In doing so, one first computes transfer functions from the noise sources to the oscillator phase, or the sensitivity of the oscillator phase to these noise sources. In this paper, we first provide a discussion explaining the origins and the proper definition of this transfer or sensitivity function, followed by a critical review of the various numerical techniques for its computation that have been proposed by various authors over the past fifteen years.

  6. Identification of the key odorants in Tahitian cured vanilla beans (Vanilla tahitensis) by GC-MS and an aroma extract dilution analysis.

    PubMed

    Takahashi, Makoto; Inai, Yoko; Miyazawa, Norio; Kurobayashi, Yoshiko; Fujita, Akira

    2013-01-01

    The key odorants of Tahitian vanilla beans (Vanilla tahitensis) were characterized by a sensory evaluation, aroma extract dilution analysis (AEDA), quantification, and aroma reconstitution. Vanillin and anisaldehyde were identified in the same highest flavor dilution (FD) factor as the most characteristic odor-active compounds in Tahitian vanilla beans, followed by anisyl alcohol and anisyl acetate. Vanillin and anisyl alcohol were by far the most abundant odorants present with the highest concentration in the beans, followed by acetic acid, anisaldehyde, and anisyl acetate. A sensory evaluation of Tahitian vanilla beans and its reconstitute aroma concentrate characterized both samples as similar. These results indicated vanillin, anisaldehyde, anisyl alcohol, and anisyl acetate to be the key odorants in Tahitian vanilla beans. 3-Methylnonane-2,4-dione were identified for the first time in vanilla beans. β-Damascenone and phenylacetic acid were identified for the first time in Tahitian vanilla beans.

  7. Laboratory automation —some perspectives on the challenges in the implementation of the technology in pharmaceutical development

    PubMed Central

    North, Nigel; Smith, Simon

    1998-01-01

    The intensifying pressure on reducing the development time for new pharmaceutical products is resulting in an increasing need for laboratory automation. A key element for the successful implementation of robotics for drug product analysis is the establishment of a reliable process for interaction of the automation team with its various customers, for example development product team and manufacturing group. The reduction of cycle time for product development appears to be resulting in more stability studies to support NDA/MAA filings for several reasons. Key clinical information may not be available before initiation of the stability studies and simultaneous world-wide development may result in an increase in the number of product strength and pack options. PMID:18924828

  8. Identifying key hospital service quality factors in online health communities.

    PubMed

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and classification performance still has room for improvement, but the extraction results are applicable to more detailed analysis. Further analysis of the extracted information reveals that there are differences in the details of social media-based key quality factors for hospitals according to the regions in Korea, and the patterns of change seem to accurately reflect social events (eg, influenza epidemics). These findings could be used to provide timely information to caregivers, hospital officials, and medical officials for health care policies.

  9. Identification and annotation of erotic film based on content analysis

    NASA Astrophysics Data System (ADS)

    Wang, Donghui; Zhu, Miaoliang; Yuan, Xin; Qian, Hui

    2005-02-01

    The paper brings forward a new method for identifying and annotating erotic films based on content analysis. First, the film is decomposed to video and audio stream. Then, the video stream is segmented into shots and key frames are extracted from each shot. We filter the shots that include potential erotic content by finding the nude human body in key frames. A Gaussian model in YCbCr color space for detecting skin region is presented. An external polygon that covered the skin regions is used for the approximation of the human body. Last, we give the degree of the nudity by calculating the ratio of skin area to whole body area with weighted parameters. The result of the experiment shows the effectiveness of our method.

  10. Machine Learning: A Crucial Tool for Sensor Design

    PubMed Central

    Zhao, Weixiang; Bhushan, Abhinav; Santamaria, Anthony D.; Simon, Melinda G.; Davis, Cristina E.

    2009-01-01

    Sensors have been widely used for disease diagnosis, environmental quality monitoring, food quality control, industrial process analysis and control, and other related fields. As a key tool for sensor data analysis, machine learning is becoming a core part of novel sensor design. Dividing a complete machine learning process into three steps: data pre-treatment, feature extraction and dimension reduction, and system modeling, this paper provides a review of the methods that are widely used for each step. For each method, the principles and the key issues that affect modeling results are discussed. After reviewing the potential problems in machine learning processes, this paper gives a summary of current algorithms in this field and provides some feasible directions for future studies. PMID:20191110

  11. Feasibility of an International Multiple Sclerosis Rehabilitation Data Repository

    PubMed Central

    Bradford, Elissa Held; Baert, Ilse; Finlayson, Marcia; Feys, Peter

    2018-01-01

    Abstract Background: Multiple sclerosis (MS) rehabilitation evidence is limited due to methodological factors, which may be addressed by a data repository. We describe the perceived challenges of, motivators for, interest in participating in, and key features of an international MS rehabilitation data repository. Methods: A multimethod sequential investigation was performed with the results of two focus groups, using nominal group technique, and study aims informing the development of an online questionnaire. Percentage agreement and key quotations illustrated questionnaire findings. Subgroup comparisons were made between clinicians and researchers and between participants in North America and Europe. Results: Rehabilitation professionals from 25 countries participated (focus groups: n = 21; questionnaire: n = 166). The top ten challenges (C) and motivators (M) identified by the focus groups were database control/management (C); ethical/legal concerns (C); data quality (C); time, effort, and cost (C); best practice (M); uniformity (C); sustainability (C); deeper analysis (M); collaboration (M); and identifying research needs (M). Percentage agreement with questionnaire statements regarding challenges to, motivators for, interest in, and key features of a successful repository was at least 80%, 85%, 72%, and 83%, respectively, across each group of statements. Questionnaire subgroup analysis revealed a few differences (P < .05), including that clinicians more strongly identified with improving best practice as a motivator. Conclusions: Findings support clinician and researcher interest in and potential for success of an international MS rehabilitation data repository if prioritized challenges and motivators are addressed and key features are included. PMID:29507539

  12. Passive decoy-state quantum key distribution with practical light sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Curty, Marcos; Ma, Xiongfeng; Qi, Bing

    2010-02-15

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simplemore » threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.« less

  13. PubFocus: semantic MEDLINE/PubMed citations analytics through integration of controlled biomedical dictionaries and ranking algorithm

    PubMed Central

    Plikus, Maksim V; Zhang, Zina; Chuong, Cheng-Ming

    2006-01-01

    Background Understanding research activity within any given biomedical field is important. Search outputs generated by MEDLINE/PubMed are not well classified and require lengthy manual citation analysis. Automation of citation analytics can be very useful and timesaving for both novices and experts. Results PubFocus web server automates analysis of MEDLINE/PubMed search queries by enriching them with two widely used human factor-based bibliometric indicators of publication quality: journal impact factor and volume of forward references. In addition to providing basic volumetric statistics, PubFocus also prioritizes citations and evaluates authors' impact on the field of search. PubFocus also analyses presence and occurrence of biomedical key terms within citations by utilizing controlled vocabularies. Conclusion We have developed citations' prioritisation algorithm based on journal impact factor, forward referencing volume, referencing dynamics, and author's contribution level. It can be applied either to the primary set of PubMed search results or to the subsets of these results identified through key terms from controlled biomedical vocabularies and ontologies. NCI (National Cancer Institute) thesaurus and MGD (Mouse Genome Database) mammalian gene orthology have been implemented for key terms analytics. PubFocus provides a scalable platform for the integration of multiple available ontology databases. PubFocus analytics can be adapted for input sources of biomedical citations other than PubMed. PMID:17014720

  14. Analysis of complex decisionmaking processes. [with application to jet engine development

    NASA Technical Reports Server (NTRS)

    Hill, J. D.; Ollila, R. G.

    1978-01-01

    The analysis of corporate decisionmaking processes related to major system developments is unusually difficult because of the number of decisionmakers involved in the process and the long development cycle. A method for analyzing such decision processes is developed and illustrated through its application to the analysis of the commercial jet engine development process. The method uses interaction matrices as the key tool for structuring the problem, recording data, and analyzing the data to establish the rank order of the major factors affecting development decisions. In the example, the use of interaction matrices permitted analysts to collect and analyze approximately 50 factors that influenced decisions during the four phases of the development cycle, and to determine the key influencers of decisions at each development phase. The results of this study indicate that the cost of new technology installed on an aircraft is the prime concern of the engine manufacturer.

  15. Initial sequencing and comparative analysis of the mouse genome

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Waterston, Robert H.; Lindblad-Toh, Kerstin; Birney, Ewan

    2002-12-15

    The sequence of the mouse genome is a key informational tool for understanding the contents of the human genome and a key experimental tool for biomedical research. Here, we report the results of an international collaboration to produce a high-quality draft sequence of the mouse genome. We also present an initial comparative analysis of the mouse and human genomes, describing some of the insights that can be gleaned from the two sequences. We discuss topics including the analysis of the evolutionary forces shaping the size, structure and sequence of the genomes; the conservation of large-scale synteny across most of themore » genomes; the much lower extent of sequence orthology covering less than half of the genomes; the proportions of the genomes under selection; the number of protein-coding genes; the expansion of gene families related to reproduction and immunity; the evolution of proteins; and the identification of intraspecies polymorphism.« less

  16. Anomaly Monitoring Method for Key Components of Satellite

    PubMed Central

    Fan, Linjun; Xiao, Weidong; Tang, Jun

    2014-01-01

    This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM), which is made up of state estimation based on Multivariate State Estimation Techniques (MSET) and anomaly detection based on Sequential Probability Ratio Test (SPRT). On the basis of analysis failure of lithium-ion batteries (LIBs), we divided the failure of LIBs into internal failure, external failure, and thermal runaway and selected electrolyte resistance (R e) and the charge transfer resistance (R ct) as the key parameters of state estimation. Then, through the actual in-orbit telemetry data of the key parameters of LIBs, we obtained the actual residual value (R X) and healthy residual value (R L) of LIBs based on the state estimation of MSET, and then, through the residual values (R X and R L) of LIBs, we detected the anomaly states based on the anomaly detection of SPRT. Lastly, we conducted an example of AMM for LIBs, and, according to the results of AMM, we validated the feasibility and effectiveness of AMM by comparing it with the results of threshold detective method (TDM). PMID:24587703

  17. Combined data preprocessing and multivariate statistical analysis characterizes fed-batch culture of mouse hybridoma cells for rational medium design.

    PubMed

    Selvarasu, Suresh; Kim, Do Yun; Karimi, Iftekhar A; Lee, Dong-Yup

    2010-10-01

    We present an integrated framework for characterizing fed-batch cultures of mouse hybridoma cells producing monoclonal antibody (mAb). This framework systematically combines data preprocessing, elemental balancing and statistical analysis technique. Initially, specific rates of cell growth, glucose/amino acid consumptions and mAb/metabolite productions were calculated via curve fitting using logistic equations, with subsequent elemental balancing of the preprocessed data indicating the presence of experimental measurement errors. Multivariate statistical analysis was then employed to understand physiological characteristics of the cellular system. The results from principal component analysis (PCA) revealed three major clusters of amino acids with similar trends in their consumption profiles: (i) arginine, threonine and serine, (ii) glycine, tyrosine, phenylalanine, methionine, histidine and asparagine, and (iii) lysine, valine and isoleucine. Further analysis using partial least square (PLS) regression identified key amino acids which were positively or negatively correlated with the cell growth, mAb production and the generation of lactate and ammonia. Based on these results, the optimal concentrations of key amino acids in the feed medium can be inferred, potentially leading to an increase in cell viability and productivity, as well as a decrease in toxic waste production. The study demonstrated how the current methodological framework using multivariate statistical analysis techniques can serve as a potential tool for deriving rational medium design strategies. Copyright © 2010 Elsevier B.V. All rights reserved.

  18. Dynamical Model of Drug Accumulation in Bacteria: Sensitivity Analysis and Experimentally Testable Predictions

    DOE PAGES

    Vesselinova, Neda; Alexandrov, Boian; Wall, Michael E.

    2016-11-08

    We present a dynamical model of drug accumulation in bacteria. The model captures key features in experimental time courses on ofloxacin accumulation: initial uptake; two-phase response; and long-term acclimation. In combination with experimental data, the model provides estimates of import and export rates in each phase, the time of entry into the second phase, and the decrease of internal drug during acclimation. Global sensitivity analysis, local sensitivity analysis, and Bayesian sensitivity analysis of the model provide information about the robustness of these estimates, and about the relative importance of different parameters in determining the features of the accumulation time coursesmore » in three different bacterial species: Escherichia coli, Staphylococcus aureus, and Pseudomonas aeruginosa. The results lead to experimentally testable predictions of the effects of membrane permeability, drug efflux and trapping (e.g., by DNA binding) on drug accumulation. A key prediction is that a sudden increase in ofloxacin accumulation in both E. coli and S. aureus is accompanied by a decrease in membrane permeability.« less

  19. Dynamical Model of Drug Accumulation in Bacteria: Sensitivity Analysis and Experimentally Testable Predictions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vesselinova, Neda; Alexandrov, Boian; Wall, Michael E.

    We present a dynamical model of drug accumulation in bacteria. The model captures key features in experimental time courses on ofloxacin accumulation: initial uptake; two-phase response; and long-term acclimation. In combination with experimental data, the model provides estimates of import and export rates in each phase, the time of entry into the second phase, and the decrease of internal drug during acclimation. Global sensitivity analysis, local sensitivity analysis, and Bayesian sensitivity analysis of the model provide information about the robustness of these estimates, and about the relative importance of different parameters in determining the features of the accumulation time coursesmore » in three different bacterial species: Escherichia coli, Staphylococcus aureus, and Pseudomonas aeruginosa. The results lead to experimentally testable predictions of the effects of membrane permeability, drug efflux and trapping (e.g., by DNA binding) on drug accumulation. A key prediction is that a sudden increase in ofloxacin accumulation in both E. coli and S. aureus is accompanied by a decrease in membrane permeability.« less

  20. Atmospheric Environment Vulnerability Cause Analysis for the Beijing-Tianjin-Hebei Metropolitan Region

    PubMed Central

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-01-01

    Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management. PMID:29342852

  1. Atmospheric Environment Vulnerability Cause Analysis for the Beijing-Tianjin-Hebei Metropolitan Region.

    PubMed

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-01-13

    Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management.

  2. Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)

    NASA Astrophysics Data System (ADS)

    Škorić, Boris; de Vries, Manon

    Perfect encryption of quantum states using the Quantum One-Time Pad (QOTP) requires two classical key bits per qubit. Almost-perfect encryption, with information-theoretic security, requires only slightly more than 1. We slightly improve lower bounds on the key length. We show that key length n+2log1ɛ suffices to encrypt n qubits in such a way that the cipherstate’s L1-distance from uniformity is upperbounded by ɛ. For a stricter security definition involving the ∞-norm, we prove sufficient key length n+logn+2log1ɛ+1+1nlog1δ+logln21-ɛ, where δ is a small probability of failure. Our proof uses Pauli operators, whereas previous results on the ∞-norm needed Haar measure sampling. We show how to QOTP-encrypt classical plaintext in a nontrivial way: we encode a plaintext bit as the vector ±(1,1,1)/3 on the Bloch sphere. Applying the Pauli encryption operators results in eight possible cipherstates which are equally spread out on the Bloch sphere. This encoding, especially when combined with the half-keylength option of QOTP, has advantages over 4-state and 6-state encoding in applications such as Quantum Key Recycling (QKR) and Unclonable Encryption (UE). We propose a key recycling scheme that is more efficient and can tolerate more noise than a recent scheme by Fehr and Salvail. For 8-state QOTP encryption with pseudorandom keys, we do a statistical analysis of the cipherstate eigenvalues. We present numerics up to nine qubits.

  3. Correlation of Spacecraft Mission and Project Costs

    NASA Technical Reports Server (NTRS)

    Swan, Christopher; Jarrett, Shawn

    2007-01-01

    A key component of any cost risk analysis is the level of correlation between individual elements of cost. This analysis supplements the available historical records with the cost estimates from the JPL Advanced Design Team. The costs from actual JPL flight projects are then used to validate the results, clearly indicating that, on average, the correlation between elements of cost is between 0.4 and 0.7.

  4. German Eagle vs. Russian Bear: A World War II Russian Front Boardgame Kit.

    ERIC Educational Resources Information Center

    Coatney, Louis R.

    This board game encourages junior and senior high school student analysis of the German campaign against the USSR and gauges student decision-making skills. The World War II Russo-German Front is simulated in a standard board game format. A key element of the game is its analysis and results form. Using this form compels students to analyze and…

  5. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  6. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  7. Analysis of the secrecy of the running key in quantum encryption channels using coherent states of light

    NASA Astrophysics Data System (ADS)

    Nikulin, Vladimir V.; Hughes, David H.; Malowicki, John; Bedi, Vijit

    2015-05-01

    Free-space optical communication channels offer secure links with low probability of interception and detection. Despite their point-to-point topology, additional security features may be required in privacy-critical applications. Encryption can be achieved at the physical layer by using quantized values of photons, which makes exploitation of such quantum communication links extremely difficult. One example of such technology is keyed communication in quantum noise, a novel quantum modulation protocol that offers ultra-secure communication with competitive performance characteristics. Its utilization relies on specific coherent measurements to decrypt the signal. The process of measurements is complicated by the inherent and irreducible quantum noise of coherent states. This problem is different from traditional laser communication with coherent detection; therefore continuous efforts are being made to improve the measurement techniques. Quantum-based encryption systems that use the phase of the signal as the information carrier impose aggressive requirements on the accuracy of the measurements when an unauthorized party attempts intercepting the data stream. Therefore, analysis of the secrecy of the data becomes extremely important. In this paper, we present the results of a study that had a goal of assessment of potential vulnerability of the running key. Basic results of the laboratory measurements are combined with simulation studies and statistical analysis that can be used for both conceptual improvement of the encryption approach and for quantitative comparison of secrecy of different quantum communication protocols.

  8. Tropical Rainfall Analysis Using TRMM in Combination With Other Satellite Gauge Data: Comparison with Global Precipitation Climatology Project (GPCP) Results

    NASA Technical Reports Server (NTRS)

    Adler, Robert F.; Huffman, George J.; Bolvin, David; Nelkin, Eric; Curtis, Scott

    1999-01-01

    This paper describes recent results of using Tropical Rainfall Measuring Mission (TRMM) information as the key calibration tool in a merged analysis on a 1 deg x 1 deg latitude/longitude monthly scale based on multiple satellite sources and raingauge analysis. The procedure used to produce the GPCP data set is a stepwise approach which first combines the satellite low-orbit microwave and geosynchronous IR observations into a "multi-satellite" product and than merges that result with the raingauge analysis. Preliminary results produced with the still-stabilizing TRMM algorithms indicate that TRMM shows tighter spatial gradients in tropical rain maxima with higher peaks in the center of the maxima. The TRMM analyses will be used to evaluate the evolution of the 1998 ENSO variations, again in comparison with the GPCP analyses.

  9. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with the new machine-learning method via CNN models. Based on the analysis of those experimental results and case studies, the proposed new method have below benefits for the severe convection prediction: (1) helping forecasters to narrow down the scope of analysis and saves lead-time for those high-impact severe convection; (2) performing huge amount of weather big data by machine learning methods rather relying on traditional theory and knowledge, which provide new method to explore and quantify the severe convective weathers; (3) providing machine learning based end-to-end analysis and processing ability with considerable scalability on data volumes, and accomplishing the analysis work without human intervention.

  10. Life expectancy evaluation and development of a replacement schedule for LED traffic signals.

    DOT National Transportation Integrated Search

    2011-03-01

    This research details a field study of LED traffic signals in Missouri and develops a replacement schedule : based on key findings. Rates of degradation were statistically analyzed using Analysis of Variance : (ANOVA). Results of this research will p...

  11. Gene expression profiling of human alveolar macrophages infected by B. anthracis spores demonstrates TNF-α and NF-κb are key components of the innate immune response to the pathogen

    PubMed Central

    2009-01-01

    Background Bacillus anthracis, the etiologic agent of anthrax, has recently been used as an agent of bioterrorism. The innate immune system initially appears to contain the pathogen at the site of entry. Because the human alveolar macrophage (HAM) plays a key role in lung innate immune responses, studying the HAM response to B. anthracis is important in understanding the pathogenesis of the pulmonary form of this disease. Methods In this paper, the transcriptional profile of B. anthracis spore-treated HAM was compared with that of mock-infected cells, and differentially expressed genes were identified by Affymetrix microarray analysis. A portion of the results were verified by Luminex protein analysis. Results The majority of genes modulated by spores were upregulated, and a lesser number were downregulated. The differentially expressed genes were subjected to Ingenuity Pathway analysis, the Database for Annotation, Visualization and Integrated Discovery (DAVID) analysis, the Promoter Analysis and Interaction Network Toolset (PAINT) and Oncomine analysis. Among the upregulated genes, we identified a group of chemokine ligand, apoptosis, and, interestingly, keratin filament genes. Central hubs regulating the activated genes were TNF-α, NF-κB and their ligands/receptors. In addition to TNF-α, a broad range of cytokines was induced, and this was confirmed at the level of translation by Luminex multiplex protein analysis. PAINT analysis revealed that many of the genes affected by spores contain the binding site for c-Rel, a member of the NF-κB family of transcription factors. Other transcription regulatory elements contained in many of the upregulated genes were c-Myb, CP2, Barbie Box, E2F and CRE-BP1. However, many of the genes are poorly annotated, indicating that they represent novel functions. Four of the genes most highly regulated by spores have only previously been associated with head and neck and lung carcinomas. Conclusion The results demonstrate not only that TNF-α and NF-κb are key components of the innate immune response to the pathogen, but also that a large part of the mechanisms by which the alveolar macrophage responds to B. anthracis are still unknown as many of the genes involved are poorly annotated. PMID:19744333

  12. MC-GenomeKey: a multicloud system for the detection and annotation of genomic variants.

    PubMed

    Elshazly, Hatem; Souilmi, Yassine; Tonellato, Peter J; Wall, Dennis P; Abouelhoda, Mohamed

    2017-01-20

    Next Generation Genome sequencing techniques became affordable for massive sequencing efforts devoted to clinical characterization of human diseases. However, the cost of providing cloud-based data analysis of the mounting datasets remains a concerning bottleneck for providing cost-effective clinical services. To address this computational problem, it is important to optimize the variant analysis workflow and the used analysis tools to reduce the overall computational processing time, and concomitantly reduce the processing cost. Furthermore, it is important to capitalize on the use of the recent development in the cloud computing market, which have witnessed more providers competing in terms of products and prices. In this paper, we present a new package called MC-GenomeKey (Multi-Cloud GenomeKey) that efficiently executes the variant analysis workflow for detecting and annotating mutations using cloud resources from different commercial cloud providers. Our package supports Amazon, Google, and Azure clouds, as well as, any other cloud platform based on OpenStack. Our package allows different scenarios of execution with different levels of sophistication, up to the one where a workflow can be executed using a cluster whose nodes come from different clouds. MC-GenomeKey also supports scenarios to exploit the spot instance model of Amazon in combination with the use of other cloud platforms to provide significant cost reduction. To the best of our knowledge, this is the first solution that optimizes the execution of the workflow using computational resources from different cloud providers. MC-GenomeKey provides an efficient multicloud based solution to detect and annotate mutations. The package can run in different commercial cloud platforms, which enables the user to seize the best offers. The package also provides a reliable means to make use of the low-cost spot instance model of Amazon, as it provides an efficient solution to the sudden termination of spot machines as a result of a sudden price increase. The package has a web-interface and it is available for free for academic use.

  13. Frontiers in Ecosystem Science: Energizing the Research Agenda

    NASA Astrophysics Data System (ADS)

    Weathers, K. C.; Groffman, P. M.; VanDolah, E.

    2014-12-01

    Ecosystem science has a long history as a core component of the discipline of Ecology, and although topics of research have fluctuated over the years, it retains a clear identity and continues to be a vital field. As science is becoming more interdisciplinary, particularly the science of global environmental change, ecosystem scientists are addressing new and important questions at the interface of multiple disciplines. Over the last two years, we organized a series of workshops and discussion groups at multiple scientific-society meetings, including AGU to identify frontiers in ecosystem research. The workshops featured short "soapbox" presentations where speakers highlighted key questions in ecosystem science. The presentations were recorded (video and audio) and subjected to qualitative text analysis for identification of frontier themes, attendees completed surveys, and a dozen additional "key informants" were interviewed about their views about frontiers of the discipline. Our effort produced 253 survey participants; the two largest groups of participants were full professors (24%) and graduate students (24%); no other specific group was > 10%. Formal text analysis of the soapbox presentations produced three major themes; "frontiers," "capacity building," and "barriers to implementation" with four or five sub-themes within each major theme. Key "frontiers" included; 1) better understanding of the drivers of ecosystem change, 2) better understanding of ecosystem process and function, 3) human dimensions of ecosystem science, and 4) problem-solving/applied research. Under "capacity building," key topics included: holistic approaches, cross-disciplinary collaboration, public support for research, data, training, and technology investment. Under "barriers" key topics included: limitations in theoretical thinking, insufficient funding/support, fragmentation across discipline, data access and data synthesis. In-depth interviews with 13 experts validated findings from analysis of soapbox presentations and surveys and also resulted in a conceptual model for understanding disciplinary frontiers.

  14. Communication-oriented person-organization fit as a key factor of job-seeking behaviors: millennials' social media use and attitudes toward organizational social media policies.

    PubMed

    Cho, Jaehee; Park, Dong Jin; Ordonez, Zoa

    2013-11-01

    The main goal of this study was to assess how the millennial generation perceives companies that have different social media policies and how such perception influences key variables for job-seeking behaviors, including perceived person-organization fit (POF), organizational attraction, and job pursuit intention. Results from a univariate general linear model and path analysis supported all of the established hypotheses. In particular, the results revealed that millennials perceived higher POF for a company with organizational policies supporting employees' social media use. Further, organizational attractiveness significantly mediated the relationship between communication-oriented POF and job pursuit intention.

  15. Analysis of factors influencing organic fruit and vegetable purchasing in Istanbul, Turkey.

    PubMed

    Oraman, Yasemin; Unakitan, Gökhan

    2010-01-01

    This article examines the influences on the purchasing decisions of fruit and vegetable consumers and presents findings from a survey conducted with 385 respondents living in urban areas in Istanbul, Turkey. It uses a binary logistic model to estimate factor effects in organic fruit and vegetable purchasing in Turkey. The results indicate that concern for human health and safety is a key factor that influences consumer preferences for organic food. Findings will help organic product suppliers understand the key factors influencing consumer purchasing and consumption behaviors.

  16. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.

    PubMed

    García-Patrón, Raúl; Cerf, Nicolas J

    2006-11-10

    A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented. Provided that the quantum channel is estimated via the covariance matrix of the quadratures, Gaussian attacks are shown to be optimal against all collective eavesdropping strategies. The proof is made strikingly simple by combining a physical model of measurement, an entanglement-based description of CV-QKD, and a recent powerful result on the extremality of Gaussian states [M. M. Wolf, Phys. Rev. Lett. 96, 080502 (2006)10.1103/PhysRevLett.96.080502].

  17. Impact Assessment and Forecasts of Information and Telecommunications Technologies Applied to Education and Training. R&D in Information and Communication Based Learning Technology. Analysis of Key Issues for the Orientation of the Work of Sector Actors in the Framework of DELTA. Volume I--Executive Summary.

    ERIC Educational Resources Information Center

    Commission of the European Communities, Brussels (Belgium).

    This report, the first volume in a three volume set, summarizes the results of a study performed by the DELTA (Developing European Learning through Technological Advance) Unit in parallel with the projects underway in the research and development Exploratory Action. The report identifies the key issues, associated requirements and options, and…

  18. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  19. African Primary Care Research: Qualitative data analysis and writing results

    PubMed Central

    Govender, Indiran; Ogunbanjo, Gboyega A.; Mash, Bob

    2014-01-01

    Abstract This article is part of a series on African primary care research and gives practical guidance on qualitative data analysis and the presentation of qualitative findings. After an overview of qualitative methods and analytical approaches, the article focuses particularly on content analysis, using the framework method as an example. The steps of familiarisation, creating a thematic index, indexing, charting, interpretation and confirmation are described. Key concepts with regard to establishing the quality and trustworthiness of data analysis are described. Finally, an approach to the presentation of qualitative findings is given. PMID:26245437

  20. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  1. Vibrations Detection in Industrial Pumps Based on Spectral Analysis to Increase Their Efficiency

    NASA Astrophysics Data System (ADS)

    Rachid, Belhadef; Hafaifa, Ahmed; Boumehraz, Mohamed

    2016-03-01

    Spectral analysis is the key tool for the study of vibration signals in rotating machinery. In this work, the vibration analysis applied for conditional preventive maintenance of such machines is proposed, as part of resolved problems related to vibration detection on the organs of these machines. The vibration signal of a centrifugal pump was treated to mount the benefits of the approach proposed. The obtained results present the signal estimation of a pump vibration using Fourier transform technique compared by the spectral analysis methods based on Prony approach.

  2. Finite element modeling of truss structures with frequency-dependent material damping

    NASA Technical Reports Server (NTRS)

    Lesieutre, George A.

    1991-01-01

    A physically motivated modelling technique for structural dynamic analysis that accommodates frequency dependent material damping was developed. Key features of the technique are the introduction of augmenting thermodynamic fields (AFT) to interact with the usual mechanical displacement field, and the treatment of the resulting coupled governing equations using finite element analysis methods. The AFT method is fully compatible with current structural finite element analysis techniques. The method is demonstrated in the dynamic analysis of a 10-bay planar truss structure, a structure representative of those contemplated for use in future space systems.

  3. African Primary Care Research: qualitative data analysis and writing results.

    PubMed

    Mabuza, Langalibalele H; Govender, Indiran; Ogunbanjo, Gboyega A; Mash, Bob

    2014-06-05

    This article is part of a series on African primary care research and gives practical guidance on qualitative data analysis and the presentation of qualitative findings. After an overview of qualitative methods and analytical approaches, the article focuses particularly on content analysis, using the framework method as an example. The steps of familiarisation, creating a thematic index, indexing, charting, interpretation and confirmation are described. Key concepts with regard to establishing the quality and trustworthiness of data analysis are described. Finally, an approach to the presentation of qualitative findings is given.

  4. Identification of the Key Genes and Pathways in Esophageal Carcinoma.

    PubMed

    Su, Peng; Wen, Shiwang; Zhang, Yuefeng; Li, Yong; Xu, Yanzhao; Zhu, Yonggang; Lv, Huilai; Zhang, Fan; Wang, Mingbo; Tian, Ziqiang

    2016-01-01

    Objective . Esophageal carcinoma (EC) is a frequently common malignancy of gastrointestinal cancer in the world. This study aims to screen key genes and pathways in EC and elucidate the mechanism of it. Methods . 5 microarray datasets of EC were downloaded from Gene Expression Omnibus. Differentially expressed genes (DEGs) were screened by bioinformatics analysis. Gene Ontology (GO) enrichment, Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment, and protein-protein interaction (PPI) network construction were performed to obtain the biological roles of DEGs in EC. Quantitative real-time polymerase chain reaction (qRT-PCR) was used to verify the expression level of DEGs in EC. Results . A total of 1955 genes were filtered as DEGs in EC. The upregulated genes were significantly enriched in cell cycle and the downregulated genes significantly enriched in Endocytosis. PPI network displayed CDK4 and CCT3 were hub proteins in the network. The expression level of 8 dysregulated DEGs including CDK4, CCT3, THSD4, SIM2, MYBL2, CENPF, CDCA3, and CDKN3 was validated in EC compared to adjacent nontumor tissues and the results were matched with the microarray analysis. Conclusion . The significantly DEGs including CDK4, CCT3, THSD4, and SIM2 may play key roles in tumorigenesis and development of EC involved in cell cycle and Endocytosis.

  5. [Transcriptome analysis of Dunaliella viridis].

    PubMed

    Zhu, Shuai-qi; Gong, Yi-fu; Hang, Yu-qing; Liu, Hao; Wang, He-yu

    2015-08-01

    In order to understand the gene information, function, haloduric pathway (glycerolipid metabolism) and related key genes for Dunaliella viridis, we used Illumina HiSeqTM 2000 high-throughput sequencing technology to sequence its transcriptome. Trinity soft was used to assemble the data to form transcripts. Based on the Clusters of Orthologous Groups (COG), Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG ) databases, we carried out functional annotation and classification, pathway annotation, and the opening reading fragment (ORF) sequence prediction of transcripts. The key genes in the glycerolipid metabolism were analyzed. The results suggested that 81,593 transcripts were found, and 77,117 ORF sequences were predicted, accounting for 94.50% of all transcripts. COG classification results showed that 16,569 transcripts were assigned to 24 categories. GO classification annotated 76,436 transcripts. The number of transcripts for biologcial processes was 30,678, accounting for 40.14% of all transcripts. KEGG pathway analysis showed that 26,428 transcripts were annotated to 317 pathways, and 131 pathways were related to metabolism, accounting for 41.32% of all annotated pathways. Only one transcript was annotated as coding the key enzyme dihydroxyacetone kinase involved in the glycerolipid pathway. This enzyme could be related to glycerol biosynthesis under salt stress. This study further improved the gene information and laid the foundation of metabolic pathway research for Dunaliella viridis.

  6. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-05-01

    We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.

  7. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    NASA Technical Reports Server (NTRS)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  8. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    PubMed

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  9. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2008-05-01

    The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

  10. An analysis of image storage systems for scalable training of deep neural networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lim, Seung-Hwan; Young, Steven R; Patton, Robert M

    This study presents a principled empirical evaluation of image storage systems for training deep neural networks. We employ the Caffe deep learning framework to train neural network models for three different data sets, MNIST, CIFAR-10, and ImageNet. While training the models, we evaluate five different options to retrieve training image data: (1) PNG-formatted image files on local file system; (2) pushing pixel arrays from image files into a single HDF5 file on local file system; (3) in-memory arrays to hold the pixel arrays in Python and C++; (4) loading the training data into LevelDB, a log-structured merge tree based key-valuemore » storage; and (5) loading the training data into LMDB, a B+tree based key-value storage. The experimental results quantitatively highlight the disadvantage of using normal image files on local file systems to train deep neural networks and demonstrate reliable performance with key-value storage based storage systems. When training a model on the ImageNet dataset, the image file option was more than 17 times slower than the key-value storage option. Along with measurements on training time, this study provides in-depth analysis on the cause of performance advantages/disadvantages of each back-end to train deep neural networks. We envision the provided measurements and analysis will shed light on the optimal way to architect systems for training neural networks in a scalable manner.« less

  11. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  12. Metagenomic Insights into Evolution of a Heavy Metal-Contaminated Groundwater Microbial Community

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hemme, Christopher L.; Deng, Ye; Gentry, Terry J.

    2010-02-15

    Understanding adaptation of biological communities to environmental change is a central issue in ecology and evolution. Metagenomic analysis of a stressed groundwater microbial community reveals that prolonged exposure to high concentrations of heavy metals, nitric acid and organic solvents (~;;50 years) have resulted in a massive decrease in species and allelic diversity as well as a significant loss of metabolic diversity. Although the surviving microbial community possesses all metabolic pathways necessary for survival and growth in such an extreme environment, its structure is very simple, primarily composed of clonal denitrifying ?- and ?-proteobacterial populations. The resulting community is over-abundant inmore » key genes conferring resistance to specific stresses including nitrate, heavy metals and acetone. Evolutionary analysis indicates that lateral gene transfer could be a key mechanism in rapidly responding and adapting to environmental contamination. The results presented in this study have important implications in understanding, assessing and predicting the impacts of human-induced activities on microbial communities ranging from human health to agriculture to environmental management, and their responses to environmental changes.« less

  13. Metagenomic insights into evolution of heavy metal-contaminated groundwater microbial community

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hemme, C.L.; Deng, Y.; Gentry, T.J.

    2010-07-01

    Understanding adaptation of biological communities to environmental change is a central issue in ecology and evolution. Metagenomic analysis of a stressed groundwater microbial community reveals that prolonged exposure to high concentrations of heavy metals, nitric acid and organic solvents ({approx}50 years) has resulted in a massive decrease in species and allelic diversity as well as a significant loss of metabolic diversity. Although the surviving microbial community possesses all metabolic pathways necessary for survival and growth in such an extreme environment, its structure is very simple, primarily composed of clonal denitrifying {gamma}- and {beta}-proteobacterial populations. The resulting community is overabundant inmore » key genes conferring resistance to specific stresses including nitrate, heavy metals and acetone. Evolutionary analysis indicates that lateral gene transfer could have a key function in rapid response and adaptation to environmental contamination. The results presented in this study have important implications in understanding, assessing and predicting the impacts of human-induced activities on microbial communities ranging from human health to agriculture to environmental management, and their responses to environmental changes.« less

  14. Setting Standards for Medically-Based Running Analysis

    PubMed Central

    Vincent, Heather K.; Herman, Daniel C.; Lear-Barnes, Leslie; Barnes, Robert; Chen, Cong; Greenberg, Scott; Vincent, Kevin R.

    2015-01-01

    Setting standards for medically based running analyses is necessary to ensure that runners receive a high-quality service from practitioners. Medical and training history, physical and functional tests, and motion analysis of running at self-selected and faster speeds are key features of a comprehensive analysis. Self-reported history and movement symmetry are critical factors that require follow-up therapy or long-term management. Pain or injury is typically the result of a functional deficit above or below the site along the kinematic chain. PMID:25014394

  15. Partition of some key regulating services in terrestrial ecosystems: Meta-analysis and review.

    PubMed

    Viglizzo, E F; Jobbágy, E G; Ricard, M F; Paruelo, J M

    2016-08-15

    Our knowledge about the functional foundations of ecosystem service (ES) provision is still limited and more research is needed to elucidate key functional mechanisms. Using a simplified eco-hydrological scheme, in this work we analyzed how land-use decisions modify the partition of some essential regulatory ES by altering basic relationships between biomass stocks and water flows. A comprehensive meta-analysis and review was conducted based on global, regional and local data from peer-reviewed publications. We analyzed five datasets comprising 1348 studies and 3948 records on precipitation (PPT), aboveground biomass (AGB), AGB change, evapotranspiration (ET), water yield (WY), WY change, runoff (R) and infiltration (I). The conceptual framework was focused on ES that are associated with the ecological functions (e.g., intermediate ES) of ET, WY, R and I. ES included soil protection, carbon sequestration, local climate regulation, water-flow regulation and water recharge. To address the problem of data normality, the analysis included both parametric and non-parametric regression analysis. Results demonstrate that PPT is a first-order biophysical factor that controls ES release at the broader scales. At decreasing scales, ES are partitioned as result of PPT interactions with other biophysical and anthropogenic factors. At intermediate scales, land-use change interacts with PPT modifying ES partition as it the case of afforestation in dry regions, where ET and climate regulation may be enhanced at the expense of R and water-flow regulation. At smaller scales, site-specific conditions such as topography interact with PPT and AGB displaying different ES partition formats. The probable implications of future land-use and climate change on some key ES production and partition are discussed. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. [A co-word analysis of current research on neonatal jaundice].

    PubMed

    Bao, Shan; Yang, Xiao-Yan; Tang, Jun; Wu, Jin-Lin; Mu, De-Zhi

    2014-08-01

    To investigate the research on neonatal jaundice in recent years by co-word analysis and to summarize the hot spots and trend of research in this field in China. The CNKI was searched with "neonate" and "jaundice" as the key words to identify the papers published from January 2009 to July 2013 that were in accordance with strict inclusion and exclusion criteria. To reveal the relationship between different high-frequency key words, Microsoft Office Excel 2013 was used for statistical analysis of key words, and Ucinet 6.0 and Netdraw were used for co-occurrence analysis. A total of 2 054 papers were included, and 44 high-frequency key words were extracted. The current hotspots of research on neonatal jaundice in China were displayed, and the relationship between different high-frequency key words was presented. There has been in-depth research on clinical manifestations and diagnosis of neonatal jaundice in China, but further research is needed to investigate the etiology, mechanism, and treatment of neonatal jaundice.

  17. Diagnostic studies of the HxOy-NzOy-O3 photochemical system using data from NASA GTE field expeditions

    NASA Technical Reports Server (NTRS)

    Chameides, William L.

    1988-01-01

    Spring 1084 GTE CITE-1 flight data from the field exercise was obtained from a GTE Data Archive Tape. Chemical and supporting meteorological data taken over the Pacific Ocean was statistically and diagnostically analyzed to identify the key processes affecting the concentrations of ozone and its chemical precursors in the region. The analysis was completed. The analysis of the GTE CITE-2 data is being performed in collaboration with Dr. D.D. Davis and other GTE scientists. Initial results of the analysis were presented and work begun on the paper describing the results.

  18. Image segmentation by iterative parallel region growing with application to data compression and image analysis

    NASA Technical Reports Server (NTRS)

    Tilton, James C.

    1988-01-01

    Image segmentation can be a key step in data compression and image analysis. However, the segmentation results produced by most previous approaches to region growing are suspect because they depend on the order in which portions of the image are processed. An iterative parallel segmentation algorithm avoids this problem by performing globally best merges first. Such a segmentation approach, and two implementations of the approach on NASA's Massively Parallel Processor (MPP) are described. Application of the segmentation approach to data compression and image analysis is then described, and results of such application are given for a LANDSAT Thematic Mapper image.

  19. Comparative Analysis of Modeling Studies on China's Future Energy and Emissions Outlook

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Nina; Zhou, Nan; Fridley, David

    The past decade has seen the development of various scenarios describing long-term patterns of future Greenhouse Gas (GHG) emissions, with each new approach adding insights to our understanding of the changing dynamics of energy consumption and aggregate future energy trends. With the recent growing focus on China's energy use and emission mitigation potential, a range of Chinese outlook models have been developed across different institutions including in China's Energy Research Institute's 2050 China Energy and CO2 Emissions Report, McKinsey & Co's China's Green Revolution report, the UK Sussex Energy Group and Tyndall Centre's China's Energy Transition report, and the China-specificmore » section of the IEA World Energy Outlook 2009. At the same time, the China Energy Group at Lawrence Berkeley National Laboratory (LBNL) has developed a bottom-up, end-use energy model for China with scenario analysis of energy and emission pathways out to 2050. A robust and credible energy and emission model will play a key role in informing policymakers by assessing efficiency policy impacts and understanding the dynamics of future energy consumption and energy saving and emission reduction potential. This is especially true for developing countries such as China, where uncertainties are greater while the economy continues to undergo rapid growth and industrialization. A slightly different assumption or storyline could result in significant discrepancies among different model results. Therefore, it is necessary to understand the key models in terms of their scope, methodologies, key driver assumptions and the associated findings. A comparative analysis of LBNL's energy end-use model scenarios with the five above studies was thus conducted to examine similarities and divergences in methodologies, scenario storylines, macroeconomic drivers and assumptions as well as aggregate energy and emission scenario results. Besides directly tracing different energy and CO{sub 2} savings potential back to the underlying strategies and combination of efficiency and abatement policy instruments represented by each scenario, this analysis also had other important but often overlooked findings.« less

  20. Coupled dynamics analysis of wind energy systems

    NASA Technical Reports Server (NTRS)

    Hoffman, J. A.

    1977-01-01

    A qualitative description of all key elements of a complete wind energy system computer analysis code is presented. The analysis system addresses the coupled dynamics characteristics of wind energy systems, including the interactions of the rotor, tower, nacelle, power train, control system, and electrical network. The coupled dynamics are analyzed in both the frequency and time domain to provide the basic motions and loads data required for design, performance verification and operations analysis activities. Elements of the coupled analysis code were used to design and analyze candidate rotor articulation concepts. Fundamental results and conclusions derived from these studies are presented.

  1. Spatial Paradigm for Information Retrieval and Exploration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The SPIRE system consists of software for visual analysis of primarily text based information sources. This technology enables the content analysis of text documents without reading all the documents. It employs several algorithms for text and word proximity analysis. It identifies the key themes within the text documents. From this analysis, it projects the results onto a visual spatial proximity display (Galaxies or Themescape) where items (documents and/or themes) visually close to each other are known to have content which is close to each other. Innovative interaction techniques then allow for dynamic visual analysis of large text based information spaces.

  2. SPIRE1.03. Spatial Paradigm for Information Retrieval and Exploration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Adams, K.J.; Bohn, S.; Crow, V.

    The SPIRE system consists of software for visual analysis of primarily text based information sources. This technology enables the content analysis of text documents without reading all the documents. It employs several algorithms for text and word proximity analysis. It identifies the key themes within the text documents. From this analysis, it projects the results onto a visual spatial proximity display (Galaxies or Themescape) where items (documents and/or themes) visually close to each other are known to have content which is close to each other. Innovative interaction techniques then allow for dynamic visual analysis of large text based information spaces.

  3. Enhancing security and improving interoperability in healthcare information systems.

    PubMed

    Gritzalis, D A

    1998-01-01

    Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.

  4. Can Link Analysis Be Applied to Identify Behavioral Patterns in Train Recorder Data?

    PubMed

    Strathie, Ailsa; Walker, Guy H

    2016-03-01

    A proof-of-concept analysis was conducted to establish whether link analysis could be applied to data from on-train recorders to detect patterns of behavior that could act as leading indicators of potential safety issues. On-train data recorders capture data about driving behavior on thousands of routine journeys every day and offer a source of untapped data that could be used to offer insights into human behavior. Data from 17 journeys undertaken by six drivers on the same route over a 16-hr period were analyzed using link analysis, and four key metrics were examined: number of links, network density, diameter, and sociometric status. The results established that link analysis can be usefully applied to data captured from on-vehicle recorders. The four metrics revealed key differences in normal driver behavior. These differences have promising construct validity as leading indicators. Link analysis is one method that could be usefully applied to exploit data routinely gathered by on-vehicle data recorders. It facilitates a proactive approach to safety based on leading indicators, offers a clearer understanding of what constitutes normal driving behavior, and identifies trends at the interface of people and systems, which is currently a key area of strategic risk. These research findings have direct applications in the field of transport data monitoring. They offer a means of automatically detecting patterns in driver behavior that could act as leading indicators of problems during operation and that could be used in the proactive monitoring of driver competence, risk management, and even infrastructure design. © 2015, Human Factors and Ergonomics Society.

  5. An overview of rural speed crashes in North Carolina 1994-1999

    DOT National Transportation Integrated Search

    2000-10-01

    An analysis of speed-related crashes in rural areas of North Carolina resulted in these key findings: 44% of speed-related crashes took place on secondary roads, where roadway design standards are lower than for other types of roadways. Speed-related...

  6. Aircraft Loss-of-Control: Analysis and Requirements for Future Safety-Critical Systems and Their Validation

    NASA Technical Reports Server (NTRS)

    Belcastro, Christine M.

    2011-01-01

    Loss of control remains one of the largest contributors to fatal aircraft accidents worldwide. Aircraft loss-of-control accidents are complex, resulting from numerous causal and contributing factors acting alone or more often in combination. Hence, there is no single intervention strategy to prevent these accidents. This paper summarizes recent analysis results in identifying worst-case combinations of loss-of-control accident precursors and their time sequences, a holistic approach to preventing loss-of-control accidents in the future, and key requirements for validating the associated technologies.

  7. Simulation Studies of Satellite Laser CO2 Mission Concepts

    NASA Technical Reports Server (NTRS)

    Kawa, Stephan Randy; Mao, J.; Abshire, J. B.; Collatz, G. J.; Sun X.; Weaver, C. J.

    2011-01-01

    Results of mission simulation studies are presented for a laser-based atmospheric CO2 sounder. The simulations are based on real-time carbon cycle process modeling and data analysis. The mission concept corresponds to ASCENDS as recommended by the US National Academy of Sciences Decadal Survey. Compared to passive sensors, active (lidar) sensing of CO2 from space has several potentially significant advantages that hold promise to advance CO2 measurement capability in the next decade. Although the precision and accuracy requirements remain at unprecedented levels of stringency, analysis of possible instrument technology indicates that such sensors are more than feasible. Radiative transfer model calculations, an instrument model with representative errors, and a simple retrieval approach complete the cycle from "nature" run to "pseudodata" CO2. Several mission and instrument configuration options are examined, and the sensitivity to key design variables is shown. Examples are also shown of how the resulting pseudo-measurements might be used to address key carbon cycle science questions.

  8. Stochastic analysis of multiphase flow in porous media: II. Numerical simulations

    NASA Astrophysics Data System (ADS)

    Abin, A.; Kalurachchi, J. J.; Kemblowski, M. W.; Chang, C.-M.

    1996-08-01

    The first paper (Chang et al., 1995b) of this two-part series described the stochastic analysis using spectral/perturbation approach to analyze steady state two-phase (water and oil) flow in a, liquid-unsaturated, three fluid-phase porous medium. In this paper, the results between the numerical simulations and closed-form expressions obtained using the perturbation approach are compared. We present the solution to the one-dimensional, steady-state oil and water flow equations. The stochastic input processes are the spatially correlated logk where k is the intrinsic permeability and the soil retention parameter, α. These solutions are subsequently used in the numerical simulations to estimate the statistical properties of the key output processes. The comparison between the results of the perturbation analysis and numerical simulations showed a good agreement between the two methods over a wide range of logk variability with three different combinations of input stochastic processes of logk and soil parameter α. The results clearly demonstrated the importance of considering the spatial variability of key subsurface properties under a variety of physical scenarios. The variability of both capillary pressure and saturation is affected by the type of input stochastic process used to represent the spatial variability. The results also demonstrated the applicability of perturbation theory in predicting the system variability and defining effective fluid properties through the ergodic assumption.

  9. Presenting the Straddle Lemma in an introductory Real Analysis course

    NASA Astrophysics Data System (ADS)

    Soares, A.; Santos, A. L. dos

    2017-04-01

    In this article, we revisit the concept of strong differentiability of real functions of one variable, underlying the concept of differentiability. Our discussion is guided by the Straddle Lemma, which plays a key role in this context. The proofs of the results presented are designed to meet a young audience in mathematics, typical of students in a first course of Real Analysis or an honors-level Calculus course.

  10. LabKey Server: An open source platform for scientific data integration, analysis and collaboration

    PubMed Central

    2011-01-01

    Background Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. Results To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350 organizations. It tracks roughly 27,000 assay runs, 860,000 specimen vials and 1,300,000 vial transfers. Conclusions Sharing data, analysis tools and infrastructure can speed the efforts of large research consortia by enhancing efficiency and enabling new insights. The Atlas installation of LabKey Server demonstrates the utility of the LabKey platform for collaborative research. Stable, supported builds of LabKey Server are freely available for download at http://www.labkey.org. Documentation and source code are available under the Apache License 2.0. PMID:21385461

  11. Job Profiling Guide. Results of 1994 Job Profiling. Part of the Ohio Vocational Competency Assessment (OVCA) Package.

    ERIC Educational Resources Information Center

    Ohio State Univ., Columbus. Vocational Instructional Materials Lab.

    This guide explains the process of job profiling and details the results of a 1994 profiling of 34 occupations. Discussed in section 1 are the following: purpose and components of the Ohio Vocational Competency Assessment (OVCA) package; purpose, contents, and use of the Ohio Competency Analysis Profiles and Work Keys components of the OVCA…

  12. Performance Analysis of MYSEA

    DTIC Science & Technology

    2012-09-01

    Services FSD Federated Services Daemon I&A Identification and Authentication IKE Internet Key Exchange KPI Key Performance Indicator LAN Local Area...spection takes place in different processes in the server architecture. Key Performance Indica- tor ( KPI )s associated with the system need to be...application and risk analysis of security controls. Thus, measurement of the KPIs is needed before an informed tradeoff between the performance penalties

  13. KEY COMPARISON Report to the CCT on key comparison EUROMET.T-K6 (EUROMET Project no. 621): Comparison of the realizations of local dew/frost-point temperature scales in the range -50 °C to +20 °C

    NASA Astrophysics Data System (ADS)

    Heinonen, Martti

    2010-01-01

    The first humidity CIPM key comparison, CCT-K6, will be completed in 2010. The corresponding European regional key comparison, EUROMET.T-K6, was carried out in 2004 to 2008. National metrology institutes from 24 countries participated in the comparison. The comparison covered the dew-point temperature range from -50 °C to +20 °C. It was organized as three parallel loops with two specially manufactured precision chilled mirror hygrometers as transfer standards in each loop. The comparison scheme was designed to ensure high quality results with evenly spread workload for the participants. MIKES was coordinating the project. This report presents the results of the comparison and provides detailed information on the measurements performed by all participating laboratories and the analysis of the results. Conclusions on the equivalence of the dew-point temperature standards are drawn on the basis of calculated bilateral degrees of equivalence and deviations from EURAMET comparison reference values (ERV). Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  14. Design study of wind turbines 50 kW to 3000 kW for electric utility applications. Volume 3: Supplementary design and analysis tasks

    NASA Technical Reports Server (NTRS)

    1976-01-01

    Additional design and analysis data are provided to supplement the results of the two parallel design study efforts. The key results of the three supplemental tasks investigated are: (1) The velocity duration profile has a significant effect in determining the optimum wind turbine design parameters and the energy generation cost. (2) Modest increases in capacity factor can be achieved with small increases in energy generation costs and capital costs. (3) Reinforced concrete towers that are esthetically attractive can be designed and built at a cost comparable to those for steel truss towers. The approach used, method of analysis, assumptions made, design requirements, and the results for each task are discussed in detail.

  15. Recent Advances in Clinical Natural Language Processing in Support of Semantic Analysis

    PubMed Central

    Mowery, D.; South, B. R.; Kvist, M.; Dalianis, H.

    2015-01-01

    Summary Objectives We present a review of recent advances in clinical Natural Language Processing (NLP), with a focus on semantic analysis and key subtasks that support such analysis. Methods We conducted a literature review of clinical NLP research from 2008 to 2014, emphasizing recent publications (2012-2014), based on PubMed and ACL proceedings as well as relevant referenced publications from the included papers. Results Significant articles published within this time-span were included and are discussed from the perspective of semantic analysis. Three key clinical NLP subtasks that enable such analysis were identified: 1) developing more efficient methods for corpus creation (annotation and de-identification), 2) generating building blocks for extracting meaning (morphological, syntactic, and semantic subtasks), and 3) leveraging NLP for clinical utility (NLP applications and infrastructure for clinical use cases). Finally, we provide a reflection upon most recent developments and potential areas of future NLP development and applications. Conclusions There has been an increase of advances within key NLP subtasks that support semantic analysis. Performance of NLP semantic analysis is, in many cases, close to that of agreement between humans. The creation and release of corpora annotated with complex semantic information models has greatly supported the development of new tools and approaches. Research on non-English languages is continuously growing. NLP methods have sometimes been successfully employed in real-world clinical tasks. However, there is still a gap between the development of advanced resources and their utilization in clinical settings. A plethora of new clinical use cases are emerging due to established health care initiatives and additional patient-generated sources through the extensive use of social media and other devices. PMID:26293867

  16. Protein analysis: key to the future.

    PubMed

    Boodhun, Nawsheen

    2018-05-01

    Protein analysis is crucial to elucidating the function of proteins and understanding the impact of their presence, absence and alteration. This is key to advancing knowledge about diseases, providing the opportunity for biomarker discovery and development of therapeutics. In this issue of Tech News, Nawsheen Boodhun explores the various means of protein analysis.

  17. Stakeholder analysis for the development of a community pharmacy service aimed at preventing cardiovascular disease.

    PubMed

    Franco-Trigo, L; Hossain, L N; Durks, D; Fam, D; Inglis, S C; Benrimoj, S I; Sabater-Hernández, D

    Participatory approaches involving stakeholders across the health care system can help enhance the development, implementation and evaluation of health services. These approaches may be particularly useful in planning community pharmacy services and so overcome challenges in their implementation into practice. Conducting a stakeholder analysis is a key first step since it allows relevant stakeholders to be identified, as well as providing planners a better understanding of the complexity of the health care system. The main aim of this study was to conduct a stakeholder analysis to identify those individuals and organizations that could be part of a leading planning group for the development of a community pharmacy service (CPS) to prevent cardiovascular disease (CVD) in Australia. An experienced facilitator conducted a workshop with 8 key informants of the Australian health care system. Two structured activities were undertaken. The first explored current needs and gaps in cardiovascular care and the role of community pharmacists. The second was a stakeholder analysis, using both ex-ante and ad-hoc approaches. Identified stakeholders were then classified into three groups according to their relative influence on the development of the pharmacy service. The information gathered was analyzed using qualitative content analysis. The key informants identified 46 stakeholders, including (1) patient/consumers and their representative organizations, (2) health care providers and their professional organizations and (3) institutions and organizations that do not directly interact with patients but organize and manage the health care system, develop and implement health policies, pay for health care, influence funding for health service research or promote new health initiatives. From the 46 stakeholders, a core group of 12 stakeholders was defined. These were considered crucial to the service's development because they held positions that could drive or inhibit progress. Secondary results of the workshop included: a list of needs and gaps in cardiovascular care (n = 6), a list of roles for community pharmacists in cardiovascular prevention (n = 12) and a list of potential factors (n = 7) that can hinder the integration of community pharmacy services into practice. This stakeholder analysis provided a detailed picture of the wide range of stakeholders across the entire health care system that have a stake in the development of a community pharmacy service aimed at preventing CVD. Of these, a core group of key stakeholders, with complementary roles, can then be approached for further planning of the service. The results of this analysis highlight the relevance of establishing multilevel stakeholder groups for CPS planning. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. How Has the Presence of Zimbabwe's Victim-Friendly Court and Relevant Child Protection Policy and Legal Frameworks Affected the Management of Intrafamilial Child Sexual Abuse in Zimbabwe? The Case of Marondera District.

    PubMed

    Musiwa, Anthony Shuko

    2018-06-01

    The study intended to assess, based on the perceptions of Victim-Friendly Court (VFC) professionals in Marondera District in Zimbabwe, how the presence of the VFC and relevant child protection policy and legal frameworks has affected the management of Intrafamilial Child Sexual Abuse (ICSA) in Zimbabwe. Sem-istructured questionnaires were administered to 25 professionals from 13 VFC agencies in Marondera, while one-on-one semi-structured interviews were conducted with 15 key informants who included five ICSA survivors and their respective five caregivers as well as five key community child protection committee members. All 40 participants were selected using purposive sampling. Data were analyzed manually using thematic analysis, descriptive analysis, and document analysis. The study showed that the VFC manages ICSA through prevention, protection, treatment, and support interventions, and that its mandate is guided by key child protection policy and legal frameworks, particularly the National Action Plan for Orphaned and Vulnerable Children and the Children's Act (Chapter 5:06). The presence of these mechanisms is perceived to have resulted in increased awareness of ICSA, realization of effective results, increased reporting of ICSA, and enhanced coordination among VFC agencies. However, the same frameworks are perceived to be fraught with gaps and inconsistencies, too prescriptive, incoherent with some key aspects of the National Constitution and international child rights standards, and poorly resourced for effective implementation. All this has negatively affected the management of ICSA. Therefore, the Government of Zimbabwe should consistently review these systems to make them responsive to the ever-evolving factors associated with ICSA. Also, alignment with the National Constitution, full domestication of global child rights instruments, and routine collection of better statistics for evidence-based policy- and decision-making, and for better monitoring of progress and evaluation of outcomes, are necessary for positive results. Non-governmental stakeholders too should chip in with human, technical, and financial resources to enhance effective management of the social problem.

  19. A Key Gene, PLIN1, Can Affect Porcine Intramuscular Fat Content Based on Transcriptome Analysis

    PubMed Central

    Li, Bojiang; Weng, Qiannan; Dong, Chao; Zhang, Zengkai; Li, Rongyang; Liu, Jingge; Jiang, Aiwen; Li, Qifa; Jia, Chao; Wu, Wangjun; Liu, Honglin

    2018-01-01

    Intramuscular fat (IMF) content is an important indicator for meat quality evaluation. However, the key genes and molecular regulatory mechanisms affecting IMF deposition remain unclear. In the present study, we identified 75 differentially expressed genes (DEGs) between the higher (H) and lower (L) IMF content of pigs using transcriptome analysis, of which 27 were upregulated and 48 were downregulated. Notably, Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analysis indicated that the DEG perilipin-1 (PLIN1) was significantly enriched in the fat metabolism-related peroxisome proliferator-activated receptor (PPAR) signaling pathway. Furthermore, we determined the expression patterns and functional role of porcine PLIN1. Our results indicate that PLIN1 was highly expressed in porcine adipose tissue, and its expression level was significantly higher in the H IMF content group when compared with the L IMF content group, and expression was increased during adipocyte differentiation. Additionally, our results confirm that PLIN1 knockdown decreases the triglyceride (TG) level and lipid droplet (LD) size in porcine adipocytes. Overall, our data identify novel candidate genes affecting IMF content and provide new insight into PLIN1 in porcine IMF deposition and adipocyte differentiation. PMID:29617344

  20. A Key Gene, PLIN1, Can Affect Porcine Intramuscular Fat Content Based on Transcriptome Analysis.

    PubMed

    Li, Bojiang; Weng, Qiannan; Dong, Chao; Zhang, Zengkai; Li, Rongyang; Liu, Jingge; Jiang, Aiwen; Li, Qifa; Jia, Chao; Wu, Wangjun; Liu, Honglin

    2018-04-04

    Intramuscular fat (IMF) content is an important indicator for meat quality evaluation. However, the key genes and molecular regulatory mechanisms affecting IMF deposition remain unclear. In the present study, we identified 75 differentially expressed genes (DEGs) between the higher (H) and lower (L) IMF content of pigs using transcriptome analysis, of which 27 were upregulated and 48 were downregulated. Notably, Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analysis indicated that the DEG perilipin-1 ( PLIN1 ) was significantly enriched in the fat metabolism-related peroxisome proliferator-activated receptor (PPAR) signaling pathway. Furthermore, we determined the expression patterns and functional role of porcine PLIN1. Our results indicate that PLIN1 was highly expressed in porcine adipose tissue, and its expression level was significantly higher in the H IMF content group when compared with the L IMF content group, and expression was increased during adipocyte differentiation. Additionally, our results confirm that PLIN1 knockdown decreases the triglyceride (TG) level and lipid droplet (LD) size in porcine adipocytes. Overall, our data identify novel candidate genes affecting IMF content and provide new insight into PLIN1 in porcine IMF deposition and adipocyte differentiation.

  1. Overcoming Jealousy: An Experiential Analysis of Common Factors.

    ERIC Educational Resources Information Center

    Barrell, James J.; Richards, Anne C.

    1982-01-01

    Investigated key aspects of the experience of jealousy through the recorded experiences of a study group consisting of three males and three females. Results indicated that jealousy is a complex experience which may be accompanied by a variety of negative feelings. Provides suggestions for overcoming jealousy. (RC)

  2. Stable isotope dilution assay (SIDA) and HS-SPME-GCMS quantification of key aroma volatiles for fruit and sap of Australian mango cultivars.

    PubMed

    San, Anh T; Joyce, Daryl C; Hofman, Peter J; Macnish, Andrew J; Webb, Richard I; Matovic, Nicolas J; Williams, Craig M; De Voss, James J; Wong, Siew H; Smyth, Heather E

    2017-04-15

    Reported herein is a high throughput method to quantify in a single analysis the key volatiles that contribute to the aroma of commercially significant mango cultivars grown in Australia. The method constitutes stable isotope dilution analysis (SIDA) in conjunction with headspace (HS) solid-phase microextraction (SPME) coupled with gas-chromatography mass spectrometry (GCMS). Deuterium labelled analogues of the target analytes were either purchased commercially or synthesised for use as internal standards. Seven volatiles, hexanal, 3-carene, α-terpinene, p-cymene, limonene, α-terpinolene and ethyl octanoate, were targeted. The resulting calibration functions had determination coefficients (R 2 ) ranging from 0.93775 to 0.99741. High recovery efficiencies for spiked mango samples were also achieved. The method was applied to identify the key aroma volatile compounds produced by 'Kensington Pride' and 'B74' mango fruit and by 'Honey Gold' mango sap. This method represents a marked improvement over current methods for detecting and measuring concentrations of mango fruit and sap volatiles. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. A multisource feedback tool to assess ward round leadership skills of senior paediatric trainees: (1) Development of tool.

    PubMed

    Lakshminarayana, Indumathy; Wall, David; Bindal, Taruna; Goodyear, Helen M

    2015-05-01

    Leading a ward round is an essential skill for hospital consultants and senior trainees but is rarely assessed during training. To investigate the key attributes for ward round leadership and to use these results to develop a multisource feedback (MSF) tool to assess the ward round leadership skills of senior specialist trainees. A panel of experts comprising four senior paediatric consultants and two nurse managers were interviewed from May to August 2009. From analysis of the interview transcripts, 10 key themes emerged. A structured questionnaire based on the key themes was designed and sent electronically to paediatric consultants, nurses and trainees at a large university hospital (June-October 2010). 81 consultants, nurses and trainees responded to the survey. The internal consistency of this tool was high (Cronbach's α 0.95). Factor analysis showed that five factors accounted for 72% of variance. The five key areas for ward round leadership were communication skills, preparation and organisation, teaching and enthusiasm, team working and punctuality; communication was the most important key theme. A MSF tool for ward round leadership skills was developed with these areas as five domains. We believe that this tool will add to the current assessment tools available by providing feedback about ward round leadership skills. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  4. ITS risk analysis.

    DOT National Transportation Integrated Search

    1996-06-01

    Risk analysis plays a key role in the implementation of an architecture. Early definition of the situations, processes, or events that have the potential for impeding the implementation of key elements of the ITS National Architecture is a critical e...

  5. Testing key predictions of the associative account of mirror neurons in humans using multivariate pattern analysis.

    PubMed

    Oosterhof, Nikolaas N; Wiggett, Alison J; Cross, Emily S

    2014-04-01

    Cook et al. overstate the evidence supporting their associative account of mirror neurons in humans: most studies do not address a key property, action-specificity that generalizes across the visual and motor domains. Multivariate pattern analysis (MVPA) of neuroimaging data can address this concern, and we illustrate how MVPA can be used to test key predictions of their account.

  6. Using Qualitative Comparative Analysis (QCA) of Key Informant Interviews in Health Services Research: Enhancing a Study of Adjuvant Therapy Use in Breast Cancer Care

    PubMed Central

    McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra DeNardis; Bickell, Nina A.

    2015-01-01

    Background Qualitative Comparative Analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. Objective To explore the strengths and weaknesses of using QCA for HSR. Research Design Using data from semi-structured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Subjects Ninety administrative and clinical key informants interviewed across ten NYC area safety net hospitals. Measures Transcribed interviews were coded by three investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Results Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Conclusions Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods. PMID:26908085

  7. A Bayesian Framework for Human Body Pose Tracking from Depth Image Sequences

    PubMed Central

    Zhu, Youding; Fujimura, Kikuo

    2010-01-01

    This paper addresses the problem of accurate and robust tracking of 3D human body pose from depth image sequences. Recovering the large number of degrees of freedom in human body movements from a depth image sequence is challenging due to the need to resolve the depth ambiguity caused by self-occlusions and the difficulty to recover from tracking failure. Human body poses could be estimated through model fitting using dense correspondences between depth data and an articulated human model (local optimization method). Although it usually achieves a high accuracy due to dense correspondences, it may fail to recover from tracking failure. Alternately, human pose may be reconstructed by detecting and tracking human body anatomical landmarks (key-points) based on low-level depth image analysis. While this method (key-point based method) is robust and recovers from tracking failure, its pose estimation accuracy depends solely on image-based localization accuracy of key-points. To address these limitations, we present a flexible Bayesian framework for integrating pose estimation results obtained by methods based on key-points and local optimization. Experimental results are shown and performance comparison is presented to demonstrate the effectiveness of the proposed approach. PMID:22399933

  8. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  9. Differential proteomics analysis to identify proteins and pathways associated with male sterility of soybean using iTRAQ-based strategy.

    PubMed

    Li, Jiajia; Ding, Xianlong; Han, Shaohuai; He, Tingting; Zhang, Hao; Yang, Longshu; Yang, Shouping; Gai, Junyi

    2016-04-14

    To further elucidate the molecular mechanism of cytoplasmic male sterility (CMS) in soybean, a differential proteomic analysis was completed between the CMS line NJCMS1A and its maintainer NJCMS1B using iTRAQ-based strategy. As a result, 180 differential abundance proteins (DAPs) were identified, of which, 60 were down-regulated and 120 were up-regulated in NJCMS1A compared with NJCMS1B. Bioinformatic analysis showed that 167 DAPs were annotated in 41 Gene Ontology functional groups, 106 DAPs were classified into 20 clusters of orthologous groups of protein categories, and 128 DAPs were enrichment in 53 KEGG pathways. Fifteen differential level proteins/genes with the same expression pattern were identified in the further conjoint analysis of DAPs and the previously reported differential expression genes. Moreover, multiple reaction monitoring test, qRT-PCR analysis and enzyme activity assay validated that the iTRAQ results were reliable. Based on functional analysis of DAPs, we concluded that male sterility in NJCMS1A might be related to insufficiencies in energy supply, unbalance of protein synthesis and degradation, disruption of flavonoid synthesis, programmed cell death, abnormalities of substance metabolism, etc. These results might facilitate our understanding of the molecular mechanisms behind CMS in soybean. Soybean is an important global crop that provides protein and oil. Heterosis is a significantly potential approach to increase the yield of soybean. Cytoplasmic male sterility (CMS) plays a vital role in the production of hybrid seeds. However, the genetic and molecular mechanisms of male sterility in soybean still need to be further elucidated. In the present paper, a differential proteomic analysis was carried out and the results showed that several key proteins involved in key pathways were associated with male sterility in soybean. This work provides a new insight to understand the genetic and molecular mechanisms underlying CMS in soybean. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. New whole-body sensory-motor gradients revealed using phase-locked analysis and verified using multivoxel pattern analysis and functional connectivity.

    PubMed

    Zeharia, Noa; Hertz, Uri; Flash, Tamar; Amedi, Amir

    2015-02-18

    Topographic organization is one of the main principles of organization in the human brain. Specifically, whole-brain topographic mapping using spectral analysis is responsible for one of the greatest advances in vision research. Thus, it is intriguing that although topography is a key feature also in the motor system, whole-body somatosensory-motor mapping using spectral analysis has not been conducted in humans outside M1/SMA. Here, using this method, we were able to map a homunculus in the globus pallidus, a key target area for deep brain stimulation, which has not been mapped noninvasively or in healthy subjects. The analysis clarifies contradictory and partial results regarding somatotopy in the caudal-cingulate zone and rostral-cingulate zone in the medial wall and in the putamen. Most of the results were confirmed at the single-subject level and were found to be compatible with results from animal studies. Using multivoxel pattern analysis, we could predict movements of individual body parts in these homunculi, thus confirming that they contain somatotopic information. Using functional connectivity, we demonstrate interhemispheric functional somatotopic connectivity of these homunculi, such that the somatotopy in one hemisphere could have been found given the connectivity pattern of the corresponding regions of interest in the other hemisphere. When inspecting the somatotopic and nonsomatotopic connectivity patterns, a similarity index indicated that the pattern of connected and nonconnected regions of interest across different homunculi is similar for different body parts and hemispheres. The results show that topographical gradients are even more widespread than previously assumed in the somatosensory-motor system. Spectral analysis can thus potentially serve as a gold standard for defining somatosensory-motor system areas for basic research and clinical applications. Copyright © 2015 the authors 0270-6474/15/352845-15$15.00/0.

  11. Incorporating Handling Qualities Analysis into Rotorcraft Conceptual Design

    NASA Technical Reports Server (NTRS)

    Lawrence, Ben

    2014-01-01

    This paper describes the initial development of a framework to incorporate handling qualities analyses into a rotorcraft conceptual design process. In particular, the paper describes how rotorcraft conceptual design level data can be used to generate flight dynamics models for handling qualities analyses. Also, methods are described that couple a basic stability augmentation system to the rotorcraft flight dynamics model to extend analysis to beyond that of the bare airframe. A methodology for calculating the handling qualities characteristics of the flight dynamics models and for comparing the results to ADS-33E criteria is described. Preliminary results from the application of the handling qualities analysis for variations in key rotorcraft design parameters of main rotor radius, blade chord, hub stiffness and flap moment of inertia are shown. Varying relationships, with counteracting trends for different handling qualities criteria and different flight speeds are exhibited, with the action of the control system playing a complex part in the outcomes. Overall, the paper demonstrates how a broad array of technical issues across flight dynamics stability and control, simulation and modeling, control law design and handling qualities testing and evaluation had to be confronted to implement even a moderately comprehensive handling qualities analysis of relatively low fidelity models. A key outstanding issue is to how to 'close the loop' with an overall design process, and options for the exploration of how to feedback handling qualities results to a conceptual design process are proposed for future work.

  12. System analysis study of space platform and station accommodations for life sciences research facilities. Volume 2: Study results, attachment 2. Phase A: Conceptual design and programmatics

    NASA Technical Reports Server (NTRS)

    Wiley, Lowell F.

    1985-01-01

    The study results from the conceptual design and programmatics segment of the Space Platform and Station Accommodation for Life Sciences Research Facilities. The results and significant findings of the conceptual design and programmatics were generated by these tasks: (1) the review and update engineering and science requirements; (2) analysis of life sciences mission transition scenario; (3) the review and update of key trade issues; (4) the development of conceptual definition and designs; and (5) the development of the work breakdown schedule and its dictionary, program schedule, and estimated costs.

  13. Dynamic gene expression analysis in a H1N1 influenza virus mouse pneumonia model.

    PubMed

    Bao, Yanyan; Gao, Yingjie; Shi, Yujing; Cui, Xiaolan

    2017-06-01

    H1N1, a major pathogenic subtype of influenza A virus, causes a respiratory infection in humans and livestock that can range from a mild infection to more severe pneumonia associated with acute respiratory distress syndrome. Understanding the dynamic changes in the genome and the related functional changes induced by H1N1 influenza virus infection is essential to elucidating the pathogenesis of this virus and thereby determining strategies to prevent future outbreaks. In this study, we filtered the significantly expressed genes in mouse pneumonia using mRNA microarray analysis. Using STC analysis, seven significant gene clusters were revealed, and using STC-GO analysis, we explored the significant functions of these seven gene clusters. The results revealed GOs related to H1N1 virus-induced inflammatory and immune functions, including innate immune response, inflammatory response, specific immune response, and cellular response to interferon-beta. Furthermore, the dynamic regulation relationships of the key genes in mouse pneumonia were revealed by dynamic gene network analysis, and the most important genes were filtered, including Dhx58, Cxcl10, Cxcl11, Zbp1, Ifit1, Ifih1, Trim25, Mx2, Oas2, Cd274, Irgm1, and Irf7. These results suggested that during mouse pneumonia, changes in the expression of gene clusters and the complex interactions among genes lead to significant changes in function. Dynamic gene expression analysis revealed key genes that performed important functions. These results are a prelude to advancements in mouse H1N1 influenza virus infection biology, as well as the use of mice as a model organism for human H1N1 influenza virus infection studies.

  14. Special environmental control and life support equipment test analyses and hardware

    NASA Technical Reports Server (NTRS)

    Callahan, David M.

    1995-01-01

    This final report summarizes NAS8-38250 contract events, 'Special Environmental Control and Life Support Systems Test Analysis and Hardware'. This report is technical and includes programmatic development. Key to the success of this contract was the evaluation of Environmental Control and Life Support Systems (ECLSS) test results via sophisticated laboratory analysis capabilities. The history of the contract, including all subcontracts, is followed by the support and development of each Task.

  15. Sensitivity analysis of navy aviation readiness based sparing model

    DTIC Science & Technology

    2017-09-01

    variability. (See Figure 4.) Figure 4. Research design flowchart 18 Figure 4 lays out the four steps of the methodology , starting in the upper left-hand...as a function of changes in key inputs. We develop NAVARM Experimental Designs (NED), a computational tool created by applying a state-of-the-art...experimental design to the NAVARM model. Statistical analysis of the resulting data identifies the most influential cost factors. Those are, in order of

  16. The Lockheed OSO-8 program. Analysis of data from the mapping X-ray heliometer experiment

    NASA Technical Reports Server (NTRS)

    Acton, L. W.; Wolfson, C. J.; Datlowe, D. W.; Mosher, J. M.; Roethig, D. T.; Smith, K. L.

    1980-01-01

    The final report describes the extent of the analysis effort, and other activities associated with the preservation and documentation of the data set are described. The main scientific results, which are related to the behavior of individual solar activity regions in the energy band 1.5 - 15 keV, are summarized, and a complete bibliography of publications and presentations is given. Copies of key articles are also provided.

  17. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, R. K.; Peters, Scott

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modifiedmore » and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  18. Cryptographic Key Management and Critical Risk Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  19. ECG-cryptography and authentication in body area networks.

    PubMed

    Zhang, Zhaoyang; Wang, Honggang; Vasilakos, Athanasios V; Fang, Hua

    2012-11-01

    Wireless body area networks (BANs) have drawn much attention from research community and industry in recent years. Multimedia healthcare services provided by BANs can be available to anyone, anywhere, and anytime seamlessly. A critical issue in BANs is how to preserve the integrity and privacy of a person's medical data over wireless environments in a resource efficient manner. This paper presents a novel key agreement scheme that allows neighboring nodes in BANs to share a common key generated by electrocardiogram (ECG) signals. The improved Jules Sudan (IJS) algorithm is proposed to set up the key agreement for the message authentication. The proposed ECG-IJS key agreement can secure data communications over BANs in a plug-n-play manner without any key distribution overheads. Both the simulation and experimental results are presented, which demonstrate that the proposed ECG-IJS scheme can achieve better security performance in terms of serval performance metrics such as false acceptance rate (FAR) and false rejection rate (FRR) than other existing approaches. In addition, the power consumption analysis also shows that the proposed ECG-IJS scheme can achieve energy efficiency for BANs.

  20. One-click scanning of large-size documents using mobile phone camera

    NASA Astrophysics Data System (ADS)

    Liu, Sijiang; Jiang, Bo; Yang, Yuanjie

    2016-07-01

    Currently mobile apps for document scanning do not provide convenient operations to tackle large-size documents. In this paper, we present a one-click scanning approach for large-size documents using mobile phone camera. After capturing a continuous video of documents, our approach automatically extracts several key frames by optical flow analysis. Then based on key frames, a mobile GPU based image stitching method is adopted to generate a completed document image with high details. There are no extra manual intervention in the process and experimental results show that our app performs well, showing convenience and practicability for daily life.

  1. Depot effect of bioactive components in experimental membrane filtrations

    NASA Astrophysics Data System (ADS)

    Mitev, D.; Peshev, D.; Peev, G.; Peeva, L.

    2017-01-01

    Depot effects were found to be accompanying phenomena of membrane separation processes. Accumulation of target species in the membrane matrix during feasibility tests can hamper proper conclusions or compromise the filtration results. Therefore, we investigated the effects of delayed membrane release of chlorogenic acid and caffeine, considered as key compounds of interest in spent coffee products’ recovery treatment. Permeate fluxes and key components release were studied in course of 24 hours via nanofiltration of pure solvent, both immediately after the mock solution filtration and after idle stay. Conclusions are drawn and recommendations advised for proper analysis of experimental data on membrane screening.

  2. Some thoughts on estimating the cost of common equity for a regulated business

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Malko, J. Robert; Swensen, Philip R.; Monteleone, Joseph A.

    2007-06-15

    While mathematical models are useful in establishing a zone of reasonableness for a determination of allowed return on equity, it is important to consider the results of several models. Also key is to consider whether the analysis appropriately reflects longer-term market conditions. (author)

  3. APNs taking the next step: disseminating practice information via effective poster presentations.

    PubMed

    Bischof, Janet

    2013-02-10

    Advanced practice nurses (APNs) have a responsibility to share information from projects and research with other professionals. Poster presentations offer a way to visually share the information to a wide audience. Key elements include title, objective/purpose, data collection, results, analysis, implications for nursing, and appropriate references.

  4. Postgraduate Research Supervision: A Critical Review of Current Practice

    ERIC Educational Resources Information Center

    McCallin, Antoinette; Nayar, Shoba

    2012-01-01

    Changes in the funding and delivery of research programmes at the university level have, in recent years, resulted in significant changes to research supervision. This paper critically reviews key influences effecting postgraduate supervision. Analysis draws on literature spanning 2000-2010 to determine the appropriateness of traditional models of…

  5. ANALYSIS OF CONCORDANCE OF PROBABILISTIC AGGREGATE EXPOSURE PREDICTIONS WITH OBSERVED BIOMONITORING RESULTS: AN EXAMPLE USING CTEPP DATA

    EPA Science Inventory

    Three key areas of scientific inquiry in the study of human exposure to environmental contaminants are 1) assessment of aggregate (i.e., multi-pathway, multi-route) exposures, 2) application of probabilistic methods to exposure prediction, and 3) the interpretation of biomarker m...

  6. The Heuristics of Statistical Argumentation: Scaffolding at the Postsecondary Level

    ERIC Educational Resources Information Center

    Pardue, Teneal Messer

    2017-01-01

    Language plays a key role in statistics and, by extension, in statistics education. Enculturating students into the practice of statistics requires preparing them to communicate results of data analysis. Statistical argumentation is one way of providing structure to facilitate discourse in the statistics classroom. In this study, a teaching…

  7. Influence of Boundary Conditions on Regional Air Quality Simulations—Analysis of AQMEII Phase 3 Results

    EPA Science Inventory

    Chemical boundary conditions are a key input to regional-scale photochemical models. In this study, performed during the third phase of the Air Quality Model Evaluation International Initiative (AQMEII3), we perform annual simulations over North America with chemical boundary con...

  8. A Critical Realist Orientation to Learner Needs

    ERIC Educational Resources Information Center

    Ayers, David F.

    2011-01-01

    The objective of this essay is to propose critical realism as a philosophical middle way between two sets of ontological, epistemological, and methodological assumptions regarding learner needs. Key concepts of critical realism, a tradition in the philosophy of science, are introduced and applied toward an analysis of learner needs, resulting in…

  9. Negated bio-events: analysis and identification

    PubMed Central

    2013-01-01

    Background Negation occurs frequently in scientific literature, especially in biomedical literature. It has previously been reported that around 13% of sentences found in biomedical research articles contain negation. Historically, the main motivation for identifying negated events has been to ensure their exclusion from lists of extracted interactions. However, recently, there has been a growing interest in negative results, which has resulted in negation detection being identified as a key challenge in biomedical relation extraction. In this article, we focus on the problem of identifying negated bio-events, given gold standard event annotations. Results We have conducted a detailed analysis of three open access bio-event corpora containing negation information (i.e., GENIA Event, BioInfer and BioNLP’09 ST), and have identified the main types of negated bio-events. We have analysed the key aspects of a machine learning solution to the problem of detecting negated events, including selection of negation cues, feature engineering and the choice of learning algorithm. Combining the best solutions for each aspect of the problem, we propose a novel framework for the identification of negated bio-events. We have evaluated our system on each of the three open access corpora mentioned above. The performance of the system significantly surpasses the best results previously reported on the BioNLP’09 ST corpus, and achieves even better results on the GENIA Event and BioInfer corpora, both of which contain more varied and complex events. Conclusions Recently, in the field of biomedical text mining, the development and enhancement of event-based systems has received significant interest. The ability to identify negated events is a key performance element for these systems. We have conducted the first detailed study on the analysis and identification of negated bio-events. Our proposed framework can be integrated with state-of-the-art event extraction systems. The resulting systems will be able to extract bio-events with attached polarities from textual documents, which can serve as the foundation for more elaborate systems that are able to detect mutually contradicting bio-events. PMID:23323936

  10. Solar cycle modulation of Southern Annular Mode -Energy-momentum analysis-

    NASA Astrophysics Data System (ADS)

    Kuroda, Y.

    2016-12-01

    Climate is affected by various factors, including oceanic changes and volcanic eruptions. 11-year solar cycle change is one of such important factors. Observational analysis shows that the Southern Annular Mode (SAM) in late-winter/spring show structural modulation associated with 11-year solar cycle. In fact, SAM-related signal tends to extend from surface to upper stratosphere and persistent longer period in the High Solar (HS) years, whereas it is restricted in the troposphere and not persist in the Low Solar (LS) years. In the present study, we used 35-year record of ERA-Interim reanalysis data and performed wave-energy and momentum analysis on the solar-cycle modulation of the SAM to examine key factors to create such solar-SAM relationship. It is found that enhanced wave-mean flow interaction tends to take place in the middle stratosphere in association with enhanced energy input from diabatic heating on September only in HS years. The result suggests atmospheric and solar conditions on September are keys to create solar-SAM relationship.

  11. A methodology for global-sensitivity analysis of time-dependent outputs in systems biology modelling.

    PubMed

    Sumner, T; Shephard, E; Bogle, I D L

    2012-09-07

    One of the main challenges in the development of mathematical and computational models of biological systems is the precise estimation of parameter values. Understanding the effects of uncertainties in parameter values on model behaviour is crucial to the successful use of these models. Global sensitivity analysis (SA) can be used to quantify the variability in model predictions resulting from the uncertainty in multiple parameters and to shed light on the biological mechanisms driving system behaviour. We present a new methodology for global SA in systems biology which is computationally efficient and can be used to identify the key parameters and their interactions which drive the dynamic behaviour of a complex biological model. The approach combines functional principal component analysis with established global SA techniques. The methodology is applied to a model of the insulin signalling pathway, defects of which are a major cause of type 2 diabetes and a number of key features of the system are identified.

  12. Ares-I-X Stability and Control Flight Test: Analysis and Plans

    NASA Technical Reports Server (NTRS)

    Brandon, Jay M.; Derry, Stephen D.; Heim, Eugene H.; Hueschen, Richard M.; Bacon, Barton J.

    2008-01-01

    The flight test of the Ares I-X vehicle provides a unique opportunity to reduce risk of the design of the Ares I vehicle and test out design, math modeling, and analysis methods. One of the key features of the Ares I design is the significant static aerodynamic instability coupled with the relatively flexible vehicle - potentially resulting in a challenging controls problem to provide adequate flight path performance while also providing adequate structural mode damping and preventing adverse control coupling to the flexible structural modes. Another challenge is to obtain enough data from the single flight to be able to conduct analysis showing the effectiveness of the controls solutions and have data to inform design decisions for Ares I. This paper will outline the modeling approaches and control system design to conduct this flight test, and also the system identification techniques developed to extract key information such as control system performance (gain/phase margins, for example), structural dynamics responses, and aerodynamic model estimations.

  13. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  14. Orbital transfer vehicle concept definition and system analysis study, 1986. Volume 9: Study extension results

    NASA Technical Reports Server (NTRS)

    Kofal, Allen E.

    1987-01-01

    The purpose of this extension to the OTV Concept Definition and Systems Analysis Study was to improve the definition of the OTV Program that will be most beneficial to the nation in the 1995 to 2010 timeframe. The implications of the defined mission and defined launch vehicle are investigated. The key mission requirements identified for the Space Transportation Architecture Study (STAS) were established and reflect a need for early capability and more ambitious capability growth. The key technical objectives and related issues addressed are summarized. The analyses of selected areas including aerobrake design, proximity operations, and the balance of EVA and IVA operations used in the support of the OTV at the space-base were enhanced. Sensitivity studies were conducted to establish how the OTV program should be tailored to meet changing circumstances.

  15. Business model in marketplace industry using business model canvas approach: An e-commerce case study

    NASA Astrophysics Data System (ADS)

    Erlyana, Yana; Hartono, Henny

    2017-12-01

    The advancement of technology has huge impact on commerce world, especially in the marketplace that has shifted from brick-and-mortar to digital/online marketplace. Grasping the opportunity, ABC joined venture with DEF to create a new online venture namely XYZ Online Shop - an e-commerce website that has large segmentations. The objective of this research is to analyze the business model conducted by XYZ Online Shop by utilizing Business Model Canvas Framework and SWOT analysis. The results obtained from the research are that the business model conducted by XYZ Online Shop excels in customer relationship block and still needs to improve key partner and key activities blocks. Business Model Canvas along with SWOT analysis describes how XYZ Online Shop creates, delivers, and captures value based on its internal and external environments.

  16. CCM key comparison CCM.D-K4 'Hydrometer'

    NASA Astrophysics Data System (ADS)

    Lorefice, S.; Becerra, L. O.; Lenard, E.; Lee, Y. J.; Lee, W. G.; Madec, T.; Meury, P. A.; Caceres, J.; Santos, C.; Vamossy, C.; Man, J.; Fen, K.; Toda, K.; Wright, J.; Bettin, H.; Toth, H.

    2016-01-01

    This report presents the comparison philosophy, methodology, analysis and the results of the designed CCM.D-K4 key comparison that covered the calibration of high resolution hydrometers for liquid and alcoholometers in the density range 600 kg/m3 to 2000 kg/m3 at the temperature of 20°C. The main purpose of this comparison was not only to evaluate the degree of equivalence in the calibration of high accuracy hydrometers between NMI participants, but also to link, were it is possible, the results of previous comparisons to Key Comparison Reference Values (KCRVs) of CCM.D-K4. Eleven NMI laboratories took part in the CCM.D-K4 divided in two groups (petals). With the CCM.D-K4 purpose, two similar sets consisting of three hydrometers for liquid density determinations and an alcoholometer were circulated to the NMI participants as a travelling standard in the time interval from January 2011 to April 2012. Twelve Key Comparison Reference Values (KCRVs) for each petal have been obtained at the density values related to the tested density marks of the transfer standards by the results of participants. The KCRVs and corresponding uncertainties were calculated by the weighted mean in the case of consistent results, otherwise the median was used. The degree of equivalence (DoE) with respect to the corresponding KCRV was determined for each participant and, in this particular comparison, the Weighted Least Squares (WLS) method was used to link the individual DoE of each participant by a continuous function. Significant drift of the transfer standards was not detected. This report also gives instructions on calculating pair-wise degrees of equivalence, with the addition of any information on correlations that may be necessary to estimate more accurately as well as the procedure for linking international comparisons to the CCM.D-K4. Finally an example of linkage to the CCM.D-K4 is given by dealing with the results of the bilateral comparison between INRiM and NMIA, which was added to this comparison so that all participants were engaged after the breakage of the 9340171 artefact. A particularly good agreement was found among the results provided by most of the participants, even if some systematic differences and either underestimated or overestimated uncertainties of the submitted results can be identified with respect to the KCRVs. In general the deviations of the laboratory results to the KCRVs are within of 1/3rd to 1/4th of a scale division and the uncertainty at 95% is usually within half a division. During the analysis of the submitted results, a systematic difference between the first and last immersed mark was also noted, possibly due to a temperature gradient along the stem and/or wetting of the stem around the tested mark, and therefore a corrected claimed uncertainty from each laboratory is expected. However this comparison may help the laboratories to solve some residual or marginal problems as well as to better understand the uncertainty components. The comparison fully supports the calibration measurement capabilities table in the BIPM key comparison database (KCDB). The results can be used to link regional comparisons to this CCM key comparison Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  17. Upgrades to Electronic Speckle Interferometer (ESPI) Operation and Data Analysis at NASA's Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Connelly, Joseph; Blake, Peter; Jones, Joycelyn

    2008-01-01

    The authors report operational upgrades and streamlined data analysis of a commissioned electronic speckle interferometer (ESPI) in a permanent in-house facility at NASA's Goddard Space Flight Center. Our ESPI was commercially purchased for use by the James Webb Space Telescope (JWST) development team. We have quantified and reduced systematic error sources, improved the software operability with a user-friendly graphic interface, developed an instrument simulator, streamlined data analysis for long-duration testing, and implemented a turn-key approach to speckle interferometry. We also summarize results from a test of the JWST support structure (previously published), and present new results from several pieces of test hardware at various environmental conditions.

  18. Economic analysis of uricase production under uncertainty: Contrast of chromatographic purification and aqueous two-phase extraction (with and without PEG recycle).

    PubMed

    Torres-Acosta, Mario A; Aguilar-Yáñez, José M; Rito-Palomares, Marco; Titchener-Hooker, Nigel J

    2016-01-01

    Uricase is the enzyme responsible for the breakdown of uric acid, the key molecule leading to gout in humans, into allantoin, but it is absent in humans. It has been produced as a PEGylated pharmaceutical where the purification is performed through three sequential chromatographic columns. More recently an aqueous two-phase system (ATPS) was reported that could recover Uricase with high yield and purity. Although the use of ATPS can decrease cost and time, it also generates a large amount of waste. The ability, therefore, to recycle key components of ATPS is of interest. Economic modelling is a powerful tool that allows the bioprocess engineer to compare possible outcomes and find areas where further research or optimization might be required without recourse to extensive experiments and time. This research provides an economic analysis using the commercial software BioSolve of the strategies for Uricase production: chromatographic and ATPS, and includes a third bioprocess that uses material recycling. The key parameters that affect the process the most were located via a sensitivity analysis and evaluated with a Monte Carlo analysis. Results show that ATPS is far less expensive than chromatography, but that there is an area where the cost of production of both bioprocesses overlap. Furthermore, recycling does not impact the cost of production. This study serves to provide a framework for the economic analysis of Uricase production using alternative techniques. © 2015 The Authors Biotechnology Progress published by Wiley Periodicals, Inc. on behalf of American Institute of Chemical Engineers.

  19. Success Factors of European Syndromic Surveillance Systems: A Worked Example of Applying Qualitative Comparative Analysis.

    PubMed

    Ziemann, Alexandra; Fouillet, Anne; Brand, Helmut; Krafft, Thomas

    2016-01-01

    Syndromic surveillance aims at augmenting traditional public health surveillance with timely information. To gain a head start, it mainly analyses existing data such as from web searches or patient records. Despite the setup of many syndromic surveillance systems, there is still much doubt about the benefit of the approach. There are diverse interactions between performance indicators such as timeliness and various system characteristics. This makes the performance assessment of syndromic surveillance systems a complex endeavour. We assessed if the comparison of several syndromic surveillance systems through Qualitative Comparative Analysis helps to evaluate performance and identify key success factors. We compiled case-based, mixed data on performance and characteristics of 19 syndromic surveillance systems in Europe from scientific and grey literature and from site visits. We identified success factors by applying crisp-set Qualitative Comparative Analysis. We focused on two main areas of syndromic surveillance application: seasonal influenza surveillance and situational awareness during different types of potentially health threatening events. We found that syndromic surveillance systems might detect the onset or peak of seasonal influenza earlier if they analyse non-clinical data sources. Timely situational awareness during different types of events is supported by an automated syndromic surveillance system capable of analysing multiple syndromes. To our surprise, the analysis of multiple data sources was no key success factor for situational awareness. We suggest to consider these key success factors when designing or further developing syndromic surveillance systems. Qualitative Comparative Analysis helped interpreting complex, mixed data on small-N cases and resulted in concrete and practically relevant findings.

  20. Economic analysis of uricase production under uncertainty: Contrast of chromatographic purification and aqueous two‐phase extraction (with and without PEG recycle)

    PubMed Central

    Torres‐Acosta, Mario A.; Aguilar‐Yáñez, José M.; Rito‐Palomares, Marco

    2015-01-01

    Uricase is the enzyme responsible for the breakdown of uric acid, the key molecule leading to gout in humans, into allantoin, but it is absent in humans. It has been produced as a PEGylated pharmaceutical where the purification is performed through three sequential chromatographic columns. More recently an aqueous two‐phase system (ATPS) was reported that could recover Uricase with high yield and purity. Although the use of ATPS can decrease cost and time, it also generates a large amount of waste. The ability, therefore, to recycle key components of ATPS is of interest. Economic modelling is a powerful tool that allows the bioprocess engineer to compare possible outcomes and find areas where further research or optimization might be required without recourse to extensive experiments and time. This research provides an economic analysis using the commercial software BioSolve of the strategies for Uricase production: chromatographic and ATPS, and includes a third bioprocess that uses material recycling. The key parameters that affect the process the most were located via a sensitivity analysis and evaluated with a Monte Carlo analysis. Results show that ATPS is far less expensive than chromatography, but that there is an area where the cost of production of both bioprocesses overlap. Furthermore, recycling does not impact the cost of production. This study serves to provide a framework for the economic analysis of Uricase production using alternative techniques. © 2015 American Institute of Chemical Engineers Biotechnol. Prog., 32:126–133, 2016 PMID:26561271

  1. Equity of access to maternal health interventions in Brazil and Colombia: a retrospective study.

    PubMed

    De La Torre, Amaila; Nikoloski, Zlatko; Mossialos, Elias

    2018-04-11

    Reducing maternal mortality is a top priority in Latin American countries. Despite the progress in maternal mortality reduction, Brazil and Colombia still lag behind countries at similar levels of development. Using data from the Demographic Health Survey, this study quantified and compared, by means of concentration indices, the socioeconomic-related inequity in access to four key maternal health interventions in Brazil and Colombia. Decomposition analysis of the concentration index was used for two indicators - skilled attendance at birth and postnatal care in Brazil. Coverage levels of the four key maternal health interventions were similar in the two countries. More specifically, we found that coverage of some of the interventions (e.g. ante-natal care and skilled birth assistance) was higher than 90% in both countries. Nevertheless, the concentration index analysis pointed to significant pro-rich inequities in access in all four key interventions in both countries. Interestingly, the analysis showed that Colombia fared slightly better than Brazil in terms of equity in access of the interventions studied. Finally, the decomposition analysis for the presence of a skilled attendant at birth and postnatal care in Brazil underlined the significance of regional disparities, wealth inequalities, inequalities in access to private hospitals, and inequalities in access to private health insurance. There are persistent pro-rich inequities in access to four maternal health interventions in both Brazil and Colombia. The decomposition analysis conducted on Brazilian data suggests the existence of disparities in system capacity and quality of care between the private and the public health services, resulting in inequities of access to maternal health services.

  2. Recommendations for Future Army Analysis Efforts. Volume 4. Key Questions and Recommendations for Future Analysis Efforts on Explaining the Army and Supporting the Soldier

    DTIC Science & Technology

    1988-04-14

    McDonalds or Burger King for snack shops, Marriott for messing/billeting facilities, etc.? RECOMMENDED ELEMENTS OF ANALYSIS/TOPICAL AREAS: DATE RESULTS ITEM...e.g., a Burger King on post) now brings in about SI million per month to the family support coffers. It began in 1984 and has returned $21 million...Army, private sector franchises and family support. - The first or leading question is whether the family affects retention and, if so, what the Army

  3. Remote sensing of key grassland nutrients using hyperspectral techniques in KwaZulu-Natal, South Africa

    NASA Astrophysics Data System (ADS)

    Singh, Leeth; Mutanga, Onisimo; Mafongoya, Paramu; Peerbhay, Kabir

    2017-07-01

    The concentration of forage fiber content is critical in explaining the palatability of forage quality for livestock grazers in tropical grasslands. Traditional methods of determining forage fiber content are usually time consuming, costly, and require specialized laboratory analysis. With the potential of remote sensing technologies, determination of key fiber attributes can be made more accurately. This study aims to determine the effectiveness of known absorption wavelengths for detecting forage fiber biochemicals, neutral detergent fiber, acid detergent fiber, and lignin using hyperspectral data. Hyperspectral reflectance spectral measurements (350 to 2500 nm) of grass were collected and implemented within the random forest (RF) ensemble. Results show successful correlations between the known absorption features and the biochemicals with coefficients of determination (R2) ranging from 0.57 to 0.81 and root mean square errors ranging from 6.97 to 3.03 g/kg. In comparison, using the entire dataset, the study identified additional wavelengths for detecting fiber biochemicals, which contributes to the accurate determination of forage quality in a grassland environment. Overall, the results showed that hyperspectral remote sensing in conjunction with the competent RF ensemble could discriminate each key biochemical evaluated. This study shows the potential to upscale the methodology to a space-borne multispectral platform with similar spectral configurations for an accurate and cost effective mapping analysis of forage quality.

  4. Key Structures and Interactions for Binding of Mycobacterium tuberculosis Protein Kinase B Inhibitors from Molecular Dynamics Simulation.

    PubMed

    Punkvang, Auradee; Kamsri, Pharit; Saparpakorn, Patchreenart; Hannongbua, Supa; Wolschann, Peter; Irle, Stephan; Pungpo, Pornpan

    2015-07-01

    Substituted aminopyrimidine inhibitors have recently been introduced as antituberculosis agents. These inhibitors show impressive activity against protein kinase B, a Ser/Thr protein kinase that is essential for cell growth of M. tuberculosis. However, up to now, X-ray structures of the protein kinase B enzyme complexes with the substituted aminopyrimidine inhibitors are currently unavailable. Consequently, structural details of their binding modes are questionable, prohibiting the structural-based design of more potent protein kinase B inhibitors in the future. Here, molecular dynamics simulations, in conjunction with molecular mechanics/Poisson-Boltzmann surface area binding free-energy analysis, were employed to gain insight into the complex structures of the protein kinase B inhibitors and their binding energetics. The complex structures obtained by the molecular dynamics simulations show binding free energies in good agreement with experiment. The detailed analysis of molecular dynamics results shows that Glu93, Val95, and Leu17 are key residues responsible to the binding of the protein kinase B inhibitors. The aminopyrazole group and the pyrimidine core are the crucial moieties of substituted aminopyrimidine inhibitors for interaction with the key residues. Our results provide a structural concept that can be used as a guide for the future design of protein kinase B inhibitors with highly increased antagonistic activity. © 2014 John Wiley & Sons A/S.

  5. Evidence for the Induction of Key Components of the NOTCH Signaling Pathway via Deltamethrin and Azamethiphos Treatment in the Sea Louse Caligus rogercresseyi

    PubMed Central

    Boltaña, Sebastian; Chávez-Mardones, Jaqueline; Valenzuela-Muñoz, Valentina; Gallardo-Escárate, Cristian

    2016-01-01

    The extensive use of organophosphates and pyrethroids in the aquaculture industry has negatively impacted parasite sensitivity to the delousing effects of these antiparasitics, especially among sea lice species. The NOTCH signaling pathway is a positive regulator of ABC transporter subfamily C expression and plays a key role in the generation and modulation of pesticide resistance. However, little is known about the molecular mechanisms behind pesticide resistance, partly due to the lack of genomic and molecular information on the processes involved in the resistance mechanism of sea lice. Next-generation sequencing technologies provide an opportunity for rapid and cost-effective generation of genome-scale data. The present study, through RNA-seq analysis, determined that the sea louse Caligus rogercresseyi (C. rogercresseyi) specifically responds to the delousing drugs azamethiphos and deltamethrin at the transcriptomic level by differentially activating mRNA of the NOTCH signaling pathway and of ABC genes. These results suggest that frequent antiparasitic application may increase the activity of inhibitory mRNA components, thereby promoting inhibitory NOTCH output and conditions for increased resistance to delousing drugs. Moreover, data analysis underscored that key functions of NOTCH/ABC components were regulated during distinct phases of the drug response, thus indicating resistance modifications in C. rogercresseyi resulting from the frequent use of organophosphates and pyrethroids. PMID:27187362

  6. Evidence for the Induction of Key Components of the NOTCH Signaling Pathway via Deltamethrin and Azamethiphos Treatment in the Sea Louse Caligus rogercresseyi.

    PubMed

    Boltaña, Sebastian; Chávez-Mardones, Jaqueline; Valenzuela-Muñoz, Valentina; Gallardo-Escárate, Cristian

    2016-05-12

    The extensive use of organophosphates and pyrethroids in the aquaculture industry has negatively impacted parasite sensitivity to the delousing effects of these antiparasitics, especially among sea lice species. The NOTCH signaling pathway is a positive regulator of ABC transporter subfamily C expression and plays a key role in the generation and modulation of pesticide resistance. However, little is known about the molecular mechanisms behind pesticide resistance, partly due to the lack of genomic and molecular information on the processes involved in the resistance mechanism of sea lice. Next-generation sequencing technologies provide an opportunity for rapid and cost-effective generation of genome-scale data. The present study, through RNA-seq analysis, determined that the sea louse Caligus rogercresseyi (C. rogercresseyi) specifically responds to the delousing drugs azamethiphos and deltamethrin at the transcriptomic level by differentially activating mRNA of the NOTCH signaling pathway and of ABC genes. These results suggest that frequent antiparasitic application may increase the activity of inhibitory mRNA components, thereby promoting inhibitory NOTCH output and conditions for increased resistance to delousing drugs. Moreover, data analysis underscored that key functions of NOTCH/ABC components were regulated during distinct phases of the drug response, thus indicating resistance modifications in C. rogercresseyi resulting from the frequent use of organophosphates and pyrethroids.

  7. Print News Coverage of School-Based HPV Vaccine Mandate

    PubMed Central

    Casciotti, Dana; Smith, Katherine C.; Andon, Lindsay; Vernick, Jon; Tsui, Amy; Klassen, Ann C.

    2015-01-01

    BACKGROUND In 2007, legislation was proposed in 24 states and the District of Columbia for school-based HPV vaccine mandates, and mandates were enacted in Texas, Virginia, and the District of Columbia. Media coverage of these events was extensive, and media messages both reflected and contributed to controversy surrounding these legislative activities. Messages communicated through the media are an important influence on adolescent and parent understanding of school-based vaccine mandates. METHODS We conducted structured text analysis of newspaper coverage, including quantitative analysis of 169 articles published in mandate jurisdictions from 2005-2009, and qualitative analysis of 63 articles from 2007. Our structured analysis identified topics, key stakeholders and sources, tone, and the presence of conflict. Qualitative thematic analysis identified key messages and issues. RESULTS Media coverage was often incomplete, providing little context about cervical cancer or screening. Skepticism and autonomy concerns were common. Messages reflected conflict and distrust of government activities, which could negatively impact this and other youth-focused public health initiatives. CONCLUSIONS If school health professionals are aware of the potential issues raised in media coverage of school-based health mandates, they will be more able to convey appropriate health education messages, and promote informed decision-making by parents and students. PMID:25099421

  8. Quality control, analysis and secure sharing of Luminex® immunoassay data using the open source LabKey Server platform

    PubMed Central

    2013-01-01

    Background Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists’ capacity to use these immunoassays to evaluate human clinical trials. Results The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose–response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Conclusions Unlike other tools tailored for Luminex immunoassays, LabKey Server allows labs to customize their Luminex analyses using scripting while still presenting users with a single, graphical interface for processing and analyzing data. The LabKey Server system also stands out among Luminex tools for enabling smooth, secure transfer of data, quality control information, and analyses between collaborators. LabKey Server and its Luminex features are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. PMID:23631706

  9. Key features of an EU health information system: a concept mapping study.

    PubMed

    Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut

    2016-02-01

    Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  10. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  11. Developing an intelligence analysis process through social network analysis

    NASA Astrophysics Data System (ADS)

    Waskiewicz, Todd; LaMonica, Peter

    2008-04-01

    Intelligence analysts are tasked with making sense of enormous amounts of data and gaining an awareness of a situation that can be acted upon. This process can be extremely difficult and time consuming. Trying to differentiate between important pieces of information and extraneous data only complicates the problem. When dealing with data containing entities and relationships, social network analysis (SNA) techniques can be employed to make this job easier. Applying network measures to social network graphs can identify the most significant nodes (entities) and edges (relationships) and help the analyst further focus on key areas of concern. Strange developed a model that identifies high value targets such as centers of gravity and critical vulnerabilities. SNA lends itself to the discovery of these high value targets and the Air Force Research Laboratory (AFRL) has investigated several network measures such as centrality, betweenness, and grouping to identify centers of gravity and critical vulnerabilities. Using these network measures, a process for the intelligence analyst has been developed to aid analysts in identifying points of tactical emphasis. Organizational Risk Analyzer (ORA) and Terrorist Modus Operandi Discovery System (TMODS) are the two applications used to compute the network measures and identify the points to be acted upon. Therefore, the result of leveraging social network analysis techniques and applications will provide the analyst and the intelligence community with more focused and concentrated analysis results allowing them to more easily exploit key attributes of a network, thus saving time, money, and manpower.

  12. Critical Factors for the Transition from Chromate to Chromate-Free Corrosion Protection

    DTIC Science & Technology

    2005-06-15

    sub-ambient temperature. Local Cr-rich deposits (location b) are located on grain boundaries or pre- 3 existing metal ridge. Microchemical analysis ...form the framework for this review. AQUEOUS CHEMISTRY Cr6+ is readily hydrolyzed in aqueous solution and exists as an oxoanion in all but...involved in the reaction equilibria shown in Eqs. 2-4. The key results from this analysis are the following: • In acidic environments (pH 2-4

  13. Duvernay shale lithofacies distribution analysis in the West Canadian Sedimentary Basin

    NASA Astrophysics Data System (ADS)

    Zhu, Houqin; Kong, Xiangwen; Long, Huashan; Huai, Yinchao

    2018-02-01

    In the West Canadian Sedimentary Basin (WCSB), Duvernay shale is considered to contribute most of the Canadian shale gas reserve and production. According to global shale gas exploration and development practice, reservoir property and well completion quality are the two key factors determining the shale gas economics. The two key factors are strongly depending on shale lithofacies. On the basis of inorganic mineralogy theory, all available thin section, X-ray diffraction, scanning electron microscope (SEM), energy dispersive spectrometer (EDS) data were used to assist lithofacies analysis. Gamma ray (GR), acoustic (AC), bulk density (RHOB), neutron porosity (NPHI) and photoelectric absorption cross-section index (PE) were selected for log response analysis of various minerals. Reservoir representative equation was created constrained by quantitative core analysis results, and matrix mineral percentage of quartz, carbonate, feldspar and pyrite were calculated to classify shale lithofacies. Considering the horizontal continuity of seismic data, rock physics model was built, and acoustic impedance integrated with core data and log data was used to predict the horizontal distribution of different lithofacies. The results indicate that: (1) nine lithofacies can be categorized in Duvernay shale, (2) the horizontal distribution of different lithofacies is quite diversified, siliceous shale mainly occurs in Simonette area, calcareous shale is prone to develop in the vicinity of reef, while calcareous-siliceous shale dominates in Willesdon Green area.

  14. Thermal analysis of a conceptual design for a 250 We GPHS/FPSE space power system

    NASA Technical Reports Server (NTRS)

    Mccomas, Thomas J.; Dugan, Edward T.

    1991-01-01

    A thermal analysis has been performed for a 250-We space nuclear power system which combines the US Department of Energy's general purpose heat source (GPHS) modules with a state-of-the-art free-piston Stirling engine (FPSE). The focus of the analysis is on the temperature of the indium fuel clad within the GPHS modules. The thermal analysis results indicate fuel clad temperatures slightly higher than the design goal temperature of 1573 K. The results are considered favorable due to numerous conservative assumptions used. To demonstrate the effects of the conservatism, a brief sensitivity analysis is performed in which a few of the key system parameters are varied to determine their effect on the fuel clad temperatures. It is shown that thermal analysis of a more detailed thermal mode should yield fuel clad temperatures below 1573 K.

  15. Characterization of the key aroma compounds in beef and pork vegetable gravies á la chef by application of the aroma extract dilution analysis.

    PubMed

    Christlbauer, Monika; Schieberle, Peter

    2009-10-14

    By application of the aroma extract dilution analysis (AEDA) on an aroma distillate isolated from a freshly prepared, stewed beef/vegetable gravy, 52 odor-active compounds were detected in the flavor dilution (FD) factor range of 4-4096. On the basis of high FD factors in combination with the results of the identification experiments, 3-(methylthio)propanal (cooked potato), 3-mercapto-2-methylpentan-1-ol (gravy-like), (E,E)-2,4-decadienal (deep-fried, fatty), 3-hydroxy-4,5-dimethyl-2(5H)-furanone (lovage-like), vanillin (vanilla-like), (E,E)-2,4-nonadienal (deep-fried), and (E)-2-undecenal (metallic) are suggested as key contributors to the aroma of the gravy. To get an insight into the role of the vegetables as sources of gravy odorants, a beef gravy was prepared without vegetables. The AEDA results revealed that, in particular, onions and leek are important sources of gravy aroma compounds, adding particularly the very potent, gravy-like smelling 3-mercapto-2-methylpentan-1-ol to the overall aroma profile. Further compounds that were clearly derived from the vegetables and, thus, are important modifiers of the overall aroma were 4-vinyl-2-methoxyphenol, (E)-beta-damascenone, beta-ionone, 2-isopropyl-3-methoxypyrazine, and 2-(sec-butyl)-3-methoxypyrazine. Interestingly, none of the key odorants detected in the gravy can be assumed to be formed from a reaction between beef and vegetable constituents. A comparison of the odorants in the beef/vegetable gravy with a gravy prepared according to the same procedure, but substituting beef by pork meat, indicated that most of the aroma compounds were identical-although different in FD factors-but the tallowy smelling 12-methyltridecanal was detected as key odorant only in the beef/vegetable gravy.

  16. Proposed Mode of Action for Acrolein Respiratory Toxicity Associated with Inhaled Tobacco Smoke.

    PubMed

    Yeager, R Philip; Kushman, Mary; Chemerynski, Susan; Weil, Roxana; Fu, Xin; White, Marcella; Callahan-Lyon, Priscilla; Rosenfeldt, Hans

    2016-06-01

    This article presents a mode of action (MOA) analysis that identifies key mechanisms in the respiratory toxicity of inhaled acrolein and proposes key acrolein-related toxic events resulting from the inhalation of tobacco smoke. Smoking causes chronic obstructive pulmonary disorder (COPD) and acrolein has been previously linked to the majority of smoking-induced noncancer respiratory toxicity. In contrast to previous MOA analyses for acrolein, this MOA focuses on the toxicity of acrolein in the lower respiratory system, reflecting the exposure that smokers experience upon tobacco smoke inhalation. The key mechanisms of acrolein toxicity identified in this proposed MOA include (1) acrolein chemical reactivity with proteins and other macromolecules of cells lining the respiratory tract, (2) cellular oxidative stress, including compromise of the important anti-oxidant glutathione, (3) chronic inflammation, (4) necrotic cell death leading to a feedback loop where necrosis-induced inflammation leads to more necrosis and oxidative damage and vice versa, (5) tissue remodeling and destruction, and (6) loss of lung elasticity and enlarged lung airspaces. From these mechanisms, the proposed MOA analysis identifies the key cellular processes in acrolein respiratory toxicity that consistently occur with the development of COPD: inflammation and necrosis in the middle and lower regions of the respiratory tract. Moreover, the acrolein exposures that occur as a result of smoking are well above exposures that induce both inflammation and necrosis in laboratory animals, highlighting the importance of the role of acrolein in smoking-related respiratory disease. Published by Oxford University Press on behalf of the Society of Toxicology 2016. This work is written by US Government employees and is in the public domain in the US.

  17. Effect of extreme data loss on heart rate signals quantified by entropy analysis

    NASA Astrophysics Data System (ADS)

    Li, Yu; Wang, Jun; Li, Jin; Liu, Dazhao

    2015-02-01

    The phenomenon of data loss always occurs in the analysis of large databases. Maintaining the stability of analysis results in the event of data loss is very important. In this paper, we used a segmentation approach to generate a synthetic signal that is randomly wiped from data according to the Gaussian distribution and the exponential distribution of the original signal. Then, the logistic map is used as verification. Finally, two methods of measuring entropy-base-scale entropy and approximate entropy-are comparatively analyzed. Our results show the following: (1) Two key parameters-the percentage and the average length of removed data segments-can change the sequence complexity according to logistic map testing. (2) The calculation results have preferable stability for base-scale entropy analysis, which is not sensitive to data loss. (3) The loss percentage of HRV signals should be controlled below the range (p = 30 %), which can provide useful information in clinical applications.

  18. Analysis of Radiation Damage in Light Water Reactors: Comparison of Cluster Analysis Methods for the Analysis of Atom Probe Data.

    PubMed

    Hyde, Jonathan M; DaCosta, Gérald; Hatzoglou, Constantinos; Weekes, Hannah; Radiguet, Bertrand; Styman, Paul D; Vurpillot, Francois; Pareige, Cristelle; Etienne, Auriane; Bonny, Giovanni; Castin, Nicolas; Malerba, Lorenzo; Pareige, Philippe

    2017-04-01

    Irradiation of reactor pressure vessel (RPV) steels causes the formation of nanoscale microstructural features (termed radiation damage), which affect the mechanical properties of the vessel. A key tool for characterizing these nanoscale features is atom probe tomography (APT), due to its high spatial resolution and the ability to identify different chemical species in three dimensions. Microstructural observations using APT can underpin development of a mechanistic understanding of defect formation. However, with atom probe analyses there are currently multiple methods for analyzing the data. This can result in inconsistencies between results obtained from different researchers and unnecessary scatter when combining data from multiple sources. This makes interpretation of results more complex and calibration of radiation damage models challenging. In this work simulations of a range of different microstructures are used to directly compare different cluster analysis algorithms and identify their strengths and weaknesses.

  19. Systematic biology analysis on photosynthetic carbon metabolism of maize leaf following sudden heat shock under elevated CO2.

    PubMed

    Qu, Mingnan; Chen, Genyun; Bunce, James A; Zhu, Xiaocen; Sicher, Richard C

    2018-05-18

    Plants would experience more complex environments, such as sudden heat shock (SHS) stress combined with elevated CO 2 in the future, and might adapt to this stressful condition by optimizing photosynthetic carbon metabolism (PCM). It is interesting to understand whether this acclimation process would be altered in different genotypes of maize under elevated CO 2 , and which metabolites represent key indicators reflecting the photosynthetic rates (P N ) following SHS. Although B76 had greater reduction in P N during SHS treatment, our results indicated that P N in genotype B76, displayed faster recovery after SHS treatment under elevated CO 2 than in genotype B106. Furthermore, we employed a stepwise feature extraction approach by partial linear regression model. Our findings demonstrated that 9 key metabolites over the total (35 metabolites) can largely explain the variance of P N during recovery from SHS across two maize genotypes and two CO 2 grown conditions. Of these key metabolites, malate, valine, isoleucine, glucose and starch are positively correlated with recovery pattern of P N . Malate metabolites responses to SHS were further discussed by incorporating with the activities and gene expression of three C 4 photosynthesis-related key enzymes. We highlighted the importance of malate metabolism during photosynthesis recovery from short-term SHS, and data integration analysis to better comprehend the regulatory framework of PCM in response to abiotic stress.

  20. Sarma-based key-group method for rock slope reliability analyses

    NASA Astrophysics Data System (ADS)

    Yarahmadi Bafghi, A. R.; Verdel, T.

    2005-08-01

    The methods used in conducting static stability analyses have remained pertinent to this day for reasons of both simplicity and speed of execution. The most well-known of these methods for purposes of stability analysis of fractured rock masses is the key-block method (KBM).This paper proposes an extension to the KBM, called the key-group method (KGM), which combines not only individual key-blocks but also groups of collapsable blocks into an iterative and progressive analysis of the stability of discontinuous rock slopes. To take intra-group forces into account, the Sarma method has been implemented within the KGM in order to generate a Sarma-based KGM, abbreviated SKGM. We will discuss herein the hypothesis behind this new method, details regarding its implementation, and validation through comparison with results obtained from the distinct element method.Furthermore, as an alternative to deterministic methods, reliability analyses or probabilistic analyses have been proposed to take account of the uncertainty in analytical parameters and models. The FOSM and ASM probabilistic methods could be implemented within the KGM and SKGM framework in order to take account of the uncertainty due to physical and mechanical data (density, cohesion and angle of friction). We will then show how such reliability analyses can be introduced into SKGM to give rise to the probabilistic SKGM (PSKGM) and how it can be used for rock slope reliability analyses. Copyright

  1. A deliberative framework to identify the need for real-life evidence building of new cancer drugs after interim funding decision.

    PubMed

    Leung, Leanne; de Lemos, Mário L; Kovacic, Laurel

    2017-01-01

    Background With the rising cost of new oncology treatments, it is no longer sustainable to base initial drug funding decisions primarily on prospective clinical trials as their performance in real-life populations are often difficult to determine. In British Columbia, an approach in evidence building is to retrospectively analyse patient outcomes using observational research on an ad hoc basis. Methods The deliberative framework was constructed in three stages: framework design, framework validation and treatment programme characterization, and key informant interview. Framework design was informed through a literature review and analyses of provincial and national decision-making processes. Treatment programmes funded between 2010 and 2013 were used for framework validation. A selection concordance rate of 80% amongst three reviewers was considered to be a validation of the framework. Key informant interviews were conducted to determine the utility of this deliberative framework. Results A multi-domain deliberative framework with 15 assessment parameters was developed. A selection concordance rate of 84.2% was achieved for content validation of the framework. Nine treatment programmes from five different tumour groups were selected for retrospective outcomes analysis. Five contributory factors to funding uncertainties were identified. Key informants agreed that the framework is a comprehensive tool that targets the key areas involved in the funding decision-making process. Conclusions The oncology-based deliberative framework can be routinely used to assess treatment programmes from the major tumour sites for retrospective outcomes analysis. Key informants indicate this is a value-added tool and will provide insight to the current prospective funding model.

  2. Quantum key distribution for composite dimensional finite systems

    NASA Astrophysics Data System (ADS)

    Shalaby, Mohamed; Kamal, Yasser

    2017-06-01

    The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.

  3. Q-marker based strategy for CMC research of Chinese medicine: A case study of Panax Notoginseng saponins.

    PubMed

    Zhong, Yi; Zhu, Jieqiang; Yang, Zhenzhong; Shao, Qing; Fan, Xiaohui; Cheng, Yiyu

    2018-01-31

    To ensure pharmaceutical quality, chemistry, manufacturing and control (CMC) research is essential. However, due to the inherent complexity of Chinese medicine (CM), CMC study of CM remains a great challenge for academia, industry, and regulatory agencies. Recently, quality-marker (Q-marker) was proposed to establish quality standards or quality analysis approaches of Chinese medicine, which sheds a light on Chinese medicine's CMC study. Here manufacture processes of Panax Notoginseng Saponins (PNS) is taken as a case study and the present work is to establish a Q-marker based research strategy for CMC of Chinese medicine. The Q-markers of Panax Notoginseng Saponins (PNS) is selected and established by integrating chemical profile with pharmacological activities. Then, the key processes of PNS manufacturing are identified by material flow analysis. Furthermore, modeling algorithms are employed to explore the relationship between Q-markers and critical process parameters (CPPs) of the key processes. At last, CPPs of the key processes are optimized in order to improving the process efficiency. Among the 97 identified compounds, Notoginsenoside R 1 , ginsenoside Rg 1 , Re, Rb 1 and Rd are selected as the Q-markers of PNS. Our analysis on PNS manufacturing show the extraction process and column chromatography process are the key processes. With the CPPs of each process as the inputs and Q-markers' contents as the outputs, two process prediction models are built separately for the extraction process and column chromatography process of Panax notoginseng, which both possess good prediction ability. Based on the efficiency models of extraction process and column chromatography process we constructed, the optimal CPPs of both processes are calculated. Our results show that the Q-markers derived from CMC research strategy can be applied to analyze the manufacturing processes of Chinese medicine to assure product's quality and promote key processes' efficiency simultaneously. Copyright © 2018 Elsevier GmbH. All rights reserved.

  4. Functions in Contemporary Secondary Mathematics Textbook Series in the United States

    ERIC Educational Resources Information Center

    Ross, Daniel J.

    2011-01-01

    Textbooks play a central role in US mathematics classrooms (Stein, Remillard, & Smith, 2007) and functions are a key topic in secondary mathematics (Carlson, Jacobs, Coe, Larsen, & Hsu, 2002). This study presents results from an analysis of this essential topic in the latest editions of three textbook series: the Glencoe Mathematics…

  5. Developmental and genetic analysis of a short leaf mutant, a key resource for plant architecture modification in sorghum

    USDA-ARS?s Scientific Manuscript database

    Modification in plant architecture have been demonstrated as one of the major contributing factors that ushered in the Green Revolution resulting in achieving dramatic increases in grain yield for wheat and rice. For sorghum (Sorghum bicolor L. Moench.), possible alteration in plant architecture is ...

  6. How Important Is Study Mode in Student University Choice?

    ERIC Educational Resources Information Center

    Hagel, Pauline; Shaw, Robin N.

    2010-01-01

    Conjoint analysis was used to model the importance of study mode in students' choice of university. Study mode was proposed as a key choice attribute as universities have diversified their means of delivering education and increased the use of online delivery. Results are reported for two conjoint experiments. The first investigated how…

  7. ANALYSIS OF FACTORS AFFECTING METHANE GAS RECOVERY FROM SIX LANDFILLS

    EPA Science Inventory

    The report gives results of a pilot study of six U.S. landfills that have methane (CH4) gas recovery systems. NOTE: The study was a first step in developing a field testing program to gather data to identify key variables that affect CH4 generation and to develop an empirical mod...

  8. Predicting Second Language Writing Proficiency: The Roles of Cohesion and Linguistic Sophistication

    ERIC Educational Resources Information Center

    Crossley, Scott A.; McNamara, Danielle S.

    2012-01-01

    This study addresses research gaps in predicting second language (L2) writing proficiency using linguistic features. Key to this analysis is the inclusion of linguistic measures at the surface, textbase and situation model level that assess text cohesion and linguistic sophistication. The results of this study demonstrate that five variables…

  9. An Analysis of the Time Course of Lexical Processing during Reading

    ERIC Educational Resources Information Center

    Sheridan, Heather; Reichle, Erik D.

    2016-01-01

    Reingold, Reichle, Glaholt, and Sheridan (2012) reported a gaze-contingent eye-movement experiment in which survival-curve analyses were used to examine the effects of word frequency, the availability of parafoveal preview, and initial fixation location on the time course of lexical processing. The key results of these analyses suggest that…

  10. Teacher Education and Development Policies: Critical Discourse Analysis from a Comparative Perspective

    ERIC Educational Resources Information Center

    Pini, Monica E.; Gorostiaga, Jorge M.

    2008-01-01

    The purpose of this study is to explore teacher education policies in different countries of Latin America and North America through the comparison of policy documents. The training of teachers, a key component of education, faces educational challenges as a result of various reform policies in different countries. Critical discourse analysis…

  11. Exploring Parent Perceptions of the Food Environment in Youth Sport

    ERIC Educational Resources Information Center

    Thomas, Megan; Nelson, Toben F.; Harwood, Eileen; Neumark-Sztainer, Dianne

    2012-01-01

    Objective: To examine parent perceptions of the food environment in youth sport. Methods: Eight focus group discussions were held with parents (n = 60) of youth aged 6-13 years participating in basketball programs in Minnesota. Key themes and concepts were identified via transcript-based analysis. Results: Parents reported that youth commonly…

  12. Language Trends 2010 Secondary (CILT, ALL, ISMLA) Data Report

    ERIC Educational Resources Information Center

    CILT, the National Centre for Languages, 2011

    2011-01-01

    This survey has been carried out annually since 2002 to track developments in language provision and take up in secondary schools. The following sections are included in this analysis of key results from the Secondary Language Trends survey: (1) Survey background, methodology and sample design; (2) DfE (Department for Education) data trends of…

  13. What Do People Know about Key Environmental Issues? A Review of Environmental Knowledge Surveys

    ERIC Educational Resources Information Center

    Robelia, Beth; Murphy, Tony

    2012-01-01

    This paper presents results from 15 little publicized state and national environmental surveys in the US that used similar questions. Our analysis reveals trends in adult understanding of environmental issues. These trends indicate that many may have difficulty making informed decisions about environmental policy as citizens, voters, and…

  14. Question Number Two: How Many Factors?

    ERIC Educational Resources Information Center

    Goodwyn, Fara

    2012-01-01

    Exploratory factor analysis involves five key decisions. The second decision, how many factors to retain, is the focus of the current paper. Extracting too many or too few factors often leads to devastating effects on study results. The advantages and disadvantages of the most effective and/or most utilized strategies to determine the number of…

  15. Student Satisfaction in Higher Education: A Meta-Analytic Study

    ERIC Educational Resources Information Center

    Santini, Fernando de Oliveira; Ladeira, Wagner Junior; Sampaio, Claudio Hoffmann; da Silva Costa, Gustavo

    2017-01-01

    This paper discusses the results of a meta-analysis performed to identify key antecedent and consequent constructs of satisfaction in higher education. We offer an integrated model to achieve a better understanding of satisfaction in the context of higher education. To accomplish this objective, we identified 83 studies that were valid and…

  16. Variability in University Students' Use of Technology: An "Approaches to Learning" Perspective

    ERIC Educational Resources Information Center

    Mimirinis, Mike

    2016-01-01

    This study reports the results of a cross-case study analysis of how students' approaches to learning are demonstrated in blended learning environments. It was initially propositioned that approaches to learning as key determinants of the quality of student learning outcomes are demonstrated specifically in how students utilise technology in…

  17. Study of Personal and Social Adjustment Ability of the Disabled Pupils

    ERIC Educational Resources Information Center

    Ryabova, Natalia Vladimirovna; Parfyonova, Tatyana Aleksandrovna

    2015-01-01

    The article presents the results of experimental work aimed at studying personal and social adjustment of a child with disabilities. Analysis of domestic and foreign psychological and educational literature allowed us to determine the key concept of the study, namely "social and personal orientation", as a trait of a human's personality,…

  18. MetaCoMET: a web platform for discovery and visualization of the core microbiome

    USDA-ARS?s Scientific Manuscript database

    A key component of the analysis of microbiome datasets is the identification of OTUs shared between multiple experimental conditions, commonly referred to as the core microbiome. Results: We present a web platform named MetaCoMET that enables the discovery and visualization of the core microbiome an...

  19. Targeted Information Dissemination

    DTIC Science & Technology

    2008-03-01

    SETUP, RESULTS AND PERFORMANCE ANALYSIS .......................................... 36 APPENDIX C: TID API SPECIFICATION...are developed using FreePastry1. FreePastry provides an API for a structured P2P overlay network. Information Routing and address resolution is...the TID architecture to demonstrate its key features. TID interface API specifications are described in Appendix C. RSS feeds were used to obtain

  20. Computer Game Design: Opportunities for Successful Learning

    ERIC Educational Resources Information Center

    Robertson, Judy; Howells, Cathrin

    2008-01-01

    Developing children as successful learners is a key aim of "A Curriculum for Excellence" in Scotland. This paper presents qualitative results from an eight week exploratory field study in which a class of ten year olds made their own computer games. The analysis focuses on the development of aspects of successful learning as identified…

  1. Stressors and Stressor Response Levels of Hong Kong Primary School Music Teachers

    ERIC Educational Resources Information Center

    Wong, Marina Wai-yee; Chik, Maria Pik-yuk; Chan, Edmund Sze Shing

    2018-01-01

    Responses from 309 randomly sampled Hong Kong primary school music teachers to the shortened version of the Chinese Teacher Stress Questionnaire were subjected to a descriptive percentage analysis, one-way ANOVA and independent t test. Obtained results identify five key stressors: "changing education policy of the government";…

  2. The Blackberry Image: Self-Identified Perceptions and Motivations Associated with College Student Blackberry Use

    ERIC Educational Resources Information Center

    Firmin, Michael W.; Firmin, Ruth L.; Orient, Katlyn M.; Edwards, Anna J.; Cunliff, Jennifer M.

    2012-01-01

    We report the results of a qualitative research study conducted with university students regarding their phenomenological perspectives of BlackBerry use. Three key themes inductively emerged throughout the interview and analysis process regarding self-perceptions college students reported regarding their own BlackBerry use. First, students offered…

  3. Understanding Textual Authorship in the Digital Environment: Lessons from Historical Perspectives

    ERIC Educational Resources Information Center

    Velagic, Zoran; Hasenay, Damir

    2013-01-01

    Introduction: The paper explains how the modern understanding of authorship developed and sets out the problems to be considered when discussing digital authorship. Method: The contextual analysis of contents of the key themes is employed; in the articulation of the conclusions, analytic and synthetic approaches are used. Results: At each turning…

  4. The Psychedelic Debriefing in Alcohol Dependence Treatment: Illustrating Key Change Phenomena through Qualitative Content Analysis of Clinical Sessions

    PubMed Central

    Nielson, Elizabeth M.; May, Darrick G.; Forcehimes, Alyssa A.; Bogenschutz, Michael P.

    2018-01-01

    Research on the clinical applications of psychedelic-assisted psychotherapy has demonstrated promising early results for treatment of alcohol dependence. Detailed description of the content and methods of psychedelic-assisted psychotherapy, as it is conducted in clinical settings, is scarce. Methods: An open-label pilot (proof-of-concept) study of psilocybin-assisted treatment of alcohol dependence (NCT01534494) was conducted to generate data for a phase 2 RCT (NCT02061293) of a similar treatment in a larger population. The present paper presents a qualitative content analysis of the 17 debriefing sessions conducted in the pilot study, which occurred the day after corresponding psilocybin medication sessions. Results: Participants articulated a series of key phenomena related to change in drinking outcomes and acute subjective effects of psilocybin. Discussion: The data illuminate change processes in patients' own words during clinical sessions, shedding light on potential therapeutic mechanisms of change and how participants express effects of psilocybin. This study is unique in analyzing actual clinical sessions, as opposed to interviews of patients conducted separately from treatment. PMID:29515449

  5. Analysis of factors influencing safety management for metro construction in China.

    PubMed

    Yu, Q Z; Ding, L Y; Zhou, C; Luo, H B

    2014-07-01

    With the rapid development of urbanization in China, the number and size of metro construction projects are increasing quickly. At the same time, and increasing number of accidents in metro construction make it a disturbing focus of social attention. In order to improve safety management in metro construction, an investigation of the participants' perspectives on safety factors in China metro construction has been conducted to identify the key safety factors, and their ranking consistency among the main participants, including clients, consultants, designers, contractors and supervisors. The result of factor analysis indicates that there are five key factors which influence the safety of metro construction including safety attitude, construction site safety, government supervision, market restrictions and task unpredictability. In addition, ANOVA and Spearman rank correlation coefficients were performed to test the consistency of the means rating and the ranking of safety factors. The results indicated that the main participants have significant disagreement about the importance of safety factors on more than half of the items. Suggestions and recommendations on practical countermeasures to improve metro construction safety management in China are proposed. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. CONNJUR R: An annotation strategy for fostering reproducibility in bio-NMR: protein spectral assignment

    PubMed Central

    Fenwick, Matthew; Hoch, Jeffrey C.; Ulrich, Eldon; Gryk, Michael R.

    2015-01-01

    Reproducibility is a cornerstone of the scientific method, essential for validation of results by independent laboratories and the sine qua non of scientific progress. A key step toward reproducibility of biomolecular NMR studies was the establishment of public data repositories (PDB and BMRB). Nevertheless, bio-NMR studies routinely fall short of the requirement for reproducibility that all the data needed to reproduce the results are published. A key limitation is that considerable metadata goes unpublished, notably manual interventions that are typically applied during the assignment of multidimensional NMR spectra. A general solution to this problem has been elusive, in part because of the wide range of approaches and software packages employed in the analysis of protein NMR spectra. Here we describe an approach for capturing missing metadata during the assignment of protein NMR spectra that can be generalized to arbitrary workflows, different software packages, other biomolecules, or other stages of data analysis in bio-NMR. We also present extensions to the NMR-STAR data dictionary that enable machine archival and retrieval of the “missing” metadata. PMID:26253947

  7. Bilateral key comparison SIM.T-K6.1 on humidity standards in the dew/frost-point temperature range from -25 °C to +20 °C

    NASA Astrophysics Data System (ADS)

    Meyer, C. W.; Hill, K. D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC. This paper is the final report of the comparison including analysis of the uncertainty of measurement results. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT WG-KC, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  8. Constant False Alarm Rate (CFAR) Autotrend Evaluation Report

    DTIC Science & Technology

    2011-12-01

    represent a level of uncertainty in the performance analysis. The performance analysis produced the following Key Performance Indicators ( KPIs ) as...Identity KPI Key Performance Indicator MooN M-out-of-N MSPU Modernized Signal Processor Unit NFF No Fault Found PAT Parameter Allocation Table PD

  9. Assessing and Valuing Historical Geospatial Data for Decisions

    NASA Astrophysics Data System (ADS)

    Sylak-Glassman, E.; Gallo, J.

    2016-12-01

    We will present a method for assessing the use and valuation of historical geospatial data and information products derived from Earth observations (EO). Historical data is widely used in the establishment of baseline reference cases, time-series analysis, and Earth system modeling. Historical geospatial data is used in diverse application areas, such as risk assessment in the insurance and reinsurance industry, disaster preparedness and response planning, historical demography, land-use change analysis, and paleoclimate research, among others. Establishing the current value of previously collected data, often from EO systems that are no longer operating, is difficult since the costs associated with their preservation, maintenance, and dissemination are current, while the costs associated with their original collection are sunk. Understanding their current use and value can aid in funding decisions about the data management infrastructure and workforce allocation required to maintain their availability. Using a value-tree framework to trace the application of data from EO systems, sensors, networks, and surveys, to weighted key Federal objectives, we are able to estimate relative contribution of individual EO systems, sensors, networks, and surveys to meeting those objectives. The analysis relies on a modified Delphi method to elicit relative levels of reliance on individual EO data inputs, including historical data, from subject matter experts. This results in the identification of a representative portfolio of all EO data used to meet key Federal objectives. Because historical data is collected in conjunction with all other EO data within a weighted framework, its contribution to meeting key Federal objectives can be specifically identified and evaluated in relationship to other EO data. The results of this method could be applied better understanding and projecting the long-term value of data from current and future EO systems.

  10. A Risk-Based Approach for Aerothermal/TPS Analysis and Testing

    NASA Technical Reports Server (NTRS)

    Wright, Michael J.; Grinstead, Jay H.; Bose, Deepak

    2007-01-01

    The current status of aerothermal and thermal protection system modeling for civilian entry missions is reviewed. For most such missions, the accuracy of our simulations is limited not by the tools and processes currently employed, but rather by reducible deficiencies in the underlying physical models. Improving the accuracy of and reducing the uncertainties in these models will enable a greater understanding of the system level impacts of a particular thermal protection system and of the system operation and risk over the operational life of the system. A strategic plan will be laid out by which key modeling deficiencies can be identified via mission-specific gap analysis. Once these gaps have been identified, the driving component uncertainties are determined via sensitivity analyses. A Monte-Carlo based methodology is presented for physics-based probabilistic uncertainty analysis of aerothermodynamics and thermal protection system material response modeling. These data are then used to advocate for and plan focused testing aimed at reducing key uncertainties. The results of these tests are used to validate or modify existing physical models. Concurrently, a testing methodology is outlined for thermal protection materials. The proposed approach is based on using the results of uncertainty/sensitivity analyses discussed above to tailor ground testing so as to best identify and quantify system performance and risk drivers. A key component of this testing is understanding the relationship between the test and flight environments. No existing ground test facility can simultaneously replicate all aspects of the flight environment, and therefore good models for traceability to flight are critical to ensure a low risk, high reliability thermal protection system design. Finally, the role of flight testing in the overall thermal protection system development strategy is discussed.

  11. Porcine Tissue-Specific Regulatory Networks Derived from Meta-Analysis of the Transcriptome

    PubMed Central

    Pérez-Montarelo, Dafne; Hudson, Nicholas J.; Fernández, Ana I.; Ramayo-Caldas, Yuliaxis; Dalrymple, Brian P.; Reverter, Antonio

    2012-01-01

    The processes that drive tissue identity and differentiation remain unclear for most tissue types. So are the gene networks and transcription factors (TF) responsible for the differential structure and function of each particular tissue, and this is particularly true for non model species with incomplete genomic resources. To better understand the regulation of genes responsible for tissue identity in pigs, we have inferred regulatory networks from a meta-analysis of 20 gene expression studies spanning 480 Porcine Affymetrix chips for 134 experimental conditions on 27 distinct tissues. We developed a mixed-model normalization approach with a covariance structure that accommodated the disparity in the origin of the individual studies, and obtained the normalized expression of 12,320 genes across the 27 tissues. Using this resource, we constructed a network, based on the co-expression patterns of 1,072 TF and 1,232 tissue specific genes. The resulting network is consistent with the known biology of tissue development. Within the network, genes clustered by tissue and tissues clustered by site of embryonic origin. These clusters were significantly enriched for genes annotated in key relevant biological processes and confirm gene functions and interactions from the literature. We implemented a Regulatory Impact Factor (RIF) metric to identify the key regulators in skeletal muscle and tissues from the central nervous systems. The normalization of the meta-analysis, the inference of the gene co-expression network and the RIF metric, operated synergistically towards a successful search for tissue-specific regulators. Novel among these findings are evidence suggesting a novel key role of ERCC3 as a muscle regulator. Together, our results recapitulate the known biology behind tissue specificity and provide new valuable insights in a less studied but valuable model species. PMID:23049964

  12. SCENARIOS FOR MEETING CALIFORNIA'S 2050 CLIMATE GOALS California's Carbon Challenge Phase II Volume I: Non-Electricity Sectors and Overall Scenario Results

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wei, Max; Greenblatt, Jeffrey; Donovan, Sally

    2014-06-01

    This study provides an updated analysis of long-term energy system scenarios for California consistent with the State meeting its 2050 climate goal, including detailed analysis and assessment of electricity system build-out, operation, and costs across the Western Electricity Coordinating Council (WECC) region. Four key elements are found to be critical for the State to achieve its 2050 goal of 80 percent greenhouse (GHG) reductions from the 1990 level: aggressive energy efficiency; clean electricity; widespread electrification of passenger vehicles, building heating, and industry heating; and large-scale production of low-carbon footprint biofuels to largely replace petroleum-based liquid fuels. The approach taken heremore » is that technically achievable energy efficiency measures are assumed to be achieved by 2050 and aggregated with the other key elements mentioned above to estimate resultant emissions in 2050. The energy and non-energy sectors are each assumed to have the objective of meeting an 80 percent reduction from their respective 1990 GHG levels for the purposes of analysis. A different partitioning of energy and non-energy sector GHG greenhouse reductions is allowed if emission reductions in one sector are more economic or technically achievable than in the other. Similarly, within the energy or non-energy sectors, greater or less than 80 percent reduction from 1990 is allowed for sub-sectors within the energy or non-energy sectors as long as the overall target is achieved. Overall emissions for the key economy-wide scenarios are considered in this report. All scenarios are compliant or nearly compliant with the 2050 goal. This finding suggests that multiple technical pathways exist to achieve the target with aggressive policy support and continued technology development of largely existing technologies.« less

  13. Pelagic Habitat Analysis Module (PHAM) for GIS Based Fisheries Decision Support

    NASA Technical Reports Server (NTRS)

    Kiefer, D. A.; Armstrong, Edward M.; Harrison, D. P.; Hinton, M. G.; Kohin, S.; Snyder, S.; O'Brien, F. J.

    2011-01-01

    We have assembled a system that integrates satellite and model output with fisheries data We have developed tools that allow analysis of the interaction between species and key environmental variables Demonstrated the capacity to accurately map habitat of Thresher Sharks Alopias vulpinus & pelagicus. Their seasonal migration along the California Current is at least partly driven by the seasonal migration of sardine, key prey of the sharks.We have assembled a system that integrates satellite and model output with fisheries data We have developed tools that allow analysis of the interaction between species and key environmental variables Demonstrated the capacity to accurately map habitat of Thresher Sharks Alopias vulpinus nd pelagicus. Their seasonal migration along the California Current is at least partly driven by the seasonal migration of sardine, key prey of the sharks.

  14. Differential Fault Analysis on CLEFIA

    NASA Astrophysics Data System (ADS)

    Chen, Hua; Wu, Wenling; Feng, Dengguo

    CLEFIA is a new 128-bit block cipher proposed by SONY corporation recently. The fundamental structure of CLEFIA is a generalized Feistel structure consisting of 4 data lines. In this paper, the strength of CLEFIA against the differential fault attack is explored. Our attack adopts the byte-oriented model of random faults. Through inducing randomly one byte fault in one round, four bytes of faults can be simultaneously obtained in the next round, which can efficiently reduce the total induce times in the attack. After attacking the last several rounds' encryptions, the original secret key can be recovered based on some analysis of the key schedule. The data complexity analysis and experiments show that only about 18 faulty ciphertexts are needed to recover the entire 128-bit secret key and about 54 faulty ciphertexts for 192/256-bit keys.

  15. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique.

    PubMed

    Lin, Chao; Shen, Xueju; Wang, Zhisong; Zhao, Cheng

    2014-06-20

    We demonstrate a novel optical asymmetric cryptosystem based on the principle of elliptical polarized light linear truncation and a numerical reconstruction technique. The device of an array of linear polarizers is introduced to achieve linear truncation on the spatially resolved elliptical polarization distribution during image encryption. This encoding process can be characterized as confusion-based optical cryptography that involves no Fourier lens and diffusion operation. Based on the Jones matrix formalism, the intensity transmittance for this truncation is deduced to perform elliptical polarized light reconstruction based on two intensity measurements. Use of a quick response code makes the proposed cryptosystem practical, with versatile key sensitivity and fault tolerance. Both simulation and preliminary experimental results that support theoretical analysis are presented. An analysis of the resistance of the proposed method on a known public key attack is also provided.

  16. Emerging issues in biodiversity & conservation management: The need for a palaeoecological perspective

    NASA Astrophysics Data System (ADS)

    Froyd, C. A.; Willis, K. J.

    2008-09-01

    The study of Quaternary environmental change is directly applicable to on-going issues of global conservation. Palaeoecological research techniques provide the tools to address some of the key questions presently being asked by conservation ecologists and land management organizations. But is this type of analysis currently being utilized to its full potential? Are the results of palaeoenvironmental analyses routinely applied to practical issues of natural resource management, and if not what can be done to expand the application of this research within the conservation community? This paper reviews recent developments in the application of the analysis of late Quaternary environmental change to key environmental issues of biodiversity and conservation management and examines areas which could be strengthened in the future including: (i) determination of baselines and natural ecosystem variability; (ii) understanding ecological thresholds and resilience; (iii) climate change conservation strategies; (iv) biological invasions; and (v) conservation and culture.

  17. An Analysis of BBC Television Coverage of the 2014 Invictus Games.

    PubMed

    Shirazipour, Celina H; Meehan, Madelaine; Latimer-Cheung, Amy E

    2017-01-01

    The Invictus Games are a parasport competition for service members and veterans with illnesses and injuries. The 2014 Games were aired by the BBC, for a total of 12 hr of coverage. This study aimed to investigate what messages were conveyed regarding parasport for veterans during the BBC's Invictus Games broadcast. A content analysis was conducted. Five qualitative themes were identified: sport as rehabilitation, the promotion of ability over disability, the social environment, key outcomes of participation, and the importance of competition. Quantitative results indicated that 2 segment types accounted for the majority of the broadcast: sport coverage (50.57%) and athlete experiences (12.56%). Around half of the coverage focused on participants with a physical disability (51.62%). The findings demonstrate key similarities to and differences from previous explorations of parasport media coverage, with the needs of the event and athlete population potentially influencing the broadcast.

  18. Attribution of Observed Streamflow Changes in Key British Columbia Drainage Basins

    NASA Astrophysics Data System (ADS)

    Najafi, Mohammad Reza; Zwiers, Francis W.; Gillett, Nathan P.

    2017-11-01

    We study the observed decline in summer streamflow in four key river basins in British Columbia (BC), Canada, using a formal detection and attribution (D&A) analysis procedure. Reconstructed and simulated streamflow is generated using the semidistributed variable infiltration capacity hydrologic model, which is driven by 1/16° gridded observations and downscaled climate model data from the Coupled Model Intercomparison Project phase 5 (CMIP5), respectively. The internal variability of the regional hydrologic components using 5100 years of streamflow was simulated using CMIP5 preindustrial control runs. Results show that the observed changes in summer streamflow are inconsistent with simulations representing the responses to natural forcing factors alone, while the response to anthropogenic and natural forcing factors combined is detected in these changes. A two-signal D&A analysis indicates that the effects of anthropogenic (ANT) forcing factors are discernable from natural forcing in BC, albeit with large uncertainties.

  19. Optimizing prognosis-related key miRNA-target interactions responsible for cancer metastasis.

    PubMed

    Zhao, Hongying; Yuan, Huating; Hu, Jing; Xu, Chaohan; Liao, Gaoming; Yin, Wenkang; Xu, Liwen; Wang, Li; Zhang, Xinxin; Shi, Aiai; Li, Jing; Xiao, Yun

    2017-12-12

    Increasing evidence suggests that the abnormality of microRNAs (miRNAs) and their downstream targets is frequently implicated in the pathogenesis of human cancers, however, the clinical benefit of causal miRNA-target interactions has been seldom studied. Here, we proposed a computational method to optimize prognosis-related key miRNA-target interactions by combining transcriptome and clinical data from thousands of TCGA tumors across 16 cancer types. We obtained a total of 1,956 prognosis-related key miRNA-target interactions between 112 miRNAs and 1,443 their targets. Interestingly, these key target genes are specifically involved in tumor progression-related functions, such as 'cell adhesion' and 'cell migration'. Furthermore, they are most significantly correlated with 'tissue invasion and metastasis', a hallmark of metastasis, in ten distinct types of cancer through the hallmark analysis. These results implicated that the prognosis-related key miRNA-target interactions were highly associated with cancer metastasis. Finally, we observed that the combination of these key miRNA-target interactions allowed to distinguish patients with good prognosis from those with poor prognosis both in most TCGA cancer types and independent validation sets, highlighting their roles in cancer metastasis. We provided a user-friendly database named miRNATarget (freely available at http://biocc.hrbmu.edu.cn/miRNATar/), which provides an overview of the prognosis-related key miRNA-target interactions across 16 cancer types.

  20. A Quality Function Deployment Framework for the Service Quality of Health Information Websites

    PubMed Central

    Kim, Dohoon

    2010-01-01

    Objectives This research was conducted to identify both the users' service requirements on health information websites (HIWs) and the key functional elements for running HIWs. With the quality function deployment framework, the derived service attributes (SAs) are mapped into the suppliers' functional characteristics (FCs) to derive the most critical FCs for the users' satisfaction. Methods Using the survey data from 228 respondents, the SAs, FCs and their relationships were analyzed using various multivariate statistical methods such as principal component factor analysis, discriminant analysis, correlation analysis, etc. Simple and compound FC priorities were derived by matrix calculation. Results Nine factors of SAs and five key features of FCs were identified, and these served as the basis for the house of quality model. Based on the compound FC priorities, the functional elements pertaining to security and privacy, and usage support should receive top priority in the course of enhancing HIWs. Conclusions The quality function deployment framework can improve the FCs of the HIWs in an effective, structured manner, and it can also be utilized for critical success factors together with their strategic implications for enhancing the service quality of HIWs. Therefore, website managers could efficiently improve website operations by considering this study's results. PMID:21818418

  1. Confirmatory Factor Analysis of a Questionnaire Measure of Managerial Stigma Towards Employee Depression.

    PubMed

    Martin, Angela J; Giallo, Rebecca

    2016-12-01

    Managers' attitudes play a key role in how organizations respond to employees with depression. We examine the measurement properties of a questionnaire designed to assess managerial stigma towards employees with depression. Using data from a sample of 469 Australian managers representing a wide range of industries and work settings, we conducted a confirmatory factor analysis to assess three proposed subscales representing affective, cognitive and behavioural forms of stigma. Results were equivocal indicating acceptable fit for two-factor (affective and cognitive + behavioural), three-factor (affective, cognitive and behavioural) and higher order models. Failure to demonstrate the discriminant validity of the cognitive and behavioural dimensions, even though they are theoretically distinct, suggests that further work on the scale is warranted. These results provide an extension to the psychometric profile of this measure (exploratory factor analysis; Martin, ). Development of strategies to operationalize this construct will benefit occupational health research and practice, particularly in interventions that aim to reduce the stigma of mental health issues in the workplace or where managers' attitudes are a key mechanism in intervention efficacy. We encourage future research on this measure pertaining in particular to further enhancing all aspects of its construct validity. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  2. Describing the complexity of systems: multivariable "set complexity" and the information basis of systems biology.

    PubMed

    Galas, David J; Sakhanenko, Nikita A; Skupin, Alexander; Ignac, Tomasz

    2014-02-01

    Context dependence is central to the description of complexity. Keying on the pairwise definition of "set complexity," we use an information theory approach to formulate general measures of systems complexity. We examine the properties of multivariable dependency starting with the concept of interaction information. We then present a new measure for unbiased detection of multivariable dependency, "differential interaction information." This quantity for two variables reduces to the pairwise "set complexity" previously proposed as a context-dependent measure of information in biological systems. We generalize it here to an arbitrary number of variables. Critical limiting properties of the "differential interaction information" are key to the generalization. This measure extends previous ideas about biological information and provides a more sophisticated basis for the study of complexity. The properties of "differential interaction information" also suggest new approaches to data analysis. Given a data set of system measurements, differential interaction information can provide a measure of collective dependence, which can be represented in hypergraphs describing complex system interaction patterns. We investigate this kind of analysis using simulated data sets. The conjoining of a generalized set complexity measure, multivariable dependency analysis, and hypergraphs is our central result. While our focus is on complex biological systems, our results are applicable to any complex system.

  3. Micro-Raman spectroscopy: The analysis of micrometer and submicrometer atmospheric aerosols

    NASA Technical Reports Server (NTRS)

    Klainer, S. M.; Milanovich, F. P.

    1985-01-01

    A nondestructive method of molecular analysis which is required to fully utilize the information contained within a collected particle is discussed. Upper atmosphere reaction mechanisms are assessed when the chemical compounds, the use of micro-Raman spectrometric techniques to perform micron and submicron particle analysis was evaluated. The results are favorable and it is concluded that micron and submicron particles can be analyzed by the micron-Raman approach. Completely automatic analysis should be possible to 0.3 micro m. No problems are anticipated with photo or thermal decomposition. Sample and impurity fluorescence are the key source of background as they cannot be completely eliminated.

  4. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  5. Cross-orientation interactions in human vision.

    PubMed

    Roeber, Urte; Wong, Elaine M Y; Freeman, Alan W

    2008-03-18

    Humans can discriminate one visual contour from another on the basis of small differences in orientation. This capability depends on cortical detectors that are selective for a small range of orientations. We have measured this orientation bandwidth and the suppression that helps to shape it, with a reverse correlation technique. Human subjects were presented with a stream of randomly oriented gratings at a rate of 30 per second. Their task was to press a key whenever they saw an orientation nominated as the target. We analyzed the data by finding the probability density of two orientations: One preceded the key-press by the reaction time, and the second preceded the first by up to 100 ms. The results were as follows: (1) One grating facilitated the following one in producing a key-press when the gratings differed little in orientation. The estimate of orientation bandwidth resulting from this facilitation was 38 degrees . (2) A large angle between the two orientations reduced the probability of a key-press. This finding was best modelled as a suppression that did not vary with orientation, consistent with the idea that cross-orientation suppression is non-oriented. (3) Analysis of non-consecutive grating pairs showed that cross-orientation interactions lasted no longer than 67 ms.

  6. Study on the Preliminary Design of ARGO-M Operation System

    NASA Astrophysics Data System (ADS)

    Seo, Yoon-Kyung; Lim, Hyung-Chul; Rew, Dong-Young; Jo, Jung Hyun; Park, Jong-Uk; Park, Eun-Seo; Park, Jang-Hyun

    2010-12-01

    Korea Astronomy and Space Science Institute has been developing one mobile satellite laser ranging system named as accurate ranging system for geodetic observation-mobile (ARGO-M). Preliminary design of ARGO-M operation system (AOS) which is one of the ARGO-M subsystems was completed in 2009. Preliminary design results are applied to the following development phase by performing detailed design with analysis of pre-defined requirements and analysis of the derived specifications. This paper addresses the preliminary design of the whole AOS. The design results in operation and control part which is a key part in the operation system are described in detail. Analysis results of the interface between operation-supporting hardware and the control computer are summarized, which is necessary in defining the requirements for the operation-supporting hardware. Results of this study are expected to be used in the critical design phase to finalize the design process.

  7. The Role of Theory of Mind on Social Information Processing in Children With Autism Spectrum Disorders: A Mediation Analysis.

    PubMed

    Mazza, Monica; Mariano, Melania; Peretti, Sara; Masedu, Francesco; Pino, Maria Chiara; Valenti, Marco

    2017-05-01

    Individuals with autism spectrum disorders (ASD) show significant impairments in social skills and theory of mind (ToM). The aim of this study was to evaluate ToM and social information processing abilities in 52 children with ASD compared to 55 typically developing (TD) children. A mediation analysis evaluated whether social information processing abilities can be mediated by ToM competences. In our results, children with autism showed a deficit in social skills and ToM components. The innovative results of our study applying mediation analysis demonstrate that ToM plays a key role in the development of social abilities, and the lack of ToM competences in children with autism impairs their competent social behavior.

  8. Modeling Payload Stowage Impacts on Fire Risks On-Board the International Space Station

    NASA Technical Reports Server (NTRS)

    Anton, Kellie e.; Brown, Patrick F.

    2010-01-01

    The purpose of this presentation is to determine the risks of fire on-board the ISS due to non-standard stowage. ISS stowage is constantly being reexamined for optimality. Non-standard stowage involves stowing items outside of rack drawers, and fire risk is a key concern and is heavily mitigated. A Methodology is needed to account for fire risk due to non-standard stowage to capture the risk. The contents include: 1) Fire Risk Background; 2) General Assumptions; 3) Modeling Techniques; 4) Event Sequence Diagram (ESD); 5) Qualitative Fire Analysis; 6) Sample Qualitative Results for Fire Risk; 7) Qualitative Stowage Analysis; 8) Sample Qualitative Results for Non-Standard Stowage; and 9) Quantitative Analysis Basic Event Data.

  9. Key technique study and application of infrared thermography in hypersonic wind tunnel

    NASA Astrophysics Data System (ADS)

    LI, Ming; Yang, Yan-guang; Li, Zhi-hui; Zhu, Zhi-wei; Zhou, Jia-sui

    2014-11-01

    The solutions to some key techniques using infrared thermographic technique in hypersonic wind tunnel, such as temperature measurement under great measurement angle, the corresponding relation between model spatial coordinates and the ones in infrared map, the measurement uncertainty analysis of the test data etc., are studied. The typical results in the hypersonic wind tunnel test are presented, including the comparison of the transfer rates on a thin skin flat plate model with a wedge measured with infrared thermography and thermocouple, the experimental study heating effect on the flat plate model impinged by plume flow and the aerodynamic heating on the lift model.

  10. Combining Cryptography with EEG Biometrics

    PubMed Central

    Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  11. Combining Cryptography with EEG Biometrics.

    PubMed

    Damaševičius, Robertas; Maskeliūnas, Rytis; Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  12. A Novel Image Encryption Algorithm Based on DNA Subsequence Operation

    PubMed Central

    Zhang, Qiang; Xue, Xianglian; Wei, Xiaopeng

    2012-01-01

    We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack. PMID:23093912

  13. Determinants for the success of regional ICT ventures: a close examination of South Korea.

    PubMed

    Park, Eunil; Kim, Ki Joon; Kwon, Sang Jib; Ohm, Jay Y; Del Pobil, Angel P; Yoo, Kyeongsik

    2016-01-01

    This study identifies the key motivational factors in enhancing economic performance and increasing new job opportunities for information and communication technology ventures (ICTVs) in South Korea and examines their potential causal relationships through structural equation modeling analysis on data collected from over 200 ICTVs located in Daedeok Innopolis. The results indicate that the economic performance of ICTVs is determined mainly by government support, innovation effort, and private equity and support. Government support and innovation effort are also positively associated with new job opportunities. The theoretical, industrial implications of the key findings, and recommendations for the Korean government are discussed.

  14. The identification of key genes and pathways in hepatocellular carcinoma by bioinformatics analysis of high-throughput data.

    PubMed

    Zhang, Chaoyang; Peng, Li; Zhang, Yaqin; Liu, Zhaoyang; Li, Wenling; Chen, Shilian; Li, Guancheng

    2017-06-01

    Liver cancer is a serious threat to public health and has fairly complicated pathogenesis. Therefore, the identification of key genes and pathways is of much importance for clarifying molecular mechanism of hepatocellular carcinoma (HCC) initiation and progression. HCC-associated gene expression dataset was downloaded from Gene Expression Omnibus database. Statistical software R was used for significance analysis of differentially expressed genes (DEGs) between liver cancer samples and normal samples. Gene Ontology (GO) term enrichment analysis and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway analysis, based on R software, were applied for the identification of pathways in which DEGs significantly enriched. Cytoscape software was for the construction of protein-protein interaction (PPI) network and module analysis to find the hub genes and key pathways. Finally, weighted correlation network analysis (WGCNA) was conducted to further screen critical gene modules with similar expression pattern and explore their biological significance. Significance analysis identified 1230 DEGs with fold change >2, including 632 significantly down-regulated DEGs and 598 significantly up-regulated DEGs. GO term enrichment analysis suggested that up-regulated DEG significantly enriched in immune response, cell adhesion, cell migration, type I interferon signaling pathway, and cell proliferation, and the down-regulated DEG mainly enriched in response to endoplasmic reticulum stress and endoplasmic reticulum unfolded protein response. KEGG pathway analysis found DEGs significantly enriched in five pathways including complement and coagulation cascades, focal adhesion, ECM-receptor interaction, antigen processing and presentation, and protein processing in endoplasmic reticulum. The top 10 hub genes in HCC were separately GMPS, ACACA, ALB, TGFB1, KRAS, ERBB2, BCL2, EGFR, STAT3, and CD8A, which resulted from PPI network. The top 3 gene interaction modules in PPI network enriched in immune response, organ development, and response to other organism, respectively. WGCNA revealed that the confirmed eight gene modules significantly enriched in monooxygenase and oxidoreductase activity, response to endoplasmic reticulum stress, type I interferon signaling pathway, processing, presentation and binding of peptide antigen, cellular response to cadmium and zinc ion, cell locomotion and differentiation, ribonucleoprotein complex and RNA processing, and immune system process, respectively. In conclusion, we identified some key genes and pathways closely related with HCC initiation and progression by a series of bioinformatics analysis on DEGs. These screened genes and pathways provided for a more detailed molecular mechanism underlying HCC occurrence and progression, holding promise for acting as biomarkers and potential therapeutic targets.

  15. Identification and comparison of aberrant key regulatory networks in breast, colon, liver, lung, and stomach cancers through methylome database analysis.

    PubMed

    Kim, Byungtak; Kang, Seongeun; Jeong, Gookjoo; Park, Sung-Bin; Kim, Sun Jung

    2014-01-01

    Aberrant methylation of specific CpG sites at the promoter is widely responsible for genesis and development of various cancer types. Even though the microarray-based methylome analyzing techniques have contributed to the elucidation of the methylation change at the genome-wide level, the identification of key methylation markers or top regulatory networks appearing common in highly incident cancers through comparison analysis is still limited. In this study, we in silico performed the genome-wide methylation analysis on each 10 sets of normal and cancer pairs of five tissues: breast, colon, liver, lung, and stomach. The methylation array covers 27,578 CpG sites, corresponding to 14,495 genes, and significantly hypermethylated or hypomethylated genes in the cancer were collected (FDR adjusted p-value <0.05; methylation difference >0.3). Analysis of the dataset confirmed the methylation of previously known methylation markers and further identified novel methylation markers, such as GPX2, CLDN15, and KL. Cluster analysis using the methylome dataset resulted in a diagram with a bipartite mode distinguishing cancer cells from normal cells regardless of tissue types. The analysis further revealed that breast cancer was closest with lung cancer, whereas it was farthest from colon cancer. Pathway analysis identified that either the "cancer" related network or the "cancer" related bio-function appeared as the highest confidence in all the five cancers, whereas each cancer type represents its tissue-specific gene sets. Our results contribute toward understanding the essential abnormal epigenetic pathways involved in carcinogenesis. Further, the novel methylation markers could be applied to establish markers for cancer prognosis.

  16. A network analysis of the Chinese medicine Lianhua-Qingwen formula to identify its main effective components.

    PubMed

    Wang, Chun-Hua; Zhong, Yi; Zhang, Yan; Liu, Jin-Ping; Wang, Yue-Fei; Jia, Wei-Na; Wang, Guo-Cai; Li, Zheng; Zhu, Yan; Gao, Xiu-Mei

    2016-02-01

    Chinese medicine is known to treat complex diseases with multiple components and multiple targets. However, the main effective components and their related key targets and functions remain to be identified. Herein, a network analysis method was developed to identify the main effective components and key targets of a Chinese medicine, Lianhua-Qingwen Formula (LQF). The LQF is commonly used for the prevention and treatment of viral influenza in China. It is composed of 11 herbs, gypsum and menthol with 61 compounds being identified in our previous work. In this paper, these 61 candidate compounds were used to find their related targets and construct the predicted-target (PT) network. An influenza-related protein-protein interaction (PPI) network was constructed and integrated with the PT network. Then the compound-effective target (CET) network and compound-ineffective target network (CIT) were extracted, respectively. A novel approach was developed to identify effective components by comparing CET and CIT networks. As a result, 15 main effective components were identified along with 61 corresponding targets. 7 of these main effective components were further experimentally validated to have antivirus efficacy in vitro. The main effective component-target (MECT) network was further constructed with main effective components and their key targets. Gene Ontology (GO) analysis of the MECT network predicted key functions such as NO production being modulated by the LQF. Interestingly, five effective components were experimentally tested and exhibited inhibitory effects on NO production in the LPS induced RAW 264.7 cell. In summary, we have developed a novel approach to identify the main effective components in a Chinese medicine LQF and experimentally validated some of the predictions.

  17. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    NASA Astrophysics Data System (ADS)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    Over the past few decades, Scleractinian coral populations in the Florida Keys have increasingly experienced mortality due to bleaching events as well as microbial mediated illnesses such as black band and white band disease. Such pathologies seem to be most correlated with elevated sea surface temperatures, increased UV exposures, and shifts in the microbial community living on the coral itself. Recent studies indicate that corals’ exposure to UV in the Florida Keys is primarily controlled by the concentration of CDOM (Chromophoric Dissolved Organic Matter) in the water column. Further, microbial community alterations may be linked to changes in concentration and chemical composition of the larger DOM (Dissolved Organic Matter) pool. Our research characterized the spatial and temporal properties of DOM in Florida Bay and along the Keys ecosystems using DOC analyses, in-situ water column optical measurements, and spectral analyses including absorbance and fluorescence measurements. We analyzed DOM characteristics along transects running from the mouth of the Shark River at the southwest base of the Everglades, through Florida Bay, and along near-shore Keys coastal waters. Two 12 hour time-series samplings were also performed at the Seven-Mile Bridge, the primary Florida Bay discharge channel to the lower Keys region. Photo-bleaching experiments showed that the chemical characteristics of the DOM pool are altered by exposure to solar radiation. Results also show that DOC (~0.8-5.8 mg C/L) and CDOM (~0.5-16.5 absorbance coefficient at 305nm) concentrations exhibit seasonal fluctuations in our study region. EEM analyses suggest seasonal transitions between primarily marine (summer) and terrestrial (winter) sources along the Keys. We are currently combining EEM-PARAFAC analysis with in-situ optical measurements to model changes in the spectral properties of DOM in the water column. Additionally, we are using stable δ13C isotopic analysis to further characterize DOM sources. Information generated by our study will provide a valuable data set for better understanding DOM bio-geochemical dynamics along the Florida Keys ecosystem and information for future studies linking DOM and the coral community.

  18. Numerical models analysis of energy conversion process in air-breathing laser propulsion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hong Yanji; Song Junling; Cui Cunyan

    Energy source was considered as a key essential in this paper to describe energy conversion process in air-breathing laser propulsion. Some secondary factors were ignored when three independent modules, ray transmission module, energy source term module and fluid dynamic module, were established by simultaneous laser radiation transportation equation and fluid mechanics equation. The incidence laser beam was simulated based on ray tracing method. The calculated results were in good agreement with those of theoretical analysis and experiments.

  19. Music is Beneficial for Awake Craniotomy Patients: A Qualitative Study.

    PubMed

    Jadavji-Mithani, Radhika; Venkatraghavan, Lashmi; Bernstein, Mark

    2015-01-01

    Patients undergoing awake craniotomy may experience high levels of stress. Minimizing anxiety benefits patients and surgeons. Music has many therapeutic effects in altering human mood and emotion. Tonality of music as conveyed by composition in major or minor keys can have an impact on patients' emotions and thoughts. Assessing the effects of listening to major and minor key musical pieces on patients undergoing awake craniotiomy could help in the design of interventions to alleviate anxiety, stress and tension. Twenty-nine patients who were undergoing awake craniotomy were recruited and randomly assigned into two groups: Group 1 subjects listened to major key music and Group 2 listened to minor key compositions. Subjects completed a demographics questionnaire, a pre- and post-operative Beck Anxiety Inventory (BAI) and a semi-structured open-ended interview. RESULTS were analyzed using modified thematic analysis through open and axial coding. Overall, patients enjoyed the music regardless of the key distinctions and stated they benefitted from listening to the music. No adverse reactions to the music were found. Subjects remarked that the music made them feel more at ease and less anxious before, during and after their procedure. Patients preferred either major key or minor key music but not a combination of both. Those who preferred major key pieces said it was on the basis of tonality while the individuals who selected minor key pieces stated that tempo of the music was the primary factor. Overall, listening to music selections was beneficial for the patients. Future work should further investigate the effects of audio interventions in awake surgery through narrative means.

  20. 3D-QSAR and docking studies of flavonoids as potent Escherichia coli inhibitors

    PubMed Central

    Fang, Yajing; Lu, Yulin; Zang, Xixi; Wu, Ting; Qi, XiaoJuan; Pan, Siyi; Xu, Xiaoyun

    2016-01-01

    Flavonoids are potential antibacterial agents. However, key substituents and mechanism for their antibacterial activity have not been fully investigated. The quantitative structure-activity relationship (QSAR) and molecular docking of flavonoids relating to potent anti-Escherichia coli agents were investigated. Comparative molecular field analysis (CoMFA) and comparative molecular similarity indices analysis (CoMSIA) were developed by using the pIC50 values of flavonoids. The cross-validated coefficient (q2) values for CoMFA (0.743) and for CoMSIA (0.708) were achieved, illustrating high predictive capabilities. Selected descriptors for the CoMFA model were ClogP (logarithm of the octanol/water partition coefficient), steric and electrostatic fields, while, ClogP, electrostatic and hydrogen bond donor fields were used for the CoMSIA model. Molecular docking results confirmed that half of the tested flavonoids inhibited DNA gyrase B (GyrB) by interacting with adenosine-triphosphate (ATP) pocket in a same orientation. Polymethoxyl flavones, flavonoid glycosides, isoflavonoids changed their orientation, resulting in a decrease of inhibitory activity. Moreover, docking results showed that 3-hydroxyl, 5-hydroxyl, 7-hydroxyl and 4-carbonyl groups were found to be crucial active substituents of flavonoids by interacting with key residues of GyrB, which were in agreement with the QSAR study results. These results provide valuable information for structure requirements of flavonoids as antibacterial agents. PMID:27049530

  1. Final report on EURAMET.QM-K12: EURAMET key comparison on the determination of the mass fraction of creatinine in serum

    NASA Astrophysics Data System (ADS)

    Bell, David; Hopley, Chris; Ellison, Stephen L. R.; O'Connor, Gavin

    2013-01-01

    Creatinine is a well-known marker for the evaluation of kidney function. Its routine measurement is undertaken by many clinical laboratories and comparable results over distance and time are required for effective diagnosis. To address this need many National Measurement Institutes (or designated institutes) provide services in this area via the provision of higher order standards or reference measurements. The organic analysis working group of the consultative committee for amount of substance have conducted two previous key comparisons to assess the equivalence of institutes who provide such services. The purpose of this study was to enable institutes who missed the previous studies to demonstrate their capability for characterizing serum materials containing 1 µg/g to 100 µg/g of creatinine. The study material consisted of two lyophilized serum samples which were used in an external quality control proficiency testing scheme. No target values were available for these materials and all participants reported results within the one month timeframe given for analysis. Five institutes participated in the key study and a single institute submitted results for the parallel pilot study. All participants in the key study used isotope dilution with either gas or liquid chromatography coupled with mass spectrometry. The pilot study laboratory used a novel isotope dilution surface-enhanced Raman spectroscopy method. The comparison reference value for each material was set as the mean of all results submitted by those participating in the key study. The choice of the reference value estimator was constrained as it was deemed more appropriate to treat the data in a similar manner to CCQM-K12 if the relative degrees of equivalence were to be compared. This resulted in reference values of (54.27 ± 0.72) µg/g and (38.01 ± 0.42) µg/g for the two separate materials. The relative degrees of equivalence were calculated and these were compared with the relative degrees of equivalence of participants in CCQM-K12. The range of participants' results in EURAMET.QM-K12 for both levels (2% and 3% respectively for materials A and B) was greater than the 1% achieved in CCQM-K12. However, it was concluded that this study was suitable to support CMCs for creatinine in serum for 1 µg/g to 100 µg/g with uncertainties at the 1% to 1.5% level. This was found to be fit for purpose and consistent with the majority of CMCs currently approved. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  2. Develop and test fuel cell powered on-site integrated total energy system

    NASA Technical Reports Server (NTRS)

    Kaufman, A.; Feigenbaum, H.; Wang, C. L.; Werth, J.; Whelan, J. A.

    1983-01-01

    Test results are presented for a 24 cell, two sq ft (4kW) stack. This stack is a precursor to a 25kW stack that is a key milestone. Results are discussed in terms of cell performance, electrolyte management, thermal management, and reactant gas manifolding. The results obtained in preliminary testing of a 50kW methanol processing subsystem are discussed. Subcontracting activities involving application analysis for fuel cell on site integrated energy systems are updated.

  3. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome

    PubMed Central

    2010-01-01

    Background Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Results Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p < 0.05), followed by muscle (601 genes) and adipose (16 genes). Results from modified GSEA showed that the high-CLA beef diet affected diverse biological processes across the three tissues, and that the majority of pathway changes reached significance only with the bi-directional test. Combining the liver tissue microarray results with plasma marker data revealed 110 CLA-sensitive genes showing strong canonical correlation with one or more plasma markers of metabolic health, and 9 significantly overrepresented pathways among this set; each of these pathways was also significantly changed by the high-CLA diet. Closer inspection of two of these pathways - selenoamino acid metabolism and steroid biosynthesis - illustrated clear diet-sensitive changes in constituent genes, as well as strong correlations between gene expression and plasma markers of metabolic syndrome independent of the dietary effect. Conclusion Bi-directional gene set enrichment analysis more accurately reflects dynamic regulatory behaviour in biochemical pathways, and as such highlighted biologically relevant changes that were not detected using a traditional approach. In such cases where transcriptomic response to treatment is exceptionally large, canonical correlation analysis in conjunction with Fisher's exact test highlights the subset of pathways showing strongest correlation with the clinical markers of interest. In this case, we have identified selenoamino acid metabolism and steroid biosynthesis as key pathways mediating the observed relationship between metabolic health and high-CLA beef. These results indicate that this type of analysis has the potential to generate novel transcriptome-based biomarkers of disease. PMID:20929581

  4. CCQM K6.2 determination of total cholesterol in human serum

    NASA Astrophysics Data System (ADS)

    Wise, Stephen A.; Phinney, Karen W.; Duewer, David L.; Sniegoski, Lorna T.; Welch, Michael J.; Pabello, Guiomar; Avila Caldero, Marco A.; Qinde, Liu; Kooi, Lee Tong; Rego, Eliane; Garrido, Bruno; Allegri, Gabriella; de La Cruz, Marcia; Barrabin, Juliana; Puglisi, Celia; Lopez, Eduardo; Lee, Hwashim; Kim, Byungjoo; Delatour, Vincent; Heuillet, Maud; Nammoonnoy, Jintana; Ceyhan Gören, Ahmet; Bilsel, Gokhan; Konopelko, L.; Krylov, A.; Lopushanskaya, E.

    2018-01-01

    Cholesterol is one of the most frequently measured substances in human blood/serum to assist in assessing the health status of individuals. Because of its clinical significance, CCQM-K6 determination of cholesterol in serum was completed in 2000 as one of the first key comparison (KC) studies performed within the Organic Analysis Working Group (OAWG). The first subsequent KC for cholesterol, CCQM-K6.1, was completed in 2001. Measurements for this second subsequent, CCQM-K6.2, were completed in 2012. These subsequent comparisons were conducted to enable CCQM members that had not participated in earlier studies to demonstrate their capabilities to measure a nonpolar (pKow < ‑2), low molecular mass (100 g/mol to 500 g/mol) metabolite in human serum at relatively high concentrations (1 mg/g to 3 mg/g) found in normal populations. Successful participation in CCQM-K6.2 demonstrated capabilities in analysis of complex biological matrices including sample preparation (extraction, derivatization), LC or GC separation, and quantification using an isotope dilution mass spectrometry approach. Normally in a subsequent KC, no key comparison reference value (KCRV) would be established and assessment of performance would be via the deviation of participants' results to the anchor institute's results, adjusted to account for the anchor's performance in the original comparison versus its KCRV. Due to the very long-time period since the original key comparison, the OAWG decided that this did not represent the best approach to assess performance in what is a relatively complex measurement. Given the excellent agreement between the anchor institute's results and robust consensus summary of the participants' values, the reference value for this study was taken as the anchor institute's result and treated as a 'KCRV'. Seven of the nine participants demonstrated agreement with the reference value. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  5. Effect of the Key Mixture Parameters on Shrinkage of Reactive Powder Concrete

    PubMed Central

    Zubair, Ahmed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 33 factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content. PMID:25050395

  6. Effect of the key mixture parameters on shrinkage of reactive powder concrete.

    PubMed

    Ahmad, Shamsad; Zubair, Ahmed; Maslehuddin, Mohammed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 3(3) factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content.

  7. Inter-organizational design: exploring the relationship between formal architecture and ICT investments

    NASA Astrophysics Data System (ADS)

    Iubatti, Daniela; Masciarelli, Francesca; Simboli, Alberto

    This chapter aims to explore how the information-processing capabilities that emerge from a network structure affect the diffusion of innovation in a multidivisional organization. In particular, this study analyzes the role of firm investments in ICT to facilitate communication and knowledge diffusion. Using a qualitative approach, we investigate the behavior of an Italian multinational firm, Engineering S.p.A., analyzing our data using a content analysis procedure. Our results show the limited role of ICT in favoring knowledge exchange both inside and outside the firm's divisions: traditional communication patterns are generally preferred over the use of technologies for information sharing. Additionally, we find that key individuals who play a central role in the firm's communication network are unable to use ICTs for knowledge transfer. We conclude that this is the result of a strategic decision to keep top management practically unchanged since the firm was established. Therefore, key individuals act as filters to knowledge flows. Knowledge, in particular tacit knowledge, is transferred from key individuals to other actors through face-to-face contacts, thereby creating a diseconomy for the organization.

  8. Demand Analysis of Logistics Information Matching Platform: A Survey from Highway Freight Market in Zhejiang Province

    NASA Astrophysics Data System (ADS)

    Chen, Daqiang; Shen, Xiahong; Tong, Bing; Zhu, Xiaoxiao; Feng, Tao

    With the increasing competition in logistics industry and promotion of lower logistics costs requirements, the construction of logistics information matching platform for highway transportation plays an important role, and the accuracy of platform design is the key to successful operation or not. Based on survey results of logistics service providers, customers and regulation authorities to access to information and in-depth information demand analysis of logistics information matching platform for highway transportation in Zhejiang province, a survey analysis for framework of logistics information matching platform for highway transportation is provided.

  9. Carbon charge exchange analysis in the ITER-like wall environment.

    PubMed

    Menmuir, S; Giroud, C; Biewer, T M; Coffey, I H; Delabie, E; Hawkes, N C; Sertoli, M

    2014-11-01

    Charge exchange spectroscopy has long been a key diagnostic tool for fusion plasmas and is well developed in devices with Carbon Plasma-Facing Components. Operation with the ITER-like wall at JET has resulted in changes to the spectrum in the region of the Carbon charge exchange line at 529.06 nm and demonstrates the need to revise the core charge exchange analysis for this line. An investigation has been made of this spectral region in different plasma conditions and the revised description of the spectral lines to be included in the analysis is presented.

  10. ‘They will be afraid to touch you’: LGBTI people and sex workers' experiences of accessing healthcare in Zimbabwe—an in-depth qualitative study

    PubMed Central

    Hunt, Jennifer; Bristowe, Katherine; Chidyamatare, Sybille; Harding, Richard

    2017-01-01

    Objectives To examine experiences of key populations (lesbian, gay, bisexual, trans and intersex (LGBTI) people, men who have sex with men (MSM) and sex workers) in Zimbabwe regarding access to, and experiences of, healthcare. Design Qualitative study using in-depth interviews and focus groups, with thematic analysis. Participants Sixty individuals from key populations in Zimbabwe. Setting Participants were recruited from four locations (Harare, Bulawayo, Mutare, Beitbridge/Masvingo). Results Participants described considerable unmet needs and barriers to accessing basic healthcare due to discrimination regarding key population status, exacerbated by the sociopolitical/legal environment. Three main themes emerged: (1) key populations' illnesses were caused by their behaviour; (2) equal access to healthcare is conditional on key populations conforming to ‘sexual norms’ and (3) perceptions that healthcare workers were ill-informed about key populations, and that professionals' personal attitudes affected care delivery. Participants felt unable to discuss their key population status with healthcare workers. Their healthcare needs were expected to be met almost entirely by their own communities. Conclusions This is one of very few studies of healthcare access beyond HIV for key populations in Africa. Discrimination towards key populations discourages early diagnosis, limits access to healthcare/treatment and increases risk of transmission of infectious diseases. Key populations experience unnecessary suffering from untreated conditions, exclusion from healthcare and extreme psychological distress. Education is needed to reduce stigma and enhance sensitive clinical interviewing skills. Clinical and public health implications of discrimination in healthcare must be addressed through evidence-based interventions for professionals, particularly in contexts with sociopolitical/legal barriers to equality. PMID:28589012

  11. Gender and Physics: A Theoretical Analysis.

    ERIC Educational Resources Information Center

    Rolin, Kristina

    2001-01-01

    Argues that objections raised by Koertge, Gross and Levitt, and Weinberg against feminist scholarship are unwarranted. The concept of gender, as it has been developed in feminist theory, is key to understanding why the first objection is misguided. Social analysis of scientific knowledge is key to understanding why the second and third objections…

  12. Application of homomorphism to secure image sharing

    NASA Astrophysics Data System (ADS)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  13. Analysis Results for Lunar Soil Simulant Using a Portable X-Ray Fluorescence Analyzer

    NASA Technical Reports Server (NTRS)

    Boothe, R. E.

    2006-01-01

    Lunar soil will potentially be used for oxygen generation, water generation, and as filler for building blocks during habitation missions on the Moon. NASA s in situ fabrication and repair program is evaluating portable technologies that can assess the chemistry of lunar soil and lunar soil simulants. This Technical Memorandum summarizes the results of the JSC 1 lunar soil simulant analysis using the TRACeR III IV handheld x-ray fluorescence analyzer, manufactured by KeyMaster Technologies, Inc. The focus of the evaluation was to determine how well the current instrument configuration would detect and quantify the components of JSC-1.

  14. Broad Perspectives on Mars Landing Site Selection: Geological Factors from Centimeter to Kilometer Scales

    NASA Technical Reports Server (NTRS)

    Jakosky, B. M.; Golombek, M. P.

    2001-01-01

    Selection of a landing site for the '03 and later Mars surface missions represents a balance between potential science results and landing site safety. Although safety has to be the prime consideration, it is the melding together of spacecraft hazard analysis with science analysis that provides the key to understanding the nature of the surface for determining both its safety for landing and its scientific potential. Our goal here is to discuss the geological factors that go into a determination of site safety, at scales from centimeters up to kilometers, and to understand the implications for the resulting scientific return that can be expected.

  15. Beverage and culture. "Zhourat", a multivariate analysis of the globalization of a herbal tea from the Middle East.

    PubMed

    Obón, Concepción; Rivera, Diego; Alcaraz, Francisco; Attieh, Latiffa

    2014-08-01

    The "Zhourat" herbal tea consists of a blend of wild flowers, herbs, leaves and fruits and is a typical beverage of Lebanon and Syria. We aim to evaluate cultural significance of "Zhourat", to determine cultural standards for its formulation including key ingredients and to determine acceptable variability levels in terms of number of ingredients and their relative proportions, in summary what is "Zhourat" and what is not "Zhourat" from an ethnobotanical perspective. For this purpose we develop a novel methodology to describe and analyse patterns of variation of traditional multi-ingredient herbal formulations, beverages and teas and to identify key ingredients, which are characteristics of a particular culture and region and to interpret health claims for the mixture. Factor analysis and hierarchical clustering techniques were used to display similarities between samples whereas salience index was used to determine the main ingredients which could help to distinguish a standard traditional blend from a global market-addressed formulation. The study revealed 77 main ingredients belonging to 71 different species of vascular plants. In spite of the "Zhourat's" highly variable content, the salience analysis resulted in a determined set of key botanical components including Rosa x damascena Herrm., Althaea damascena Mouterde, Matricaria chamomilla L., Aloysia citrodora Palau, Zea mays L. and Elaeagnus angustifolia L. The major health claims for "Zhourat" as digestive, sedative and for respiratory problems are culturally coherent with the analysis of the traditional medicinal properties uses of its ingredients. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. Mixed Models and Reduction Techniques for Large-Rotation, Nonlinear Analysis of Shells of Revolution with Application to Tires

    NASA Technical Reports Server (NTRS)

    Noor, A. K.; Andersen, C. M.; Tanner, J. A.

    1984-01-01

    An effective computational strategy is presented for the large-rotation, nonlinear axisymmetric analysis of shells of revolution. The three key elements of the computational strategy are: (1) use of mixed finite-element models with discontinuous stress resultants at the element interfaces; (2) substantial reduction in the total number of degrees of freedom through the use of a multiple-parameter reduction technique; and (3) reduction in the size of the analysis model through the decomposition of asymmetric loads into symmetric and antisymmetric components coupled with the use of the multiple-parameter reduction technique. The potential of the proposed computational strategy is discussed. Numerical results are presented to demonstrate the high accuracy of the mixed models developed and to show the potential of using the proposed computational strategy for the analysis of tires.

  17. Proof-of-principle test of coherent-state continuous variable quantum key distribution through turbulent atmosphere (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Derkach, Ivan D.; Peuntinger, Christian; Ruppert, László; Heim, Bettina; Gunthner, Kevin; Usenko, Vladyslav C.; Elser, Dominique; Marquardt, Christoph; Filip, Radim; Leuchs, Gerd

    2016-10-01

    Continuous-variable quantum key distribution is a practical application of quantum information theory that is aimed at generation of secret cryptographic key between two remote trusted parties and that uses multi-photon quantum states as carriers of key bits. Remote parties share the secret key via a quantum channel, that presumably is under control of of an eavesdropper, and which properties must be taken into account in the security analysis. Well-studied fiber-optical quantum channels commonly possess stable transmittance and low noise levels, while free-space channels represent a simpler, less demanding and more flexible alternative, but suffer from atmospheric effects such as turbulence that in particular causes a non-uniform transmittance distribution referred to as fading. Nonetheless free-space channels, providing an unobstructed line-of-sight, are more apt for short, mid-range and potentially long-range (using satellites) communication and will play an important role in the future development and implementation of QKD networks. It was previously theoretically shown that coherent-state CV QKD should be in principle possible to implement over a free-space fading channel, but strong transmittance fluctuations result in the significant modulation-dependent channel excess noise. In this regime the post-selection of highly transmitting sub-channels may be needed, which can even restore the security of the protocol in the strongly turbulent channels. We now report the first proof-of-principle experimental test of coherent state CV QKD protocol using different levels Gaussian modulation over a mid-range (1.6-kilometer long) free-space atmospheric quantum channel. The transmittance of the link was characterized using intensity measurements for the reference but channel estimation using the modulated coherent states was also studied. We consider security against Gaussian collective attacks, that were shown to be optimal against CV QKD protocols . We assumed a general entangling cloner collective attack (modeled using data obtained from the state measurement results on both trusted sides of the protocol), that allows to purify the noise added in the quantum channel . Our security analysis of coherent-state protocol also took into account the effect of imperfect channel estimation, limited post-processing efficiency and finite data ensemble size on the performance of the protocol. In this regime we observe the positive key rate even without the need of applying post-selection. We show the positive improvement of the key rate with increase of the modulation variance, still remaining low enough to tolerate the transmittance fluctuations. The obtained results show that coherent-state CV QKD protocol that uses real free-space atmospheric channel can withstand negative influence of transmittance fluctuations, limited post-processing efficiency, imperfect channel estimation and other finite-size effects, and be successfully implemented. Our result paves the way to the full-scale implementation of the CV QKD in real free-space channels at mid-range distances.

  18. An empirical-statistical model for laser cladding of Ti-6Al-4V powder on Ti-6Al-4V substrate

    NASA Astrophysics Data System (ADS)

    Nabhani, Mohammad; Razavi, Reza Shoja; Barekat, Masoud

    2018-03-01

    In this article, Ti-6Al-4V powder alloy was directly deposited on Ti-6Al-4V substrate using laser cladding process. In this process, some key parameters such as laser power (P), laser scanning rate (V) and powder feeding rate (F) play important roles. Using linear regression analysis, this paper develops the empirical-statistical relation between these key parameters and geometrical characteristics of single clad tracks (i.e. clad height, clad width, penetration depth, wetting angle, and dilution) as a combined parameter (PαVβFγ). The results indicated that the clad width linearly depended on PV-1/3 and powder feeding rate had no effect on it. The dilution controlled by a combined parameter as VF-1/2 and laser power was a dispensable factor. However, laser power was the dominant factor for the clad height, penetration depth, and wetting angle so that they were proportional to PV-1F1/4, PVF-1/8, and P3/4V-1F-1/4, respectively. Based on the results of correlation coefficient (R > 0.9) and analysis of residuals, it was confirmed that these empirical-statistical relations were in good agreement with the measured values of single clad tracks. Finally, these relations led to the design of a processing map that can predict the geometrical characteristics of the single clad tracks based on the key parameters.

  19. Factors that Motivate Business Faculty to Conduct Research: An Expectancy Theory Analysis

    ERIC Educational Resources Information Center

    Chen, Yining; Gupta, Ashok; Hoshower, Leon

    2006-01-01

    In this study, the authors used expectancy theory to examine key factors that motivate business faculty to conduct research. The survey results, from 320 faculty members at 10 business schools, showed that faculty members who assign higher importance ratings to both the extrinsic and the intrinsic rewards of research exhibit higher research…

  20. A Review of Resources for Evaluating K-12 Computer Science Education Programs

    ERIC Educational Resources Information Center

    Randolph, Justus J.; Hartikainen, Elina

    2004-01-01

    Since computer science education is a key to preparing students for a technologically-oriented future, it makes sense to have high quality resources for conducting summative and formative evaluation of those programs. This paper describes the results of a critical analysis of the resources for evaluating K-12 computer science education projects.…

  1. Simulating a Time-of-Flight Mass Spectrometer: A LabView Exercise

    ERIC Educational Resources Information Center

    Marty, Michael T.; Beussman, Douglas J.

    2013-01-01

    An in-depth understanding of all parameters that affect an instrumental analysis method, allowing students to explore how these instruments work so that they are not just a "black box," is key to being able to optimize the technique and obtain the best possible results. It is, however, impractical to provide such in depth coverage of…

  2. A Review of the School Science Curricula in Eleven High Achieving Jurisdictions

    ERIC Educational Resources Information Center

    Hollins, Martin; Reiss, Michael J.

    2016-01-01

    The last two decades have seen unprecedented interest in science curricula, with many governments seeing improvements in the performance of their school students in science as key to future economic prosperity. We present the results of an analysis of the curriculum documents for primary and secondary science in Australia (New South Wales and…

  3. Meaningful Messages: Adults in the Lower Mississippi Delta Provide Cultural Insight into Strategies for Promoting the MyPyramid

    ERIC Educational Resources Information Center

    Zoellner, Jamie; Bounds, Wendy; Connell, Carol; Yadrick, Kathy; Crook, LaShaundrea

    2010-01-01

    Objective: To explore cultural perceptions of the MyPyramid key messages and identify factors that may impact adoption of these recommendations. Methods: Systematic content analysis of transcripts from in-depth, structured interviews with 23 adults, primarily African American females, residing in the Lower Mississippi Delta. Results: When asked to…

  4. Structured-Exercise-Program (SEP): An Effective Training Approach to Key Healthcare Professionals

    ERIC Educational Resources Information Center

    Miazi, Mosharaf H.; Hossain, Taleb; Tiroyakgosi, C.

    2014-01-01

    Structured exercise program is an effective approach to technology dependent resource limited healthcare area for professional training. The result of a recently conducted data analysis revealed this. The aim of the study is to know the effectiveness of the applied approach that was designed to observe the level of adherence to newly adopted…

  5. Presenting the Straddle Lemma in an Introductory Real Analysis Course

    ERIC Educational Resources Information Center

    Soares, A.; dos Santos, A. L.

    2017-01-01

    In this article, we revisit the concept of strong differentiability of real functions of one variable, underlying the concept of differentiability. Our discussion is guided by the Straddle Lemma, which plays a key role in this context. The proofs of the results presented are designed to meet a young audience in mathematics, typical of students in…

  6. Key Future Engineering Capabilities for Human Capital Retention

    NASA Astrophysics Data System (ADS)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  7. A Conceptual Framework for the Social Analysis of Reproductive Health

    PubMed Central

    Hawkins, Kirstan

    2007-01-01

    The dominant conceptual framework for understanding reproductive behaviour is highly individualistic. In this article, it is demonstrated that such a conceptualization is flawed, as behaviour is shaped by social relations and institutions. Using ethnographic evidence, the value of a social analysis of the local contexts of reproductive health is highlighted. A framework is set out for conducting such a social analysis, which is capable of generating data necessary to allow health programmes to assess the appropriate means of improving the responsiveness of service-delivery structures to the needs of the most vulnerable. Six key issues are identified in the framework for the analysis of social vulnerability to poor reproductive health outcomes. The key issues are: poverty and livelihood strategies, gender, health-seeking behaviour, reproductive behaviour, and access to services. The article concludes by briefly identifying the key interventions and strategies indicated by such an analysis. PMID:17615901

  8. Active magnetic radiation shielding system analysis and key technologies.

    PubMed

    Washburn, S A; Blattnig, S R; Singleterry, R C; Westover, S C

    2015-01-01

    Many active magnetic shielding designs have been proposed in order to reduce the radiation exposure received by astronauts on long duration, deep space missions. While these designs are promising, they pose significant engineering challenges. This work presents a survey of the major systems required for such unconfined magnetic field design, allowing the identification of key technologies for future development. Basic mass calculations are developed for each system and are used to determine the resulting galactic cosmic radiation exposure for a generic solenoid design, using a range of magnetic field strength and thickness values, allowing some of the basic characteristics of such a design to be observed. This study focuses on a solenoid shaped, active magnetic shield design; however, many of the principles discussed are applicable regardless of the exact design configuration, particularly the key technologies cited. Copyright © 2015 The Committee on Space Research (COSPAR). All rights reserved.

  9. A digital memories based user authentication scheme with privacy preservation.

    PubMed

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  10. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    PubMed

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  11. A digital memories based user authentication scheme with privacy preservation

    PubMed Central

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659

  12. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.

    PubMed

    Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B

    2018-04-30

    We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.

  13. Evaluation of criteria for developing traffic safety materials for Latinos.

    PubMed

    Streit-Kaplan, Erica L; Miara, Christine; Formica, Scott W; Gallagher, Susan Scavo

    2011-03-01

    This quantitative study assessed the validity of guidelines that identified four key characteristics of culturally appropriate Spanish-language traffic safety materials: language, translation, formative evaluation, and credible source material. From a sample of 190, the authors randomly selected 12 Spanish-language educational materials for analysis by 15 experts. Hypotheses included that the experts would rate materials with more of the key characteristics as more effective (likely to affect behavioral change) and rate materials originally developed in Spanish and those that utilized formative evaluation (e.g., pilot tests, focus groups) as more culturally appropriate. Although results revealed a weak association between the number of key characteristics in a material and the rating of its effectiveness, reviewers rated materials originally created in Spanish and those utilizing formative evaluation as significantly more culturally appropriate. The findings and methodology demonstrated important implications for developers and evaluators of any health-related materials for Spanish speakers and other population groups.

  14. Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Xueying; Zhang, Yichen; Zhao, Yijia; Wang, Xiangyu; Yu, Song; Guo, Hong

    2017-10-01

    We study the impact of the finite-size effect on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, mainly considering the finite-size effect on the parameter estimation procedure. The central-limit theorem and maximum likelihood estimation theorem are used to estimate the parameters. We also analyze the relationship between the number of exchanged signals and the optimal modulation variance in the protocol. It is proved that when Charlie's position is close to Bob, the CV-MDI QKD protocol has the farthest transmission distance in the finite-size scenario. Finally, we discuss the impact of finite-size effects related to the practical detection in the CV-MDI QKD protocol. The overall results indicate that the finite-size effect has a great influence on the secret-key rate of the CV-MDI QKD protocol and should not be ignored.

  15. Biometrics encryption combining palmprint with two-layer error correction codes

    NASA Astrophysics Data System (ADS)

    Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang

    2017-07-01

    To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.

  16. Attitudes Expressed in Online Comments about Environmental Factors in the Tourism Sector: An Exploratory Study.

    PubMed

    Saura, Jose Ramon; Palos-Sanchez, Pedro; Rios Martin, Miguel Angel

    2018-03-19

    The object of this exploratory study is to identify the positive, neutral and negative environment factors that affect users who visit Spanish hotels in order to help the hotel managers decide how to improve the quality of the services provided. To carry out the research a Sentiment Analysis was initially performed, grouping the sample of tweets ( n = 14459) according to the feelings shown and then a textual analysis was used to identify the key environment factors in these feelings using the qualitative analysis software Nvivo (QSR International, Melbourne, Australia). The results of the exploratory study present the key environment factors that affect the users experience when visiting hotels in Spain, such as actions that support local traditions and products, the maintenance of rural areas respecting the local environment and nature, or respecting air quality in the areas where hotels have facilities and offer services. The conclusions of the research can help hotels improve their services and the impact on the environment, as well as improving the visitors experience based on the positive, neutral and negative environment factors which the visitors themselves identified.

  17. Monitoring the metering performance of an electronic voltage transformer on-line based on cyber-physics correlation analysis

    NASA Astrophysics Data System (ADS)

    Zhang, Zhu; Li, Hongbin; Tang, Dengping; Hu, Chen; Jiao, Yang

    2017-10-01

    Metering performance is the key parameter of an electronic voltage transformer (EVT), and it requires high accuracy. The conventional off-line calibration method using a standard voltage transformer is not suitable for the key equipment in a smart substation, which needs on-line monitoring. In this article, we propose a method for monitoring the metering performance of an EVT on-line based on cyber-physics correlation analysis. By the electrical and physical properties of a substation running in three-phase symmetry, the principal component analysis method is used to separate the metering deviation caused by the primary fluctuation and the EVT anomaly. The characteristic statistics of the measured data during operation are extracted, and the metering performance of the EVT is evaluated by analyzing the change in statistics. The experimental results show that the method successfully monitors the metering deviation of a Class 0.2 EVT accurately. The method demonstrates the accurate evaluation of on-line monitoring of the metering performance on an EVT without a standard voltage transformer.

  18. Attitudes Expressed in Online Comments about Environmental Factors in the Tourism Sector: An Exploratory Study

    PubMed Central

    2018-01-01

    The object of this exploratory study is to identify the positive, neutral and negative environment factors that affect users who visit Spanish hotels in order to help the hotel managers decide how to improve the quality of the services provided. To carry out the research a Sentiment Analysis was initially performed, grouping the sample of tweets (n = 14459) according to the feelings shown and then a textual analysis was used to identify the key environment factors in these feelings using the qualitative analysis software Nvivo (QSR International, Melbourne, Australia). The results of the exploratory study present the key environment factors that affect the users experience when visiting hotels in Spain, such as actions that support local traditions and products, the maintenance of rural areas respecting the local environment and nature, or respecting air quality in the areas where hotels have facilities and offer services. The conclusions of the research can help hotels improve their services and the impact on the environment, as well as improving the visitors experience based on the positive, neutral and negative environment factors which the visitors themselves identified. PMID:29562724

  19. Security analysis and improvements to the PsychoPass method.

    PubMed

    Brumen, Bostjan; Heričko, Marjan; Rozman, Ivan; Hölbl, Marko

    2013-08-13

    In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.

  20. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.

  1. A computational analysis of the three isoforms of glutamate dehydrogenase reveals structural features of the isoform EC 1.4.1.4 supporting a key role in ammonium assimilation by plants

    PubMed Central

    Jaspard, Emmanuel

    2006-01-01

    Background There are three isoforms of glutamate dehydrogenase. The isoform EC 1.4.1.4 (GDH4) catalyses glutamate synthesis from 2-oxoglutarate and ammonium, using NAD(P)H. Ammonium assimilation is critical for plant growth. Although GDH4 from animals and prokaryotes are well characterized, there are few data concerning plant GDH4, even from those whose genomes are well annotated. Results A large set of the three GDH isoforms was built resulting in 116 non-redundant full polypeptide sequences. A computational analysis was made to gain more information concerning the structure – function relationship of GDH4 from plants (Eukaryota, Viridiplantae). The tested plant GDH4 sequences were the two ones known to date, those of Chlorella sorokiniana. This analysis revealed several structural features specific of plant GDH4: (i) the lack of a structure called "antenna"; (ii) the NAD(P)-binding motif GAGNVA; and (iii) a second putative coenzyme-binding motif GVLTGKG together with four residues involved in the binding of the reduced form of NADP. Conclusion A number of structural features specific of plant GDH4 have been found. The results reinforce the probable key role of GDH4 in ammonium assimilation by plants. Reviewers This article was reviewed by Tina Bakolitsa (nominated by Eugene Koonin), Martin Jambon (nominated by Laura Landweber), Sandor Pangor and Franck Eisenhaber. PMID:17173671

  2. Middle Term Achievements of Project 5322: Retrieval Of Key Eco-Hydrological Parameters From Remote Sensing In The Watershed Allied Telemetry Experimental Research (Water)

    NASA Astrophysics Data System (ADS)

    Li, Xin; Menenti, Massimo

    2010-10-01

    The general objective of project 5322 in the Dragon 2 programme is to quantitatively retrieve some key eco- hydrological parameters by using remote sensed data, especially from ESA, Chinese, and the Third Party Mission (TPM). To achieve this goal, a comprehensive observation experiment, Watershed Allied Telemetry Experimental Research (WATER) was carried out. WARER is a simultaneously airborne, satellite-borne, and ground-based remote sensing experiment took place in the Heihe River Basin, a typical inland river basin in the northwest of China. This paper introduces the background and implementation of WATER. Data have been obtained so far are described in details. After a period of data analysis for two years, numerous results have also been achieved. This paper presents some early results of WATER as well.

  3. A Taxonomy-Based Approach to Shed Light on the Babel of Mathematical Models for Rice Simulation

    NASA Technical Reports Server (NTRS)

    Confalonieri, Roberto; Bregaglio, Simone; Adam, Myriam; Ruget, Francoise; Li, Tao; Hasegawa, Toshihiro; Yin, Xinyou; Zhu, Yan; Boote, Kenneth; Buis, Samuel; hide

    2016-01-01

    For most biophysical domains, differences in model structures are seldom quantified. Here, we used a taxonomy-based approach to characterise thirteen rice models. Classification keys and binary attributes for each key were identified, and models were categorised into five clusters using a binary similarity measure and the unweighted pair-group method with arithmetic mean. Principal component analysis was performed on model outputs at four sites. Results indicated that (i) differences in structure often resulted in similar predictions and (ii) similar structures can lead to large differences in model outputs. User subjectivity during calibration may have hidden expected relationships between model structure and behaviour. This explanation, if confirmed, highlights the need for shared protocols to reduce the degrees of freedom during calibration, and to limit, in turn, the risk that user subjectivity influences model performance.

  4. Using Qualitative Comparative Analysis of Key Informant Interviews in Health Services Research: Enhancing a Study of Adjuvant Therapy Use in Breast Cancer Care.

    PubMed

    McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra D; Bickell, Nina A

    2016-04-01

    Qualitative comparative analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. To explore the strengths and weaknesses of using QCA for HSR. Using data from semistructured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Ninety administrative and clinical key informants interviewed across 10 NYC area safety net hospitals. Transcribed interviews were coded by 3 investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods.

  5. Analytical Round Robin for Elastic-Plastic Analysis of Surface Cracked Plates: Phase I Results

    NASA Technical Reports Server (NTRS)

    Wells, D. N.; Allen, P. A.

    2012-01-01

    An analytical round robin for the elastic-plastic analysis of surface cracks in flat plates was conducted with 15 participants. Experimental results from a surface crack tension test in 2219-T8 aluminum plate provided the basis for the inter-laboratory study (ILS). The study proceeded in a blind fashion given that the analysis methodology was not specified to the participants, and key experimental results were withheld. This approach allowed the ILS to serve as a current measure of the state of the art for elastic-plastic fracture mechanics analysis. The analytical results and the associated methodologies were collected for comparison, and sources of variability were studied and isolated. The results of the study revealed that the J-integral analysis methodology using the domain integral method is robust, providing reliable J-integral values without being overly sensitive to modeling details. General modeling choices such as analysis code, model size (mesh density), crack tip meshing, or boundary conditions, were not found to be sources of significant variability. For analyses controlled only by far-field boundary conditions, the greatest source of variability in the J-integral assessment is introduced through the constitutive model. This variability can be substantially reduced by using crack mouth opening displacements to anchor the assessment. Conclusions provide recommendations for analysis standardization.

  6. Final report on key comparison CCQM-K100: Analysis of copper in ethanol

    NASA Astrophysics Data System (ADS)

    Zhou, Tao; Kakoulides, Elias; Zhu, Yanbei; Jaehrling, Reinhard; Rienitz, Olaf; Saxby, David; Phukphatthanachai, Pranee; Yafa, Charun; Labarraque, Guillaume; Cankur, Oktay; Can, Süleyman Z.; Konopelko, Leonid A.; Kustikov, Yu A.; Caciano de Sena, Rodrigo; Marques Rodrigues, Janaina; Fonseca Sarmanho, Gabriel; Fortunato de Carvalho Rocha, Werickson; dos Reis, Lindomar Augusto

    2014-01-01

    The increase in renewable sources in the energy matrix of the countries is an effort to reduce dependency on crude oil and the environmental impacts associated with its use. In order to help overcome the lack of widely accepted quality standards for fuel ethanol and to guarantee its competitiveness in the international trade market, the NMIs have been working to develop certified reference materials for bio-fuels and measurement methods. Inorganic impurities such as Cu, Na and Fe may be present in the fuel ethanol and their presence is associated with corrosion and the formation of oxide deposits in some engine parts. The key comparison CCQM-K100 was carried out under the auspices of the Inorganic Analysis Working Group (IAWG) and the coordination of the National Institute of Metrology, Quality and Technology (INMETRO). The objective of this key comparison was to compare the measurement capabilities of the participants for the determination of Cu in fuel ethanol. Ten NMIs participated in this exercise and most of them used the isotopic dilution method for determining the amount of Cu. The median was chosen as key comparison reference value (KCRV). The assigned KCRV for the Cu content was 0.3589 µg/g with a combined standard uncertainty of 0.0014 µg/g. In general, there is a good agreement among the participants' results. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  7. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  8. Stepwise Regression Analysis of MDOE Balance Calibration Data Acquired at DNW

    NASA Technical Reports Server (NTRS)

    DeLoach, RIchard; Philipsen, Iwan

    2007-01-01

    This paper reports a comparison of two experiment design methods applied in the calibration of a strain-gage balance. One features a 734-point test matrix in which loads are varied systematically according to a method commonly applied in aerospace research and known in the literature of experiment design as One Factor At a Time (OFAT) testing. Two variations of an alternative experiment design were also executed on the same balance, each with different features of an MDOE experiment design. The Modern Design of Experiments (MDOE) is an integrated process of experiment design, execution, and analysis applied at NASA's Langley Research Center to achieve significant reductions in cycle time, direct operating cost, and experimental uncertainty in aerospace research generally and in balance calibration experiments specifically. Personnel in the Instrumentation and Controls Department of the German Dutch Wind Tunnels (DNW) have applied MDOE methods to evaluate them in the calibration of a balance using an automated calibration machine. The data have been sent to Langley Research Center for analysis and comparison. This paper reports key findings from this analysis. The chief result is that a 100-point calibration exploiting MDOE principles delivered quality comparable to a 700+ point OFAT calibration with significantly reduced cycle time and attendant savings in direct and indirect costs. While the DNW test matrices implemented key MDOE principles and produced excellent results, additional MDOE concepts implemented in balance calibrations at Langley Research Center are also identified and described.

  9. Single-Case Experimental Designs: A Systematic Review of Published Research and Current Standards

    PubMed Central

    Smith, Justin D.

    2013-01-01

    This article systematically reviews the research design and methodological characteristics of single-case experimental design (SCED) research published in peer-reviewed journals between 2000 and 2010. SCEDs provide researchers with a flexible and viable alternative to group designs with large sample sizes. However, methodological challenges have precluded widespread implementation and acceptance of the SCED as a viable complementary methodology to the predominant group design. This article includes a description of the research design, measurement, and analysis domains distinctive to the SCED; a discussion of the results within the framework of contemporary standards and guidelines in the field; and a presentation of updated benchmarks for key characteristics (e.g., baseline sampling, method of analysis), and overall, it provides researchers and reviewers with a resource for conducting and evaluating SCED research. The results of the systematic review of 409 studies suggest that recently published SCED research is largely in accordance with contemporary criteria for experimental quality. Analytic method emerged as an area of discord. Comparison of the findings of this review with historical estimates of the use of statistical analysis indicates an upward trend, but visual analysis remains the most common analytic method and also garners the most support amongst those entities providing SCED standards. Although consensus exists along key dimensions of single-case research design and researchers appear to be practicing within these parameters, there remains a need for further evaluation of assessment and sampling techniques and data analytic methods. PMID:22845874

  10. RAPD analysis of the last population of a likely Florida Keys endemic cactus

    Treesearch

    D.R. Gordon; Thomas L. Kubisiak

    1998-01-01

    The semaphore cactus in the Florida Keys has until recently been considered a disjunct location of the Jamaican Opuntia spinosissima. Loss of all but one population in the Keys coupled with recent suggestions that the species should be taxonomically separated from the Jamaican cactus and is, therefore, a Florida Keys endemic, makes this population of conservation...

  11. Conflict of interest reporting in dentistry meta-analyses: A systematic review

    PubMed Central

    Beyari, Mohammed M.; Strain, Dan; Lamfon, Hanadi A.

    2014-01-01

    Objectives: The issue of reporting conflicts of interest (COI) in medical research has come under scrutiny over the past decade. Absolute transparency is important when dealing with conflicts of interest to provide readers with all essential information required to make an informative decision of the results. The key objective of this study was to examine the prevalence of reporting conflicts of interest in therapeutic dental meta-analyses of Randomized Control Trials (RCTs), and to investigate possible associations with other categorical variables. Study Design: We conducted an extensive literature search across multiple databases to search for relevant review articles for this study. We utilized pre-determined key words, and relied on three reviewers to test and review the use of a data extraction form that was used for the meta-analyses. Data regarding study characteristics, direction of results, and the significance of the results from each meta-analysis were extracted. Results: There were 129 meta-analyses used in this review, and the reporting on conflict of interest was low with only 50 (38.8%) of the articles possessing a conflict of interest statement (either confirming of denying COI). Of these 50 articles, there were only 4 (8%) studies that reported an actual conflict of interest. A statement of conflicts of interest was found in 29 (35.3%) of the papers that reported significant findings, whereas 35% of the papers that reported positive results reported on conflict of interest. Prior to 2009, only 17 (25%) papers reported conflicts of interest, but since 2009, 54.1% of papers collected had a conflict of interest statement. Conclusions: Meta-analyses published in the field of dentistry do not routinely report author conflicts of interest. Although few conflicts appear to exist, the field of dentistry should continue to ensure that best evidence reports provide clear and transparent reporting of potential conflicts of interest in academic journals. Key words:Dentistry, dentition, meta-analysis, quantitative review. PMID:25136431

  12. Feasibility of an International Multiple Sclerosis Rehabilitation Data Repository: Perceived Challenges and Motivators for Sharing Data.

    PubMed

    Bradford, Elissa Held; Baert, Ilse; Finlayson, Marcia; Feys, Peter; Wagner, Joanne

    2018-01-01

    Multiple sclerosis (MS) rehabilitation evidence is limited due to methodological factors, which may be addressed by a data repository. We describe the perceived challenges of, motivators for, interest in participating in, and key features of an international MS rehabilitation data repository. A multimethod sequential investigation was performed with the results of two focus groups, using nominal group technique, and study aims informing the development of an online questionnaire. Percentage agreement and key quotations illustrated questionnaire findings. Subgroup comparisons were made between clinicians and researchers and between participants in North America and Europe. Rehabilitation professionals from 25 countries participated (focus groups: n = 21; questionnaire: n = 166). The top ten challenges (C) and motivators (M) identified by the focus groups were database control/management (C); ethical/legal concerns (C); data quality (C); time, effort, and cost (C); best practice (M); uniformity (C); sustainability (C); deeper analysis (M); collaboration (M); and identifying research needs (M). Percentage agreement with questionnaire statements regarding challenges to, motivators for, interest in, and key features of a successful repository was at least 80%, 85%, 72%, and 83%, respectively, across each group of statements. Questionnaire subgroup analysis revealed a few differences (P < .05), including that clinicians more strongly identified with improving best practice as a motivator. Findings support clinician and researcher interest in and potential for success of an international MS rehabilitation data repository if prioritized challenges and motivators are addressed and key features are included.

  13. The key actor: a qualitative study of patient participation in the handover process in Europe

    PubMed Central

    Flink, Maria; Hesselink, Gijs; Pijnenborg, Loes; Wollersheim, Hub; Vernooij-Dassen, Myrra; Dudzik-Urbaniak, Ewa; Orrego, Carola; Toccafondi, Giulio; Schoonhoven, Lisette; Gademan, Petra J; Johnson, Julie K; Öhlén, Gunnar; Hansagi, Helen; Olsson, Mariann; Barach, Paul

    2012-01-01

    Background Patient safety experts have postulated that increasing patient participation in communications during patient handovers will improve the quality of patient transitions, and that this may reduce hospital readmissions. Choosing strategies that enhance patient safety through improved handovers requires better understanding of patient experiences and preferences for participation. Objective The aim of this paper is to explore the patients’ experiences and perspectives related to the handovers between their primary care providers and the inpatient hospital. Methods A qualitative secondary analysis was performed, based on individual and focus group patient interviews with 90 patients in five European countries. Results The analysis revealed three themes: patient positioning in the handover process; prerequisites for patient participation and patient preferences for the handover process. Patients’ participation ranged from being the key actor, to sharing the responsibility with healthcare professional(s), to being passive participants. For active participation patients required both personal and social resources as well as prerequisites such as information and respect. Some patients preferred to be the key actor in charge; others preferred their healthcare professionals to be the key actors in the handover. Conclusions Patients’ participation is related to the healthcare system, the activity of healthcare professionals’ and patients’ capacity for participation. Patients prefer a handover process where the responsibility is clear and unambiguous. Healthcare organisations need a clear and well-considered system of responsibility for handover processes, that takes into account the individual patient's need of clarity, and support in relation to his/hers own recourses. PMID:23112290

  14. Key concepts in consumer and community engagement: a scoping meta-review

    PubMed Central

    2014-01-01

    Background Although consumer and community engagement (CCE) in health care is receiving increasing attention, research and practice in this area are hampered by the variability of concepts and terminology commonly employed. This scoping meta-review aims to identify key CCE concepts and examine terminology used to describe them. Methods In a scoping meta-review, an extensive list of 47 phrases and 11 Medical Subject Headings (MeSH) was used to undertake a comprehensive and systematic search in PubMed Central, Embase, EBM reviews, CINAHL, APAPsycNET, and Scopus. Results 59 systematic reviews met the selection criteria and were included in the final analysis. The analysis identified nine different concepts related to CCE: shared decision making, self-management, CCE in health care systems, community-based health promotion, providing access to health care, rehabilitation, participation in research, collaboration in research design and conduct, and peer support. The identified concepts differ from each other in many aspects including the aim of the activity, the role of consumers and the type of professionals’ involvement. Each concept was described by a range of terms, with some terms shared by different concepts. In addition, two overlapping concepts of patient-centeredness and patient empowerment were recognised. Conclusions This study describes CCE-related key concepts and provides new insight into their relationship with different CCE-related terms. Identification of key CCE-related concepts and terms will be useful to focus future studies and initiatives and enhance production of CCE-related evidence. PMID:24923771

  15. Parallel analysis of RNA ends enhances global investigation of microRNAs and target RNAs of Brachypodium distachyon

    PubMed Central

    2013-01-01

    Background The wild grass Brachypodium distachyon has emerged as a model system for temperate grasses and biofuel plants. However, the global analysis of miRNAs, molecules known to be key for eukaryotic gene regulation, has been limited in B. distachyon to studies examining a few samples or that rely on computational predictions. Similarly an in-depth global analysis of miRNA-mediated target cleavage using parallel analysis of RNA ends (PARE) data is lacking in B. distachyon. Results B. distachyon small RNAs were cloned and deeply sequenced from 17 libraries that represent different tissues and stresses. Using a computational pipeline, we identified 116 miRNAs including not only conserved miRNAs that have not been reported in B. distachyon, but also non-conserved miRNAs that were not found in other plants. To investigate miRNA-mediated cleavage function, four PARE libraries were constructed from key tissues and sequenced to a total depth of approximately 70 million sequences. The roughly 5 million distinct genome-matched sequences that resulted represent an extensive dataset for analyzing small RNA-guided cleavage events. Analysis of the PARE and miRNA data provided experimental evidence for miRNA-mediated cleavage of 264 sites in predicted miRNA targets. In addition, PARE analysis revealed that differentially expressed miRNAs in the same family guide specific target RNA cleavage in a correspondingly tissue-preferential manner. Conclusions B. distachyon miRNAs and target RNAs were experimentally identified and analyzed. Knowledge gained from this study should provide insights into the roles of miRNAs and the regulation of their targets in B. distachyon and related plants. PMID:24367943

  16. Engineering aspects of a thermal control subsystem for the 25 kW power module

    NASA Technical Reports Server (NTRS)

    Schroeder, P. E.

    1979-01-01

    The paper presents the key trade study results, analysis results, and the recommended thermal control approach for the 25 kW power module defined by NASA. Power conversion inefficiencies and component heat dissipation results in a minimum heat rejection requirement of 9 kW to maintain the power module equipment at desired temperature levels. Additionally, some cooling capacity should be provided for user payloads in the sortie and free-flying modes. The baseline thermal control subsystem includes a dual-loop-pumped Freon-21 coolant with the heat rejected from deployable existing orbiter radiators. Thermal analysis included an assessment of spacecraft orientations, radiator shapes and locations, and comparison of hybrid heat pipe and all liquid panels.

  17. Phenobarbital and propiconazole toxicogenomic profiles in mice show major similarities consistent with the key role that constitutive androstane receptor (CAR) activation plays in their mode of action

    PubMed Central

    Currie, Richard A.; Peffer, Richard C.; Goetz, Amber K.; Omiecinski, Curtis J.; Goodman, Jay I.

    2014-01-01

    Toxicogenomics (TGx) is employed frequently to investigate underlying molecular mechanisms of the compound of interest and, thus, has become an aid to mode of action determination. However, the results and interpretation of a TGx dataset are influenced by the experimental design and methods of analysis employed. This article describes an evaluation and reanalysis, by two independent laboratories, of previously published TGx mouse liver microarray data for a triazole fungicide, propiconazole (PPZ), and the anticonvulsant drug phenobarbital (PB). Propiconazole produced an increase incidence of liver tumors in male CD-1 mice only at a dose that exceeded the maximum tolerated dose (2500 ppm). Firstly, we illustrate how experimental design differences between two in vivo studies with PPZ and PB may impact the comparisons of TGx results. Secondly, we demonstrate that different researchers using different pathway analysis tools can come to different conclusions on specific mechanistic pathways, even when using the same datasets. Finally, despite these differences the results across three different analyses also show a striking degree of similarity observed for PPZ and PB treated livers when the expression data are viewed as major signaling pathways and cell processes affected. Additional studies described here show that the postulated key event of hepatocellular proliferation was observed in CD-1 mice for both PPZ and PB, and that PPZ is also a potent activator of the mouse CAR nuclear receptor. Thus, with regard to the events which are hallmarks of CAR-induced effects that are key events in the mode of action (MOA) of mouse liver carcinogenesis with PB, PPZ-induced tumors can be viewed as being promoted by a similar PB-like CAR-dependent MOA. PMID:24675475

  18. Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration.

    PubMed

    Arneson, Douglas; Bhattacharya, Anindya; Shu, Le; Mäkinen, Ville-Petteri; Yang, Xia

    2016-09-09

    Human diseases are commonly the result of multidimensional changes at molecular, cellular, and systemic levels. Recent advances in genomic technologies have enabled an outpour of omics datasets that capture these changes. However, separate analyses of these various data only provide fragmented understanding and do not capture the holistic view of disease mechanisms. To meet the urgent needs for tools that effectively integrate multiple types of omics data to derive biological insights, we have developed Mergeomics, a computational pipeline that integrates multidimensional disease association data with functional genomics and molecular networks to retrieve biological pathways, gene networks, and central regulators critical for disease development. To make the Mergeomics pipeline available to a wider research community, we have implemented an online, user-friendly web server ( http://mergeomics. idre.ucla.edu/ ). The web server features a modular implementation of the Mergeomics pipeline with detailed tutorials. Additionally, it provides curated genomic resources including tissue-specific expression quantitative trait loci, ENCODE functional annotations, biological pathways, and molecular networks, and offers interactive visualization of analytical results. Multiple computational tools including Marker Dependency Filtering (MDF), Marker Set Enrichment Analysis (MSEA), Meta-MSEA, and Weighted Key Driver Analysis (wKDA) can be used separately or in flexible combinations. User-defined summary-level genomic association datasets (e.g., genetic, transcriptomic, epigenomic) related to a particular disease or phenotype can be uploaded and computed real-time to yield biologically interpretable results, which can be viewed online and downloaded for later use. Our Mergeomics web server offers researchers flexible and user-friendly tools to facilitate integration of multidimensional data into holistic views of disease mechanisms in the form of tissue-specific key regulators, biological pathways, and gene networks.

  19. Evidence-based medicine at the intersection of research interests between academic health sciences librarians and medical educators: a review of the literature

    PubMed Central

    Dorsch, Josephine L.; Perry, Gerald (Jerry)

    2012-01-01

    Objectives: In 2008, the Association of Academic Health Sciences Libraries established an Education Research Task Force (ERTF) to plan research addressing research priorities outlined in key Association of American Medical Colleges reports. ERTF members conducted a literature review to describe the state of collaborative research at the intersection of medical education and health sciences librarianship. Analysis of initial results revealed instruction in evidence-based medicine (EBM) was a shared interest and is thus the focus of this review. Methods: Searches on EBM teaching programs were conducted, and results were posted to a shared online citation management service. Individual articles were assessed and assigned metadata describing subject matter, scope, and format. Results: Article analysis identified key themes. Most papers were descriptive narratives of curricular development. Evaluation studies were also prominent and often based on student satisfaction or self-reported competency. A smaller number of controlled studies provide evidence of impacts of librarian involvement in EBM instruction. Conclusions: Scholarship of EBM instruction is of common interest between medical educators and health sciences librarians. Coauthorship between the groups and distribution of literature points to a productive collaboration. An emerging literature of controlled studies measuring the impact of cross-disciplinary efforts signals continued progress in the arena of EBM instruction. PMID:23133324

  20. A qualitative study of the perspectives of key stakeholders on the delivery of clinical academic training in the East Midlands

    PubMed Central

    Evans, Val; MacLeod, Sheona

    2018-01-01

    Objective Major changes in the design and delivery of clinical academic training in the United Kingdom have occurred yet there has been little exploration of the perceptions of integrated clinic academic trainees or educators. We obtained the views of a range of key stakeholders involved in clinical academic training in the East Midlands. Design A qualitative study with inductive iterative thematic content analysis of findings from trainee surveys and facilitated focus groups. Setting The East Midlands School of Clinical Academic Training. Participants Integrated Clinical Academic Trainees, clinical and academic educators involved in clinical academic training. Main outcome measures The experience, opinions and beliefs of key stakeholders about barriers and enablers in the delivery of clinical academic training. Results We identified key themes many shared by both trainees and educators. These highlighted issues in the systems and process of the integrated academic pathways, career pathways, supervision and support, the assessment process and the balance between clinical and academic training. Conclusions Our findings help inform the future development of integrated academic training programmes. PMID:29487745

  1. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications

    PubMed Central

    Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae

    2014-01-01

    Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942

  2. An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor network-based applications.

    PubMed

    Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae

    2014-02-11

    Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.

  3. United States Department of Energy severe accident research following the Fukushima Daiichi accidents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farmer, M. T.; Corradini, M.; Rempe, J.

    The U.S. Department of Energy (DOE) has played a major role in the U.S. response to the events at Fukushima Daiichi. During the first several weeks following the accident, U.S. assistance efforts were guided by results from a significant and diverse set of analyses. In the months that followed, a coordinated analysis activity aimed at gaining a more thorough understanding of the accident sequence was completed using laboratory-developed, system-level best-estimate accident analysis codes, while a parallel analysis was conducted by U.S. industry. A comparison of predictions for Unit 1 from these two studies indicated significant differences between MAAP and MELCORmore » results for key plant parameters, such as in-core hydrogen production. On that basis, a crosswalk was completed to determine the key modeling variations that led to these differences. In parallel with these activities, it became clear that there was a need to perform a technology gap evaluation on accident-tolerant components and severe accident analysis methodologies with the goal of identifying any data and/or knowledge gaps that may exist given the current state of light water reactor (LWR) severe accident research and augmented by insights from Fukushima. In addition, there is growing international recognition that data from Fukushima could significantly reduce uncertainties related to severe accident progression, particularly for boiling water reactors. On these bases, a group of U. S. experts in LWR safety and plant operations was convened by the DOE Office of Nuclear Energy (DOE-NE) to complete technology gap analysis and Fukushima forensics data needs identification activities. The results from these activities were used as the basis for refining DOE-NE's severe accident research and development (R&D) plan. Finally, this paper provides a high-level review of DOE-sponsored R&D efforts in these areas, including planned activities on accident-tolerant components and accident analysis methods.« less

  4. United States Department of Energy severe accident research following the Fukushima Daiichi accidents

    DOE PAGES

    Farmer, M. T.; Corradini, M.; Rempe, J.; ...

    2016-11-02

    The U.S. Department of Energy (DOE) has played a major role in the U.S. response to the events at Fukushima Daiichi. During the first several weeks following the accident, U.S. assistance efforts were guided by results from a significant and diverse set of analyses. In the months that followed, a coordinated analysis activity aimed at gaining a more thorough understanding of the accident sequence was completed using laboratory-developed, system-level best-estimate accident analysis codes, while a parallel analysis was conducted by U.S. industry. A comparison of predictions for Unit 1 from these two studies indicated significant differences between MAAP and MELCORmore » results for key plant parameters, such as in-core hydrogen production. On that basis, a crosswalk was completed to determine the key modeling variations that led to these differences. In parallel with these activities, it became clear that there was a need to perform a technology gap evaluation on accident-tolerant components and severe accident analysis methodologies with the goal of identifying any data and/or knowledge gaps that may exist given the current state of light water reactor (LWR) severe accident research and augmented by insights from Fukushima. In addition, there is growing international recognition that data from Fukushima could significantly reduce uncertainties related to severe accident progression, particularly for boiling water reactors. On these bases, a group of U. S. experts in LWR safety and plant operations was convened by the DOE Office of Nuclear Energy (DOE-NE) to complete technology gap analysis and Fukushima forensics data needs identification activities. The results from these activities were used as the basis for refining DOE-NE's severe accident research and development (R&D) plan. Finally, this paper provides a high-level review of DOE-sponsored R&D efforts in these areas, including planned activities on accident-tolerant components and accident analysis methods.« less

  5. Common Bolted Joint Analysis Tool

    NASA Technical Reports Server (NTRS)

    Imtiaz, Kauser

    2011-01-01

    Common Bolted Joint Analysis Tool (comBAT) is an Excel/VB-based bolted joint analysis/optimization program that lays out a systematic foundation for an inexperienced or seasoned analyst to determine fastener size, material, and assembly torque for a given design. Analysts are able to perform numerous what-if scenarios within minutes to arrive at an optimal solution. The program evaluates input design parameters, performs joint assembly checks, and steps through numerous calculations to arrive at several key margins of safety for each member in a joint. It also checks for joint gapping, provides fatigue calculations, and generates joint diagrams for a visual reference. Optimum fastener size and material, as well as correct torque, can then be provided. Analysis methodology, equations, and guidelines are provided throughout the solution sequence so that this program does not become a "black box:" for the analyst. There are built-in databases that reduce the legwork required by the analyst. Each step is clearly identified and results are provided in number format, as well as color-coded spelled-out words to draw user attention. The three key features of the software are robust technical content, innovative and user friendly I/O, and a large database. The program addresses every aspect of bolted joint analysis and proves to be an instructional tool at the same time. It saves analysis time, has intelligent messaging features, and catches operator errors in real time.

  6. Biosensor commercialization strategy - a theoretical approach.

    PubMed

    Lin, Chin-Tsai; Wang, Su-Man

    2005-01-01

    Biosensors are analytical devices, which use biological interactions to provide either qualitative or quantitative results. They are extensively employed in many fields such as clinical diagnosis and biomedicine, military applications, anti-terrorism, farm, garden and veterinary analysis, process control, fermentation control and analysis, pharmaceutical and drug analysis, food and drink production and analysis, pollution control and monitoring, microbiology, bacterial and viral analysis, mining, and industrial and toxic gases. The biosensor market has significantly increased and will be mushrooming in the next decade. The total biosensor market is estimated to be 10.8 billion dollars by 2007. The emerging biosensor market presents both opportunities and obstacles to start-up biosensor entrepreneurs. The major challenge and threat for these entrepreneurs is how to predict the biosensor market and how to convert promising biosensor technology into commercialized biosensors. By adopting a simple commercialization strategy framework, we identify two key elements of biosensor commercialization strategy: excludability and complementary asset. We further divide biosensor commercialization environments into four distinct sub-environments: the Attacker's Advantage, Reputation-Based Idea Trading, Greenfield Competition and Ideas Factories. This paper explains how the interaction between these two key elements shapes biosensor commercialization strategy and biosensor industry dynamics. This paper also discusses alternative commercialization strategies for each specific commercialization environment and how to choose from these alternatives. The analysis of this study further provides a good reference for start-up biosensor entrepreneurs to formulate effective biosensor commercialization strategy.

  7. Managing in-hospital quality improvement: An importance-performance analysis to set priorities for ST-elevation myocardial infarction care.

    PubMed

    Aeyels, Daan; Seys, Deborah; Sinnaeve, Peter R; Claeys, Marc J; Gevaert, Sofie; Schoors, Danny; Sermeus, Walter; Panella, Massimiliano; Bruyneel, Luk; Vanhaecht, Kris

    2018-02-01

    A focus on specific priorities increases the success rate of quality improvement efforts for broad and complex-care processes. Importance-performance analysis presents a possible approach to set priorities around which to design and implement effective quality improvement initiatives. Persistent variation in hospital performance makes ST-elevation myocardial infarction care relevant to consider for importance-performance analysis. The purpose of this study was to identify quality improvement priorities in ST-elevation myocardial infarction care. Importance and performance levels of ST-elevation myocardial infarction key interventions were combined in an importance-performance analysis. Content validity indexes on 23 ST-elevation myocardial infarction key interventions of a multidisciplinary RAND Delphi Survey defined importance levels. Structured review of 300 patient records in 15 acute hospitals determined performance levels. The significance of between-hospital variation was determined by a Kruskal-Wallis test. A performance heat-map allowed for hospital-specific priority setting. Seven key interventions were each rated as an overall improvement priority. Priority key interventions related to risk assessment, timely reperfusion by percutaneous coronary intervention and secondary prevention. Between-hospital performance varied significantly for the majority of key interventions. The type and number of priorities varied strongly across hospitals. Guideline adherence in ST-elevation myocardial infarction care is low and improvement priorities vary between hospitals. Importance-performance analysis helps clinicians and management in demarcation of the nature, number and order of improvement priorities. By offering a tailored improvement focus, this methodology makes improvement efforts more specific and achievable.

  8. Analysis of counterfactual quantum key distribution using error-correcting theory

    NASA Astrophysics Data System (ADS)

    Li, Yan-Bing

    2014-10-01

    Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.

  9. Applying phylogenetic analysis to viral livestock diseases: moving beyond molecular typing.

    PubMed

    Olvera, Alex; Busquets, Núria; Cortey, Marti; de Deus, Nilsa; Ganges, Llilianne; Núñez, José Ignacio; Peralta, Bibiana; Toskano, Jennifer; Dolz, Roser

    2010-05-01

    Changes in livestock production systems in recent years have altered the presentation of many diseases resulting in the need for more sophisticated control measures. At the same time, new molecular assays have been developed to support the diagnosis of animal viral disease. Nucleotide sequences generated by these diagnostic techniques can be used in phylogenetic analysis to infer phenotypes by sequence homology and to perform molecular epidemiology studies. In this review, some key elements of phylogenetic analysis are highlighted, such as the selection of the appropriate neutral phylogenetic marker, the proper phylogenetic method and different techniques to test the reliability of the resulting tree. Examples are given of current and future applications of phylogenetic reconstructions in viral livestock diseases. Copyright 2009 Elsevier Ltd. All rights reserved.

  10. Con: Meta-analysis: some key limitations and potential solutions.

    PubMed

    Esterhuizen, Tonya M; Thabane, Lehana

    2016-06-01

    Meta-analysis, a statistical combination of results of several trials to produce a summary effect, has been subject to criticism in the past, mainly for the reasons of poor quality of included studies, heterogeneity between studies meta-analyzed and failing to address publication bias. These limitations can cause the results to be misleading, which is important if policy and practice decisions are based on systematic reviews and meta-analyses. We elaborate on these limitations and illustrate them with examples from the nephrology literature. Finally, we present some potential solutions, notably, education in meta-analysis for evidence producers and consumers as well as the use of individual patient data for meta-analyses. © The Author 2016. Published by Oxford University Press on behalf of ERA-EDTA. All rights reserved.

  11. An approach to market analysis for lighter than air transportation of freight

    NASA Technical Reports Server (NTRS)

    Roberts, P. O.; Marcus, H. S.; Pollock, J. H.

    1975-01-01

    An approach is presented to marketing analysis for lighter than air vehicles in a commercial freight market. After a discussion of key characteristics of supply and demand factors, a three-phase approach to marketing analysis is described. The existing transportation systems are quantitatively defined and possible roles for lighter than air vehicles within this framework are postulated. The marketing analysis views the situation from the perspective of both the shipper and the carrier. A demand for freight service is assumed and the resulting supply characteristics are determined. Then, these supply characteristics are used to establish the demand for competing modes. The process is then iterated to arrive at the market solution.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hosseinizadeh, Ahmad; Mashayekhi, Ghoncheh; Copperman, Jeremy

    Using a manifold-based analysis of experimental diffraction snapshots from an X-ray free electron laser, we determine the three-dimensional structure and conformational landscape of the PR772 virus to a detector-limited resolution of 9 nm. Our results indicate that a single conformational coordinate controls reorganization of the genome, growth of a tubular structure from a portal vertex and release of the genome. Furthermore, these results demonstrate that single-particle X-ray scattering has the potential to shed light on key biological processes.

  13. Compiler analysis for irregular problems in FORTRAN D

    NASA Technical Reports Server (NTRS)

    Vonhanxleden, Reinhard; Kennedy, Ken; Koelbel, Charles; Das, Raja; Saltz, Joel

    1992-01-01

    We developed a dataflow framework which provides a basis for rigorously defining strategies to make use of runtime preprocessing methods for distributed memory multiprocessors. In many programs, several loops access the same off-processor memory locations. Our runtime support gives us a mechanism for tracking and reusing copies of off-processor data. A key aspect of our compiler analysis strategy is to determine when it is safe to reuse copies of off-processor data. Another crucial function of the compiler analysis is to identify situations which allow runtime preprocessing overheads to be amortized. This dataflow analysis will make it possible to effectively use the results of interprocedural analysis in our efforts to reduce interprocessor communication and the need for runtime preprocessing.

  14. CCQM-K126: low polarity organic in water: carbamazepine in surface water

    NASA Astrophysics Data System (ADS)

    Wai-mei Sin, Della; Wong, Yiu-chung; Lehmann, Andreas; Schneider, Rudolf J.; Kakoulides, Elias; Tang Lin, Teo; Qinde, Liu; Cabillic, Julie; Lardy-fontan, Sophie; Nammoonnoy, Jintana; Prevoo-Franzsen, Désirée; López, Eduardo Emilio; Alberti, Cecilia; Su, Fuhai

    2017-01-01

    The key comparison CCQM-K126 low polarity organic in water: carbamazepine in surface water was coordinated by Government Laboratory Hong Kong under the auspices of the Organic Analysis Working Group (OAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM). Eight National Metrology institutes or Designated Institutes participated and participants were requested to report the mass fraction of carbamazepine in surface water study material. The surface water sample was collected in Hong Kong and was gravimetrically spiked with standard solution. This study provided the means for assessing measurement capabilities for determination of low molecular weight analytes (mass range 100-500) and low polarity (pKOW<= -2) in aqueous matrix. Nine NMIs/DIs registered for the KC and one withdrew before results were submitted. Nine results were submitted by the eight participants. Eight results applied the LC-MS/MS method and Isotope Dilution Mass Spectrometry approach for quantification. BAM additionally submitted a result from ELISA that was not included in the key comparison reference values (KCRV) calculation as is provided in the report for information. One further result was not included as the participant withdrew their result from the calculation after further analysis. The assigned KCRV was the median of the seven results and was assigned a KCRV of 250.2 ng/kg with a combined standard uncertainty of 3.6 ng/kg, The k-factor for the estimation of the expanded uncertainty of the KCRVs was chosen as k = 2. The degree of equivalence (with the KCRV) and its uncertainty was calculated for each result. Seven of the participants were able to demonstrate the ability to quantitatively determine low-polarity analyte in aqueous matrix by applying LC-MS/MS technique at a very low level. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  15. Determination of Shear Wave Velocity in Offshore Terengganu for Ground Response Analysis

    NASA Astrophysics Data System (ADS)

    Mazlina, M.; Liew, M. S.; Adnan, A.; Harahap, I. S. H.; Hamid, N. A.

    2018-04-01

    Amount of vibration received in any location can be analysed by conducting ground response analysis. Even though there are three different methods available in this analysis, One Dimensional ground response analysis method has been widely used. Shear wave velocity is one of the key parameters in this analysis. A lot of correlations have been formulated to determine shear wave velocity with cone penetration test. In this study, correlations developed for Quaternary geological age have been selected. Six equations have been adopted comprise of all soil and soil type dependent correlations. Two platforms sites consist of clay and combination of clay and sand have been analysed. Shear velocity to be used in ground response analysis has been obtained. Results have been illustrated in graphs where shear velocity for each case has been plotted. In avoiding under or over predicting of shear wave velocity, the average of all soil and soil type dependent results will be used as final Vs value.

  16. Implementing recovery: an analysis of the key technologies in Scotland

    PubMed Central

    2011-01-01

    Background Over the past ten years the promotion of recovery has become a stated aim of mental health policies within a number of English speaking countries, including Scotland. Implementation of a recovery approach involves a significant reorientation of mental health services and practices, which often poses significant challenges for reformers. This article examines how four key technologies of recovery have assisted in the move towards the creation of a recovery-oriented mental health system in Scotland. Methods Drawing on documentary analysis and a series of interviews we examine the construction and implementation of four key recovery 'technologies' as they have been put to use in Scotland: recovery narratives, the Scottish Recovery Indicator (SRI), Wellness Recovery Action Planning (WRAP) and peer support. Results Our findings illuminate how each of these technologies works to instantiate, exemplify and disseminate a 'recovery orientation' at different sites within the mental health system in order to bring about a 'recovery oriented' mental health system. They also enable us to identify some of the factors that facilitate or hinder the effectiveness of those technologies in bringing about a change in how mental health services are delivered in Scotland. These finding provide a basis for some general reflections on the utility of 'recovery technologies' to implement a shift towards recovery in mental health services in Scotland and elsewhere. Conclusions Our analysis of this process within the Scottish context will be valuable for policy makers and service coordinators wishing to implement recovery values within their own national mental health systems. PMID:21569633

  17. Denoising of chaotic signal using independent component analysis and empirical mode decomposition with circulate translating

    NASA Astrophysics Data System (ADS)

    Wen-Bo, Wang; Xiao-Dong, Zhang; Yuchan, Chang; Xiang-Li, Wang; Zhao, Wang; Xi, Chen; Lei, Zheng

    2016-01-01

    In this paper, a new method to reduce noises within chaotic signals based on ICA (independent component analysis) and EMD (empirical mode decomposition) is proposed. The basic idea is decomposing chaotic signals and constructing multidimensional input vectors, firstly, on the base of EMD and its translation invariance. Secondly, it makes the independent component analysis on the input vectors, which means that a self adapting denoising is carried out for the intrinsic mode functions (IMFs) of chaotic signals. Finally, all IMFs compose the new denoised chaotic signal. Experiments on the Lorenz chaotic signal composed of different Gaussian noises and the monthly observed chaotic sequence on sunspots were put into practice. The results proved that the method proposed in this paper is effective in denoising of chaotic signals. Moreover, it can correct the center point in the phase space effectively, which makes it approach the real track of the chaotic attractor. Project supported by the National Science and Technology, China (Grant No. 2012BAJ15B04), the National Natural Science Foundation of China (Grant Nos. 41071270 and 61473213), the Natural Science Foundation of Hubei Province, China (Grant No. 2015CFB424), the State Key Laboratory Foundation of Satellite Ocean Environment Dynamics, China (Grant No. SOED1405), the Hubei Provincial Key Laboratory Foundation of Metallurgical Industry Process System Science, China (Grant No. Z201303), and the Hubei Key Laboratory Foundation of Transportation Internet of Things, Wuhan University of Technology, China (Grant No.2015III015-B02).

  18. Medical technology as a key driver of rising health expenditure: disentangling the relationship

    PubMed Central

    Sorenson, Corinna; Drummond, Michael; Bhuiyan Khan, Beena

    2013-01-01

    Health care spending has risen steadily in most countries, becoming a concern for decision-makers worldwide. Commentators often point to new medical technology as the key driver for burgeoning expenditures. This paper critically appraises this conjecture, based on an analysis of the existing literature, with the aim of offering a more detailed and considered analysis of this relationship. Several databases were searched to identify relevant literature. Various categories of studies (eg, multivariate and cost-effectiveness analyses) were included to cover different perspectives, methodological approaches, and issues regarding the link between medical technology and costs. Selected articles were reviewed and relevant information was extracted into a standardized template and analyzed for key cross-cutting themes, ie, impact of technology on costs, factors influencing this relationship, and methodological challenges in measuring such linkages. A total of 86 studies were reviewed. The analysis suggests that the relationship between medical technology and spending is complex and often conflicting. Findings were frequently contingent on varying factors, such as the availability of other interventions, patient population, and the methodological approach employed. Moreover, the impact of technology on costs differed across technologies, in that some (eg, cancer drugs, invasive medical devices) had significant financial implications, while others were cost-neutral or cost-saving. In light of these issues, we argue that decision-makers and other commentators should extend their focus beyond costs solely to include consideration of whether medical technology results in better value in health care and broader socioeconomic benefits. PMID:23807855

  19. Towards a taxonomy for integrated care: a mixed-methods study

    PubMed Central

    Valentijn, Pim P.; Boesveld, Inge C.; van der Klauw, Denise M.; Ruwaard, Dirk; Struijs, Jeroen N.; Molema, Johanna J.W.; Bruijnzeels, Marc A.; Vrijhoef, Hubertus JM.

    2015-01-01

    Introduction Building integrated services in a primary care setting is considered an essential important strategy for establishing a high-quality and affordable health care system. The theoretical foundations of such integrated service models are described by the Rainbow Model of Integrated Care, which distinguishes six integration dimensions (clinical, professional, organisational, system, functional and normative integration). The aim of the present study is to refine the Rainbow Model of Integrated Care by developing a taxonomy that specifies the underlying key features of the six dimensions. Methods First, a literature review was conducted to identify features for achieving integrated service delivery. Second, a thematic analysis method was used to develop a taxonomy of key features organised into the dimensions of the Rainbow Model of Integrated Care. Finally, the appropriateness of the key features was tested in a Delphi study among Dutch experts. Results The taxonomy consists of 59 key features distributed across the six integration dimensions of the Rainbow Model of Integrated Care. Key features associated with the clinical, professional, organisational and normative dimensions were considered appropriate by the experts. Key features linked to the functional and system dimensions were considered less appropriate. Discussion This study contributes to the ongoing debate of defining the concept and typology of integrated care. This taxonomy provides a development agenda for establishing an accepted scientific framework of integrated care from an end-user, professional, managerial and policy perspective. PMID:25759607

  20. Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

    PubMed Central

    Chen, Huifang; Xie, Lei

    2014-01-01

    Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC) and the revocation polynomial (RP), the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked. PMID:25529204

  1. First results of the Nordic and Baltic GNSS Analysis Centre

    NASA Astrophysics Data System (ADS)

    Lahtinen, Sonja; Pasi, Häkli; Jivall, Lotti; Kempe, Christina; Kollo, Karin; Kosenko, Ksenija; Pihlak, Priit; Prizginiene, Dalia; Tangen, Oddvar; Weber, Mette; Paršeliūnas, Eimuntas; Baniulis, Rimvydas; Galinauskas, Karolis

    2018-03-01

    The Nordic Geodetic Commission (NKG) has launched a joint NKG GNSS Analysis Centre that aims to routinely produce high qualityGNSS solutions for the common needs of the NKG and the Nordic and Baltic countries. A consistent and densified velocity field is needed for the constraining of the gla-cial isostatic adjustment (GIA) modelling that is a key component of maintaining the national reference frame realisations in the area. We described the methods of the NKG GNSS Analysis Centre including the defined processing setup for the local analysis centres (LAC) and for the combination centres.We analysed the results of the first 2.5 years (2014.5-2016). The results showed that different subnets were consistent with the combined solution within 1-2 mm level. We observed the so called network effect affecting our reference frame alignment. However, the accuracy of the reference frame alignment was on a few millimetre level in the area of the main interest (Nordic and Baltic Countries). TheNKGGNSS AC was declared fully operational in April 2017.

  2. MARIKA - A model revision system using qualitative analysis of simulations. [of human orientation system

    NASA Technical Reports Server (NTRS)

    Groleau, Nicolas; Frainier, Richard; Colombano, Silvano; Hazelton, Lyman; Szolovits, Peter

    1993-01-01

    This paper describes portions of a novel system called MARIKA (Model Analysis and Revision of Implicit Key Assumptions) to automatically revise a model of the normal human orientation system. The revision is based on analysis of discrepancies between experimental results and computer simulations. The discrepancies are calculated from qualitative analysis of quantitative simulations. The experimental and simulated time series are first discretized in time segments. Each segment is then approximated by linear combinations of simple shapes. The domain theory and knowledge are represented as a constraint network. Incompatibilities detected during constraint propagation within the network yield both parameter and structural model alterations. Interestingly, MARIKA diagnosed a data set from the Massachusetts Eye and Ear Infirmary Vestibular Laboratory as abnormal though the data was tagged as normal. Published results from other laboratories confirmed the finding. These encouraging results could lead to a useful clinical vestibular tool and to a scientific discovery system for space vestibular adaptation.

  3. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  4. AOP: An R Package For Sufficient Causal Analysis in Pathway ...

    EPA Pesticide Factsheets

    Summary: How can I quickly find the key events in a pathway that I need to monitor to predict that a/an beneficial/adverse event/outcome will occur? This is a key question when using signaling pathways for drug/chemical screening in pharma-cology, toxicology and risk assessment. By identifying these sufficient causal key events, we have fewer events to monitor for a pathway, thereby decreasing assay costs and time, while maximizing the value of the information. I have developed the “aop” package which uses backdoor analysis of causal net-works to identify these minimal sets of key events that are suf-ficient for making causal predictions. Availability and Implementation: The source and binary are available online through the Bioconductor project (http://www.bioconductor.org/) as an R package titled “aop”. The R/Bioconductor package runs within the R statistical envi-ronment. The package has functions that can take pathways (as directed graphs) formatted as a Cytoscape JSON file as input, or pathways can be represented as directed graphs us-ing the R/Bioconductor “graph” package. The “aop” package has functions that can perform backdoor analysis to identify the minimal set of key events for making causal predictions.Contact: burgoon.lyle@epa.gov This paper describes an R/Bioconductor package that was developed to facilitate the identification of key events within an AOP that are the minimal set of sufficient key events that need to be tested/monit

  5. Analysis of digital communication signals and extraction of parameters

    NASA Astrophysics Data System (ADS)

    Al-Jowder, Anwar

    1994-12-01

    The signal classification performance of four types of electronics support measure (ESM) communications detection systems is compared from the standpoint of the unintended receiver (interceptor). Typical digital communication signals considered include binary phase shift keying (BPSK), quadrature phase shift keying (QPSK), frequency shift keying (FSK), and on-off keying (OOK). The analysis emphasizes the use of available signal processing software. Detection methods compared include broadband energy detection, FFT-based narrowband energy detection, and two correlation methods which employ the fast Fourier transform (FFT). The correlation methods utilize modified time-frequency distributions, where one of these is based on the Wigner-Ville distribution (WVD). Gaussian white noise is added to the signal to simulate various signal-to-noise ratios (SNR's).

  6. Design Considerations for a New Terminal Area Arrival Scheduler

    NASA Technical Reports Server (NTRS)

    Thipphavong, Jane; Mulfinger, Daniel

    2010-01-01

    Design of a terminal area arrival scheduler depends on the interrelationship between throughput, delay and controller intervention. The main contribution of this paper is an analysis of the above interdependence for several stochastic behaviors of expected system performance distributions in the aircraft s time of arrival at the meter fix and runway. Results of this analysis serve to guide the scheduler design choices for key control variables. Two types of variables are analyzed, separation buffers and terminal delay margins. The choice for these decision variables was tested using sensitivity analysis. Analysis suggests that it is best to set the separation buffer at the meter fix to its minimum and adjust the runway buffer to attain the desired system performance. Delay margin was found to have the least effect. These results help characterize the variables most influential in the scheduling operations of terminal area arrivals.

  7. Economic Efficiency and Investment Timing for Dual Water Systems

    NASA Astrophysics Data System (ADS)

    Leconte, Robert; Hughes, Trevor C.; Narayanan, Rangesan

    1987-10-01

    A general methodology to evaluate the economic feasibility of dual water systems is presented. In a first step, a static analysis (evaluation at a single point in time) is developed. The analysis requires the evaluation of consumers' and producer's surpluses from water use and the capital cost of the dual (outdoor) system. The analysis is then extended to a dynamic approach where the water demand increases with time (as a result of a population increase) and where the dual system is allowed to expand. The model determines whether construction of a dual system represents a net benefit, and if so, what is the best time to initiate the system (corresponding to maximization of social welfare). Conditions under which an analytic solution is possible are discussed and results of an application are summarized (including sensitivity to different parameters). The analysis allows identification of key parameters influencing attractiveness of dual water systems.

  8. Comment on "High resolution coherence analysis between planetary and climate oscillations"

    NASA Astrophysics Data System (ADS)

    Holm, Sverre

    2018-07-01

    The paper by Scafetta entitled "High resolution coherence analysis between planetary and climate oscillations", May 2016 claims coherence between planetary movements and the global temperature anomaly. The claim is based on data analysis using the canonical covariance analysis (CCA) estimator for the magnitude squared coherence (MSC). It assumes a model with a predetermined number of sinusoids for the climate data. The results are highly dependent on this prior assumption, and may therefore be criticized for being based on the opposite of a null hypothesis. More importantly, since values of key parameters in the CCA method are not given, some experiments have been performed using the software of the original authors of the CCA estimator. The purpose was to replicate the results of Scafetta using what was perceived to be the most probable parameter values. Despite best efforts, this was not possible.

  9. Large scale nanoparticle screening for small molecule analysis in laser desorption ionization mass spectrometry

    DOE PAGES

    Yagnik, Gargey B.; Hansen, Rebecca L.; Korte, Andrew R.; ...

    2016-08-30

    Nanoparticles (NPs) have been suggested as efficient matrixes for small molecule profiling and imaging by laser-desorption ionization mass spectrometry (LDI-MS), but so far there has been no systematic study comparing different NPs in the analysis of various classes of small molecules. Here, we present a large scale screening of 13 NPs for the analysis of two dozen small metabolite molecules. Many NPs showed much higher LDI efficiency than organic matrixes in positive mode and some NPs showed comparable efficiencies for selected analytes in negative mode. Our results suggest that a thermally driven desorption process is a key factor for metalmore » oxide NPs, but chemical interactions are also very important, especially for other NPs. Furthermore, the screening results provide a useful guideline for the selection of NPs in the LDI-MS analysis of small molecules.« less

  10. Large scale nanoparticle screening for small molecule analysis in laser desorption ionization mass spectrometry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yagnik, Gargey B.; Hansen, Rebecca L.; Korte, Andrew R.

    Nanoparticles (NPs) have been suggested as efficient matrixes for small molecule profiling and imaging by laser-desorption ionization mass spectrometry (LDI-MS), but so far there has been no systematic study comparing different NPs in the analysis of various classes of small molecules. Here, we present a large scale screening of 13 NPs for the analysis of two dozen small metabolite molecules. Many NPs showed much higher LDI efficiency than organic matrixes in positive mode and some NPs showed comparable efficiencies for selected analytes in negative mode. Our results suggest that a thermally driven desorption process is a key factor for metalmore » oxide NPs, but chemical interactions are also very important, especially for other NPs. Furthermore, the screening results provide a useful guideline for the selection of NPs in the LDI-MS analysis of small molecules.« less

  11. Citizenship Education in Latin America: Priorities of School Curricula. IBE Working Papers on Curriculum Issues No. 14

    ERIC Educational Resources Information Center

    Cox, Cristián; Bascopé, Martín; Castillo, Juan Carlos; Miranda, Daniel; Bonhomme, Macarena

    2015-01-01

    What are the key contents related to democratic life in the curricula of civic and citizenship education in Latin American countries? What values and dimensions are most emphasized? This document summarizes the results of a comparative analysis of civic/citizenship curricula for primary and secondary education in six Latin American countries…

  12. "The Boy in the Dress": Queering Mantle of the Expert

    ERIC Educational Resources Information Center

    Terret, Liselle

    2013-01-01

    In this paper I offer a queer analysis of several key moments during a Mantle of the Expert (MoE) project that resulted in Year 5 children creating performances and engaging with heightened versions of gendered femininity in their primary school. I will refer to theoretical notions of transvestism as a means of challenging the notions of binarism,…

  13. Long-Term Outcome from a Medium Secure Service for People with Intellectual Disability

    ERIC Educational Resources Information Center

    Alexander, R. T.; Crouch, K.; Halstead, S.; Piachaud, J.

    2006-01-01

    Background: The purpose of this paper is to describe long-term outcomes for patients discharged over a 12-year period from a medium secure service for people with intellectual disabilities (ID). Methods: A cohort study using case-notes analysis and a structured interview of current key informants. Results: Eleven per cent of the sample was…

  14. Sensitivity analysis of key components in large-scale hydroeconomic models

    NASA Astrophysics Data System (ADS)

    Medellin-Azuara, J.; Connell, C. R.; Lund, J. R.; Howitt, R. E.

    2008-12-01

    This paper explores the likely impact of different estimation methods in key components of hydro-economic models such as hydrology and economic costs or benefits, using the CALVIN hydro-economic optimization for water supply in California. In perform our analysis using two climate scenarios: historical and warm-dry. The components compared were perturbed hydrology using six versus eighteen basins, highly-elastic urban water demands, and different valuation of agricultural water scarcity. Results indicate that large scale hydroeconomic hydro-economic models are often rather robust to a variety of estimation methods of ancillary models and components. Increasing the level of detail in the hydrologic representation of this system might not greatly affect overall estimates of climate and its effects and adaptations for California's water supply. More price responsive urban water demands will have a limited role in allocating water optimally among competing uses. Different estimation methods for the economic value of water and scarcity in agriculture may influence economically optimal water allocation; however land conversion patterns may have a stronger influence in this allocation. Overall optimization results of large-scale hydro-economic models remain useful for a wide range of assumptions in eliciting promising water management alternatives.

  15. Content Analysis of the 20 Most Influential Articles in "PIQ"

    ERIC Educational Resources Information Center

    Cho, Yonjoo; Park, Sunyoung

    2012-01-01

    The purpose of this study is to examine key research themes in human performance technology (HPT) through content analysis of the 20 most influential articles identified in Cho, Jo, Park, Kang, and Chen (2011). Three questions guiding this inquiry are: (1) What are the key themes of the 20 most influential articles in "PIQ", (2) What information…

  16. Critical management practices influencing on-site waste minimization in construction projects.

    PubMed

    Ajayi, Saheed O; Oyedele, Lukumon O; Bilal, Muhammad; Akinade, Olugbenga O; Alaka, Hafiz A; Owolabi, Hakeem A

    2017-01-01

    As a result of increasing recognition of effective site management as the strategic approach for achieving the required performance in construction projects, this study seeks to identify the key site management practices that are requisite for construction waste minimization. A mixed methods approach, involving field study and survey research were used as means of data collection. After confirmation of construct validity and reliability of scale, data analysis was carried out through a combination of Kruskal-Wallis test, descriptive statistics and exploratory factor analysis. The study suggests that site management functions could significantly reduce waste generation through strict adherence to project drawings, and by ensuring fewer or no design changes during construction process. Provision of waste skips for specific materials and maximisation of on-site reuse of materials are also found to be among the key factors for engendering waste minimization. The result of factor analysis suggests four factors underlying on-site waste management practices with 96.093% of total variance. These measures include contractual provisions for waste minimization, waste segregation, maximisation of materials reuse and effective logistic management. Strategies through which each of the underlying measures could be achieved are further discussed in the paper. Findings of this study would assist construction site managers and other site operatives in reducing waste generated by construction activities. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. A retrospective analysis of in vivo eye irritation, skin irritation and skin sensitisation studies with agrochemical formulations: Setting the scene for development of alternative strategies.

    PubMed

    Corvaro, M; Gehen, S; Andrews, K; Chatfield, R; Macleod, F; Mehta, J

    2017-10-01

    Analysis of the prevalence of health effects in large scale databases is key in defining testing strategies within the context of Integrated Approaches on Testing and Assessment (IATA), and is relevant to drive policy changes in existing regulatory toxicology frameworks towards non-animal approaches. A retrospective analysis of existing results from in vivo skin irritation, eye irritation, and skin sensitisation studies on a database of 223 agrochemical formulations is herein published. For skin or eye effects, high prevalence of mild to non-irritant formulations (i.e. per GHS, CLP or EPA classification) would generally suggest a bottom-up approach. Severity of erythema or corneal opacity, for skinor eye effects respectively, were the key drivers for classification, consistent with existing literature. The reciprocal predictivity of skin versus eye irritation and the good negative predictivity of the GHS additivity calculation approach (>85%) provided valuable non-testing evidence for irritation endpoints. For dermal sensitisation, concordance on data from three different methods confirmed the high false negative rate for the Buehler method in this product class. These results have been reviewed together with existing literature on the use of in vitro alternatives for agrochemical formulations, to propose improvements to current regulatory strategies and to identify further research needs. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Analysis on the inbound tourist source market in Fujian Province

    NASA Astrophysics Data System (ADS)

    YU, Tong

    2017-06-01

    The paper analyzes the development and structure of inbound tourism in Fujian Province by Excel software and conducts the cluster analysis on the inbound tourism market by SPSS 23.0 software based on the inbound tourism data of Fujian Province from 2006 to 2015. The results show: the rapid development of inbound tourism in Fujian Province and the diversified inbound tourist source countries indicate the stability of inbound tourism market; the inbound tourist source market in Fujian Province can be divided into four categories according to the cluster analysis, and tourists from the United States, Japan, Malaysia, and Singapore are the key of inbound tourism in Fujian Province.

  19. Initial empirical analysis of nuclear power plant organization and its effect on safety performance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olson, J.; McLaughlin, S.D.; Osborn, R.N.

    This report contains an analysis of the relationship between selected aspects of organizational structure and the safety-related performance of nuclear power plants. The report starts by identifying and operationalizing certain key dimensions of organizational structure that may be expected to be related to plant safety performance. Next, indicators of plant safety performance are created by combining existing performance measures into more reliable indicators. Finally, the indicators of plant safety performance using correlational and discriminant analysis. The overall results show that plants with better developed coordination mechanisms, shorter vertical hierarchies, and a greater number of departments tend to perform more safely.

  20. Gold potential in the Dalradian rocks of NW Northern Ireland: GIS-based prospectivity analysis using Tellus data

    NASA Astrophysics Data System (ADS)

    Lusty, P. A. J.; McDonnell, P. M.; Gunn, A. G.; Chacksfield, B. C.; Cooper, M.

    2009-04-01

    Geographic Information Systems (GIS) are essential tools for the management and integration of the large amounts of multivariate spatial data used in mineral exploration. Prospectivity analysis combines these datasets, in the context of a mineral deposit model, to produce a map showing the distribution of potential for a particular type of mineral deposit. In this example Arc-Spatial Data Modeller software has been used to analyse the prospectivity for orogenic vein gold mineralisation in the Dalradian rocks of north-western Northern Ireland. A knowledge-driven (fuzzy logic) approach was used because of the small number of gold deposits within the area. Fuzzy logic is used in situations where information is inexact and the use of classical set theory is inappropriate. Fuzzy logic allows assignment of weightings to exploration data on a continuous scale from 1 (full membership) to 0 (full non-membership). This allows a level of uncertainty or 'fuzziness' to be incorporated into the modelling. The key stages of prospectivity analysis are: (1) analysis of the deposit model to determine key exploration indicators; (2) data processing, interpretation and analysis to extract key indicators; (3) assignment of weightings, zones and styles of influence to key indicators; and (4) calculation of prospectivity. This research is based largely on new geochemical and geophysical data resulting from the Tellus Project in Northern Ireland. The Tellus Project involved geochemical and airborne geophysical surveys over the whole of Northern Ireland carried out between 2004-6 with funding from the Government of Northern Ireland. The study area (3074 km2) is underlain mainly by Neoproterozoic rocks of the Dalradian Supergroup (ca. 590 Ma) which form part of the Caledonide orogenic belt. The Dalradian Supergroup comprises a thick succession of semi-pelites, psammites and pelites, with graphitic pelite horizons that host much of the known gold mineralisation. In the Sperrin Mountains two advanced gold projects, Curraghinalt and Golan Burn, and an operating mine, Omagh (Cavanacaw), are hosted by Dalradian rocks. The Dalradian rocks of Northern Ireland were extensively deformed during the Grampian Orogeny and at least four phases of deformation are recognised. On a deposit scale distinct differences are observed between Curraghinalt and Cavanacaw including orientation of principal structures, mineralogy and geochemistry. The mineral prospectivity analysis integrated a range of datasets including: 1:250 000 scale geological mapping, mineral occurrences, fault vectors, Tellus drainage geochemistry and geophysics. In order to assess the differences between the Curraghinalt and Cavanacaw mineral deposit models separate prospectivity models were parameterised. The key differences between the two models relate to the weightings attached to the structural vectors and the significance given to particular chemical elements in the drainage geochemical dataset. The prospectivity analysis identified several areas prospective for orogenic-style gold mineralisation. Many of the prospective zones either coincide with known occurrences of orogenic gold mineralisation or areas considered highly prospective based upon previous work, validating the process and the model results. The use of specific models for the Curraghinalt and Cavanacaw deposits has produced significant differences in the location and extent of the target areas which provide a basis for focusing exploration for orogenic gold deposits in this region. Detailed examination of all available data and ground truthing is required in order to validate these targets. In addition to delineating new areas favourable for gold mineralisation the prospectivity mapping has provided new insight into possible regional controls on the location of mineralisation and into the geology of this area. Please fill in your abstract text.

  1. Isolation and structure elucidation of the nucleoside antibiotic strepturidin from Streptomyces albus DSM 40763.

    PubMed

    Pesic, Alexander; Steinhaus, Britta; Kemper, Sebastian; Nachtigall, Jonny; Kutzner, Hans Jürgen; Höfle, Gerhard; Süssmuth, Roderich D

    2014-06-01

    The antibiotic strepturidin (1) was isolated from the microorganism Streptomyces albus DSM 40763, and its structure elucidated by spectroscopic methods and chemical degradation studies. The determination of the relative and absolute stereocenters was partially achieved using chiral GC/EI-MS analysis and microderivatization by acetal ring formation and subsequent 2D-NMR analysis of key (1)H,(1)H-NOESY NMR correlations and extraction of (1)H,(13)C coupling constants from (1)H,(13)C-HMBC NMR spectra. Based on these results, a biosynthesis model was proposed.

  2. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  3. Using mixed methods in health research

    PubMed Central

    Woodman, Jenny

    2013-01-01

    Summary Mixed methods research is the use of quantitative and qualitative methods in a single study or series of studies. It is an emergent methodology which is increasingly used by health researchers, especially within health services research. There is a growing literature on the theory, design and critical appraisal of mixed methods research. However, there are few papers that summarize this methodological approach for health practitioners who wish to conduct or critically engage with mixed methods studies. The objective of this paper is to provide an accessible introduction to mixed methods for clinicians and researchers unfamiliar with this approach. We present a synthesis of key methodological literature on mixed methods research, with examples from our own work and that of others, to illustrate the practical applications of this approach within health research. We summarize definitions of mixed methods research, the value of this approach, key aspects of study design and analysis, and discuss the potential challenges of combining quantitative and qualitative methods and data. One of the key challenges within mixed methods research is the successful integration of quantitative and qualitative data during analysis and interpretation. However, the integration of different types of data can generate insights into a research question, resulting in enriched understanding of complex health research problems. PMID:23885291

  4. Post-Buckling and Ultimate Strength Analysis of Stiffened Composite Panel Base on Progressive Damage

    NASA Astrophysics Data System (ADS)

    Zhang, Guofan; Sun, Xiasheng; Sun, Zhonglei

    Stiffened composite panel is the typical thin wall structure applied in aerospace industry, and its main failure mode is buckling subjected to compressive loading. In this paper, the development of an analysis approach using Finite Element Method on post-buckling behavior of stiffened composite structures under compression was presented. Then, the numerical results of stiffened panel are obtained by FE simulations. A thorough comparison were accomplished by comparing the load carrying capacity and key position strains of the specimen with test. The comparison indicates that the FEM results which adopted developed methodology could meet the demand of engineering application in predicting the post-buckling behavior of intact stiffened structures in aircraft design stage.

  5. Analysis of a membrane-based condesate recovery heat exchanger (CRX)

    NASA Technical Reports Server (NTRS)

    Newbold, D.D.

    1993-01-01

    The development of a temperature and humidity control system that can remove heat and recover water vapor is key to the development of an Environmental Control and Life Support System (ECLSS). Large quantities of water vapor must be removed from air, and this operation has proven difficult in the absense of gravity. This paper presents the modeling results from a program to develop a novel membrane-based heat exchanger known as the condensate recovery heat exchanger (CRX). This device cools and dehumidifies humid air and simultaneously recovers water-vapor condensate. In this paper, the CRX is described and the results of an analysis of the heat- and mass-transfer characteristics of the device are given.

  6. Fricke-gel dosimeter: overview of Xylenol Orange chemical behavior

    NASA Astrophysics Data System (ADS)

    Liosi, G. M.; Dondi, D.; Vander Griend, D. A.; Lazzaroni, S.; D'Agostino, G.; Mariani, M.

    2017-11-01

    The complexation between Xylenol Orange (XO) and Fe3+ ions plays a key role in Fricke-gel dosimeters for the determination of the absorbed dose via UV-vis analysis. In this study, the effect of XO and the acidity of the solution on the complexation mechanism was investigated. Moreover, starting from the results of complexation titration and Equilibrium Restricted Factor Analysis, four XO-Fe3+ complexes were identified to contribute to the absorption spectra. Based on the acquired knowledge, a new [Fe3+] vs dose calibration method is proposed. The preliminary results show a significant improvement of the sensitivity and dose threshold with respect to the commonly used Abs vs dose calibration method.

  7. Effects of Fermentation Temperature on Key Aroma Compounds and Sensory Properties of Apple Wine.

    PubMed

    Peng, Bangzhu; Li, Fuling; Cui, Lu; Guo, Yaodong

    2015-12-01

    Fermentation temperature strongly affects yeast metabolism during apple wine making and thus aromatic and quality profiles. In this study, the temperature effect during apple wine making on both the key aroma compounds and sensory properties of apple wine were investigated. The concentration of nine key aroma compounds (ethyl acetate, isobutyl acetate, isopentylacetate, ethyl caprylate, ethyl 4-hydroxybutanoate, isobutylalcohol, isopentylalcohol, 3-methylthio-1-propanol, and benzeneethanol) in apple wine significantly increased with the increase of fermentation temperature from 17 to 20 °C, and then eight out of the nine key aroma compounds with an exception of ethyl 4-hydroxybutanoate, decreased when the temperature goes up 20 to 26 °C. Sensory analysis showed that the apple wine fermented at 20 °C had the highest acceptance for consumers. Fermentation at the temperature of 20 °C was therefore considered to be the most suitable condition using the selected yeast strain (Saccharomyces cerevisiae AP05) for apple wine making. Changes in the fermentation temperature can considerably affect the production of key aroma compounds and sensory profiles of apple wine. These results could help apple wine producers make better quality production for consumers at the optimal fermentation temperature. © 2015 Institute of Food Technologists®

  8. Weighted gene co‑expression network analysis in identification of key genes and networks for ischemic‑reperfusion remodeling myocardium.

    PubMed

    Guo, Nan; Zhang, Nan; Yan, Liqiu; Lian, Zheng; Wang, Jiawang; Lv, Fengfeng; Wang, Yunfei; Cao, Xufen

    2018-06-14

    Acute myocardial infarction induces ventricular remodeling, which is implicated in dilated heart and heart failure. The pathogenical mechanism of myocardium remodeling remains to be elucidated. The aim of the present study was to identify key genes and networks for myocardium remodeling following ischemia‑reperfusion (IR). First, the mRNA expression data from the National Center for Biotechnology Information database were downloaded to identify differences in mRNA expression of the IR heart at days 2 and 7. Then, weighted gene co‑expression network analysis, hierarchical clustering, protein‑protein interaction (PPI) network, Gene Ontology (GO), Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway were used to identify key genes and networks for the heart remodeling process following IR. A total of 3,321 differentially expressed genes were identified during the heart remodeling process. A total of 6 modules were identified through gene co‑expression network analysis. GO and KEGG analysis results suggested that each module represented a different biological function and was associated with different pathways. Finally, hub genes of each module were identified by PPI network construction. The present study revealed that heart remodeling following IR is a complicated process, involving extracellular matrix organization, neural development, apoptosis and energy metabolism. The dysregulated genes, including SRC proto‑oncogene, non‑receptor tyrosine kinase, discs large MAGUK scaffold protein 1, ATP citrate lyase, RAN, member RAS oncogene family, tumor protein p53, and polo like kinase 2, may be essential for heart remodeling following IR and may be used as potential targets for the inhibition of heart remodeling following acute myocardial infarction.

  9. Application of jet-shear-layer mixing and effervescent atomization to the development of a low-NO(x) combustor. Ph.D. Thesis - Purdue Univ.

    NASA Technical Reports Server (NTRS)

    Colantonio, Renato Olaf

    1993-01-01

    An investigation was conducted to develop appropriate technologies for a low-NO(x), liquid-fueled combustor. The combustor incorporates an effervescent atomizer used to inject fuel into a premixing duct. Only a fraction of the combustion air is used in the premixing process to avoid autoignition and flashback problems. This fuel-rich mixture is introduced into the remaining combustion air by a rapid jet-shear-layer-mixing process involving radial fuel-air jets impinging on axial air jets in the primary combustion zone. Computational analysis was used to provide a better understanding of the fluid dynamics that occur in jet-shear-layer mixing and to facilitate a parametric analysis appropriate to the design of an optimum low-NO(x) combustor. A number of combustor configurations were studied to assess the key combustor technologies and to validate the modeling code. The results from the experimental testing and computational analysis indicate a low-NO(x) potential for the jet-shear-layer combustor. Key parameters found to affect NO(x) emissions are the primary combustion zone fuel-air ratio, the number of axial and radial jets, the aspect ratio and radial location of the axial air jets, and the radial jet inlet hole diameter. Each of these key parameters exhibits a low-NO(x) point from which an optimized combustor was developed. Using the parametric analysis, NO(x) emissions were reduced by a factor of 3 as compared with the emissions from conventional, liquid-fueled combustors operating at cruise conditions. Further development promises even lower NO(x) with high combustion efficiency.

  10. CO{sub 2} Laser Ablation Propulsion Area Scaling With Polyoxymethylene Propellant

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sinko, John E.; Ichihashi, Katsuhiro; Ogita, Naoya

    The topic of area scaling is of great importance in the laser propulsion field, including applications to removal of space debris and to selection of size ranges for laser propulsion craft in air or vacuum conditions. To address this issue experimentally, a CO{sub 2} laser operating at up to 10 J was used to irradiate targets. Experiments were conducted in air and vacuum conditions over a range of areas from about 0.05-5 cm{sup 2} to ablate flat polyoxymethylene targets at several fluences. Theoretical effects affecting area scaling, such as rarefaction waves, thermal diffusion, and diffraction, are discussed in terms ofmore » the experimental results. Surface profilometry was used to characterize the ablation samples. A CFD model is used to facilitate analysis, and key results are compared between experimental and model considerations. The dependence of key laser propulsion parameters, including the momentum coupling coefficient and specific impulse, are calculated based on experimental data, and results are compared to existing literature data.« less

  11. An organizational analysis of road traffic crash prevention to explain the difficulties of a national program in a low income country.

    PubMed

    Vogel, Tania; Reinharz, Daniel; Gripenberg, Marissa; Barennes, Hubert

    2015-09-28

    Road traffic crashes (RTC), that daily kill 3400 people and leave 15,000 with a permanent disability could be prevented through the implementation of safety programs developed in partnership with governments and institutions. The relationship between key stakeholders can be a crucial determinant to the effectiveness of road safety programs. This issue has rarely been addressed. We conducted a detailed organizational analysis of the stakeholders involved in road safety programs in Lao People's Democratic Republic (Lao PDR). A case study was performed. The framework used was a snowball effect in which the characterization of all key stakeholders and the links between them, as well as the factors that led to these links, were determined. The effect of the relations between key stakeholders on the prevention of RTC was assessed through an analysis of the transactional, intangible and controlling factors that influence these relationships. The design and implementation of road safety programs in Lao PDR suffer from weak relationships between stakeholders and a poorly functional bicephal leadership between the Ministry of Public Works and Transport and the non-governmental organisation called Handicap International. This poor coordination between key stakeholders is evident, particularly in the area of collective action and is reinforced by a lack of interest from several different stakeholders. Most agencies do not prioritize road safety. Uneven distribution of funding is another contributing factor. Strengthening the leadership is crucial to the success of the program. Some organisations have skills, power the decision making and the allocation of resources in regards to road safety programs. Encouraging participation of these organizations through a more prominent position would thus result in a better collaboration. Non-monetary rewards would further help to strengthen collaborative work. The bicephal nature of the leadership of road safety programs proves detrimental, is associated with a weak coalition between stakeholders, and contributes to the declaimed poor effectiveness of the existing programs. The study has identified non-monetary and realistic means of strengthening the collaboration between key stakeholders. Stakeholders need to revise their interpretive schemes, in order to actively support the reinforcement of government leadership of road safety policies.

  12. Spatially organizing biochemistry: choosing a strategy to translate synthetic biology to the factory.

    PubMed

    Jakobson, Christopher M; Tullman-Ercek, Danielle; Mangan, Niall M

    2018-05-29

    Natural biochemical systems are ubiquitously organized both in space and time. Engineering the spatial organization of biochemistry has emerged as a key theme of synthetic biology, with numerous technologies promising improved biosynthetic pathway performance. One strategy, however, may produce disparate results for different biosynthetic pathways. We use a spatially resolved kinetic model to explore this fundamental design choice in systems and synthetic biology. We predict that two example biosynthetic pathways have distinct optimal organization strategies that vary based on pathway-dependent and cell-extrinsic factors. Moreover, we demonstrate that the optimal design varies as a function of kinetic and biophysical properties, as well as culture conditions. Our results suggest that organizing biosynthesis has the potential to substantially improve performance, but that choosing the appropriate strategy is key. The flexible design-space analysis we propose can be adapted to diverse biosynthetic pathways, and lays a foundation to rationally choose organization strategies for biosynthesis.

  13. Security analysis of quadratic phase based cryptography

    NASA Astrophysics Data System (ADS)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Healy, John J.; Sheridan, John T.

    2016-09-01

    The linear canonical transform (LCT) is essential in modeling a coherent light field propagation through first-order optical systems. Recently, a generic optical system, known as a Quadratic Phase Encoding System (QPES), for encrypting a two-dimensional (2D) image has been reported. It has been reported together with two phase keys the individual LCT parameters serve as keys of the cryptosystem. However, it is important that such the encryption systems also satisfies some dynamic security properties. Therefore, in this work, we examine some cryptographic evaluation methods, such as Avalanche Criterion and Bit Independence, which indicates the degree of security of the cryptographic algorithms on QPES. We compare our simulation results with the conventional Fourier and the Fresnel transform based DRPE systems. The results show that the LCT based DRPE has an excellent avalanche and bit independence characteristics than that of using the conventional Fourier and Fresnel based encryption systems.

  14. Cloud Feedback Key to Marine Heatwave off Baja California

    NASA Astrophysics Data System (ADS)

    Myers, Timothy A.; Mechoso, Carlos R.; Cesana, Gregory V.; DeFlorio, Michael J.; Waliser, Duane E.

    2018-05-01

    Between 2013 and 2015, the northeast Pacific Ocean experienced the warmest surface temperature anomalies in the modern observational record. This "marine heatwave" marked a shift of Pacific decadal variability to its warm phase and was linked to significant impacts on marine species as well as exceptionally arid conditions in western North America. Here we show that the subtropical signature of this warming, off Baja California, was associated with a record deficit in the spatial coverage of co-located marine boundary layer clouds. This deficit coincided with a large increase in downwelling solar radiation that dominated the anomalous energy budget of the upper ocean, resulting in record-breaking warm sea surface temperature anomalies. Our observation-based analysis suggests that a positive cloud-surface temperature feedback was key to the extreme intensity of the heatwave. The results demonstrate the extent to which boundary layer clouds can contribute to regional variations in climate.

  15. Classification of Bitter Orange Essential Oils According to Fruit Ripening Stage by Untargeted Chemical Profiling and Machine Learning.

    PubMed

    Taghadomi-Saberi, Saeedeh; Mas Garcia, Sílvia; Allah Masoumi, Amin; Sadeghi, Morteza; Marco, Santiago

    2018-06-13

    The quality and composition of bitter orange essential oils (EOs) strongly depend on the ripening stage of the citrus fruit. The concentration of volatile compounds and consequently its organoleptic perception varies. While this can be detected by trained humans, we propose an objective approach for assessing the bitter orange from the volatile composition of their EO. The method is based on the combined use of headspace gas chromatography⁻mass spectrometry (HS-GC-MS) and artificial neural networks (ANN) for predictive modeling. Data obtained from the analysis of HS-GC-MS were preprocessed to select relevant peaks in the total ion chromatogram as input features for ANN. Results showed that key volatile compounds have enough predictive power to accurately classify the EO, according to their ripening stage for different applications. A sensitivity analysis detected the key compounds to identify the ripening stage. This study provides a novel strategy for the quality control of bitter orange EO without subjective methods.

  16. Description of inpatient medication management using cognitive work analysis.

    PubMed

    Pingenot, Alleene Anne; Shanteau, James; Sengstacke, L T C Daniel N

    2009-01-01

    The purpose of this article was to describe key elements of an inpatient medication system using the cognitive work analysis method of Rasmussen et al (Cognitive Systems Engineering. Wiley Series in Systems Engineering; 1994). The work of nurses and physicians were observed in routine care of inpatients on a medical-surgical unit and attached ICU. Interaction with pharmacists was included. Preoperative, postoperative, and medical care was observed. Personnel were interviewed to obtain information not easily observable during routine work. Communication between healthcare workers was projected onto an abstraction/decomposition hierarchy. Decision ladders and information flow charts were developed. Results suggest that decision making on an inpatient medical/surgical unit or ICU setting is a parallel, distributed process. Personnel are highly mobile and often are working on multiple issues concurrently. In this setting, communication is key to maintaining organization and synchronization for effective care. Implications for research approaches to system and interface designs and decision support for personnel involved in the process are discussed.

  17. Effective Heart Disease Detection Based on Quantitative Computerized Traditional Chinese Medicine Using Representation Based Classifiers.

    PubMed

    Shu, Ting; Zhang, Bob; Tang, Yuan Yan

    2017-01-01

    At present, heart disease is the number one cause of death worldwide. Traditionally, heart disease is commonly detected using blood tests, electrocardiogram, cardiac computerized tomography scan, cardiac magnetic resonance imaging, and so on. However, these traditional diagnostic methods are time consuming and/or invasive. In this paper, we propose an effective noninvasive computerized method based on facial images to quantitatively detect heart disease. Specifically, facial key block color features are extracted from facial images and analyzed using the Probabilistic Collaborative Representation Based Classifier. The idea of facial key block color analysis is founded in Traditional Chinese Medicine. A new dataset consisting of 581 heart disease and 581 healthy samples was experimented by the proposed method. In order to optimize the Probabilistic Collaborative Representation Based Classifier, an analysis of its parameters was performed. According to the experimental results, the proposed method obtains the highest accuracy compared with other classifiers and is proven to be effective at heart disease detection.

  18. A bibliometric analysis of research updates and tendencies on steroid biotransformation

    NASA Astrophysics Data System (ADS)

    Song, Zhaoyu

    2018-03-01

    Steroid biotransformation, as a powerful tool for generation of steroid active pharmaceutical ingredients and key intermediates, has received widespread attention with increasing market demand for steroid-based drugs. In our study, a bibliometric analysis of steroid biotransformation was performed to trace the research updates and tendencies from 1993 to 2016, based on the Science Citation Index Expanded (SCIE) database. Results showed a notable growth trend in publication outputs. Although the USA was the most productive country between 1993 and 2016, developing nations, including China and India, contributed the prominent growth in recent years (2005–2016). Steroids was the leading journal in this field, and the research outputs had notably increased in the field of ‘Chemistry’, ‘Pharmacology and Pharmacy’ and ‘Biotechnology and Applied Microbiology’. Finally, research focused mainly on the efficient production of novel steroid active pharmaceutical ingredients and key intermediates through steroid biotransformation. Furthermore, cytochrome P450 involved in the side-chain oxidation of sterols has gradually become a hotspot issue in recent years.

  19. Trajectory Dispersed Vehicle Process for Space Launch System

    NASA Technical Reports Server (NTRS)

    Statham, Tamara; Thompson, Seth

    2017-01-01

    The Space Launch System (SLS) vehicle is part of NASA's deep space exploration plans that includes manned missions to Mars. Manufacturing uncertainties in design parameters are key considerations throughout SLS development as they have significant effects on focus parameters such as lift-off-thrust-to-weight, vehicle payload, maximum dynamic pressure, and compression loads. This presentation discusses how the SLS program captures these uncertainties by utilizing a 3 degree of freedom (DOF) process called Trajectory Dispersed (TD) analysis. This analysis biases nominal trajectories to identify extremes in the design parameters for various potential SLS configurations and missions. This process utilizes a Design of Experiments (DOE) and response surface methodologies (RSM) to statistically sample uncertainties, and develop resulting vehicles using a Maximum Likelihood Estimate (MLE) process for targeting uncertainties bias. These vehicles represent various missions and configurations which are used as key inputs into a variety of analyses in the SLS design process, including 6 DOF dispersions, separation clearances, and engine out failure studies.

  20. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome.

    PubMed

    Morine, Melissa J; McMonagle, Jolene; Toomey, Sinead; Reynolds, Clare M; Moloney, Aidan P; Gormley, Isobel C; Gaora, Peadar O; Roche, Helen M

    2010-10-07

    Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p < 0.05), followed by muscle (601 genes) and adipose (16 genes). Results from modified GSEA showed that the high-CLA beef diet affected diverse biological processes across the three tissues, and that the majority of pathway changes reached significance only with the bi-directional test. Combining the liver tissue microarray results with plasma marker data revealed 110 CLA-sensitive genes showing strong canonical correlation with one or more plasma markers of metabolic health, and 9 significantly overrepresented pathways among this set; each of these pathways was also significantly changed by the high-CLA diet. Closer inspection of two of these pathways--selenoamino acid metabolism and steroid biosynthesis--illustrated clear diet-sensitive changes in constituent genes, as well as strong correlations between gene expression and plasma markers of metabolic syndrome independent of the dietary effect. Bi-directional gene set enrichment analysis more accurately reflects dynamic regulatory behaviour in biochemical pathways, and as such highlighted biologically relevant changes that were not detected using a traditional approach. In such cases where transcriptomic response to treatment is exceptionally large, canonical correlation analysis in conjunction with Fisher's exact test highlights the subset of pathways showing strongest correlation with the clinical markers of interest. In this case, we have identified selenoamino acid metabolism and steroid biosynthesis as key pathways mediating the observed relationship between metabolic health and high-CLA beef. These results indicate that this type of analysis has the potential to generate novel transcriptome-based biomarkers of disease.

  1. Key strategies to improve systems for managing patient complaints within health facilities – what can we learn from the existing literature?

    PubMed Central

    2018-01-01

    ABSTRACT Background: Information from patient complaints – a widely accepted measure of patient satisfaction with services – can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. Objectives: The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. Methods: We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Results: Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients’ awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Conclusions: Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions, absence of system-wide approaches, lack of evidence from low- and middle-income countries and absence of focused empirical assessments of behaviour of staff who manage patient complaints. PMID:29658393

  2. Interventionist and participatory approaches to flood risk mitigation decisions: two case studies in the Italian Alps

    NASA Astrophysics Data System (ADS)

    Bianchizza, C.; Del Bianco, D.; Pellizzoni, L.; Scolobig, A.

    2012-04-01

    Flood risk mitigation decisions pose key challenges not only from a technical but also from a social, economic and political viewpoint. There is an increasing demand for improving the quality of these processes by including different stakeholders - and especially by involving the local residents in the decision making process - and by guaranteeing the actual improvement of local social capacities during and after the decision making. In this paper we analyse two case studies of flood risk mitigation decisions, Malborghetto-Valbruna and Vipiteno-Sterzing, in the Italian Alps. In both of them, mitigation works have been completed or planned, yet following completely different approaches especially in terms of responses of residents and involvement of local authorities. In Malborghetto-Valbruna an 'interventionist' approach (i.e. leaning towards a top down/technocratic decision process) was used to make decisions after the flood event that affected the municipality in the year 2003. In Vipiteno-Sterzing, a 'participatory' approach (i.e. leaning towards a bottom-up/inclusive decision process) was applied: decisions about risk mitigation measures were made by submitting different projects to the local citizens and by involving them in the decision making process. The analysis of the two case studies presented in the paper is grounded on the results of two research projects. Structured and in-depth interviews, as well as questionnaire surveys were used to explore residents' and local authorities' orientations toward flood risk mitigation. Also a SWOT analysis (Strengths, Weaknesses, Opportunities and Threats) involving key stakeholders was used to better understand the characteristics of the communities and their perception of flood risk mitigation issues. The results highlight some key differences between interventionist and participatory approaches, together with some implications of their adoption in the local context. Strengths and weaknesses of the two approaches, as well as key challenges for the future are also discussed.

  3. Automatic Adviser on stationary devices status identification and anticipated change

    NASA Astrophysics Data System (ADS)

    Shabelnikov, A. N.; Liabakh, N. N.; Gibner, Ya M.; Pushkarev, E. A.

    2018-05-01

    A task is defined to synthesize an Automatic Adviser to identify the automation systems stationary devices status using an autoregressive model of changing their key parameters. An applied model type was rationalized and the research objects monitoring process algorithm was developed. A complex of mobile objects status operation simulation and prediction results analysis was proposed. Research results are commented using a specific example of a hump yard compressor station. The work was supported by the Russian Fundamental Research Fund, project No. 17-20-01040.

  4. A framework for m-health service development and success evaluation.

    PubMed

    Sadegh, S Saeedeh; Khakshour Saadat, Parisa; Sepehri, Mohammad Mehdi; Assadi, Vahid

    2018-04-01

    The emergence of mobile technology has influenced many service industries including health care. Mobile health (m-Health) applications have been used widely, and many services have been developed that have changed delivery systems and have improved effectiveness of health care services. Stakeholders of m-Health services have various resources and rights that lends to a complexity in service delivery. In addition, abundance of different m-Health services makes it difficult to choose an appropriate service for these stakeholders that include customers, patients, users or even providers. Moreover, a comprehensive framework is not yet provided in the literature that would help manage and evaluate m-health services, considering various stakeholder's benefits. In this paper, a comprehensive literature review has been done on famous frameworks and models in the field of Information Technology and electronic health with the aim of finding different aspects of developing and managing m-health services. Using the results of literature review and conducting a stakeholder analysis, we have proposed an m-health evaluation framework which evaluates the success of a given m-health service through a three-stage life cycle: (1) Service Requirement Analysis, (2) Service Development, and (3) Service Delivery. Key factors of m-health evaluation in each step are introduced in the proposed framework considering m-health key stakeholder's benefits. The proposed framework is validated via expert interviews, and key factors in each evaluation step is validated using PLS model. Results show that path coefficients are higher than their threshold which supports the validity of proposed framework. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Responses of soil physical and chemical properties to karst rocky desertification evolution in typical karst valley area

    NASA Astrophysics Data System (ADS)

    Chen, Fei; Zhou, Dequan; Bai, Xiaoyong; zeng, Cheng; Xiao, Jianyong; Qian, Qinghuan; Luo, Guangjie

    2018-01-01

    In order to reveal the differences of soil physical and chemical properties and their response mechanism to the evolution of KRD. The characteristics of soil physical and chemical properties of different grades of KRD were studied by field sampling method to research different types of KRD in the typical karst valley of southern China. Instead of using space of time, to explore the response and the mechanisms of the soil physical and chemical properties at the different evolution process. The results showed that: (1) There were significant differences in organic matter, pH, total nitrogen, total phosphorus, total potassium, sediment concentration, clay content and AWHC in different levels of KRD environment. However, these indicators are not with increasing desertification degree has been degraded, but improved after a first degradation trends; (2) The correlation analysis showed that soil organic matter, acid, alkali, total nitrogen, total phosphorus, total potassium and clay contents were significantly correlated with other physical and chemical factors. They are the key factors of soil physical and chemical properties, play a key role in improving soil physical and chemical properties and promoting nutrient cycling; (3) The principal component analysis showed that the cumulative contribution rate of organic matter, pH, total nitrogen, total phosphorus, total potassium and sediment concentration was 80.26%, which was the key index to evaluate rocky desertification degree based on soil physical and chemical properties. The results have important theoretical and practical significance for the protection and restoration of rocky desertification ecosystem in southwest China.

  6. LabKey Server: an open source platform for scientific data integration, analysis and collaboration.

    PubMed

    Nelson, Elizabeth K; Piehler, Britt; Eckels, Josh; Rauch, Adam; Bellew, Matthew; Hussey, Peter; Ramsay, Sarah; Nathe, Cory; Lum, Karl; Krouse, Kevin; Stearns, David; Connolly, Brian; Skillman, Tom; Igra, Mark

    2011-03-09

    Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350 organizations. It tracks roughly 27,000 assay runs, 860,000 specimen vials and 1,300,000 vial transfers. Sharing data, analysis tools and infrastructure can speed the efforts of large research consortia by enhancing efficiency and enabling new insights. The Atlas installation of LabKey Server demonstrates the utility of the LabKey platform for collaborative research. Stable, supported builds of LabKey Server are freely available for download at http://www.labkey.org. Documentation and source code are available under the Apache License 2.0.

  7. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017

    PubMed Central

    Sell, Tara Kirk

    2017-01-01

    Objectives. To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. Methods. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. Results. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. Conclusions. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained. PMID:28892451

  8. Communicating with individuals receiving home mechanical ventilation: the experiences of key communication partners.

    PubMed

    Laakso, Katja; Markström, Agneta; Havstam, Christina; Idvall, Markus; Hartelius, Lena

    2014-01-01

    The aim of the study was to explore the communication experiences of key communications partners (CPs) of individuals receiving home mechanical ventilation (HMV), with particular emphasis on the possibilities, difficulties and limitations CPs experienced in communication, possible support given to facilitate communication and exploring what made a skilled communicator. A qualitative research design using interviews was used. The participants included 19 key CPs of individuals receiving HMV. The analysis resulted in five themes: Encountering communication limitations, Functional communication strategies, Being a communication facilitator, Role insecurity and Emotional reactions and coping. The findings revealed that CPs needed to develop partly new reference frames for communication. In particular, participants emphasised the need to understand and interpret subtle details in the communicative interaction. The findings are discussed in the light of previous research, in particular an earlier study exploring another perspective; the ventilator-supported individuals' experiences of communication. Issues relating to the educational needs of CPs of individuals receiving HMV are discussed. The results are intended to enhance understanding of the challenges that individuals receiving HMV and their CPs face with communication, which should be of relevance not only to speech therapists, but for all healthcare practitioners in the field of HMV.

  9. Statistics 101 for Radiologists.

    PubMed

    Anvari, Arash; Halpern, Elkan F; Samir, Anthony E

    2015-10-01

    Diagnostic tests have wide clinical applications, including screening, diagnosis, measuring treatment effect, and determining prognosis. Interpreting diagnostic test results requires an understanding of key statistical concepts used to evaluate test efficacy. This review explains descriptive statistics and discusses probability, including mutually exclusive and independent events and conditional probability. In the inferential statistics section, a statistical perspective on study design is provided, together with an explanation of how to select appropriate statistical tests. Key concepts in recruiting study samples are discussed, including representativeness and random sampling. Variable types are defined, including predictor, outcome, and covariate variables, and the relationship of these variables to one another. In the hypothesis testing section, we explain how to determine if observed differences between groups are likely to be due to chance. We explain type I and II errors, statistical significance, and study power, followed by an explanation of effect sizes and how confidence intervals can be used to generalize observed effect sizes to the larger population. Statistical tests are explained in four categories: t tests and analysis of variance, proportion analysis tests, nonparametric tests, and regression techniques. We discuss sensitivity, specificity, accuracy, receiver operating characteristic analysis, and likelihood ratios. Measures of reliability and agreement, including κ statistics, intraclass correlation coefficients, and Bland-Altman graphs and analysis, are introduced. © RSNA, 2015.

  10. Synthetic data sets for the identification of key ingredients for RNA-seq differential analysis.

    PubMed

    Rigaill, Guillem; Balzergue, Sandrine; Brunaud, Véronique; Blondet, Eddy; Rau, Andrea; Rogier, Odile; Caius, José; Maugis-Rabusseau, Cathy; Soubigou-Taconnat, Ludivine; Aubourg, Sébastien; Lurin, Claire; Martin-Magniette, Marie-Laure; Delannoy, Etienne

    2018-01-01

    Numerous statistical pipelines are now available for the differential analysis of gene expression measured with RNA-sequencing technology. Most of them are based on similar statistical frameworks after normalization, differing primarily in the choice of data distribution, mean and variance estimation strategy and data filtering. We propose an evaluation of the impact of these choices when few biological replicates are available through the use of synthetic data sets. This framework is based on real data sets and allows the exploration of various scenarios differing in the proportion of non-differentially expressed genes. Hence, it provides an evaluation of the key ingredients of the differential analysis, free of the biases associated with the simulation of data using parametric models. Our results show the relevance of a proper modeling of the mean by using linear or generalized linear modeling. Once the mean is properly modeled, the impact of the other parameters on the performance of the test is much less important. Finally, we propose to use the simple visualization of the raw P-value histogram as a practical evaluation criterion of the performance of differential analysis methods on real data sets. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  11. Bounding Analysis of Drinking Water Health Risks from a Spill of Hydraulic Fracturing Flowback Water.

    PubMed

    Rish, William R; Pfau, Edward J

    2018-04-01

    A bounding risk assessment is presented that evaluates possible human health risk from a hypothetical scenario involving a 10,000-gallon release of flowback water from horizontal fracturing of Marcellus Shale. The water is assumed to be spilled on the ground, infiltrates into groundwater that is a source of drinking water, and an adult and child located downgradient drink the groundwater. Key uncertainties in estimating risk are given explicit quantitative treatment using Monte Carlo analysis. Chemicals that contribute significantly to estimated health risks are identified, as are key uncertainties and variables to which risk estimates are sensitive. The results show that hypothetical exposure via drinking water impacted by chemicals in Marcellus Shale flowback water, assumed to be spilled onto the ground surface, results in predicted bounds between 10 -10 and 10 -6 (for both adult and child receptors) for excess lifetime cancer risk. Cumulative hazard indices (HI CUMULATIVE ) resulting from these hypothetical exposures have predicted bounds (5th to 95th percentile) between 0.02 and 35 for assumed adult receptors and 0.1 and 146 for assumed child receptors. Predicted health risks are dominated by noncancer endpoints related to ingestion of barium and lithium in impacted groundwater. Hazard indices above unity are largely related to exposure to lithium. Salinity taste thresholds are likely to be exceeded before drinking water exposures result in adverse health effects. The findings provide focus for policy discussions concerning flowback water risk management. They also indicate ways to improve the ability to estimate health risks from drinking water impacted by a flowback water spill (i.e., reducing uncertainty). © 2017 Society for Risk Analysis.

  12. Comparative qualitative phosphoproteomics analysis identifies shared phosphorylation motifs and associated biological processes in evolutionary divergent plants.

    PubMed

    Al-Momani, Shireen; Qi, Da; Ren, Zhe; Jones, Andrew R

    2018-06-15

    Phosphorylation is one of the most prevalent post-translational modifications and plays a key role in regulating cellular processes. We carried out a bioinformatics analysis of pre-existing phosphoproteomics data, to profile two model species representing the largest subclasses in flowering plants the dicot Arabidopsis thaliana and the monocot Oryza sativa, to understand the extent to which phosphorylation signaling and function is conserved across evolutionary divergent plants. We identified 6537 phosphopeptides from 3189 phosphoproteins in Arabidopsis and 2307 phosphopeptides from 1613 phosphoproteins in rice. We identified phosphorylation motifs, finding nineteen pS motifs and two pT motifs shared in rice and Arabidopsis. The majority of shared motif-containing proteins were mapped to the same biological processes with similar patterns of fold enrichment, indicating high functional conservation. We also identified shared patterns of crosstalk between phosphoserines with enrichment for motifs pSXpS, pSXXpS and pSXXXpS, where X is any amino acid. Lastly, our results identified several pairs of motifs that are significantly enriched to co-occur in Arabidopsis proteins, indicating cross-talk between different sites, but this was not observed in rice. Our results demonstrate that there are evolutionary conserved mechanisms of phosphorylation-mediated signaling in plants, via analysis of high-throughput phosphorylation proteomics data from key monocot and dicot species: rice and Arabidposis thaliana. The results also suggest that there is increased crosstalk between phosphorylation sites in A. thaliana compared with rice. The results are important for our general understanding of cell signaling in plants, and the ability to use A. thaliana as a general model for plant biology. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  13. YoungStar in Wisconsin: Analysis of Data as of July 2014. Executive Summary: Key Findings and Analysis

    ERIC Educational Resources Information Center

    Wisconsin Council on Children and Families, 2014

    2014-01-01

    YoungStar is a five-star quality rating system for child care providers based on education, learning environment, business methods, and practices around child health and well-being. Through this rating system, the state is addressing several key issues in Wisconsin's child care system. The rating system will: (1) Improve the overall quality of…

  14. Using Key Part-of-Speech Analysis to Examine Spoken Discourse by Taiwanese EFL Learners

    ERIC Educational Resources Information Center

    Lin, Yen-Liang

    2015-01-01

    This study reports on a corpus analysis of samples of spoken discourse between a group of British and Taiwanese adolescents, with the aim of exploring the statistically significant differences in the use of grammatical categories between the two groups of participants. The key word method extended to a part-of-speech level using the web-based…

  15. Single Channel EEG Artifact Identification Using Two-Dimensional Multi-Resolution Analysis.

    PubMed

    Taherisadr, Mojtaba; Dehzangi, Omid; Parsaei, Hossein

    2017-12-13

    As a diagnostic monitoring approach, electroencephalogram (EEG) signals can be decoded by signal processing methodologies for various health monitoring purposes. However, EEG recordings are contaminated by other interferences, particularly facial and ocular artifacts generated by the user. This is specifically an issue during continuous EEG recording sessions, and is therefore a key step in using EEG signals for either physiological monitoring and diagnosis or brain-computer interface to identify such artifacts from useful EEG components. In this study, we aim to design a new generic framework in order to process and characterize EEG recording as a multi-component and non-stationary signal with the aim of localizing and identifying its component (e.g., artifact). In the proposed method, we gather three complementary algorithms together to enhance the efficiency of the system. Algorithms include time-frequency (TF) analysis and representation, two-dimensional multi-resolution analysis (2D MRA), and feature extraction and classification. Then, a combination of spectro-temporal and geometric features are extracted by combining key instantaneous TF space descriptors, which enables the system to characterize the non-stationarities in the EEG dynamics. We fit a curvelet transform (as a MRA method) to 2D TF representation of EEG segments to decompose the given space to various levels of resolution. Such a decomposition efficiently improves the analysis of the TF spaces with different characteristics (e.g., resolution). Our experimental results demonstrate that the combination of expansion to TF space, analysis using MRA, and extracting a set of suitable features and applying a proper predictive model is effective in enhancing the EEG artifact identification performance. We also compare the performance of the designed system with another common EEG signal processing technique-namely, 1D wavelet transform. Our experimental results reveal that the proposed method outperforms 1D wavelet.

  16. Bibliometric Characteristics of Articles on Key Competences Indexed in ERIC from 1990 to 2013

    ERIC Educational Resources Information Center

    Buscà Donet, Francesc; Ambròs Pallares, Alba; Burset Burillo, Sílvia

    2017-01-01

    This paper analyses the bibliometric characteristics of 616 journal articles on key competences indexed in ERIC in a 23-year-period following documentary analysis. This observation method allowed us to highlight key elements like the population, educational level, topics, etc. to focus whether this literature contributes towards implementing…

  17. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  18. Dark Matter Search Using XMM-Newton Observations of Willman 1

    NASA Technical Reports Server (NTRS)

    Lowenstein, Michael; Kusenko, Alexander

    2012-01-01

    We report the results of a search for an emission line from radiatively decaying dark matter in the ultra-faint dwarf spheroidal galaxy Willman 1 based on analysis of spectra extracted from XMM-Newton X-ray Observatory data. The observation follows up our analysis of Chandra data of Willman 1that resulted in line flux upper limits over the Chandra bandpass and evidence of a 2.5 keY feature at a significance below the 99% confidence threshold used to define the limits. The higher effective area of the XMM-Newton detectors, combined with application of recently developing methods for extended-source analysis, allow us to derive improved constraints on the combination of mass and mixing angle of the sterile neutrino dark matter candidate. We do not confirm the Chandra evidence for a 2.5 keV emission line.

  19. Reactive, Safe Navigation for Lunar and Planetary Robots

    NASA Technical Reports Server (NTRS)

    Utz, Hans; Ruland, Thomas

    2008-01-01

    When humans return to the moon, Astronauts will be accompanied by robotic helpers. Enabling robots to safely operate near astronauts on the lunar surface has the potential to significantly improve the efficiency of crew surface operations. Safely operating robots in close proximity to astronauts on the lunar surface requires reactive obstacle avoidance capabilities not available on existing planetary robots. In this paper we present work on safe, reactive navigation using a stereo based high-speed terrain analysis and obstacle avoidance system. Advances in the design of the algorithms allow it to run terrain analysis and obstacle avoidance algorithms at full frame rate (30Hz) on off the shelf hardware. The results of this analysis are fed into a fast, reactive path selection module, enforcing the safety of the chosen actions. The key components of the system are discussed and test results are presented.

  20. A system-level view of optimizing high-channel-count wireless biosignal telemetry.

    PubMed

    Chandler, Rodney J; Gibson, Sarah; Karkare, Vaibhav; Farshchi, Shahin; Marković, Dejan; Judy, Jack W

    2009-01-01

    In this paper we perform a system-level analysis of a wireless biosignal telemetry system. We perform an analysis of each major system component (e.g., analog front end, analog-to-digital converter, digital signal processor, and wireless link), in which we consider physical, algorithmic, and design limitations. Since there are a wide range applications for wireless biosignal telemetry systems, each with their own unique set of requirements for key parameters (e.g., channel count, power dissipation, noise level, number of bits, etc.), our analysis is equally broad. The net result is a set of plots, in which the power dissipation for each component and as the system as a whole, are plotted as a function of the number of channels for different architectural strategies. These results are also compared to existing implementations of complete wireless biosignal telemetry systems.

Top