Sample records for authentication code mac

  1. The Impact on Quality of Service When Using Security-Enabling Filters to Provide for the Security of Run-Time Virtual Environments

    DTIC Science & Technology

    2002-09-01

    Secure Multicast......................................................................24 i. Message Digests and Message Authentication Codes ( MACs ...that is, the needs of the VE will determine what the design will look like (e.g., reliable vs . unreliable data communications). In general, there...Molva00] and [Abdalla00]. i. Message Digests and Message Authentication Codes ( MACs ) Message digests and MACs are used for data integrity verification

  2. Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm

    NASA Astrophysics Data System (ADS)

    Brolin Sihite, Alfonso; Hayat Susanti, Bety

    2017-10-01

    A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.

  3. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  4. BFT replication resistant to MAC attacks

    NASA Astrophysics Data System (ADS)

    Zbierski, Maciej

    2016-09-01

    Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.

  5. SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Li, Celia; Wang, Zhuang; Yang, Cungang

    In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.

  6. Chaotic Image Encryption of Regions of Interest

    NASA Astrophysics Data System (ADS)

    Xiao, Di; Fu, Qingqing; Xiang, Tao; Zhang, Yushu

    Since different regions of an image have different importance, therefore only the important information of the image regions, which the users are really interested in, needs to be encrypted and protected emphatically in some special multimedia applications. However, the regions of interest (ROI) are always some irregular parts, such as the face and the eyes. Assuming the bulk data in transmission without being damaged, we propose a chaotic image encryption algorithm for ROI. ROI with irregular shapes are chosen and detected arbitrarily. Then the chaos-based image encryption algorithm with scrambling, S-box and diffusion parts is used to encrypt the ROI. Further, the whole image is compressed with Huffman coding. At last, a message authentication code (MAC) of the compressed image is generated based on chaotic maps. The simulation results show that the encryption algorithm has a good security level and can resist various attacks. Moreover, the compression method improves the storage and transmission efficiency to some extent, and the MAC ensures the integrity of the transmission data.

  7. Study and validation of tools interoperability in JPSEC

    NASA Astrophysics Data System (ADS)

    Conan, V.; Sadourny, Y.; Jean-Marie, K.; Chan, C.; Wee, S.; Apostolopoulos, J.

    2005-08-01

    Digital imagery is important in many applications today, and the security of digital imagery is important today and is likely to gain in importance in the near future. The emerging international standard ISO/IEC JPEG-2000 Security (JPSEC) is designed to provide security for digital imagery, and in particular digital imagery coded with the JPEG-2000 image coding standard. One of the primary goals of a standard is to ensure interoperability between creators and consumers produced by different manufacturers. The JPSEC standard, similar to the popular JPEG and MPEG family of standards, specifies only the bitstream syntax and the receiver's processing, and not how the bitstream is created or the details of how it is consumed. This paper examines the interoperability for the JPSEC standard, and presents an example JPSEC consumption process which can provide insights in the design of JPSEC consumers. Initial interoperability tests between different groups with independently created implementations of JPSEC creators and consumers have been successful in providing the JPSEC security services of confidentiality (via encryption) and authentication (via message authentication codes, or MACs). Further interoperability work is on-going.

  8. Comparison of ZigBee Replay Attacks Using a Universal Software Radio Peripheral and USB Radio

    DTIC Science & Technology

    2014-03-27

    authentication code (CBC-MAC) CPU central processing unit CUT component under test db decibel dbm decibel referenced to one milliwatt FFD full- fuction ...categorized into two different types: full- fuction devices (FFDs) and reduced-function devices (RFDs). The difference between an FFD and an RFD is that...KillerBee Hardware. Although KillerBee can be used with any hardware that can interact with 802.15.4 networks, the primary development hardware is the

  9. Press touch code: A finger press based screen size independent authentication scheme for smart devices.

    PubMed

    Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.

  10. Press touch code: A finger press based screen size independent authentication scheme for smart devices

    PubMed Central

    Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262

  11. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  12. Moral Perception and Judgment and a Truly Radical Change of Social Practices: A Reply to Paul Standish's "Registers of the Religious"

    ERIC Educational Resources Information Center

    Smeyers, Paul

    2012-01-01

    This article presents the author's response to Paul Standish's "Registers of the Religious". Addressing what he calls the "global", Paul Standish starts from MacIntyre's observation that people live in a world characterized by a vocabulary of value whose purchase on life is no longer authentically experienced: "MacIntyre's diagnosis of the…

  13. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-01-01

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100

  14. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    PubMed

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  15. There is no MacWilliams identity for convolutional codes. [transmission gain comparison

    NASA Technical Reports Server (NTRS)

    Shearer, J. B.; Mceliece, R. J.

    1977-01-01

    An example is provided of two convolutional codes that have the same transmission gain but whose dual codes do not. This shows that no analog of the MacWilliams identity for block codes can exist relating the transmission gains of a convolutional code and its dual.

  16. Image authentication using distributed source coding.

    PubMed

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  17. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  18. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks.

    PubMed

    Kim, Daehee; Kim, Dongwan; An, Sunshin

    2016-07-09

    Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.

  19. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks †

    PubMed Central

    Kim, Daehee; Kim, Dongwan; An, Sunshin

    2016-01-01

    Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption. PMID:27409616

  20. Security authentication using phase-encoded nanoparticle structures and polarized light.

    PubMed

    Carnicer, Artur; Hassanfiroozi, Amir; Latorre-Carmona, Pedro; Huang, Yi-Pai; Javidi, Bahram

    2015-01-15

    Phase-encoded nanostructures such as quick response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase-encoded QR codes. The system is illuminated using polarized light, and the QR code is encoded using a phase-only random mask. Using classification algorithms, it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase-encoded QR codes using polarimetric signatures.

  1. Attacks on quantum key distribution protocols that employ non-ITS authentication

    NASA Astrophysics Data System (ADS)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  2. New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Rodemich, E. R.; Rumsey, H., Jr.; Welch, L. R.

    1977-01-01

    An upper bound on the rate of a binary code as a function of minimum code distance (using a Hamming code metric) is arrived at from Delsarte-MacWilliams inequalities. The upper bound so found is asymptotically less than Levenshtein's bound, and a fortiori less than Elias' bound. Appendices review properties of Krawtchouk polynomials and Q-polynomials utilized in the rigorous proofs.

  3. MacWilliams Identity for M-Spotty Weight Enumerator

    NASA Astrophysics Data System (ADS)

    Suzuki, Kazuyoshi; Fujiwara, Eiji

    M-spotty byte error control codes are very effective for correcting/detecting errors in semiconductor memory systems that employ recent high-density RAM chips with wide I/O data (e.g., 8, 16, or 32bits). In this case, the width of the I/O data is one byte. A spotty byte error is defined as random t-bit errors within a byte of length b bits, where 1 le t ≤ b. Then, an error is called an m-spotty byte error if at least one spotty byte error is present in a byte. M-spotty byte error control codes are characterized by the m-spotty distance, which includes the Hamming distance as a special case for t =1 or t = b. The MacWilliams identity provides the relationship between the weight distribution of a code and that of its dual code. The present paper presents the MacWilliams identity for the m-spotty weight enumerator of m-spotty byte error control codes. In addition, the present paper clarifies that the indicated identity includes the MacWilliams identity for the Hamming weight enumerator as a special case.

  4. Micromechanics Analysis Code Post-Processing (MACPOST) User Guide. 1.0

    NASA Technical Reports Server (NTRS)

    Goldberg, Robert K.; Comiskey, Michele D.; Bednarcyk, Brett A.

    1999-01-01

    As advanced composite materials have gained wider usage. the need for analytical models and computer codes to predict the thermomechanical deformation response of these materials has increased significantly. Recently, a micromechanics technique called the generalized method of cells (GMC) has been developed, which has the capability to fulfill this -oal. Tc provide a framework for GMC, the Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) has been developed. As MAC/GMC has been updated, significant improvements have been made to the post-processing capabilities of the code. Through the MACPOST program, which operates directly within the MSC/PATRAN graphical pre- and post-processing package, a direct link between the analysis capabilities of MAC/GMC and the post-processing capabilities of MSC/PATRAN has been established. MACPOST has simplified the production, printing. and exportation of results for unit cells analyzed by MAC/GMC. MACPOST allows different micro-level quantities to be plotted quickly and easily in contour plots. In addition, meaningful data for X-Y plots can be examined. MACPOST thus serves as an important analysis and visualization tool for the macro- and micro-level data generated by MAC/GMC. This report serves as the user's manual for the MACPOST program.

  5. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.

    PubMed

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2015-03-09

    In this paper, we develop a new optical information authentication system based on compressed double-random-phase-encoded images and quick-response (QR) codes, where the parameters of optical lightwave are used as keys for optical decryption and the QR code is a key for verification. An input image attached with QR code is first optically encoded in a simplified double random phase encoding (DRPE) scheme without using interferometric setup. From the single encoded intensity pattern recorded by a CCD camera, a compressed double-random-phase-encoded image, i.e., the sparse phase distribution used for optical decryption, is generated by using an iterative phase retrieval technique with QR code. We compare this technique to the other two methods proposed in literature, i.e., Fresnel domain information authentication based on the classical DRPE with holographic technique and information authentication based on DRPE and phase retrieval algorithm. Simulation results show that QR codes are effective on improving the security and data sparsity of optical information encryption and authentication system.

  6. VLSI (Very Large Scale Integrated Circuits) Design with the MacPitts Silicon Compiler.

    DTIC Science & Technology

    1985-09-01

    the background. If the algorithm is not fully debugged, then issue instead macpitts basename herald so MacPitts diagnostics and Liszt diagnostics both...command interpreter. Upon compilation, however, the following LI!F compiler ( Liszt ) diagnostic results, Error: Non-number to minus nil where the first...language used in the MacPitts source code. The more instructive solution is to write the Franz LISP code to decide if a jumper wire is needed, and if so, to

  7. Deformation, Failure, and Fatigue Life of SiC/Ti-15-3 Laminates Accurately Predicted by MAC/GMC

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2002-01-01

    NASA Glenn Research Center's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) (ref.1) has been extended to enable fully coupled macro-micro deformation, failure, and fatigue life predictions for advanced metal matrix, ceramic matrix, and polymer matrix composites. Because of the multiaxial nature of the code's underlying micromechanics model, GMC--which allows the incorporation of complex local inelastic constitutive models--MAC/GMC finds its most important application in metal matrix composites, like the SiC/Ti-15-3 composite examined here. Furthermore, since GMC predicts the microscale fields within each constituent of the composite material, submodels for local effects such as fiber breakage, interfacial debonding, and matrix fatigue damage can and have been built into MAC/GMC. The present application of MAC/GMC highlights the combination of these features, which has enabled the accurate modeling of the deformation, failure, and life of titanium matrix composites.

  8. Security authentication with a three-dimensional optical phase code using random forest classifier: an overview

    NASA Astrophysics Data System (ADS)

    Markman, Adam; Carnicer, Artur; Javidi, Bahram

    2017-05-01

    We overview our recent work [1] on utilizing three-dimensional (3D) optical phase codes for object authentication using the random forest classifier. A simple 3D optical phase code (OPC) is generated by combining multiple diffusers and glass slides. This tag is then placed on a quick-response (QR) code, which is a barcode capable of storing information and can be scanned under non-uniform illumination conditions, rotation, and slight degradation. A coherent light source illuminates the OPC and the transmitted light is captured by a CCD to record the unique signature. Feature extraction on the signature is performed and inputted into a pre-trained random-forest classifier for authentication.

  9. Comparative study of MacCormack and TVD MacCormack schemes for three-dimensional separation at wing/body junctions in supersonic flows

    NASA Technical Reports Server (NTRS)

    Lakshmanan, Balakrishnan; Tiwari, Surendra N.

    1992-01-01

    A robust, discontinuity-resolving TVD MacCormack scheme containing no dependent parameters requiring adjustment is presently used to investigate the 3D separation of wing/body junction flows at supersonic speeds. Many production codes employing MacCormack schemes can be adapted to use this method. A numerical simulation of laminar supersonic junction flow is found to yield improved separation location predictions, as well as the axial velocity profiles in the separated flow region.

  10. New secure communication-layer standard for medical image management (ISCL)

    NASA Astrophysics Data System (ADS)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  11. Optical identity authentication technique based on compressive ghost imaging with QR code

    NASA Astrophysics Data System (ADS)

    Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang

    2018-04-01

    With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.

  12. Comprehensive Micromechanics-Analysis Code - Version 4.0

    NASA Technical Reports Server (NTRS)

    Arnold, S. M.; Bednarcyk, B. A.

    2005-01-01

    Version 4.0 of the Micromechanics Analysis Code With Generalized Method of Cells (MAC/GMC) has been developed as an improved means of computational simulation of advanced composite materials. The previous version of MAC/GMC was described in "Comprehensive Micromechanics-Analysis Code" (LEW-16870), NASA Tech Briefs, Vol. 24, No. 6 (June 2000), page 38. To recapitulate: MAC/GMC is a computer program that predicts the elastic and inelastic thermomechanical responses of continuous and discontinuous composite materials with arbitrary internal microstructures and reinforcement shapes. The predictive capability of MAC/GMC rests on a model known as the generalized method of cells (GMC) - a continuum-based model of micromechanics that provides closed-form expressions for the macroscopic response of a composite material in terms of the properties, sizes, shapes, and responses of the individual constituents or phases that make up the material. Enhancements in version 4.0 include a capability for modeling thermomechanically and electromagnetically coupled ("smart") materials; a more-accurate (high-fidelity) version of the GMC; a capability to simulate discontinuous plies within a laminate; additional constitutive models of materials; expanded yield-surface-analysis capabilities; and expanded failure-analysis and life-prediction capabilities on both the microscopic and macroscopic scales.

  13. Sparsey™: event recognition via deep hierarchical sparse distributed codes

    PubMed Central

    Rinkus, Gerard J.

    2014-01-01

    The visual cortex's hierarchical, multi-level organization is captured in many biologically inspired computational vision models, the general idea being that progressively larger scale (spatially/temporally) and more complex visual features are represented in progressively higher areas. However, most earlier models use localist representations (codes) in each representational field (which we equate with the cortical macrocolumn, “mac”), at each level. In localism, each represented feature/concept/event (hereinafter “item”) is coded by a single unit. The model we describe, Sparsey, is hierarchical as well but crucially, it uses sparse distributed coding (SDC) in every mac in all levels. In SDC, each represented item is coded by a small subset of the mac's units. The SDCs of different items can overlap and the size of overlap between items can be used to represent their similarity. The difference between localism and SDC is crucial because SDC allows the two essential operations of associative memory, storing a new item and retrieving the best-matching stored item, to be done in fixed time for the life of the model. Since the model's core algorithm, which does both storage and retrieval (inference), makes a single pass over all macs on each time step, the overall model's storage/retrieval operation is also fixed-time, a criterion we consider essential for scalability to the huge (“Big Data”) problems. A 2010 paper described a nonhierarchical version of this model in the context of purely spatial pattern processing. Here, we elaborate a fully hierarchical model (arbitrary numbers of levels and macs per level), describing novel model principles like progressive critical periods, dynamic modulation of principal cells' activation functions based on a mac-level familiarity measure, representation of multiple simultaneously active hypotheses, a novel method of time warp invariant recognition, and we report results showing learning/recognition of spatiotemporal patterns. PMID:25566046

  14. Development of authentication code for multi-access optical code division multiplexing based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Taiwo, Ambali; Alnassar, Ghusoon; Bakar, M. H. Abu; Khir, M. F. Abdul; Mahdi, Mohd Adzir; Mokhtar, M.

    2018-05-01

    One-weight authentication code for multi-user quantum key distribution (QKD) is proposed. The code is developed for Optical Code Division Multiplexing (OCDMA) based QKD network. A unique address assigned to individual user, coupled with degrading probability of predicting the source of the qubit transmitted in the channel offer excellent secure mechanism against any form of channel attack on OCDMA based QKD network. Flexibility in design as well as ease of modifying the number of users are equally exceptional quality presented by the code in contrast to Optical Orthogonal Code (OOC) earlier implemented for the same purpose. The code was successfully applied to eight simultaneous users at effective key rate of 32 bps over 27 km transmission distance.

  15. Identification of a novel tetrapeptide structure of the Mycobacterium avium glycopeptidolipid that functions as a specific target for the host antibody response.

    PubMed

    Matsunaga, Isamu; Komori, Takaya; Mori, Naoki; Sugita, Masahiko

    2012-03-23

    Mycobacterium avium complex (MAC) is a group of non-tuberculous mycobacteria that cause tuberculosis-like diseases in humans. Unlike Mycobacterium tuberculosis, MAC expresses high levels of glycopeptidolipids (GPLs) containing a well-defined tetrapeptide-amino alcohol core, composed of D-phenylalanine, D-allo-threonine, D-alanine, and L-alaninol, that is modified with a fatty acid and sugar residues. Surprisingly, however, a careful scrutiny of the mass spectrum of MAC GPLs revealed the presence of ions that could not readily accountable for the known GPL structure. The magnitude of the ions was increased prominently when GPLs were isolated from the valine-supplemented culture, and the ions representing the authentic GPL species were diminished, suggesting the possibility that the basic structure of the peptide backbone might be altered in response to the exogenously added valine. Indeed, further mass spectrometry (MS)/MS and gas chromatography-MS analysis indicated a substitution of D-valine for the N-terminal D-phenylalanine of the tetrapeptide core, and the presence of D-valine and the absence of D-phenylalanine was confirmed by high-performance liquid chromatography, using the derivatized amino acid residues that were released from the tetrapeptide. Finally, specific antibodies to the purified valine-containing GPL species were detected in the serum of a MAC-infected guinea pig. Therefore, these results identify a new molecular species of MAC GPLs with immunogenic potential. Copyright © 2012 Elsevier Inc. All rights reserved.

  16. Facelock: familiarity-based graphical authentication.

    PubMed

    Jenkins, Rob; McLachlan, Jane L; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  17. MAC/GMC 4.0 User's Manual: Keywords Manual. Volume 2

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2002-01-01

    This document is the second volume in the three volume set of User's Manuals for the Micromechanics Analysis Code with Generalized Method of Cells Version 4.0 (MAC/GMC 4.0). Volume 1 is the Theory Manual, this document is the Keywords Manual, and Volume 3 is the Example Problem Manual. MAC/GMC 4.0 is a composite material and laminate analysis software program developed at the NASA Glenn Research Center. It is based on the generalized method of cells (GMC) micromechanics theory, which provides access to the local stress and strain fields in the composite material. This access grants GMC the ability to accommodate arbitrary local models for inelastic material behavior and various types of damage and failure analysis. MAC/GMC 4.0 has been built around GMC to provide the theory with a user-friendly framework, along with a library of local inelastic, damage, and failure models. Further, applications of simulated thermo-mechanical loading, generation of output results, and selection of architectures to represent the composite material have been automated in MAC/GMC 4.0. Finally, classical lamination theory has been implemented within MAC/GMC 4.0 wherein GMC is used to model the composite material response of each ply. Consequently, the full range of GMC composite material capabilities is available for analysis of arbitrary laminate configurations as well. This volume describes the basic information required to use the MAC/GMC 4.0 software, including a 'Getting Started' section, and an in-depth description of each of the 22 keywords used in the input file to control the execution of the code.

  18. Local Debonding and Fiber Breakage in Composite Materials Modeled Accurately

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2001-01-01

    A prerequisite for full utilization of composite materials in aerospace components is accurate design and life prediction tools that enable the assessment of component performance and reliability. Such tools assist both structural analysts, who design and optimize structures composed of composite materials, and materials scientists who design and optimize the composite materials themselves. NASA Glenn Research Center's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) software package (http://www.grc.nasa.gov/WWW/LPB/mac) addresses this need for composite design and life prediction tools by providing a widely applicable and accurate approach to modeling composite materials. Furthermore, MAC/GMC serves as a platform for incorporating new local models and capabilities that are under development at NASA, thus enabling these new capabilities to progress rapidly to a stage in which they can be employed by the code's end users.

  19. QR code for medical information uses.

    PubMed

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  20. User's manual for MacPASCO

    NASA Technical Reports Server (NTRS)

    Lucas, S. H.; Davis, R. C.

    1992-01-01

    A user's manual is presented for MacPASCO, which is an interactive, graphic, preprocessor for panel design. MacPASCO creates input for PASCO, an existing computer code for structural analysis and sizing of longitudinally stiffened composite panels. MacPASCO provides a graphical user interface which simplifies the specification of panel geometry and reduces user input errors. The user draws the initial structural geometry and reduces user input errors. The user draws the initial structural geometry on the computer screen, then uses a combination of graphic and text inputs to: refine the structural geometry; specify information required for analysis such as panel load and boundary conditions; and define design variables and constraints for minimum mass optimization. Only the use of MacPASCO is described, since the use of PASCO has been documented elsewhere.

  1. Facelock: familiarity-based graphical authentication

    PubMed Central

    McLachlan, Jane L.; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913

  2. Development of a three-dimensional Navier-Stokes code on CDC star-100 computer

    NASA Technical Reports Server (NTRS)

    Vatsa, V. N.; Goglia, G. L.

    1978-01-01

    A three-dimensional code in body-fitted coordinates was developed using MacCormack's algorithm. The code is structured to be compatible with any general configuration, provided that the metric coefficients for the transformation are available. The governing equations are developed in primitive variables in order to facilitate the incorporation of physical boundary conditions and turbulence-closure models. MacCormack's two-step, unsplit, time-marching algorithm is used to solve the unsteady Navier-Stokes equations until steady-state solution is achieved. Cases discussed include (1) flat plate in supersonic free stream; (2) supersonic flow along an axial corner; (3) subsonic flow in an axial corner at M infinity = 0.95; and (4) supersonic flow in an axial corner at M infinity 1.5.

  3. MAC/GMC 4.0 User's Manual: Example Problem Manual. Volume 3

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2002-01-01

    This document is the third volume in the three volume set of User's Manuals for the Micromechanics Analysis Code with Generalized Method of Cells Version 4.0 (MAC/GMC 4.0). Volume 1 is the Theory Manual, Volume 2 is the Keywords Manual, and this document is the Example Problems Manual. MAC/GMC 4.0 is a composite material and laminate analysis software program developed at the NASA Glenn Research Center. It is based on the generalized method of cells (GMC) micromechanics theory, which provides access to the local stress and strain fields in the composite material. This access grants GMC the ability to accommodate arbitrary local models for inelastic material behavior and various types of damage and failure analysis. MAC/GMC 4.0 has been built around GMC to provide the theory with a user-friendly framework, along with a library of local inelastic, damage, and failure models. Further, application of simulated thermo-mechanical loading, generation of output results, and selection of architectures to represent the composite material, have been automated in MAC/GMC 4.0. Finally, classical lamination theory has been implemented within MAC/GMC 4.0 wherein GMC is used to model the composite material response of each ply. Consequently, the full range of GMC composite material capabilities is available for analysis of arbitrary laminate configurations as well. This volume provides in-depth descriptions of 43 example problems, which were specially designed to highlight many of the most important capabilities of the code. The actual input files associated with each example problem are distributed with the MAC/GMC 4.0 software; thus providing the user with a convenient starting point for their own specialized problems of interest.

  4. Development, Implementation and Application of Micromechanical Analysis Tools for Advanced High Temperature Composites

    NASA Technical Reports Server (NTRS)

    2005-01-01

    This document contains the final report to the NASA Glenn Research Center (GRC) for the research project entitled Development, Implementation, and Application of Micromechanical Analysis Tools for Advanced High-Temperature Composites. The research supporting this initiative has been conducted by Dr. Brett A. Bednarcyk, a Senior Scientist at OM in Brookpark, Ohio from the period of August 1998 to March 2005. Most of the work summarized herein involved development, implementation, and application of enhancements and new capabilities for NASA GRC's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) software package. When the project began, this software was at a low TRL (3-4) and at release version 2.0. Due to this project, the TRL of MAC/GMC has been raised to 7 and two new versions (3.0 and 4.0) have been released. The most important accomplishments with respect to MAC/GMC are: (1) A multi-scale framework has been built around the software, enabling coupled design and analysis from the global structure scale down to the micro fiber-matrix scale; (2) The software has been expanded to analyze smart materials; (3) State-of-the-art micromechanics theories have been implemented and validated within the code; (4) The damage, failure, and lifing capabilities of the code have been expanded from a very limited state to a vast degree of functionality and utility; and (5) The user flexibility of the code has been significantly enhanced. MAC/GMC is now the premier code for design and analysis of advanced composite and smart materials. It is a candidate for the 2005 NASA Software of the Year Award. The work completed over the course of the project is summarized below on a year by year basis. All publications resulting from the project are listed at the end of this report.

  5. Australian DefenceScience. Volume 16, Number 2, Winter

    DTIC Science & Technology

    2008-01-01

    Making Virtual Advisers speedily interactive To provide an authentically interactive experience for humans working with Virtual Advisers, the Virtual...peer trusted and strong authentication for checking of security credentials without recourse to third parties or infrastructure, thus eliminating...multiple passwords, or carry around multiple security tokens.” Each CodeStick device is readied for use with a biometric authentication process. Since

  6. Software and the Virus Threat: Providing Authenticity in Distribution

    DTIC Science & Technology

    1991-03-01

    Classification) SOFTWARE A" D THE VIRUS THREAT: PROVIDING AUTHENTICITY IN DISTRIBUTION 12. PERSONAL AUTHOR( S ) LAVUNTURE, GEORGE M. 13&. TYPE OF REPORT 1 3b...swapping open the code ampering. Re -authentication would then be required prior to regaining ;ntrol. 30 V . AUTHENTICATION MIRTHODS This section examines...x. n/a v mis 15) .. . ... x x ... .074 I .r ..... x . . x x x.x. 3880 S amno 3) . • ..... .. . I. ... 2000 .d0O (3) x x x x I . . . x x

  7. Optically secured information retrieval using two authenticated phase-only masks.

    PubMed

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-10-23

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

  8. Optically secured information retrieval using two authenticated phase-only masks

    PubMed Central

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-01-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices. PMID:26494213

  9. Optically secured information retrieval using two authenticated phase-only masks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-10-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

  10. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.

    PubMed

    Li, Xing; Chen, Dexin; Li, Chunyan; Wang, Liangmin

    2015-07-03

    With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people's lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as confidentiality and integrity should be considered. This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), this scheme can also verify data integrity during data aggregation and forwarding processes so that false data can be detected as early as possible. Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well. Compared with other protocols, the transmitted data and network overhead are reduced in our scheme.

  11. Developing Question Constructions in Japanese as a First Language: The Roles of Type of Referent and Parental Input

    ERIC Educational Resources Information Center

    Uno, Mariko

    2017-01-01

    The present dissertation extracted 17,291 questions from Aki, Ryo, and Tai and their mother's spontaneously produced speech data available in the CHILDES database (MacWhinney, 2000; Oshima-Takane & MacWhinney, 1998). The children's age ranged from 1;3 to 3;0. Their questions were coded for (1) yes/no questions that include a sentence-final…

  12. A Framework for Performing Multiscale Stochastic Progressive Failure Analysis of Composite Structures

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2006-01-01

    A framework is presented that enables coupled multiscale analysis of composite structures. The recently developed, free, Finite Element Analysis - Micromechanics Analysis Code (FEAMAC) software couples the Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) with ABAQUS to perform micromechanics based FEA such that the nonlinear composite material response at each integration point is modeled at each increment by MAC/GMC. As a result, the stochastic nature of fiber breakage in composites can be simulated through incorporation of an appropriate damage and failure model that operates within MAC/GMC on the level of the fiber. Results are presented for the progressive failure analysis of a titanium matrix composite tensile specimen that illustrate the power and utility of the framework and address the techniques needed to model the statistical nature of the problem properly. In particular, it is shown that incorporating fiber strength randomness on multiple scales improves the quality of the simulation by enabling failure at locations other than those associated with structural level stress risers.

  13. A Framework for Performing Multiscale Stochastic Progressive Failure Analysis of Composite Structures

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2007-01-01

    A framework is presented that enables coupled multiscale analysis of composite structures. The recently developed, free, Finite Element Analysis-Micromechanics Analysis Code (FEAMAC) software couples the Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) with ABAQUS to perform micromechanics based FEA such that the nonlinear composite material response at each integration point is modeled at each increment by MAC/GMC. As a result, the stochastic nature of fiber breakage in composites can be simulated through incorporation of an appropriate damage and failure model that operates within MAC/GMC on the level of the fiber. Results are presented for the progressive failure analysis of a titanium matrix composite tensile specimen that illustrate the power and utility of the framework and address the techniques needed to model the statistical nature of the problem properly. In particular, it is shown that incorporating fiber strength randomness on multiple scales improves the quality of the simulation by enabling failure at locations other than those associated with structural level stress risers.

  14. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  15. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  16. (NTF) National Transonic Facility Test 213-SFW Flow Control II,

    NASA Image and Video Library

    2012-11-19

    (NTF) National Transonic Facility Test 213-SFW Flow Control II, Fast-MAC Model: The fundamental Aerodynamics Subsonic Transonic-Modular Active Control (Fast-MAC) Model was tested for the 2nd time in the NTF. The objectives were to document the effects of Reynolds numbers on circulation control aerodynamics and to develop and open data set for CFD code validation. Image taken in building 1236, National Transonic Facility

  17. Modeling Woven Polymer Matrix Composites with MAC/GMC

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M. (Technical Monitor)

    2000-01-01

    NASA's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) is used to predict the elastic properties of plain weave polymer matrix composites (PMCs). The traditional one step three-dimensional homogertization procedure that has been used in conjunction with MAC/GMC for modeling woven composites in the past is inaccurate due to the lack of shear coupling inherent to the model. However, by performing a two step homogenization procedure in which the woven composite repeating unit cell is homogenized independently in the through-thickness direction prior to homogenization in the plane of the weave, MAC/GMC can now accurately model woven PMCs. This two step procedure is outlined and implemented, and predictions are compared with results from the traditional one step approach and other models and experiments from the literature. Full coupling of this two step technique with MAC/ GMC will result in a widely applicable, efficient, and accurate tool for the design and analysis of woven composite materials and structures.

  18. A Secure and Robust Object-Based Video Authentication System

    NASA Astrophysics Data System (ADS)

    He, Dajun; Sun, Qibin; Tian, Qi

    2004-12-01

    An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT) coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI).

  19. Establishing a reference dataset for the authentication of spinal muscular atrophy cell lines using STR profiling and digital PCR.

    PubMed

    Stabley, Deborah L; Holbrook, Jennifer; Harris, Ashlee W; Swoboda, Kathryn J; Crawford, Thomas O; Sol-Church, Katia; Butchbach, Matthew E R

    2017-05-01

    Fibroblasts and lymphoblastoid cell lines (LCLs) derived from individuals with spinal muscular atrophy (SMA) have been and continue to be essential for translational SMA research. Authentication of cell lines helps ensure reproducibility and rigor in biomedical research. This quality control measure identifies mislabeling or cross-contamination of cell lines and prevents misinterpretation of data. Unfortunately, authentication of SMA cell lines used in various studies has not been possible because of a lack of a reference. In this study, we provide said reference so that SMA cell lines can be subsequently authenticated. We use short tandem repeat (STR) profiling and digital PCR (dPCR), which quantifies SMN1 and SMN2 copy numbers, to generate molecular identity codes for fibroblasts and LCLs that are commonly used in SMA research. Using these molecular identity codes, we clarify the familial relationships within a set of fibroblasts commonly used in SMA research. This study presents the first cell line reference set for the SMA research community and demonstrates its usefulness for re-identification and authentication of lines commonly used as in vitro models for future studies. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Tool for Generation of MAC/GMC Representative Unit Cell for CMC/PMC Analysis

    NASA Technical Reports Server (NTRS)

    Murthy, Pappu L. N.; Pineda, Evan J.

    2016-01-01

    This document describes a recently developed analysis tool that enhances the resident capabilities of the Micromechanics Analysis Code with the Generalized Method of Cells (MAC/GMC) 4.0. This tool is especially useful in analyzing ceramic matrix composites (CMCs), where higher fidelity with improved accuracy of local response is needed. The tool, however, can be used for analyzing polymer matrix composites (PMCs) as well. MAC/GMC 4.0 is a composite material and laminate analysis software developed at NASA Glenn Research Center. The software package has been built around the concept of the generalized method of cells (GMC). The computer code is developed with a user friendly framework, along with a library of local inelastic, damage, and failure models. Further, application of simulated thermomechanical loading, generation of output results, and selection of architectures to represent the composite material have been automated to increase the user friendliness, as well as to make it more robust in terms of input preparation and code execution. Finally, classical lamination theory has been implemented within the software, wherein GMC is used to model the composite material response of each ply. Thus, the full range of GMC composite material capabilities is available for analysis of arbitrary laminate configurations as well. The primary focus of the current effort is to provide a graphical user interface (GUI) capability that generates a number of different user-defined repeating unit cells (RUCs). In addition, the code has provisions for generation of a MAC/GMC-compatible input text file that can be merged with any MAC/GMC input file tailored to analyze composite materials. Although the primary intention was to address the three different constituents and phases that are usually present in CMCs-namely, fibers, matrix, and interphase-it can be easily modified to address two-phase polymer matrix composite (PMC) materials where an interphase is absent. Currently, the tool capability includes generation of RUCs for square packing, hexagonal packing, and random fiber packing as well as RUCs based on actual composite micrographs. All these options have the fibers modeled as having a circular cross-sectional area. In addition, a simplified version of RUC is provided where the fibers are treated as having a square cross section and are distributed randomly. This RUC facilitates a speedy analysis using the higher fidelity version of GMC known as HFGMC. The first four mentioned options above support uniform subcell discretization. The last one has variable subcell sizes due to the primary intention of keeping the RUC size to a minimum to gain the speed ups using the higher fidelity version of MAC. The code is implemented within the MATLAB (The Mathworks, Inc., Natick, MA) developmental framework; however, a standalone application that does not need a priori MATLAB installation is also created with the aid of the MATLAB compiler.

  1. High-throughput and low-latency 60GHz small-cell network architectures over radio-over-fiber technologies

    NASA Astrophysics Data System (ADS)

    Pleros, N.; Kalfas, G.; Mitsolidou, C.; Vagionas, C.; Tsiokos, D.; Miliou, A.

    2017-01-01

    Future broadband access networks in the 5G framework will need to be bilateral, exploiting both optical and wireless technologies. This paper deals with new approaches and synergies on radio-over-fiber (RoF) technologies and how those can be leveraged to seamlessly converge wireless technology for agility and mobility with passive optical networks (PON)-based backhauling. The proposed convergence paradigm is based upon a holistic network architecture mixing mm-wave wireless access with photonic integration, dynamic capacity allocation and network coding schemes to enable high bandwidth and low-latency fixed and 60GHz wireless personal area communications for gigabit rate per user, proposing and deploying on top a Medium-Transparent MAC (MT-MAC) protocol as a low-latency bandwidth allocation mechanism. We have evaluated alternative network topologies between the central office (CO) and the access point module (APM) for data rates up to 2.5 Gb/s and SC frequencies up to 60 GHz. Optical network coding is demonstrated for SCM-based signaling to enhance bandwidth utilization and facilitate optical-wireless convergence in 5G applications, reporting medium-transparent network coding directly at the physical layer between end-users communicating over a RoF infrastructure. Towards equipping the physical layer with the appropriate agility to support MT-MAC protocols, a monolithic InP-based Remote Antenna Unit optoelectronic PIC interface is shown that ensures control over the optical resource allocation assisting at the same time broadband wireless service. Finally, the MT-MAC protocol is analysed and simulation and analytical theoretical results are presented that are found to be in good agreement confirming latency values lower than 1msec for small- to mid-load conditions.

  2. MAX: Multiplatform Applications for XAFS

    NASA Astrophysics Data System (ADS)

    Alain, Michalowicz; Jacques, Moscovici; Diane, Muller-Bouvet; Karine, Provost

    2009-11-01

    MAX is a new EXAFS and XANES analysis package, replacing our old "EXAFS pour le Mac" software suite. The major improvement is the ability to work with strictly the same code, compiled at once for Microsoft Windows, Apple MacOSX and LINUX systems, justifying the title "Multiplatform Applications for XAFS". It is organized as four modules: ABSORBIX (X-ray absorbance and fluorescence self-absorption calculations), CHEROKEE (EXAFS and XANES data treatment), ROUNDMIDNIGHT (EXAFS modeling and fit) and CRYSTALFFREV (from crystal structures and molecular modeling to FEFF EXAFS and XANES theoretical calculations). Most features developed in "EXAFS pour le Mac" are still available, but with much improvements in the user's interface, data treatment algorithms and new functionalities.

  3. Micromechanics Analysis Code (MAC) User Guide: Version 1.0

    NASA Technical Reports Server (NTRS)

    Wilt, T. E.; Arnold, S. M.

    1994-01-01

    The ability to accurately predict the thermomechanical deformation response of advanced composite materials continues to play an important role in the development of these strategic materials. Analytical models that predict the effective behavior of composites are used not only by engineers performing structural analysis of large-scale composite components but also by material scientists in developing new material systems. For an analytical model to fulfill these two distinct functions it must be based on a micromechanics approach which utilizes physically based deformation and life constitutive models and allows one to generate the average (macro) response of a composite material given the properties of the individual constituents and their geometric arrangement. Here the user guide for the recently developed, computationally efficient and comprehensive micromechanics analysis code, MAC, who's predictive capability rests entirely upon the fully analytical generalized method of cells, GMC, micromechanics model is described. MAC is a versatile form of research software that 'drives' the double or triple ply periodic micromechanics constitutive models based upon GMC. MAC enhances the basic capabilities of GMC by providing a modular framework wherein (1) various thermal, mechanical (stress or strain control), and thermomechanical load histories can be imposed; (2) different integration algorithms may be selected; (3) a variety of constituent constitutive models may be utilized and/or implemented; and (4) a variety of fiber architectures may be easily accessed through their corresponding representative volume elements.

  4. Micromechanics Analysis Code (MAC). User Guide: Version 2.0

    NASA Technical Reports Server (NTRS)

    Wilt, T. E.; Arnold, S. M.

    1996-01-01

    The ability to accurately predict the thermomechanical deformation response of advanced composite materials continues to play an important role in the development of these strategic materials. Analytical models that predict the effective behavior of composites are used not only by engineers performing structural analysis of large-scale composite components but also by material scientists in developing new material systems. For an analytical model to fulfill these two distinct functions it must be based on a micromechanics approach which utilizes physically based deformation and life constitutive models and allows one to generate the average (macro) response of a composite material given the properties of the individual constituents and their geometric arrangement. Here the user guide for the recently developed, computationally efficient and comprehensive micromechanics analysis code's (MAC) who's predictive capability rests entirely upon the fully analytical generalized method of cells (GMC), micromechanics model is described. MAC is a versatile form of research software that 'drives' the double or triply periodic micromechanics constitutive models based upon GMC. MAC enhances the basic capabilities of GMC by providing a modular framework wherein (1) various thermal, mechanical (stress or strain control) and thermomechanical load histories can be imposed, (2) different integration algorithms may be selected, (3) a variety of constituent constitutive models may be utilized and/or implemented, and (4) a variety of fiber and laminate architectures may be easily accessed through their corresponding representative volume elements.

  5. Refined annotation and assembly of the Tetrahymena thermophila genome sequence through EST analysis, comparative genomic hybridization, and targeted gap closure

    PubMed Central

    Coyne, Robert S; Thiagarajan, Mathangi; Jones, Kristie M; Wortman, Jennifer R; Tallon, Luke J; Haas, Brian J; Cassidy-Hanley, Donna M; Wiley, Emily A; Smith, Joshua J; Collins, Kathleen; Lee, Suzanne R; Couvillion, Mary T; Liu, Yifan; Garg, Jyoti; Pearlman, Ronald E; Hamilton, Eileen P; Orias, Eduardo; Eisen, Jonathan A; Methé, Barbara A

    2008-01-01

    Background Tetrahymena thermophila, a widely studied model for cellular and molecular biology, is a binucleated single-celled organism with a germline micronucleus (MIC) and somatic macronucleus (MAC). The recent draft MAC genome assembly revealed low sequence repetitiveness, a result of the epigenetic removal of invasive DNA elements found only in the MIC genome. Such low repetitiveness makes complete closure of the MAC genome a feasible goal, which to achieve would require standard closure methods as well as removal of minor MIC contamination of the MAC genome assembly. Highly accurate preliminary annotation of Tetrahymena's coding potential was hindered by the lack of both comparative genomic sequence information from close relatives and significant amounts of cDNA evidence, thus limiting the value of the genomic information and also leaving unanswered certain questions, such as the frequency of alternative splicing. Results We addressed the problem of MIC contamination using comparative genomic hybridization with purified MIC and MAC DNA probes against a whole genome oligonucleotide microarray, allowing the identification of 763 genome scaffolds likely to contain MIC-limited DNA sequences. We also employed standard genome closure methods to essentially finish over 60% of the MAC genome. For the improvement of annotation, we have sequenced and analyzed over 60,000 verified EST reads from a variety of cellular growth and development conditions. Using this EST evidence, a combination of automated and manual reannotation efforts led to updates that affect 16% of the current protein-coding gene models. By comparing EST abundance, many genes showing apparent differential expression between these conditions were identified. Rare instances of alternative splicing and uses of the non-standard amino acid selenocysteine were also identified. Conclusion We report here significant progress in genome closure and reannotation of Tetrahymena thermophila. Our experience to date suggests that complete closure of the MAC genome is attainable. Using the new EST evidence, automated and manual curation has resulted in substantial improvements to the over 24,000 gene models, which will be valuable to researchers studying this model organism as well as for comparative genomics purposes. PMID:19036158

  6. Development of Milestone Schedules for Selected Logistics Support Directorate Programs. Appendix A. Part 2. Task Summaries.

    DTIC Science & Technology

    1987-09-15

    MAC; CODE NUMBER: NONE AND REPAIR PARTS AND SPECIAL TOOLS LIST (RPSTL). RESPONSIBILITY: ROY & ILS DURATION: 32.00 WORK DAYS PRE PPPL SCHEDULE...ILS DURATION: 22.00 WORK DAYS R/V PPPL SCHEDULE: DVPMARPS REVIEW AND VALIDATE PRELIMINARY PROVISIONING PARTS LIST. CODE NUMBER: NONE RESPONSIBILITY

  7. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks

    PubMed Central

    Li, Xing; Chen, Dexin; Li, Chunyan; Wang, Liangmin

    2015-01-01

    With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people’s lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as confidentiality and integrity should be considered. This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), this scheme can also verify data integrity during data aggregation and forwarding processes so that false data can be detected as early as possible. Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well. Compared with other protocols, the transmitted data and network overhead are reduced in our scheme. PMID:26151208

  8. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud

    PubMed Central

    Seenivasagam, V.; Velumani, R.

    2013-01-01

    Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks. PMID:23970943

  9. A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud.

    PubMed

    Seenivasagam, V; Velumani, R

    2013-01-01

    Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  10. Macintosh II based space Telemetry and Command (MacTac) system

    NASA Technical Reports Server (NTRS)

    Dominy, Carol T.; Chesney, James R.; Collins, Aaron S.; Kay, W. K.

    1991-01-01

    The general architecture and the principal functions of the Macintosh II based Telemetry and Command system, presently under development, are described, with attention given to custom telemetry cards, input/output interfaces, and the icon driven user interface. The MacTac is a low-cost, transportable, easy to use, compact system designed to meet the requirements specified by the Consultative Committeee for Space Data Systems while remaining flexible enough to support a wide variety of other user specific telemetry processing requirements, such as TDM data. In addition, the MacTac can accept or generate forward data (such as spacecraft commands), calculate and append a Polynomial Check Code, and output these data to NASCOM to provide full Telemetry and Command capability.

  11. Binary weight distributions of some Reed-Solomon codes

    NASA Technical Reports Server (NTRS)

    Pollara, F.; Arnold, S.

    1992-01-01

    The binary weight distributions of the (7,5) and (15,9) Reed-Solomon (RS) codes and their duals are computed using the MacWilliams identities. Several mappings of symbols to bits are considered and those offering the largest binary minimum distance are found. These results are then used to compute bounds on the soft-decoding performance of these codes in the presence of additive Gaussian noise. These bounds are useful for finding large binary block codes with good performance and for verifying the performance obtained by specific soft-coding algorithms presently under development.

  12. Quantum Kronecker sum-product low-density parity-check codes with finite rate

    NASA Astrophysics Data System (ADS)

    Kovalev, Alexey A.; Pryadko, Leonid P.

    2013-07-01

    We introduce an ansatz for quantum codes which gives the hypergraph-product (generalized toric) codes by Tillich and Zémor and generalized bicycle codes by MacKay as limiting cases. The construction allows for both the lower and the upper bounds on the minimum distance; they scale as a square root of the block length. Many thus defined codes have a finite rate and limited-weight stabilizer generators, an analog of classical low-density parity-check (LDPC) codes. Compared to the hypergraph-product codes, hyperbicycle codes generally have a wider range of parameters; in particular, they can have a higher rate while preserving the estimated error threshold.

  13. BossPro: a biometrics-based obfuscation scheme for software protection

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  14. Peregrine System User Basics | High-Performance Computing | NREL

    Science.gov Websites

    peregrine.hpc.nrel.gov or to one of the login nodes. Example commands to access Peregrine from a Linux or Mac OS X system Code Example Create a file called hello.F90 containing the following code: program hello write(6 information by enclosing it in brackets < >. For example: $ ssh -Y

  15. Ultra Safe And Secure Blasting System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tappingmore » into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.« less

  16. Upwind MacCormack Euler solver with non-equilibrium chemistry

    NASA Technical Reports Server (NTRS)

    Sherer, Scott E.; Scott, James N.

    1993-01-01

    A computer code, designated UMPIRE, is currently under development to solve the Euler equations in two dimensions with non-equilibrium chemistry. UMPIRE employs an explicit MacCormack algorithm with dissipation introduced via Roe's flux-difference split upwind method. The code also has the capability to employ a point-implicit methodology for flows where stiffness is introduced through the chemical source term. A technique consisting of diagonal sweeps across the computational domain from each corner is presented, which is used to reduce storage and execution requirements. Results depicting one dimensional shock tube flow for both calorically perfect gas and thermally perfect, dissociating nitrogen are presented to verify current capabilities of the program. Also, computational results from a chemical reactor vessel with no fluid dynamic effects are presented to check the chemistry capability and to verify the point implicit strategy.

  17. Connected Code: Why Children Need to Learn Programming. MacArthur Foundation Series on Digital Media and Learning

    ERIC Educational Resources Information Center

    Kafai, Yasmin B.; Burke, Quinn

    2014-01-01

    Coding, once considered an arcane craft practiced by solitary techies, is now recognized by educators and theorists as a crucial skill, even a new literacy, for all children. Programming is often promoted in K-12 schools as a way to encourage "computational thinking"--which has now become the umbrella term for understanding what computer…

  18. Wavelet-based reversible watermarking for authentication

    NASA Astrophysics Data System (ADS)

    Tian, Jun

    2002-04-01

    In the digital information age, digital content (audio, image, and video) can be easily copied, manipulated, and distributed. Copyright protection and content authentication of digital content has become an urgent problem to content owners and distributors. Digital watermarking has provided a valuable solution to this problem. Based on its application scenario, most digital watermarking methods can be divided into two categories: robust watermarking and fragile watermarking. As a special subset of fragile watermark, reversible watermark (which is also called lossless watermark, invertible watermark, erasable watermark) enables the recovery of the original, unwatermarked content after the watermarked content has been detected to be authentic. Such reversibility to get back unwatermarked content is highly desired in sensitive imagery, such as military data and medical data. In this paper we present a reversible watermarking method based on an integer wavelet transform. We look into the binary representation of each wavelet coefficient and embed an extra bit to expandable wavelet coefficient. The location map of all expanded coefficients will be coded by JBIG2 compression and these coefficient values will be losslessly compressed by arithmetic coding. Besides these two compressed bit streams, an SHA-256 hash of the original image will also be embedded for authentication purpose.

  19. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    NASA Astrophysics Data System (ADS)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  20. The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.

    PubMed

    Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong

    2009-01-01

    In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  1. 76 FR 60748 - Changes in Flood Elevation Determinations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ..., 2011; The Johnson, Mayor, City of Sacramento Bee. Sacramento, 915 I Street, 5th Floor, Mail Code 09100..., 2011 060262 of Sacramento County 23, 2011; The MacGlashan, Chair, (11-09-2263P). Sacramento Bee...

  2. The Perception and Mimicry of Facial Movements Predict Judgments of Smile Authenticity

    PubMed Central

    Korb, Sebastian; With, Stéphane; Niedenthal, Paula; Kaiser, Susanne; Grandjean, Didier

    2014-01-01

    The mechanisms through which people perceive different types of smiles and judge their authenticity remain unclear. Here, 19 different types of smiles were created based on the Facial Action Coding System (FACS), using highly controlled, dynamic avatar faces. Participants observed short videos of smiles while their facial mimicry was measured with electromyography (EMG) over four facial muscles. Smile authenticity was judged after each trial. Avatar attractiveness was judged once in response to each avatar’s neutral face. Results suggest that, in contrast to most earlier work using static pictures as stimuli, participants relied less on the Duchenne marker (the presence of crow’s feet wrinkles around the eyes) in their judgments of authenticity. Furthermore, mimicry of smiles occurred in the Zygomaticus Major, Orbicularis Oculi, and Corrugator muscles. Consistent with theories of embodied cognition, activity in these muscles predicted authenticity judgments, suggesting that facial mimicry influences the perception of smiles. However, no significant mediation effect of facial mimicry was found. Avatar attractiveness did not predict authenticity judgments or mimicry patterns. PMID:24918939

  3. PubMed

    Trinker, Horst

    2011-10-28

    We study the distribution of triples of codewords of codes and ordered codes. Schrijver [A. Schrijver, New code upper bounds from the Terwilliger algebra and semidefinite programming, IEEE Trans. Inform. Theory 51 (8) (2005) 2859-2866] used the triple distribution of a code to establish a bound on the number of codewords based on semidefinite programming. In the first part of this work, we generalize this approach for ordered codes. In the second part, we consider linear codes and linear ordered codes and present a MacWilliams-type identity for the triple distribution of their dual code. Based on the non-negativity of this linear transform, we establish a linear programming bound and conclude with a table of parameters for which this bound yields better results than the standard linear programming bound.

  4. Strengthening Software Authentication with the ROSE Software Suite

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    White, G

    2006-06-15

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlightmore » suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects.« less

  5. Issues and approaches for electronic document approval and transmittal using digital signatures and text authentication: Prototype documentation

    NASA Astrophysics Data System (ADS)

    Boling, M. E.

    1989-09-01

    Prototypes were assembled pursuant to recommendations made in report K/DSRD-96, Issues and Approaches for Electronic Document Approval and Transmittal Using Digital Signatures and Text Authentication, and to examine and discover the possibilities for integrating available hardware and software to provide cost effective systems for digital signatures and text authentication. These prototypes show that on a LAN, a multitasking, windowed, mouse/keyboard menu-driven interface can be assembled to provide easy and quick access to bit-mapped images of documents, electronic forms and electronic mail messages with a means to sign, encrypt, deliver, receive or retrieve and authenticate text and signatures. In addition they show that some of this same software may be used in a classified environment using host to terminal transactions to accomplish these same operations. Finally, a prototype was developed demonstrating that binary files may be signed electronically and sent by point to point communication and over ARPANET to remote locations where the authenticity of the code and signature may be verified. Related studies on the subject of electronic signatures and text authentication using public key encryption were done within the Department of Energy. These studies include timing studies of public key encryption software and hardware and testing of experimental user-generated host resident software for public key encryption. This software used commercially available command-line source code. These studies are responsive to an initiative within the Office of the Secretary of Defense (OSD) for the protection of unclassified but sensitive data. It is notable that these related studies are all built around the same commercially available public key encryption products from the private sector and that the software selection was made independently by each study group.

  6. FEAMAC/CARES Stochastic-Strength-Based Damage Simulation Tool for Ceramic Matrix Composites

    NASA Technical Reports Server (NTRS)

    Nemeth, Noel; Bednarcyk, Brett; Pineda, Evan; Arnold, Steven; Mital, Subodh; Murthy, Pappu; Bhatt, Ramakrishna

    2016-01-01

    Reported here is a coupling of two NASA developed codes: CARES (Ceramics Analysis and Reliability Evaluation of Structures) with the MAC/GMC (Micromechanics Analysis Code/ Generalized Method of Cells) composite material analysis code. The resulting code is called FEAMAC/CARES and is constructed as an Abaqus finite element analysis UMAT (user defined material). Here we describe the FEAMAC/CARES code and an example problem (taken from the open literature) of a laminated CMC in off-axis loading is shown. FEAMAC/CARES performs stochastic-strength-based damage simulation response of a CMC under multiaxial loading using elastic stiffness reduction of the failed elements.

  7. Stochastic-Strength-Based Damage Simulation Tool for Ceramic Matrix Composite

    NASA Technical Reports Server (NTRS)

    Nemeth, Noel; Bednarcyk, Brett; Pineda, Evan; Arnold, Steven; Mital, Subodh; Murthy, Pappu

    2015-01-01

    Reported here is a coupling of two NASA developed codes: CARES (Ceramics Analysis and Reliability Evaluation of Structures) with the MAC/GMC (Micromechanics Analysis Code/ Generalized Method of Cells) composite material analysis code. The resulting code is called FEAMAC/CARES and is constructed as an Abaqus finite element analysis UMAT (user defined material). Here we describe the FEAMAC/CARES code and an example problem (taken from the open literature) of a laminated CMC in off-axis loading is shown. FEAMAC/CARES performs stochastic-strength-based damage simulation response of a CMC under multiaxial loading using elastic stiffness reduction of the failed elements.

  8. The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

    PubMed Central

    Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong

    2009-01-01

    In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode. PMID:22291566

  9. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  10. Millisecond timing on PCs and Macs.

    PubMed

    MacInnes, W J; Taylor, T L

    2001-05-01

    A real-time, object-oriented solution for displaying stimuli on Windows 95/98, MacOS and Linux platforms is presented. The program, written in C++, utilizes a special-purpose window class (GLWindow), OpenGL, and 32-bit graphics acceleration; it avoids display timing uncertainty by substituting the new window class for the default window code for each system. We report the outcome of tests for real-time capability across PC and Mac platforms running a variety of operating systems. The test program, which can be used as a shell for programming real-time experiments and testing specific processors, is available at http://www.cs.dal.ca/~macinnwj. We propose to provide researchers with a sense of the usefulness of our program, highlight the ability of many multitasking environments to achieve real time, as well as caution users about systems that may not achieve real time, even under optimal conditions.

  11. Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting

    NASA Astrophysics Data System (ADS)

    You, Minli; Lin, Min; Wang, Shurui; Wang, Xuemin; Zhang, Ge; Hong, Yuan; Dong, Yuqing; Jin, Guorui; Xu, Feng

    2016-05-01

    Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting.Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting. Electronic supplementary information (ESI) available: Calculating details of UCNP content per 3D QR code and decoding process of the 3D QR code. See DOI: 10.1039/c6nr01353h

  12. Micromechanics Analysis Code With Generalized Method of Cells (MAC/GMC): User Guide. Version 3

    NASA Technical Reports Server (NTRS)

    Arnold, S. M.; Bednarcyk, B. A.; Wilt, T. E.; Trowbridge, D.

    1999-01-01

    The ability to accurately predict the thermomechanical deformation response of advanced composite materials continues to play an important role in the development of these strategic materials. Analytical models that predict the effective behavior of composites are used not only by engineers performing structural analysis of large-scale composite components but also by material scientists in developing new material systems. For an analytical model to fulfill these two distinct functions it must be based on a micromechanics approach which utilizes physically based deformation and life constitutive models and allows one to generate the average (macro) response of a composite material given the properties of the individual constituents and their geometric arrangement. Here the user guide for the recently developed, computationally efficient and comprehensive micromechanics analysis code, MAC, who's predictive capability rests entirely upon the fully analytical generalized method of cells, GMC, micromechanics model is described. MAC/ GMC is a versatile form of research software that "drives" the double or triply periodic micromechanics constitutive models based upon GMC. MAC/GMC enhances the basic capabilities of GMC by providing a modular framework wherein 1) various thermal, mechanical (stress or strain control) and thermomechanical load histories can be imposed, 2) different integration algorithms may be selected, 3) a variety of material constitutive models (both deformation and life) may be utilized and/or implemented, and 4) a variety of fiber architectures (both unidirectional, laminate and woven) may be easily accessed through their corresponding representative volume elements contained within the supplied library of RVEs or input directly by the user, and 5) graphical post processing of the macro and/or micro field quantities is made available.

  13. Investigating Background Pictures for Picture Gesture Authentication

    DTIC Science & Technology

    2017-06-01

    computing , stating “Microsoft is committed to making sure that the technology within the agreement has a mobile-first focus, and we 2 expect to begin to...Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave Blank) 2. REPORT DATE 06-16-2017 3. REPORT TYPE AND...unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) The military relies heavily on computer systems. Without a strong method of authentication

  14. Decoding DNA labels by melting curve analysis using real-time PCR.

    PubMed

    Balog, József A; Fehér, Liliána Z; Puskás, László G

    2017-12-01

    Synthetic DNA has been used as an authentication code for a diverse number of applications. However, existing decoding approaches are based on either DNA sequencing or the determination of DNA length variations. Here, we present a simple alternative protocol for labeling different objects using a small number of short DNA sequences that differ in their melting points. Code amplification and decoding can be done in two steps using quantitative PCR (qPCR). To obtain a DNA barcode with high complexity, we defined 8 template groups, each having 4 different DNA templates, yielding 158 (>2.5 billion) combinations of different individual melting temperature (Tm) values and corresponding ID codes. The reproducibility and specificity of the decoding was confirmed by using the most complex template mixture, which had 32 different products in 8 groups with different Tm values. The industrial applicability of our protocol was also demonstrated by labeling a drone with an oil-based paint containing a predefined DNA code, which was then successfully decoded. The method presented here consists of a simple code system based on a small number of synthetic DNA sequences and a cost-effective, rapid decoding protocol using a few qPCR reactions, enabling a wide range of authentication applications.

  15. Market research for Idaho Transportation Department linear referencing system.

    DOT National Transportation Integrated Search

    2009-09-02

    For over 30 years, the Idaho Transportation Department (ITD) has had an LRS called MACS : (MilePoint And Coded Segment), which is being implemented on a mainframe using a : COBOL/CICS platform. As ITD began embracing newer technologies and moving tow...

  16. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  17. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  18. Data to hardware binding with physical unclonable functions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason

    The various technologies presented herein relate to binding data (e.g., software) to hardware, wherein the hardware is to utilize the data. The generated binding can be utilized to detect whether at least one of the hardware or the data has been modified between an initial moment (enrollment) and a later moment (authentication). During enrollment, an enrollment value is generated that includes a signature of the data, a first response from a PUF located on the hardware, and a code word. During authentication, a second response from the PUF is utilized to authenticate any of the content in the enrollment value,more » and based upon the authentication, a determination can be made regarding whether the hardware and/or the data have been modified. If modification is detected then a mitigating operation can be performed, e.g., the hardware is prevented from utilizing the data. If no modification is detected, the data can be utilized.« less

  19. System M: A Program Logic for Code Sandboxing and Identification

    DTIC Science & Technology

    2014-07-22

    M. Ryan. Attack, solution and verification for shared authorisation data in TCG TPM. In Proc. FAST’09, 2010. [8] A. Datta, A. Derek, J. C. Mitchell...11] S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A formal analysis of authentication in the TPM. In Proc. FAST’10, 2011. [12] S. Delaune, S...A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451–519, July 2003. [16] S. Gürgens, C. Rudolph, D

  20. Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks

    DTIC Science & Technology

    2008-08-27

    Message Authentication Code-Message Digest 5-96). Due to the processing power consumption and slowness of public key authentication methods, RSA ...MODP) group with a 768 -bit modulus 2. a MODP group with a 1024-bit modulus 3. an Elliptic Curve Group over GF[ 2n ] (EC2N) group with a 155-bit...nonces, digital signatures using the Digital Signature Algorithm, and the Rivest-Shamir- Adelman ( RSA ) algorithm. For more information about the

  1. WeBIAS: a web server for publishing bioinformatics applications.

    PubMed

    Daniluk, Paweł; Wilczyński, Bartek; Lesyng, Bogdan

    2015-11-02

    One of the requirements for a successful scientific tool is its availability. Developing a functional web service, however, is usually considered a mundane and ungratifying task, and quite often neglected. When publishing bioinformatic applications, such attitude puts additional burden on the reviewers who have to cope with poorly designed interfaces in order to assess quality of presented methods, as well as impairs actual usefulness to the scientific community at large. In this note we present WeBIAS-a simple, self-contained solution to make command-line programs accessible through web forms. It comprises a web portal capable of serving several applications and backend schedulers which carry out computations. The server handles user registration and authentication, stores queries and results, and provides a convenient administrator interface. WeBIAS is implemented in Python and available under GNU Affero General Public License. It has been developed and tested on GNU/Linux compatible platforms covering a vast majority of operational WWW servers. Since it is written in pure Python, it should be easy to deploy also on all other platforms supporting Python (e.g. Windows, Mac OS X). Documentation and source code, as well as a demonstration site are available at http://bioinfo.imdik.pan.pl/webias . WeBIAS has been designed specifically with ease of installation and deployment of services in mind. Setting up a simple application requires minimal effort, yet it is possible to create visually appealing, feature-rich interfaces for query submission and presentation of results.

  2. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    PubMed Central

    Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403

  3. Using Rose and Compass for Authentication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSEmore » is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.« less

  4. MacSyFinder: A Program to Mine Genomes for Molecular Systems with an Application to CRISPR-Cas Systems

    PubMed Central

    Abby, Sophie S.; Néron, Bertrand; Ménager, Hervé; Touchon, Marie; Rocha, Eduardo P. C.

    2014-01-01

    Motivation Biologists often wish to use their knowledge on a few experimental models of a given molecular system to identify homologs in genomic data. We developed a generic tool for this purpose. Results Macromolecular System Finder (MacSyFinder) provides a flexible framework to model the properties of molecular systems (cellular machinery or pathway) including their components, evolutionary associations with other systems and genetic architecture. Modelled features also include functional analogs, and the multiple uses of a same component by different systems. Models are used to search for molecular systems in complete genomes or in unstructured data like metagenomes. The components of the systems are searched by sequence similarity using Hidden Markov model (HMM) protein profiles. The assignment of hits to a given system is decided based on compliance with the content and organization of the system model. A graphical interface, MacSyView, facilitates the analysis of the results by showing overviews of component content and genomic context. To exemplify the use of MacSyFinder we built models to detect and class CRISPR-Cas systems following a previously established classification. We show that MacSyFinder allows to easily define an accurate “Cas-finder” using publicly available protein profiles. Availability and Implementation MacSyFinder is a standalone application implemented in Python. It requires Python 2.7, Hmmer and makeblastdb (version 2.2.28 or higher). It is freely available with its source code under a GPLv3 license at https://github.com/gem-pasteur/macsyfinder. It is compatible with all platforms supporting Python and Hmmer/makeblastdb. The “Cas-finder” (models and HMM profiles) is distributed as a compressed tarball archive as Supporting Information. PMID:25330359

  5. Lithographically encoded polymer microtaggant using high-capacity and error-correctable QR code for anti-counterfeiting of drugs.

    PubMed

    Han, Sangkwon; Bae, Hyung Jong; Kim, Junhoi; Shin, Sunghwan; Choi, Sung-Eun; Lee, Sung Hoon; Kwon, Sunghoon; Park, Wook

    2012-11-20

    A QR-coded microtaggant for the anti-counterfeiting of drugs is proposed that can provide high capacity and error-correction capability. It is fabricated lithographically in a microfluidic channel with special consideration of the island patterns in the QR Code. The microtaggant is incorporated in the drug capsule ("on-dose authentication") and can be read by a simple smartphone QR Code reader application when removed from the capsule and washed free of drug. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. How to Build MCNP 6.2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bull, Jeffrey S.

    This presentation describes how to build MCNP 6.2. MCNP®* 6.2 can be compiled on Macs, PCs, and most Linux systems. It can also be built for parallel execution using both OpenMP and Messing Passing Interface (MPI) methods. MCNP6 requires Fortran, C, and C++ compilers to build the code.

  7. What Does the CBM-Maze Test Measure?

    ERIC Educational Resources Information Center

    Muijselaar, Marloes M. L.; Kendeou, Panayiota; de Jong, Peter F.; van den Broek, Paul W.

    2017-01-01

    In this study, we identified the code-related (decoding, fluency) and language comprehension (vocabulary, listening comprehension) demands of the CBM-Maze test, a formative assessment, and compared them to those of the Gates-MacGinitie test, a standardized summative assessment. The demands of these reading comprehension tests and their…

  8. Robust Self-Authenticating Network Coding

    DTIC Science & Technology

    2008-11-30

    efficient as traditional point-to-point coding schemes 3m*b*c*ts»tt a«2b»c*dt4g »4.0»C* 3d *Sh Number of symbols that an intermediate node has to...Institute of Technology This work was partly supported by the Fundacao para a Ciencia e Tecnologia (Portuguese foundation lor Science and Technology

  9. Stochastic-Strength-Based Damage Simulation Tool for Ceramic Matrix and Polymer Matrix Composite Structures

    NASA Technical Reports Server (NTRS)

    Nemeth, Noel N.; Bednarcyk, Brett A.; Pineda, Evan J.; Walton, Owen J.; Arnold, Steven M.

    2016-01-01

    Stochastic-based, discrete-event progressive damage simulations of ceramic-matrix composite and polymer matrix composite material structures have been enabled through the development of a unique multiscale modeling tool. This effort involves coupling three independently developed software programs: (1) the Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC), (2) the Ceramics Analysis and Reliability Evaluation of Structures Life Prediction Program (CARES/ Life), and (3) the Abaqus finite element analysis (FEA) program. MAC/GMC contributes multiscale modeling capabilities and micromechanics relations to determine stresses and deformations at the microscale of the composite material repeating unit cell (RUC). CARES/Life contributes statistical multiaxial failure criteria that can be applied to the individual brittle-material constituents of the RUC. Abaqus is used at the global scale to model the overall composite structure. An Abaqus user-defined material (UMAT) interface, referred to here as "FEAMAC/CARES," was developed that enables MAC/GMC and CARES/Life to operate seamlessly with the Abaqus FEA code. For each FEAMAC/CARES simulation trial, the stochastic nature of brittle material strength results in random, discrete damage events, which incrementally progress and lead to ultimate structural failure. This report describes the FEAMAC/CARES methodology and discusses examples that illustrate the performance of the tool. A comprehensive example problem, simulating the progressive damage of laminated ceramic matrix composites under various off-axis loading conditions and including a double notched tensile specimen geometry, is described in a separate report.

  10. Plasma Interactions with Spacecraft. Volume 1

    DTIC Science & Technology

    2011-04-15

    64-bit MacOS X environments. N2kScriptRunner, a C++ code that runs a Nascap-2k script outside of the Java user interface, was created. Using...Default Script and Original INIVEL Velocity Initialization ..........................................................15 Figure 6. Potentials at 25 µs...Current (Right Scale) Using Default Script and Modified INIVEL Velocity Initialization ........................................................16

  11. Release of Iron from Hemoglobin

    DTIC Science & Technology

    1993-02-17

    Medical Research and Development Division of Blood Research SGRD-ULY-BRP Command 6C. ADDRESS KCay. State, And ZIP Code) 7b. ADDRESS (Cjry. Stitt, and...17]. 28. D. P. Derman, A. Green, T. H. Bothwell, B. Graham, L. McNamara, A. P. MacPhail and R. D. Baynes . Ann. Clin. Biochem. 26, 144; 1989. 29. W. W

  12. 76 FR 77111 - Standard Instrument Approach Procedures, and Takeoff Minimums and Obstacle Departure Procedures...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-12

    ..., 6500 South MacArthur Blvd., Oklahoma City, OK 73169 or 4. The National Archives and Records... to: http://www.archives.gov/federal_register/code_of_federal_regulations/ibr_locations.html..., Amdt 3D, CANCELLED Fort Hood/Killeen, TX, Robert Gray AAF, RADAR-1, Orig New Market, VA, New Market...

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Chao

    Sparx, a new environment for Cryo-EM image processing; Cryo-EM, Single particle reconstruction, principal component analysis; Hardware Req.: PC, MAC, Supercomputer, Mainframe, Multiplatform, Workstation. Software Req.: operating system is Unix; Compiler C++; type of files: source code, object library, executable modules, compilation instructions; sample problem input data. Location/transmission: http://sparx-em.org; User manual & paper: http://sparx-em.org;

  14. Micromechanics-Based Structural Analysis (FEAMAC) and Multiscale Visualization within Abaqus/CAE Environment

    NASA Technical Reports Server (NTRS)

    Arnold, Steven M.; Bednarcyk, Brett A.; Hussain, Aquila; Katiyar, Vivek

    2010-01-01

    A unified framework is presented that enables coupled multiscale analysis of composite structures and associated graphical pre- and postprocessing within the Abaqus/CAE environment. The recently developed, free, Finite Element Analysis--Micromechanics Analysis Code (FEAMAC) software couples NASA's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) with Abaqus/Standard and Abaqus/Explicit to perform micromechanics based FEA such that the nonlinear composite material response at each integration point is modeled at each increment by MAC/GMC. The Graphical User Interfaces (FEAMAC-Pre and FEAMAC-Post), developed through collaboration between SIMULIA Erie and the NASA Glenn Research Center, enable users to employ a new FEAMAC module within Abaqus/CAE that provides access to the composite microscale. FEA IAC-Pre is used to define and store constituent material properties, set-up and store composite repeating unit cells, and assign composite materials as sections with all data being stored within the CAE database. Likewise FEAMAC-Post enables multiscale field quantity visualization (contour plots, X-Y plots), with point and click access to the microscale i.e., fiber and matrix fields).

  15. MAC/GMC Code Enhanced for Coupled Electromagnetothermoelastic Analysis of Smart Composites

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.; Aboudi, Jacob

    2002-01-01

    Intelligent materials are those that exhibit coupling between their electromagnetic response and their thermomechanical response. This coupling allows smart materials to react mechanically (e.g., an induced displacement) to applied electrical or magnetic fields (for instance). These materials find many important applications in sensors, actuators, and transducers. Recently interest has arisen in the development of smart composites that are formed via the combination of two or more phases, one or more of which is a smart material. To design with and utilize smart composites, designers need theories that predict the coupled smart behavior of these materials from the electromagnetothermoelastic properties of the individual phases. The micromechanics model known as the generalized method of cells (GMC) has recently been extended to provide this important capability. This coupled electromagnetothermoelastic theory has recently been incorporated within NASA Glenn Research Center's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC). This software package is user friendly and has many additional features that render it useful as a design and analysis tool for composite materials in general, and with its new capabilities, for smart composites as well.

  16. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.

    PubMed

    Al-Haj, Ali

    2015-04-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.

  17. Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting.

    PubMed

    You, Minli; Lin, Min; Wang, Shurui; Wang, Xuemin; Zhang, Ge; Hong, Yuan; Dong, Yuqing; Jin, Guorui; Xu, Feng

    2016-05-21

    Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting.

  18. Genomics-Based Security Protocols: From Plaintext to Cipherprotein

    NASA Technical Reports Server (NTRS)

    Shaw, Harry; Hussein, Sayed; Helgert, Hermann

    2011-01-01

    The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.

  19. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOEpatents

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  20. Navier-Stokes analysis of cold scramjet-afterbody flows

    NASA Technical Reports Server (NTRS)

    Baysal, Oktay; Engelund, Walter C.; Eleshaky, Mohamed E.

    1989-01-01

    The progress of two efforts in coding solutions of Navier-Stokes equations is summarized. The first effort concerns a 3-D space marching parabolized Navier-Stokes (PNS) code being modified to compute the supersonic mixing flow through an internal/external expansion nozzle with multicomponent gases. The 3-D PNS equations, coupled with a set of species continuity equations, are solved using an implicit finite difference scheme. The completed work is summarized and includes code modifications for four chemical species, computing the flow upstream of the upper cowl for a theoretical air mixture, developing an initial plane solution for the inner nozzle region, and computing the flow inside the nozzle for both a N2/O2 mixture and a Freon-12/Ar mixture, and plotting density-pressure contours for the inner nozzle region. The second effort concerns a full Navier-Stokes code. The species continuity equations account for the diffusion of multiple gases. This 3-D explicit afterbody code has the ability to use high order numerical integration schemes such as the 4th order MacCormack, and the Gottlieb-MacCormack schemes. Changes to the work are listed and include, but are not limited to: (1) internal/external flow capability; (2) new treatments of the cowl wall boundary conditions and relaxed computations around the cowl region and cowl tip; (3) the entering of the thermodynamic and transport properties of Freon-12, Ar, O, and N; (4) modification to the Baldwin-Lomax turbulence model to account for turbulent eddies generated by cowl walls inside and external to the nozzle; and (5) adopting a relaxation formula to account for the turbulence in the mixing shear layer.

  1. Progressive Failure Analysis of Composite Stiffened Panels

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Yarrington, Phillip W.; Collier, Craig S.; Arnold, Steven M.

    2006-01-01

    A new progressive failure analysis capability for stiffened composite panels has been developed based on the combination of the HyperSizer stiffened panel design/analysis/optimization software with the Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC). MAC/GMC discretizes a composite material s microstructure into a number of subvolumes and solves for the stress and strain state in each while providing the homogenized composite properties as well. As a result, local failure criteria may be employed to predict local subvolume failure and the effects of these local failures on the overall composite response. When combined with HyperSizer, MAC/GMC is employed to represent the ply level composite material response within the laminates that constitute a stiffened panel. The effects of local subvolume failures can then be tracked as loading on the stiffened panel progresses. Sample progressive failure results are presented at both the composite laminate and the composite stiffened panel levels. Deformation and failure model predictions are compared with experimental data from the World Wide Failure Exercise for AS4/3501-6 graphite/epoxy laminates.

  2. Navier-Stokes computation of compressible turbulent flows with a second order closure, part 1

    NASA Technical Reports Server (NTRS)

    Haminh, Hieu; Kollmann, Wolfgang; Vandromme, Dany

    1990-01-01

    A second order closure turbulence model for compressible flows is developed and implemented in a 2D Reynolds-averaged Navier-Stokes solver. From the beginning where a kappa-epsilon turbulence model was implemented in the bidiagonal implicit method of MACCORMACK (referred to as the MAC3 code) to the final stage of implementing a full second order closure in the efficient line Gauss-Seidel algorithm, numerous work was done, individually and collectively. Besides the collaboration itself, the final product of this work is a second order closure derived from the Launder, Reece, and Rodi model to account for near wall effects, which has been called FRAME model, which stands for FRench-AMerican-Effort. During the reporting period, two different problems were worked out. The first was to provide Ames researchers with a reliable compressible boundary layer code including a wide collection of turbulence models for quick testing of new terms, both in two equations and in second order closure (LRR and FRAME). The second topic was to complete the implementation of the FRAME model in the MAC5 code. The work related to these two different contributions is reported. dilatation in presence of stron shocks. This work, which has been conducted during a work at the Center for Turbulence Research with Zeman aimed also to cros-check earlier assumptions by Rubesin and Vandromme.

  3. A Viscoelastic-Plastic Constitutive Model with a Finite Element Solution Methodology

    DTIC Science & Technology

    1978-06-01

    where - r3 K f BT D B dv (4-15) • ,re E,,rae v ’,vp ,vp w F BT dv (4-17)A -vp -Vp 84 ii T In the above, K is the global viscoelastic stiffness matrix anl ...Code C4AA Port Hueneme. CA NAVSE ASYSCOM Code OOC (LT R. MacDougisl). Washington DC NAVSEC Code 6034 1 Library). Washington DC NAVSEC61RLACT PWO. Torni...ESEARCH CO LA HABRA, CA iBROOKSi 0ONCRFE It Il FCH-NoIOGY CORP. TACOMA. ’A At( ANL )ESONi ((tNRAI) ASSOC. Van NuNs CA iA. Luisonit I)RA Vt COR(P I’muitt

  4. "They just come, pick and go." The Acceptability of Integrated Medication Adherence Clubs for HIV and Non Communicable Disease (NCD) Patients in Kibera, Kenya.

    PubMed

    Venables, Emilie; Edwards, Jeffrey K; Baert, Saar; Etienne, William; Khabala, Kelly; Bygrave, Helen

    2016-01-01

    The number of people on antiretroviral therapy (ART) for the long-term management of HIV in low- and middle-income countries (LMICs) is continuing to increase, along with the prevalence of Non-Communicable Diseases (NCDs). The need to provide large volumes of HIV patients with ART has led to significant adaptations in how medication is delivered, but access to NCD care remains limited in many contexts. Medication Adherence Clubs (MACs) were established in Kibera, Kenya to address the large numbers of patients requiring chronic HIV and/or NCD care. Stable NCD and HIV patients can now collect their chronic medication every three months through a club, rather than through individual clinic appointments. We conducted a qualitative research study to assess patient and health-care worker perceptions and experiences of MACs in the urban informal settlement of Kibera, Kenya. A total of 106 patients (with HIV and/or other NCDs) and health-care workers were purposively sampled and included in the study. Ten focus groups and 19 in-depth interviews were conducted and 15 sessions of participant observation were carried out at the clinic where the MACs took place. Thematic data analysis was conducted using NVivo software, and coding focussed on people's experiences of MACs, the challenges they faced and their perceptions about models of care for chronic conditions. MACs were considered acceptable to patients and health-care workers because they saved time, prevented unnecessary queues in the clinic and provided people with health education and group support whilst they collected their medication. Some patients and health-care workers felt that MACs reduced stigma for HIV positive patients by treating HIV as any other chronic condition. Staff and patients reported challenges recruiting patients into MACs, including patients not fully understanding the eligibility criteria for the clubs. There were also some practical challenges during the implementation of the clubs, but MACs have shown that it is possible to learn from ART provision and enable stable HIV and NCD patients to collect chronic medication together in a group. Extending models of care previously only offered to HIV-positive cohorts to NCD patients can help to de-stigmatise HIV, allow for the efficient clinical management of co-morbidities and enable patients to benefit from peer support. Through MACs, we have demonstrated that an integrated approach to providing medication for chronic diseases including HIV can be implemented in resource-poor settings and could thus be rolled out in other similar contexts.

  5. Tree-based solvers for adaptive mesh refinement code FLASH - I: gravity and optical depths

    NASA Astrophysics Data System (ADS)

    Wünsch, R.; Walch, S.; Dinnbier, F.; Whitworth, A.

    2018-04-01

    We describe an OctTree algorithm for the MPI parallel, adaptive mesh refinement code FLASH, which can be used to calculate the gas self-gravity, and also the angle-averaged local optical depth, for treating ambient diffuse radiation. The algorithm communicates to the different processors only those parts of the tree that are needed to perform the tree-walk locally. The advantage of this approach is a relatively low memory requirement, important in particular for the optical depth calculation, which needs to process information from many different directions. This feature also enables a general tree-based radiation transport algorithm that will be described in a subsequent paper, and delivers excellent scaling up to at least 1500 cores. Boundary conditions for gravity can be either isolated or periodic, and they can be specified in each direction independently, using a newly developed generalization of the Ewald method. The gravity calculation can be accelerated with the adaptive block update technique by partially re-using the solution from the previous time-step. Comparison with the FLASH internal multigrid gravity solver shows that tree-based methods provide a competitive alternative, particularly for problems with isolated or mixed boundary conditions. We evaluate several multipole acceptance criteria (MACs) and identify a relatively simple approximate partial error MAC which provides high accuracy at low computational cost. The optical depth estimates are found to agree very well with those of the RADMC-3D radiation transport code, with the tree-solver being much faster. Our algorithm is available in the standard release of the FLASH code in version 4.0 and later.

  6. PyEPL: a cross-platform experiment-programming library.

    PubMed

    Geller, Aaron S; Schlefer, Ian K; Sederberg, Per B; Jacobs, Joshua; Kahana, Michael J

    2007-11-01

    PyEPL (the Python Experiment-Programming Library) is a Python library which allows cross-platform and object-oriented coding of behavioral experiments. It provides functions for displaying text and images onscreen, as well as playing and recording sound, and is capable of rendering 3-D virtual environments forspatial-navigation tasks. It is currently tested for Mac OS X and Linux. It interfaces with Activewire USB cards (on Mac OS X) and the parallel port (on Linux) for synchronization of experimental events with physiological recordings. In this article, we first present two sample programs which illustrate core PyEPL features. The examples demonstrate visual stimulus presentation, keyboard input, and simulation and exploration of a simple 3-D environment. We then describe the components and strategies used in implementing PyEPL.

  7. PyEPL: A cross-platform experiment-programming library

    PubMed Central

    Geller, Aaron S.; Schleifer, Ian K.; Sederberg, Per B.; Jacobs, Joshua; Kahana, Michael J.

    2009-01-01

    PyEPL (the Python Experiment-Programming Library) is a Python library which allows cross-platform and object-oriented coding of behavioral experiments. It provides functions for displaying text and images onscreen, as well as playing and recording sound, and is capable of rendering 3-D virtual environments for spatial-navigation tasks. It is currently tested for Mac OS X and Linux. It interfaces with Activewire USB cards (on Mac OS X) and the parallel port (on Linux) for synchronization of experimental events with physiological recordings. In this article, we first present two sample programs which illustrate core PyEPL features. The examples demonstrate visual stimulus presentation, keyboard input, and simulation and exploration of a simple 3-D environment. We then describe the components and strategies used in implementing PyEPL. PMID:18183912

  8. A comparison between implicit and hybrid methods for the calculation of steady and unsteady inlet flows

    NASA Technical Reports Server (NTRS)

    Coakley, T. J.; Hsieh, T.

    1985-01-01

    Numerical simulation of steady and unsteady transonic diffuser flows using two different computer codes are discussed and compared with experimental data. The codes solve the Reynolds-averaged, compressible, Navier-Stokes equations using various turbulence models. One of the codes has been applied extensively to diffuser flows and uses the hybrid method of MacCormack. This code is relatively inefficient numerically. The second code, which was developed more recently, is fully implicit and is relatively efficient numerically. Simulations of steady flows using the implicit code are shown to be in good agreement with simulations using the hybrid code. Both simulations are in good agreement with experimental results. Simulations of unsteady flows using the two codes are in good qualitative agreement with each other, although the quantitative agreement is not as good as in the steady flow cases. The implicit code is shown to be eight times faster than the hybrid code for unsteady flow calculations and up to 32 times faster for steady flow calculations. Results of calculations using alternative turbulence models are also discussed.

  9. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  10. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  11. Cell Line Data Base: structure and recent improvements towards molecular authentication of human cell lines

    PubMed Central

    Romano, Paolo; Manniello, Assunta; Aresu, Ottavia; Armento, Massimiliano; Cesaro, Michela; Parodi, Barbara

    2009-01-01

    The Cell Line Data Base (CLDB) is a well-known reference information source on human and animal cell lines including information on more than 6000 cell lines. Main biological features are coded according to controlled vocabularies derived from international lists and taxonomies. HyperCLDB (http://bioinformatics.istge.it/hypercldb/) is a hypertext version of CLDB that improves data accessibility by also allowing information retrieval through web spiders. Access to HyperCLDB is provided through indexes of biological characteristics and navigation in the hypertext is granted by many internal links. HyperCLDB also includes links to external resources. Recently, an interest was raised for a reference nomenclature for cell lines and CLDB was seen as an authoritative system. Furthermore, to overcome the cell line misidentification problem, molecular authentication methods, such as fingerprinting, single-locus short tandem repeat (STR) profile and single nucleotide polymorphisms validation, were proposed. Since this data is distributed, a reference portal on authentication of human cell lines is needed. We present here the architecture and contents of CLDB, its recent enhancements and perspectives. We also present a new related database, the Cell Line Integrated Molecular Authentication (CLIMA) database (http://bioinformatics.istge.it/clima/), that allows to link authentication data to actual cell lines. PMID:18927105

  12. Cell Line Data Base: structure and recent improvements towards molecular authentication of human cell lines.

    PubMed

    Romano, Paolo; Manniello, Assunta; Aresu, Ottavia; Armento, Massimiliano; Cesaro, Michela; Parodi, Barbara

    2009-01-01

    The Cell Line Data Base (CLDB) is a well-known reference information source on human and animal cell lines including information on more than 6000 cell lines. Main biological features are coded according to controlled vocabularies derived from international lists and taxonomies. HyperCLDB (http://bioinformatics.istge.it/hypercldb/) is a hypertext version of CLDB that improves data accessibility by also allowing information retrieval through web spiders. Access to HyperCLDB is provided through indexes of biological characteristics and navigation in the hypertext is granted by many internal links. HyperCLDB also includes links to external resources. Recently, an interest was raised for a reference nomenclature for cell lines and CLDB was seen as an authoritative system. Furthermore, to overcome the cell line misidentification problem, molecular authentication methods, such as fingerprinting, single-locus short tandem repeat (STR) profile and single nucleotide polymorphisms validation, were proposed. Since this data is distributed, a reference portal on authentication of human cell lines is needed. We present here the architecture and contents of CLDB, its recent enhancements and perspectives. We also present a new related database, the Cell Line Integrated Molecular Authentication (CLIMA) database (http://bioinformatics.istge.it/clima/), that allows to link authentication data to actual cell lines.

  13. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    PubMed Central

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. PMID:22163983

  14. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    PubMed

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  15. Multimodal biometric digital watermarking on immigrant visas for homeland security

    NASA Astrophysics Data System (ADS)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  16. Low-Power Embedded DSP Core for Communication Systems

    NASA Astrophysics Data System (ADS)

    Tsao, Ya-Lan; Chen, Wei-Hao; Tan, Ming Hsuan; Lin, Maw-Ching; Jou, Shyh-Jye

    2003-12-01

    This paper proposes a parameterized digital signal processor (DSP) core for an embedded digital signal processing system designed to achieve demodulation/synchronization with better performance and flexibility. The features of this DSP core include parameterized data path, dual MAC unit, subword MAC, and optional function-specific blocks for accelerating communication system modulation operations. This DSP core also has a low-power structure, which includes the gray-code addressing mode, pipeline sharing, and advanced hardware looping. Users can select the parameters and special functional blocks based on the character of their applications and then generating a DSP core. The DSP core has been implemented via a cell-based design method using a synthesizable Verilog code with TSMC 0.35[InlineEquation not available: see fulltext.]m SPQM and 0.25[InlineEquation not available: see fulltext.]m 1P5M library. The equivalent gate count of the core area without memory is approximately 50 k. Moreover, the maximum operating frequency of a[InlineEquation not available: see fulltext.] version is 100 MHz (0.35[InlineEquation not available: see fulltext.]m) and 140 MHz (0.25[InlineEquation not available: see fulltext.]m).

  17. 49 CFR 41.119 - DOT regulated buildings.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... compliance may include the engineer's and architect's authenticated verification of seismic design codes... and additions to existing buildings will ensure that each DOT regulated building is designed and constructed in accord with seismic design and construction standards as provided by this part. (b) This...

  18. Protocols development for security and privacy of radio frequency identification systems

    NASA Astrophysics Data System (ADS)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  19. A multimodal biometric authentication system based on 2D and 3D palmprint features

    NASA Astrophysics Data System (ADS)

    Aggithaya, Vivek K.; Zhang, David; Luo, Nan

    2008-03-01

    This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. Here, we aim to improve the accuracy and robustness of existing palmprint authentication systems using 3D palmprint features. The proposed system uses an active stereo technique, structured light, to capture 3D image or range data of the palm and a registered intensity image simultaneously. The surface curvature based method is employed to extract features from 3D palmprint and Gabor feature based competitive coding scheme is used for 2D representation. We individually analyze these representations and attempt to combine them with score level fusion technique. Our experiments on a database of 108 subjects achieve significant improvement in performance (Equal Error Rate) with the integration of 3D features as compared to the case when 2D palmprint features alone are employed.

  20. Optimised to Fail: Card Readers for Online Banking

    NASA Astrophysics Data System (ADS)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  1. Markovian Monte Carlo program EvolFMC v.2 for solving QCD evolution equations

    NASA Astrophysics Data System (ADS)

    Jadach, S.; Płaczek, W.; Skrzypek, M.; Stokłosa, P.

    2010-02-01

    We present the program EvolFMC v.2 that solves the evolution equations in QCD for the parton momentum distributions by means of the Monte Carlo technique based on the Markovian process. The program solves the DGLAP-type evolution as well as modified-DGLAP ones. In both cases the evolution can be performed in the LO or NLO approximation. The quarks are treated as massless. The overall technical precision of the code has been established at 5×10. This way, for the first time ever, we demonstrate that with the Monte Carlo method one can solve the evolution equations with precision comparable to the other numerical methods. New version program summaryProgram title: EvolFMC v.2 Catalogue identifier: AEFN_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEFN_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including binary test data, etc.: 66 456 (7407 lines of C++ code) No. of bytes in distributed program, including test data, etc.: 412 752 Distribution format: tar.gz Programming language: C++ Computer: PC, Mac Operating system: Linux, Mac OS X RAM: Less than 256 MB Classification: 11.5 External routines: ROOT ( http://root.cern.ch/drupal/) Nature of problem: Solution of the QCD evolution equations for the parton momentum distributions of the DGLAP- and modified-DGLAP-type in the LO and NLO approximations. Solution method: Monte Carlo simulation of the Markovian process of a multiple emission of partons. Restrictions:Limited to the case of massless partons. Implemented in the LO and NLO approximations only. Weighted events only. Unusual features: Modified-DGLAP evolutions included up to the NLO level. Additional comments: Technical precision established at 5×10. Running time: For the 10 6 events at 100 GeV: DGLAP NLO: 27s; C-type modified DGLAP NLO: 150s (MacBook Pro with Mac OS X v.10.5.5, 2.4 GHz Intel Core 2 Duo, gcc 4.2.4, single thread).

  2. Sensor Authentication: Embedded Processor Code

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Svoboda, John

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048 point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking

  3. Examining the relationship between comprehension and production processes in code-switched language

    PubMed Central

    Guzzardo Tamargo, Rosa E.; Valdés Kroff, Jorge R.; Dussias, Paola E.

    2016-01-01

    We employ code-switching (the alternation of two languages in bilingual communication) to test the hypothesis, derived from experience-based models of processing (e.g., Boland, Tanenhaus, Carlson, & Garnsey, 1989; Gennari & MacDonald, 2009), that bilinguals are sensitive to the combinatorial distributional patterns derived from production and that they use this information to guide processing during the comprehension of code-switched sentences. An analysis of spontaneous bilingual speech confirmed the existence of production asymmetries involving two auxiliary + participle phrases in Spanish–English code-switches. A subsequent eye-tracking study with two groups of bilingual code-switchers examined the consequences of the differences in distributional patterns found in the corpus study for comprehension. Participants’ comprehension costs mirrored the production patterns found in the corpus study. Findings are discussed in terms of the constraints that may be responsible for the distributional patterns in code-switching production and are situated within recent proposals of the links between production and comprehension. PMID:28670049

  4. Examining the relationship between comprehension and production processes in code-switched language.

    PubMed

    Guzzardo Tamargo, Rosa E; Valdés Kroff, Jorge R; Dussias, Paola E

    2016-08-01

    We employ code-switching (the alternation of two languages in bilingual communication) to test the hypothesis, derived from experience-based models of processing (e.g., Boland, Tanenhaus, Carlson, & Garnsey, 1989; Gennari & MacDonald, 2009), that bilinguals are sensitive to the combinatorial distributional patterns derived from production and that they use this information to guide processing during the comprehension of code-switched sentences. An analysis of spontaneous bilingual speech confirmed the existence of production asymmetries involving two auxiliary + participle phrases in Spanish-English code-switches. A subsequent eye-tracking study with two groups of bilingual code-switchers examined the consequences of the differences in distributional patterns found in the corpus study for comprehension. Participants' comprehension costs mirrored the production patterns found in the corpus study. Findings are discussed in terms of the constraints that may be responsible for the distributional patterns in code-switching production and are situated within recent proposals of the links between production and comprehension.

  5. Time accurate application of the MacCormack 2-4 scheme on massively parallel computers

    NASA Technical Reports Server (NTRS)

    Hudson, Dale A.; Long, Lyle N.

    1995-01-01

    Many recent computational efforts in turbulence and acoustics research have used higher order numerical algorithms. One popular method has been the explicit MacCormack 2-4 scheme. The MacCormack 2-4 scheme is second order accurate in time and fourth order accurate in space, and is stable for CFL's below 2/3. Current research has shown that the method can give accurate results but does exhibit significant Gibbs phenomena at sharp discontinuities. The impact of adding Jameson type second, third, and fourth order artificial viscosity was examined here. Category 2 problems, the nonlinear traveling wave and the Riemann problem, were computed using a CFL number of 0.25. This research has found that dispersion errors can be significantly reduced or nearly eliminated by using a combination of second and third order terms in the damping. Use of second and fourth order terms reduced the magnitude of dispersion errors but not as effectively as the second and third order combination. The program was coded using Thinking Machine's CM Fortran, a variant of Fortran 90/High Performance Fortran, and was executed on a 2K CM-200. Simple extrapolation boundary conditions were used for both problems.

  6. Combining Cryptography with EEG Biometrics

    PubMed Central

    Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  7. Combining Cryptography with EEG Biometrics.

    PubMed

    Damaševičius, Robertas; Maskeliūnas, Rytis; Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  8. Evaluation of neutron capture cross section on 205Pb with photonuclear data

    NASA Astrophysics Data System (ADS)

    Iwamoto, Nobuyuki; Shizuma, Toshiyuki

    2018-05-01

    The neutron capture cross section of long-lived radioactive 205Pb is derived by using the nuclear reaction calculation code CCONE, based on photonuclear data. The present result is smaller than that of TENDL-2015 by a factor of 4. The derived Maxwellian averaged capture cross section (MACS) is the smallest compared to the existing data. The produced amount of 205Pb is explored with a simulated neutron flux in the Pb-Bi eutectic (LBE) target. The continuous use of the system in 25 years creates 205Pb with about 6 kg at maximum in the LBE (including natural Pb of 103 kg). The impact of the derived MACS on the stellar nucleosynthesis is investigated. It is found that the abundance of Tl is slightly enhanced due to the increase in the remaining abundance of 205Pb.

  9. Perception of the Auditory-Visual Illusion in Speech Perception by Children with Phonological Disorders

    ERIC Educational Resources Information Center

    Dodd, Barbara; McIntosh, Beth; Erdener, Dogu; Burnham, Denis

    2008-01-01

    An example of the auditory-visual illusion in speech perception, first described by McGurk and MacDonald, is the perception of [ta] when listeners hear [pa] in synchrony with the lip movements for [ka]. One account of the illusion is that lip-read and heard speech are combined in an articulatory code since people who mispronounce words respond…

  10. Resilient Diffusive Clouds

    DTIC Science & Technology

    2017-02-01

    scale blade servers (Dell PowerEdge) [20]. It must be recognized however, that the findings are distributed over this collection of architectures not...current operating system designs run into millions of lines of code. Moreover, they compound the opportunity for compromise by granting device drivers...properties (e.g. IP & MAC address) so as to invalidate an adversary’s surveillance data. The current running and bootstrapping instances of the micro

  11. Molecular Identification of the Schwannomatosis Locus

    DTIC Science & Technology

    2004-07-01

    AD Award Number: DAMD17-03-1-0445 TITLE: Molecular Identification of the Schwannomatosis Locus PRINCIPAL INVESTIGATOR: Mia M. MacCollin, M.D...COVERED (Leave blank) July 2004 Annual (1 Jul 2003 - 30 Jun 2004) 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Molecular Identification of the Schwannomatosis ...DISTRIBUTION CODE Approved for Public Release; Distribution Unlimited 13. ABSTRACT (Maximum 200 Words) Background: Schwannomatosis is a recently recognized

  12. 49 CFR 41.117 - Buildings built with Federal assistance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... architect's authenticated verifications of seismic design codes, standards, and practices used in the design... financial assistance, after July 14, 1993 must be designed and constructed in accord with seismic standards... of compliance with the seismic design and construction requirements of this part is required prior to...

  13. Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study

    PubMed Central

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David

    2016-01-01

    Objectives To identify the authentication and detection rate of serialised medicines using medicines authentication technology. Design and intervention 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. Setting A site within a large UK National Health Service teaching hospital trust. Participants Accredited checking staff, pharmacists and dispensers in a pharmacy department. Primary outcome measures Authentication and detection rate of counterfeit expired and recalled medicines. Results The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. Conclusions TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. PMID:27940634

  14. MACSIGMA0 - MACINTOSH TOOL FOR ANALYZING JPL AIRSAR, ERS-1, JERS-1, AND MAGELLAN MIDR DATA

    NASA Technical Reports Server (NTRS)

    Norikane, L.

    1994-01-01

    MacSigma0 is an interactive tool for the Macintosh which allows you to display and make computations from radar data collected by the following sensors: the JPL AIRSAR, ERS-1, JERS-1, and Magellan. The JPL AIRSAR system is a multi-polarimetric airborne synthetic aperture radar developed and operated by the Jet Propulsion Laboratory. It includes the single-frequency L-band sensor mounted on the NASA CV990 aircraft and its replacement, the multi-frequency P-, L-, and C-band sensors mounted on the NASA DC-8. MacSigma0 works with data in the standard JPL AIRSAR output product format, the compressed Stokes matrix format. ERS-1 and JERS-1 are single-frequency, single-polarization spaceborne synthetic aperture radars launched by the European Space Agency and NASDA respectively. To be usable by MacSigma0, The data must have been processed at the Alaska SAR Facility and must be in the "low-resolution" format. Magellan is a spacecraft mission to map the surface of Venus with imaging radar. The project is managed by the Jet Propulsion Laboratory. The spacecraft carries a single-frequency, single-polarization synthetic aperture radar. MacSigma0 works with framelets of the standard MIDR CD-ROM data products. MacSigma0 provides four basic functions: synthesis of images (if necessary), statistical analysis of selected areas, analysis of corner reflectors as a calibration measure (if appropriate and possible), and informative mouse tracking. For instance, the JPL AIRSAR data can be used to synthesize a variety of images such as a total power image. The total power image displays the sum of the polarized and unpolarized components of the backscatter for each pixel. Other images which can be synthesized are HH, HV, VV, RL, RR, HHVV*, HHHV*, HVVV*, HHVV* phase and correlation coefficient images. For the complex and phase images, phase is displayed using color and magnitude is displayed using intensity. MacSigma0 can also be used to compute statistics from within a selected area. The statistics computed depend on the image type. For JPL AIRSAR data, the HH, HV, VV, HHVV* phase, and correlation coefficient means and standard deviation measures are calculated. The mean, relative standard deviation, minimum, and maximum values are calculated for all other data types. A histogram of the selected area is also calculated and displayed. The selected area can be rectangular, linear, or polygonal in shape. The user is allowed to select multiple rectangular areas, but not multiple linear or polygonal areas. The statistics and histogram are displayed to the user and can either be printed or saved as a text file. MacSigma0 can also be used to analyze corner reflectors as a measure of the calibration for JPL AIRSAR, ERS-1, and JERS-1 data types. It computes a theoretical radar cross section and the actual radar cross section for a selected trihedral corner reflector. The theoretical cross section, measured cross section, their ratio in dBs, and other information are displayed to the user and can be saved into a text file. For ERS-1, JERS-1, and Magellan data, MacSigma0 simultaneously displays pixel location in data coordinates and in latitude, longitude coordinates. It also displays sigma0, the incidence angle (for Magellan data), the original pixel value (for Magellan data), and the noise power value (for ERS-1 and JERS-1 data). Grey scale computed images can be saved in a byte format (a headerless format which saves the image as a string of byte values) or a PICT format (a standard format readable by other image processing programs for the Macintosh). Images can also be printed. MacSigma0 is written in C-language for use on Macintosh series computers. The minimum configuration requirements for MacSigma0 are System 6.0, Finder 6.1, 1Mb of RAM, and at least a 4-bit color or grey-scale graphics display. MacSigma0 is also System 7 compatible. To compile the source code, Apple's Macintosh Programmers Workbench (MPW) 3.2 and the MPW C language compiler version 3.2 are required. The source code will not compile with a later version of the compiler; however, the compiled application which will run under the minimum hardware configuration is provided on the distribution medium. In addition, the distribution media includes an executable which runs significantly faster but requires a 68881 compatible math coprocessor and a 68020 compatible CPU. Since JPL AIRSAR data files can be very large, it is often desirable to reduce the size of a data file before transferring it to the Macintosh for use in MacSigma0. A small FORTRAN program which can be used for this purpose is included on the distribution media. MacSigma0 will print statistics on any output device which supports QuickDraw, and it will print images on any device which supports QuickDraw or PostScript. The standard distribution medium for MacSigma0 is a set of five 1.4Mb Macintosh format diskettes. This program was developed in 1992 and is a copyrighted work with all copyright vested in NASA. Version 4.2 of MacSigma0 was released in 1993.

  15. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    NASA Astrophysics Data System (ADS)

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-11-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  16. A generalized architecture of quantum secure direct communication for N disjointed users with authentication.

    PubMed

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A

    2015-11-18

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  17. Codes and morals: is there a missing link? (The Nuremberg Code revisited).

    PubMed

    Hick, C

    1998-01-01

    Codes are a well known and popular but weak form of ethical regulation in medical practice. There is, however, a lack of research on the relations between moral judgments and ethical Codes, or on the possibility of morally justifying these Codes. Our analysis begins by showing, given the Nuremberg Code, how a typical reference to natural law has historically served as moral justification. We then indicate, following the analyses of H. T. Engelhardt, Jr., and A. MacIntyre, why such general moral justifications of codes must necessarily fail in a society of "moral strangers." Going beyond Engelhardt we argue, that after the genealogical suspicion in morals raised by Nietzsche, not even Engelhardt's "principle of permission" can be rationally justified in a strong sense--a problem of transcendental argumentation in morals already realized by I. Kant. Therefore, we propose to abandon the project of providing general justifications for moral judgements and to replace it with a hermeneutical analysis of ethical meanings in real-world situations, starting with the archetypal ethical situation, the encounter with the Other (E. Levinas).

  18. 49 CFR 41.115 - New buildings to be leased for DOT occupancy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... compliance may include the engineer's and architect's authenticated verifications of seismic design codes... design and construction of new buildings to be leased for DOT occupancy or use will ensure that each building is designed and constructed in accord with the seismic design and construction standards set out...

  19. 49 CFR 41.115 - New buildings to be leased for DOT occupancy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... compliance may include the engineer's and architect's authenticated verifications of seismic design codes... design and construction of new buildings to be leased for DOT occupancy or use will ensure that each building is designed and constructed in accord with the seismic design and construction standards set out...

  20. Semicommunication and Accommodation: Observations from the Linguistic Situation in Scandinavia.

    ERIC Educational Resources Information Center

    Braunmuller, Kurt

    2002-01-01

    Focuses on semicommunication and accommodation and discusses two longer extracts from a large corpus of authentic communication from Scandinavia. Various aspects of a comprehensive model of semicommunication are presented and discussed, showing code switching and accommodation are not considered antagonistic but rather as scalar phenomena covering…

  1. Digital Image Correlation Engine

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turner, Dan; Crozier, Paul; Reu, Phil

    DICe is an open source digital image correlation (DIC) tool intended for use as a module in an external application or as a standalone analysis code. It's primary capability is computing full-field displacements and strains from sequences of digital These images are typically of a material sample undergoing a materials characterization experiment, but DICe is also useful for other applications (for example, trajectory tracking). DICe is machine portable (Windows, Linux and Mac) and can be effectively deployed on a high performance computing platform. Capabilities from DICe can be invoked through a library interface, via source code integration of DICe classesmore » or through a graphical user interface.« less

  2. Transmission and storage of medical images with patient information.

    PubMed

    Acharya U, Rajendra; Subbanna Bhat, P; Kumar, Sathish; Min, Lim Choo

    2003-07-01

    Digital watermarking is a technique of hiding specific identification data for copyright authentication. This technique is adapted here for interleaving patient information with medical images, to reduce storage and transmission overheads. The text data is encrypted before interleaving with images to ensure greater security. The graphical signals are interleaved with the image. Two types of error control-coding techniques are proposed to enhance reliability of transmission and storage of medical images interleaved with patient information. Transmission and storage scenarios are simulated with and without error control coding and a qualitative as well as quantitative interpretation of the reliability enhancement resulting from the use of various commonly used error control codes such as repetitive, and (7,4) Hamming code is provided.

  3. VizieR Online Data Catalog: RefleX : X-ray-tracing code (Paltani+, 2017)

    NASA Astrophysics Data System (ADS)

    Paltani, S.; Ricci, C.

    2017-11-01

    We provide here the RefleX executable, for both Linux and MacOSX, together with the User Manual and example script file and output file Running (for instance): reflex_linux will produce the file reflex.out Note that the results may differ slightly depending on the OS, because of slight differences in some implementations numerical computations. The difference are scientifically meaningless. (5 data files).

  4. Computation and Validation of the Dynamic Response Index (DRI)

    DTIC Science & Technology

    2013-08-06

    matplotlib plotting library. • Executed from command line. • Allows several optional arguments. • Runs on Windows, Linux, UNIX, and Mac OS X. 10... vs . Time: Triangular pulse input data with given time duration and peak acceleration: Time (s) EARTH Code: Motivation • Error Assessment of...public release • ARC provided electrothermal battery model example: • Test vs . simulation data for terminal voltage. • EARTH input parameters

  5. Modifications to MacCormack’s 2-D Navier-Stokes Compression Ramp Code for Application to Flows with Axes of Symmetry and Wall Mass Transfer

    DTIC Science & Technology

    1981-01-01

    in two dimensions have been studied experimentally by Gray and Rhudy (Ref. 3) and theoretically by Bloy and Georgeff (Ref. 4) and Carter (Ref. 5...Layer Separation at Supersonic and Hypersonic Speeds." AEDC-TR-70-235, March 1971. 4. Bloy , A. W. and Georgeff, M. P. "The Hypersonic Laminar

  6. Quality Assurance System. Volume 1. Report (Technology Transfer Program)

    DTIC Science & Technology

    1980-03-03

    WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Surface Warfare Center CD Code 2230 - Design Integration Tools Building...192 Room 128-9500 MacArthur Blvd Bethesda, MD 20817-5700 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS...presented herein. TABLE OF CONTENTS VOLUME I - FINDINGS AND CONCLUSIONS SECTION PARAGRAPH TITLE 1 INTRODUCTION 1.1 Purpose and Scope 1.2 Organization of

  7. DNA fingerprinting of Chinese melon provides evidentiary support of seed quality appraisal.

    PubMed

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications.

  8. DNA Fingerprinting of Chinese Melon Provides Evidentiary Support of Seed Quality Appraisal

    PubMed Central

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications. PMID:23285039

  9. Application of the implicit MacCormack scheme to the PNS equations

    NASA Technical Reports Server (NTRS)

    Lawrence, S. L.; Tannehill, J. C.; Chaussee, D. S.

    1983-01-01

    The two-dimensional parabolized Navier-Stokes equations are solved using MacCormack's (1981) implicit finite-difference scheme. It is shown that this method for solving the parabolized Navier-Stokes equations does not require the inversion of block tridiagonal systems of algebraic equations and allows the original explicit scheme to be employed in those regions where implicit treatment is not needed. The finite-difference algorithm is discussed and the computational results for two laminar test cases are presented. Results obtained using this method for the case of a flat plate boundary layer are compared with those obtained using the conventional Beam-Warming scheme, as well as those obtained from a boundary layer code. The computed results for a more severe test of the method, the hypersonic flow past a 15 deg compression corner, are found to compare favorably with experiment and a numerical solution of the complete Navier-Stokes equations.

  10. A New Local Failure Model with Application to the Longitudinal Tensile Behavior of Continuously Reinforced Titanium Composites

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2000-01-01

    A new model for local fiber failures in composite materials loaded longitudinally is presented. In developing the model, the goal was to account for the effects of fiber breakage on the global response of a composite in a relatively simple and efficient manner. Towards this end, the model includes the important feature of local stress unloading, even as global loading of the composite continues. The model has been incorporated into NASA Glenn's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) and was employed to simulate the longitudinal tensile deformation and failure behavior of several silicon carbide fiber/titanium matrix (SiC/Ti) composites. The model is shown to be quite realistic and capable of accurate predictions for various temperatures, fiber volume fractions, and fiber diameters. Further- more, the new model compares favorably to Curtin's (1993) effective fiber breakage model, which has also been incorporated into MAC/GMC.

  11. Assessing young children's intention-reading in authentic communicative contexts: preliminary evidence and clinical utility.

    PubMed

    Greenslade, Kathryn J; Coggins, Truman E

    2014-01-01

    Identifying what a communication partner is looking at (referential intention) and why (social intention) is essential to successful social communication, and may be challenging for children with social communication deficits. This study explores a clinical task that assesses these intention-reading abilities within an authentic context. To gather evidence of the task's reliability and validity, and to discuss its clinical utility. The intention-reading task was administered to twenty 4-7-year-olds with typical development (TD) and ten with autism spectrum disorder (ASD). Task items were embedded in an authentic activity, and they targeted the child's ability to identify the examiner's referential and social intentions, which were communicated through joint attention behaviours. Reliability and construct validity evidence were addressed using established psychometric methods. Reliability and validity evidence supported the use of task scores for identifying children whose intention-reading warranted concern. Evidence supported the reliability of task administration and coding, and item-level codes were highly consistent with overall task performance. Supporting task validity, group differences aligned with predictions, with children with ASD exhibiting poorer and more variable task scores than children with TD. Also, as predicted, task scores correlated significantly with verbal mental age and ratings of parental concerns regarding social communication abilities. The evidence provides preliminary support for the reliability and validity of the clinical task's scores in assessing young children's real-time intention-reading abilities, which are essential for successful interactions in school and beyond. © 2014 Royal College of Speech and Language Therapists.

  12. Effect of cataract surgery and pupil dilation on iris pattern recognition for personal authentication.

    PubMed

    Dhir, L; Habib, N E; Monro, D M; Rakshit, S

    2010-06-01

    The purpose of this study was to investigate the effect of cataract surgery and pupil dilation on iris pattern recognition for personal authentication. Prospective non-comparative cohort study. Images of 15 subjects were captured before (enrolment), and 5, 10, and 15 min after instillation of mydriatics before routine cataract surgery. After cataract surgery, images were captured 2 weeks thereafter. Enrolled and test images (after pupillary dilation and after cataract surgery) were segmented to extract the iris. This was then unwrapped onto a rectangular format for normalization and a novel method using the Discrete Cosine Transform was applied to encode the image into binary bits. The numerical difference between two iris codes (Hamming distance, HD) was calculated. The HD between identification and enrolment codes was used as a score and was compared with a confidence threshold for specific equipment, giving a match or non-match result. The Correct Recognition Rate (CRR) and Equal Error Rates (EERs) were calculated to analyse overall system performance. After cataract surgery, perfect identification and verification was achieved, with zero false acceptance rate, zero false rejection rate, and zero EER. After pupillary dilation, non-elastic deformation occurs and a CRR of 86.67% and EER of 9.33% were obtained. Conventional circle-based localization methods are inadequate. Matching reliability decreases considerably with increase in pupillary dilation. Cataract surgery has no effect on iris pattern recognition, whereas pupil dilation may be used to defeat an iris-based authentication system.

  13. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter.

    PubMed

    Modali, Sita D; Zgurskaya, Helen I

    2011-08-01

    Escherichia coli MacAB-TolC is a tripartite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. © 2011 Blackwell Publishing Ltd.

  14. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter

    PubMed Central

    Modali, Sita D.; Zgurskaya, Helen I.

    2011-01-01

    Escherichia coli MacAB-TolC is a tri-partite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. PMID:21696464

  15. Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes

    NASA Astrophysics Data System (ADS)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana

    2013-03-01

    The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.

  16. Cryptography Would Reveal Alterations In Photographs

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L.

    1995-01-01

    Public-key decryption method proposed to guarantee authenticity of photographic images represented in form of digital files. In method, digital camera generates original data from image in standard public format; also produces coded signature to verify standard-format image data. Scheme also helps protect against other forms of lying, such as attaching false captions.

  17. Research Ethics and Ethical Research: Some Observations from the Global South

    ERIC Educational Resources Information Center

    Zhang, J. J.

    2017-01-01

    This paper aims to achieve two objectives. Firstly, it elicits some of the concerns for universal research ethics. It is argued that ethical codes are never universal; they are geographically sensitive. As such, it is important to "develop authentic individual responses to potentially unique circumstances". Secondly, in going beyond a…

  18. 49 CFR 41.110 - New DOT owned buildings and additions to buildings.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... architect's authenticated verifications of seismic design codes, standards, and practices used in the design... for the design and construction of new DOT Federally owned buildings will ensure that each building is designed and constructed in accord with the seismic design and construction standards set out in § 41.120...

  19. Does Multimedia Support Individual Differences?--EFL Learners' Listening Comprehension and Cognitive Load

    ERIC Educational Resources Information Center

    Yang, Hui-Yu

    2014-01-01

    The present study examines how display model, English proficiency and cognitive preference affect English as a Foreign Language (EFL) learners' listening comprehension of authentic videos and cognitive load degree. EFL learners were randomly assigned to one of two groups. The control group received single coding and the experimental group received…

  20. The influence of authentic scientific research experiences on teachers' conceptions of the nature of science (NOS) and their NOS teaching practices

    NASA Astrophysics Data System (ADS)

    Moriarty, Meghan A.

    This study explored the influence of teachers' authentic scientific research experiences (ASREs) on teachers' conceptions of the nature of science (NOS) and teachers' NOS instruction. Twelve high school biology teachers participated in this study. Six of the participants had authentic scientific research experience (ASRE) and six had not participated in authentic scientific research. Data included background surveys, modified Views of the Nature of Science (VNOS) questionnaires, interviews, and teaching observations. Data was coded based on the eight NOS understandings outlined in 2013 in the Next Generation Science Standards (NGSS). Evidence from this study indicates participating in authentic scientific research as a member of a scientific community has dual benefits of enabling high school science teachers with informed understandings of the NOS and positioning them to teach with the NOS. However, these benefits do not always result from an ASRE. If the nature of the ASRE is limited, then it may limit teachers' NOS understandings and their NOS teaching practices. The results of this study suggest that participation in ASREs may be one way to improve teachers' NOS understandings and teaching practices if the experiences themselves offer a comprehensive view of the NOS. Because ASREs and other science learning experiences do not always offer such experiences, pre-service teacher education and professional development opportunities may engage science teachers in two ways: (1) becoming part of a scientific community may enable them to teach with NOS and (2) being reflective about what being a scientist means may improve teachers' NOS understandings and better position them to teach about NOS.. Keywords: nature of science, authentic scientific research experiences, Next Generation Science Standards, teaching about NOS, teaching with NOS.

  1. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol outperformed the wired counterparts and several other wireless architectures proposed in literature in terms of bandwidth and packet energy dissipation. Significant gains were observed in packet energy dissipation and bandwidth even with scaling the system to higher number of cores. Non-uniform traffic simulations showed that the proposed CDMA-WiNoC was consistent in bandwidth across all traffic patterns. It is also shown that the CDMA based MAC scheme does not introduce additional reliability concerns in data transfer over the on-chip wireless interconnects.

  2. A Scalable and Dynamic Testbed for Conducting Penetration-Test Training in a Laboratory Environment

    DTIC Science & Technology

    2015-03-01

    entry point through which to execute a payload to accomplish a higher-level goal: executing arbitrary code, escalating privileges , pivoting...Mobile Ad Hoc Network Emulator (EMANE)26 can emulate the entire network stack (physical to application -layer protocols). 2. Methodology To build a...to host Windows, Linux, MacOS, Android , and other operating systems without much effort. 4 E. A simple and automatic “restore” function: Many

  3. The Operational Commander’s Role in Planning and Executing a Successful Campaign

    DTIC Science & Technology

    1992-04-20

    44 IS. PRICE CODE RIDGWAY IN KOREAN WAR AS CDR 8th ARMY ________ It. SECURITY CLASSIFICATION 10. SECURITY CLASSIFICATION 13. SECURITY CLASSIFICATION...Field-Marshal Slim as the 14th Army commander in Burma; General MacArthur in the World War II Cartwheel Operation and General Ridgway as the 8th Army...64 :. Introduction In his book, Command in War , Martin Van Creveld referred to the period of strategic

  4. Studying Spacecraft Charging via Numerical Simulations

    NASA Astrophysics Data System (ADS)

    Delzanno, G. L.; Moulton, D.; Meierbachtol, C.; Svyatskiy, D.; Vernon, L.

    2015-12-01

    The electrical charging of spacecraft due to bombarding charged particles can affect their performance and operation. We study this charging using CPIC; a particle-in-cell code specifically designed for studying plasma-material interactions [1]. CPIC is based on multi-block curvilinear meshes, resulting in near-optimal computational performance while maintaining geometric accuracy. Relevant plasma parameters are imported from the SHIELDS framework (currently under development at LANL), which simulates geomagnetic storms and substorms in the Earth's magnetosphere. Simulated spacecraft charging results of representative Van Allen Probe geometries using these plasma parameters will be presented, along with an overview of the code. [1] G.L. Delzanno, E. Camporeale, J.D. Moulton, J.E. Borovsky, E.A. MacDonald, and M.F. Thomsen, "CPIC: A Curvilinear Particle-In-Cell Code for Plasma-Material Interaction Studies," IEEE Trans. Plas. Sci., 41 (12), 3577 (2013).

  5. Performance of a three-dimensional Navier-Stokes code on CYBER 205 for high-speed juncture flows

    NASA Technical Reports Server (NTRS)

    Lakshmanan, B.; Tiwari, S. N.

    1987-01-01

    A vectorized 3D Navier-Stokes code has been implemented on CYBER 205 for solving the supersonic laminar flow over a swept fin/flat plate junction. The code extends MacCormack's predictor-corrector finite volume scheme to a generalized coordinate system in a locally one dimensional time split fashion. A systematic parametric study is conducted to examine the effect of fin sweep on the computed flow field. Calculated results for the pressure distribution on the flat plate and fin leading edge are compared with the experimental measurements of a right angle blunt fin/flat plate junction. The decrease in the extent of the separated flow region and peak pressure on the fin leading edge, and weakening of the two reversed supersonic zones with increase in fin sweep have been clearly observed in the numerical simulation.

  6. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    PubMed Central

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473

  7. Design and implementation of encrypted and decrypted file system based on USBKey and hardware code

    NASA Astrophysics Data System (ADS)

    Wu, Kehe; Zhang, Yakun; Cui, Wenchao; Jiang, Ting

    2017-05-01

    To protect the privacy of sensitive data, an encrypted and decrypted file system based on USBKey and hardware code is designed and implemented in this paper. This system uses USBKey and hardware code to authenticate a user. We use random key to encrypt file with symmetric encryption algorithm and USBKey to encrypt random key with asymmetric encryption algorithm. At the same time, we use the MD5 algorithm to calculate the hash of file to verify its integrity. Experiment results show that large files can be encrypted and decrypted in a very short time. The system has high efficiency and ensures the security of documents.

  8. Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study.

    PubMed

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David

    2016-12-09

    To identify the authentication and detection rate of serialised medicines using medicines authentication technology. 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. A site within a large UK National Health Service teaching hospital trust. Accredited checking staff, pharmacists and dispensers in a pharmacy department. Authentication and detection rate of counterfeit expired and recalled medicines. The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  9. Authentic research projects: Students' perspectives on the process, ownership, and benefits of doing research

    NASA Astrophysics Data System (ADS)

    Bernard, Warren

    2005-11-01

    Authentic research projects are one type of inquiry activity as defined by the American Association for the Advancement of Science (1993) and are a core component in science education reform movements. The purpose of this study was to examine high school students' perspectives of an authentic research project. The context for this study was a local Science and Engineering Fair (SEF) that involved students from a Metro-Atlanta public high school. This study provided information about this type of activity from the student's perspective, an emic viewpoint. In this qualitative study, demographic information was used for the purposeful selection of fourteen students making up the study sample. In this descriptive ethnography, data were collected via an open-ended survey, three individual interviews, a web log, and a group interview. Interviews were audio taped and conducted according to the protocol established by Lincoln and Guba (1998). Transcripts of the interviews, web logs, and survey responses were coded and analyzed by the constant comparative method as described by Glaser and Strauss (1965). Reliability and validity were achieved through member checks and triangulation. Using Gowin's Vee diagram (1981) as a theoretical framework for analysis, themes emerged describing the students' research experience. The themes included the students' initial reactions, difficulty getting started, accepting ownership of their project, growing interest, acknowledged benefits of the research experience, and a reflective look back at their experience. Overall, students described the authentic research experience as a worthwhile activity. The implications of the study are two-fold. At the practitioner level, teachers should engage students in research, but should do so in a manner that maximizes authenticity. Examples may include having students present a formal prospectus and work with a scientist mentor. For Science Educators in teacher preparation programs, there should be an experience with authentic research for pre-service teachers during the certification program. Future research may focus on the students' perspectives of ownership through the process of the authentic research and teachers' perspectives of the authentic research experience.

  10. National study of microphthalmia, anophthalmia, and coloboma (MAC) in Scotland: investigation of genetic aetiology

    PubMed Central

    Morrison, D; FitzPatrick, D; Hanson, I; Williamson, K; van Heyningen, V; Fleck, B; Jones, I; Chalmers, J; Campbell, H

    2002-01-01

    We report an epidemiological and genetic study attempting complete ascertainment of subjects with microphthalmia, anophthalmia, and coloboma (MAC) born in Scotland during a 16 year period beginning on 1 January 1981. A total of 198 cases were confirmed giving a minimum live birth prevalence of 19 per 100 000. One hundred and twenty-two MAC cases (61.6%) from 115 different families were clinically examined and detailed pregnancy, medical, and family histories obtained. A simple, rational, and apparently robust classification of the eye phenotype was developed based on the presence or absence of a defect in closure of the optic (choroidal) fissure. A total of 85/122 (69.7%) of cases had optic fissure closure defects (OFCD), 12/122 (9.8%) had non-OFCD, and 25/122 (20.5%) had defects that were unclassifiable owing to the severity of the corneal or anterior chamber abnormality. Segregation analysis assuming single and multiple incomplete ascertainment, respectively, returned a sib recurrence risk of 6% and 10% in the whole group and 8.1% and 13.3% in the OFCD subgroup. Significant recurrence risks were found in both unilateral and bilateral disease. In four families, one parent had an OFCD, two of which were new diagnoses in asymptomatic subjects. All recurrences in first degree relatives occurred in the OFCD group with a single first cousin recurrence seen in the non-OFCD group. A total of 84/122 of the MAC cases were screened for mutations in the coding regions of PAX6, CHX10, and SIX3. No pathogenic mutations were identified in the OFCD cases. A single PAX6 homeodomain missense mutation was identified in a subject with partial aniridia that had been initially misclassified as coloboma. PMID:11826019

  11. C-MAC compared with direct laryngoscopy for intubation in patients with cervical spine immobilization: A manikin trial.

    PubMed

    Smereka, Jacek; Ladny, Jerzy R; Naylor, Amanda; Ruetzler, Kurt; Szarpak, Lukasz

    2017-08-01

    The aim of this study was to compare C-MAC videolaryngoscopy with direct laryngoscopy for intubation in simulated cervical spine immobilization conditions. The study was designed as a prospective randomized crossover manikin trial. 70 paramedics with <5years of medical experience participated in the study. The paramedics attempted to intubate manikins in 3 airway scenarios: normal airway without cervical immobilization (Scenario A); manual inline cervical immobilization (Scenario B); cervical immobilization using cervical extraction collar (Scenario C). Scenario A: Nearly all participants performed successful intubations with both MAC and C-MAC on the first attempt (95.7% MAC vs. 100% C-MAC), with similar intubation times (16.5s MAC vs. 18s C-MAC). Scenario B: The results with C-MAC were significantly better than those with MAC (p<0.05) for the time of intubation (23 s MAC vs. 19 s C-MAC), success of the first intubation attempt (88.6% MAC vs. 100% C-MAC), Cormack-Lehane grade, POGO score, severity of dental compression, device difficulty score, and preferred airway device. Scenario C: The results with C-MAC were significantly better than those with MAC (p<0.05) for all the analysed variables: success of the first attempt (51.4% MAC vs. 100% C-MAC), overall success rate, intubation time (27 s MAC vs. 20.5 s C-MAC), Cormack-Lehane grade, POGO score, dental compression, device difficulty score and the preferred airway device. The C-MAC videolaryngoscope is an excellent alternative to the MAC laryngoscope for intubating manikins with cervical spine immobilization. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Differences between Children and Adults in the Recognition of Enjoyment Smiles

    ERIC Educational Resources Information Center

    Del Giudice, Marco; Colle, Livia

    2007-01-01

    The authors investigated the differences between 8-year-olds (n = 80) and adults (n = 80) in recognition of felt versus faked enjoyment smiles by using a newly developed picture set that is based on the Facial Action Coding System. The authors tested the effect of different facial action units (AUs) on judgments of smile authenticity. Multiple…

  13. Bridging Inquiry-Based Science and Constructionism: Exploring the Alignment between Students Tinkering with Code of Computational Models and Goals of Inquiry

    ERIC Educational Resources Information Center

    Wagh, Aditi; Cook-Whitt, Kate; Wilensky, Uri

    2017-01-01

    Research on the design of learning environments for K-12 science education has been informed by two bodies of literature: inquiry-based science and Constructionism. Inquiry-based science has emphasized engagement in activities that reflect authentic scientific practices. Constructionism has focused on designing intuitively accessible authoring…

  14. Plasma Interactions With Spacecraft (I)

    DTIC Science & Technology

    2009-04-01

    with the Windows, Red hat LINUX, and MacOS X environments. We wrote N2kScriptRunner, a C++ code that runs a Nascap-2k script outside of the Java ...console-based and with a Java interface), a stand alone program that reads and writes Nascap-2k database files. This program has proved invaluable...surface currents for DSX and prototyped it in Java . A description of the algorithm and the prototype implementation is in Section 3. 1.5. DSX

  15. An Improved Smoke Obscuration Model ACT II. Part 1. Theory.

    DTIC Science & Technology

    1982-01-01

    Fitz ) Naval Research Laboratory Washington, DC 20305 ATTN: Code 6009 (Or. John MacCallum, Jr.) Washington, DC 20375 Director Defense Nuclear Agency...Sands Missile Range, NM 18F. Pasquill, 1974, Atmospheric Diffusion, second edition, Halsted Press Div., John Wiley and Sons, Inc., New York 19C. H. B...18F. Pasquill, 1974, Atmospheric Diffusion, second edition, Halsted Press Div., John Wiley and Sons, Inc., New York 19C. H. B. Priestley, 1956, "A

  16. Magnetic-activated cell sorting before density gradient centrifugation improves recovery of high-quality spermatozoa.

    PubMed

    Berteli, T S; Da Broi, M G; Martins, W P; Ferriani, R A; Navarro, P A

    2017-07-01

    Recent studies have evaluated the use of magnetic-activated cell sorting (MACS) to reduce apoptotic spermatozoa and improve sperm quality. However, the efficiency of using MACS alone, before or after sperm processing by density gradient centrifugation (DGC) has not yet been established. The purpose of this study is to determine the optimal protocol of MACS in assisted reproduction techniques (ART). Thus, we compared sperm quality obtained by DGC alone (DGC), DGC followed by MACS (DGC-MACS), MACS followed by DGC (MACS-DGC), and MACS alone (MACS), and found that the combined methods (MACS-DGC and DGC-MACS) led to retrieval of less spermatozoa with fragmented DNA compared to the single protocols. However, MACS-DGC protocol led to a significantly higher percentage of spermatozoa with progressive motility and normal morphology than DGC-MACS protocol. These findings suggest the potential clinical value of using MACS-DGC to improve sperm quality in seminal preparation for ART. © 2017 American Society of Andrology and European Academy of Andrology.

  17. Calculation of key reduction for B92 QKD protocol

    NASA Astrophysics Data System (ADS)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  18. Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions

    NASA Astrophysics Data System (ADS)

    Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert

    The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.

  19. Sero-Diagnosis of Mycobacterium avium Complex Lung Disease Using Serum Immunoglobulin A Antibody against Glycopeptidolipid Antigen in Taiwan

    PubMed Central

    Wang, Jann-Tay; Jou, Ruwen; Wang, Jann-Yuan; Kobayashi, Kazuo; Lai, Hsin-Chih; Yu, Chong-Jen; Lee, Li-Na; Luh, Kwen-Tay

    2013-01-01

    Background Lung disease (LD) due to non-tuberculous mycobacteria is an important clinical concern. Mycobacterium avium complex (MAC) is one of the most common causative agents but the diagnosis of MAC-LD remains challenging. Detection of serum IgA antibody against MAC glycopeptidolipid (GPL) has recently been shown to improve the diagnosis of MAC-LD, but has yet to be validated worldwide. Methods This prospective study was conducted in a tertiary referral center in northern Taiwan and enrolled patients with MAC-LD, MAC contamination, other lung diseases, and control subjects. Serum immunoglobulin A (IgA) antibody against MAC-GPL was detected in the participants and its specificity and sensitivity was assessed. Results There were 56 patients with MAC-LD, 11 with MAC contamination, 13 M. kansasii-LD, 26 LD due to rapidly-growing mycobacteria (RGM), 48 pulmonary tuberculosis, and 42 household contacts of patients with TB. Patients with MAC-LD were older and 32% of them had an underlying co-morbidity. By logistic regression, serum MAC-GPL IgA level was an independent predictor of MAC-LD among the study subjects and those with culture-positive specimens for MAC. By the receiver operating characteristic curve, serum MAC-GPL IgA had a good power to discriminate MAC-LD from MAC contamination. Under the optimal cut-off value of 0.73 U/mL, its sensitivity and specificity were 60% and 91%, respectively. Among MAC-LD patients, presence of co-morbidity was associated with MAC-GPL <0.73 U/ml in logistic regression analysis. Conclusions Measurement of serum anti-MAC-GPL IgA level is useful for the diagnosis of MAC-LD. However, its implement in clinical practice for immuno-compromised hosts needs careful consideration. PMID:24260398

  20. Effects of Subscale Size and Shape on Global Energy Dissipation in a Multiscale Model of a Fiber-Reinforced Composite Exhibiting Post-Peak Strain Softening Using Abaqus and FEAMAC

    NASA Technical Reports Server (NTRS)

    Pineda, Evan, J.; Bednarcyk, Brett, A.; Arnold, Steven, M.

    2012-01-01

    A mesh objective crack band model is implemented in the generalized method of cells (GMC) micromechanics model to predict failure of a composite repeating unit cell (RUC). The micromechanics calculations are achieved using the MAC/GMC core engine within the ImMAC suite of micromechanics codes, developed at the NASA Glenn Research Center. The microscale RUC is linked to a macroscale Abaqus/Standard finite element model using the FEAMAC multiscale framework (included in the ImMAC suite). The effects of the relationship between the characteristic length of the finite element and the size of the microscale RUC on the total energy dissipation of the multiscale model are investigated. A simple 2-D composite square subjected to uniaxial tension is used to demonstrate the effects of scaling the dimensions of the RUC such that the length of the sides of the RUC are equal to the characteristic length of the finite element. These results are compared to simulations where the size of the RUC is fixed, independent of the element size. Simulations are carried out for a variety of mesh densities and element shapes, including square and triangular. Results indicate that a consistent size and shape must be used to yield preserve energy dissipation across the scales.

  1. A New Local Debonding Model with Application to the Transverse Tensile and Creep Behavior of Continuously Reinforced Titanium Composites

    NASA Technical Reports Server (NTRS)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2000-01-01

    A new, widely applicable model for local interfacial debonding in composite materials is presented. Unlike its direct predecessors, the new model allows debonding to progress via unloading of interfacial stresses even as global loading of the composite continues. Previous debonding models employed for analysis of titanium matrix composites are surpassed by the accuracy, simplicity, and efficiency demonstrated by the new model. The new model was designed to operate seamlessly within NASA Glenn's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC), which was employed to simulate the time- and rate-dependent (viscoplastic) transverse tensile and creep behavior of SiC/Ti composites. MAC/GMC's ability to simulate the transverse behavior of titanium matrix composites has been significantly improved by the new debonding model. Further, results indicate the need for a more accurate constitutive representation of the titanium matrix behavior in order to enable predictions of the composite transverse response, without resorting to recalibration of the debonding model parameters.

  2. Automating Security Protocol Analysis

    DTIC Science & Technology

    2004-03-01

    language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java

  3. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    DTIC Science & Technology

    2006-12-01

    Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a

  4. Recombinant Vaccinia Virus: Immunization against Multiple Pathogens

    NASA Astrophysics Data System (ADS)

    Perkus, Marion E.; Piccini, Antonia; Lipinskas, Bernard R.; Paoletti, Enzo

    1985-09-01

    The coding sequences for the hepatitis B virus surface antigen, the herpes simplex virus glycoprotein D, and the influenza virus hemagglutinin were inserted into a single vaccinia virus genome. Rabbits inoculated intravenously or intradermally with this polyvalent vaccinia virus recombinant produced antibodies reactive to all three authentic foreign antigens. In addition, the feasibility of multiple rounds of vaccination with recombinant vaccinia virus was demonstrated.

  5. Role of ATP binding and hydrolysis in assembly of MacAB-TolC macrolide transporter

    PubMed Central

    Lu, Shuo; Zgurskaya, Helen I.

    2012-01-01

    Summary MacB is a founding member of the Macrolide Exporter family of transporters belonging to the ATP-Binding Cassette superfamily. These proteins are broadly represented in genomes of both gram-positive and gram-negative bacteria and are implicated in virulence and protection against antibiotics and peptide toxins. MacB transporter functions together with MacA, a periplasmic membrane fusion protein, which stimulates MacB ATPase. In gram-negative bacteria, MacA is believed to couple ATP hydrolysis to transport of substrates across the outer membrane through a TolC-like channel. In this study, we report a real-time analysis of concurrent ATP hydrolysis and assembly of MacAB-TolC complex. MacB binds nucleotides with a low millimolar affinity and fast on- and off-rates. In contrast, MacA-MacB complex is formed with a nanomolar affinity, which further increases in the presence of ATP. Our results strongly suggest that association between MacA and MacB is stimulated by ATP binding to MacB but remains unchanged during ATP hydrolysis cycle. We also found that the large periplasmic loop of MacB plays the major role in coupling reactions separated in two different membranes. This loop is required for MacA-dependent stimulation of MacB ATPase and at the same time, contributes to recruitment of TolC into a trans-envelope complex. PMID:23057817

  6. PyCorrFit-generic data evaluation for fluorescence correlation spectroscopy.

    PubMed

    Müller, Paul; Schwille, Petra; Weidemann, Thomas

    2014-09-01

    We present a graphical user interface (PyCorrFit) for the fitting of theoretical model functions to experimental data obtained by fluorescence correlation spectroscopy (FCS). The program supports many data file formats and features a set of tools specialized in FCS data evaluation. The Python source code is freely available for download from the PyCorrFit web page at http://pycorrfit.craban.de. We offer binaries for Ubuntu Linux, Mac OS X and Microsoft Windows. © The Author 2014. Published by Oxford University Press.

  7. Ultrastructure Processing and Characterization of Polymers

    DTIC Science & Technology

    1988-01-01

    Eur. Polym. J . 24, 123-127 (1988) (with R. Vukovic , G. Bogdanic, V. Kuresevic, and W.J. MacKnight) "Miscibility and Phase Behavior in Poly (2,6...Month, Day) |I5 fAGE U d FINAL FROM TO j -"_ 16. SUPPLEMENTARY NOTATION 17. COSATI CODES 18. SUBJECT TERMS (Continue on reverse if necessary and...Lee Dr. J . Obrzut Dr. D. Rice Dr. J . Schlenoff Dr. J . Shim V. JUNIOR RESEARCH PERSONNEL: M. Bishop R. Gregorius M. Lux J . Machado M. Masse R

  8. Developing a Hypercard-UNIX Interface for Electronic Mail Transfer

    DTIC Science & Technology

    1992-06-01

    My thanks to Greqg for his support. Many of the comments for -- the MacTCP version are his. His code is set ,%ppart by borders. on openStacK put the...HUES-ModemVersion......- *-*-*-* STACK SCRIPTi "-*-*-* on openStack put the seconds into card fid theTime of card interface hide menubar global...34Loqin" hide fid receiving put empty into cd tia msqname of card theoessaqe end openStack on closeStack global logoutme put eqFpty into card fld text of

  9. Porting the Starlink Software Collection to GNU Autotools

    NASA Astrophysics Data System (ADS)

    Gray, N.; Jenness, T.; Allan, A.; Berry, D. S.; Currie, M. J.; Draper, P. W.; Taylor, M. B.; Cavanagh, B.

    2005-12-01

    The Starlink software collection currently runs on three different Unix platforms and contains around 100 separate software items, totaling 2.5 million lines of code, in a mixture of languages. We have changed the build system from a hand-maintained collection of makefiles with hard-wired OS variants to a scheme involving feature-discovery via GNU Autoconf. As a result of this work, we have already ported the collection to Mac OS X and Cygwin. This had some unexpected benefits and costs, and valuable lessons.

  10. AAtS over AeroMACS Technology Trials on the Airport Surface

    NASA Technical Reports Server (NTRS)

    Apaza, Rafael; Abraham, Biruk; Maeda, Toshihide

    2016-01-01

    Air-Ground component of SWIM; Enables enhanced two-way information exchanges between flight operators, aircrew, and ATSP (TFM); Used in all flight domains including pre-departure and post-arrival; Aircrew active in CDM; For strategic planning, advisory information; Not for command control (data voice) Wireless communications system for airport surface; Family member of Mobile WiMAX: (IEEE802.16e), Band 5091-5150 MHz, Bandwidth 5 MHz - TDDOFDMA - Adaptive Modulation and Coding - Quality of Service (QoS)

  11. High-Fidelity Modeling of Computer Network Worms

    DTIC Science & Technology

    2004-06-22

    plots the propagation of the TCP-based worm. This execution is among the largest TCP worm models simulated to date at packet-level. TCP vs . UDP Worm...the mapping of the virtual IP addresses to honeyd’s MAC address in the proxy’s ARP table. The proxy server listens for packets from both sides of...experimental setup, we used two ntium-4 ThinkPad , and an IBM Pentium-III ThinkPad ), running the proxy server and honeyd respectively. The Code Red II worm

  12. High-Content Optical Codes for Protecting Rapid Diagnostic Tests from Counterfeiting.

    PubMed

    Gökçe, Onur; Mercandetti, Cristina; Delamarche, Emmanuel

    2018-06-19

    Warnings and reports on counterfeit diagnostic devices are released several times a year by regulators and public health agencies. Unfortunately, mishandling, altering, and counterfeiting point-of-care diagnostics (POCDs) and rapid diagnostic tests (RDTs) is lucrative, relatively simple and can lead to devastating consequences. Here, we demonstrate how to implement optical security codes in silicon- and nitrocellulose-based flow paths for device authentication using a smartphone. The codes are created by inkjet spotting inks directly on nitrocellulose or on micropillars. Codes containing up to 32 elements per mm 2 and 8 colors can encode as many as 10 45 combinations. Codes on silicon micropillars can be erased by setting a continuous flow path across the entire array of code elements or for nitrocellulose by simply wicking a liquid across the code. Static or labile code elements can further be formed on nitrocellulose to create a hidden code using poly(ethylene glycol) (PEG) or glycerol additives to the inks. More advanced codes having a specific deletion sequence can also be created in silicon microfluidic devices using an array of passive routing nodes, which activate in a particular, programmable sequence. Such codes are simple to fabricate, easy to view, and efficient in coding information; they can be ideally used in combination with information on a package to protect diagnostic devices from counterfeiting.

  13. Ad-Hoc Networks and the Mobile Application Security System (MASS)

    DTIC Science & Technology

    2006-01-01

    solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems

  14. Software Assurance Curriculum Project Volume 1: Master of Software Assurance Reference Curriculum

    DTIC Science & Technology

    2010-08-01

    activity by providing a check on the relevance and currency of the process used to develop the MSwA2010 curriculum content. Figure 2 is an expansion of...random oracle model, symmetric crypto primitives, modes of operations, asymmetric crypto primitives (Chapter 5) [16] Detailed design...encryption, public key encryption, digital signatures, message authentication codes, crypto protocols, cryptanalysis, and further detailed crypto

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang Huayan; Yu Junping; Fu Guo

    The interaction between integrin macrophage differentiation antigen associated with complement three receptor function (Mac-1) and intercellular adhesion molecule-1 (ICAM-1), which is controlled tightly by the ligand-binding activity of Mac-1, is central to the regulation of neutrophil adhesion in host defense. Several 'inside-out' signals and extracellular metal ions or antibodies have been found to activate Mac-1, resulting in an increased adhesiveness of Mac-1 to its ligands. However, the molecular basis for Mac-1 activation is not well understood yet. In this work, we have carried out a single-molecule study of Mac-1/ICAM-1 interaction force in living cells by atomic force microscopy (AFM). Ourmore » results showed that the binding probability and adhesion force of Mac-1 with ICAM-1 increased upon Mac-1 activation. Moreover, by comparing the dynamic force spectra of different Mac-1 mutants, we expected that Mac-1 activation is governed by the downward movement of its {alpha}7 helix.« less

  16. Information Theory, Inference and Learning Algorithms

    NASA Astrophysics Data System (ADS)

    Mackay, David J. C.

    2003-10-01

    Information theory and inference, often taught separately, are here united in one entertaining textbook. These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to clustering, convolutional codes, independent component analysis, and neural networks. The final part of the book describes the state of the art in error-correcting codes, including low-density parity-check codes, turbo codes, and digital fountain codes -- the twenty-first century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, David MacKay's groundbreaking book is ideal for self-learning and for undergraduate or graduate courses. Interludes on crosswords, evolution, and sex provide entertainment along the way. In sum, this is a textbook on information, communication, and coding for a new generation of students, and an unparalleled entry point into these subjects for professionals in areas as diverse as computational biology, financial engineering, and machine learning.

  17. TetrUSS Capabilities for S and C Applications

    NASA Technical Reports Server (NTRS)

    Frink, Neal T.; Parikh, Paresh

    2004-01-01

    TetrUSS is a suite of loosely coupled computational fluid dynamics software that is packaged into a complete flow analysis system. The system components consist of tools for geometry setup, grid generation, flow solution, visualization, and various utilities tools. Development began in 1990 and it has evolved into a proven and stable system for Euler and Navier-Stokes analysis and design of unconventional configurations. It is 1) well developed and validated, 2) has a broad base of support, and 3) is presently is a workhorse code because of the level of confidence that has been established through wide use. The entire system can now run on linux or mac architectures. In the following slides, I will highlight more of the features of the VGRID and USM3D codes.

  18. Proteomics to go: Proteomatic enables the user-friendly creation of versatile MS/MS data evaluation workflows.

    PubMed

    Specht, Michael; Kuhlgert, Sebastian; Fufezan, Christian; Hippler, Michael

    2011-04-15

    We present Proteomatic, an operating system independent and user-friendly platform that enables the construction and execution of MS/MS data evaluation pipelines using free and commercial software. Required external programs such as for peptide identification are downloaded automatically in the case of free software. Due to a strict separation of functionality and presentation, and support for multiple scripting languages, new processing steps can be added easily. Proteomatic is implemented in C++/Qt, scripts are implemented in Ruby, Python and PHP. All source code is released under the LGPL. Source code and installers for Windows, Mac OS X, and Linux are freely available at http://www.proteomatic.org. michael.specht@uni-muenster.de Supplementary data are available at Bioinformatics online.

  19. GenomeDiagram: a python package for the visualization of large-scale genomic data.

    PubMed

    Pritchard, Leighton; White, Jennifer A; Birch, Paul R J; Toth, Ian K

    2006-03-01

    We present GenomeDiagram, a flexible, open-source Python module for the visualization of large-scale genomic, comparative genomic and other data with reference to a single chromosome or other biological sequence. GenomeDiagram may be used to generate publication-quality vector graphics, rastered images and in-line streamed graphics for webpages. The package integrates with datatypes from the BioPython project, and is available for Windows, Linux and Mac OS X systems. GenomeDiagram is freely available as source code (under GNU Public License) at http://bioinf.scri.ac.uk/lp/programs.html, and requires Python 2.3 or higher, and recent versions of the ReportLab and BioPython packages. A user manual, example code and images are available at http://bioinf.scri.ac.uk/lp/programs.html.

  20. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  1. Reversible Data Hiding in FTIR Microspectroscopy Images with Tamper Indication and Payload Error Correction

    PubMed Central

    Seppänen, Tapio

    2017-01-01

    Fourier transform infrared (FTIR) microspectroscopy images contain information from the whole infrared spectrum used for microspectroscopic analyses. In combination with the FTIR image, visible light images are used to depict the area from which the FTIR spectral image was sampled. These two images are traditionally acquired as separate files. This paper proposes a histogram shifting-based data hiding technique to embed visible light images in FTIR spectral images producing single entities. The primary objective is to improve data management efficiency. Secondary objectives are confidentiality, availability, and reliability. Since the integrity of biomedical data is vital, the proposed method applies reversible data hiding. After extraction of the embedded data, the FTIR image is reversed to its original state. Furthermore, the proposed method applies authentication tags generated with keyed Hash-Based Message Authentication Codes (HMAC) to detect tampered or corrupted areas of FTIR images. The experimental results show that the FTIR spectral images carrying the payload maintain good perceptual fidelity and the payload can be reliably recovered even after bit flipping or cropping attacks. It has been also shown that extraction successfully removes all modifications caused by the payload. Finally, authentication tags successfully indicated tampered FTIR image areas. PMID:29259987

  2. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  3. "Applying anatomy to something I care about": Authentic inquiry learning and student experiences of an inquiry project.

    PubMed

    Anstey, Lauren M

    2017-11-01

    Despite advances to move anatomy education away from its didactic history, there is a continued need for students to contextualize their studies to make learning more meaningful. This article investigates authentic learning in the context of an inquiry-based approach to learning human gross anatomy. Utilizing a case-study design with three groups of students (n = 18) and their facilitators (n = 3), methods of classroom observations, interviews, and artifact collection were utilized to investigate students' experiences of learning through an inquiry project. Qualitative data analysis through open and selective coding produced common meaningful themes of group and student experiences. Overall results demonstrate how the project served as a unique learning experience where learners engaged in the opportunity to make sense of anatomy in context of their interests and wider interdisciplinary considerations through collaborative, group-based investigation. Results were further considered in context of theoretical frameworks of inquiry-based and authentic learning. Results from this study demonstrate how students can engage anatomical understandings to inquire and apply disciplinary considerations to their personal lives and the world around them. Anat Sci Educ 10: 538-548. © 2017 American Association of Anatomists. © 2017 American Association of Anatomists.

  4. MicMac GIS application: free open source

    NASA Astrophysics Data System (ADS)

    Duarte, L.; Moutinho, O.; Teodoro, A.

    2016-10-01

    The use of Remotely Piloted Aerial System (RPAS) for remote sensing applications is becoming more frequent as the technologies on on-board cameras and the platform itself are becoming a serious contender to satellite and airplane imagery. MicMac is a photogrammetric tool for image matching that can be used in different contexts. It is an open source software and it can be used as a command line or with a graphic interface (for each command). The main objective of this work was the integration of MicMac with QGIS, which is also an open source software, in order to create a new open source tool applied to photogrammetry/remote sensing. Python language was used to develop the application. This tool would be very useful in the manipulation and 3D modelling of a set of images. The main objective was to create a toolbar in QGIS with the basic functionalities with intuitive graphic interfaces. The toolbar is composed by three buttons: produce the points cloud, create the Digital Elevation Model (DEM) and produce the orthophoto of the study area. The application was tested considering 35 photos, a subset of images acquired by a RPAS in the Aguda beach area, Porto, Portugal. They were used in order to create a 3D terrain model and from this model obtain an orthophoto and the corresponding DEM. The code is open and can be modified according to the user requirements. This integration would be very useful in photogrammetry and remote sensing community combined with GIS capabilities.

  5. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  6. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  7. Prognostic Comparison Between Mucinous and Nonmucinous Adenocarcinoma in Colorectal Cancer

    PubMed Central

    Park, Jong Seob; Huh, Jung Wook; Park, Yoon Ah; Cho, Yong Beom; Yun, Seong Hyeon; Kim, Hee Cheol; Lee, Woo Yong; Chun, Ho-Kyung

    2015-01-01

    Abstract Mucinous adenocarcinoma (MAC) is a histological subtype of colorectal cancer. The oncologic behavior of MAC differs from nonmucinous adenocarcinoma (non-MAC). Our aim in this study was to characterize patients with colorectal MAC through evaluation of a large, institutional-based cohort with long-term follow-up. A total of 6475 patients with stages I to III colorectal cancer who underwent radical surgery were enrolled from January 2000 to December 2010. Prognostic comparison between MAC (n = 274, 4.2%) and non-MAC was performed. The median follow-up period was 48.0 months. Patients with MAC were younger than those without MAC (P = 0.012) and had larger tumor size (P < 0.001), higher preoperative carcinoembryonic antigen (P < 0.001), higher pathologic T stage (P < 0.001), more right-sided colon cancer (49.3%, P < 0.001), and more frequent high-frequency microsatellite instability (10.2%, P < 0.001). Five-year disease-free survival (DFS) was 76.5% in the MAC group and 83.2% in the non-MAC group (P = 0.008), and 5-year overall survival was 81.4% versus 87.4%, respectively (P = 0.005). Mucinous histology (MAC vs non-MAC) in the entire cohort was not an independent prognostic factor of DFS but had a statistical tendency (P = 0.071). In subgroup analysis of colon cancer without rectal cancer, mucinous histology was an independent prognostic factor (P = 0.026). MAC was found at more advanced stage, located mainly at the right side and was an independent factor of survival in colon cancer. Because of the unique biological behavior of MAC, patients with MAC require special consideration during follow-up. PMID:25881840

  8. Reliable Wireless Broadcast with Linear Network Coding for Multipoint-to-Multipoint Real-Time Communications

    NASA Astrophysics Data System (ADS)

    Kondo, Yoshihisa; Yomo, Hiroyuki; Yamaguchi, Shinji; Davis, Peter; Miura, Ryu; Obana, Sadao; Sampei, Seiichi

    This paper proposes multipoint-to-multipoint (MPtoMP) real-time broadcast transmission using network coding for ad-hoc networks like video game networks. We aim to achieve highly reliable MPtoMP broadcasting using IEEE 802.11 media access control (MAC) that does not include a retransmission mechanism. When each node detects packets from the other nodes in a sequence, the correctly detected packets are network-encoded, and the encoded packet is broadcasted in the next sequence as a piggy-back for its native packet. To prevent increase of overhead in each packet due to piggy-back packet transmission, network coding vector for each node is exchanged between all nodes in the negotiation phase. Each user keeps using the same coding vector generated in the negotiation phase, and only coding information that represents which user signal is included in the network coding process is transmitted along with the piggy-back packet. Our simulation results show that the proposed method can provide higher reliability than other schemes using multi point relay (MPR) or redundant transmissions such as forward error correction (FEC). We also implement the proposed method in a wireless testbed, and show that the proposed method achieves high reliability in a real-world environment with a practical degree of complexity when installed on current wireless devices.

  9. Functional implications of an intermeshing cogwheel-like interaction between TolC and MacA in the action of macrolide-specific efflux pump MacAB-TolC.

    PubMed

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-04-15

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel.

  10. Functional Implications of an Intermeshing Cogwheel-like Interaction between TolC and MacA in the Action of Macrolide-specific Efflux Pump MacAB-TolC*

    PubMed Central

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-01-01

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse Gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel. PMID:21325274

  11. HeatmapGenerator: high performance RNAseq and microarray visualization software suite to examine differential gene expression levels using an R and C++ hybrid computational pipeline.

    PubMed

    Khomtchouk, Bohdan B; Van Booven, Derek J; Wahlestedt, Claes

    2014-01-01

    The graphical visualization of gene expression data using heatmaps has become an integral component of modern-day medical research. Heatmaps are used extensively to plot quantitative differences in gene expression levels, such as those measured with RNAseq and microarray experiments, to provide qualitative large-scale views of the transcriptonomic landscape. Creating high-quality heatmaps is a computationally intensive task, often requiring considerable programming experience, particularly for customizing features to a specific dataset at hand. Software to create publication-quality heatmaps is developed with the R programming language, C++ programming language, and OpenGL application programming interface (API) to create industry-grade high performance graphics. We create a graphical user interface (GUI) software package called HeatmapGenerator for Windows OS and Mac OS X as an intuitive, user-friendly alternative to researchers with minimal prior coding experience to allow them to create publication-quality heatmaps using R graphics without sacrificing their desired level of customization. The simplicity of HeatmapGenerator is that it only requires the user to upload a preformatted input file and download the publicly available R software language, among a few other operating system-specific requirements. Advanced features such as color, text labels, scaling, legend construction, and even database storage can be easily customized with no prior programming knowledge. We provide an intuitive and user-friendly software package, HeatmapGenerator, to create high-quality, customizable heatmaps generated using the high-resolution color graphics capabilities of R. The software is available for Microsoft Windows and Apple Mac OS X. HeatmapGenerator is released under the GNU General Public License and publicly available at: http://sourceforge.net/projects/heatmapgenerator/. The Mac OS X direct download is available at: http://sourceforge.net/projects/heatmapgenerator/files/HeatmapGenerator_MAC_OSX.tar.gz/download. The Windows OS direct download is available at: http://sourceforge.net/projects/heatmapgenerator/files/HeatmapGenerator_WINDOWS.zip/download.

  12. ERDC MSRC Resource. High Performance Computing for the Warfighter. Fall 2006

    DTIC Science & Technology

    2006-01-01

    to as Aggregated Combat Modeling, putting us at the campaign level).” Incorporating UIT within DAC The DAC system is written in Python and uses...API calls with two Python classes, UITConnectionFactory and UITConnection. UITConnectionFactory supports Kerberos authentication and establishes a...API calls within these Python classes, we insulated the DAC code from the Python SOAP interface requirements and details of the ERDC MSRC Resource

  13. Multiprime Blum-Blum-Shub Pseudorandom Number Generator

    DTIC Science & Technology

    2016-09-01

    Cryptography , National Institute of Standards and Technology Tests 15. NUMBER OF PAGES 83 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18...1: Introduction Cryptography is a part of our daily lives. Many digital communications require secrecy and authentication over open channels such as...security, of which cryptography is an intrinsic part. Encryption is the process of transforming data, in the form of plaintext, into ciphertext using a

  14. Modern Advances to the Modular Fly-Away Kit (MFLAK) to Support Maritime Interdiction Operations

    DTIC Science & Technology

    2007-09-01

    combined Indonesia- Malaysia -Singapore-Thailand-U.S. R&D effort to investigate commercial-off-the- shelf (COTS) Command and Control, Communications...Operations and Applied Science & Technology Studies (COASTS). COASTS is a combined Indonesia- Malaysia -Singapore-Thailand-U.S. R&D effort to investigate...Message Authentication Code MALSINDO Malaysia , Indonesia and Singapore xiii Mbps Megabits per Second MCP Mission Capability Package MCSC Marine

  15. RMG An Open Source Electronic Structure Code for Multi-Petaflops Calculations

    NASA Astrophysics Data System (ADS)

    Briggs, Emil; Lu, Wenchang; Hodak, Miroslav; Bernholc, Jerzy

    RMG (Real-space Multigrid) is an open source, density functional theory code for quantum simulations of materials. It solves the Kohn-Sham equations on real-space grids, which allows for natural parallelization via domain decomposition. Either subspace or Davidson diagonalization, coupled with multigrid methods, are used to accelerate convergence. RMG is a cross platform open source package which has been used in the study of a wide range of systems, including semiconductors, biomolecules, and nanoscale electronic devices. It can optionally use GPU accelerators to improve performance on systems where they are available. The recently released versions (>2.0) support multiple GPU's per compute node, have improved performance and scalability, enhanced accuracy and support for additional hardware platforms. New versions of the code are regularly released at http://www.rmgdft.org. The releases include binaries for Linux, Windows and MacIntosh systems, automated builds for clusters using cmake, as well as versions adapted to the major supercomputing installations and platforms. Several recent, large-scale applications of RMG will be discussed.

  16. Open source clustering software.

    PubMed

    de Hoon, M J L; Imoto, S; Nolan, J; Miyano, S

    2004-06-12

    We have implemented k-means clustering, hierarchical clustering and self-organizing maps in a single multipurpose open-source library of C routines, callable from other C and C++ programs. Using this library, we have created an improved version of Michael Eisen's well-known Cluster program for Windows, Mac OS X and Linux/Unix. In addition, we generated a Python and a Perl interface to the C Clustering Library, thereby combining the flexibility of a scripting language with the speed of C. The C Clustering Library and the corresponding Python C extension module Pycluster were released under the Python License, while the Perl module Algorithm::Cluster was released under the Artistic License. The GUI code Cluster 3.0 for Windows, Macintosh and Linux/Unix, as well as the corresponding command-line program, were released under the same license as the original Cluster code. The complete source code is available at http://bonsai.ims.u-tokyo.ac.jp/mdehoon/software/cluster. Alternatively, Algorithm::Cluster can be downloaded from CPAN, while Pycluster is also available as part of the Biopython distribution.

  17. Beam Instrument Development System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DOOLITTLE, LAWRENCE; HUANG, GANG; DU, QIANG

    Beam Instrumentation Development System (BIDS) is a collection of common support libraries and modules developed during a series of Low-Level Radio Frequency (LLRF) control and timing/synchronization projects. BIDS includes a collection of Hardware Description Language (HDL) libraries and software libraries. The BIDS can be used for the development of any FPGA-based system, such as LLRF controllers. HDL code in this library is generic and supports common Digital Signal Processing (DSP) functions, FPGA-specific drivers (high-speed serial link wrappers, clock generation, etc.), ADC/DAC drivers, Ethernet MAC implementation, etc.

  18. Simulated single molecule microscopy with SMeagol.

    PubMed

    Lindén, Martin; Ćurić, Vladimir; Boucharin, Alexis; Fange, David; Elf, Johan

    2016-08-01

    SMeagol is a software tool to simulate highly realistic microscopy data based on spatial systems biology models, in order to facilitate development, validation and optimization of advanced analysis methods for live cell single molecule microscopy data. SMeagol runs on Matlab R2014 and later, and uses compiled binaries in C for reaction-diffusion simulations. Documentation, source code and binaries for Mac OS, Windows and Ubuntu Linux can be downloaded from http://smeagol.sourceforge.net johan.elf@icm.uu.se Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.

  19. The National Shipbuilding Research Program. Application of Industrial Engineering Techniques to Reduce Workers’ Compensation and Environmental Costs

    DTIC Science & Technology

    1999-10-01

    TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Surface Warfare Center CD Code 2230-Design Integration...Tools Bldg 192, Room 128 9500 MacArthur Blvd Bethesda, MD 20817-5700 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...Implementation of Task 2.4 • Task 7.0 Conduct Workshops • Task 8.0 Final Report To ensure success with the project, the research needed to be performed at the

  20. Annotare--a tool for annotating high-throughput biomedical investigations and resulting data.

    PubMed

    Shankar, Ravi; Parkinson, Helen; Burdett, Tony; Hastings, Emma; Liu, Junmin; Miller, Michael; Srinivasa, Rashmi; White, Joseph; Brazma, Alvis; Sherlock, Gavin; Stoeckert, Christian J; Ball, Catherine A

    2010-10-01

    Computational methods in molecular biology will increasingly depend on standards-based annotations that describe biological experiments in an unambiguous manner. Annotare is a software tool that enables biologists to easily annotate their high-throughput experiments, biomaterials and data in a standards-compliant way that facilitates meaningful search and analysis. Annotare is available from http://code.google.com/p/annotare/ under the terms of the open-source MIT License (http://www.opensource.org/licenses/mit-license.php). It has been tested on both Mac and Windows.

  1. CAESAR: Commissioned Assignments Executive Support for the US Army.

    DTIC Science & Technology

    1986-03-27

    travel between jobs ? b. Detailed Narrative The documented source code of CAESAR can be found in Appendix B. An explanatory listing of variables used is...Compute Match Preference PREFFORM SSI index a, b a,b Match Match Leave ADSPEC SC2 and Travel a, b Time ab a , b ~~N4 4. ORB Mac Matyh ,. ac ASI ASI SReport...sufficient time between assignments for the officer to 44 take 30 days leave and travel . While this is not a manda- tory consideration, it is common to

  2. Validating the Manchester Acute Coronary Syndromes (MACS) and Troponin-only Manchester Acute Coronary Syndromes (T-MACS) rules for the prediction of acute myocardial infarction in patients presenting to the emergency department with chest pain.

    PubMed

    Greenslade, Jaimi H; Nayer, Robert; Parsonage, William; Doig, Shaela; Young, Joanna; Pickering, John W; Than, Martin; Hammett, Christopher; Cullen, Louise

    2017-08-01

    The Manchester Acute Coronary Syndromes (MACS) rule and the Troponin-only MACS (T-MACS) rule risk stratify patients with suspected acute coronary syndrome (ACS). This observational study sought to validate and compare the MACS and T-MACS rules for assessment of acute myocardial infarction (AMI). Prospectively collected data from twoEDs in Australia and New Zealand were analysed. Patients were assigned a probability of ACS based on the MACS and T-MACS rules, incorporating high-sensitivity troponin T, heart-type fatty acid-binding protein, ECG results and clinical symptoms. Patients were then deemed very low risk, low risk, intermediate or high risk if their MACS probability was less than 2%, between 2% and 5%, between 5% and 95% and greater than 95%, respectively. The primary endpoint was 30-day diagnosis of AMI. The secondary endpoint was 30-day major adverse cardiac event (MACE) including AMI, revascularisation or coronary stenosis (>70%). Sensitivity, specificity and predictive values were calculated to assess the accuracy of the MACS and T-MACS rules. Of the 1244 patients, 114 (9.2%) were diagnosed with AMI and 163 (13.1%) with MACE. The MACS and T-MACS rules categorised 133 (10.7%) and 246 (19.8%) patients, respectively, as very low risk and potentially suitable for early discharge from the ED. There was one false negative case for both rules making sensitivity 99.1% (95.2%-100%). MACS and T-MACS accurately risk stratify very low risk patients. The T-MACS rule would allow for more patients to be discharged early. The potential for missed MACE events means that further outpatient testing for coronary artery disease may be required for patients identified as very low risk. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  3. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  4. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    USGS Publications Warehouse

    Song, W.-Z.; Huang, R.; Shirazi, B.; LaHusen, R.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and each frame into slots. A parent node determines the children's frame assignment based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. First, given any node, at any time slot, there is at most one active sender in its neighborhood (including itself). Second, the packet scheduling with TreeMAC is bufferless, which therefore minimizes the probability of network congestion. Third, the data throughput to the gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24-node testbed show that TreeMAC protocol significantly improves network throughput, fairness, and energy efficiency compared to TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC. Partial results of this paper were published in Song, Huang, Shirazi and Lahusen [W.-Z. Song, R. Huang, B. Shirazi, and R. Lahusen, TreeMAC: Localized TDMA MAC protocol for high-throughput and fairness in sensor networks, in: The 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom, March 2009]. Our new contributions include analyses of the performance of TreeMAC from various aspects. We also present more implementation detail and evaluate TreeMAC from other aspects. ?? 2009 Elsevier B.V.

  5. MacA, a periplasmic membrane fusion protein of the macrolide transporter MacAB-TolC, binds lipopolysaccharide core specifically and with high affinity.

    PubMed

    Lu, Shuo; Zgurskaya, Helen I

    2013-11-01

    The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC.

  6. MacA, a Periplasmic Membrane Fusion Protein of the Macrolide Transporter MacAB-TolC, Binds Lipopolysaccharide Core Specifically and with High Affinity

    PubMed Central

    Lu, Shuo

    2013-01-01

    The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC. PMID:23974027

  7. The effect of nitrous oxide on the minimum alveolar concentration (MAC) and MAC derivatives of isoflurane in dogs

    PubMed Central

    Voulgaris, Debra A.; Egger, Christine M.; Seddighi, M. Reza; Rohrbach, Barton W.; Love, Lydia C.; Doherty, Thomas J.

    2013-01-01

    This study investigated the effects of 70% nitrous oxide (N2O) on the minimum alveolar concentration (MAC) of isoflurane (ISO) that prevents purposeful movement, the MAC of ISO at which there is no motor movement (MACNM), and the MAC of ISO at which autonomic responses are blocked (MACBAR) in dogs. Six adult, healthy, mixed-breed, intact male dogs were anesthetized with ISO delivered via mask. Baseline MAC, MACNM, and MACBAR of ISO were determined for each dog using a supra-maximal electrical stimulus (50 V, 50 Hz, 10 ms). Nitrous oxide (70%) was then administered and MAC and its derivatives (N2O-MAC, N2O-MACNM, and N2O-MACBAR) were determined using the same methodology. The values for baseline MAC, MACNM, and MACBAR were 1.39 ± 0.14, 1.59 ± 0.10, and 1.72 ± 0.16, respectively. The addition of 70% N2O decreased MAC, MACNM, and MACBAR by 32%, 15%, and 25%, respectively. PMID:24082405

  8. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  9. Oligomeric Bax Is a Component of the Putative Cytochrome c Release Channel MAC, Mitochondrial Apoptosis-induced Channel

    PubMed Central

    Dejean, Laurent M.; Martinez-Caballero, Sonia; Guo, Liang; Hughes, Cynthia; Teijido, Oscar; Ducret, Thomas; Ichas, François; Korsmeyer, Stanley J.; Antonsson, Bruno; Jonas, Elizabeth A.; Kinnally, Kathleen W.

    2005-01-01

    Bcl-2 family proteins regulate apoptosis, in part, by controlling formation of the mitochondrial apoptosis-induced channel (MAC), which is a putative cytochrome c release channel induced early in the intrinsic apoptotic pathway. This channel activity was never observed in Bcl-2–overexpressing cells. Furthermore, MAC appears when Bax translocates to mitochondria and cytochrome c is released in cells dying by intrinsic apoptosis. Bax is a component of MAC of staurosporine-treated HeLa cells because MAC activity is immunodepleted by Bax antibodies. MAC is preferentially associated with oligomeric, not monomeric, Bax. The single channel behavior of recombinant oligomeric Bax and MAC is similar. Both channel activities are modified by cytochrome c, consistent with entrance of this protein into the pore. The mean conductance of patches of mitochondria isolated after green fluorescent protein-Bax translocation is significantly higher than those from untreated cells, consistent with onset of MAC activity. In contrast, the mean conductance of patches of mitochondria indicates MAC activity is present in apoptotic cells deficient in Bax but absent in apoptotic cells deficient in both Bax and Bak. These findings indicate Bax is a component of MAC in staurosporine-treated HeLa cells and suggest Bax and Bak are functionally redundant as components of MAC. PMID:15772159

  10. The Paramecium germline genome provides a niche for intragenic parasitic DNA: evolutionary dynamics of internal eliminated sequences.

    PubMed

    Arnaiz, Olivier; Mathy, Nathalie; Baudry, Céline; Malinsky, Sophie; Aury, Jean-Marc; Denby Wilkes, Cyril; Garnier, Olivier; Labadie, Karine; Lauderdale, Benjamin E; Le Mouël, Anne; Marmignon, Antoine; Nowacki, Mariusz; Poulain, Julie; Prajer, Malgorzata; Wincker, Patrick; Meyer, Eric; Duharcourt, Sandra; Duret, Laurent; Bétermier, Mireille; Sperling, Linda

    2012-01-01

    Insertions of parasitic DNA within coding sequences are usually deleterious and are generally counter-selected during evolution. Thanks to nuclear dimorphism, ciliates provide unique models to study the fate of such insertions. Their germline genome undergoes extensive rearrangements during development of a new somatic macronucleus from the germline micronucleus following sexual events. In Paramecium, these rearrangements include precise excision of unique-copy Internal Eliminated Sequences (IES) from the somatic DNA, requiring the activity of a domesticated piggyBac transposase, PiggyMac. We have sequenced Paramecium tetraurelia germline DNA, establishing a genome-wide catalogue of -45,000 IESs, in order to gain insight into their evolutionary origin and excision mechanism. We obtained direct evidence that PiggyMac is required for excision of all IESs. Homology with known P. tetraurelia Tc1/mariner transposons, described here, indicates that at least a fraction of IESs derive from these elements. Most IES insertions occurred before a recent whole-genome duplication that preceded diversification of the P. aurelia species complex, but IES invasion of the Paramecium genome appears to be an ongoing process. Once inserted, IESs decay rapidly by accumulation of deletions and point substitutions. Over 90% of the IESs are shorter than 150 bp and present a remarkable size distribution with a -10 bp periodicity, corresponding to the helical repeat of double-stranded DNA and suggesting DNA loop formation during assembly of a transpososome-like excision complex. IESs are equally frequent within and between coding sequences; however, excision is not 100% efficient and there is selective pressure against IES insertions, in particular within highly expressed genes. We discuss the possibility that ancient domestication of a piggyBac transposase favored subsequent propagation of transposons throughout the germline by allowing insertions in coding sequences, a fraction of the genome in which parasitic DNA is not usually tolerated.

  11. The Paramecium Germline Genome Provides a Niche for Intragenic Parasitic DNA: Evolutionary Dynamics of Internal Eliminated Sequences

    PubMed Central

    Arnaiz, Olivier; Mathy, Nathalie; Baudry, Céline; Malinsky, Sophie; Aury, Jean-Marc; Denby Wilkes, Cyril; Garnier, Olivier; Labadie, Karine; Lauderdale, Benjamin E.; Le Mouël, Anne; Marmignon, Antoine; Nowacki, Mariusz; Poulain, Julie; Prajer, Malgorzata; Wincker, Patrick; Meyer, Eric; Duharcourt, Sandra; Duret, Laurent; Bétermier, Mireille; Sperling, Linda

    2012-01-01

    Insertions of parasitic DNA within coding sequences are usually deleterious and are generally counter-selected during evolution. Thanks to nuclear dimorphism, ciliates provide unique models to study the fate of such insertions. Their germline genome undergoes extensive rearrangements during development of a new somatic macronucleus from the germline micronucleus following sexual events. In Paramecium, these rearrangements include precise excision of unique-copy Internal Eliminated Sequences (IES) from the somatic DNA, requiring the activity of a domesticated piggyBac transposase, PiggyMac. We have sequenced Paramecium tetraurelia germline DNA, establishing a genome-wide catalogue of ∼45,000 IESs, in order to gain insight into their evolutionary origin and excision mechanism. We obtained direct evidence that PiggyMac is required for excision of all IESs. Homology with known P. tetraurelia Tc1/mariner transposons, described here, indicates that at least a fraction of IESs derive from these elements. Most IES insertions occurred before a recent whole-genome duplication that preceded diversification of the P. aurelia species complex, but IES invasion of the Paramecium genome appears to be an ongoing process. Once inserted, IESs decay rapidly by accumulation of deletions and point substitutions. Over 90% of the IESs are shorter than 150 bp and present a remarkable size distribution with a ∼10 bp periodicity, corresponding to the helical repeat of double-stranded DNA and suggesting DNA loop formation during assembly of a transpososome-like excision complex. IESs are equally frequent within and between coding sequences; however, excision is not 100% efficient and there is selective pressure against IES insertions, in particular within highly expressed genes. We discuss the possibility that ancient domestication of a piggyBac transposase favored subsequent propagation of transposons throughout the germline by allowing insertions in coding sequences, a fraction of the genome in which parasitic DNA is not usually tolerated. PMID:23071448

  12. TIM, a ray-tracing program for METATOY research and its dissemination

    NASA Astrophysics Data System (ADS)

    Lambert, Dean; Hamilton, Alasdair C.; Constable, George; Snehanshu, Harsh; Talati, Sharvil; Courtial, Johannes

    2012-03-01

    TIM (The Interactive METATOY) is a ray-tracing program specifically tailored towards our research in METATOYs, which are optical components that appear to be able to create wave-optically forbidden light-ray fields. For this reason, TIM possesses features not found in other ray-tracing programs. TIM can either be used interactively or by modifying the openly available source code; in both cases, it can easily be run as an applet embedded in a web page. Here we describe the basic structure of TIM's source code and how to extend it, and we give examples of how we have used TIM in our own research. Program summaryProgram title: TIM Catalogue identifier: AEKY_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEKY_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public License No. of lines in distributed program, including test data, etc.: 124 478 No. of bytes in distributed program, including test data, etc.: 4 120 052 Distribution format: tar.gz Programming language: Java Computer: Any computer capable of running the Java Virtual Machine (JVM) 1.6 Operating system: Any; developed under Mac OS X Version 10.6 RAM: Typically 145 MB (interactive version running under Mac OS X Version 10.6) Classification: 14, 18 External routines: JAMA [1] (source code included) Nature of problem: Visualisation of scenes that include scene objects that create wave-optically forbidden light-ray fields. Solution method: Ray tracing. Unusual features: Specifically designed to visualise wave-optically forbidden light-ray fields; can visualise ray trajectories; can visualise geometric optic transformations; can create anaglyphs (for viewing with coloured "3D glasses") and random-dot autostereograms of the scene; integrable into web pages. Running time: Problem-dependent; typically seconds for a simple scene.

  13. FracPaQ: A MATLAB™ toolbox for the quantification of fracture patterns

    NASA Astrophysics Data System (ADS)

    Healy, David; Rizzo, Roberto E.; Cornwell, David G.; Farrell, Natalie J. C.; Watkins, Hannah; Timms, Nick E.; Gomez-Rivas, Enrique; Smith, Michael

    2017-02-01

    The patterns of fractures in deformed rocks are rarely uniform or random. Fracture orientations, sizes, and spatial distributions often exhibit some kind of order. In detail, relationships may exist among the different fracture attributes, e.g. small fractures dominated by one orientation, larger fractures by another. These relationships are important because the mechanical (e.g. strength, anisotropy) and transport (e.g. fluids, heat) properties of rock depend on these fracture attributes and patterns. This paper describes FracPaQ, a new open source, cross-platform toolbox to quantify fracture patterns, including distributions in fracture attributes and their spatial variation. Software has been developed to quantify fracture patterns from 2-D digital images, such as thin section micrographs, geological maps, outcrop or aerial photographs or satellite images. The toolbox comprises a suite of MATLAB™ scripts based on previously published quantitative methods for the analysis of fracture attributes: orientations, lengths, intensity, density and connectivity. An estimate of permeability in 2-D is made using a parallel plate model. The software provides an objective and consistent methodology for quantifying fracture patterns and their variations in 2-D across a wide range of length scales, rock types and tectonic settings. The implemented methods presented are inherently scale independent, and a key task where applicable is analysing and integrating quantitative fracture pattern data from micro-to macro-scales. The toolbox was developed in MATLAB™ and the source code is publicly available on GitHub™ and the Mathworks™ FileExchange. The code runs on any computer with MATLAB installed, including PCs with Microsoft Windows, Apple Macs with Mac OS X, and machines running different flavours of Linux. The application, source code and sample input files are available in open repositories in the hope that other developers and researchers will optimise and extend the functionality for the benefit of the wider community.

  14. MQ-MAC: A Multi-Constrained QoS-Aware Duty Cycle MAC for Heterogeneous Traffic in Wireless Sensor Networks

    PubMed Central

    Monowar, Muhammad Mostafa; Rahman, Md. Obaidur; Hong, Choong Seon; Lee, Sungwon

    2010-01-01

    Energy conservation is one of the striking research issues now-a-days for power constrained wireless sensor networks (WSNs) and hence, several duty-cycle based MAC protocols have been devised for WSNs in the last few years. However, assimilation of diverse applications with different QoS requirements (i.e., delay and reliability) within the same network also necessitates in devising a generic duty-cycle based MAC protocol that can achieve both the delay and reliability guarantee, termed as multi-constrained QoS, while preserving the energy efficiency. To address this, in this paper, we propose a Multi-constrained QoS-aware duty-cycle MAC for heterogeneous traffic in WSNs (MQ-MAC). MQ-MAC classifies the traffic based on their multi-constrained QoS demands. Through extensive simulation using ns-2 we evaluate the performance of MQ-MAC. MQ-MAC provides the desired delay and reliability guarantee according to the nature of the traffic classes as well as achieves energy efficiency. PMID:22163439

  15. Source Lines Counter (SLiC) Version 4.0

    NASA Technical Reports Server (NTRS)

    Monson, Erik W.; Smith, Kevin A.; Newport, Brian J.; Gostelow, Roli D.; Hihn, Jairus M.; Kandt, Ronald K.

    2011-01-01

    Source Lines Counter (SLiC) is a software utility designed to measure software source code size using logical source statements and other common measures for 22 of the programming languages commonly used at NASA and the aerospace industry. Such metrics can be used in a wide variety of applications, from parametric cost estimation to software defect analysis. SLiC has a variety of unique features such as automatic code search, automatic file detection, hierarchical directory totals, and spreadsheet-compatible output. SLiC was written for extensibility; new programming language support can be added with minimal effort in a short amount of time. SLiC runs on a variety of platforms including UNIX, Windows, and Mac OSX. Its straightforward command-line interface allows for customization and incorporation into the software build process for tracking development metrics. T

  16. Introduction to MAC CRM training

    NASA Technical Reports Server (NTRS)

    Brown, Donald D.

    1987-01-01

    The author introduces the Military Airlift Command (MAC) and its mission. A brief history of Cockpit Resource Management (CRM) as it relates to MAC is given. He also states why MAC is currently interested in CRM.

  17. Methamphetamine-Associated Cardiomyopathy

    PubMed Central

    Won, Sekon; Hong, Robert A.; Shohet, Ralph V.; Seto, Todd B.; Parikh, Nisha I.

    2015-01-01

    Methamphetamine and related compounds are now the second most commonly used illicit substance worldwide, after cannabis. Reports of methamphetamine-associated cardiomyopathy (MAC) are increasing, but MAC has not been well reviewed. This analysis of MAC will provide an overview of the pharmacology of methamphetamine, historical perspective and epidemiology, a review of case and clinical studies, and a summary of the proposed mechanisms for MAC. Clinically, many questions remain, including the appropriate therapeutic interventions for MAC, the incidence and prevalence of cardiac pathology in methamphetamine users, risk factors for developing MAC, and prognosis of these patients. In conclusion, recognition of the significance of MAC among physicians and other medical caregivers is important given the growing use of methamphetamine and related stimulants worldwide. PMID:24037954

  18. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    USGS Publications Warehouse

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  19. Identification of Human Cathelicidin Peptide LL-37 as a Ligand for Macrophage Integrin αMβ2 (Mac-1, CD11b/CD18) that Promotes Phagocytosis by Opsonizing Bacteria

    PubMed Central

    Lishko, Valeryi K.; Moreno, Benjamin; Podolnikova, Nataly P.; Ugarova, Tatiana P.

    2016-01-01

    LL-37, a cationic antimicrobial peptide, has numerous immune-modulating effects. However, the identity of a receptor(s) mediating the responses in immune cells remains uncertain. We have recently demonstrated that LL-37 interacts with the αMI-domain of integrin αMβ2 (Mac-1), a major receptor on the surface of myeloid cells, and induces a migratory response in Mac-1-expressing monocyte/macrophages as well as activation of Mac-1 on neutrophils. Here, we show that LL-37 and its C-terminal derivative supported strong adhesion of various Mac-1-expressing cells, including HEK293 cells stably transfected with Mac-1, human U937 monocytic cells and murine IC-21 macrophages. The cell adhesion to LL-37 was partially inhibited by specific Mac-1 antagonists, including mAb against the αM integrin subunit and neutrophil inhibitory factor, and completely blocked when anti-Mac-1 antibodies were combined with heparin, suggesting that cell surface heparan sulfate proteoglycans act cooperatively with integrin Mac-1. Coating both Gram-negative and Gram-positive bacteria with LL-37 significantly potentiated their phagocytosis by macrophages, and this process was blocked by a combination of anti-Mac-1 mAb and heparin. Furthermore, phagocytosis by wild-type murine peritoneal macrophages of LL-37-coated latex beads, a model of foreign surfaces, was several fold higher than that of untreated beads. By contrast, LL-37 failed to augment phagocytosis of beads by Mac-1-deficient macrophages. These results identify LL-37 as a novel ligand for integrin Mac-1 and demonstrate that the interaction between Mac-1 on macrophages and bacteria-bound LL-37 promotes phagocytosis. PMID:27990411

  20. Minimum alveolar concentration (MAC) for sevoflurane and xenon at normothermia and hypothermia in newborn pigs.

    PubMed

    Liu, X; Dingley, J; Elstad, M; Scull-Brown, E; Steen, P A; Thoresen, M

    2013-05-01

    Neuroprotection from therapeutic hypothermia increases when combined with the anaesthetic gas xenon in animal studies. A clinical feasibility study of the combined treatment has been successfully undertaken in asphyxiated human term newborns. It is unknown whether xenon alone would be sufficient for sedation during hypothermia eliminating or reducing the need for other sedative or analgesic infusions in ventilated sick infants. Minimum alveolar concentration (MAC) of xenon is unknown in any neonatal species. Eight newborn pigs were anaesthetised with sevoflurane alone and then sevoflurane plus xenon at two temperatures. Pigs were randomised to start at either 38.5°C or 33.5°C. MAC for sevoflurane was determined using the claw clamp technique at the preset body temperature. For xenon MAC determination, a background of 0.5 MAC sevoflurane was used, and 60% xenon added to the gas mixture. The relationship between sevoflurane and xenon MAC is assumed to be additive. Xenon concentrations were changed in 5% steps until a positive clamp reaction was noted. Pigs' temperature was changed to the second target, and two MAC determinations for sevoflurane and 0.5 MAC sevoflurane plus xenon were repeated. MAC for sevoflurane was 4.1% [95% confidence interval (CI): 3.65-4.50] at 38.5°C and 3.05% (CI: 2.63-3.48) at 33.5°C, a significant reduction. MAC for xenon was 120% at 38.5°C and 116% at 33.5°C, not different. In newborn swine sevoflurane, MAC was temperature dependent, while xenon MAC was independent of temperature. There was large individual variability in xenon MAC, from 60% to 120%. © 2013 The Acta Anaesthesiologica Scandinavica Foundation.

  1. Stochastic-Strength-Based Damage Simulation of Ceramic Matrix Composite Laminates

    NASA Technical Reports Server (NTRS)

    Nemeth, Noel N.; Mital, Subodh K.; Murthy, Pappu L. N.; Bednarcyk, Brett A.; Pineda, Evan J.; Bhatt, Ramakrishna T.; Arnold, Steven M.

    2016-01-01

    The Finite Element Analysis-Micromechanics Analysis Code/Ceramics Analysis and Reliability Evaluation of Structures (FEAMAC/CARES) program was used to characterize and predict the progressive damage response of silicon-carbide-fiber-reinforced reaction-bonded silicon nitride matrix (SiC/RBSN) composite laminate tensile specimens. Studied were unidirectional laminates [0] (sub 8), [10] (sub 8), [45] (sub 8), and [90] (sub 8); cross-ply laminates [0 (sub 2) divided by 90 (sub 2),]s; angled-ply laminates [plus 45 (sub 2) divided by -45 (sub 2), ]s; doubled-edge-notched [0] (sub 8), laminates; and central-hole laminates. Results correlated well with the experimental data. This work was performed as a validation and benchmarking exercise of the FEAMAC/CARES program. FEAMAC/CARES simulates stochastic-based discrete-event progressive damage of ceramic matrix composite and polymer matrix composite material structures. It couples three software programs: (1) the Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC), (2) the Ceramics Analysis and Reliability Evaluation of Structures Life Prediction Program (CARES/Life), and (3) the Abaqus finite element analysis program. MAC/GMC contributes multiscale modeling capabilities and micromechanics relations to determine stresses and deformations at the microscale of the composite material repeating-unit-cell (RUC). CARES/Life contributes statistical multiaxial failure criteria that can be applied to the individual brittle-material constituents of the RUC, and Abaqus is used to model the overall composite structure. For each FEAMAC/CARES simulation trial, the stochastic nature of brittle material strength results in random, discrete damage events that incrementally progress until ultimate structural failure.

  2. Adaptive antioxidant methionine accumulation in respiratory chain complexes explains the use of a deviant genetic code in mitochondria.

    PubMed

    Bender, Aline; Hajieva, Parvana; Moosmann, Bernd

    2008-10-28

    Humans and most other animals use 2 different genetic codes to translate their hereditary information: the standard code for nuclear-encoded proteins and a modern variant of this code in mitochondria. Despite the pivotal role of the genetic code for cell biology, the functional significance of the deviant mitochondrial code has remained enigmatic since its first description in 1979. Here, we show that profound and functionally beneficial alterations on the encoded protein level were causative for the AUA codon reassignment from isoleucine to methionine observed in most mitochondrial lineages. We demonstrate that this codon reassignment leads to a massive accumulation of the easily oxidized amino acid methionine in the highly oxidative inner mitochondrial membrane. This apparently paradoxical outcome can yet be smoothly settled if the antioxidant surface chemistry of methionine is taken into account, and we present direct experimental evidence that intramembrane accumulation of methionine exhibits antioxidant and cytoprotective properties in living cells. Our results unveil that methionine is an evolutionarily selected antioxidant building block of respiratory chain complexes. Collective protein alterations can thus constitute the selective advantage behind codon reassignments, which authenticates the "ambiguous decoding" hypothesis of genetic code evolution. Oxidative stress has shaped the mitochondrial genetic code.

  3. The Role of the Transcription Factors MtrR and MtrA in the Fitness of the Pathogen Neisseria gonorrhoeae

    DTIC Science & Technology

    2007-10-19

    MacA -MacB efflux pump is expressed at very low levels in N. gonorrhoeae; however, experimental alteration of the promoter sequence showed that the...specificity (132). The gonococcus expresses four efflux pump systems, namely MtrC-Mtr-D-MtrE (64), FarA-FarB-MtrE (97), NorM (158), and MacA -MacB (161...2005. Characterization of the MacA -MacB efflux system in Neisseria gonorrhoeae. The Journal of antimicrobial chemotherapy 56:856-860. 162. Rouquette, C

  4. Mac-1 (CD11b/CD18) is essential for Fc receptor-mediated neutrophil cytotoxicity and immunologic synapse formation.

    PubMed

    van Spriel, A B; Leusen, J H; van Egmond, M; Dijkman, H B; Assmann, K J; Mayadas, T N; van de Winkel, J G

    2001-04-15

    Receptors for human immunoglobulin (Ig)G and IgA initiate potent cytolysis of antibody (Ab)-coated targets by polymorphonuclear leukocytes (PMNs). Mac-1 (complement receptor type 3, CD11b/CD18) has previously been implicated in receptor cooperation with Fc receptors (FcRs). The role of Mac-1 in FcR-mediated lysis of tumor cells was characterized by studying normal human PMNs, Mac-1-deficient mouse PMNs, and mouse PMNs transgenic for human FcR. All PMNs efficiently phagocytosed Ab-coated particles. However, antibody-dependent cellular cytotoxicity (ADCC) was abrogated in Mac-1(-/-) PMNs and in human PMNs blocked with anti-Mac-1 monoclonal Ab (mAb). Mac-1(-/-) PMNs were unable to spread on Ab-opsonized target cells and other Ab-coated surfaces. Confocal laser scanning and electron microscopy revealed a striking difference in immunologic synapse formation between Mac-1(-/-) and wild-type PMNs. Also, respiratory burst activity could be measured outside membrane-enclosed compartments by using Mac-1(-/-) PMNs bound to Ab-coated tumor cells, in contrast to wild-type PMNs. In summary, these data document an absolute requirement of Mac-1 for FcR-mediated PMN cytotoxicity toward tumor targets. Mac-1(-/-) PMNs exhibit defective spreading on Ab-coated targets, impaired formation of immunologic synapses, and absent tumor cytolysis.

  5. Photocopy of drawing (original drawing of MacDill Field in possession ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing (original drawing of MacDill Field in possession of MacDill Air Force Base, Civil Engineering, Tampa, Florida; 1952 architectural drawings by Strategic Air Command, MacDill Air Force Base) BASE LAYOUT, 1952 - MacDill Air Force Base, Bounded by City of Tampa North, Tampa Bay South, Old Tampa Bay West, & Hillsborough Bay East, Tampa, Hillsborough County, FL

  6. NLSEmagic: Nonlinear Schrödinger equation multi-dimensional Matlab-based GPU-accelerated integrators using compact high-order schemes

    NASA Astrophysics Data System (ADS)

    Caplan, R. M.

    2013-04-01

    We present a simple to use, yet powerful code package called NLSEmagic to numerically integrate the nonlinear Schrödinger equation in one, two, and three dimensions. NLSEmagic is a high-order finite-difference code package which utilizes graphic processing unit (GPU) parallel architectures. The codes running on the GPU are many times faster than their serial counterparts, and are much cheaper to run than on standard parallel clusters. The codes are developed with usability and portability in mind, and therefore are written to interface with MATLAB utilizing custom GPU-enabled C codes with the MEX-compiler interface. The packages are freely distributed, including user manuals and set-up files. Catalogue identifier: AEOJ_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEOJ_v1_0.html Program obtainable from: CPC Program Library, Queen’s University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 124453 No. of bytes in distributed program, including test data, etc.: 4728604 Distribution format: tar.gz Programming language: C, CUDA, MATLAB. Computer: PC, MAC. Operating system: Windows, MacOS, Linux. Has the code been vectorized or parallelized?: Yes. Number of processors used: Single CPU, number of GPU processors dependent on chosen GPU card (max is currently 3072 cores on GeForce GTX 690). Supplementary material: Setup guide, Installation guide. RAM: Highly dependent on dimensionality and grid size. For typical medium-large problem size in three dimensions, 4GB is sufficient. Keywords: Nonlinear Schröodinger Equation, GPU, high-order finite difference, Bose-Einstien condensates. Classification: 4.3, 7.7. Nature of problem: Integrate solutions of the time-dependent one-, two-, and three-dimensional cubic nonlinear Schrödinger equation. Solution method: The integrators utilize a fully-explicit fourth-order Runge-Kutta scheme in time and both second- and fourth-order differencing in space. The integrators are written to run on NVIDIA GPUs and are interfaced with MATLAB including built-in visualization and analysis tools. Restrictions: The main restriction for the GPU integrators is the amount of RAM on the GPU as the code is currently only designed for running on a single GPU. Unusual features: Ability to visualize real-time simulations through the interaction of MATLAB and the compiled GPU integrators. Additional comments: Setup guide and Installation guide provided. Program has a dedicated web site at www.nlsemagic.com. Running time: A three-dimensional run with a grid dimension of 87×87×203 for 3360 time steps (100 non-dimensional time units) takes about one and a half minutes on a GeForce GTX 580 GPU card.

  7. Mitral annular calcification in patients undergoing aortic valve replacement for aortic valve stenosis.

    PubMed

    Takami, Yoshiyuki; Tajima, Kazuyoshi

    2016-02-01

    Limited data exis t on clinical relevance of aortic valve stenosis (AVS) and mitral annular calcification (MAC), although with similar pathophysiologic basis. We sought to reveal the prevalence of MAC and its clinical features in the patients undergoing aortic valve replacement (AVR) for AVS. We reviewed 106 consecutive patients who underwent isolated AVR from 2004 to 2010. Before AVR, CT scans were performed to identify MAC, whose severity was graded on a scale of 0-4, with grade 0 denoting no MAC and grade 4 indicating severe MAC. Echocardiography was performed before AVR and at follow-up over 2 years after AVR. MAC was identified in 56 patients with grade 1 (30 %), 2 (39 %), 3 (18 %), and 4 (13 %), respectively. Patients with MAC presented older age (72 ± 8 versus 66 ± 11 years), higher rate of dialysis-dependent renal failure (43 versus 4 %), and less frequency of bicuspid aortic valve (9 versus 36 %), when compared to those without MAC. No significant differences were seen in short- and mid-term mortality after AVR between the groups. In patients with MAC, progression of neither mitral regurgitation nor stenosis was observed at follow-up of 53 ± 23 months for 102 survivors, although the transmitral flow velocities were higher than in those without MAC. In conclusion, MAC represented 53 % of the patients undergoing isolated AVR for AVS, usually appeared in dialysis-dependent elder patients with tricuspid AVS. MAC does not affect adversely upon the survival, without progression of mitral valve disease, at least within 2 years after AVR.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fu Guo; Institute of Neuroscience, Department of Neurobiology, Second Military Medical University, Shanghai 200433; Yang Huayan

    Macrophage differentiation antigen associated with complement three receptor function (Mac-1) belongs to {beta}{sub 2} subfamily of integrins that mediate important cell-cell and cell-extracellular matrix interactions. Biochemical studies have indicated that Mac-1 is a constitutive heterodimer in vitro. Here, we detected the heterodimerization of Mac-1 subunits in living cells by means of two fluorescence resonance energy transfer (FRET) techniques (fluorescence microscopy and fluorescence spectroscopy) and our results demonstrated that there is constitutive heterodimerization of the Mac-1 subunits and this constitutive heterodimerization of the Mac-1 subunits is cell-type independent. Through FRET imaging, we found that heterodimers of Mac-1 mainly localized in plasmamore » membrane, perinuclear, and Golgi area in living cells. Furthermore, through analysis of the estimated physical distances between cyan fluorescent protein (CFP) and yellow fluorescent protein (YFP) fused to Mac-1 subunits, we suggested that the conformation of Mac-1 subunits is not affected by the fusion of CFP or YFP and inferred that Mac-1 subunits take different conformation when expressed in Chinese hamster ovary (CHO) and human embryonic kidney (HEK) 293T cells, respectively.« less

  9. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.

  10. Finger Vein Recognition Based on Local Directional Code

    PubMed Central

    Meng, Xianjing; Yang, Gongping; Yin, Yilong; Xiao, Rongyang

    2012-01-01

    Finger vein patterns are considered as one of the most promising biometric authentication methods for its security and convenience. Most of the current available finger vein recognition methods utilize features from a segmented blood vessel network. As an improperly segmented network may degrade the recognition accuracy, binary pattern based methods are proposed, such as Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Line Binary Pattern (LLBP). However, the rich directional information hidden in the finger vein pattern has not been fully exploited by the existing local patterns. Inspired by the Webber Local Descriptor (WLD), this paper represents a new direction based local descriptor called Local Directional Code (LDC) and applies it to finger vein recognition. In LDC, the local gradient orientation information is coded as an octonary decimal number. Experimental results show that the proposed method using LDC achieves better performance than methods using LLBP. PMID:23202194

  11. Finger vein recognition based on local directional code.

    PubMed

    Meng, Xianjing; Yang, Gongping; Yin, Yilong; Xiao, Rongyang

    2012-11-05

    Finger vein patterns are considered as one of the most promising biometric authentication methods for its security and convenience. Most of the current available finger vein recognition methods utilize features from a segmented blood vessel network. As an improperly segmented network may degrade the recognition accuracy, binary pattern based methods are proposed, such as Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Line Binary Pattern (LLBP). However, the rich directional information hidden in the finger vein pattern has not been fully exploited by the existing local patterns. Inspired by the Webber Local Descriptor (WLD), this paper represents a new direction based local descriptor called Local Directional Code (LDC) and applies it to finger vein recognition. In LDC, the local gradient orientation information is coded as an octonary decimal number. Experimental results show that the proposed method using LDC achieves better performance than methods using LLBP.

  12. Highly stable maintenance of a mouse artificial chromosome in human cells and mice.

    PubMed

    Kazuki, Kanako; Takehara, Shoko; Uno, Narumi; Imaoka, Natsuko; Abe, Satoshi; Takiguchi, Masato; Hiramatsu, Kei; Oshimura, Mitsuo; Kazuki, Yasuhiro

    2013-12-06

    Human artificial chromosomes (HACs) and mouse artificial chromosomes (MACs) display several advantages as gene delivery vectors, such as stable episomal maintenance that avoids insertional mutations and the ability to carry large gene inserts including the regulatory elements. Previously, we showed that a MAC vector developed from a natural mouse chromosome by chromosome engineering was more stably maintained in adult tissues and hematopoietic cells in mice than HAC vectors. In this study, to expand the utility for a gene delivery vector in human cells and mice, we investigated the long-term stability of the MACs in cultured human cells and transchromosomic mice. We also investigated the chromosomal copy number-dependent expression of genes on the MACs in mice. The MAC was stably maintained in human HT1080 cells in vitro during long-term culture. The MAC was stably maintained at least to the F8 and F4 generations in ICR and C57BL/6 backgrounds, respectively. The MAC was also stably maintained in hematopoietic cells and tissues derived from old mice. Transchromosomic mice containing two or four copies of the MAC were generated by breeding. The DNA contents were comparable to the copy number of the MACs in each tissue examined, and the expression of the EGFP gene on the MAC was dependent on the chromosomal copy number. Therefore, the MAC vector may be useful not only for gene delivery in mammalian cells but also for animal transgenesis. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. A mutation spectrum that includes GNAS, KRAS and TP53 may be shared by mucinous neoplasms of the appendix.

    PubMed

    Hara, Kieko; Saito, Tsuyoshi; Hayashi, Takuo; Yimit, Alkam; Takahashi, Michiko; Mitani, Keiko; Takahashi, Makoto; Yao, Takashi

    2015-09-01

    Appendiceal mucinous tumors (AMTs) are classified as low-grade appendiceal mucinous neoplasms (LAMNs) or mucinous adenocarcinomas (MACs), although their carcinogenesis is not well understood. As somatic activating mutations of GNAS are considered to be characteristic of LAMNs while TP53 mutations have been shown to be specific to MACs, MACs are unlikely to result from transformation of LAMNs. However, emerging evidence also shows the presence of GNAS mutations in MACs. We examined 16 AMTs (11 LAMNs and 5 MACs) for genetic alterations of GNAS, KRAS, BRAF, TP53, CTNNB1, and TERT promoter in order to elucidate the possibility of a shared genetic background in the two tumor types. Extensive histological examination revealed the presence of a low-grade component in all cases of MAC. GNAS mutations were detected in two LAMNs and in one MAC, although the GNAS mutation in this MAC was a nonsense mutation (Q227X) expected not to be activating mutation. TP53 mutations were detected in three LAMNs; they were frequently detected in MACs. KRAS mutations were detected in three LAMNs and three MACs, and CTNNB1 mutations were detected in two LAMNs. KRAS mutation and activating mutation of GNAS occurred exclusively in AMTs. BRAF and TERT mutations were not detected. Overexpression of p53 was observed in only two MACs, and p53 immunostaining clearly discriminated the high-grade lesion from a low-grade component in one. These findings suggest that p53 overexpression plays an important role in the carcinogenesis of AMTs and that, in addition to mutations of GNAS, KRAS and TP53 alterations might be shared by AMTs, thus providing evidence for the possible progression of LAMNs to MAC. Copyright © 2015 Elsevier GmbH. All rights reserved.

  14. Structure of the MacAB-TolC ABC-type tripartite multidrug efflux pump

    PubMed Central

    Llabrés, Salomé; Neuberger, Arthur; Blaza, James N.; Bai, Xiao-chen; Okada, Ui; Murakami, Satoshi; van Veen, Hendrik W.; Zachariae, Ulrich; Scheres, Sjors H.W.; Luisi, Ben F.

    2017-01-01

    The MacA-MacB-TolC assembly of Escherichia coli is a transmembrane machine that spans the cell envelope and actively extrudes substrates, including macrolide antibiotics and polypeptide virulence factors. These transport processes are energized by the ATPase MacB, a member of the ATP-binding cassette (ABC) superfamily. We present an electron cryo-microscopy structure of the ABC-type tripartite assembly at near-atomic resolution. A hexamer of the periplasmic protein MacA bridges between a TolC trimer in the outer membrane and a MacB dimer in the inner membrane, generating a quaternary structure with a central channel for substrate translocation. A gating ring found in MacA is proposed to act as a one-way valve in substrate transport. The MacB structure features an atypical transmembrane domain (TMD) with a closely packed dimer interface and a periplasmic opening that is the likely portal for substrate entry from the periplasm, with subsequent displacement through an allosteric transport mechanism. PMID:28504659

  15. Carbon nanotube-clamped metal atomic chain

    PubMed Central

    Tang, Dai-Ming; Yin, Li-Chang; Li, Feng; Liu, Chang; Yu, Wan-Jing; Hou, Peng-Xiang; Wu, Bo; Lee, Young-Hee; Ma, Xiu-Liang; Cheng, Hui-Ming

    2010-01-01

    Metal atomic chain (MAC) is an ultimate one-dimensional structure with unique physical properties, such as quantized conductance, colossal magnetic anisotropy, and quantized magnetoresistance. Therefore, MACs show great potential as possible components of nanoscale electronic and spintronic devices. However, MACs are usually suspended between two macroscale metallic electrodes; hence obvious technical barriers exist in the interconnection and integration of MACs. Here we report a carbon nanotube (CNT)-clamped MAC, where CNTs play the roles of both nanoconnector and electrodes. This nanostructure is prepared by in situ machining a metal-filled CNT, including peeling off carbon shells by spatially and elementally selective electron beam irradiation and further elongating the exposed metal nanorod. The microstructure and formation process of this CNT-clamped MAC are explored by both transmission electron microscopy observations and theoretical simulations. First-principles calculations indicate that strong covalent bonds are formed between the CNT and MAC. The electrical transport property of the CNT-clamped MAC was experimentally measured, and quantized conductance was observed. PMID:20427743

  16. Mutually Augmented Cognition

    NASA Astrophysics Data System (ADS)

    Friesdorf, Florian; Pangercic, Dejan; Bubb, Heiner; Beetz, Michael

    In mac, an ergonomic dialog-system and algorithms will be developed that enable human experts and companions to be integrated into knowledge gathering and decision making processes of highly complex cognitive systems (e.g. Assistive Household as manifested further in the paper). In this event we propose to join algorithms and methodologies coming from Ergonomics and Artificial Intelligence that: a) make cognitive systems more congenial for non-expert humans, b) facilitate their comprehension by utilizing a high-level expandable control code for human experts and c) augment representation of such cognitive system into “deep representation” obtained through an interaction with human companions.

  17. Annotare—a tool for annotating high-throughput biomedical investigations and resulting data

    PubMed Central

    Shankar, Ravi; Parkinson, Helen; Burdett, Tony; Hastings, Emma; Liu, Junmin; Miller, Michael; Srinivasa, Rashmi; White, Joseph; Brazma, Alvis; Sherlock, Gavin; Stoeckert, Christian J.; Ball, Catherine A.

    2010-01-01

    Summary: Computational methods in molecular biology will increasingly depend on standards-based annotations that describe biological experiments in an unambiguous manner. Annotare is a software tool that enables biologists to easily annotate their high-throughput experiments, biomaterials and data in a standards-compliant way that facilitates meaningful search and analysis. Availability and Implementation: Annotare is available from http://code.google.com/p/annotare/ under the terms of the open-source MIT License (http://www.opensource.org/licenses/mit-license.php). It has been tested on both Mac and Windows. Contact: rshankar@stanford.edu PMID:20733062

  18. Continuous Photoprocessing/Photoprocessing Control Career Ladders, AFSCs 23330, 23350, 23370, 23331, 23371, and 23399.

    DTIC Science & Technology

    1981-04-01

    J AFLC AFSC L~-ATC L_ ESC* N~Q USAF R a ±1MAC [ PACAF SAC TAC USAFA USAPE OTHER UNIT ORt ORGANIZATION (Not wirde, Major CowsnedL. IF "OTHER UNIT...Print Filters 88. Printers Model D, 35= 89. Printers Model J , 16= CODE 99 xiv • CDC ID AFS 233XO/X1 m .CX DC3DC1DC1DCD BACKGROUND INFORMATION (CONTINUED...BACKGROUND INFORMATION (CONTINUED) BLACN CIRCLE (1) TO TH RIGHT OF = EACH RESNS-E YOU ISH TO INDICATE . Tacky oller Cleaners 0IDOMMOD(® 115. Tacoma

  19. Numerical computation of viscous flow around bodies and wings moving at supersonic speeds

    NASA Technical Reports Server (NTRS)

    Tannehill, J. C.

    1984-01-01

    Research in aerodynamics is discussed. The development of equilibrium air curve fits; computation of hypersonic rarefield leading edge flows; computation of 2-D and 3-D blunt body laminar flows with an impinging shock; development of a two-dimensional or axisymmetric real gas blunt body code; a study of an over-relaxation procedure forthe MacCormack finite-difference scheme; computation of 2-D blunt body turbulent flows with an impinging shock; computation of supersonic viscous flow over delta wings at high angles of attack; and computation of the Space Shuttle Orbiter flowfield are discussed.

  20. Compact storage of medical images with patient information.

    PubMed

    Acharya, R; Anand, D; Bhat, S; Niranjan, U C

    2001-12-01

    Digital watermarking is a technique of hiding specific identification data for copyright authentication. This technique is adapted here for interleaving patient information with medical images to reduce storage and transmission overheads. The text data are encrypted before interleaving with images to ensure greater security. The graphical signals are compressed and subsequently interleaved with the image. Differential pulse-code-modulation and adaptive-delta-modulation techniques are employed for data compression, and encryption and results are tabulated for a specific example.

  1. Investigating Cognitive Rhythms as a New Modality for Continuous Authentication

    DTIC Science & Technology

    2013-12-01

    authorship studies. One of the major accomplishments of this effort is the development and subsequent validation of software codes and methods that are...collection effort was financed by Co-PI Dr. Vir Phoha’s various grants. 3.1.1 Subject Population Characteristics  Gender : Male (569), female (427...participant: a) typing experience, b) age, c) gender , d) right- or left-handed, e) native language, f) business language, and g) average number of hours a

  2. Genome level analysis of rice mRNA 3′-end processing signals and alternative polyadenylation

    PubMed Central

    Shen, Yingjia; Ji, Guoli; Haas, Brian J.; Wu, Xiaohui; Zheng, Jianti; Reese, Greg J.; Li, Qingshun Quinn

    2008-01-01

    The position of a poly(A) site of eukaryotic mRNA is determined by sequence signals in pre-mRNA and a group of polyadenylation factors. To reveal rice poly(A) signals at a genome level, we constructed a dataset of 55 742 authenticated poly(A) sites and characterized the poly(A) signals. This resulted in identifying the typical tripartite cis-elements, including FUE, NUE and CE, as previously observed in Arabidopsis. The average size of the 3′-UTR was 289 nucleotides. When mapped to the genome, however, 15% of these poly(A) sites were found to be located in the currently annotated intergenic regions. Moreover, an extensive alternative polyadenylation profile was evident where 50% of the genes analyzed had more than one unique poly(A) site (excluding microheterogeneity sites), and 13% had four or more poly(A) sites. About 4% of the analyzed genes possessed alternative poly(A) sites at their introns, 5′-UTRs, or protein coding regions. The authenticity of these alternative poly(A) sites was partially confirmed using MPSS data. Analysis of nucleotide profile and signal patterns indicated that there may be a different set of poly(A) signals for those poly(A) sites found in the coding regions. Based on the features of rice poly(A) signals, an updated algorithm termed PASS-Rice was designed to predict poly(A) sites. PMID:18411206

  3. Effects of metabolic acidosis on intracellular pH responses in multiple cell types

    PubMed Central

    Salameh, Ahlam Ibrahim; Ruffin, Vernon A.

    2014-01-01

    Metabolic acidosis (MAc), a decrease in extracellular pH (pHo) caused by a decrease in [HCO3−]o at a fixed [CO2]o, is a common clinical condition and causes intracellular pH (pHi) to fall. Although previous work has suggested that MAc-induced decreases in pHi (ΔpHi) differ among cell types, what is not clear is the extent to which these differences are the result of the wide variety of methodologies employed by various investigators. In the present study, we evaluated the effects of two sequential MAc challenges (MAc1 and MAc2) on pHi in 10 cell types/lines: primary-cultured hippocampal (HCN) neurons and astrocytes (HCA), primary-cultured medullary raphé (MRN) neurons, and astrocytes (MRA), CT26 colon cancer, the C2C12 skeletal muscles, primary-cultured bone marrow-derived macrophages (BMDM) and dendritic cells (BMDC), Ink4a/ARF-null melanocytes, and XB-2 keratinocytes. We monitor pHi using ratiometric fluorescence imaging of 2′,7′-bis-(2-carboxyethyl)-5-(and-6)-carboxyfluorescein while imposing MAc: lowering (pHo) from 7.4 to 7.2 by decreasing [HCO3−]o from 22 to 14 mM at 5% CO2 for 7 min. After MAc1, we return cells to the control solution for 10 min and impose MAc2. Using our definition of MAc resistance [(ΔpHi/ΔpHo) ≤ 40%], during MAc1, ∼70% of CT26 and ∼50% of C2C12 are MAc-resistant, whereas the other cell types are predominantly MAc-sensitive. During MAc2, some cells adapt [(ΔpHi/ΔpHo)2 < (ΔpHi/ΔpHo)1], particularly HCA, C2C12, and BMDC. Most maintain consistent responses [(ΔpHi/ΔpHo)2 ≅ (ΔpHi/ΔpHo)1], and a few decompensate [(ΔpHi/ΔpHo)2>(ΔpHi/ΔpHo)1], particularly HCN, C2C12, and XB-2. Thus, responses to twin MAc challenges depend both on the individual cell and cell type. PMID:25209413

  4. A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks

    PubMed Central

    Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad

    2017-01-01

    Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495

  5. GENETIC FINGERPRINTING OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS ISOLATED FROM HOSPITAL PATIENTS AND THE ENVIRONMENT

    EPA Science Inventory

    A particularly pathogenic group of mycobacteria belong to the Mycobacterium avium complex (MAC), which includes M. avium and M. intracellulare. MAC organisms cause disease in children, the elderly, and immuno-compromised individuals. A critical step in preventing MAC infections...

  6. Discriminative validity of the MacAndrew Alcoholism Scale with Cluster B personality disorders.

    PubMed

    Smith, S R; Hilsenroth, M J

    2001-06-01

    This study was designed to assess the ability of the Minnesota Multiphasic Personality Inventory (MMPI-2) MacAndrew Alcoholism Scale (MAC-R) to differentiate between outpatients with personality disorders with Substance-Related Disorders (SRDs) and without SRDs. MMPI-2 validity, clinical, and MAC-R scale scores were compared in an SRD Cluster B group (comprised of Narcissistic, Antisocial, Borderline, and Histrionic; n = 15), a non-SRD Cluster B group (n = 33), and a non-SRD group with personality disorders from Clusters A and C (n = 18). Results revealed that the substance-abusing Cluster B group scored significantly higher on the MAC-R ( p <.0001) as well as the Psychopathic Deviate scale ( p <.01). Dimensional analyses illustrated that MAC-R scores were related to the presence of an SRD diagnosis (rpb =.70, p <.0001) and diagnostic criteria for Antisocial Personality Disorder (r =.60, p <.0001). Stepwise regression revealed that (in order of magnitude) the presence of a substance-abuse diagnosis followed by diagnostic criteria for Antisocial and Histrionic Personality Disorders were most related to MAC-R scores (R =.78, R(2) =.60). This indicates that the MAC-R may be more related to the presence of an SRD than has been suggested, and when used in outpatient settings as MacAndrew (1965) intended, the MAC-R may be useful as a screening device for assessing SRD among outpatients with Axis II psychopathology.

  7. Clinical efficacy of anti-glycopeptidolipid-core IgA test for diagnosing Mycobacterium avium complex infection in lung.

    PubMed

    Numata, Takanori; Araya, Jun; Yoshii, Yutaka; Shimizu, Kenichiro; Hara, Hiromichi; Nakayama, Katsutoshi; Kuwano, Kazuyoshi

    2015-11-01

    It is difficult to verify the bacteriological diagnosis of Mycobacterium avium complex (MAC) infection. The anti-glycopeptidolipid (GPL)-core IgA antibody test was recently developed as a diagnostic method for MAC pulmonary disease. Only a few studies evaluate its clinical efficacy. We conducted retrospective evaluations of clinical characteristics of patients suspected of MAC infection to explore the usefulness of the anti-GPL-core IgA antibody test. We retrospectively evaluated 296 patients who were suspected to have MAC infection and underwent anti-GPL-core IgA antibody test between March 2013 and July 2014 in Jikei University hospital. A total of 29 patients were diagnosed with 'definite MAC' based on the American Thoracic Society (ATS) criteria with multiple identifications of MAC. On the other hand, 106 patients were diagnosed with other pulmonary diseases than MAC. The sensitivity and specificity of anti-GPL-core IgA antibody test for MAC diagnosis were 58.6% and 98.1%, respectively. The definite MAC group showed no significant differences in strains, treatment history or number of segments involved. The duration of MAC disease in the positive-antibody group was significantly longer than in the negative-antibody group (P = 0.046). A significant increase in the false-negative rate was observed in patients with malignant disease (P = 0.029). The anti-GPL-core IgA antibody test demonstrated high sensitivity and specificity for the diagnosis of MAC infection especially in patients without malignant diseases. © 2015 Asian Pacific Society of Respirology.

  8. The Leishmania donovani histidine acid ecto-phosphatase LdMAcP: insight into its structure and function.

    PubMed

    Papadaki, Amalia; Politou, Anastasia S; Smirlis, Despina; Kotini, Maria P; Kourou, Konstadina; Papamarcaki, Thomais; Boleti, Haralabia

    2015-05-01

    Acid ecto-phosphatase activity has been implicated in Leishmania donovani promastigote virulence. In the present study, we report data contributing to the molecular/structural and functional characterization of the L. donovani LdMAcP (L. donovani membrane acid phosphatase), member of the histidine acid phosphatase (HAcP) family. LdMAcP is membrane-anchored and shares high sequence identity with the major secreted L. donovani acid phosphatases (LdSAcPs). Sequence comparison of the LdMAcP orthologues in Leishmania sp. revealed strain polymorphism and species specificity for the L. donovani complex, responsible for visceral leishmaniasis (Khala azar), proposing thus a potential value of LdMAcP as an epidemiological or diagnostic tool. The extracellular orientation of the LdMAcP catalytic domain was confirmed in L. donovani promastigotes, wild-type (wt) and transgenic overexpressing a recombinant LdMAcP-mRFP1 (monomeric RFP1) chimera, as well as in transiently transfected mammalian cells expressing rLdMAcP-His. For the first time it is demonstrated in the present study that LdMAcP confers tartrate resistant acid ecto-phosphatase activity in live L. donovani promastigotes. The latter confirmed the long sought molecular identity of at least one enzyme contributing to this activity. Interestingly, the L. donovani rLdMAcP-mRFP1 promastigotes generated in this study, showed significantly higher infectivity and virulence indexes than control parasites in the infection of J774 mouse macrophages highlighting thereby a role for LdMAcP in the parasite's virulence.

  9. Functional characterization of the copper transcription factor AfMac1 from Aspergillus fumigatus.

    PubMed

    Park, Yong-Sung; Kim, Tae-Hyoung; Yun, Cheol-Won

    2017-07-03

    Although copper functions as a cofactor in many physiological processes, copper overload leads to harmful effects in living cells. Thus, copper homeostasis is tightly regulated. However, detailed copper metabolic pathways have not yet been identified in filamentous fungi. In this report, we investigated the copper transcription factor AfMac1 ( A spergillus f umigatus Mac1 homolog) and identified its regulatory mechanism in A. fumigatus AfMac1 has domains homologous to the DNA-binding and copper-binding domains of Mac1 from Saccharomyces cerevisiae , and AfMac1 efficiently complemented Mac1 in S. cerevisiae Expression of Afmac1 resulted in CTR1 up-regulation, and mutation of the DNA-binding domain of Afmac1 failed to activate CTR1 expression in S. cerevisiae The Afmac1 deletion strain of A. fumigatus failed to grow in copper-limited media, and its growth was restored by introducing ctrC We found that AfMac1 specifically bound to the promoter region of ctrC based on EMSA. The AfMac1-binding motif 5'-TGTGCTCA-3' was identified from the promoter region of ctrC , and the addition of mutant ctrC lacking the AfMac1-binding motif failed to up-regulate ctrC in A. fumigatus Furthermore, deletion of Afmac1 significantly reduced strain virulence and activated conidial killing activity by neutrophils and macrophages. Taken together, these results suggest that AfMac1 is a copper transcription factor that regulates cellular copper homeostasis in A. fumigatus . © 2017 The Author(s); published by Portland Press Limited on behalf of the Biochemical Society.

  10. An observational study on patient admission in the anaesthesia gas monitor and minimum alveolar concentration monitoring: A deficiency with huge impact

    PubMed Central

    Karim, Habib Md Reazaul; Narayan, Anilkumar; Yunus, Md; Kumar, Sanjay; Prakash, Avinash; Sahoo, Sarasa Kumar

    2017-01-01

    Background and Aims: Minimum alveolar concentration (MAC) monitoring is an integral part of modern-day anaesthesia. Both MAC and MAC-awake are age dependant, and age of the patient needs to be entered in the monitor. This study was aimed to assess the practice of patient birth year entry in the anaesthesia monitor and its impact on MAC monitoring. Methods: Sixty volatile anaesthetic-based general anaesthetics (GAs) were observed silently in two tertiary care teaching hospitals with regard to ‘birth year’ entry in the patient monitor. The impact on MAC for non-entry of age was assessed. The observed MAC reading and the MAC corrected for age (MACage) of the patients were noted. Paired t-test was used to compare the differences in observed MAC and MACage values. P <0.05 was significant. Results: Sixty GAs of patients aged between 10 and 68 years were observed; 96.67% anaesthetics were conducted without entering ‘birth year’. Thirty-four patients (mean age 35.14 ± 15.38 years) were further assessed for impact of non-entry of age. The observed MAC was similar to MACage in patients aged 40 ± 5 years (36–45 years group). Nearly 79.41% of the observed MACs were incorrect; 55.88% patients were potentially underdosed whereas 23.53% were overdosed. Conclusion: Omitting patient age entry in the monitor results in erroneous MAC values, exposing patients <40 years to underdosing and older patients to overdose. PMID:28794529

  11. PAD-MAC: Primary User Activity-Aware Distributed MAC for Multi-Channel Cognitive Radio Networks

    PubMed Central

    Ali, Amjad; Piran, Md. Jalil; Kim, Hansoo; Yun, Jihyeok; Suh, Doug Young

    2015-01-01

    Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum scarcity and provides a ubiquitous wireless access environment. CR-enabled secondary users (SUs) exploit spectrum white spaces opportunistically and immediately vacate the acquired licensed channels as primary users (PUs) arrive. Accessing the licensed channels without the prior knowledge of PU traffic patterns causes severe throughput degradation due to excessive channel switching and PU-to-SU collisions. Therefore, it is significantly important to design a PU activity-aware medium access control (MAC) protocol for cognitive radio networks (CRNs). In this paper, we first propose a licensed channel usage pattern identification scheme, based on a two-state Markov model, and then estimate the future idle slots using previous observations of the channels. Furthermore, based on these past observations, we compute the rank of each available licensed channel that gives SU transmission success assessment during the estimated idle slot. Secondly, we propose a PU activity-aware distributed MAC (PAD-MAC) protocol for heterogeneous multi-channel CRNs that selects the best channel for each SU to enhance its throughput. PAD-MAC controls SU activities by allowing them to exploit the licensed channels only for the duration of estimated idle slots and enables predictive and fast channel switching. To evaluate the performance of the proposed PAD-MAC, we compare it with the distributed QoS-aware MAC (QC-MAC) and listen-before-talk MAC schemes. Extensive numerical results show the significant improvements of the PAD-MAC in terms of the SU throughput, SU channel switching rate and PU-to-SU collision rate. PMID:25831084

  12. Open ISEmeter: An open hardware high-impedance interface for potentiometric detection.

    PubMed

    Salvador, C; Mesa, M S; Durán, E; Alvarez, J L; Carbajo, J; Mozo, J D

    2016-05-01

    In this work, a new open hardware interface based on Arduino to read electromotive force (emf) from potentiometric detectors is presented. The interface has been fully designed with the open code philosophy and all documentation will be accessible on web. The paper describes a comprehensive project including the electronic design, the firmware loaded on Arduino, and the Java-coded graphical user interface to load data in a computer (PC or Mac) for processing. The prototype was tested by measuring the calibration curve of a detector. As detection element, an active poly(vinyl chloride)-based membrane was used, doped with cetyltrimethylammonium dodecylsulphate (CTA(+)-DS(-)). The experimental measures of emf indicate Nernstian behaviour with the CTA(+) content of test solutions, as it was described in the literature, proving the validity of the developed prototype. A comparative analysis of performance was made by using the same chemical detector but changing the measurement instrumentation.

  13. PMICALC: an R code-based software for estimating post-mortem interval (PMI) compatible with Windows, Mac and Linux operating systems.

    PubMed

    Muñoz-Barús, José I; Rodríguez-Calvo, María Sol; Suárez-Peñaranda, José M; Vieira, Duarte N; Cadarso-Suárez, Carmen; Febrero-Bande, Manuel

    2010-01-30

    In legal medicine the correct determination of the time of death is of utmost importance. Recent advances in estimating post-mortem interval (PMI) have made use of vitreous humour chemistry in conjunction with Linear Regression, but the results are questionable. In this paper we present PMICALC, an R code-based freeware package which estimates PMI in cadavers of recent death by measuring the concentrations of potassium ([K+]), hypoxanthine ([Hx]) and urea ([U]) in the vitreous humor using two different regression models: Additive Models (AM) and Support Vector Machine (SVM), which offer more flexibility than the previously used Linear Regression. The results from both models are better than those published to date and can give numerical expression of PMI with confidence intervals and graphic support within 20 min. The program also takes into account the cause of death. 2009 Elsevier Ireland Ltd. All rights reserved.

  14. Alview: Portable Software for Viewing Sequence Reads in BAM Formatted Files.

    PubMed

    Finney, Richard P; Chen, Qing-Rong; Nguyen, Cu V; Hsu, Chih Hao; Yan, Chunhua; Hu, Ying; Abawi, Massih; Bian, Xiaopeng; Meerzaman, Daoud M

    2015-01-01

    The name Alview is a contraction of the term Alignment Viewer. Alview is a compiled to native architecture software tool for visualizing the alignment of sequencing data. Inputs are files of short-read sequences aligned to a reference genome in the SAM/BAM format and files containing reference genome data. Outputs are visualizations of these aligned short reads. Alview is written in portable C with optional graphical user interface (GUI) code written in C, C++, and Objective-C. The application can run in three different ways: as a web server, as a command line tool, or as a native, GUI program. Alview is compatible with Microsoft Windows, Linux, and Apple OS X. It is available as a web demo at https://cgwb.nci.nih.gov/cgi-bin/alview. The source code and Windows/Mac/Linux executables are available via https://github.com/NCIP/alview.

  15. 78 FR 65541 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Liquidity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ... Funding and Fiscal Affairs; Farmer Mac Liquidity Management AGENCY: Farm Credit Administration. ACTION... liquidity management regulations for the Federal Agricultural Mortgage Corporation (Farmer Mac). The purpose of the final rule is to strengthen liquidity risk management at Farmer Mac, improve the quality of...

  16. GeNN: a code generation framework for accelerated brain simulations

    NASA Astrophysics Data System (ADS)

    Yavuz, Esin; Turner, James; Nowotny, Thomas

    2016-01-01

    Large-scale numerical simulations of detailed brain circuit models are important for identifying hypotheses on brain functions and testing their consistency and plausibility. An ongoing challenge for simulating realistic models is, however, computational speed. In this paper, we present the GeNN (GPU-enhanced Neuronal Networks) framework, which aims to facilitate the use of graphics accelerators for computational models of large-scale neuronal networks to address this challenge. GeNN is an open source library that generates code to accelerate the execution of network simulations on NVIDIA GPUs, through a flexible and extensible interface, which does not require in-depth technical knowledge from the users. We present performance benchmarks showing that 200-fold speedup compared to a single core of a CPU can be achieved for a network of one million conductance based Hodgkin-Huxley neurons but that for other models the speedup can differ. GeNN is available for Linux, Mac OS X and Windows platforms. The source code, user manual, tutorials, Wiki, in-depth example projects and all other related information can be found on the project website http://genn-team.github.io/genn/.

  17. GeNN: a code generation framework for accelerated brain simulations.

    PubMed

    Yavuz, Esin; Turner, James; Nowotny, Thomas

    2016-01-07

    Large-scale numerical simulations of detailed brain circuit models are important for identifying hypotheses on brain functions and testing their consistency and plausibility. An ongoing challenge for simulating realistic models is, however, computational speed. In this paper, we present the GeNN (GPU-enhanced Neuronal Networks) framework, which aims to facilitate the use of graphics accelerators for computational models of large-scale neuronal networks to address this challenge. GeNN is an open source library that generates code to accelerate the execution of network simulations on NVIDIA GPUs, through a flexible and extensible interface, which does not require in-depth technical knowledge from the users. We present performance benchmarks showing that 200-fold speedup compared to a single core of a CPU can be achieved for a network of one million conductance based Hodgkin-Huxley neurons but that for other models the speedup can differ. GeNN is available for Linux, Mac OS X and Windows platforms. The source code, user manual, tutorials, Wiki, in-depth example projects and all other related information can be found on the project website http://genn-team.github.io/genn/.

  18. GeNN: a code generation framework for accelerated brain simulations

    PubMed Central

    Yavuz, Esin; Turner, James; Nowotny, Thomas

    2016-01-01

    Large-scale numerical simulations of detailed brain circuit models are important for identifying hypotheses on brain functions and testing their consistency and plausibility. An ongoing challenge for simulating realistic models is, however, computational speed. In this paper, we present the GeNN (GPU-enhanced Neuronal Networks) framework, which aims to facilitate the use of graphics accelerators for computational models of large-scale neuronal networks to address this challenge. GeNN is an open source library that generates code to accelerate the execution of network simulations on NVIDIA GPUs, through a flexible and extensible interface, which does not require in-depth technical knowledge from the users. We present performance benchmarks showing that 200-fold speedup compared to a single core of a CPU can be achieved for a network of one million conductance based Hodgkin-Huxley neurons but that for other models the speedup can differ. GeNN is available for Linux, Mac OS X and Windows platforms. The source code, user manual, tutorials, Wiki, in-depth example projects and all other related information can be found on the project website http://genn-team.github.io/genn/. PMID:26740369

  19. Make Movies out of Your Dynamical Simulations with OGRE!

    NASA Astrophysics Data System (ADS)

    Tamayo, Daniel; Douglas, R. W.; Ge, H. W.; Burns, J. A.

    2013-10-01

    We have developed OGRE, the Orbital GRaphics Environment, an open-source project comprising a graphical user interface that allows the user to view the output from several dynamical integrators (e.g., SWIFT) that are commonly used for academic work. One can interactively vary the display speed, rotate the view and zoom the camera. This makes OGRE a great tool for students or the general public to explore accurate orbital histories that may display interesting dynamical features, e.g. the destabilization of Solar System orbits under the Nice model, or interacting pairs of exoplanets. Furthermore, OGRE allows the user to choreograph sequences of transformations as the simulation is played to generate movies for use in public talks or professional presentations. The graphical user interface is coded using Qt to ensure portability across different operating systems. OGRE will run on Linux and Mac OS X. The program is available as a self-contained executable, or as source code that the user can compile. We are continually updating the code, and hope that people who find it useful will contribute to the development of new features.

  20. Make Movies out of Your Dynamical Simulations with OGRE!

    NASA Astrophysics Data System (ADS)

    Tamayo, Daniel; Douglas, R. W.; Ge, H. W.; Burns, J. A.

    2014-01-01

    We have developed OGRE, the Orbital GRaphics Environment, an open-source project comprising a graphical user interface that allows the user to view the output from several dynamical integrators (e.g., SWIFT) that are commonly used for academic work. One can interactively vary the display speed, rotate the view and zoom the camera. This makes OGRE a great tool for students or the general public to explore accurate orbital histories that may display interesting dynamical features, e.g. the destabilization of Solar System orbits under the Nice model, or interacting pairs of exoplanets. Furthermore, OGRE allows the user to choreograph sequences of transformations as the simulation is played to generate movies for use in public talks or professional presentations. The graphical user interface is coded using Qt to ensure portability across different operating systems. OGRE will run on Linux and Mac OS X. The program is available as a self-contained executable, or as source code that the user can compile. We are continually updating the code, and hope that people who find it useful will contribute to the development of new features.

  1. Phase Relations and Miscibility in Polymer Blends Containing Copolymers.

    DTIC Science & Technology

    1986-04-15

    MacKnight, W. J ., Pure Appl. Chem. 52, 409 (1980). 36. Vukovic , R., Kuresevic, V., Karasz, F. E., and MacKnight, W. J ., Thermochim. Acta 54, 349 (1982). 37... Vukovic , R., Karasz, F. E., and MacKnight, W. J ., Polymer 24, 529 (1983). 38. Vukovic , R., Karasz, F. E., and MacKnight, W. J ., J . Appl. Polymer Sci...28, 219 (1983). 39. Zacharius, S. L., ten Brinke, G., MacKnight, W. J ., and Karasz, F. E., Macromolecules 16, 381 (1983). 40. Vukovic , R., Kuresevic

  2. DOE Fire Protection Handbook, Volume I

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The Department of Energy (DOE) Fire Protection Program is delineated in a number of source documents including; the Code of Federal Regulations (CFR), DOE Policy Statements and Orders, DOE and national consensus standards (such as those promulgated by the National Fire Protection Association), and supplementary guidance, This Handbook is intended to bring together in one location as much of this material as possible to facilitate understanding and ease of use. The applicability of any of these directives to individual Maintenance and Operating Contractors or to given facilities and operations is governed by existing contracts. Questions regarding applicability should be directedmore » to the DOE Authority Having Jurisdiction for fire safety. The information provided within includes copies of those DOE directives that are directly applicable to the implementation of a comprehensive fire protection program. They are delineated in the Table of Contents. The items marked with an asterisk (*) are included on the disks in WordPerfect 5.1 format, with the filename noted below. The items marked with double asterisks are provided as hard copies as well as on the disk. For those using MAC disks, the files are in Wordperfect 2.1 for MAC.« less

  3. Parents' Experiences and Perceptions when Classifying their Children with Cerebral Palsy: Recommendations for Service Providers.

    PubMed

    Scime, Natalie V; Bartlett, Doreen J; Brunton, Laura K; Palisano, Robert J

    2017-08-01

    This study investigated the experiences and perceptions of parents of children with cerebral palsy (CP) when classifying their children using the Gross Motor Function Classification System (GMFCS), the Manual Ability Classification System (MACS), and the Communication Function Classification System (CFCS). The second aim was to collate parents' recommendations for service providers on how to interact and communicate with families. A purposive sample of seven parents participating in the On Track study was recruited. Semi-structured interviews were conducted orally and were audiotaped, transcribed, and coded openly. A descriptive interpretive approach within a pragmatic perspective was used during analysis. Seven themes encompassing parents' experiences and perspectives reflect a process of increased understanding when classifying their children, with perceptions of utility evident throughout this process. Six recommendations for service providers emerged, including making the child a priority and being a dependable resource. Knowledge of parents' experiences when using the GMFCS, MACS, and CFCS can provide useful insight for service providers collaborating with parents to classify function in children with CP. Using the recommendations from these parents can facilitate family-provider collaboration for goal setting and intervention planning.

  4. Library Signage: Applications for the Apple Macintosh and MacPaint.

    ERIC Educational Resources Information Center

    Diskin, Jill A.; FitzGerald, Patricia

    1984-01-01

    Describes specific applications of the Macintosh computer at Carnegie-Mellon University Libraries, where MacPaint was used as a flexible, easy to use, and powerful tool to produce informational, instructional, and promotional signage. Profiles of system hardware and software, an evaluation of the computer program MacPaint, and MacPaint signage…

  5. Antibiotic Resistance Mediated by the MacB ABC Transporter Family: A Structural and Functional Perspective.

    PubMed

    Greene, Nicholas P; Kaplan, Elise; Crow, Allister; Koronakis, Vassilis

    2018-01-01

    The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking.

  6. [Effects of xenon preconditioning against ischemia/reperfusion injury and oxidative stress in immature heart].

    PubMed

    Li, Qian; Lian, Chun-Wei; Fang, Li-Qun; Liu, Bin; Yang, Bo

    2014-09-01

    To investigate whether xenon preconditioning (PC) could protect immature myocardium against ischemia-reperfusion (I/R) injury in a dose-dependent manner and clarify the role of xenon PC on oxidative stress. Forty-eight isolated perfused immature rabbit hearts were randomly divided into four groups (n = 12): The sham group had the hearts perfused continuously for 300 min. In I/R group, the hearts were subjected to 60 min perfusion followed by 60 min ischemia and 180 min reperfusion. In 1 minimum alveolar concentration (MAC) and 0.5 MAC xenon PC groups, the hearts were preconditioned with 1 MAC or 0.5 MAC xenon respectively, following 60 min ischemia and 180 min reperfusion. The cardiac function, myocardial infarct size, mitochondrial structure, superoxide dismutase (SOD) activity and malondialdehyde (MDA) level in each group were determined after reperfusion. Compared with I/R group, both 1 MAC and 0. 5 MAC xenon preconditioning significantly improved cardiac function (P < 0.01), reduced myocardial infarct size (P < 0.01) and mitochondrial damage, increased SOD activity and decreased MDA level (P < 0.01). There were no differences between 1 MAC group and 0.5 MAC xenon group (P > 0.05). Xenon preconditioning at 0. 5 and 1 MAC produce similar cardioprotective effects against I/R injury in isolated perfused immature heart.

  7. Current evidence for the use of C-MAC videolaryngoscope in adult airway management: a review of the literature

    PubMed Central

    Xue, Fu-Shan; Li, Hui-Xian; Liu, Ya-Yang; Yang, Gui-Zhen

    2017-01-01

    The C-MAC videolaryngoscope is the first Macintosh-typed videolaryngoscope. Since the advent of its original version video Macintosh system in 1999, this device has been modified several times. A unique feature of C-MAC device is its ability to provide the 2 options of direct and video laryngoscopy with the same device. The available evidence shows that in patients with normal airways, C-MAC videolaryngoscope compared with direct laryngoscopy can provide comparable or better laryngeal views and exerts less force on maxillary incisors, but does not offer conclusive benefits with regard to intubation time, intubation success, number of intubation attempts, the use of adjuncts, and hemodynamic responses to intubation. In patients with predicted or known difficult airways, C-MAC videolaryngoscope can achieve a better laryngeal view, a higher intubation success rate and a shorter intubation time than direct laryngoscopy. Furthermore, the option to perform direct and video laryngoscopy with the same device makes C-MAC videolaryngoscope exceptionally useful for emergency intubation. In addition, the C-MAC videolaryngoscope is a very good tool for tracheal intubation teaching. However, tracheal intubation with C-MAC videolaryngoscope may occasionally fail and introduction of C-MAC videolaryngoscope in clinical practice must be accompanied by formal training programs in normal and difficult airway managements. PMID:28740393

  8. Effect of fentanyl and lidocaine on the end-tidal sevoflurane concentration preventing motor movement in dogs.

    PubMed

    Suarez, Martin A; Seddighi, Reza; Egger, Christine M; Rohrbach, Barton W; Cox, Sherry K; KuKanich, Butch K; Doherty, Thomas J

    2017-01-01

    OBJECTIVE To determine effects of fentanyl, lidocaine, and a fentanyl-lidocaine combination on the minimum alveolar concentration of sevoflurane preventing motor movement (MAC NM ) in dogs. ANIMALS 6 adult Beagles. PROCEDURES Dogs were anesthetized with sevoflurane in oxygen 3 times (1-week intervals). Baseline MAC NM (MAC NM-B ) was determined starting 45 minutes after induction of anesthesia. Dogs then received 1 of 3 treatments IV: fentanyl (loading dose, 15 μg/kg; constant rate infusion [CRI], 6 μg/kg/h), lidocaine (loading dose, 2 mg/kg; CRI, 6 mg/kg/h), and the fentanyl-lidocaine combination at the same doses. Determination of treatment MAC NM (MAC NM-T ) was initiated 90 minutes after start of the CRI. Venous blood samples were collected at the time of each treatment MAC NM measurement for determination of plasma concentrations of fentanyl and lidocaine. RESULTS Mean ± SEM overall MAC NM-B for the 3 treatments was 2.70 ± 0.27 vol%. The MAC NM decreased from MAC NM-B to MAC NM-T by 39%, 21%, and 55% for fentanyl, lidocaine, and the fentanyl-lidocaine combination, respectively. This decrease differed significantly among treatments. Plasma fentanyl concentration was 3.25 and 2.94 ng/mL for fentanyl and the fentanyl-lidocaine combination, respectively. Plasma lidocaine concentration was 2,570 and 2,417 ng/mL for lidocaine and the fentanyl-lidocaine combination, respectively. Plasma fentanyl and lidocaine concentrations did not differ significantly between fentanyl and the fentanyl-lidocaine combination or between lidocaine and the fentanyl-lidocaine combination. CONCLUSIONS AND CLINICAL RELEVANCE CRIs of fentanyl, lidocaine, and the fentanyl-lidocaine combination at the doses used were associated with clinically important and significant decreases in the MAC NM of sevoflurane in dogs.

  9. Awake Craniotomy Anesthesia: A Comparison of the Monitored Anesthesia Care and Asleep-Awake-Asleep Techniques.

    PubMed

    Eseonu, Chikezie I; ReFaey, Karim; Garcia, Oscar; John, Amballur; Quiñones-Hinojosa, Alfredo; Tripathi, Punita

    2017-08-01

    Commonly used sedation techniques for an awake craniotomy include monitored anesthesia care (MAC), using an unprotected airway, and the asleep-awake-asleep (AAA) technique, using a partially or totally protected airway. We present a comparative analysis of the MAC and AAA techniques, evaluating anesthetic management, perioperative outcomes, and complications in a consecutive series of patients undergoing the removal of an eloquent brain lesion. Eighty-one patients underwent awake craniotomy for an intracranial lesion over a 9-year period performed by a single-surgeon and a team of anesthesiologists. Fifty patients were treated using the MAC technique, and 31 were treated using the AAA technique. A retrospective analysis evaluated anesthetic management, intraoperative complications, postoperative outcomes, pain management, and complications. The MAC and AAA groups had similar preoperative patient and tumor characteristics. Mean operative time was shorter in the MAC group (283.5 minutes vs. 313.3 minutes; P = 0.038). Hypertension was the most common intraoperative complication seen (8% in the MAC group vs. 9.7% in the AAA group; P = 0.794). Intraoperative seizure occurred at a rate of 4% in the MAC group and 3.2% in the AAA group (P = 0.858). Awake cases were converted to general anesthesia in no patients in the MAC group and in 1 patient (3.2%) in the AAA group (P = 0.201). No cases were aborted in either group. The mean hospital length of stay was 3.98 days in the MAC group and 3.84 days in the AAA group (P = 0.833). Both the MAC and AAA sedation techniques provide an efficacious and safe method for managing awake craniotomy cases and produce similar perioperative outcomes, with the MAC technique associated with shorter operative time. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Efficient removal of amoxicillin and paracetamol from aqueous solutions using magnetic activated carbon.

    PubMed

    Saucier, Caroline; Karthickeyan, P; Ranjithkumar, V; Lima, Eder C; Dos Reis, Glaydson S; de Brum, Irineu A S

    2017-02-01

    Activated carbon (AC)/CoFe 2 O 4 nanocomposites, MAC-1 and MAC-2, were prepared by a simple pyrolytic method using a mixture of iron(III)/cobalt(II) benzoates and iron(III)/cobalt(II) oxalates, respectively, and were used as efficient adsorbents for the removal of amoxicillin (AMX) and paracetamol (PCT) of aqueous effluents. The synthesized nanocomposites were characterized by X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FT-IR), vibrating sample magnetometry (VSM), scanning electron microscopy (SEM), energy dispersive X-ray spectroscopy (EDX) and transmission electron microscopy (TEM). The sizes of cobalt ferrite nanoparticles formed from benzoates of iron(III)/cobalt(II) and oxalates of iron(III)/cobalt(II) precursors were in the ranges of 5-80 and 6-27 nm, respectively. The saturation magnetization (M s ), remanence (M r ) and coercivity (H c ) of the MAC-2 nanocomposites were found to be 3.07 emu g -1 , 1.36 emu g -1 and 762.49 Oe; for MAC-1, they were 0.2989 emu g -1 , 0.0466 emu g -1 and 456.82 Oe. The adsorption kinetics and isotherm studies were investigated, and the results showed that the as-prepared nanocomposites MAC-1 and MAC-2 could be utilized as an efficient, magnetically separable adsorbent for environmental cleanup. The maximum sorption capacities obtained were 280.9 and 444.2 mg g -1 of AMX for MAC-1 and MAC-2, respectively, and 215.1 and 399.9 mg g -1 of PCT using MAC-1 and MAC-2, respectively. Both adsorbents were successfully used for simulated hospital effluents, removing at least 93.00 and 96.77% for MAC-1 and MAC-2, respectively, of a mixture of nine pharmaceuticals with high concentrations of sugars, organic components and saline concentrations.

  11. Refractory inclusions from the ungrouped carbonaceous chondrites MAC 87300 and MAC 88107

    NASA Astrophysics Data System (ADS)

    Russell, Sara S.; Davis, Andrew M.; MacPherson, Glenn J.; Guan, Yunbin; Huss, Gary R.

    2000-09-01

    MAC 87300 and MAC 88107 are two unusual carbonaceous chondrites that are intermediate in chemical composition between the CO3 and CM2 meteorite groups. Calcium-aluminum-rich inclusions (CAIs) from these two meteorites are mostly spinel-pyroxene and melilite-rich (Type A) varieties. Spinel-pyroxene inclusions have either a banded or nodular texture, with aluminous diopside rimming iron-poor spinel. Melilite-rich inclusions (4-42) are irregular in shape and contain minor spinel (FeO <1 wt%), perovskite and, more rarely, hibonite. The CAIs in MAC 88107 and MAC 87300 are similar in primary mineralogy to CAIs from low petrologic grade CO3 meteorites, but differ in that they commonly contain phyllosilicates. The two meteorites also differ somewhat from each other: melilite is more abundant and slightly more aluminum-rich in inclusions from MAC 88107 than in those from MAC 87300, and phyllosilicate is more abundant and magnesium-poor in MAC 87300 CAIs relative to that in MAC 88107. These differences suggest that the two meteorites are not paired. CAI sizes and the abundance of melilite-rich CAIs in MAC 88107 and MAC 87300 suggests a genetic relationship to CO3 meteorites, but the CAIs in both have suffered a greater degree of aqueous alteration than is observed in COs. Al-rich melilite in CAIs from both meteorites generally contains excess 26Mg, presumably from the in situ decay of 26Al. Although well-defined isochrons are not observed, the 26Mg excesses are consistent with initial 26Al/27Al ~3-5 ( 10-5. An unusual hibonite-bearing inclusion is isotopically heterogeneous, with two large and abutting hibonite crystals showing significant differences in their degrees of mass-dependent fractionation of 25Mg/24Mg. The two crystals also show differences in their inferred initial 26Al/27Al, 1 ( 10-5 vs. 3 ( 10-6.

  12. System and method for authentication

    DOEpatents

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  13. Photocopy of drawing (original drawing of MacDill Field in possession ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing (original drawing of MacDill Field in possession of MacDill Air Force Base, Civil Engineering, Tampa, Florida; site plan dated December, 1942) BASE LAYOUT, DECEMBER 1942 - MacDill Air Force Base, Bounded by City of Tampa North, Tampa Bay South, Old Tampa Bay West, & Hillsborough Bay East, Tampa, Hillsborough County, FL

  14. Generic Drug Cost Containment in Medicaid: Lessons from Five State MAC Programs

    PubMed Central

    Abramson, Richard G.; Harrington, Catherine A.; Missmar, Raad; Li, Susan P.; Mendelson, Daniel N.

    2004-01-01

    In Medicaid, generic drug cost containment revolves around two programs: the Federal upper limit (FUL) program and State maximum allowable cost (MAC) programs. This article analyzes MAC programs in five States and finds considerable variation between these programs and the FUL program in both size and pricing aggressiveness. We conclude that expansion of existing MAC programs and creation of new ones could contribute to cost containment efforts nationwide. Options for States seeking to optimize their efforts include focusing on pricing for drugs with high sales volumes, ensuring that MAC lists include prices for all forms and dosages of listed drug entities, and collaborating with other States or the Federal Government on MAC list operations. PMID:15229994

  15. Effects of carprofen and morphine on the minimum alveolar concentration of isoflurane in dogs.

    PubMed

    Ko, Jeff C H; Weil, Ann B; Inoue, Tomohito

    2009-01-01

    The minimum alveolar concentration (MAC) of isoflurane in dogs was determined following carprofen (2.2 mg/kg per os) alone, morphine (1 mg/kg intravenously) alone, carprofen and morphine, and no drug control in eight healthy adult dogs. Isoflurane MAC following administration of morphine alone (0.81%+/-0.18%) or carprofen and morphine (0.68%+/-0.31%) was significantly less than the control MAC (1.24%+/-0.15%). Isoflurane MAC after carprofen alone (1.13%+/-0.13%) was not significantly different from the control value. Results indicated that administration of morphine alone or in combination with carprofen significantly reduced the MAC of isoflurane in dogs. The isoflurane MAC reduction was additive between the effects of carprofen and morphine.

  16. Body-related pride in young adults: an exploration of the triggers, contexts, outcomes and attributions.

    PubMed

    Castonguay, Andree L; Gilchrist, Jenna D; Mack, Diane E; Sabiston, Catherine M

    2013-06-01

    This study explored body-related emotional experiences of pride in young adult males (n=138) and females (n=165). Data were collected using a relived emotion task and analyzed using inductive content analysis. Thirty-nine codes were identified and grouped into six categories (triggers, contexts, cognitive attributions, and affective, cognitive, and behavioral outcomes) for each of two themes (hubristic and authentic pride). Hubristic pride triggers included evaluating appearance/fitness as superior. Cognitions centered on feelings of superiority. Behaviors included strategies to show off. Triggers for authentic pride were personal improvements/maintenance in appearance and meeting or exceeding goals. Feeling accomplished was a cognitive outcome, and physical activity was a behavioral strategy. Contexts for the experience of both facets of pride primarily involved sports settings, swimming/beach, and clothes shopping. These findings provide theoretical support for models of pride as it applies to body image, and advances conceptual understanding of positive body image. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    ERIC Educational Resources Information Center

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  18. Effects of butorphanol and carprofen on the minimal alveolar concentration of isoflurane in dogs.

    PubMed

    Ko, J C; Lange, D N; Mandsager, R E; Payton, M E; Bowen, C; Kamata, A; Kuo, W C

    2000-10-01

    To evaluate the effects of butorphanol and carprofen, alone and in combination, on the minimal alveolar concentration (MAC) of isoflurane in dogs. Randomized complete-block crossover study. 6 healthy adult dogs. Minimal alveolar concentration of isoflurane was determined following administration of carprofen alone, butorphanol alone, carprofen and butorphanol, and neither drug (control). Anesthesia was induced with isoflurane in oxygen, and MAC was determined by use of a tail clamp method. Three hours prior to induction of anesthesia, dogs were fed a small amount of canned food without any drugs (control) or with carprofen (2.2 mg/kg of body weight [1 mg/lb]). Following initial determination of MAC, butorphanol (0.4 mg/kg [0.18 mg/lb], i.v.) was administered, and MAC was determined again. Heart rate, respiratory rate, indirect arterial blood pressure, endtidal partial pressure of CO2, and saturation of hemoglobin with oxygen were recorded at the time MAC was determined. Mean +/- SD MAC of isoflurane following administration of butorphanol alone (1.03 +/- 0.22%) or carprofen and butorphanol (0.90 +/- 0.21%) were significantly less than the control MAC (1.28 +/- 0.14%), but MAC after administration of carprofen alone (1.20 +/- 0.13%) was not significantly different from the control value. The effects of carprofen and butorphanol on the MAC of isoflurane were additive. There were not any significant differences among treatments in regard to cardiorespiratory data. Results suggest that administration of butorphanol alone or in combination with carprofen significantly reduces the MAC of isoflurane in dogs; however, the effects of butorphanol and carprofen are additive, not synergistic.

  19. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  20. Suppression of c-Myc induces apoptosis via an AMPK/mTOR-dependent pathway by 4-O-methyl-ascochlorin in leukemia cells.

    PubMed

    Shin, Jae-Moon; Jeong, Yun-Jeong; Cho, Hyun-Ji; Magae, Junji; Bae, Young-Seuk; Chang, Young-Chae

    2016-05-01

    4-O-Methyl-ascochlorin (MAC) is a methylated derivative of the prenyl-phenol antibiotic ascochlorin, which was isolated from an incomplete fungus, Ascochyta viciae. Although the effects of MAC on apoptosis have been reported, the underlying mechanisms remain unknown. Here, we show that MAC promoted apoptotic cell death and downregulated c-Myc expression in K562 human leukemia cells. The effect of MAC on apoptosis was similar to that of 10058-F4 (a c-Myc inhibitor) or c-Myc siRNA, suggesting that the downregulation of c-Myc expression plays a role in the apoptotic effect of MAC. Further investigation showed that MAC downregulated c-Myc by inhibiting protein synthesis. MAC promoted the phosphorylation of AMP-activated protein kinase (AMPK) and inhibited the phosphorylation of mammalian target of rapamycin (mTOR) and its target proteins, including p70S6 K and 4E-BP-1. Treatment of cells with AICAR (an AMPK activator), rapamycin (an mTOR inhibitor), or mTOR siRNA downregulated c-Myc expression and induced apoptosis to a similar extent to that of MAC. These results suggest that the effect of MAC on apoptosis induction in human leukemia cells is mediated by the suppression of c-Myc protein synthesis via an AMPK/mTOR-dependent mechanism.

  1. THE ISOLATION AND IDENTIFICATION OF MYCOBACTERIUM AVIUM COMPLEX (MAC) RECOVERED FROM LOS ANGELES POTABLE WATER, A POSSIBLE SOURCE OF INFECTION IN AIDS PATIENTS

    EPA Science Inventory

    Los Angeles water was investigated as a possible source of Mycobacterium avium complex (MAC) infection in patients with AIDS. MAC consists of M.avium (MA), M. intracellulare (MI) and Mycobacterium X (MX)(positive for MAC by DNA probe but not MA or MI). The study included 13 reser...

  2. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a... title. All waters within Tampa Bay, Florida in the vicinity of MacDill Air Force Base, including...

  3. Introduction to MacDraft. High-Technology Training Module.

    ERIC Educational Resources Information Center

    Traxler, Gene

    This training module on MacDraft is part of a computer drafting skills unit on communications technology for grades 9-12. The objective is for each student to complete a drawing on the MacIntosh computer using the MacDraft software program. This drawing is to be dimensioned with a dual system and is to include a border and title block. This module…

  4. Antibiotic Resistance Mediated by the MacB ABC Transporter Family: A Structural and Functional Perspective

    PubMed Central

    Greene, Nicholas P.; Kaplan, Elise; Crow, Allister; Koronakis, Vassilis

    2018-01-01

    The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking. PMID:29892271

  5. [Spanish validation of the MacArthur Competence Assessment Tool for Treatment interview to assess patients competence to consent treatment].

    PubMed

    Alvarez Marrodán, Ignacio; Baón Pérez, Beatriz; Navío Acosta, Mercedes; López-Antón, Raul; Lobo Escolar, Elena; Ventura Faci, Tirso

    2014-09-09

    To validate the MacArthur Competence Assessment Tool for Treatment (MacCAT-T) Spanish version, which assesses the mental capacity of patients to consent treatment, by examining 4 areas (Understanding, Appreciation, Reasoning and Expressing a choice). 160 subjects (80 Internal Medicine inpatients, 40 Psychiatric inpatients and 40 healthy controls). MacCAT-T, Mini-Mental Status Examination (MMSE). Feasibility study, reliability and validity calculations (against to gold standard of clinical expert). Mean duration of the MacCAT-T interview was 18min. Inter-rater reliability: Intraclass correlation coefficient for Understanding=0.98, Appreciation=0.97, Reasoning=0.98, Expressing a choice=0.91. Internal consistency (Cronbach's alpha): Understanding=0.87, for Appreciation=0.76, for Reasoning=0.86. Patients considered to be incapable (gold standard) scored lower in all the MacCAT-T areas. Poor performance on the MacCAT-T was related to cognitive impairment assessed by MMSE. Spanish version of the MacCAT-T is feasible, reliable, and valid for assessing the capacity of patients to consent treatment. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  6. Serrated adenocarcinoma morphology in colorectal mucinous adenocarcinoma is associated with improved patient survival

    PubMed Central

    Lee, Chung-Ta; Chow, Nan-Haw; Su, Pei-Fang; Ho, Chung-Liang; Tsai, Hung-Wen; Chen, Yi-Lin; Lin, Shao-Chieh; Lin, Bo-Wen; Lin, Peng-Chan; Lee, Jenq-Chang

    2017-01-01

    Colorectal mucinous adenocarcinoma (MAC) and serrated adenocarcinoma (SAC) share many characteristics, including right-side colon location, frequent mucin production, and various molecular features. This study examined the frequency of SAC morphology in MACs. We assessed the correlation of SAC morphology with clinicopathological parameters, molecular characteristics, and patient prognosis. Eighty-eight colorectal MACs were collected and reviewed for SAC morphology according to Makinen's criteria. We sequenced KRAS and BRAF, assessed CpG island methylator phenotype (CIMP) frequency, and analyzed DNA mismatch repair enzyme levels using immunohistochemistry in tumor samples. SAC morphology was observed in 38% of MACs, and was associated with proximal location (P=0.001), BRAF mutation (P=0.042), CIMP-positive status (P=0.023), and contiguous traditional serrated adenoma (P=0.019). Multivariate analysis revealed that MACs without both SAC morphology and CIMP-positive status exhibited 3.955 times greater risk of cancer relapse than MACs having both characteristics or either one (P=0.035). Our results show that two MAC groups with distinct features can be identified using Makinen's criteria, and suggest a favorable prognostic role for the serrated neoplastic pathway in colorectal MAC. PMID:28422723

  7. Considerations for Improving the Capacity and Performance of AeroMACS

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Kamali, Behnam; Apaza, Rafael D.; Wilson, Jeffrey D.; Dimond, Robert P.

    2014-01-01

    The Aeronautical Mobile Airport Communications System (AeroMACS) has progressed from concept through prototype development, testing, and standards development and is now poised for the first operational deployments at nine US airports by the Federal Aviation Administration. These initial deployments will support fixed applications. Mobile applications providing connectivity to and from aircraft and ground-based vehicles on the airport surface will occur at some point in the future. Given that many fixed applications are possible for AeroMACS, it is necessary to now consider whether the existing capacity of AeroMACS will be reached even before the mobile applications are ready to be added, since AeroMACS is constrained by both available bandwidth and transmit power limitations. This paper describes some concepts that may be applied to improve the future capacity of AeroMACS, with a particular emphasis on gains that can be derived from the addition of IEEE 802.16j multihop relays to the AeroMACS standard, where a significant analysis effort has been undertaken.

  8. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    PubMed

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  9. An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    PubMed Central

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay. PMID:22319385

  10. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid

    PubMed Central

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-01-01

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid. PMID:27043573

  11. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.

    PubMed

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-03-31

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  12. Interference Analysis Status and Plans for Aeronautical Mobile Airport Communications System (AeroMACS)

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Wilson, Jeffrey D.

    2010-01-01

    Interference issues related to the operation of an aeronautical mobile airport communications system (AeroMACS) in the C-Band (specifically 5091-5150 MHz) is being investigated. The issue of primary interest is co-channel interference from AeroMACS into mobile-satellite system (MSS) feeder uplinks. The effort is focusing on establishing practical limits on AeroMACS transmissions from airports so that the threshold of interference into MSS is not exceeded. The analyses are being performed with the software package Visualyse Professional, developed by Transfinite Systems Limited. Results with omni-directional antennas and plans to extend the models to represent AeroMACS more accurately will be presented. These models should enable realistic analyses of emerging AeroMACS designs to be developed from NASA Test Bed, RTCA 223, and European results.

  13. Cardiac macrophages adopt profibrotic/M2 phenotype in infarcted hearts: Role of urokinase plasminogen activator.

    PubMed

    Carlson, Signe; Helterline, Deri; Asbe, Laura; Dupras, Sarah; Minami, Elina; Farris, Stephen; Stempien-Otero, April

    2017-07-01

    Macrophages (mac) that over-express urokinase plasminogen activator (uPA) adopt a profibrotic M2 phenotype in the heart in association with cardiac fibrosis. We tested the hypothesis that cardiac macs are M2 polarized in infarcted mouse and human hearts and that polarization is dependent on mac-derived uPA. Studies were performed using uninjured (UI) or infarcted (MI) hearts of uPA overexpressing (SR-uPA), uPA null, or nontransgenic littermate (Ntg) mice. At 7days post-infarction, cardiac mac were isolated, RNA extracted and M2 markers Arg1, YM1, and Fizz1 measured with qrtPCR. Histologic analysis for cardiac fibrosis, mac and myofibroblasts was performed at the same time-point. Cardiac macs were also isolated from Ntg hearts and RNA collected after primary isolation or culture with vehicle, IL-4 or plasmin and M2 marker expression measured. Cardiac tissue and blood was collected from humans with ischemic heart disease. Expression of M2 marker CD206 and M1 marker TNFalpha was measured. Macs from WT mice had increased expression of Arg1 and Ym1 following MI (41.3±6.5 and 70.3±36, fold change vs UI, n=8, P<0.007). There was significant up-regulation of cardiac mac Arg1 and YM1 with MI in both WT and uPA null mice (n=4-9 per genotype and condition). Treatment with plasmin increased expression of Arg1 and YM1 in cultured cardiac macs. Histologic analysis revealed increased density of activated fibroblasts and M2 macs in SR-uPA hearts post-infarction with associated increases in fibrosis. Cardiac macs isolated from human hearts with ischemic heart disease expressed increased levels of the M2 marker CD206 in comparison to blood-derived macs (4.9±1.3). Cardiac macs in mouse and human hearts adopt a M2 phenotype in association with fibrosis. Plasmin can induce an M2 phenotype in cardiac macs. However, M2 activation can occur in the heart in vivo in the absence of uPA indicating that alternative pathways to activate plasmin are present in the heart. Excess uPA promotes increased fibroblast density potentially via potentiating fibroblast migration or proliferation. Altering macrophage phenotype in the heart is a potential target to modify cardiac fibrosis. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Isolation and characterisation of human gingival margin-derived STRO-1/MACS+ and MACS− cell populations

    PubMed Central

    El-Sayed, Karim M Fawzy; Paris, Sebastian; Graetz, Christian; Kassem, Neemat; Mekhemar, Mohamed; Ungefroren, Hendrick; Fändrich, Fred; Dörfer, Christof

    2015-01-01

    Recently, gingival margin-derived stem/progenitor cells isolated via STRO-1/magnetic activated cell sorting (MACS) showed remarkable periodontal regenerative potential in vivo. As a second-stage investigation, the present study's aim was to perform in vitro characterisation and comparison of the stem/progenitor cell characteristics of sorted STRO-1-positive (MACS+) and STRO-1-negative (MACS−) cell populations from the human free gingival margin. Cells were isolated from the free gingiva using a minimally invasive technique and were magnetically sorted using anti-STRO-1 antibodies. Subsequently, the MACS+ and MACS− cell fractions were characterized by flow cytometry for expression of CD14, CD34, CD45, CD73, CD90, CD105, CD146/MUC18 and STRO-1. Colony-forming unit (CFU) and multilineage differentiation potential were assayed for both cell fractions. Mineralisation marker expression was examined using real-time polymerase chain reaction (PCR). MACS+ and MACS− cell fractions showed plastic adherence. MACS+ cells, in contrast to MACS− cells, showed all of the predefined mesenchymal stem/progenitor cell characteristics and a significantly higher number of CFUs (P<0.01). More than 95% of MACS+ cells expressed CD105, CD90 and CD73; lacked the haematopoietic markers CD45, CD34 and CD14, and expressed STRO-1 and CD146/MUC18. MACS− cells showed a different surface marker expression profile, with almost no expression of CD14 or STRO-1, and more than 95% of these cells expressed CD73, CD90 and CD146/MUC18, as well as the haematopoietic markers CD34 and CD45 and CD105. MACS+ cells could be differentiated along osteoblastic, adipocytic and chondroblastic lineages. In contrast, MACS− cells demonstrated slight osteogenic potential. Unstimulated MACS+ cells showed significantly higher expression of collagen I (P<0.05) and collagen III (P<0.01), whereas MACS− cells demonstrated higher expression of osteonectin (P<0.05; Mann–Whitney). The present study is the first to compare gingival MACS+ and MACS− cell populations demonstrating that MACS+ cells, in contrast to MACS− cells, harbour stem/progenitor cell characteristics. This study also validates the effectiveness of the STRO-1/MACS+ technique for the isolation of gingival stem/progenitor cells. Human free gingival margin-derived STRO-1/MACS+ cells are a unique renewable source of multipotent stem/progenitor cells. PMID:25257881

  15. 42 CFR 423.2110 - MAC reviews on its own motion.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... its own motion, it will mail the results of its action to the enrollee and to CMS or the IRE, as... 42 Public Health 3 2011-10-01 2011-10-01 false MAC reviews on its own motion. 423.2110 Section 423..., and Judicial Review § 423.2110 MAC reviews on its own motion. (a) General rule. The MAC may decide on...

  16. Troponin-only Manchester Acute Coronary Syndromes (T-MACS) decision aid: single biomarker re-derivation and external validation in three cohorts

    PubMed Central

    Body, Richard; Sperrin, Matthew; Lewis, Philip S; Burrows, Gillian; Carley, Simon; McDowell, Garry; Buchan, Iain; Greaves, Kim; Mackway-Jones, Kevin

    2017-01-01

    Background The original Manchester Acute Coronary Syndromes model (MACS) ‘rules in’ and ‘rules out’ acute coronary syndromes (ACS) using high sensitivity cardiac troponin T (hs-cTnT) and heart-type fatty acid binding protein (H-FABP) measured at admission. The latter is not always available. We aimed to refine and validate MACS as Troponin-only Manchester Acute Coronary Syndromes (T-MACS), cutting down the biomarkers to just hs-cTnT. Methods We present secondary analyses from four prospective diagnostic cohort studies including patients presenting to the ED with suspected ACS. Data were collected and hs-cTnT measured on arrival. The primary outcome was ACS, defined as prevalent acute myocardial infarction (AMI) or incident death, AMI or coronary revascularisation within 30 days. T-MACS was built in one cohort (derivation set) and validated in three external cohorts (validation set). Results At the ‘rule out’ threshold, in the derivation set (n=703), T-MACS had 99.3% (95% CI 97.3% to 99.9%) negative predictive value (NPV) and 98.7% (95.3%–99.8%) sensitivity for ACS, ‘ruling out’ 37.7% patients (specificity 47.6%, positive predictive value (PPV) 34.0%). In the validation set (n=1459), T-MACS had 99.3% (98.3%–99.8%) NPV and 98.1% (95.2%–99.5%) sensitivity, ‘ruling out’ 40.4% (n=590) patients (specificity 47.0%, PPV 23.9%). T-MACS would ‘rule in’ 10.1% and 4.7% patients in the respective sets, of which 100.0% and 91.3% had ACS. C-statistics for the original and refined rules were similar (T-MACS 0.91 vs MACS 0.90 on validation). Conclusions T-MACS could ‘rule out’ ACS in 40% of patients, while ‘ruling in’ 5% at highest risk using a single hs-cTnT measurement on arrival. As a clinical decision aid, T-MACS could therefore help to conserve healthcare resources. PMID:27565197

  17. High molecular weight kininogen regulates platelet-leukocyte interactions by bridging Mac-1 and glycoprotein Ib.

    PubMed

    Chavakis, Triantafyllos; Santoso, Sentot; Clemetson, Kenneth J; Sachs, Ulrich J H; Isordia-Salas, Irma; Pixley, Robin A; Nawroth, Peter P; Colman, Robert W; Preissner, Klaus T

    2003-11-14

    Leukocyte-platelet interaction is important in mediating leukocyte adhesion to a thrombus and leukocyte recruitment to a site of vascular injury. This interaction is mediated at least in part by the beta2-integrin Mac-1 (CD11b/CD18) and its counter-receptor on platelets, glycoprotein Ibalpha (GPIbalpha). High molecular weight kininogen (HK) was previously shown to interact with both GPIbalpha and Mac-1 through its domains 3 and 5, respectively. In this study we investigated the ability of HK to interfere with the leukocyte-platelet interaction. In a purified system, HK binding to GPIbalpha was inhibited by HK domain 3 and the monoclonal antibody (mAb) SZ2, directed against the epitope 269-282 of GPIbalpha, whereas mAb AP1, directed to the region 201-268 of GPIbalpha had no effect. In contrast, mAb AP1 inhibited the Mac-1-GPIbalpha interaction. Binding of GPIbalpha to Mac-1 was enhanced 2-fold by HK. This effect of HK was abrogated in the presence of HK domains 3 or 5 or peptides from the 475-497 region of the carboxyl terminus of domain 5 as well as in the presence of mAb SZ2 but not mAb AP1. Whereas no difference in the affinity of the Mac-1-GPIbalpha interaction was observed in the absence or presence of HK, maximal binding of GPIbalpha to Mac-1 doubled in the presence of HK. Moreover, HK/HKa increased the Mac-1-dependent adhesion of myelomonocytic U937 cells and K562 cells transfected with Mac-1 to immobilized GPIbalpha or to GPIbalpha-transfected Chinese hamster ovary cells. Finally, Mac-1-dependent adhesion of neutrophils to surface-adherent platelets was enhanced by HK. Thus, HK can bridge leukocytes with platelets by interacting via its domain 3 with GPIbalpha and via its domain 5 with Mac-1 thereby augmenting the Mac-1-GPIbalpha interaction. These distinct molecular interactions of HK with leukocytes and platelets contribute to the regulation of the adhesive behavior of vascular cells and provide novel molecular targets for reducing atherothrombotic pathologies.

  18. ImagePy: an open-source, Python-based and platform-independent software package for boimage analysis.

    PubMed

    Wang, Anliang; Yan, Xiaolong; Wei, Zhijun

    2018-04-27

    This note presents the design of a scalable software package named ImagePy for analysing biological images. Our contribution is concentrated on facilitating extensibility and interoperability of the software through decoupling the data model from the user interface. Especially with assistance from the Python ecosystem, this software framework makes modern computer algorithms easier to be applied in bioimage analysis. ImagePy is free and open source software, with documentation and code available at https://github.com/Image-Py/imagepy under the BSD license. It has been tested on the Windows, Mac and Linux operating systems. wzjdlut@dlut.edu.cn or yxdragon@imagepy.org.

  19. How to Build an AppleSeed: A Parallel Macintosh Cluster for Numerically Intensive Computing

    NASA Astrophysics Data System (ADS)

    Decyk, V. K.; Dauger, D. E.

    We have constructed a parallel cluster consisting of a mixture of Apple Macintosh G3 and G4 computers running the Mac OS, and have achieved very good performance on numerically intensive, parallel plasma particle-incell simulations. A subset of the MPI message-passing library was implemented in Fortran77 and C. This library enabled us to port code, without modification, from other parallel processors to the Macintosh cluster. Unlike Unix-based clusters, no special expertise in operating systems is required to build and run the cluster. This enables us to move parallel computing from the realm of experts to the main stream of computing.

  20. Predictors of Use of Monitored Anesthesia Care for Outpatient Gastrointestinal Endoscopy in a Capitated Payment System.

    PubMed

    Adams, Megan A; Prenovost, Katherine M; Dominitz, Jason A; Holleman, Robert G; Kerr, Eve A; Krein, Sarah L; Saini, Sameer D; Rubenstein, Joel H

    2017-12-01

    Use of monitored anesthesia care (MAC) for gastrointestinal endoscopy has increased in the Veterans Health Administration (VHA) as in fee-for-service environments, despite the absence of financial incentives. We investigated factors associated with use of MAC in an integrated health care delivery system with a capitated payment model. We performed a retrospective cohort study using multilevel logistic regression, with MAC use modeled as a function of procedure year, patient- and provider-level factors, and facility effects. We collected data from 2,091,590 veterans who underwent outpatient esophagogastroduodenoscopy and/or colonoscopy during fiscal years 2000-2013 at 133 facilities. The adjusted rate of MAC use in the VHA increased 17% per year (odds ratio for increase, 1.17; 95% confidence interval, 1.09-1.27) from fiscal year 2000 through 2013. The most rapid increase occurred starting in 2011. VHA use of MAC was associated with patient-level factors that included obesity, obstructive sleep apnea, higher comorbidity, and use of prescription opioids and/or benzodiazepines, although the magnitude of these effects was small. Provider-level and facility factors were also associated with use of MAC, although again the magnitude of these associations was small. Unmeasured facility-level effects had the greatest effect on the trend of MAC use. In a retrospective study of veterans who underwent outpatient esophagogastroduodenoscopy and/or colonoscopy from fiscal year 2000 through 2013, we found that even in a capitated system, patient factors are only weakly associated with use of MAC. Facility-level effects are the most prominent factor influencing increasing use of MAC. Future studies should focus on better defining the role of MAC and facility and organizational factors that affect choice of endoscopic sedation. It will also be important to align resources and incentives to promote appropriate allocation of MAC based on clinically meaningful patient factors. Copyright © 2017 AGA Institute. Published by Elsevier Inc. All rights reserved.

  1. Annexin V-MACS in infertile couples as method for separation of sperm without DNA fragmentation.

    PubMed

    Troya, Jhon; Zorrilla, Ingrid

    2015-05-01

    To determine the effect of using MACS technology on clinical pregnancy, as a method for separation of damaged sperm in infertile patients. 136 infertile men having normal semen parameters in accordance with WHO 2010 criterion, undergoing ICSI cycle were enrolled during the course of the study. The patients were prospectively randomized and enrolled after oocyte retrieval and were assigned to the ICSI group, PICSI group or MACS group. Embryo development and clinical pregnancy were assessed. In 17 randomized MACS patients, sperm DNA fragmentation was tested in the presumptive apoptotic and no apoptotic spermatozoa fractions. Similar results were obtained between groups for the following parameters: fertilization rates of 78.97% (95% confidence interval [CI]:74.37-83.57), 70.15 %(95% CI:63.98-76.33) and 80.28%(95% CI:73.74-86.81) for ICSI, PICSI and MACS group, respectively; Number of Day-3 embryos was 5.04 (95% CI:4.09-5.98), 5.17(95% CI:4.24-6.10) and 5.59(95% CI:4.31-6.87) for ICSI, PICSI and MACS group, respectively; number of freezing embryos in blastocyst stage was 0.78 (95% CI:0.25- 1.31), 0.70(95% CI:0.27-1.14) and 1 (95% CI:0.37-1.6) for ICSI, PICSI and MACS group, respectively. However, clinical pregnancy rates of 58.1% for MACS group versus 40.4% and 27.3% for PICSI and ICSI group, respectively, were showed statistical difference (P=0.019). DNA fragmentation index for the two sperm MACS fraction showed statistical differences (P=0.000), MACS reduced the D.F.I of the sperm sample. The use of MACS technology improves the clinical pregnancy on infertile couples and can be applied as a method for sperm separation, discriminating sperm with high DNA fragmentation.

  2. Improvement of Eustachian Tube Function by Tissue-Engineered Regeneration of Mastoid Air Cells

    PubMed Central

    Kanemaru, Shin-ichi; Umeda, Hiroo; Yamashita, Masaru; Hiraumi, Harukazu; Hirano, Shigeru; Nakamura, Tatsuo; Ito, Juichi

    2013-01-01

    Objectives/Hypothesis Most cases of chronic otitis media (OMC) are associated with poor development of the mastoid air cells (MACs) and poor Eustachian tube (ET) function. We have previously reported that MAC regeneration can effectively eliminate intractable OMC. In this study, we assessed the ability of regenerated MACs to restore normal gas exchange function and contribute to improved ET function. Study Design Clinical trial with control. Setting General hospitals. Materials and Methods Seventy-six patients with OMC, including cholesteatoma and adhesive otitis media, received tympanoplasty and MAC regeneration therapy. At the first-stage of tympanoplasty, artificial pneumatic bones and/or autologous bone fragments were implanted into the opened mastoid cavity. At the 2nd-stage operation, a nitrous oxide (N2O) gas study was performed in 10 patients to measure middle ear pressure (MEP). For the control group, MEP was measured in five patients with good MAC development during cochlear implantation or facial nerve decompression. ET function was measured twice in each patient, once before the 1st operation and 6 months after the second operation. Results At the 2nd-stage operation, in all cases with regenerated MACs and in the normal control group, MEP changed after administration of N2O. In contrast, no change in MEP was observed in cases with unregenerated MACs. In 70% (n = 37/53) of the regenerated MAC group, ET function was improved, whereas improvement of ET function was observed in only 13% (n = 3/23) of the unregenerated MAC group. Conclusions Tissue-engineered regeneration of MACs improves ET function and gas exchange in the middle ear. Laryngoscope, 2012 Level of Evidence 3b PMID:23086494

  3. Coronary artery calcification correlates with the presence and severity of valve calcification.

    PubMed

    Koulaouzidis, G; Nicoll, R; MacArthur, T; Jenkins, P J; Henein, M Y

    2013-10-15

    To investigate the prevalence of coronary artery calcification (CAC) in symptomatic individuals with CT evidence for left heart valve calcification, aortic valve (AVC), mitral valve (MAC) or both. This is a retrospective study of 282 consecutive patients with calcification in either the aortic valve or mitral annulus. Calcium scoring of the coronary artery, aortic and mitral valve was measured using the Agatston score. AVC was more prevalent than MAC (64% vs. 2.5%, p < 0.001), with 34% having both. Absence of CAC was noted in 12.7% of the study population. AVC + CAC were observed in 53.5%, MAC and CAC in 2.1%, and combined AVC, MAC and CAC in 31.6%. The median CAC score was higher in individuals with combined AVC+MAC, followed by those with AVC and lowest was in the MAC group. The majority (40%) of individuals with AVC had CAC score >400, and only in 16% had CAC = 0. The same pattern was more evident in individuals with AVC + MAC, where 70% had CAC score >400 and only 6% had CAC score of 0. These results were irrespective of gender. There was no correlation between AVC and MAC but there was modest correlation between CAC score and AVC score (r = 0.28, p = 0.0001), MAC (r = 0.36, p = 0.0001) and with combined AVC + MAC (r = 0.5, p = 0.0001). AVC score of 262 had a sensitivity of 78% and specificity of 92% for the prediction of presence of CAC. The presence and extent of calcification in the aortic valve or/and mitral valves are associated with severe coronary artery calcification. © 2013.

  4. Pleiotrophin, a multifunctional cytokine and growth factor, induces leukocyte responses through the integrin Mac-1.

    PubMed

    Shen, Di; Podolnikova, Nataly P; Yakubenko, Valentin P; Ardell, Christopher L; Balabiyev, Arnat; Ugarova, Tatiana P; Wang, Xu

    2017-11-17

    Pleiotrophin (PTN) is a multifunctional, cationic, glycosaminoglycan-binding cytokine and growth factor involved in numerous physiological and pathological processes, including tissue repair and inflammation-related diseases. PTN has been shown to promote leukocyte responses by inducing their migration and expression of inflammatory cytokines. However, the mechanisms through which PTN mediates these responses remain unclear. Here, we identified the integrin Mac-1 (αMβ2, CD11b/CD18) as the receptor mediating macrophage adhesion and migration to PTN. We also found that expression of Mac-1 on the surface of human embryonic kidney (HEK) 293 cells induced their adhesion and migration to PTN. Accordingly, PTN promoted Mac-1-dependent cell spreading and initiated intracellular signaling manifested in phosphorylation of Erk1/2. While binding to PTN, Mac-1 on Mac-1-expressing HEK293 cells appears to cooperate with cell-surface proteoglycans because both anti-Mac-1 function-blocking mAb and heparin were required to block adhesion. Moreover, biolayer interferometry and NMR indicated a direct interaction between the α M I domain, the major ligand-binding region of Mac-1, and PTN. Using peptide libraries, we found that in PTN the α M I domain bound sequences enriched in basic and hydrophobic residues, indicating that PTN conforms to the general principle of ligand-recognition specificity of the α M I domain toward cationic proteins/peptides. Finally, using recombinant PTN-derived fragments, we show that PTN contains two distinct Mac-1-binding sites in each of its constitutive domains. Collectively, these results identify PTN as a ligand for the integrin Mac-1 on the surface of leukocytes and suggest that this interaction may play a role in inflammatory responses. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  5. EFFECTS OF TRAMADOL ON THE MINIMUM ANESTHETIC CONCENTRATION OF ISOFLURANE IN WHITE-EYED PARAKEETS (PSITTACARA LEUCOPHTHALMUS).

    PubMed

    Escobar, André; da Rocha, Rozana Wendler; Midon, Monica; de Almeida, Ricardo Miyasaka; Filho, Darcio Zangirolami; Werther, Karin

    2017-06-01

    The aim of this study was to determine the minimum anesthetic concentration (MAC) of isoflurane, and to investigate if tramadol changes the isoflurane MAC in white-eyed parakeets (Psittacara leucophthalmus). Ten adult birds weighing 157 ± 9 g were anesthetized with isoflurane in oxygen under mechanical ventilation. Isoflurane concentration for the first bird was adjusted to 2.2%, and after 15 min an electrical stimulus was applied in the thigh area to observe the response (movement or nonmovement). Isoflurane concentration for the subsequent bird was increased by 10% if the previous bird moved, or decreased by 10% if the previous bird did not move. This procedure was performed serially until at least four sequential crossover events were detected. A crossover event was defined as a sequence of two birds with different responses (positive or negative) to the electrical stimulus. Isoflurane MAC was calculated as the mean isoflurane concentration value at the crossover events. After 1 wk, the same birds were reanesthetized with isoflurane and MAC was determined at 15 and 30 min after intramuscular administration of 10 mg/kg of tramadol using the same method. A paired t-test (P < 0.05%) was used to detect significant differences for MAC between treatments. Isoflurane MAC in this population of white-eyed parakeets was 2.47 ± 0.09%. Isoflurane MAC values 15 and 30 min after tramadol administration were indistinguishable from each other (pooled value was 2.50 ± 0.18%); they were also indistinguishable from isoflurane MAC without tramadol. The isoflurane MAC value in white-eyed parakeets is higher than reported for other bird species. Tramadol (10 mg/kg, i.m.) does not change isoflurane MAC in these birds.

  6. EISCAT observations during MAC/SINE and MAC/Epsilon

    NASA Technical Reports Server (NTRS)

    Roettger, J.; Hoppe, U.-P.; Hall, C.

    1989-01-01

    The EISCAT incoherent scatter radar facility in Tromsoe, Norway was operated during the MAC/SINE campaign for 78 hours in the period 10 June to 17 July 1987, and during the MAC/Epsilon campaign for 90 hours in the period 15 October to 5 November 1987. The VHF (224 MHz) radar operations during MAC/SINE yielded most interesting observations of strong coherent echoes from the mesopause region. Characteristic data of these polar mesospheric summer echoes are presented. The UHF (933 MHz) radar operations during MAC/Epsilon were done with 18 deg off zenith beam and allows the deduction of meridonal and horizontal wind components as well as radial velocity spectra in addition to the usual electron density profiles in the D and lower E regions. Some results from the VHF and UHF radars indicating the presence of gravity waves are examined.

  7. Mutational screening of CHX10, GDF6, OTX2, RAX and SOX2 genes in 50 unrelated microphthalmia-anophthalmia-coloboma (MAC) spectrum cases.

    PubMed

    Gonzalez-Rodriguez, J; Pelcastre, E L; Tovilla-Canales, J L; Garcia-Ortiz, J E; Amato-Almanza, M; Villanueva-Mendoza, C; Espinosa-Mattar, Z; Zenteno, J C

    2010-08-01

    Microphthalmia-anophthalmia-coloboma (MAC) are congenital eye malformations causing a significant percentage of visually impairments in children. Although these anomalies can arise from prenatal exposure to teratogens, mutations in well-defined genes originate potentially heritable forms of MAC. Mutations in genes such as CHX10, GDF6, RAX, SOX2 and OTX2, among others, have been recognised in dominant or recessive MAC. SOX2 and OTX2 are the two most commonly mutated genes in monogenic MAC. However, as more numerous samples of MAC subjects would be analysed, a better estimation of the actual involvement of specific MAC-genes could be made. Here, a comprehensive mutational analysis of the CHX10, GDF6, RAX, SOX2 and OTX2 genes was performed in 50 MAC subjects. PCR amplification and direct automated DNA sequencing of all five genes in 50 unrelated subjects. Eight mutations (16% prevalence) were recognised, including four GDF6 mutations (one novel), two novel RAX mutations, one novel OTX2 mutation and one SOX2 mutation. Anophthalmia and nanophthalmia, not previously associated with GDF6 mutations, were observed in two subjects carrying defects in this gene, expanding the spectrum of GDF6-linked ocular anomalies. Our study underscores the importance of genotyping large groups of patients from distinct ethnic origins for improving the estimation of the global involvement of particular MAC-causing genes.

  8. A critical evaluation of magnetic activated carbon's potential for the remediation of sediment impacted by polycyclic aromatic hydrocarbons.

    PubMed

    Han, Zhantao; Sani, Badruddeen; Akkanen, Jarkko; Abel, Sebastian; Nybom, Inna; Karapanagioti, Hrissi K; Werner, David

    2015-04-09

    Addition of activated carbon (AC) or biochar (BC) to sediment to reduce the chemical and biological availability of organic contaminants is a promising in-situ remediation technology. But concerns about leaving the adsorbed pollutants in place motivate research into sorbent recovery methods. This study explores the use of magnetic sorbents. A coal-based magnetic activated carbon (MAC) was identified as the strongest of four AC and BC derived magnetic sorbents for polycyclic aromatic hydrocarbons (PAHs) remediation. An 8.1% MAC amendment (w/w, equal to 5% AC content) was found to be as effective as 5% (w/w) pristine AC in reducing aqueous PAHs within three months by 98%. MAC recovery from sediment after three months was 77%, and incomplete MAC recovery had both, positive and negative effects. A slight rebound of aqueous PAH concentrations was observed following the MAC recovery, but aqueous PAH concentrations then dropped again after six months, likely due to the presence of the 23% unrecovered MAC. On the other hand, the 77% recovery of the 8.1% MAC dose was insufficient to reduce ecotoxic effects of fine grained AC or MAC amendment on the egestion rate, growth and reproduction of the AC sensitive species Lumbriculus variegatus. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    PubMed Central

    Tong, Fei; Xie, Rong; Shu, Lei; Kim, Young-Chon

    2011-01-01

    Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs) such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC) for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency. PMID:22163895

  10. The microassay on a card: A rugged, portable immunoassay

    NASA Technical Reports Server (NTRS)

    Kidwell, David

    1991-01-01

    The Microassay on a Card (MAC) is a portable, hand-held, non-instrumental immunoassay that can test for the presence of a wide variety of substances in the environment. The MAC is a simple device to use. A drop of test solution is placed on one side of the card and within five minutes a color is developed on the other side in proportion to the amount of substance in the test solution, with sensitivity approaching 10 ng/ml. The MAC is self-contained and self-timed; no reagents or timing is necessary. The MAC may be configured with multiple wells to provide simultaneous testing for multiple species. As envisioned, the MAC will be employed first as an on-site screen for drugs of abuse in urine or saliva. If the MAC can be used as a screen of saliva for drugs of abuse, it could be applied to driving while intoxicated, use of drugs on the job, or testing of the identity of seized materials. With appropriate modifications, the MAC also could be used to test for environmental toxins or pollutants.

  11. AeroMACS system characterization and demonstrations

    NASA Astrophysics Data System (ADS)

    Kerczewski, R. J.; Apaza, R. D.; Dimond, R. P.

    This The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.

  12. AeroMACS System Characterization and Demonstrations

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Apaza, Rafael D.; Dimond, Robert P.

    2013-01-01

    This The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past 3 years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.

  13. AeroMACS System Characterization and Demonstrations

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Apaza, Rafael D.; Dimond, Robert P.

    2013-01-01

    The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.

  14. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    PubMed Central

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the “transmit-whenever-appropriate” principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposed to ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency. PMID:23202224

  15. 33 CFR 334.630 - Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...

  16. 33 CFR 334.630 - Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 3 2014-07-01 2014-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...

  17. 33 CFR 334.630 - Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...

  18. 33 CFR 334.630 - Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...

  19. Impact of MAC Delay on AUV Localization: Underwater Localization Based on Hyperbolic Frequency Modulation Signal

    PubMed Central

    2018-01-01

    Medium Access Control (MAC) delay which occurs between the anchor node’s transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater. PMID:29373518

  20. Impact of MAC Delay on AUV Localization: Underwater Localization Based on Hyperbolic Frequency Modulation Signal.

    PubMed

    Kim, Sungryul; Yoo, Younghwan

    2018-01-26

    Medium Access Control (MAC) delay which occurs between the anchor node's transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater.

  1. Research on low-latency MAC protocols for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    He, Chenguang; Sha, Xuejun; Lee, Chankil

    2007-11-01

    Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.

  2. Accuracy of the MacArthur competence assessment tool for clinical research (MacCAT-CR) for measuring children's competence to consent to clinical research.

    PubMed

    Hein, Irma M; Troost, Pieter W; Lindeboom, Robert; Benninga, Marc A; Zwaan, C Michel; van Goudoever, Johannes B; Lindauer, Ramón J L

    2014-12-01

    An objective assessment of children's competence to consent to research participation is currently not possible. Age limits for asking children's consent vary considerably between countries, and, to our knowledge, the correlation between competence and children's age has never been systematically investigated. To test a standardized competence assessment instrument for children by modifying the MacArthur Competence Assessment Tool for Clinical Research (MacCAT-CR), to investigate its reliability and validity, and to examine the correlation of its assessment with age and estimate cutoff ages. This prospective study included children and adolescents aged 6 to 18 years in the inpatient and outpatient departments of allergology, gastroenterology, oncology, ophthalmology, and pulmonology from January 1, 2012, through January 1, 2014. Participants were eligible for clinical research studies, including observational studies and randomized clinical trials. Competence judgments by experts aware of the 4 relevant criteria-understanding, appreciation, reasoning, and choice-were used to establish the reference standard. The index test was the MacCAT-CR, which used a semistructured interview format. Interrater reliability, validity, and dimensionality of the MacCAT-CR and estimated cutoff ages for competence. Of 209 eligible patients, we included 161 (mean age, 10.6 years; 47.2% male). Good reproducibility of MacCAT-CR total and subscale scores was observed (intraclass correlation coefficient range, 0.68-0.92). We confirmed unidimensionality of the MacCAT-CR. By the reference standard, we judged 54 children (33.5%) to be incompetent; by the MacCAT-CR, 61 children (37.9%). Criterion-related validity of MacCAT-CR scores was supported by high overall accuracy in correctly classifying children as competent against the reference standard (area under the receiver operating characteristics curve, 0.78). Age was a good predictor of competence on the MacCAT-CR (area under the receiver operating characteristics curve, 0.90). In children younger than 9.6 years, competence was unlikely (sensitivity, 90%); in those older than 11.2 years, competence was probable (specificity, 90%). The optimal cutoff age was 10.4 years (sensitivity, 81%; specificity, 84%). The MacCAT-CR demonstrated strong psychometric properties. In children aged 9.6 to 11.2 years, consent may be justified when competence can be demonstrated in individual cases by the MacCAT-CR. The results contribute to a scientific underpinning of regulations for clinical research directed toward children.

  3. Effect of Mitral Annular Calcium on Left Ventricular Diastolic Parameters.

    PubMed

    Codolosa, Jose N; Koshkelashvili, Nikoloz; Alnabelsi, Talal; Goykhman, Igor; Romero-Corral, Abel; Pressman, Gregg S

    2016-03-01

    Assessment of left ventricular (LV) diastolic function by Doppler flow imaging and tissue Doppler is an integral part of the echocardiographic examination. Mitral annular calcium (MAC) is frequently encountered on echocardiography. The aim of this study was to assess the impact of MAC, quantitatively measured by computed tomography scan, on echocardiographic LV diastolic parameters. We included 155 patients aged ≥65 years. Computed tomography reconstructions of the mitral annulus were created, and calcium identified and quantified by Agatston technique. Calcium locations were assigned using an overlaid template depicting the annular segments in relation to surrounding anatomic structures. Echocardiographic assessment of diastolic function was performed in standard fashion. Mean age was 77 years; 49% were men; and 43% were black. Patients with MAC had lower septal e' (p = 0.003), lateral e' (p = 0.04), and average e' (p = 0.01) compared with those without MAC. They also had a higher E-wave velocity (p = 0.01) and E/e' ratio (p <0.001). When evaluated by severity of MAC, and after adjustment for multiple clinical factors, there was a graded (inverse) relation between MAC severity and septal e' (p = 0.01), lateral e' (p = 0.01), and average e' (p = 0.01). In conclusion, LV diastolic parameters, as measured by Doppler echocardiography, are altered in the presence of MAC. This could be due to direct effects of MAC on annular function or might reflect truly reduced diastolic function. Interpretation of diastolic parameters in patients with MAC should be performed with caution. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. M. leprae components induce nerve damage by complement activation: identification of lipoarabinomannan as the dominant complement activator.

    PubMed

    Bahia El Idrissi, Nawal; Das, Pranab K; Fluiter, Kees; Rosa, Patricia S; Vreijling, Jeroen; Troost, Dirk; Morgan, B Paul; Baas, Frank; Ramaglia, Valeria

    2015-05-01

    Peripheral nerve damage is the hallmark of leprosy pathology but its etiology is unclear. We previously identified the membrane attack complex (MAC) of the complement system as a key determinant of post-traumatic nerve damage and demonstrated that its inhibition is neuroprotective. Here, we determined the contribution of the MAC to nerve damage caused by Mycobacterium leprae and its components in mouse. Furthermore, we studied the association between MAC and the key M. leprae component lipoarabinomannan (LAM) in nerve biopsies of leprosy patients. Intraneural injections of M. leprae sonicate induced MAC deposition and pathological changes in the mouse nerve, whereas MAC inhibition preserved myelin and axons. Complement activation occurred mainly via the lectin pathway and the principal activator was LAM. In leprosy nerves, the extent of LAM and MAC immunoreactivity was robust and significantly higher in multibacillary compared to paucibacillary donors (p = 0.01 and p = 0.001, respectively), with a highly significant association between LAM and MAC in the diseased samples (r = 0.9601, p = 0.0001). Further, MAC co-localized with LAM on axons, pointing to a role for this M. leprae antigen in complement activation and nerve damage in leprosy. Our findings demonstrate that MAC contributes to nerve damage in a model of M. leprae-induced nerve injury and its inhibition is neuroprotective. In addition, our data identified LAM as the key pathogen associated molecule that activates complement and causes nerve damage. Taken together our data imply an important role of complement in nerve damage in leprosy and may inform the development of novel therapeutics for patients.

  5. Spermatozoa with numerical chromosomal abnormalities are more prone to be retained by Annexin V-MACS columns.

    PubMed

    Esbert, M; Godo, A; Soares, S R; Florensa, M; Amorós, D; Ballesteros, A; Vidal, F

    2017-07-01

    Colloidal super-paramagnetic microbeads conjugated with annexin V are effective for separating apoptotic spermatozoa by MACS as a result of the high affinity of annexin V for externalized PS molecules. The effectiveness of the procedure in reducing the percentage of sperm with fragmented DNA and abnormal morphology has also been reported. However, it is still unknown if it could decrease the percentage of aneuploid spermatozoa. The objective of our prospective study, performed on 16 males with abnormal FISH on spermatozoa, was to assess if MACS columns were useful tools to retain spermatozoa carrying chromosomal abnormalities in semen samples processed after density gradient centrifugation (DGC). The pellet obtained after DGC was subjected to MACS, and sperm FISH analyses were performed both in the eluded fraction and in the fraction retained in the column. The observed frequencies of disomy and nullisomy 13, 18, and 21, X and Y, as well as the diploidy rates in the MACS eluded fraction and the fraction retained in the MACS column were recorded. We observed that the frequencies of aneuploidies in the eluded fraction were lower than in the fraction retained in the MACS column (0.59% vs. 0.75%; p = 0.010). DGC determined a significant reduction in sperm concentration (z-ratio = 2.83; p = 0.005) and a significant increase in sperm progressive motility (z-ratio = -3.5; p < 0.001). MACS also led to a significant reduction in sperm concentration (z-ratio = 3.14; p = 0.002) and a significant increase in progressive motility (z-ratio = -2.59; p = 0.01) when compared with the post-DGC sample. Sperm concentration was similar in the two fractions generated by MACS (z-ratio = 0.63; p = 0.52), while progressive motility was significantly higher in the MACS eluded fraction (z-ratio = 2.42; p = 0.02). According to our results, MACS columns are able to selectively retain spermatozoa carrying chromosomal abnormalities. Furthermore, the performance of DGC and MACS on semen samples leads to an enrichment of progressive motility. © 2017 American Society of Andrology and European Academy of Andrology.

  6. Exploring the complexity of inquiry learning in an open-ended problem space

    NASA Astrophysics Data System (ADS)

    Clarke, Jody

    Data-gathering and problem identification are key components of scientific inquiry. However, few researchers have studied how students learn these skills because historically this required a time-consuming, complicated method of capturing the details of learners' data-gathering processes. Nor are classroom settings authentic contexts in which students could exhibit problem identification skills parallel to those involved in deconstructing complex real world situations. In this study of middle school students, because of my access to an innovative technology, I simulated a disease outbreak in a virtual community as a complicated, authentic problem. As students worked through the curriculum in the virtual world, their time-stamped actions were stored by the computer in event-logs. Using these records, I tracked in detail how the student scientists made sense of the complexity they faced and how they identified and investigated the problem using science-inquiry skills. To describe the degree to which students' data collection narrowed and focused on a specific disease over time, I developed a rubric and automated the coding of records in the event-logs. I measured the ongoing development of the students' "systematicity" in investigating the disease outbreak. I demonstrated that coding event-logs is an effective yet non-intrusive way of collecting and parsing detailed information about students' behaviors in real time in an authentic setting. My principal research question was "Do students who are more thoughtful about their inquiry prior to entry into the curriculum demonstrate increased systematicity in their inquiry behavior during the experience, by narrowing the focus of their data-gathering more rapidly than students who enter with lower levels of thoughtfulness about inquiry?" My sample consisted of 403 middle-school students from public schools in the US who volunteered to participate in the River City Project in spring 2008. Contrary to my hypothesis, I found that prior thoughtfulness of inquiry was not a predictor of the subsequent development of systematicity. However, all students did indeed become more systematic in their scientific behavior over time. On average, boys were generally more systematic than girls, but the rates at which systematicity increased with time was identical across the genders.

  7. FORTRAN Versions of Reformulated HFGMC Codes

    NASA Technical Reports Server (NTRS)

    Arnold, Steven M.; Aboudi, Jacob; Bednarcyk, Brett A.

    2006-01-01

    Several FORTRAN codes have been written to implement the reformulated version of the high-fidelity generalized method of cells (HFGMC). Various aspects of the HFGMC and its predecessors were described in several prior NASA Tech Briefs articles, the most recent being HFGMC Enhancement of MAC/GMC (LEW-17818-1), NASA Tech Briefs, Vol. 30, No. 3 (March 2006), page 34. The HFGMC is a mathematical model of micromechanics for simulating stress and strain responses of fiber/matrix and other composite materials. The HFGMC overcomes a major limitation of a prior version of the GMC by accounting for coupling of shear and normal stresses and thereby affords greater accuracy, albeit at a large computational cost. In the reformulation of the HFGMC, the issue of computational efficiency was addressed: as a result, codes that implement the reformulated HFGMC complete their calculations about 10 times as fast as do those that implement the HFGMC. The present FORTRAN implementations of the reformulated HFGMC were written to satisfy a need for compatibility with other FORTRAN programs used to analyze structures and composite materials. The FORTRAN implementations also afford capabilities, beyond those of the basic HFGMC, for modeling inelasticity, fiber/matrix debonding, and coupled thermal, mechanical, piezo, and electromagnetic effects.

  8. Mycobacterium avium complex--the role of potable water in disease transmission.

    PubMed

    Whiley, H; Keegan, A; Giglio, S; Bentham, R

    2012-08-01

    Mycobacterium avium complex (MAC) is a group of opportunistic pathogens of major public health concern. It is responsible for a wide spectrum of disease dependent on subspecies, route of infection and patients pre-existing conditions. Presently, there is limited research on the incidence of MAC infection that considers both pulmonary and other clinical manifestations. MAC has been isolated from various terrestrial and aquatic environments including natural waters, engineered water systems and soils. Identifying the specific environmental sources responsible for human infection is essential in minimizing disease prevalence. This paper reviews current literature and case studies regarding the wide spectrum of disease caused by MAC and the role of potable water in disease transmission. Potable water was recognized as a putative pathway for MAC infection. Contaminated potable water sources associated with human infection included warm water distribution systems, showers, faucets, household drinking water, swimming pools and hot tub spas. MAC can maintain long-term contamination of potable water sources through its high resistance to disinfectants, association with biofilms and intracellular parasitism of free-living protozoa. Further research is required to investigate the efficiency of water treatment processes against MAC and into construction and maintenance of warm water distribution systems and the role they play in MAC proliferation. No claim to Australian Government works Journal of Applied Microbiology © 2012 The Society for Applied Microbiology.

  9. NF-κB is involved in the LPS-mediated proliferation and apoptosis of MAC-T epithelial cells as part of the subacute ruminal acidosis response in cows.

    PubMed

    Fan, Wen-Jie; Li, He-Ping; Zhu, He-Shui; Sui, Shi-Ping; Chen, Pei-Ge; Deng, Yue; Sui, Tong-Ming; Wang, Yue-Ying

    2016-11-01

    To determine the effect of NF-κB on cell proliferation and apoptosis, we investigate the expression of inflammation and apoptosis-related factors in the bovine mammary epithelial cell line, MAC-T. MAC-T cells were cultured in vitro and MTT and LDH assays used to determine the effects of lipopolysaccharide (LPS) on proliferation and cytotoxicity respectively. RT-PCR and western blotting were used to evaluate the effect of LPS and NF-κB inhibition [pyrrolidine dithiocarbamate (PDTC) treatment] on the expression of inflammation and apoptosis-related factors. LPS significantly inhibited MAC-T cell proliferation in a dose- and time-dependent manner. Furthermore, LPS promoted apoptosis while the NF-кB inhibitor PDTC attenuated this effect. After LPS treatment, the NF-кB signaling pathway was activated, and the expression of inflammation and apoptosis-related factors increased. When PDTC blocked NF-кB signaling, the expression of inflammation and apoptosis-related factors were decreased in MAC-T cells. LPS activates the TLR4/NF-κB signaling pathway, inhibits proliferation and promotes apoptosis in MAC-T cells. NF-кB inhibition attenuates MAC-T cell apoptosis and TLR4/NF-κB signaling pathway. NF-кB inhibitor alleviating MAC-T cell apoptosis is presumably modulated by NF-кB.

  10. Myeloablative Versus Reduced-Intensity Hematopoietic Cell Transplantation for Acute Myeloid Leukemia and Myelodysplastic Syndromes

    PubMed Central

    Pasquini, Marcelo C.; Logan, Brent R.; Wu, Juan; Devine, Steven M.; Porter, David L.; Maziarz, Richard T.; Warlick, Erica D.; Fernandez, Hugo F.; Alyea, Edwin P.; Hamadani, Mehdi; Bashey, Asad; Giralt, Sergio; Geller, Nancy L.; Leifer, Eric; Le-Rademacher, Jennifer; Mendizabal, Adam M.; Horowitz, Mary M.; Deeg, H. Joachim; Horwitz, Mitchell E.

    2017-01-01

    Purpose The optimal regimen intensity before allogeneic hematopoietic cell transplantation (HCT) is unknown. We hypothesized that lower treatment-related mortality (TRM) with reduced-intensity conditioning (RIC) would result in improved overall survival (OS) compared with myeloablative conditioning (MAC). To test this hypothesis, we performed a phase III randomized trial comparing MAC with RIC in patients with acute myeloid leukemia or myelodysplastic syndromes. Patients and Methods Patients age 18 to 65 years with HCT comorbidity index ≤ 4 and < 5% marrow myeloblasts pre-HCT were randomly assigned to receive MAC (n = 135) or RIC (n = 137) followed by HCT from HLA-matched related or unrelated donors. The primary end point was OS 18 months post–random assignment based on an intent-to-treat analysis. Secondary end points included relapse-free survival (RFS) and TRM. Results Planned enrollment was 356 patients; accrual ceased at 272 because of high relapse incidence with RIC versus MAC (48.3%; 95% CI, 39.6% to 56.4% and 13.5%; 95% CI, 8.3% to 19.8%, respectively; P < .001). At 18 months, OS for patients in the RIC arm was 67.7% (95% CI, 59.1% to 74.9%) versus 77.5% (95% CI, 69.4% to 83.7%) for those in the MAC arm (difference, 9.8%; 95% CI, −0.8% to 20.3%; P = .07). TRM with RIC was 4.4% (95% CI, 1.8% to 8.9%) versus 15.8% (95% CI, 10.2% to 22.5%) with MAC (P = .002). RFS with RIC was 47.3% (95% CI, 38.7% to 55.4%) versus 67.8% (95% CI, 59.1% to 75%) with MAC (P < .01). Conclusion OS was higher with MAC, but this was not statistically significant. RIC resulted in lower TRM but higher relapse rates compared with MAC, with a statistically significant advantage in RFS with MAC. These data support the use of MAC as the standard of care for fit patients with acute myeloid leukemia or myelodysplastic syndromes. PMID:28380315

  11. Mitral Annular Calcification as a Possible Nidus for Endocarditis: A Descriptive Series with Bacteriological Differences Noted.

    PubMed

    Pressman, Gregg S; Rodriguez-Ziccardi, Mary; Gartman, Charles H; Obasare, Edinrin; Melendres, Emmanuel; Arguello, Vivian; Bhalla, Vikas

    2017-06-01

    Mitral annular calcification (MAC) is a chronic inflammatory process with similarities to atherosclerosis. It is common in elderly patients and those with renal dysfunction. Although MAC is associated with cardiovascular morbidity, its relationship to infective endocarditis is unclear. The aim of this study was to test the hypothesis that MAC would be prevalent in patients with mitral valve vegetations and that vegetations would frequently occur on calcific nodules. A secondary aim was to look for possible bacteriological differences between vegetations attached to the calcified annulus versus leaflet vegetations. We retrospectively reviewed all echocardiographic studies of patients with native mitral valve vegetations from January 2007 to August 2015 (N = 56). We searched for (1) presence of MAC, (2) location of MAC, and (3) vegetation location (on calcium deposits or distant). MAC was defined as focal echo brightness in a nodular or band-like pattern. The modified Duke criteria were used to confirm the diagnosis of infective endocarditis. Transthoracic, transesophageal, and three-dimensional echocardiograms (when available) at the time of infection were evaluated by a single reader. Twenty-eight subjects were infected with Staphylococcus aureus, 17 with a streptococcal species, and five with other organisms; blood cultures were sterile in 6. Thirty-four (61%) subjects had some degree of MAC, while 22 (39%) had none. Among those with MAC, the vegetation was located on the calcium deposits in 22 (65%), versus in 12 (35%) where it was not. Among all 56 subjects, when S. aureus was the infecting organism it was present on MAC in 16/28 (57%) versus 6/28 (21%; P = .01) for other bacterial species. By contrast, streptococcal infections more frequently involved the leaflets (16/17 [94%]) versus nonstreptococcal infections (18/39 [46%]; P = .0008). MAC may act as a nidus for infection especially with S. aureus. Differences in mechanism of attachment between S. aureus and streptococci may account for the observed difference in frequency of attachment of vegetations to MAC. Copyright © 2017 American Society of Echocardiography. Published by Elsevier Inc. All rights reserved.

  12. Transposon Invasion of the Paramecium Germline Genome Countered by a Domesticated PiggyBac Transposase and the NHEJ Pathway

    PubMed Central

    Dubois, Emeline; Bischerour, Julien; Marmignon, Antoine; Mathy, Nathalie; Régnier, Vinciane; Bétermier, Mireille

    2012-01-01

    Sequences related to transposons constitute a large fraction of extant genomes, but insertions within coding sequences have generally not been tolerated during evolution. Thanks to their unique nuclear dimorphism and to their original mechanism of programmed DNA elimination from their somatic nucleus (macronucleus), ciliates are emerging model organisms for the study of the impact of transposable elements on genomes. The germline genome of the ciliate Paramecium, located in its micronucleus, contains thousands of short intervening sequences, the IESs, which interrupt 47% of genes. Recent data provided support to the hypothesis that an evolutionary link exists between Paramecium IESs and Tc1/mariner transposons. During development of the macronucleus, IESs are excised precisely thanks to the coordinated action of PiggyMac, a domesticated piggyBac transposase, and of the NHEJ double-strand break repair pathway. A PiggyMac homolog is also required for developmentally programmed DNA elimination in another ciliate, Tetrahymena. Here, we present an overview of the life cycle of these unicellular eukaryotes and of the developmentally programmed genome rearrangements that take place at each sexual cycle. We discuss how ancient domestication of a piggyBac transposase might have allowed Tc1/mariner elements to spread throughout the germline genome of Paramecium, without strong counterselection against insertion within genes. PMID:22888464

  13. ALPHACAL: A new user-friendly tool for the calibration of alpha-particle sources.

    PubMed

    Timón, A Fernández; Vargas, M Jurado; Gallardo, P Álvarez; Sánchez-Oro, J; Peralta, L

    2018-05-01

    In this work, we present and describe the program ALPHACAL, specifically developed for the calibration of alpha-particle sources. It is therefore more user-friendly and less time-consuming than multipurpose codes developed for a wide range of applications. The program is based on the recently developed code AlfaMC, which simulates specifically the transport of alpha particles. Both cylindrical and point sources mounted on the surface of polished backings can be simulated, as is the convention in experimental measurements of alpha-particle sources. In addition to the efficiency calculation and determination of the backscattering coefficient, some additional tools are available to the user, like the visualization of energy spectrum, use of energy cut-off or low-energy tail corrections. ALPHACAL has been implemented in C++ language using QT library, so it is available for Windows, MacOs and Linux platforms. It is free and can be provided under request to the authors. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. A long-term predictive validity study: can the CDI Short Form be used to predict language and early literacy skills four years later?

    PubMed

    Can, Dilara Deniz; Ginsburg-Block, Marika; Golinkoff, Roberta Michnick; Hirsh-Pasek, Kathryn

    2013-09-01

    This longitudinal study examined the predictive validity of the MacArthur Communicative Developmental Inventories-Short Form (CDI-SF), a parent report questionnaire about children's language development (Fenson, Pethick, Renda, Cox, Dale & Reznick, 2000). Data were first gathered from parents on the CDI-SF vocabulary scores for seventy-six children (mean age=1 ; 10). Four years later (mean age=6 ; 1), children were assessed on language outcomes (expressive vocabulary, syntax, semantics and pragmatics) and code-related skills, including phonemic awareness, word recognition and decoding skills. Hierarchical regression analyses revealed that early expressive vocabulary accounted for 17% of the variance in picture vocabulary, 11% of the variance in syntax, and 7% of the variance in semantics, while not accounting for any variance in pragmatics in kindergarten. CDI-SF scores did not predict code-related skills in kindergarten. The importance of early vocabulary skills for later language development and CDI-SF as a valuable research tool are discussed.

  15. Pressure measurements in a low-density nozzle plume for code verification

    NASA Technical Reports Server (NTRS)

    Penko, Paul F.; Boyd, Iain D.; Meissner, Dana L.; Dewitt, Kenneth J.

    1991-01-01

    Measurements of Pitot pressure were made in the exit plane and plume of a low-density, nitrogen nozzle flow. Two numerical computer codes were used to analyze the flow, including one based on continuum theory using the explicit MacCormack method, and the other on kinetic theory using the method of direct-simulation Monte Carlo (DSMC). The continuum analysis was carried to the nozzle exit plane and the results were compared to the measurements. The DSMC analysis was extended into the plume of the nozzle flow and the results were compared with measurements at the exit plane and axial stations 12, 24 and 36 mm into the near-field plume. Two experimental apparatus were used that differed in design and gave slightly different profiles of pressure measurements. The DSMC method compared well with the measurements from each apparatus at all axial stations and provided a more accurate prediction of the flow than the continuum method, verifying the validity of DSMC for such calculations.

  16. Open ISEmeter: An open hardware high-impedance interface for potentiometric detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salvador, C.; Carbajo, J.; Mozo, J. D., E-mail: jdaniel.mozo@diq.uhu.es

    In this work, a new open hardware interface based on Arduino to read electromotive force (emf) from potentiometric detectors is presented. The interface has been fully designed with the open code philosophy and all documentation will be accessible on web. The paper describes a comprehensive project including the electronic design, the firmware loaded on Arduino, and the Java-coded graphical user interface to load data in a computer (PC or Mac) for processing. The prototype was tested by measuring the calibration curve of a detector. As detection element, an active poly(vinyl chloride)-based membrane was used, doped with cetyltrimethylammonium dodecylsulphate (CTA{sup +}-DS{supmore » −}). The experimental measures of emf indicate Nernstian behaviour with the CTA{sup +} content of test solutions, as it was described in the literature, proving the validity of the developed prototype. A comparative analysis of performance was made by using the same chemical detector but changing the measurement instrumentation.« less

  17. C-MAC videolaryngoscope versus Macintosh laryngoscope for tracheal intubation: A systematic review and meta-analysis with trial sequential analysis.

    PubMed

    Hoshijima, Hiroshi; Mihara, Takahiro; Maruyama, Koichi; Denawa, Yohei; Mizuta, Kentaro; Shiga, Toshiya; Nagasaka, Hiroshi

    2018-06-09

    The C-MAC laryngoscope (C-MAC) is a videolaryngoscope that uses a modified Macintosh blade. Although several anecdotal reports exist, it remains unclear whether the C-MAC is superior to the Macintosh laryngoscope for tracheal intubation in the adult population. Systematic review, meta-analysis. Operating room, intensive care unit. For inclusion in our analysis, studies had to be prospective randomised trials which compared the C-MAC with the Macintosh laryngoscope for tracheal intubation in the adult population. Data on success rates, intubation time, glottic visualisation and incidence of external laryngeal manipulations (ELM) during tracheal intubation were extracted from the identified studies. In subgroup analysis, we separated those parameters to assess the influence of the airway condition (normal or difficult) and laryngoscopists (novice or experienced). We conducted a trial sequential analysis (TSA). Sixteen articles with 18 trials met the inclusion criteria. The C-MAC provided better glottic visualisation compared to the Macintosh (RR, 1.08; 95% CI, 1.03-1.14). TSA corrected the CI to 1.01-1.19; thus, total sample size reached the required information size (RIS). Success rates and intubation time did not differ significantly between the laryngoscopes. TSA showed that total sample size reached the RIS for success rates. The TSA Z curve surpassed the futility boundary. The C-MAC required less ELM compared to the Macintosh (RR, 0.83; 95% CI, 0.72-0.96). TSA corrected the CI to 0.67-1.03; 52.3% of the RIS was achieved. In difficult airways, the C-MAC showed superior success rates, glottic visualisation, and less ELM compared to the Macintosh. Among experienced laryngoscopists, the C-MAC offered better glottic visualisation with less ELM than the Macintosh. The C-MAC provided better glottic visualisation and less ELM (GRADE: Very Low or Moderate), with improved success rates, glottic visualisation, and less ELM in difficult airways. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. GAMERA - The New Magnetospheric Code

    NASA Astrophysics Data System (ADS)

    Lyon, J.; Sorathia, K.; Zhang, B.; Merkin, V. G.; Wiltberger, M. J.; Daldorff, L. K. S.

    2017-12-01

    The Lyon-Fedder-Mobarry (LFM) code has been a main-line magnetospheric simulation code for 30 years. The code base, designed in the age of memory to memory vector ma- chines,is still in wide use for science production but needs upgrading to ensure the long term sustainability. In this presentation, we will discuss our recent efforts to update and improve that code base and also highlight some recent results. The new project GAM- ERA, Grid Agnostic MHD for Extended Research Applications, has kept the original design characteristics of the LFM and made significant improvements. The original de- sign included high order numerical differencing with very aggressive limiting, the ability to use arbitrary, but logically rectangular, grids, and maintenance of div B = 0 through the use of the Yee grid. Significant improvements include high-order upwinding and a non-clipping limiter. One other improvement with wider applicability is an im- proved averaging technique for the singularities in polar and spherical grids. The new code adopts a hybrid structure - multi-threaded OpenMP with an overarching MPI layer for large scale and coupled applications. The MPI layer uses a combination of standard MPI and the Global Array Toolkit from PNL to provide a lightweight mechanism for coupling codes together concurrently. The single processor code is highly efficient and can run magnetospheric simulations at the default CCMC resolution faster than real time on a MacBook pro. We have run the new code through the Athena suite of tests, and the results compare favorably with the codes available to the astrophysics community. LFM/GAMERA has been applied to many different situations ranging from the inner and outer heliosphere and magnetospheres of Venus, the Earth, Jupiter and Saturn. We present example results the Earth's magnetosphere including a coupled ring current (RCM), the magnetospheres of Jupiter and Saturn, and the inner heliosphere.

  19. Conceptual Underpinnings of the Quality of Life in Neurological Disorders (Neuro-QoL): Comparisons of Core Sets for Stroke, Multiple Sclerosis, Spinal Cord Injury, and Traumatic Brain Injury.

    PubMed

    Wong, Alex W K; Lau, Stephen C L; Fong, Mandy W M; Cella, David; Lai, Jin-Shei; Heinemann, Allen W

    2018-04-03

    To determine the extent to which the content of the Quality of Life in Neurological Disorders (Neuro-QoL) covers the International Classification of Functioning, Disability and Health (ICF) Core Sets for multiple sclerosis (MS), stroke, spinal cord injury (SCI), and traumatic brain injury (TBI) using summary linkage indicators. Content analysis by linking content of the Neuro-QoL to corresponding ICF codes of each Core Set for MS, stroke, SCI, and TBI. Three academic centers. None. None. Four summary linkage indicators proposed by MacDermid et al were estimated to compare the content coverage between Neuro-QoL and the ICF codes of Core Sets for MS, stroke, MS, and TBI. Neuro-QoL represented 20% to 30% Core Set codes for different conditions in which more codes in Core Sets for MS (29%), stroke (28%), and TBI (28%) were covered than those for SCI in the long-term (20%) and early postacute (19%) contexts. Neuro-QoL represented nearly half of the unique Activity and Participation codes (43%-49%) and less than one third of the unique Body Function codes (12%-32%). It represented fewer Environmental Factors codes (2%-6%) and no Body Structures codes. Absolute linkage indicators found that at least 60% of Neuro-QoL items were linked to Core Set codes (63%-95%), but many items covered the same codes as revealed by unique linkage indicators (7%-13%), suggesting high concept redundancy among items. The Neuro-QoL links more closely to ICF Core Sets for stroke, MS, and TBI than to those for SCI, and primarily covers activity and participation ICF domains. Other instruments are needed to address concepts not measured by the Neuro-QoL when a comprehensive health assessment is needed. Copyright © 2018 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  20. Security Concepts for Satellite Links

    NASA Astrophysics Data System (ADS)

    Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.

    2008-08-01

    The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).

  1. Women in STEM: The Effect of Undergraduate Research on Persistence

    NASA Astrophysics Data System (ADS)

    Wilker, Jodi

    The underrepresentation of women in science, technology, engineering, and math (STEM) careers constitutes a major issue in postsecondary science education. Perseverance of women in STEM is linked to a strong science identity. Experiential learning activities, such as undergraduate research, increase science identity and thus should help keep women in STEM. Most studies on research program development are from 4-year institutions, yet many women start at community colleges. The goal of this study was to fill this gap. Science identity and experiential learning theories provided the framework for this case study at a local institution (LECC). Semistructured interviews determined college science faculty and administrators perceptions of advantages and disadvantages of undergraduate research, the viability of developing a research program, and specific research options feasible for LECC. Transcripted data were analyzed through multiple rounds of coding yielding five themes: faculty perception of undergraduate research, authentic experiences, health technologies/nursing programs, LECC students career focus, and the unique culture at LECC. The most viable type of undergraduate research for LECC is course-based and of short timeframe. The project study advocates the use of citizen science (CS) studies in the classroom as they are relatively short-term and can take the place of lab sessions. The true benefit is that students perform authentic science by contributing to an actual scientific research project. CS projects can effect social change by developing science literate citizens, empowering faculty to create authentic learning experiences, and by sparking interest in science and directing women into STEM careers.

  2. 33 CFR 334.630 - Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...″, longitude 82°33′02.44″; and thence to a point on the shore line of MacDill Air Force Base at latitude 27°50...

  3. C-Band Airport Surface Communications System Standards Development. Phase II Final Report. Volume 2: Test Bed Performance Evaluation and Final AeroMACS Recommendations

    NASA Technical Reports Server (NTRS)

    Hall, Edward; Magner, James

    2011-01-01

    This report is provided as part of ITT s NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: New ATM Requirements-Future Communications, C-Band and L-Band Communications Standard Development and was based on direction provided by FAA project-level agreements for New ATM Requirements-Future Communications. Task 7 included two subtasks. Subtask 7-1 addressed C-band (5091- to 5150-MHz) airport surface data communications standards development, systems engineering, test bed and prototype development, and tests and demonstrations to establish operational capability for the Aeronautical Mobile Airport Communications System (AeroMACS). Subtask 7-2 focused on systems engineering and development support of the L-band digital aeronautical communications system (L-DACS). Subtask 7-1 consisted of two phases. Phase I included development of AeroMACS concepts of use, requirements, architecture, and initial high-level safety risk assessment. Phase II builds on Phase I results and is presented in two volumes. Volume I is devoted to concepts of use, system requirements, and architecture, including AeroMACS design considerations. Volume II (this document) describes an AeroMACS prototype evaluation and presents final AeroMACS recommendations. This report also describes airport categorization and channelization methodologies. The purposes of the airport categorization task were (1) to facilitate initial AeroMACS architecture designs and enable budgetary projections by creating a set of airport categories based on common airport characteristics and design objectives, and (2) to offer high-level guidance to potential AeroMACS technology and policy development sponsors and service providers. A channelization plan methodology was developed because a common global methodology is needed to assure seamless interoperability among diverse AeroMACS services potentially supplied by multiple service providers.

  4. Dendritic Cell-specific Intercellular Adhesion Molecule 3-grabbing Non-integrin (DC-SIGN) Recognizes a Novel Ligand, Mac-2-binding Protein, Characteristically Expressed on Human Colorectal Carcinomas*

    PubMed Central

    Nonaka, Motohiro; Ma, Bruce Yong; Imaeda, Hirotsugu; Kawabe, Keiko; Kawasaki, Nobuko; Hodohara, Keiko; Kawasaki, Nana; Andoh, Akira; Fujiyama, Yoshihide; Kawasaki, Toshisuke

    2011-01-01

    Dendritic cell (DC)-specific intercellular adhesion molecule-3-grabbing non-integrin (DC-SIGN) is a type II transmembrane C-type lectin expressed on DCs such as myeloid DCs and monocyte-derived DCs (MoDCs). Recently, we have reported that DC-SIGN interacts with carcinoembryonic antigen (CEA) expressed on colorectal carcinoma cells. CEA is one of the most widely used tumor markers for gastrointestinal cancers such as colorectal cancer. On the other hand, other groups have reported that the level of Mac-2-binding protein (Mac-2BP) increases in patients with pancreatic, breast, and lung cancers, virus infections such as human immunodeficiency virus and hepatitis C virus, and autoimmune diseases. Here, we first identified Mac-2BP expressed on several colorectal carcinoma cell lines as a novel DC-SIGN ligand through affinity chromatography and mass spectrometry. Interestingly, we found that DC-SIGN selectively recognizes Mac-2BP derived from some colorectal carcinomas but not from the other ones. Furthermore, we found that the α1-3,4-fucose moieties of Le glycans expressed on DC-SIGN-binding Mac-2BP were important for recognition. DC-SIGN-dependent cellular interactions between immature MoDCs and colorectal carcinoma cells significantly inhibited MoDC functional maturation, suggesting that Mac-2BP may provide a tolerogenic microenvironment for colorectal carcinoma cells through DC-SIGN-dependent recognition. Importantly, Mac-2BP was detected as a predominant DC-SIGN ligand expressed on some primary colorectal cancer tissues from certain parts of patients in comparison with CEA from other parts, suggesting that DC-SIGN-binding Mac-2BP bearing tumor-associated Le glycans may become a novel potential colorectal cancer biomarker for some patients instead of CEA. PMID:21515679

  5. Staging of Macular Telangiectasia: Power-Doppler Optical Coherence Tomography and Macular Pigment Optical Density

    PubMed Central

    Chin, Eric K.; Kim, Dae Yu; Hunter, Allan A.; Pilli, Suman; Wilson, Machelle; Zawadzki, Robert J.; Werner, John S.; Park, Susanna S.

    2013-01-01

    Purpose. Two methods were used to study the stages of macular telangiectasia (MacTel): Power-Doppler optical coherence tomography (PD-OCT), which allows imaging of the retinal circulation in three dimensions, and macular pigment optical density (MPOD), which quantifies the distribution of macular carotenoids. Methods. Among 49 patients with MacTel identified, 12 eyes (6 patients) with MacTel and 7 age-matched control eyes (7 patients) were imaged with a custom-built Fourier-domain OCT instrument to acquire PD-OCT images. MPOD was measured using heterochromatic flicker photometry in 10 eyes (5 patients) with MacTel and compared with 44 age-matched control eyes (44 patients). Clinical staging of MacTel was based on best-corrected visual acuity, fundus biomicroscopy, fluorescein angiography, and OCT. Results. Stage 1 eyes (n = 2) had subtle punctate vascular signal confined to the inner portion of the outer plexiform layer (OPL) on PD-OCT. Stage 2 (n = 2) showed larger oblique vascular signal extending into deeper OPL. Stage 3 (n = 5) had disruption of outer retinal layers with abnormal vasculature extending into the outer nuclear layer. Stage 4 (n = 3) showed diffuse blurring of the retinal layers with vascular channels extending the full thickness of the retina. MPOD values in four eyes with stage 1 or 2 MacTel correlated well with age-matched controls. Six eyes with stage 3 or 4 MacTel had loss of MPOD especially at the fovea. Conclusions. PD-OCT shows penetration of the retinal capillaries into the deeper retinal layers in early stages of MacTel, with full thickness vascular proliferation in advanced disease. MPOD is commonly depleted but may appear normal in early stage MacTel. PMID:23716628

  6. C-Band Airport Surface Communications System Standards Development. Phase II Final Report. Volume 1: Concepts of Use, Initial System Requirements, Architecture, and AeroMACS Design Considerations

    NASA Technical Reports Server (NTRS)

    Hall, Edward; Isaacs, James; Henriksen, Steve; Zelkin, Natalie

    2011-01-01

    This report is provided as part of ITT s NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: New ATM Requirements-Future Communications, C-Band and L-Band Communications Standard Development and was based on direction provided by FAA project-level agreements for New ATM Requirements-Future Communications. Task 7 included two subtasks. Subtask 7-1 addressed C-band (5091- to 5150-MHz) airport surface data communications standards development, systems engineering, test bed and prototype development, and tests and demonstrations to establish operational capability for the Aeronautical Mobile Airport Communications System (AeroMACS). Subtask 7-2 focused on systems engineering and development support of the L-band digital aeronautical communications system (L-DACS). Subtask 7-1 consisted of two phases. Phase I included development of AeroMACS concepts of use, requirements, architecture, and initial high-level safety risk assessment. Phase II builds on Phase I results and is presented in two volumes. Volume I (this document) is devoted to concepts of use, system requirements, and architecture, including AeroMACS design considerations. Volume II describes an AeroMACS prototype evaluation and presents final AeroMACS recommendations. This report also describes airport categorization and channelization methodologies. The purposes of the airport categorization task were (1) to facilitate initial AeroMACS architecture designs and enable budgetary projections by creating a set of airport categories based on common airport characteristics and design objectives, and (2) to offer high-level guidance to potential AeroMACS technology and policy development sponsors and service providers. A channelization plan methodology was developed because a common global methodology is needed to assure seamless interoperability among diverse AeroMACS services potentially supplied by multiple service providers.

  7. Resting heart rate and the incidence and progression of valvular calcium: The Multi-Ethnic Study of Atherosclerosis (MESA).

    PubMed

    Amoakwa, Kojo; Fashanu, Oluwaseun E; Tibuakuu, Martin; Zhao, Di; Guallar, Eliseo; Whelton, Seamus P; O'Neal, Wesley T; Post, Wendy S; Budoff, Matthew J; Michos, Erin D

    2018-06-01

    Left-sided valvular calcification is associated with cardiovascular disease (CVD) morbidity and mortality. Resting heart rate (RHR) may influence valvular calcium progression through shear stress. Whether RHR, an established CVD risk factor, is associated with valvular calcium progression is unknown. We assessed whether RHR predicts incidence and progression of mitral annular calcium (MAC) and aortic valve calcium (AVC) in a community-based cohort free of CVD at baseline. RHR was obtained from baseline electrocardiograms of 5498 MESA participants. MAC and AVC were quantified using Agatston scoring from cardiac computed tomography scans obtained at baseline and at a second examination during follow-up. We examined associations of RHR with incident MAC/AVC and annual change in MAC/AVC scores, after adjusting for demographics, CVD risk factors, physical activity, and atrioventricular nodal blocker use. At baseline, participants had mean age of 62 ± 10 years and mean RHR of 63 ± 10 bpm; 12.3% and 8.9% had prevalent AVC and MAC, respectively. Over a median of 2.3 years, 4.1% and 4.5% developed incident AVC and MAC, respectively. Each 10 bpm higher RHR was significantly associated with incident MAC [Risk Ratio 1.17 (95% CI 1.03-1.34)], but not incident AVC. However, RHR was associated with AVC progression [β = 1.62 (0.45-2.80) Agatston units/year for every 10 bpm increment], but not MAC progression. Higher RHR was associated with MAC incidence and AVC progression, independent of traditional CVD risk factors. Future studies are needed to determine whether modification of RHR through lifestyle or pharmacologic interventions can reduce valvular calcium incidence or progression. Copyright © 2018 Elsevier B.V. All rights reserved.

  8. Moringa isothiocyanate complexed with α-cyclodextrin: a new perspective in neuroblastoma treatment.

    PubMed

    Giacoppo, Sabrina; Iori, Renato; Rollin, Patrick; Bramanti, Placido; Mazzon, Emanuela

    2017-07-14

    Several lines of evidence suggest the consume of natural products for cancer prevention or treatment. In particular, isothiocyanates (ITCs) exerting anti-cancer properties, have received great interest as potential chemotherapeutic agents. This study was designed to assess the anti-proliferative activities of a new preparation of Moringa oleifera-derived 4-(α-L-rhamnopyranosyloxy)benzyl ITC (moringin) complexed with alpha-cyclodextrin (moringin + α-CD; MAC) on SH-SY5Y human neuroblastoma cells. This new formulation arises in the attempt to overcome the poor solubility and stability of moringin alone in aqueous media. SH-SY5Y cells were cultured and exposed to increasing concentrations of MAC (1.0, 2.5 and 5.0 μg). Cell proliferation was examined by MTT and cell count assays. The cytotoxic activity of the MAC complex was assessed by lactate dehydrogenase (LDH) assay and trypan blue exclusion test. In addition, western blotting analyses for the main apoptosis-related proteins were performed. Treatment of SH-SY5Y cells with the MAC complex reduced cell growth in concentration dependent manner. Specifically, MAC exhibited a potent action in inhibiting the PI3K/Akt/mTOR pathway, whose aberrant activation was found in many types of cancer. MAC was also found to induce the nuclear factor-κB (NF-κB) p65 activation by phosphorylation and its translocation into the nucleus. Moreover, treatment with MAC was able to down-regulate MAPK pathway (results focused on JNK and p38 expression). Finally, MAC was found to trigger apoptotic death pathway (based on expression levels of cleaved-caspase 3, Bax/Bcl-2 balance, p53 and p21). These findings suggest that use of MAC complex may open novel perspectives to improve the poor prognosis of patients with neuroblastoma.

  9. Electromyographic activation reveals cortical and sub-cortical dissociation during emergence from general anesthesia.

    PubMed

    Hight, Darren F; Voss, Logan J; García, Paul S; Sleigh, Jamie W

    2017-08-01

    During emergence from anesthesia patients regain their muscle tone (EMG). In a typical population of surgical patients the actual volatile gas anesthetic concentrations in the brain (C e MAC) at which EMG activation occurs remains unknown, as is whether EMG activation at higher C e MACs is correlated with subsequent severe pain, or with cortical activation. Electroencephalographic (EEG) and EMG activity was recorded from the forehead of 273 patients emerging from general anesthesia following surgery. We determined C e MAC at time of EMG activation and at return of consciousness. Pain was assessed immediately after return of consciousness using an 11 point numerical rating scale. The onset of EMG activation during emergence was associated with neither discernible muscle movement nor with the presence of exogenous stimulation in half the patients. EMG activation could be modelled as two distinct processes; termed high- and low-C e MAC (occurring higher or lower than 0.07 C e MAC). Low-C e MAC activation was typically associated with simultaneous EMG activation and consciousness, and the presence of a laryngeal mask. In contrast, high-C e MAC EMG activation occurred independently of return of consciousness, and was not associated with severe post-operative pain, but was more common in the presence of an endotracheal tube. Patients emerging from general anesthesia with an endotracheal tube in place are more likely to have an EMG activation at higher C e MAC concentrations. These activations are not associated with subsequent high-pain, nor with cortical arousal, as evidenced by continuing delta waves in the EEG. Conversely, patients emerging from general anesthesia with a laryngeal mask demonstrate marked neural inertia-EMG activation occurs at a low C e MAC, and is closely temporally associated with return of consciousness.

  10. Xenon neurotoxicity in rat hippocampal slice cultures is similar to isoflurane and sevoflurane.

    PubMed

    Brosnan, Heather; Bickler, Philip E

    2013-08-01

    Anesthetic neurotoxicity in the developing brain of rodents and primates has raised concern. Xenon may be a nonneurotoxic alternative to halogenated anesthetics, but its toxicity has only been studied at low concentrations, where neuroprotective effects predominate in animal models. An equipotent comparison of xenon and halogenated anesthetics with respect to neurotoxicity in developing neurons has not been made. Organotypic hippocampal cultures from 7-day-old rats were exposed to 0.75, 1, and 2 minimum alveolar concentrations (MAC) partial pressures (60% xenon at 1.2, 2.67, and 3.67 atm; isoflurane at 1.4, 1.9, and 3.8%; and sevoflurane at 3.4 and 6.8%) for 6 h, at atmospheric pressure or in a pressure chamber. Cell death was assessed 24 h later with fluorojade and fluorescent dye exclusion techniques. Xenon caused death of hippocampal neurons in CA1, CA3, and dentate regions after 1 and 2 MAC exposures, but not at 0.75 MAC. At 1 MAC, xenon increased cell death 40% above baseline (P < 0.01; ANOVA with Dunnett test). Both isoflurane and sevoflurane increased neuron death at 1 but not 2 MAC. At 1 MAC, the increase in cell death compared with controls was 63% with isoflurane and 90% with sevoflurane (both P < 0.001). Pretreatment of cultures with isoflurane (0.75 MAC) reduced neuron death after 1 MAC xenon, isoflurane, and sevoflurane. Xenon causes neuronal cell death in an in vitro model of the developing rodent brain at 1 MAC, as does isoflurane and sevoflurane at similarly potent concentrations. Preconditioning with a subtoxic dose of isoflurane eliminates this toxicity.

  11. Operational effectiveness of a Multiple Aquila Control System (MACS)

    NASA Technical Reports Server (NTRS)

    Brown, R. W.; Flynn, J. D.; Frey, M. R.

    1983-01-01

    The operational effectiveness of a multiple aquila control system (MACS) was examined under a variety of remotely piloted vehicle (RPV) mission configurations. The set of assumptions and inputs used to form the rules under which a computerized simulation of MACS was run is given. The characteristics that are to govern MACS operations include: the battlefield environment that generates the requests for RPV missions, operating time-lines of the RPV-peculiar equipment, maintenance requirements, and vulnerability to enemy fire. The number of RPV missions and the number of operation days are discussed. Command, control, and communication data rates are estimated by determining how many messages are passed and what information is necessary in them to support ground coordination between MACS sections.

  12. Acoustical transmission-line model of the middle-ear cavities and mastoid air cells.

    PubMed

    Keefe, Douglas H

    2015-04-01

    An acoustical transmission line model of the middle-ear cavities and mastoid air cell system (MACS) was constructed for the adult human middle ear with normal function. The air-filled cavities comprised the tympanic cavity, aditus, antrum, and MACS. A binary symmetrical airway branching model of the MACS was constructed using an optimization procedure to match the average total volume and surface area of human temporal bones. The acoustical input impedance of the MACS was calculated using a recursive procedure, and used to predict the input impedance of the middle-ear cavities at the location of the tympanic membrane. The model also calculated the ratio of the acoustical pressure in the antrum to the pressure in the middle-ear cavities at the location of the tympanic membrane. The predicted responses were sensitive to the magnitude of the viscothermal losses within the MACS. These predicted input impedance and pressure ratio functions explained the presence of multiple resonances reported in published data, which were not explained by existing MACS models.

  13. I-MAC: an incorporation MAC for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Zhao, Jumin; Li, Yikun; Li, Dengao; Lin, Xiaojie

    2017-11-01

    This paper proposes an innovative MAC protocol called I-MAC. Protocol for wireless sensor networks, which combines the advantages of collision tolerance and collision cancellation. The protocol increases the number of antenna in wireless sensor nodes. The purpose is to monitor the occurrence of packet collisions by increasing the number of antenna in real time. The built-in identity structure is used in the frame structure in order to help the sending node to identify the location of the receiving node after a data packet collision is detected. Packets can be recovered from where the conflict occurred. In this way, we can monitor the conflict for a fixed period of time. It can improve the channel utilisation through changing the transmission probability of collision nodes and solve the problem of hidden terminal through collision feedback mechanism. We have evaluated our protocol. Our results show that the throughput of I-MAC is 5 percentage points higher than that of carrier sense multiple access/collision notification. The network utilisation of I-MAC is more than 92%.

  14. Low-temperature MIR to submillimeter mass absorption coefficient of interstellar dust analogues. II. Mg and Fe-rich amorphous silicates

    NASA Astrophysics Data System (ADS)

    Demyk, K.; Meny, C.; Leroux, H.; Depecker, C.; Brubach, J.-B.; Roy, P.; Nayral, C.; Ojo, W.-S.; Delpech, F.

    2017-10-01

    Context. To model the cold dust emission observed in the diffuse interstellar medium, in dense molecular clouds or in cold clumps that could eventually form new stars, it is mandatory to know the physical and spectroscopic properties of this dust and to understand its emission. Aims: This work is a continuation of previous studies aiming at providing astronomers with spectroscopic data of realistic cosmic dust analogues for the interpretation of observations. The aim of the present work is to extend the range of studied analogues to iron-rich silicate dust analogues. Methods: Ferromagnesium amorphous silicate dust analogues were produced by a sol-gel method with a mean composition close to Mg1-xFexSiO3 with x = 0.1, 0.2, 0.3, 0.4. Part of each sample was annealed at 500 °C for two hours in a reducing atmosphere to modify the oxidation state of iron. We have measured the mass absorption coefficient (MAC) of these eight ferromagnesium amorphous silicate dust analogues in the spectral domain 30-1000 μm for grain temperature in the range 10-300 K and at room temperature in the 5-40 μm range. Results: The MAC of ferromagnesium samples behaves in the same way as the MAC of pure Mg-rich amorphous silicate samples. In the 30-300 K range, the MAC increases with increasing grain temperature whereas in the range 10-30 K, we do not see any change of the MAC. The MAC cannot be described by a single power law in λ- β. The MAC of the samples does not show any clear trend with the iron content. However the annealing process has, on average, an effect on the MAC that we explain by the evolution of the structure of the samples induced by the processing. The MAC of all the samples is much higher than the MAC calculated by dust models. Conclusions: The complex behavior of the MAC of amorphous silicates with wavelength and temperature is observed whatever the exact silicate composition (Mg vs. Fe amount). It is a universal characteristic of amorphous materials, and therefore of amorphous cosmic silicates, that should be taken into account in astronomical modeling. The enhanced MAC of the measured samples compared to the MAC calculated for cosmic dust model implies that dust masses are overestimated by the models. The tabulated mass absorption coefficients are only available at the CDS via anonymous ftp to http://cdsarc.u-strasbg.fr (http://130.79.128.5) or via http://cdsarc.u-strasbg.fr/viz-bin/qcat?J/A+A/606/A50

  15. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  16. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    PubMed Central

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  17. Spectroscopic investigation of the interaction of water-soluble azocalix[4]arenes with bovine serum albumin.

    PubMed

    Fan, Ping; Wan, Lu; Shang, Yunshan; Wang, Jun; Liu, Yulong; Sun, Xiaoyu; Chen, Chen

    2015-02-01

    In this work, three hydrosoluble azocalix[4]arene derivatives, 5-(o-methylphenylazo)-25,26,27-tris(carboxymethoxy)-28-hydroxycalix[4]arene (o-MAC-Calix), 5-(m-methylphenylazo)-25,26,27-tris(carboxymethoxy)-28-hydroxycalix[4]arene (m-MAC-Calix) and 5-(p-methylphenylazo)-25,26,27-tris(carboxymethoxy)-28-hydroxycalix[4]arene (p-MAC-Calix) were synthesized. Their structures were characterized by infrared spectrum (IR), nuclear magnetic resonance spectrum (1H NMR and 13C NMR) and mass spectrum (MS). The interactions between these compounds and bovine serum albumin (BSA) were studied by fluorescence spectroscopy, UV-vis spectrophotometry and circular dichroic spectroscopy. According to experimental results, three azocalix[4]arene derivatives can efficiently bind to BSA molecules and the o-MAC-Calix displays more efficient interactions with BSA molecules than m-MAC-Calix and p-MAC-Calix. Molecular docking showed that the o-MAC-Calix was embedded in the hydrophobic cavity of helical structure of BSA molecular and the tryptophan (Trp) residue of BSA molecular had strong interaction with o-MAC-Calix. The fluorescence quenching of BSA caused by azocalix[4]arene derivatives is attributed to the static quenching process. In addition, the synchronous fluorescence spectroscopy indicates that these azocalix[4]arene derivatives are more accessible to Trp residues of BSA molecules than the tyrosine (Tyr) residues. The circular dichroic spectroscopy further verified the binding of azocalix[4]arene derivatives and BSA. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. Median effective dose of isoflurane, sevoflurane, and desflurane in green iguanas.

    PubMed

    Barter, Linda S; Hawkins, Michelle G; Brosnan, Robert J; Antognini, Joseph F; Pypendop, Bruno H

    2006-03-01

    To determine the median effective dose (ED(50); equivalent to the minimum alveolar concentration [MAC]) of isoflurane, sevoflurane, and desflurane for anesthesia in iguanas. 6 healthy adult green iguanas. In unmedicated iguanas, anesthesia was induced and maintained with each of the 3 volatile drugs administered on separate days according to a Latin square design. Iguanas were endotracheally intubated, mechanically ventilated, and instrumented for cardiovascular and respiratory measurements. During each period of anesthesia, MAC was determined in triplicate. The mean value of 2 consecutive expired anesthetic concentrations, 1 that just permitted and 1 that just prevented gross purposeful movement in response to supramaximal electrical stimulus, and that were not different by more than 15%, was deemed the MAC. Mean +/- SD values for the third MAC determination for isoflurane, sevoflurane, and desflurane were 1.8 +/- 0.3%, 3.1 +/- 1.0%, and 8.9 +/- 2.1% of atmospheric pressure, respectively. The MAC for all inhaled agents was, on average, 22% greater for the first measurement than for the third measurement. Over time, MACs decreased for all 3 agents. Final MAC measurements were similar to values reported for other species. The decrease in MACs over time may be at least partly explained by limitations of anesthetic uptake and distribution imposed by the reptilian cardiorespiratory system. Hence, for a constant end-tidal anesthetic concentration in an iguana, the plane of anesthesia may deepen over time, which could contribute to increased morbidity during prolonged procedures.

  19. Matrix-assisted cocrystallization (MAC) simultaneous production and formulation of pharmaceutical cocrystals by hot-melt extrusion.

    PubMed

    Boksa, Kevin; Otte, Andrew; Pinal, Rodolfo

    2014-09-01

    A novel method for the simultaneous production and formulation of pharmaceutical cocrystals, matrix-assisted cocrystallization (MAC), is presented. Hot-melt extrusion (HME) is used to create cocrystals by coprocessing the drug and coformer in the presence of a matrix material. Carbamazepine (CBZ), nicotinamide (NCT), and Soluplus were used as a model drug, coformer, and matrix, respectively. The MAC product containing 80:20 (w/w) cocrystal:matrix was characterized by differential scanning calorimetry, Fourier transform infrared spectroscopy, and powder X-ray diffraction. A partial least squares (PLS) regression model was developed for quantifying the efficiency of cocrystal formation. The MAC product was estimated to be 78% (w/w) cocrystal (theoretical 80%), with approximately 0.3% mixture of free (unreacted) CBZ and NCT, and 21.6% Soluplus (theoretical 20%) with the PLS model. A physical mixture (PM) of a reference cocrystal (RCC), prepared by precipitation from solution, and Soluplus resulted in faster dissolution relative to the pure RCC. However, the MAC product with the exact same composition resulted in considerably faster dissolution and higher maximum concentration (∼five-fold) than those of the PM. The MAC product consists of high-quality cocrystals embedded in a matrix. The processing aspect of MAC plays a major role on the faster dissolution observed. The MAC approach offers a scalable process, suitable for the continuous manufacturing and formulation of pharmaceutical cocrystals. © 2014 Wiley Periodicals, Inc. and the American Pharmacists Association.

  20. Assessment of parental decision-making in neonatal cardiac research: a pilot study.

    PubMed

    Nathan, Aruna T; Hoehn, K Sarah; Ittenbach, Richard F; Gaynor, J William; Nicolson, Susan; Wernovsky, Gil; Nelson, Robert M

    2010-02-01

    To assess parental permission for a neonate's research participation using the MacArthur competence assessment tool for clinical research (MacCAT-CR), specifically testing the components of understanding, appreciation, reasoning and choice. Quantitative interviews using study-specific MacCAT-CR tools. Parents of critically ill newborns would produce comparable MacCAT-CR scores to healthy adult controls despite the emotional stress of an infant with critical heart disease or the urgency of surgery. Parents of infants diagnosed prenatally would have higher MacCAT-CR scores than parents of infants diagnosed postnatally. There would be no difference in MacCAT-CR scores between parents with respect to gender or whether they did or did not permit research participation. Parents of neonates undergoing cardiac surgery who had made decisions about research participation before their neonate's surgery. The MacCAT-CR. 35 parents (18 mothers; 17 fathers) of 24 neonates completed 55 interviews for one or more of three studies. Total scores: magnetic resonance imaging (mean 36.6, SD 7.71), genetics (mean 38.8, SD 3.44), heart rate variability (mean 37.7, SD 3.30). Parents generally scored higher than published subject populations and were comparable to published control populations with some exceptions. The MacCAT-CR can be used to assess parental permission for neonatal research participation. Despite the stress of a critically ill neonate requiring surgery, parents were able to understand study-specific information and make informed decisions to permit their neonate's participation.

  1. Pre- and postconditioning effect of Sevoflurane on myocardial dysfunction after cardiopulmonary resuscitation in rats.

    PubMed

    Knapp, Jürgen; Bergmann, Greta; Bruckner, Thomas; Russ, Nicolai; Böttiger, Bernd W; Popp, Erik

    2013-10-01

    Post-resuscitation myocardial dysfunction is an important cause of death in the intensive care unit after initially successful cardiopulmonary resuscitation (CPR) of pre-hospital cardiac arrest (CA) patients. Volatile anaesthetics reduce ischaemic-reperfusion injury in regional ischaemia in beating hearts. This effect, called anaesthetic-induced pre- or postconditioning, can be shown when the volatile anaesthetic is given either before regional ischaemia or in the reperfusion phase. However, up to now, little data exist for volatile anaesthetics after global ischaemia due to CA. Therefore, the goal of this study was to clarify whether Sevoflurane improves post-resuscitation myocardial dysfunction after CA in rats. Following institutional approval by the Governmental Animal Care Committee, 144 male Wistar rats (341±19g) were randomized either to a control group or to one of the 9 interventional groups receiving 0.25 MAC, 0.5 MAC or 1 MAC of Sevoflurane for 5min either before resuscitation (SBR), during resuscitation (SDR) or after resuscitation (SAR). After 6min of electrically induced ventricular fibrillation CPR was performed. Before CA (baseline) as well as 1h and 24h after restoration of spontaneous circulation (ROSC), continuous measurement of ejection fraction (EF), and preload adjusted maximum power (PAMP) as primary outcome parameters and end systolic pressure (ESP), end diastolic volume (EDV) and maximal slope of systolic pressure increment (dP/dtmax) as secondary outcome parameters was performed using a conductance catheter. EF was improved in all Sevoflurane treated groups 1h after ROSC in comparison to control, except for the 0.25 MAC SDR and 0.25 MAC SAR group (0.25 MAC SBR: 38±8, p=0.02; 0.5 MAC SBR: 39±7, p=0.04; 1 MAC SBR: 40±6, p=0.007; 0.5 MAC SDR: 38±7, p=0.02; 1 MAC SDR: 40±6, p=0.006; 0.5 MAC SAR: 39±6, p=0.01; 1 MAC SAR: 39±6, p=0.002, vs. 30±7%). Twenty-four hours after ROSC, EF was higher than control in all interventional groups (p<0.05 for all groups). EF recovered to baseline values 24h after ROSC in all SBR and SAR groups. PAMP was improved in comparison to control (4.6±3.0mW/μl(2)) 24h after ROSC in 0.5 MAC SBR (9.4±6.9mW/μl(2), p=0.04), 1 MAC SBR (8.9±4.4mW/μl(2), p=0.04), 1 MAC SDR (8.0±5.7mW/μl(2), p=0.04), and 1 MAC SAR (7.3±3.5mW/μl(2), p=0.04). ESP, EDV, and dP/dtmax was not different from control 1h as well as 24h after ROSC with the exception of 1 MAC SDR with a reduced ESP 1h after ROSC (89±16 vs. 103±22mmHg, p=0.04). Sevoflurane treatment did not affect survival rate. This animal study of CA and resuscitation provides the hypothesis that pharmacological pre- or postconditioning with the volatile anaesthetic Sevoflurane - administered before CA, during resuscitation or after ROSC - results in an improved myocardial inotropy 24h after ROSC. Sevoflurane treatment seems to improve EF even in the early phase of reperfusion 1h after ROSC. Therefore further targeted studies on the optimal dose and time point of administration of Sevoflurane in cardiopulmonary resuscitation seem to be worthwhile (Institutional protocol number: 35-9185.81/G-24/08). Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  2. Printable, scannable biometric templates for secure documents and materials

    NASA Astrophysics Data System (ADS)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  3. NanoPack: visualizing and processing long read sequencing data.

    PubMed

    De Coster, Wouter; D'Hert, Svenn; Schultz, Darrin T; Cruts, Marc; Van Broeckhoven, Christine

    2018-03-14

    Here we describe NanoPack, a set of tools developed for visualization and processing of long read sequencing data from Oxford Nanopore Technologies and Pacific Biosciences. The NanoPack tools are written in Python3 and released under the GNU GPL3.0 License. The source code can be found at https://github.com/wdecoster/nanopack, together with links to separate scripts and their documentation. The scripts are compatible with Linux, Mac OS and the MS Windows 10 subsystem for Linux and are available as a graphical user interface, a web service at http://nanoplot.bioinf.be and command line tools. wouter.decoster@molgen.vib-ua.be. Supplementary tables and figures are available at Bioinformatics online.

  4. Mac-based Web authoring: How to learn as little Unix as possible while getting on the Web.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gennari, L.T.

    1996-06-01

    This document is a general guide for creating Web pages, using commonly available word processing and file transfer applications. It is not a full guide to HTML, nor does it provide an introduction to the many WYSIWYG HTML editors available. The viability of the authoring method it describes will not be affected by changes in the HTML specification or the rapid release-and-obsolescence cycles of commercial WYSIWYG HTML editors. This document provides a gentle introduction to HTML for the beginner and as the user gains confidence and experience, encourages greater familiarity with HTML through continued exposure to and hands-on usage ofmore » HTML code.« less

  5. PRay - A graphical user interface for interactive visualization and modification of rayinvr models

    NASA Astrophysics Data System (ADS)

    Fromm, T.

    2016-01-01

    PRay is a graphical user interface for interactive displaying and editing of velocity models for seismic refraction. It is optimized for editing rayinvr models but can also be used as a dynamic viewer for ray tracing results from other software. The main features are the graphical editing of nodes and fast adjusting of the display (stations and phases). It can be extended by user-defined shell scripts and links to phase picking software. PRay is open source software written in the scripting language Perl, runs on Unix-like operating systems including Mac OS X and provides a version controlled source code repository for community development (https://sourceforge.net/projects/pray-plot-rayinvr/).

  6. The Infobiotics Workbench: an integrated in silico modelling platform for Systems and Synthetic Biology.

    PubMed

    Blakes, Jonathan; Twycross, Jamie; Romero-Campero, Francisco Jose; Krasnogor, Natalio

    2011-12-01

    The Infobiotics Workbench is an integrated software suite incorporating model specification, simulation, parameter optimization and model checking for Systems and Synthetic Biology. A modular model specification allows for straightforward creation of large-scale models containing many compartments and reactions. Models are simulated either using stochastic simulation or numerical integration, and visualized in time and space. Model parameters and structure can be optimized with evolutionary algorithms, and model properties calculated using probabilistic model checking. Source code and binaries for Linux, Mac and Windows are available at http://www.infobiotics.org/infobiotics-workbench/; released under the GNU General Public License (GPL) version 3. Natalio.Krasnogor@nottingham.ac.uk.

  7. Child mental representations of attachment when mothers are traumatized: The relationship of family-drawings to story-stem completion.

    PubMed

    Schechter, Daniel S; Zygmunt, Annette; Trabka, Kimberly A; Davies, Mark; Colon, Elizabeth; Kolodji, Ann; McCaw, Jaime E

    2007-01-01

    This study examines the relationship between child play-narratives and family drawings by children of violence-exposed mothers with posttraumatic stress disorder (PTSD). The Family Attachment Drawing Task (FAD-T) and MacArthur Story Stem Battery (MSSB) were administered. Of the 23 children (ages 4-7 years), 16 (70%) created drawings that were coded as being representative of insecure attachment. Attachment insecurity and disorganization of child-caregiver attachment on the FAD-T were significantly associated with trauma-related dimensions of the MSSB, but not to other factors. This study suggests that the FAD-T provides access to child mental representations, which may affect intergenerational transmission of violent trauma.

  8. MacMouse. Developing Preschool Readiness Concepts and Skills with HyperCard and MacRecorder.

    ERIC Educational Resources Information Center

    Fitterman, L. Jeffrey

    Through developments with the use of the "Apple Macintosh" computer, "HyperCard," and "MacRecorder," children in preschool handicapped programs are now capable of participating in appropriate computerized learning experiences. "HyperCard" allows educators to produce their own computerized instructional…

  9. Roderick MacKinnon - Patents

    Science.gov Websites

    CHANNEL PROTEINS, MUTANT PROKARYOTIC CATION CHANNEL PROTEINS, AND USES THEREOF - MacKinnon, Roderick cation channel proteins, and potentially have uses in treating conditions related to the function of SENSOR DOMAINS OF VOLTAGE-DEPENDENT ION CHANNEL PROTEINS AND USES THEREOF - MacKinnon, Roderick; et. al

  10. A cost-effective add-on-value card-assisted firewall over Taiwan's NHI VPN framework.

    PubMed

    Huang, Jyh-Win; Hou, Ting-Wei

    2007-06-01

    Besides the overall budget for building the infrastructure of a healthcare-service-based virtual private network (VPN) in Taiwan, two issues were considered critical for its acceptance by the country's 17,000 plus medical institutions. One was who was to pay for the network (ADSL or modem) connection fee; the other was who was to pay for the firewall/anti-virus software. This paper addresses the second issue by proposing an efficient freeware firewall, named card-assisted firewall (CAF), for NHI VPN edge-hosts, which is also an add-on-value application of the National Healthcare IC card that every insurant and medical professional has. The innovative concept is that any NHI VPN site (edge-host) can establish diversified secure-authenticated connections with other sites only by an authentication mechanism, which requires a NHI Java card state machine and the Access Control List of the host. It is different from two-factor authentication cards in four ways: (1) a PIN code is not a must; (2) it requires authentication with the remote IC card Data Centre; (3) the NHI cards are already available, no modification is needed, and there is no further cost for the deployment of the cards; (4) although the cards are in the reader, the communication cannot start unless the cards are in the corresponding states; i.e. the states allow communication. An implementation, on a Microsoft Windows XP platform, demonstrated the system's feasibility over an emulation of the NHI VPN framework. It maintained a high line speed, the driver took up 39 KB of disk space, installation was simple, not requiring any extra hardware or software, and the average packet processing time of the CAF driver measured was 0.3084 ms. The average overhead in comparing the Access Control List predefined routing in card, in an FTP testing experiment, was 5.7 micros (receiving) and 8 micros (sending).

  11. DFMSPH14: A C-code for the double folding interaction potential of two spherical nuclei

    NASA Astrophysics Data System (ADS)

    Gontchar, I. I.; Chushnyakova, M. V.

    2016-09-01

    This is a new version of the DFMSPH code designed to obtain the nucleus-nucleus potential by using the double folding model (DFM) and in particular to find the Coulomb barrier. The new version uses the charge, proton, and neutron density distributions provided by the user. Also we added an option for fitting the DFM potential by the Gross-Kalinowski profile. The main functionalities of the original code (e.g. the nucleus-nucleus potential as a function of the distance between the centers of mass of colliding nuclei, the Coulomb barrier characteristics, etc.) have not been modified. Catalog identifier: AEFH_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEFH_v2_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland. Licensing provisions: GNU General Public License, version 3 No. of lines in distributed program, including test data, etc.: 7211 No. of bytes in distributed program, including test data, etc.: 114404 Distribution format: tar.gz Programming language: C Computer: PC and Mac Operation system: Windows XP and higher, MacOS, Unix/Linux Memory required to execute with typical data: below 10 Mbyte Classification: 17.9 Catalog identifier of previous version: AEFH_v1_0 Journal reference of previous version: Comp. Phys. Comm. 181 (2010) 168 Does the new version supersede the previous version?: Yes Nature of physical problem: The code calculates in a semimicroscopic way the bare interaction potential between two colliding spherical nuclei as a function of the center of mass distance. The height and the position of the Coulomb barrier are found. The calculated potential is approximated by an analytical profile (Woods-Saxon or Gross-Kalinowski) near the barrier. Dependence of the barrier parameters upon the characteristics of the effective NN forces (like, e.g. the range of the exchange part of the nuclear term) can be investigated. Method of solution: The nucleus-nucleus potential is calculated using the double folding model with the Coulomb and the effective M3Y NN interactions. For the direct parts of the Coulomb and the nuclear terms, the Fourier transform method is used. In order to calculate the exchange parts, the density matrix expansion method is applied. Typical running time: less than 1 minute. Reason for new version: Many users asked us how to implement their own density distributions in the DFMSPH. Now this option has been added. Also we found that the calculated Double-Folding Potential (DFP) is approximated more accurately by the Gross-Kalinowski (GK) profile. This option has been also added.

  12. Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

    DTIC Science & Technology

    2007-01-01

    Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR

  13. 12 CFR 652.61 - Capital planning.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... progressively severe stress scenarios developed by Farmer Mac appropriate to its business model and portfolios... stress testing, Farmer Mac must provide to OSMO a description of the expected and stressed scenarios that Farmer Mac intends to use to conduct its annual stress test under this section. (B) A description of all...

  14. 42 CFR 423.2110 - MAC reviews on its own motion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false MAC reviews on its own motion. 423.2110 Section 423.2110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review...

  15. THE EFFECT OF TEMPERATURE ON THE GROWTH OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS

    EPA Science Inventory

    MAC organisms are able to grow, persist, and colonize in water distribution systems and may amplify in hospital hot water systems. This study examined the response of MAC organisms (M. avium, M. intracellulare, and MX) to a range of temperatures commonly associated with drinking...

  16. MacIntyre, Rival Traditions and Education

    ERIC Educational Resources Information Center

    Stolz, Steven A.

    2016-01-01

    This paper critically discusses MacIntyre's thesis that education is essentially a contested concept. In order to contextualise my discussion, I discuss both whether rival educational traditions of education found in MacIntyre's work--which I refer to as instrumental and non-instrumental justifications of education--can be rationally resolved…

  17. Novel microbial fuel cell design to operate with different wastewaters simultaneously.

    PubMed

    Mathuriya, Abhilasha Singh

    2016-04-01

    A novel single cathode chamber and multiple anode chamber microbial fuel cell design (MAC-MFC) was developed by incorporating multiple anode chambers into a single unit and its performance was checked. During 60 days of operation, performance of MAC-MFC was assessed and compared with standard single anode/cathode chamber microbial fuel cell (SC-MFC). The tests showed that MAC-MFC generated stable and higher power outputs compared with SC-MFC and each anode chamber contributed efficiently. Further, MAC-MFCs were incorporated with different wastewaters in different anode chambers and their behavior in MFC performance was observed. MAC-MFC efficiently treated multiple wastewaters simultaneously at low cost and small space, which claims its candidature for future possible scale-up applications. Copyright © 2015. Published by Elsevier B.V.

  18. Aeronautical Mobile Airport Communications System (AeroMACS)

    NASA Technical Reports Server (NTRS)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  19. Responsive materials: A novel design for enhanced machine-augmented composites

    PubMed Central

    Bafekrpour, Ehsan; Molotnikov, Andrey; Weaver, James C.; Brechet, Yves; Estrin, Yuri

    2014-01-01

    The concept of novel responsive materials with a displacement conversion capability was further developed through the design of new machine-augmented composites (MACs). Embedded converter machines and MACs with improved geometry were designed and fabricated by multi-material 3D printing. This technique proved to be very effective in fabricating these novel composites with tuneable elastic moduli of the matrix and the embedded machines and excellent bonding between them. Substantial improvement in the displacement conversion efficiency of the new MACs over the existing ones was demonstrated. Also, the new design trebled the energy absorption of the MACs. Applications in energy absorbers as well as mechanical sensors and actuators are thus envisaged. A further type of MACs with conversion ability, viz. conversion of compressive displacements to torsional ones, was also proposed. PMID:24445490

  20. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    PubMed

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  1. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  2. BADGER v1.0: A Fortran equation of state library

    NASA Astrophysics Data System (ADS)

    Heltemes, T. A.; Moses, G. A.

    2012-12-01

    The BADGER equation of state library was developed to enable inertial confinement fusion plasma codes to more accurately model plasmas in the high-density, low-temperature regime. The code had the capability to calculate 1- and 2-T plasmas using the Thomas-Fermi model and an individual electron accounting model. Ion equation of state data can be calculated using an ideal gas model or via a quotidian equation of state with scaled binding energies. Electron equation of state data can be calculated via the ideal gas model or with an adaptation of the screened hydrogenic model with ℓ-splitting. The ionization and equation of state calculations can be done in local thermodynamic equilibrium or in a non-LTE mode using a variant of the Busquet equivalent temperature method. The code was written as a stand-alone Fortran library for ease of implementation by external codes. EOS results for aluminum are presented that show good agreement with the SESAME library and ionization calculations show good agreement with the FLYCHK code. Program summaryProgram title: BADGERLIB v1.0 Catalogue identifier: AEND_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEND_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 41 480 No. of bytes in distributed program, including test data, etc.: 2 904 451 Distribution format: tar.gz Programming language: Fortran 90. Computer: 32- or 64-bit PC, or Mac. Operating system: Windows, Linux, MacOS X. RAM: 249.496 kB plus 195.630 kB per isotope record in memory Classification: 19.1, 19.7. Nature of problem: Equation of State (EOS) calculations are necessary for the accurate simulation of high energy density plasmas. Historically, most EOS codes used in these simulations have relied on an ideal gas model. This model is inadequate for low-temperature, high-density plasma conditions; the gaseous and liquid phases; and the solid phase. The BADGER code was developed to give more realistic EOS data in these regimes. Solution method: BADGER has multiple, user-selectable models to treat the ions, average-atom ionization state and electrons. Ion models are ideal gas and quotidian equation of state (QEOS), ionization models are Thomas-Fermi and individual accounting method (IEM) formulation of the screened hydrogenic model (SHM) with l-splitting, electron ionization models are ideal gas and a Helmholtz free energy minimization method derived from the SHM. The default equation of state and ionization models are appropriate for plasmas in local thermodynamic equilibrium (LTE). The code can calculate non-LTE equation of state (EOS) and ionization data using a simplified form of the Busquet equivalent-temperature method. Restrictions: Physical data are only provided for elements Z=1 to Z=86. Multiple solid phases are not currently supported. Liquid, gas and plasma phases are combined into a generalized "fluid" phase. Unusual features: BADGER divorces the calculation of average-atom ionization from the electron equation of state model, allowing the user to select ionization and electron EOS models that are most appropriate to the simulation. The included ion ideal gas model uses ground-state nuclear spin data to differentiate between isotopes of a given element. Running time: Example provided only takes a few seconds to run.

  3. Comparison of the force applied on oral structures during intubation attempts by novice physicians between the Macintosh direct laryngoscope, Airway Scope and C-MAC PM: a high-fidelity simulator-based study.

    PubMed

    Nakanishi, Taizo; Shiga, Takashi; Homma, Yosuke; Koyama, Yasuaki; Goto, Tadahiro

    2016-05-23

    We examined whether the use of Airway Scope (AWS) and C-MAC PM (C-MAC) decreased the force applied on oral structures during intubation attempts as compared with the force applied with the use of Macintosh direct laryngoscope (DL). Prospective cross-over study. A total of 35 novice physicians participated. We used 6 simulation scenarios based on the difficulty of intubation and intubation devices. Our primary outcome measures were the maximum force applied on the maxillary incisors and tongue during intubation attempts, measured by a high-fidelity simulator. The maximum force applied on maxillary incisors was higher with the use of the C-MAC than with the DL and AWS in the normal airway scenario (DL, 26 Newton (N); AWS, 18 N; C-MAC, 52 N; p<0.01) and the difficult airway scenario (DL, 42 N; AWS, 24 N; C-MAC, 68 N; p<0.01). In contrast, the maximum force applied on the tongue was higher with the use of the DL than with the AWS and C-MAC in both airway scenarios (DL, 16 N; AWS, 1 N; C-MAC, 7 N; p<0.01 in the normal airway scenario; DL, 12 N; AWS, 4 N; C-MAC, 7 N; p<0.01 in the difficult airway scenario). The use of C-MAC, compared with the DL and AWS, was associated with the higher maximum force applied on maxillary incisors during intubation attempts. In contrast, the use of video laryngoscopes was associated with the lower force applied on the tongue in both airway scenarios, compared with the DL. Our study was a simulation-based study, and further research on living patients would be warranted. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  4. Deriving health utilities from the MacNew Heart Disease Quality of Life Questionnaire.

    PubMed

    Chen, Gang; McKie, John; Khan, Munir A; Richardson, Jeff R

    2015-10-01

    Quality of life is included in the economic evaluation of health services by measuring the preference for health states, i.e. health state utilities. However, most intervention studies include a disease-specific, not a utility, instrument. Consequently, there has been increasing use of statistical mapping algorithms which permit utilities to be estimated from a disease-specific instrument. The present paper provides such algorithms between the MacNew Heart Disease Quality of Life Questionnaire (MacNew) instrument and six multi-attribute utility (MAU) instruments, the Euroqol (EQ-5D), the Short Form 6D (SF-6D), the Health Utilities Index (HUI) 3, the Quality of Wellbeing (QWB), the 15D (15 Dimension) and the Assessment of Quality of Life (AQoL-8D). Heart disease patients and members of the healthy public were recruited from six countries. Non-parametric rank tests were used to compare subgroup utilities and MacNew scores. Mapping algorithms were estimated using three separate statistical techniques. Mapping algorithms achieved a high degree of precision. Based on the mean absolute error and the intra class correlation the preferred mapping is MacNew into SF-6D or 15D. Using the R squared statistic the preferred mapping is MacNew into AQoL-8D. The algorithms reported in this paper enable MacNew data to be mapped into utilities predicted from any of six instruments. This permits studies which have included the MacNew to be used in cost utility analyses which, in turn, allows the comparison of services with interventions across the health system. © The European Society of Cardiology 2014.

  5. The Polish MacNew heart disease heath-related quality of life questionnaire: a validation study.

    PubMed

    Moryś, Joanna M; Höfer, Stefan; Rynkiewicz, Andrzej; Oldridge, Neil Bryan

    2015-01-01

    The MacNew health-related quality of life questionnaire was designed to assess feelings about how heart disease affects their daily physical, emotional and social functioning in patients with 1 of the 3 major coronary artery diagnoses, stable coronary artery disease (CAD) with angina, ST-elevation myocardial infarction (STEMI), and ischemic heart failure (HF). The aim of this study was to determine the reliability and validity of the Polish version of the MacNew in patients with CAD. Patients with CAD completed a self-report sociodemographic and clinical ques-tionnaire: the MacNew, the Short-Form 36 Health Survey, and HADS at baseline; 10% of the patients completed each questionnaire 2 weeks later. We studied patients with stable CAD with angina (n = 115), with STEMI (n = 112), and with ischemic HF (n = 105). Internal consistency reliability was demonstrated with Cronbach's a from 0.86 to 0.95 for the MacNew global scale and subscales. The original 3-factor structure was confirmed for the Polish version of the MacNew explaining 53.5% of the variance. Convergent validity of similar MacNew and SF-36 subscales was confirmed in the total group and in each diagnosis. Discriminant validity with the SF-36 health transition was fully confirmed in the total group and in patients with HF and partially confirmed in patients with stable CAD with angina or myocardial infarction. The Polish MacNew health-related quality of life questionnaire can be recommended in patients with stable CAD with angina, myocardial infarction and HF.

  6. Persimmon-derived tannin has bacteriostatic and anti-inflammatory activity in a murine model of Mycobacterium avium complex (MAC) disease

    PubMed Central

    Matsumura, Yoko; Kitabatake, Masahiro; Ouji-Sageshima, Noriko; Yasui, Satsuki; Mochida, Naoko; Nakano, Ryuichi; Kasahara, Kei; Tomoda, Koichi; Yano, Hisakazu; Kayano, Shin-ichi

    2017-01-01

    Nontuberculous mycobacteria (NTM), including Mycobacterium avium complex (MAC), cause opportunistic chronic pulmonary infections. Notably, MAC susceptibility is regulated by various factors, including the host immune system. Persimmon (Ebenaceae Diospyros kaki Thunb.) tannin is a condensed tannin composed of a polymer of catechin groups. It is well known that condensed tannins have high antioxidant activity and bacteriostatic properties. However, it is hypothesized that condensed tannins might need to be digested and/or fermented into smaller molecules in vivo prior to being absorbed into the body to perform beneficial functions. In this study, we evaluated the effects of soluble persimmon-derived tannins on opportunistic MAC disease. Soluble tannins were hydrolyzed and evaluated by the oxygen radical absorbance capacity (ORAC) method. The ORAC value of soluble tannin hydrolysate was approximately five times greater than that of soluble tannin powder. In addition, soluble tannin hydrolysate exhibited high bacteriostatic activity against MAC in vitro. Furthermore, in an in vivo study, MAC infected mice fed a soluble tannin-containing diet showed significantly higher anti-bacterial activity against MAC and less pulmonary granuloma formation compared with those fed a control diet. Tumor necrosis factor α and inducible nitric oxide synthase levels were significantly lower in lungs of the soluble tannin diet group compared with the control diet group. Moreover, proinflammatory cytokines induced by MAC stimulation of bone marrow-derived macrophages were significantly decreased by addition of soluble tannin hydrolysate. These data suggest that soluble tannin from persimmons might attenuate the pathogenesis of pulmonary NTM infection. PMID:28827842

  7. Persimmon-derived tannin has bacteriostatic and anti-inflammatory activity in a murine model of Mycobacterium avium complex (MAC) disease.

    PubMed

    Matsumura, Yoko; Kitabatake, Masahiro; Ouji-Sageshima, Noriko; Yasui, Satsuki; Mochida, Naoko; Nakano, Ryuichi; Kasahara, Kei; Tomoda, Koichi; Yano, Hisakazu; Kayano, Shin-Ichi; Ito, Toshihiro

    2017-01-01

    Nontuberculous mycobacteria (NTM), including Mycobacterium avium complex (MAC), cause opportunistic chronic pulmonary infections. Notably, MAC susceptibility is regulated by various factors, including the host immune system. Persimmon (Ebenaceae Diospyros kaki Thunb.) tannin is a condensed tannin composed of a polymer of catechin groups. It is well known that condensed tannins have high antioxidant activity and bacteriostatic properties. However, it is hypothesized that condensed tannins might need to be digested and/or fermented into smaller molecules in vivo prior to being absorbed into the body to perform beneficial functions. In this study, we evaluated the effects of soluble persimmon-derived tannins on opportunistic MAC disease. Soluble tannins were hydrolyzed and evaluated by the oxygen radical absorbance capacity (ORAC) method. The ORAC value of soluble tannin hydrolysate was approximately five times greater than that of soluble tannin powder. In addition, soluble tannin hydrolysate exhibited high bacteriostatic activity against MAC in vitro. Furthermore, in an in vivo study, MAC infected mice fed a soluble tannin-containing diet showed significantly higher anti-bacterial activity against MAC and less pulmonary granuloma formation compared with those fed a control diet. Tumor necrosis factor α and inducible nitric oxide synthase levels were significantly lower in lungs of the soluble tannin diet group compared with the control diet group. Moreover, proinflammatory cytokines induced by MAC stimulation of bone marrow-derived macrophages were significantly decreased by addition of soluble tannin hydrolysate. These data suggest that soluble tannin from persimmons might attenuate the pathogenesis of pulmonary NTM infection.

  8. Chromosomal abnormalities and molecular landscape of metastasizing mucinous salivary adenocarcinoma

    PubMed Central

    Panaccione, Alex; Zhang, Yi; Mi, Yanfang; Mitani, Yoshitsugu; Yan, Guo; Prasad, Manju L.; McDonald, W. Hayes; El-Naggar, Adel K.; Yarbrough, Wendell G.; Ivanov, Sergey V.

    2017-01-01

    Background Mucinous adenocarcinoma of the salivary gland (MAC) is a lethal cancer with unknown molecular etiology and a high propensity to lymph node metastasis. Mostly due to its orphan status, MAC remains one of the least explored cancers that lacks cell lines and mouse models that could help translational and pre-clinical studies. Surgery with or without radiation remains the only treatment modality but poor overall survival (10-year, 44%) underscores the urgent need for mechanism-based therapies. Methods We developed the first patient-derived xenograft (PDX) model for pre-clinical MAC studies and a cell line that produces aggressively growing tumors after subcutaneous injection into nude mice. We performed cytogenetic, exome, and proteomic profiling of MAC to identify driving mutations, therapeutic targets, and pathways involved in aggressive cancers based on TCGA database mining and GEO analysis. Results: We identified in MAC KRAS (G13D) and TP53 (R213X) mutations that have been previously reported as drivers in a variety of highly aggressive cancers. Somatic mutations were also found in KDM6A, KMT2D, and other genes frequently mutated in colorectal and other cancers: FAT1, NBEA, RELN, RLP1B, and ZFHX3. Proteomic analysis of MAC implied epigenetic up-regulation of a genetic program involved in proliferation and cancer stem cell maintenance. Conclusion Genomic and proteomic analyses provided the first insight into potential molecular drivers of MAC metastases pointing at common mechanisms of CSC propagation in aggressive cancers. The in vitro/in vivo models that we created should aid in the development and validation of new treatment strategies against MAC. PMID:28249646

  9. Sitting position does not alter minimum alveolar concentration for desflurane.

    PubMed

    Lin, Chun-Ming; Wu, Chieh-Tsai; Lee, Shih-Tseng; Lui, Tai-Ngar; Huang, Chia-Chun; Li, Allen Hon-Lun; Doufas, Anthony G

    2007-07-01

    Hypotension is a common complication of the sitting position during anesthesia, and is often counteracted by decreasing anesthetic depth, thereby exposing patients to the risk of being inadequately anesthetized. Baroreceptor unloading and the consequent sympathoexcitation, as during head up tilt, decreases pain threshold and arouses the central nervous system (CNS), whereas hypotension exerts a direct CNS depressant effect. We estimated the minimal alveolar concentration (MAC) of desflurane for immobility in patients undergoing surgery in the sitting position, in comparison to MAC desflurane for patients having a similar type of surgery in the supine position. The Dixon up-and-down method was used to evaluate the MAC for desflurane in patients undergoing cervical spine laminoplasty (n = 24) or discectomy (n = 24) in the sitting and supine positions, respectively. Logistic regression with co-variate adjustment was employed to examine if the two positions (sitting and supine) have different or share the same concentration vs response relationship for immobility. Monte Carlo simulation was used to calculate 95% confidence intervals (CI) for the MAC in each position, and to estimate the difference in MAC (delta MAC) between the sitting and supine positions. Modeling both sitting [6.54% (6.50-6.66, 95% CI)] and supine [6.70 (6.55-6.81)] patients as having different MAC concentrations did not significantly improve our simplified model, which treats the two patient groups as one [6.61 (6.52-6.70), delta -2 log likelihood = 2.735, P = 0.098]. Mean delta MAC (95% CI) was -0.14 (-0.30, 0.03). The sitting position does not change desflurane anesthetic requirements for immobility.

  10. Motivation Mining: Prospecting the Web.

    ERIC Educational Resources Information Center

    Small, Ruth V.; Arnone, Marilyn P.

    1999-01-01

    Describes WebMAC instruments, which differ from other Web-evaluation instruments because they have a theoretical base, are user-centered, are designed for students in grades 7 through 12, and assess the motivational quality of Web sites. Examples are given of uses of WebMAC Middle and WebMAC Senior in activities to promote evaluation and…

  11. Self-Admitted Pretensions of Mac Users on a Predominantly PC University Campus

    ERIC Educational Resources Information Center

    Firmin, Michael W.; Wood, Whitney L. Muhlenkamp; Firmin, Ruth L.; Wood, Jordan C.

    2010-01-01

    The present qualitative research study addressed the overall research question of college students' pretention dynamics in the context of a university setting. Thirty-five Mac users were interviewed on a university campus that exclusively supports PC machines. Mac users shared four self-admitted pretensions related to using Macintosh computers.…

  12. Accuracy Test of the OPLS-AA Force Field for Calculating Free Energies of Mixing and Comparison with PAC-MAC

    PubMed Central

    2017-01-01

    We have calculated the excess free energy of mixing of 1053 binary mixtures with the OPLS-AA force field using two different methods: thermodynamic integration (TI) of molecular dynamics simulations and the Pair Configuration to Molecular Activity Coefficient (PAC-MAC) method. PAC-MAC is a force field based quasi-chemical method for predicting miscibility properties of various binary mixtures. The TI calculations yield a root mean squared error (RMSE) compared to experimental data of 0.132 kBT (0.37 kJ/mol). PAC-MAC shows a RMSE of 0.151 kBT with a calculation speed being potentially 1.0 × 104 times greater than TI. OPLS-AA force field parameters are optimized using PAC-MAC based on vapor–liquid equilibrium data, instead of enthalpies of vaporization or densities. The RMSE of PAC-MAC is reduced to 0.099 kBT by optimizing 50 force field parameters. The resulting OPLS-PM force field has a comparable accuracy as the OPLS-AA force field in the calculation of mixing free energies using TI. PMID:28418655

  13. CoR-MAC: Contention over Reservation MAC Protocol for Time-Critical Services in Wireless Body Area Sensor Networks

    PubMed Central

    Yu, Jeongseok; Park, Laihyuk; Park, Junho; Cho, Sungrae; Keum, Changsup

    2016-01-01

    Reserving time slots for urgent data, such as life-critical information, seems to be very attractive to guarantee their deadline requirements in wireless body area sensor networks (WBASNs). On the other hand, this reservation imposes a negative impact on performance for the utilization of a channel. This paper proposes a new channel access scheme referred to as the contention over reservation MAC (CoR-MAC) protocol for time-critical services in wireless body area sensor networks. CoR-MAC uses the dual reservation; if the reserved time slots are known to be vacant, other nodes can access the time slots by contention-based reservation to maximize the utilization of a channel and decrease the delay of the data. To measure the effectiveness of the proposed scheme against IEEE 802.15.4 and IEEE 802.15.6, we evaluated their performances with various performance indexes. The CoR-MAC showed 50% to 850% performance improvement in terms of the delay of urgent and time-critical data according to the number of nodes. PMID:27171085

  14. Crystallization and preliminary X-ray crystallographic analysis of MacA from Actinobacillus actinomycetemcomitans

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul, E-mail: hnc@pusan.ac.kr

    2008-05-01

    A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange andmore » gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit.« less

  15. Ultrastructural and clinical evidence of subretinal debris accumulation in type 2 macular telangiectasia.

    PubMed

    Cherepanoff, Svetlana; Killingsworth, Murray C; Zhu, Meidong; Nolan, Timothy; Hunyor, Alex P; Young, Stephanie H; Hageman, Gregory S; Gillies, Mark C

    2012-11-01

    To describe subretinal debris found on ultrastructural examination in an eye with macular telangiectasia (MacTel) type 2 and on optical coherence tomography (OCT) in a subset of patients with MacTel type 2. Blocks from the mid-periphery and temporal perifovea of an eye with clinically documented MacTel type 2 were examined with electron microscopy (EM). Cases came from the Sydney centre of the MacTel project and the practices of the authors. On EM examination, subretinal debris was found in the perifovea with accumulation of degenerate photoreceptor elements in the subretinal space. Despite the substantial subretinal debris, there was minimal retinal pigment epithelial (RPE) reaction. Focal defects were seen in the inner limiting membrane in the perifovea. Of the 65 Sydney MacTel project participants, three (5%) had prominent yellow material at the fovea. OCT revealed smooth mounds between the RPE and the ellipsoid region. The material was hyperautofluorescent. This study suggests that subretinal accumulation of photoreceptor debris may be a feature of MacTel type 2. Ultrastructural and OCT evidence of disease beyond the vasculature, involving photoreceptors and Muller cells, is presented.

  16. Validation of a systems-actuarial computer process for multidimensional classification of child psychopathology.

    PubMed

    McDermott, P A; Hale, R L

    1982-07-01

    Tested diagnostic classifications of child psychopathology produced by a computerized technique known as multidimensional actuarial classification (MAC) against the criterion of expert psychological opinion. The MAC program applies series of statistical decision rules to assess the importance of and relationships among several dimensions of classification, i.e., intellectual functioning, academic achievement, adaptive behavior, and social and behavioral adjustment, to perform differential diagnosis of children's mental retardation, specific learning disabilities, behavioral and emotional disturbance, possible communication or perceptual-motor impairment, and academic under- and overachievement in reading and mathematics. Classifications rendered by MAC are compared to those offered by two expert child psychologists for cases of 73 children referred for psychological services. Experts' agreement with MAC was significant for all classification areas, as was MAC's agreement with the experts held as a conjoint reference standard. Whereas the experts' agreement with MAC averaged 86.0% above chance, their agreement with one another averaged 76.5% above chance. Implications of the findings are explored and potential advantages of the systems-actuarial approach are discussed.

  17. Effects of carprofen and meloxicam with or without butorphanol on the minimum alveolar concentration of sevoflurane in dogs.

    PubMed

    Yamashita, Kazuto; Okano, Yoshihiko; Yamashita, Maiko; Umar, Mohammed A; Kushiro, Tokiko; Muir, William W

    2008-01-01

    Sparing effects of carprofen and meloxicam with or without butorphanol on the minimum alveolar concentration (MAC) of sevoflurane were determined in 6 dogs. Anesthesia was induced and maintained with sevoflurane in oxygen, and MAC was determined by use of a tail clamp method. The dogs were administered a subcutaneous injection of carprofen (4 mg/kg) or meloxicam (0.2 mg/kg), or no medication (control) one hour prior to induction of anesthesia. Following the initial determination of MAC, butorphanol (0.3 mg/kg) was administered intramuscularly, and MAC was determined again. The sevoflurane MACs for carprofen alone (2.10 +/- 0.26%) and meloxicam alone (2.06 +/- 0.20%) were significantly less than the control (2.39 +/- 0.26%). The sevoflurane MACs for the combination of carprofen with butorphanol (1.78 +/- 0.20%) and meloxicam with butorphanol (1.66 +/- 0.29%) were also significantly less than the control value after the administration of butorphanol (2.12 +/- 0.28%). The sevoflurane sparing effects of the combinations of carprofen with butorphanol and meloxicam with butorphanol were additive.

  18. Removal of Cu2+ and turbidity from wastewater by mercaptoacetyl chitosan.

    PubMed

    Chang, Qing; Zhang, Min; Wang, Jinxi

    2009-09-30

    A macromolecule heavy metal flocculant mercaptoacetyl chitosan (MAC) was prepared by reacting chitosan with mercaptoacetic acid. In preliminary experiments, the flocculation performance of MAC was evaluated by using wastewater containing Cu(2+) or/and turbidity. Some factors which affect the removal of Cu(2+) and turbidity were also studied. The experimental results showed that: (1) MAC can remove both Cu(2+) and turbidity from wastewater. The removal efficiency of Cu(2+) by using MAC combined with hydrolyzed polyacrylamide is higher than that by only using MAC, the removal efficiency of Cu(2+) reaches above 98%; (2) when water sample containing not only Cu(2+) but also turbidity-causing substance, the removal efficiency of both Cu(2+) and turbidity will be promoted by the cooperation effect of each other, the residual concentration of Cu(2+) reaches below 0.5 mg L(-1) and the turbidity reaches below 3NTU, Cu(2+) is more easily removed by MAC when turbidity is higher; (3) the removal efficiency of Cu(2+) increases with the increase in pH value, contrarily removal efficiency of turbidity decreases with the increase in pH value.

  19. Mediating factors in martial arts and combat sports: an analysis of the type of martial art, characteristics, and social background of young participants.

    PubMed

    Vertonghen, Jikkemien; Theeboom, Marc; Pieter, Willy

    2014-02-01

    To date, most studies regarding the social-psychological effects of martial arts and combat sports (MA&CS) on young people focus on measuring effects without considering mediating factors. The aim of the present study was to analyze three mediating factors that might be influential when examining outcomes of MA&CS for youth (i.e., the type of MA&CS, participants' characteristics, and social background). Young MA&CS participants (N = 477, M age = 14.0 yr., SD = 2.13) practicing judo, aikido, kick-/Thai boxing or karate, as well as their parents (N = 307), were assessed in terms of their goal orientations, aggressiveness, psychosocial behavior, and social background. It was concluded that differences exist in the characteristics and social background of participants depending on the type of MA&CS being practiced. The fact that differences in these mediating factors can be identified indicates that in future research these and possible other mediating factors should be considered when trying to determine social-psychological outcomes of MA&CS.

  20. Adaptive low-power listening MAC protocol based on transmission rates.

    PubMed

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  1. ZeroCal: Automatic MAC Protocol Calibration

    NASA Astrophysics Data System (ADS)

    Meier, Andreas; Woehrle, Matthias; Zimmerling, Marco; Thiele, Lothar

    Sensor network MAC protocols are typically configured for an intended deployment scenario once and for all at compile time. This approach, however, leads to suboptimal performance if the network conditions deviate from the expectations. We present ZeroCal, a distributed algorithm that allows nodes to dynamically adapt to variations in traffic volume. Using ZeroCal, each node autonomously configures its MAC protocol at runtime, thereby trying to reduce the maximum energy consumption among all nodes. While the algorithm is readily usable for any asynchronous low-power listening or low-power probing protocol, we validate and demonstrate the effectiveness of ZeroCal on X-MAC. Extensive testbed experiments and simulations indicate that ZeroCal quickly adapts to traffic variations. We further show that ZeroCal extends network lifetime by 50% compared to an optimal configuration with identical and static MAC parameters at all nodes.

  2. BIG MAC: A bolometer array for mid-infrared astronomy, Center Director's Discretionary Fund

    NASA Technical Reports Server (NTRS)

    Telesco, C. M.; Decher, R.; Baugher, C.

    1985-01-01

    The infrared array referred to as Big Mac (for Marshall Array Camera), was designed for ground based astronomical observations in the wavelength range 5 to 35 microns. It contains 20 discrete gallium-doped germanium bolometer detectors at a temperature of 1.4K. Each bolometer is irradiated by a square field mirror constituting a single pixel of the array. The mirrors are arranged contiguously in four columns and five rows, thus defining the array configuration. Big Mac utilized cold reimaging optics and an up looking dewar. The total Big Mac system also contains a telescope interface tube for mounting the dewar and a computer for data acquisition and processing. Initial astronomical observations at a major infrared observatory indicate that Big Mac performance is excellent, having achieved the design specifications and making this instrument an outstanding tool for astrophysics.

  3. W-MAC: A Workload-Aware MAC Protocol for Heterogeneous Convergecast in Wireless Sensor Networks

    PubMed Central

    Xia, Ming; Dong, Yabo; Lu, Dongming

    2011-01-01

    The power consumption and latency of existing MAC protocols for wireless sensor networks (WSNs) are high in heterogeneous convergecast, where each sensor node generates different amounts of data in one convergecast operation. To solve this problem, we present W-MAC, a workload-aware MAC protocol for heterogeneous convergecast in WSNs. A subtree-based iterative cascading scheduling mechanism and a workload-aware time slice allocation mechanism are proposed to minimize the power consumption of nodes, while offering a low data latency. In addition, an efficient schedule adjustment mechanism is provided for adapting to data traffic variation and network topology change. Analytical and simulation results show that the proposed protocol provides a significant energy saving and latency reduction in heterogeneous convergecast, and can effectively support data aggregation to further improve the performance. PMID:22163753

  4. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    ERIC Educational Resources Information Center

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  5. Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity

    ERIC Educational Resources Information Center

    De Bruyckere, Pedro; Kirschner, Paul A.

    2017-01-01

    Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…

  6. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    PubMed

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  7. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  8. Self-care and mobility skills in children with cerebral palsy, related to their manual ability and gross motor function classifications.

    PubMed

    Öhrvall, Ann-Marie; Eliasson, Ann-Christin; Löwing, Kristina; Ödman, Pia; Krumlinde-Sundholm, Lena

    2010-11-01

    The aim of this study was to investigate the acquisition of self-care and mobility skills in children with cerebral palsy (CP) in relation to their manual ability and gross motor function. Data from the Pediatric Evaluation of Disability Inventory (PEDI) self-care and mobility functional skill scales, the Manual Ability Classification System (MACS), and the Gross Motor Function Classification System (GMFCS) were collected from 195 children with CP (73 females, 122 males; mean age 8 y 1 mo; SD 3 y 11 mo; range 3-15 y); 51% had spastic bilateral CP, 36% spastic unilateral CP, 8% dyskinetic CP, and 3% ataxic CP. The percentage of children classified as MACS levels I to V was 28%, 34%, 17%, 7%, and 14% respectively, and classified as GMFCS levels I to V was 46%, 16%, 15%, 11%, and 12% respectively. Children classified as MACS and GMFCS levels I or II scored higher than children in MACS and GMFCS levels III to V on both the self-care and mobility domains of the PEDI, with significant differences between all classification levels (p<0.001). The stepwise multiple regression analysis verified that MACS was the strongest predictor of self-care skills (66%) and that GMFCS was the strongest predictor of mobility skills (76%). A strong correlation between age and self-care ability was found among children classified as MACS level I or II and between age and mobility among children classified as GMFCS level I. Many of these children achieved independence, but at a later age than typically developing children. Children at other MACS and GMFCS levels demonstrated minimal progress with age. Knowledge of a child's MACS and GMFCS level can be useful when discussing expectations of, and goals for, the development of functional skills. © The Authors. Journal compilation © Mac Keith Press 2010.

  9. TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.

    PubMed

    Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue

    2017-06-01

    Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical environments.

  10. An Explicit Upwind Algorithm for Solving the Parabolized Navier-Stokes Equations

    NASA Technical Reports Server (NTRS)

    Korte, John J.

    1991-01-01

    An explicit, upwind algorithm was developed for the direct (noniterative) integration of the 3-D Parabolized Navier-Stokes (PNS) equations in a generalized coordinate system. The new algorithm uses upwind approximations of the numerical fluxes for the pressure and convection terms obtained by combining flux difference splittings (FDS) formed from the solution of an approximate Riemann (RP). The approximate RP is solved using an extension of the method developed by Roe for steady supersonic flow of an ideal gas. Roe's method is extended for use with the 3-D PNS equations expressed in generalized coordinates and to include Vigneron's technique of splitting the streamwise pressure gradient. The difficulty associated with applying Roe's scheme in the subsonic region is overcome. The second-order upwind differencing of the flux derivatives are obtained by adding FDS to either an original forward or backward differencing of the flux derivative. This approach is used to modify an explicit MacCormack differencing scheme into an upwind differencing scheme. The second order upwind flux approximations, applied with flux limiters, provide a method for numerically capturing shocks without the need for additional artificial damping terms which require adjustment by the user. In addition, a cubic equation is derived for determining Vegneron's pressure splitting coefficient using the updated streamwise flux vector. Decoding the streamwise flux vector with the updated value of Vigneron's pressure splitting improves the stability of the scheme. The new algorithm is applied to 2-D and 3-D supersonic and hypersonic laminar flow test cases. Results are presented for the experimental studies of Holden and of Tracy. In addition, a flow field solution is presented for a generic hypersonic aircraft at a Mach number of 24.5 and angle of attack of 1 degree. The computed results compare well to both experimental data and numerical results from other algorithms. Computational times required for the upwind PNS code are approximately equal to an explicit PNS MacCormack's code and existing implicit PNS solvers.

  11. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    PubMed Central

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  12. STS-52 MS Veach and Payload Specialist MacLean during JSC bailout exercises

    NASA Technical Reports Server (NTRS)

    1992-01-01

    STS-52 Columbia, Orbiter Vehicle (OV) 102, Mission Specialist (MS) Charles Lacy Veach (left) and Canadian Payload Specialist Steven G. MacLean listen to a briefing during emergency egress (bailout) training exercises in JSC's Weightless Environment Training Facility (WETF) Bldg 29. Veach and MacLean are fully outfitted in launch and entry suits (LESs), launch and entry helmets (LEHs), parachutes, and water survival equipment including a life jacket. The WETF's 25-ft deep pool will simulate the ocean as the crewmember's prepare for the event of a water landing. MacLean represents the Canadian Space Agency (CSA).

  13. C-Band Airport Surface Communications System Standards Development, Phase I

    NASA Technical Reports Server (NTRS)

    Hall, Edward; Isaacs, James; Zelkin, Natalie; Henriksen. Steve

    2010-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." The proposed future C-band (5091- to 5150-MHz) airport surface communication system, referred to as the Aeronautical Mobile Airport Communications System (AeroMACS), is anticipated to increase overall air-to-ground data communications systems capacity by using a new spectrum (i.e., not very high frequency (VHF)). Although some critical services could be supported, AeroMACS will also target noncritical services, such as weather advisory and aeronautical information services as part of an airborne System Wide Information Management (SWIM) program. AeroMACS is to be designed and implemented in a manner that will not disrupt other services operating in the C-band. This report defines the AeroMACS concepts of use, high-level system requirements, and architecture; the performance of supporting system analyses; the development of AeroMACS test and demonstration plans; and the establishment of an operational AeroMACS capability in support of C-band aeronautical data communications standards to be advanced in both international (International Civil Aviation Organization, ICAO) and national (RTCA) forums. This includes the development of system parameter profile recommendations for AeroMACS based on existing Institute of Electrical and Electronics Engineering (IEEE) 802.16e- 2009 standards

  14. Predictive value of the complement system for sepsis-induced disseminated intravascular coagulation in septic patients in emergency department.

    PubMed

    Zhao, Xin; Chen, Yun-Xia; Li, Chun-Sheng

    2015-04-01

    To investigate changes in circulating complement component C3, membrane attack complex (MAC), and mannose-binding lectin (MBL) in patients with sepsis-induced disseminated intravascular coagulation (DIC). Adult septic patients admitted to the emergency department (ED) of Beijing Chao-Yang Hospital were enrolled. A DIC score of 5 or higher was considered sepsis-induced DIC. Circulating C3, MAC, and MBL levels were detected on ED arrival and compared between patients with and without DIC. The predictive value of C3, MAC, and MBL for sepsis-induced DIC at ED arrival and development of DIC after admission were assessed by receiver operating characteristic curve and logistic regression. We enrolled 267 septic patients between February and December 2013. Complement 3, MAC, and MBL were higher in the DIC group (P < .01). Membrane attack complex was the independent predictor of sepsis-induced DIC. The area under the curve of MAC in predicting sepsis-induced DIC was 0.793. During hospitalization, 25 patients without DIC at enrollment developed DIC. Membrane attack complex and Sequential Organ Failure Assessment independently predicted progress to DIC. The area under the curve of MAC was 0.741. Complement 3, MAC, and MBL were significantly increased in septic patients with DIC. Membrane attack complex independently predicted sepsis-induced DIC and development of DIC after ED admission. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Diagnostic usefulness of MUC1 and MUC4 for distinguishing between metastatic adenocarcinoma cells and reactive mesothelial cells in effusion cell blocks.

    PubMed

    Cho, Jin Seong; Kim, Ga-Eon; Lee, Ji Shin; Lee, Jae Hyuk; Nam, Jong Hee; Choi, Chan

    2013-01-01

    The aim of our study was to determine the diagnostic value of MUC1 and MUC4 for distinguishing between metastatic adenocarcinoma cells (MAC) and reactive mesothelial cells (RMC) in effusion fluids. A total of 237 cell block specimens from pleural and peritoneal effusions, including 196 malignant effusions with MAC and 41 benign effusions with RMC, were stained with antibodies against MUC1 and MUC4. Membranous staining with or without cytoplasmic staining was considered to be positive. MUC1 immunoreactivity was observed in 194 (99.0%) of 196 cases of MAC and in 20 (48.8%) of 41 cases of RMC. MUC4 immunoreactivity was observed in 174 (88.8%) of 196 cases of MAC and in 4 (9.8%) of 41 cases of RMC. For distinguishing MAC from RMC, the MUC1 reactivity was found to be 99.0% sensitive and 51.2% specific with a positive predictive value of 90.7% and a negative predictive value of 91.3%. The sensitivity of MUC4 for MAC was 88.8%, the specificity was 90.2%, the negative predictive value was 62.7%, and the positive predictive value was 97.8%. Our data suggest that MUC4 appears to be a sensitive and specific marker for differentiating between MAC and RMC. Copyright © 2013 S. Karger AG, Basel.

  16. Diet-induced extinction in the gut microbiota compounds over generations

    PubMed Central

    Sonnenburg, Erica D.; Smits, Samuel A.; Tikhonov, Mikhail; Higginbottom, Steven K.; Wingreen, Ned S.; Sonnenburg, Justin L.

    2015-01-01

    The gut is home to trillions of microbes that play a fundamental role in many aspects of human biology including immune function and metabolism 1,2. The reduced diversity of the Western microbiota compared to populations living traditional lifestyles presents the question of which factors have driven microbiota change during modernization. Microbiota accessible carbohydrates (MACs) found in dietary fiber, play a key role in shaping this microbial ecosystem, and are strikingly reduced in the Western diet relative to more traditional diets 3. Here we show that changes in the microbiota of mice consuming a low-MAC diet and harboring a human microbiota are largely reversible within a single generation, however over multiple generations a low-MAC diet results in a progressive loss of diversity, which is not recoverable upon the reintroduction of dietary MACs. To restore the microbiota to its original state requires the administration of missing taxa in combination with dietary MAC consumption. Our data illustrate that taxa driven to low abundance when dietary MACs are scarce are inefficiently transferred to the next generation and are at increased risk of becoming extinct within an isolated population. As more diseases are linked to the Western microbiota and the microbiota is targeted therapeutically, microbiota reprogramming may need to involve strategies that incorporate dietary MACs as well as taxa not currently present in the Western gut. PMID:26762459

  17. ZENO: N-body and SPH Simulation Codes

    NASA Astrophysics Data System (ADS)

    Barnes, Joshua E.

    2011-02-01

    The ZENO software package integrates N-body and SPH simulation codes with a large array of programs to generate initial conditions and analyze numerical simulations. Written in C, the ZENO system is portable between Mac, Linux, and Unix platforms. It is in active use at the Institute for Astronomy (IfA), at NRAO, and possibly elsewhere. Zeno programs can perform a wide range of simulation and analysis tasks. While many of these programs were first created for specific projects, they embody algorithms of general applicability and embrace a modular design strategy, so existing code is easily applied to new tasks. Major elements of the system include: Structured data file utilities facilitate basic operations on binary data, including import/export of ZENO data to other systems.Snapshot generation routines create particle distributions with various properties. Systems with user-specified density profiles can be realized in collisionless or gaseous form; multiple spherical and disk components may be set up in mutual equilibrium.Snapshot manipulation routines permit the user to sift, sort, and combine particle arrays, translate and rotate particle configurations, and assign new values to data fields associated with each particle.Simulation codes include both pure N-body and combined N-body/SPH programs: Pure N-body codes are available in both uniprocessor and parallel versions.SPH codes offer a wide range of options for gas physics, including isothermal, adiabatic, and radiating models. Snapshot analysis programs calculate temporal averages, evaluate particle statistics, measure shapes and density profiles, compute kinematic properties, and identify and track objects in particle distributions.Visualization programs generate interactive displays and produce still images and videos of particle distributions; the user may specify arbitrary color schemes and viewing transformations.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eperin, A.P.; Zakharzhevsky, Yu.O.; Arzhaev, A.I.

    A two-year Finnish-Russian cooperation program has been initiated in 1995 to demonstrate the applicability of the leak-before-break concept (LBB) to the primary circuit piping of the Leningrad NPP. The program includes J-R curve testing of authentic pipe materials at full operating temperature, screening and computational LBB analyses complying with the USNRC Standard Review Plan 3.6.3, and exchange of LBB-related information with emphasis on NDE. Domestic computer codes are mainly used, and all tests and analyses are independently carried out by each party. The results are believed to apply generally to RBMK type plants of the first generation.

  19. Germline Transformation of Drosophila Virilis Mediated by the Transposable Element Hobo

    PubMed Central

    Lozovskaya, E. R.; Nurminsky, D. I.; Hartl, D. L.; Sullivan, D. T.

    1996-01-01

    A laboratory strain of Drosophila virilis was genetically transformed with a hobo vector carrying the miniwhite cassette using a helper plasmid with an hsp70-driven hobo transposase-coding sequence. The rate of transformation was 0.5% per fertile G0 animal. Three transgenic insertions were cloned and characterized and found to be authentic hobo insertions. These results, together with the known wide-spread distribution of hobo in diverse insect species, suggest that hobo and related transposable elements may be of considerable utility in the germline transformation of insects other than D. melanogaster. PMID:8770594

  20. Poincaré-MacMillan Equations of Motion for a Nonlinear Nonholonomic Dynamical System

    NASA Astrophysics Data System (ADS)

    Amjad, Hussain; Syed Tauseef, Mohyud-Din; Ahmet, Yildirim

    2012-03-01

    MacMillan's equations are extended to Poincaré's formalism, and MacMillan's equations for nonlinear nonholonomic systems are obtained in terms of Poincaré parameters. The equivalence of the results obtained here with other forms of equations of motion is demonstrated. An illustrative example of the theory is provided as well.

  1. 76 FR 35138 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Risk-Based...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... Funding and Fiscal Affairs; Farmer Mac Risk-Based Capital Stress Test, Version 5.0 AGENCY: Farm Credit... credit rating agency) in regulations addressing the Risk-Based Capital Stress Test (RBCST or stress test... Act required FCA to establish a risk- based capital stress test for Farmer Mac's portfolio.\\3\\ This...

  2. MacDill Air Force Base > Home

    Science.gov Websites

    Force Base, Fla., May 22, 2018. Police Week is a national observance that pays tribute to the law rescue 5 in Tampa Bay Law Day 2018 MacDill Captain discovers endless possibilities MacDill hosts Sexual ., May 22, 2018. Police Week is a national observance that pays tribute to the law enforcement officers

  3. 78 FR 5320 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Capital Planning

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-25

    ... the business planning period a required discussion of how factors might impact Farmer Mac's current... discussion of any expected changes to Farmer Mac's business plan that are likely to have a material impact on... conditions that cause increases in delinquency rates caused by any variety of factors (e.g., widespread...

  4. Activity of Picolinic Acid in Combination with the Antiprotozoal Drug Quinacrine against Mycobacterium avium Complex

    PubMed Central

    Shimizu, Toshiaki; Tomioka, Haruaki

    2006-01-01

    We studied the in vitro and in vivo antimicrobial activities of picolinic acid (PA) in combination with the antiprotozoal drug quinacrine against intramacrophage Mycobacterium avium complex (MAC). Quinacrine significantly potentiated the anti-MAC activity of PA, suggesting the usefulness of this combination in the clinical control of MAC infection. PMID:16940126

  5. Public Relations as "Practice": Applying the Theory of Alasdair MacIntyre.

    ERIC Educational Resources Information Center

    Leeper, Roy V.; Leeper, Kathie A.

    2001-01-01

    Considers how public relation's search for a unifying theory may be fulfilled through application of Alasdair MacIntyre's concept of a "practice," a very specific and value-laden concept. Explores what it would mean to be a public relations practice in MacIntyre's concept of the term and argues that such an approach to public relations…

  6. The Cognition of Multiaircraft Control (MAC): Cognitive Ability Predictors, Working Memory, Interference, and Attention Control in Radio Communication

    DTIC Science & Technology

    2015-03-26

    THE COGNITION OF MULTIAIRCRAFT CONTROL (MAC): COGNITIVE ABILITY PREDICTORS, WORKING MEMORY ...COGNITIVE ABILITY PREDICTORS, WORKING MEMORY , INTERFERENCE, AND ATTENTION CONTROL IN RADIO COMMUNICATION THESIS Presented to the Faculty...UNLIMITED. AFIT-ENV-MS-15-M-205 THE COGNITION OF MULTIAIRCRAFT CONTROL (MAC): COGNITIVE ABILITY PREDICTORS, WORKING MEMORY , INTERFERENCE

  7. Substance Use Scales of the Minnesota Multiphasic Personality Inventory: An Exploration of Score Reliability via Meta-Analysis

    ERIC Educational Resources Information Center

    Miller, Christopher S.; Shields, Alan L.; Campfield, Delia; Wallace, Kim A.; Weiss, Roger D.

    2007-01-01

    Three drug and alcohol use screening scales are embedded within the Minnesota Multiphasic Personality Inventory--2: the MacAndrew Alcoholism Scale (MAC) and its revised version (MAC-R), the Addiction Acknowledgement Scale (AAS), and the Addiction Potential Scale (APS). The current study evaluated the reliability reporting practices among 210…

  8. Steven MacCall: Winner of LJ's 2010 Teaching Award

    ERIC Educational Resources Information Center

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  9. 75 FR 38494 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... Coordinator, DAN 1-C, 200 MacDill Blvd, Washington, DC 20340. The proposed systems report, as required by 5 U... Information Act Office (DAN- 1A), Defense Intelligence Agency, 200 MacDill Blvd, Washington, DC 20340-5100... Agency (DAN-1A), 200 MacDill Blvd, Washington, DC 20340-5100. Request should contain the individual's...

  10. 77 FR 43814 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-26

    ... Intelligence Agency, DAN 1-C, 600 MacDill Blvd., Washington, DC 20340- 0001 or by phone at (202) 231-1193... Freedom of Information Act Office (DAN-1A), Defense Intelligence Agency, 200 MacDill Blvd., Washington, DC... Information Act Office, Defense Intelligence Agency (DAN-1A), 200 MacDill Blvd., Washington, DC 20340-0001...

  11. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  12. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  13. Conceptualisations of infinity by primary pre-service teachers

    NASA Astrophysics Data System (ADS)

    Date-Huxtable, Elizabeth; Cavanagh, Michael; Coady, Carmel; Easey, Michael

    2018-05-01

    As part of the Opening Real Science: Authentic Mathematics and Science Education for Australia project, an online mathematics learning module embedding conceptual thinking about infinity in science-based contexts, was designed and trialled with a cohort of 22 pre-service teachers during 1 week of intensive study. This research addressed the question: "How do pre-service teachers conceptualise infinity mathematically?" Participants argued the existence of infinity in a summative reflective task, using mathematical and empirical arguments that were coded according to five themes: definition, examples, application, philosophy and teaching; and 17 codes. Participants' reflections were differentiated as to whether infinity was referred to as an abstract (A) or a real (R) concept or whether both (B) codes were used. Principal component analysis of the reflections, using frequency of codings, revealed that A and R codes occurred at different frequencies in three groups of reflections. Distinct methods of argument were associated with each group of reflections: mathematical numerical examples and empirical measurement comparisons characterised arguments for infinity as an abstract concept, geometric and empirical dynamic examples and belief statements characterised arguments for infinity as a real concept and empirical measurement and mathematical examples and belief statements characterised arguments for infinity as both an abstract and a real concept. An implication of the results is that connections between mathematical and empirical applications of infinity may assist pre-service teachers to contrast finite with infinite models of the world.

  14. Characterization of the Murine Myeloid Precursor Cell Line MuMac-E8

    PubMed Central

    Fricke, Stephan; Riemschneider, Sina; Kohlschmidt, Janine; Hilger, Nadja; Fueldner, Christiane; Knauer, Jens; Sack, Ulrich; Emmrich, Frank; Lehmann, Jörg

    2014-01-01

    Starting point for the present work was the assumption that the cell line MuMac-E8 represents a murine cell population with stem cell properties. Preliminary studies already pointed to the expression of stem-cell associated markers and a self-regenerative potential of the cells. The cell line MuMac-E8 should be examined for their differential stage within stem cell hierarchy. MuMac-E8 cells were derived from a chimeric mouse model of arthritis. It could be shown that MuMac-E8 cells express mRNA of some genes associated with pluripotent stem cells (Nanog, Nucleostemin), of genes for hematopoietic markers (EPCR, Sca-1, CD11b, CD45), for the mesenchymal marker CD105 and of genes for the neural markers Pax-6 and Ezrin. In methylcellulose and May-Grünwald-Giemsa staining, hematopoietic colonies were obtained but the hematopoietic system of lethally irradiated mice could not be rescued. Osteogenic differentiation was not detectable. Thus, it became evident that MuMac-E8 represents not a stem cell line. However, MuMac-E8 cells expressed several myeloid surface markers (i.e. CD11b, F4/80, CD14, CD64), showed phagocytosis and is capable of producing nitric oxide. Thus, this cell line seems to be arrested an advanced stage of myeloid differentiation. Adherence data measured by impedance-based real-time cell analysis together with cell morphology data suggested that MuMac-E8 represents a new macrophage precursor cell line exhibiting weak adherence. This cell line is suitable as an in-vitro model for testing of macrophage functions. Moreover, it might be also useful for differentiation or reprogramming studies. PMID:25546418

  15. Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled

    2015-01-01

    Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes. PMID:26153768

  16. Comparative Evaluation of Health-Related Quality of Life Questionnaires in Patients With Heart Failure Undergoing Cardiac Rehabilitation: A Psychometric Study.

    PubMed

    Rajati, Fatemeh; Feizi, Awat; Tavakol, Kamran; Mostafavi, Firoozeh; Sadeghi, Masoumeh; Sharifirad, Gholamreza

    2016-11-01

    To compare the psychometric properties of 2 heart failure (HF)-specific quality of life questionnaires and the Medical Outcomes Study 36-Item Short-Form Health Survey (SF-36) in patients with HF. A methodological study based on 3-month follow-up data for evaluating psychometric properties of health-related quality of life (HRQOL) questionnaires. Cardiac rehabilitation center at a cardiovascular research institute. Eligible patients with HF (N=60). Exercise training in cardiac rehabilitation. The SF-36, the MacNew Heart Disease questionnaire, and the Minnesota Living With Heart Failure Questionnaire (MLHFQ) and New York Heart Association functional classification. Items from the MLHFQ and the MacNew questionnaire had acceptable correlations (r>.30, P<.05). Internal consistency and test-retest reliability were adequate at ≥0.7 for the MLHFQ subscales. Correlations for the MLHFQ and the MacNew with SF-36 similar items ranged from .28 to .50 and from .26 to .60, respectively. Similar scales from the MacNew and MLHFQ showed strong correlations at baseline and follow-up, supporting the convergent validity. Improvement in HRQOL was significant for all MLHFQ subscales (P<.001) and the MacNew emotional (P<.05) and social (P<.001) subscales. The MLHFQ demonstrated the most responsiveness to changes and discriminated disease severity the best. The follow-up scores for all MLHFQ and 2 MacNew subscales were significantly greater in patients who improved compared with those who showed no change or deteriorated. The MLHFQ was more responsive to changes of HRQOL than the MacNew questionnaire over time in patients with HF. The MacNew questionnaire was more responsive to changes than the SF-36. Copyright © 2016 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  17. Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled

    2015-07-06

    Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes.

  18. Minimum alveolar concentration threshold of sevoflurane for postoperative dream recall.

    PubMed

    Aceto, P; Perilli, V; Lai, C; Sacco, T; Modesti, C; Luca, E; De Santis, P; Sollazzi, L; Antonelli, M

    2015-11-01

    Many factors affect postoperative dream recall, including patient characteristics, type of anesthesia, timing of postoperative interview and stress hormone secretion. Aims of the study were to determine whether Bispectral Index (BIS)-guided anesthesia might decrease sevoflurane minimum alveolar concentration (MAC) when compared with hemodynamically-guided anesthesia, and to search for a MAC threshold useful for preventing arousal, dream recall and implicit memory. One hundred thirty patients undergoing elective thyroidectomy were enrolled. Anesthesia was induced with propofol 2 mg kg(-1), fentanyl 3 mcg kg(-1) and cis-atracurium 0.15 mg kg(-1). For anesthesia maintenance, patients were randomly assigned to one of two groups: a BIS-guided group in which sevoflurane MAC was adjusted on the basis of BIS values, and a hemodynamic parameters (HP)-guided group in which MAC was adjusted based on HP. An auditory recording was presented to patients during anesthesia maintenance. Dream recall and explicit/implicit memory were investigated upon awakening and approximately after 24 h. Mean sevoflurane MAC during auditory presentation was similar in the two groups (0.85 ± 0.16 and 0.87 ± 0.17 [P = 0.53] in BIS-guided and HP-guided groups, respectively). Frequency of dream recall was similar in the two groups: 27% (N. = 17) in BIS-guided group, 18% (N. = 12) in HP-guided group, P = 0.37. In both groups, dream recall was less probable in patients anesthetized with MAC values ≥ 0.9 (area under ROC curve = 0.83, sensitivity = 90%, and specificity = 49%). BIS-guided anesthesia was not able to generate different MAC values compared to HP-guided anesthesia. Independent of the guide used for anesthesia, a sevoflurane MAC over 0.9 was required to prevent postoperative dream recall.

  19. Targeted Deletions of COX-2 and Atherogenesis in Mice

    PubMed Central

    Hui, Yiqun; Ricciotti, Emanuela; Crichton, Irene; Yu, Zhou; Wang, Dairong; Stubbe, Jane; Wang, Miao; Puré, Ellen; FitzGerald, Garret A.

    2010-01-01

    Background While the dominant product of vascular cyclooxygenase (COX)-2, prostacyclin (PGI2), restrains atherogenesis, inhibition and deletion of COX-2 have yielded conflicting results in mouse models of atherosclerosis. Floxed mice were used to parse distinct cellular contributions of COX-2 in macrophages (Mac) and T cells (TC) to atherogenesis. Methods and Results Deletion of Mac COX-2 (MacKO) was attained using LysMCre mice and suppressed completely lipopolysaccharide (LPS) stimulated Mac prostaglandin (PG) formation and LPS evoked systemic PG biosynthesis by ∼ 30%. LPS stimulated COX-2 expression was suppressed in polymorphonuclear leucocytes (PMN) isolated from MacKOs, but PG formation was not even detected in PMN supernatants from control mice. Atherogenesis was attenuated when MacKOs were crossed into hyperlipidemic LdlR KOs. Deletion of Mac COX-2 appeared to remove a restraint on COX-2 expression in lesional non-leukocyte (CD45 and CD11b negative) vascular cells that express vascular cell adhesion molecule and variably, α-smooth muscle actin and vimentin, portending a shift in PG profile and consequent atheroprotection. Basal expression of COX-2 was minimal in TCs, but use of CD4Cre to generate TC knockouts (TCKOs) depressed its modest upregulation by anti-CD3ε. However, biosynthesis of PGs, TC composition in lymphatic organs and atherogenesis in LDLR KOs were unaltered in TCKOs. Conclusions Mac COX-2, primarily a source of thromboxane A2 and PGE2, promotes atherogenesis and exerts a restraint on enzyme expression by lesional cells suggestive of vascular smooth muscle cells, a prominent source of atheroprotective PGI2. TC COX-2 does not influence detectably TC development or function nor atherogenesis in mice. PMID:20530000

  20. Application of the MacCormack scheme to overland flow routing for high-spatial resolution distributed hydrological model

    NASA Astrophysics Data System (ADS)

    Zhang, Ling; Nan, Zhuotong; Liang, Xu; Xu, Yi; Hernández, Felipe; Li, Lianxia

    2018-03-01

    Although process-based distributed hydrological models (PDHMs) are evolving rapidly over the last few decades, their extensive applications are still challenged by the computational expenses. This study attempted, for the first time, to apply the numerically efficient MacCormack algorithm to overland flow routing in a representative high-spatial resolution PDHM, i.e., the distributed hydrology-soil-vegetation model (DHSVM), in order to improve its computational efficiency. The analytical verification indicates that both the semi and full versions of the MacCormack schemes exhibit robust numerical stability and are more computationally efficient than the conventional explicit linear scheme. The full-version outperforms the semi-version in terms of simulation accuracy when a same time step is adopted. The semi-MacCormack scheme was implemented into DHSVM (version 3.1.2) to solve the kinematic wave equations for overland flow routing. The performance and practicality of the enhanced DHSVM-MacCormack model was assessed by performing two groups of modeling experiments in the Mercer Creek watershed, a small urban catchment near Bellevue, Washington. The experiments show that DHSVM-MacCormack can considerably improve the computational efficiency without compromising the simulation accuracy of the original DHSVM model. More specifically, with the same computational environment and model settings, the computational time required by DHSVM-MacCormack can be reduced to several dozen minutes for a simulation period of three months (in contrast with one day and a half by the original DHSVM model) without noticeable sacrifice of the accuracy. The MacCormack scheme proves to be applicable to overland flow routing in DHSVM, which implies that it can be coupled into other PHDMs for watershed routing to either significantly improve their computational efficiency or to make the kinematic wave routing for high resolution modeling computational feasible.

  1. On Proper Selection of Multihop Relays for Future Enhancement of AeroMACS Networks

    NASA Technical Reports Server (NTRS)

    Kamali, Behnam; Kerczewski, Robert J.; Apaza, Rafael D.

    2015-01-01

    As the Aeronautical Mobile Airport Communications System (AeroMACS) has evolved from a technology concept to a deployed communications network over major US airports, it is now time to contemplate whether the existing capacity of AeroMACS is sufficient to meet the demands set forth by all fixed and mobile applications over the airport surface given the AeroMACS constraints regarding bandwidth and transmit power. The underlying idea in this article is to present IEEE 802.16j-based WiMAX as a technology that can address future capacity enhancements and therefore is most feasible for AeroMACS applications. The principal argument in favor IEEE 802.16j technology is the flexible and cost effective extension of radio coverage that is afforded by relay fortified networks, with virtually no increase in the power requirements and virtually no rise in interference levels to co-allocated applications. The IEEE 802.16j-based multihop relay systems are briefly described. The focus is on key features of this technology, frame structure, and its architecture. Next, AeroMACS is described as a WiMAX-based wireless network. The two major relay modes supported by IEEE 802.16j amendment, i.e., transparent and non-transparent are described. The benefits of employing multihop relays are listed. Some key challenges related to incorporating relays into AeroMACS networks are discussed. The selection of relay type in a broadband wireless network affects a number of network parameters such as latency, signal overhead, PHY (Scalable Physical Layer) and MAC (Media Access Layer) layer protocols, consequently it can alter key network quantities of throughput and QoS (Quality of Service).

  2. Embedding X.509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data.

    PubMed

    Hedberg, Thomas D; Krima, Sylvere; Camelio, Jaime A

    2017-03-01

    Exchange and reuse of three-dimensional (3D)-product models are hampered by the absence of trust in product-lifecycle-data quality. The root cause of the missing trust is years of "silo" functions (e.g., engineering, manufacturing, quality assurance) using independent and disconnected processes. Those disconnected processes result in data exchanges that do not contain all of the required information for each downstream lifecycle process, which inhibits the reuse of product data and results in duplicate data. The X.509 standard, maintained by the Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T), was first issued in 1988. Although originally intended as the authentication framework for the X.500 series for electronic directory services, the X.509 framework is used in a wide range of implementations outside the originally intended paradigm. These implementations range from encrypting websites to software-code signing, yet X.509 certificate use has not widely penetrated engineering and product realms. Our approach is not trying to provide security mechanisms, but equally as important, our method aims to provide insight into what is happening with product data to support trusting the data. This paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, and traceability of product data. This paper also describes an application within the Aerospace domain. Finally, the paper draws conclusions and provides recommendations for further research into using X.509 certificates in product lifecycle management (PLM) workflows to enable a product lifecycle of trust.

  3. Philosophically Rooted Educational Authenticity as a Normative Ideal for Education: Is the International Baccalaureate's Primary Years Programme an Example of an Authentic Curriculum?

    ERIC Educational Resources Information Center

    Lüddecke, Florian

    2016-01-01

    Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…

  4. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    ERIC Educational Resources Information Center

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  5. Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700

    NASA Astrophysics Data System (ADS)

    Liu, Hefu

    This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.

  6. Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie

    2008-12-01

    Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.

  7. MAC layer security issues in wireless mesh networks

    NASA Astrophysics Data System (ADS)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  8. Heroic Measures for an American Hero: Attempting to Save the Life of General Douglas MacArthur.

    PubMed

    Pappas, Theodore N

    2017-12-01

    General Douglas MacArthur was a towering public figure on an international stage for the first half of the 20th century. He was healthy throughout his life but developed a series of medical problems when he entered his 80s. This article reviews the General's medical care during two separate life-threatening medical crises that required surgical intervention. The first episode occurred in 1960 when MacArthur presented with renal failure due to an obstructed prostate. Four years later after his 84th birthday, MacArthur developed bile duct obstruction from common duct stones. He underwent an uncomplicated cholecystectomy and common duct exploration but developed variceal bleeding requiring an emergent splenorenal shunt. His terminal event was precipitated by strangulated bowel in long-ignored very large inguinal hernias. MacArthur died, despite state-of-the-art surgical intervention, due to renal failure and hepatic coma.

  9. MAC reduction of isoflurane by sufentanil.

    PubMed

    Brunner, M D; Braithwaite, P; Jhaveri, R; McEwan, A I; Goodman, D K; Smith, L R; Glass, P S

    1994-01-01

    We have shown previously that a plasma fentanyl concentration of 1.67 ng ml-1 reduced the MAC of isoflurane by 50%. By comparing equal degrees of MAC reduction by sufentanil, we may determine the potency ratio of these opioids. Seventy-six patients were allocated randomly to receive predetermined infusions of sufentanil, and end-tidal concentrations of isoflurane in oxygen. Blood samples were obtained 10 min after the start of the infusion, and just before and after skin incision. Any purposeful movement by the patient was recorded. The MAC reduction of isoflurane produced by sufentanil was obtained using a logistic regression model. A sufentanil plasma concentration of 0.145 ng ml-1 (95% confidence limits 0.04, 0.26 ng ml-1) resulted in a 50% reduction in the MAC of isoflurane. At a plasma concentration greater than 0.5 ng ml-1, sufentanil exhibited a ceiling effect.

  10. Rcount: simple and flexible RNA-Seq read counting.

    PubMed

    Schmid, Marc W; Grossniklaus, Ueli

    2015-02-01

    Analysis of differential gene expression by RNA sequencing (RNA-Seq) is frequently done using feature counts, i.e. the number of reads mapping to a gene. However, commonly used count algorithms (e.g. HTSeq) do not address the problem of reads aligning with multiple locations in the genome (multireads) or reads aligning with positions where two or more genes overlap (ambiguous reads). Rcount specifically addresses these issues. Furthermore, Rcount allows the user to assign priorities to certain feature types (e.g. higher priority for protein-coding genes compared to rRNA-coding genes) or to add flanking regions. Rcount provides a fast and easy-to-use graphical user interface requiring no command line or programming skills. It is implemented in C++ using the SeqAn (www.seqan.de) and the Qt libraries (qt-project.org). Source code and 64 bit binaries for (Ubuntu) Linux, Windows (7) and MacOSX are released under the GPLv3 license and are freely available on github.com/MWSchmid/Rcount. marcschmid@gmx.ch Test data, genome annotation files, useful Python and R scripts and a step-by-step user guide (including run-time and memory usage tests) are available on github.com/MWSchmid/Rcount. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  11. Sandbox for Mac Malware v 1.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Walkup, Elizabeth

    This software is an analyzer for automated sandbox analysis of malware on the OS X operating system. It runs inside an OS X virtual machine to collect data about what happens when a given file is opened or run. As of August 2014, there was no sandbox software for Mac OS X malware, as it requires different methods from those used on the Windows OS (which most sandboxes are written for). This software adds OS X analysis capabilities to an existing open-source sandbox, Cuckoo Sandbox (http://cuckoosandbox.org/), which previously only worked for Windows. The analyzer itself can take many different typesmore » of files as input: the traditional Mach-O and FAT executables, .app files, zip files, Python scripts, Java archives, and web pages, as well as PDFs and other documents. While the file is running, the analyzer also simulates rudimentary human interaction with clicks and mouse movements in order to bypass the tests some malware use to see if they are being analyzed. The analyzer outputs several different kinds of data: function call traces, network captures, screenshots, and all created and modified files. This work also includes a static analysis Cuckoo module for Mach-O binary files. It extracts file structures, code library imports and exports, and signatures. This data can be used along with the analyzer results to create signatures for malware.« less

  12. Automated Proposition Density Analysis for Discourse in Aphasia.

    PubMed

    Fromm, Davida; Greenhouse, Joel; Hou, Kaiyue; Russell, G Austin; Cai, Xizhen; Forbes, Margaret; Holland, Audrey; MacWhinney, Brian

    2016-10-01

    This study evaluates how proposition density can differentiate between persons with aphasia (PWA) and individuals in a control group, as well as among subtypes of aphasia, on the basis of procedural discourse and personal narratives collected from large samples of participants. Participants were 195 PWA and 168 individuals in a control group from the AphasiaBank database. PWA represented 6 aphasia types on the basis of the Western Aphasia Battery-Revised (Kertesz, 2006). Narrative samples were stroke stories for PWA and illness or injury stories for individuals in the control group. Procedural samples were from the peanut-butter-and-jelly-sandwich task. Language samples were transcribed using Codes for the Human Analysis of Transcripts (MacWhinney, 2000) and analyzed using Computerized Language Analysis (MacWhinney, 2000), which automatically computes proposition density (PD) using rules developed for automatic PD measurement by the Computerized Propositional Idea Density Rater program (Brown, Snodgrass, & Covington, 2007; Covington, 2007). Participants in the control group scored significantly higher than PWA on both tasks. PD scores were significantly different among the aphasia types for both tasks. Pairwise comparisons for both discourse tasks revealed that PD scores for the Broca's group were significantly lower than those for all groups except Transcortical Motor. No significant quadratic or linear association between PD and severity was found. Proposition density is differentially sensitive to aphasia type and most clearly differentiates individuals with Broca's aphasia from the other groups.

  13. An Application of MacLaury's Vantage Theory to Abstract Categories: Identity and the Process of Categorisation

    ERIC Educational Resources Information Center

    Fabiszak, Malgorzata

    2010-01-01

    This paper is an application of Robert E. MacLaury's Vantage Theory (VT) to the analysis of real life spoken discourse. It utilizes Dennis R. Preston's (1994) modification of MacLaury's VT. It elucidates how cognitive processes of coordinate selection and combination contribute to the on-line construction of category membership in the abstract…

  14. Microcystic adnexal carcinoma following radiotherapy in childhood

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borenstein, A.; Seidman, D.S.; Trau, H.

    1991-04-01

    A 36-year-old man was treated by radiotherapy for tinea capitis many years before discovery of microcystic adnexal carcinoma (MAC). Because of patient's refusal of any surgical intervention, we were able to follow the natural course of this tumor for 13 years. This case emphasizes the typical slow development of (MAC). The implication of the association of MAC and radiotherapy are discussed.

  15. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  16. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  17. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  18. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  19. 78 FR 77450 - Fannie Mae and Freddie Mac Loan Purchase Limits: Request for Public Input on Implementation Issues

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... reductions in Freddie Mac's and Fannie Mae's loan purchase limits. In short, no final decision on loan... decision to direct the setting of new and lower loan purchase limits by the Enterprises. A Plan for Setting... FEDERAL HOUSING FINANCE AGENCY [No. 2013-N-18] Fannie Mae and Freddie Mac Loan Purchase Limits...

  20. Geochemistry and petrography of the MacAlpine Hills lunar meteorites

    NASA Technical Reports Server (NTRS)

    Lindstrom, Marilyn M.; Mckay, David S.; Wentworth, Susan J.; Martinez, Rene R.; Mittlefehldt, David W.; Wang, Ming-Sheng; Lipschutz, Michael E.

    1991-01-01

    MacAlpine Hills 88104 and 88105, anorthositic lunar meteorites recovered form the same area in Antartica, are characterized. Petrographic studies show that MAC88104/5 is a polymict breccia dominated by impact melt clasts. It is better classified as a fragmental breccia than a regolith breccia. The bulk composition is ferroan and highly aluminous (Al2O3-28 percent).

Top