Sample records for hash function crush

  1. Collision attack against Tav-128 hash function

    NASA Astrophysics Data System (ADS)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  2. Intrusion detection using secure signatures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, Trent Darnel; Haile, Jedediah

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of themore » secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.« less

  3. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps

    NASA Astrophysics Data System (ADS)

    Ahmad, Musheer; Khurana, Shruti; Singh, Sushmita; AlSharari, Hamed D.

    2017-06-01

    The chaotic maps posses high parameter sensitivity, random-like behavior and one-way computations, which favor the construction of cryptographic hash functions. In this paper, we propose to present a novel hash function scheme which uses multiple chaotic maps to generate efficient variable-sized hash functions. The message is divided into four parts, each part is processed by a different 1D chaotic map unit yielding intermediate hash code. The four codes are concatenated to two blocks, then each block is processed through 2D chaotic map unit separately. The final hash value is generated by combining the two partial hash codes. The simulation analyses such as distribution of hashes, statistical properties of confusion and diffusion, message and key sensitivity, collision resistance and flexibility are performed. The results reveal that the proposed anticipated hash scheme is simple, efficient and holds comparable capabilities when compared with some recent chaos-based hash algorithms.

  4. Robust hashing with local models for approximate similarity search.

    PubMed

    Song, Jingkuan; Yang, Yi; Li, Xuelong; Huang, Zi; Yang, Yang

    2014-07-01

    Similarity search plays an important role in many applications involving high-dimensional data. Due to the known dimensionality curse, the performance of most existing indexing structures degrades quickly as the feature dimensionality increases. Hashing methods, such as locality sensitive hashing (LSH) and its variants, have been widely used to achieve fast approximate similarity search by trading search quality for efficiency. However, most existing hashing methods make use of randomized algorithms to generate hash codes without considering the specific structural information in the data. In this paper, we propose a novel hashing method, namely, robust hashing with local models (RHLM), which learns a set of robust hash functions to map the high-dimensional data points into binary hash codes by effectively utilizing local structural information. In RHLM, for each individual data point in the training dataset, a local hashing model is learned and used to predict the hash codes of its neighboring data points. The local models from all the data points are globally aligned so that an optimal hash code can be assigned to each data point. After obtaining the hash codes of all the training data points, we design a robust method by employing l2,1 -norm minimization on the loss function to learn effective hash functions, which are then used to map each database point into its hash code. Given a query data point, the search process first maps it into the query hash code by the hash functions and then explores the buckets, which have similar hash codes to the query hash code. Extensive experimental results conducted on real-life datasets show that the proposed RHLM outperforms the state-of-the-art methods in terms of search quality and efficiency.

  5. Perceptual Audio Hashing Functions

    NASA Astrophysics Data System (ADS)

    Özer, Hamza; Sankur, Bülent; Memon, Nasir; Anarım, Emin

    2005-12-01

    Perceptual hash functions provide a tool for fast and reliable identification of content. We present new audio hash functions based on summarization of the time-frequency spectral characteristics of an audio document. The proposed hash functions are based on the periodicity series of the fundamental frequency and on singular-value description of the cepstral frequencies. They are found, on one hand, to perform very satisfactorily in identification and verification tests, and on the other hand, to be very resilient to a large variety of attacks. Moreover, we address the issue of security of hashes and propose a keying technique, and thereby a key-dependent hash function.

  6. On the concept of cryptographic quantum hashing

    NASA Astrophysics Data System (ADS)

    Ablayev, F.; Ablayev, M.

    2015-12-01

    In the letter we define the notion of a quantum resistant ((ε ,δ ) -resistant) hash function which consists of a combination of pre-image (one-way) resistance (ε-resistance) and collision resistance (δ-resistance) properties. We present examples and discussion that supports the idea of quantum hashing. We present an explicit quantum hash function which is ‘balanced’, one-way resistant and collision resistant and demonstrate how to build a large family of quantum hash functions. Balanced quantum hash functions need a high degree of entanglement between the qubits. We use a phase transformation technique to express quantum hashing constructions, which is an effective way of mapping hash states to coherent states in a superposition of time-bin modes. The phase transformation technique is ready to be implemented with current optical technology.

  7. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  8. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    PubMed Central

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  9. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption.

    PubMed

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-29

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  10. Collision analysis of one kind of chaos-based hash function

    NASA Astrophysics Data System (ADS)

    Xiao, Di; Peng, Wenbing; Liao, Xiaofeng; Xiang, Tao

    2010-02-01

    In the last decade, various chaos-based hash functions have been proposed. Nevertheless, the corresponding analyses of them lag far behind. In this Letter, we firstly take a chaos-based hash function proposed very recently in Amin, Faragallah and Abd El-Latif (2009) [11] as a sample to analyze its computational collision problem, and then generalize the construction method of one kind of chaos-based hash function and summarize some attentions to avoid the collision problem. It is beneficial to the hash function design based on chaos in the future.

  11. Query-Adaptive Reciprocal Hash Tables for Nearest Neighbor Search.

    PubMed

    Liu, Xianglong; Deng, Cheng; Lang, Bo; Tao, Dacheng; Li, Xuelong

    2016-02-01

    Recent years have witnessed the success of binary hashing techniques in approximate nearest neighbor search. In practice, multiple hash tables are usually built using hashing to cover more desired results in the hit buckets of each table. However, rare work studies the unified approach to constructing multiple informative hash tables using any type of hashing algorithms. Meanwhile, for multiple table search, it also lacks of a generic query-adaptive and fine-grained ranking scheme that can alleviate the binary quantization loss suffered in the standard hashing techniques. To solve the above problems, in this paper, we first regard the table construction as a selection problem over a set of candidate hash functions. With the graph representation of the function set, we propose an efficient solution that sequentially applies normalized dominant set to finding the most informative and independent hash functions for each table. To further reduce the redundancy between tables, we explore the reciprocal hash tables in a boosting manner, where the hash function graph is updated with high weights emphasized on the misclassified neighbor pairs of previous hash tables. To refine the ranking of the retrieved buckets within a certain Hamming radius from the query, we propose a query-adaptive bitwise weighting scheme to enable fine-grained bucket ranking in each hash table, exploiting the discriminative power of its hash functions and their complement for nearest neighbor search. Moreover, we integrate such scheme into the multiple table search using a fast, yet reciprocal table lookup algorithm within the adaptive weighted Hamming radius. In this paper, both the construction method and the query-adaptive search method are general and compatible with different types of hashing algorithms using different feature spaces and/or parameter settings. Our extensive experiments on several large-scale benchmarks demonstrate that the proposed techniques can significantly outperform both the naive construction methods and the state-of-the-art hashing algorithms.

  12. Spherical hashing: binary code embedding with hyperspheres.

    PubMed

    Heo, Jae-Pil; Lee, Youngwoon; He, Junfeng; Chang, Shih-Fu; Yoon, Sung-Eui

    2015-11-01

    Many binary code embedding schemes have been actively studied recently, since they can provide efficient similarity search, and compact data representations suitable for handling large scale image databases. Existing binary code embedding techniques encode high-dimensional data by using hyperplane-based hashing functions. In this paper we propose a novel hypersphere-based hashing function, spherical hashing, to map more spatially coherent data points into a binary code compared to hyperplane-based hashing functions. We also propose a new binary code distance function, spherical Hamming distance, tailored for our hypersphere-based binary coding scheme, and design an efficient iterative optimization process to achieve both balanced partitioning for each hash function and independence between hashing functions. Furthermore, we generalize spherical hashing to support various similarity measures defined by kernel functions. Our extensive experiments show that our spherical hashing technique significantly outperforms state-of-the-art techniques based on hyperplanes across various benchmarks with sizes ranging from one to 75 million of GIST, BoW and VLAD descriptors. The performance gains are consistent and large, up to 100 percent improvements over the second best method among tested methods. These results confirm the unique merits of using hyperspheres to encode proximity regions in high-dimensional spaces. Finally, our method is intuitive and easy to implement.

  13. Linear Subspace Ranking Hashing for Cross-Modal Retrieval.

    PubMed

    Li, Kai; Qi, Guo-Jun; Ye, Jun; Hua, Kien A

    2017-09-01

    Hashing has attracted a great deal of research in recent years due to its effectiveness for the retrieval and indexing of large-scale high-dimensional multimedia data. In this paper, we propose a novel ranking-based hashing framework that maps data from different modalities into a common Hamming space where the cross-modal similarity can be measured using Hamming distance. Unlike existing cross-modal hashing algorithms where the learned hash functions are binary space partitioning functions, such as the sign and threshold function, the proposed hashing scheme takes advantage of a new class of hash functions closely related to rank correlation measures which are known to be scale-invariant, numerically stable, and highly nonlinear. Specifically, we jointly learn two groups of linear subspaces, one for each modality, so that features' ranking orders in different linear subspaces maximally preserve the cross-modal similarities. We show that the ranking-based hash function has a natural probabilistic approximation which transforms the original highly discontinuous optimization problem into one that can be efficiently solved using simple gradient descent algorithms. The proposed hashing framework is also flexible in the sense that the optimization procedures are not tied up to any specific form of loss function, which is typical for existing cross-modal hashing methods, but rather we can flexibly accommodate different loss functions with minimal changes to the learning steps. We demonstrate through extensive experiments on four widely-used real-world multimodal datasets that the proposed cross-modal hashing method can achieve competitive performance against several state-of-the-arts with only moderate training and testing time.

  14. Computing quantum hashing in the model of quantum branching programs

    NASA Astrophysics Data System (ADS)

    Ablayev, Farid; Ablayev, Marat; Vasiliev, Alexander

    2018-02-01

    We investigate the branching program complexity of quantum hashing. We consider a quantum hash function that maps elements of a finite field into quantum states. We require that this function is preimage-resistant and collision-resistant. We consider two complexity measures for Quantum Branching Programs (QBP): a number of qubits and a number of compu-tational steps. We show that the quantum hash function can be computed efficiently. Moreover, we prove that such QBP construction is optimal. That is, we prove lower bounds that match the constructed quantum hash function computation.

  15. Neighborhood Discriminant Hashing for Large-Scale Image Retrieval.

    PubMed

    Tang, Jinhui; Li, Zechao; Wang, Meng; Zhao, Ruizhen

    2015-09-01

    With the proliferation of large-scale community-contributed images, hashing-based approximate nearest neighbor search in huge databases has aroused considerable interest from the fields of computer vision and multimedia in recent years because of its computational and memory efficiency. In this paper, we propose a novel hashing method named neighborhood discriminant hashing (NDH) (for short) to implement approximate similarity search. Different from the previous work, we propose to learn a discriminant hashing function by exploiting local discriminative information, i.e., the labels of a sample can be inherited from the neighbor samples it selects. The hashing function is expected to be orthogonal to avoid redundancy in the learned hashing bits as much as possible, while an information theoretic regularization is jointly exploited using maximum entropy principle. As a consequence, the learned hashing function is compact and nonredundant among bits, while each bit is highly informative. Extensive experiments are carried out on four publicly available data sets and the comparison results demonstrate the outperforming performance of the proposed NDH method over state-of-the-art hashing techniques.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  17. Implementation of cryptographic hash function SHA256 in C++

    NASA Astrophysics Data System (ADS)

    Shrivastava, Akash

    2012-02-01

    This abstract explains the implementation of SHA Secure hash algorithm 256 using C++. The SHA-2 is a strong hashing algorithm used in almost all kinds of security applications. The algorithm consists of 2 phases: Preprocessing and hash computation. Preprocessing involves padding a message, parsing the padded message into m-bits blocks, and setting initialization values to be used in the hash computation. It generates a message schedule from padded message and uses that schedule, along with functions, constants, and word operations to iteratively generate a series of hash values. The final hash value generated by the computation is used to determine the message digest. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits. The algorithm outputs a 256 bits message block with an internal state block of 256 bits and initial block size of 512 bits. Maximum message length in bit is generated is 2^64 -1, over all computed over a series of 64 rounds consisting or several operations such as and, or, Xor, Shr, Rot. The code will provide clear understanding of the hash algorithm and generates hash values to retrieve message digest.

  18. Hierarchical Recurrent Neural Hashing for Image Retrieval With Hierarchical Convolutional Features.

    PubMed

    Lu, Xiaoqiang; Chen, Yaxiong; Li, Xuelong

    Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep learning architectures can learn more effective image representation features. However, these methods only use semantic features to generate hash codes by shallow projection but ignore texture details. In this paper, we proposed a novel hashing method, namely hierarchical recurrent neural hashing (HRNH), to exploit hierarchical recurrent neural network to generate effective hash codes. There are three contributions of this paper. First, a deep hashing method is proposed to extensively exploit both spatial details and semantic information, in which, we leverage hierarchical convolutional features to construct image pyramid representation. Second, our proposed deep network can exploit directly convolutional feature maps as input to preserve the spatial structure of convolutional feature maps. Finally, we propose a new loss function that considers the quantization error of binarizing the continuous embeddings into the discrete binary codes, and simultaneously maintains the semantic similarity and balanceable property of hash codes. Experimental results on four widely used data sets demonstrate that the proposed HRNH can achieve superior performance over other state-of-the-art hashing methods.Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep learning architectures can learn more effective image representation features. However, these methods only use semantic features to generate hash codes by shallow projection but ignore texture details. In this paper, we proposed a novel hashing method, namely hierarchical recurrent neural hashing (HRNH), to exploit hierarchical recurrent neural network to generate effective hash codes. There are three contributions of this paper. First, a deep hashing method is proposed to extensively exploit both spatial details and semantic information, in which, we leverage hierarchical convolutional features to construct image pyramid representation. Second, our proposed deep network can exploit directly convolutional feature maps as input to preserve the spatial structure of convolutional feature maps. Finally, we propose a new loss function that considers the quantization error of binarizing the continuous embeddings into the discrete binary codes, and simultaneously maintains the semantic similarity and balanceable property of hash codes. Experimental results on four widely used data sets demonstrate that the proposed HRNH can achieve superior performance over other state-of-the-art hashing methods.

  19. Hash function based on chaotic map lattices.

    PubMed

    Wang, Shihong; Hu, Gang

    2007-06-01

    A new hash function system, based on coupled chaotic map dynamics, is suggested. By combining floating point computation of chaos and some simple algebraic operations, the system reaches very high bit confusion and diffusion rates, and this enables the system to have desired statistical properties and strong collision resistance. The chaos-based hash function has its advantages for high security and fast performance, and it serves as one of the most highly competitive candidates for practical applications of hash function for software realization and secure information communications in computer networks.

  20. Hash function based on chaotic map lattices

    NASA Astrophysics Data System (ADS)

    Wang, Shihong; Hu, Gang

    2007-06-01

    A new hash function system, based on coupled chaotic map dynamics, is suggested. By combining floating point computation of chaos and some simple algebraic operations, the system reaches very high bit confusion and diffusion rates, and this enables the system to have desired statistical properties and strong collision resistance. The chaos-based hash function has its advantages for high security and fast performance, and it serves as one of the most highly competitive candidates for practical applications of hash function for software realization and secure information communications in computer networks.

  1. On the balanced quantum hashing

    NASA Astrophysics Data System (ADS)

    Ablayev, F.; Ablayev, M.; Vasiliev, A.

    2016-02-01

    In the paper we define a notion of a resistant quantum hash function which combines a notion of pre-image (one-way) resistance and the notion of collision resistance. In the quantum setting one-way resistance property and collision resistance property are correlated: the “more” a quantum function is one-way resistant the “less” it is collision resistant and vice versa. We present an explicit quantum hash function which is “balanced” one-way resistant and collision resistant and demonstrate how to build a large family of balanced quantum hash functions.

  2. Generation of physical random numbers by using homodyne detection

    NASA Astrophysics Data System (ADS)

    Hirakawa, Kodai; Oya, Shota; Oguri, Yusuke; Ichikawa, Tsubasa; Eto, Yujiro; Hirano, Takuya; Tsurumaru, Toyohiro

    2016-10-01

    Physical random numbers generated by quantum measurements are, in principle, impossible to predict. We have demonstrated the generation of physical random numbers by using a high-speed balanced photodetector to measure the quadrature amplitudes of vacuum states. Using this method, random numbers were generated at 500 Mbps, which is more than one order of magnitude faster than previously [Gabriel et al:, Nature Photonics 4, 711-715 (2010)]. The Crush test battery of the TestU01 suite consists of 31 tests in 144 variations, and we used them to statistically analyze these numbers. The generated random numbers passed 14 of the 31 tests. To improve the randomness, we performed a hash operation, in which each random number was multiplied by a random Toeplitz matrix; the resulting numbers passed all of the tests in the TestU01 Crush battery.

  3. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.

    PubMed

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.

  4. Learning Discriminative Binary Codes for Large-scale Cross-modal Retrieval.

    PubMed

    Xu, Xing; Shen, Fumin; Yang, Yang; Shen, Heng Tao; Li, Xuelong

    2017-05-01

    Hashing based methods have attracted considerable attention for efficient cross-modal retrieval on large-scale multimedia data. The core problem of cross-modal hashing is how to learn compact binary codes that construct the underlying correlations between heterogeneous features from different modalities. A majority of recent approaches aim at learning hash functions to preserve the pairwise similarities defined by given class labels. However, these methods fail to explicitly explore the discriminative property of class labels during hash function learning. In addition, they usually discard the discrete constraints imposed on the to-be-learned binary codes, and compromise to solve a relaxed problem with quantization to obtain the approximate binary solution. Therefore, the binary codes generated by these methods are suboptimal and less discriminative to different classes. To overcome these drawbacks, we propose a novel cross-modal hashing method, termed discrete cross-modal hashing (DCH), which directly learns discriminative binary codes while retaining the discrete constraints. Specifically, DCH learns modality-specific hash functions for generating unified binary codes, and these binary codes are viewed as representative features for discriminative classification with class labels. An effective discrete optimization algorithm is developed for DCH to jointly learn the modality-specific hash function and the unified binary codes. Extensive experiments on three benchmark data sets highlight the superiority of DCH under various cross-modal scenarios and show its state-of-the-art performance.

  5. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

    PubMed Central

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714

  6. Multimodal Discriminative Binary Embedding for Large-Scale Cross-Modal Retrieval.

    PubMed

    Wang, Di; Gao, Xinbo; Wang, Xiumei; He, Lihuo; Yuan, Bo

    2016-10-01

    Multimodal hashing, which conducts effective and efficient nearest neighbor search across heterogeneous data on large-scale multimedia databases, has been attracting increasing interest, given the explosive growth of multimedia content on the Internet. Recent multimodal hashing research mainly aims at learning the compact binary codes to preserve semantic information given by labels. The overwhelming majority of these methods are similarity preserving approaches which approximate pairwise similarity matrix with Hamming distances between the to-be-learnt binary hash codes. However, these methods ignore the discriminative property in hash learning process, which results in hash codes from different classes undistinguished, and therefore reduces the accuracy and robustness for the nearest neighbor search. To this end, we present a novel multimodal hashing method, named multimodal discriminative binary embedding (MDBE), which focuses on learning discriminative hash codes. First, the proposed method formulates the hash function learning in terms of classification, where the binary codes generated by the learned hash functions are expected to be discriminative. And then, it exploits the label information to discover the shared structures inside heterogeneous data. Finally, the learned structures are preserved for hash codes to produce similar binary codes in the same class. Hence, the proposed MDBE can preserve both discriminability and similarity for hash codes, and will enhance retrieval accuracy. Thorough experiments on benchmark data sets demonstrate that the proposed method achieves excellent accuracy and competitive computational efficiency compared with the state-of-the-art methods for large-scale cross-modal retrieval task.

  7. A cryptographic hash function based on chaotic network automata

    NASA Astrophysics Data System (ADS)

    Machicao, Jeaneth; Bruno, Odemir M.

    2017-12-01

    Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA). Cryptographic hash functions (CHF) are commonly used to check data integrity. CHF “compress” arbitrary long messages (input) into much smaller representations called hash values or message digest (output), designed to prevent the ability to reverse the hash values into the original message. This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468. Here, we propose an hybrid model that combines CA and networks, called network automata (CNA), whose chaotic spatio-temporal outputs are used to compute a hash value. Following the Merkle and Damgård model of construction, a portion of the message is entered as the initial condition of the network automata, so that the rest parts of messages are iteratively entered to perturb the system. The chaotic network automata shuffles the message using flexible control parameters, so that the generated hash value is highly sensitive to the message. As demonstrated in our experiments, the proposed model has excellent pseudo-randomness and sensitivity properties with acceptable performance when compared to conventional hash functions.

  8. A more secure parallel keyed hash function based on chaotic neural network

    NASA Astrophysics Data System (ADS)

    Huang, Zhongquan

    2011-08-01

    Although various hash functions based on chaos or chaotic neural network were proposed, most of them can not work efficiently in parallel computing environment. Recently, an algorithm for parallel keyed hash function construction based on chaotic neural network was proposed [13]. However, there is a strict limitation in this scheme that its secret keys must be nonce numbers. In other words, if the keys are used more than once in this scheme, there will be some potential security flaw. In this paper, we analyze the cause of vulnerability of the original one in detail, and then propose the corresponding enhancement measures, which can remove the limitation on the secret keys. Theoretical analysis and computer simulation indicate that the modified hash function is more secure and practical than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function, such as good statistical properties, high message and key sensitivity, and strong collision resistance, etc.

  9. Multiview alignment hashing for efficient image search.

    PubMed

    Liu, Li; Yu, Mengyang; Shao, Ling

    2015-03-01

    Hashing is a popular and efficient method for nearest neighbor search in large-scale data spaces by embedding high-dimensional feature descriptors into a similarity preserving Hamming space with a low dimension. For most hashing methods, the performance of retrieval heavily depends on the choice of the high-dimensional feature descriptor. Furthermore, a single type of feature cannot be descriptive enough for different images when it is used for hashing. Thus, how to combine multiple representations for learning effective hashing functions is an imminent task. In this paper, we present a novel unsupervised multiview alignment hashing approach based on regularized kernel nonnegative matrix factorization, which can find a compact representation uncovering the hidden semantics and simultaneously respecting the joint probability distribution of data. In particular, we aim to seek a matrix factorization to effectively fuse the multiple information sources meanwhile discarding the feature redundancy. Since the raised problem is regarded as nonconvex and discrete, our objective function is then optimized via an alternate way with relaxation and converges to a locally optimal solution. After finding the low-dimensional representation, the hashing functions are finally obtained through multivariable logistic regression. The proposed method is systematically evaluated on three data sets: 1) Caltech-256; 2) CIFAR-10; and 3) CIFAR-20, and the results show that our method significantly outperforms the state-of-the-art multiview hashing techniques.

  10. Gene function prediction based on Gene Ontology Hierarchy Preserving Hashing.

    PubMed

    Zhao, Yingwen; Fu, Guangyuan; Wang, Jun; Guo, Maozu; Yu, Guoxian

    2018-02-23

    Gene Ontology (GO) uses structured vocabularies (or terms) to describe the molecular functions, biological roles, and cellular locations of gene products in a hierarchical ontology. GO annotations associate genes with GO terms and indicate the given gene products carrying out the biological functions described by the relevant terms. However, predicting correct GO annotations for genes from a massive set of GO terms as defined by GO is a difficult challenge. To combat with this challenge, we introduce a Gene Ontology Hierarchy Preserving Hashing (HPHash) based semantic method for gene function prediction. HPHash firstly measures the taxonomic similarity between GO terms. It then uses a hierarchy preserving hashing technique to keep the hierarchical order between GO terms, and to optimize a series of hashing functions to encode massive GO terms via compact binary codes. After that, HPHash utilizes these hashing functions to project the gene-term association matrix into a low-dimensional one and performs semantic similarity based gene function prediction in the low-dimensional space. Experimental results on three model species (Homo sapiens, Mus musculus and Rattus norvegicus) for interspecies gene function prediction show that HPHash performs better than other related approaches and it is robust to the number of hash functions. In addition, we also take HPHash as a plugin for BLAST based gene function prediction. From the experimental results, HPHash again significantly improves the prediction performance. The codes of HPHash are available at: http://mlda.swu.edu.cn/codes.php?name=HPHash. Copyright © 2018 Elsevier Inc. All rights reserved.

  11. Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hansen, Randy R.; Bass, Robert B.; Kouzes, Richard T.

    2003-01-20

    This paper provides a brief overview of the implementation of the Advanced Encryption Standard (AES) as a hash function for confirming the identity of software resident on a computer system. The PNNL Software Authentication team chose to use a hash function to confirm software identity on a system for situations where: (1) there is limited time to perform the confirmation and (2) access to the system is restricted to keyboard or thumbwheel input and output can only be displayed on a monitor. PNNL reviewed three popular algorithms: the Secure Hash Algorithm - 1 (SHA-1), the Message Digest - 5 (MD-5),more » and the Advanced Encryption Standard (AES) and selected the AES to incorporate in software confirmation tool we developed. This paper gives a brief overview of the SHA-1, MD-5, and the AES and sites references for further detail. It then explains the overall processing steps of the AES to reduce a large amount of generic data-the plain text, such is present in memory and other data storage media in a computer system, to a small amount of data-the hash digest, which is a mathematically unique representation or signature of the former that could be displayed on a computer's monitor. This paper starts with a simple definition and example to illustrate the use of a hash function. It concludes with a description of how the software confirmation tool uses the hash function to confirm the identity of software on a computer system.« less

  12. Implementation of 4-way Superscalar Hash MIPS Processor Using FPGA

    NASA Astrophysics Data System (ADS)

    Sahib Omran, Safaa; Fouad Jumma, Laith

    2018-05-01

    Due to the quick advancements in the personal communications systems and wireless communications, giving data security has turned into a more essential subject. This security idea turns into a more confounded subject when next-generation system requirements and constant calculation speed are considered in real-time. Hash functions are among the most essential cryptographic primitives and utilized as a part of the many fields of signature authentication and communication integrity. These functions are utilized to acquire a settled size unique fingerprint or hash value of an arbitrary length of message. In this paper, Secure Hash Algorithms (SHA) of types SHA-1, SHA-2 (SHA-224, SHA-256) and SHA-3 (BLAKE) are implemented on Field-Programmable Gate Array (FPGA) in a processor structure. The design is described and implemented using a hardware description language, namely VHSIC “Very High Speed Integrated Circuit” Hardware Description Language (VHDL). Since the logical operation of the hash types of (SHA-1, SHA-224, SHA-256 and SHA-3) are 32-bits, so a Superscalar Hash Microprocessor without Interlocked Pipelines (MIPS) processor are designed with only few instructions that were required in invoking the desired Hash algorithms, when the four types of hash algorithms executed sequentially using the designed processor, the total time required equal to approximately 342 us, with a throughput of 4.8 Mbps while the required to execute the same four hash algorithms using the designed four-way superscalar is reduced to 237 us with improved the throughput to 5.1 Mbps.

  13. Study of the similarity function in Indexing-First-One hashing

    NASA Astrophysics Data System (ADS)

    Lai, Y.-L.; Jin, Z.; Goi, B.-M.; Chai, T.-Y.

    2017-06-01

    The recent proposed Indexing-First-One (IFO) hashing is a latest technique that is particularly adopted for eye iris template protection, i.e. IrisCode. However, IFO employs the measure of Jaccard Similarity (JS) initiated from Min-hashing has yet been adequately discussed. In this paper, we explore the nature of JS in binary domain and further propose a mathematical formulation to generalize the usage of JS, which is subsequently verified by using CASIA v3-Interval iris database. Our study reveals that JS applied in IFO hashing is a generalized version in measure two input objects with respect to Min-Hashing where the coefficient of JS is equal to one. With this understanding, IFO hashing can propagate the useful properties of Min-hashing, i.e. similarity preservation, thus favorable for similarity searching or recognition in binary space.

  14. Efficient computation of hashes

    NASA Astrophysics Data System (ADS)

    Lopes, Raul H. C.; Franqueira, Virginia N. L.; Hobson, Peter R.

    2014-06-01

    The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel hash tree modes. The main contributions of this paper are, first, the identification of several efficiency and security challenges posed by the use of sequential hash computation based on the Merkle-Damgard engine. In addition, alternatives for the parallel computation of hash trees are discussed, and a prototype for a new parallel implementation of the Keccak function, the SHA-3 winner, is introduced.

  15. Achaete-Scute Homolog 1 Expression Controls Cellular Differentiation of Neuroblastoma

    PubMed Central

    Kasim, Mumtaz; Heß, Vicky; Scholz, Holger; Persson, Pontus B.; Fähling, Michael

    2016-01-01

    Neuroblastoma, the major cause of infant cancer deaths, results from fast proliferation of undifferentiated neuroblasts. Treatment of high-risk neuroblastoma includes differentiation with retinoic acid (RA); however, the resistance of many of these tumors to RA-induced differentiation poses a considerable challenge. Human achaete-scute homolog 1 (hASH1) is a proneural basic helix-loop-helix transcription factor essential for neurogenesis and is often upregulated in neuroblastoma. Here, we identified a novel function for hASH1 in regulating the differentiation phenotype of neuroblastoma cells. Global analysis of 986 human neuroblastoma datasets revealed a negative correlation between hASH1 and neuron differentiation that was independent of the N-myc (MYCN) oncogene. Using RA to induce neuron differentiation in two neuroblastoma cell lines displaying high and low levels of hASH1 expression, we confirmed the link between hASH1 expression and the differentiation defective phenotype, which was reversed by silencing hASH1 or by hypoxic preconditioning. We further show that hASH1 suppresses neuronal differentiation by inhibiting transcription at the RA receptor element. Collectively, our data indicate hASH1 to be key for understanding neuroblastoma resistance to differentiation therapy and pave the way for hASH1-targeted therapies for augmenting the response of neuroblastoma to differentiation therapy. PMID:28066180

  16. Efficient hash tables for network applications.

    PubMed

    Zink, Thomas; Waldvogel, Marcel

    2015-01-01

    Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications. The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications. In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical.

  17. [Linking anonymous databases for national and international multicenter epidemiological studies: a cryptographic algorithm].

    PubMed

    Quantin, C; Fassa, M; Coatrieux, G; Riandey, B; Trouessin, G; Allaert, F A

    2009-02-01

    Compiling individual records which come from different sources remains very important for multicenter epidemiological studies, but at the same time European directives or other national legislation concerning nominal data processing have to be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, such an anonymization procedure is in contradiction with the common requirement in public health and biomedical research as it becomes almost impossible to link records from separate data collections where the same entity is not referenced in the same way. Solving this paradox by using methodology based on the combination of hashing and enciphering techniques is the main aim of this article. The method relies on one of the best known hashing functions (the secure hash algorithm) to ensure the anonymity of personal information while providing greater resistance to dictionary attacks, combined with encryption techniques. The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity. The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme. This methodology makes the stored data available for use in the field of public health for the benefit of patients, while respecting legal security requirements.

  18. Text image authenticating algorithm based on MD5-hash function and Henon map

    NASA Astrophysics Data System (ADS)

    Wei, Jinqiao; Wang, Ying; Ma, Xiaoxue

    2017-07-01

    In order to cater to the evidentiary requirements of the text image, this paper proposes a fragile watermarking algorithm based on Hash function and Henon map. The algorithm is to divide a text image into parts, get flippable pixels and nonflippable pixels of every lump according to PSD, generate watermark of non-flippable pixels with MD5-Hash, encrypt watermark with Henon map and select embedded blocks. The simulation results show that the algorithm with a good ability in tampering localization can be used to authenticate and forensics the authenticity and integrity of text images

  19. Learning binary code via PCA of angle projection for image retrieval

    NASA Astrophysics Data System (ADS)

    Yang, Fumeng; Ye, Zhiqiang; Wei, Xueqi; Wu, Congzhong

    2018-01-01

    With benefits of low storage costs and high query speeds, binary code representation methods are widely researched for efficiently retrieving large-scale data. In image hashing method, learning hashing function to embed highdimensions feature to Hamming space is a key step for accuracy retrieval. Principal component analysis (PCA) technical is widely used in compact hashing methods, and most these hashing methods adopt PCA projection functions to project the original data into several dimensions of real values, and then each of these projected dimensions is quantized into one bit by thresholding. The variances of different projected dimensions are different, and with real-valued projection produced more quantization error. To avoid the real-valued projection with large quantization error, in this paper we proposed to use Cosine similarity projection for each dimensions, the angle projection can keep the original structure and more compact with the Cosine-valued. We used our method combined the ITQ hashing algorithm, and the extensive experiments on the public CIFAR-10 and Caltech-256 datasets validate the effectiveness of the proposed method.

  20. Query-Adaptive Hash Code Ranking for Large-Scale Multi-View Visual Search.

    PubMed

    Liu, Xianglong; Huang, Lei; Deng, Cheng; Lang, Bo; Tao, Dacheng

    2016-10-01

    Hash-based nearest neighbor search has become attractive in many applications. However, the quantization in hashing usually degenerates the discriminative power when using Hamming distance ranking. Besides, for large-scale visual search, existing hashing methods cannot directly support the efficient search over the data with multiple sources, and while the literature has shown that adaptively incorporating complementary information from diverse sources or views can significantly boost the search performance. To address the problems, this paper proposes a novel and generic approach to building multiple hash tables with multiple views and generating fine-grained ranking results at bitwise and tablewise levels. For each hash table, a query-adaptive bitwise weighting is introduced to alleviate the quantization loss by simultaneously exploiting the quality of hash functions and their complement for nearest neighbor search. From the tablewise aspect, multiple hash tables are built for different data views as a joint index, over which a query-specific rank fusion is proposed to rerank all results from the bitwise ranking by diffusing in a graph. Comprehensive experiments on image search over three well-known benchmarks show that the proposed method achieves up to 17.11% and 20.28% performance gains on single and multiple table search over the state-of-the-art methods.

  1. Secure Image Hash Comparison for Warhead Verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bruillard, Paul J.; Jarman, Kenneth D.; Robinson, Sean M.

    2014-06-06

    The effort to inspect and verify warheads in the context of possible future arms control treaties is rife with security and implementation issues. In this paper we review prior work on perceptual image hashing for template-based warhead verification. Furthermore, we formalize the notion of perceptual hashes and demonstrate that large classes of such functions are likely not cryptographically secure. We close with a brief discussion of fully homomorphic encryption as an alternative technique.

  2. Image encryption algorithm based on multiple mixed hash functions and cyclic shift

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Zhu, Xiaoqiang; Wu, Xiangjun; Zhang, Yingqian

    2018-08-01

    This paper proposes a new one-time pad scheme for chaotic image encryption that is based on the multiple mixed hash functions and the cyclic-shift function. The initial value is generated using both information of the plaintext image and the chaotic sequences, which are calculated from the SHA1 and MD5 hash algorithms. The scrambling sequences are generated by the nonlinear equations and logistic map. This paper aims to improve the deficiencies of traditional Baptista algorithms and its improved algorithms. We employ the cyclic-shift function and piece-wise linear chaotic maps (PWLCM), which give each shift number the characteristics of chaos, to diffuse the image. Experimental results and security analysis show that the new scheme has better security and can resist common attacks.

  3. Building Application-Related Patient Identifiers: What Solution for a European Country?

    PubMed Central

    Quantin, Catherine; Allaert, François-André; Avillach, Paul; Fassa, Maniane; Riandey, Benoît; Trouessin, Gilles; Cohen, Olivier

    2008-01-01

    We propose a method utilizing a derived social security number with the same reliability as the social security number. We show the anonymity techniques classically based on unidirectional hash functions (such as the secure hash algorithm (SHA-2) function that can guarantee the security, quality, and reliability of information if these techniques are applied to the Social Security Number). Hashing produces a strictly anonymous code that is always the same for a given individual, and thus enables patient data to be linked. Different solutions are developed and proposed in this article. Hashing the social security number will make it possible to link the information in the personal medical file to other national health information sources with the aim of completing or validating the personal medical record or conducting epidemiological and clinical research. This data linkage would meet the anonymous data requirements of the European directive on data protection. PMID:18401447

  4. Distributed Adaptive Binary Quantization for Fast Nearest Neighbor Search.

    PubMed

    Xianglong Liu; Zhujin Li; Cheng Deng; Dacheng Tao

    2017-11-01

    Hashing has been proved an attractive technique for fast nearest neighbor search over big data. Compared with the projection based hashing methods, prototype-based ones own stronger power to generate discriminative binary codes for the data with complex intrinsic structure. However, existing prototype-based methods, such as spherical hashing and K-means hashing, still suffer from the ineffective coding that utilizes the complete binary codes in a hypercube. To address this problem, we propose an adaptive binary quantization (ABQ) method that learns a discriminative hash function with prototypes associated with small unique binary codes. Our alternating optimization adaptively discovers the prototype set and the code set of a varying size in an efficient way, which together robustly approximate the data relations. Our method can be naturally generalized to the product space for long hash codes, and enjoys the fast training linear to the number of the training data. We further devise a distributed framework for the large-scale learning, which can significantly speed up the training of ABQ in the distributed environment that has been widely deployed in many areas nowadays. The extensive experiments on four large-scale (up to 80 million) data sets demonstrate that our method significantly outperforms state-of-the-art hashing methods, with up to 58.84% performance gains relatively.

  5. HashDist: Reproducible, Relocatable, Customizable, Cross-Platform Software Stacks for Open Hydrological Science

    NASA Astrophysics Data System (ADS)

    Ahmadia, A. J.; Kees, C. E.

    2014-12-01

    Developing scientific software is a continuous balance between not reinventing the wheel and getting fragile codes to interoperate with one another. Binary software distributions such as Anaconda provide a robust starting point for many scientific software packages, but this solution alone is insufficient for many scientific software developers. HashDist provides a critical component of the development workflow, enabling highly customizable, source-driven, and reproducible builds for scientific software stacks, available from both the IPython Notebook and the command line. To address these issues, the Coastal and Hydraulics Laboratory at the US Army Engineer Research and Development Center has funded the development of HashDist in collaboration with Simula Research Laboratories and the University of Texas at Austin. HashDist is motivated by a functional approach to package build management, and features intelligent caching of sources and builds, parametrized build specifications, and the ability to interoperate with system compilers and packages. HashDist enables the easy specification of "software stacks", which allow both the novice user to install a default environment and the advanced user to configure every aspect of their build in a modular fashion. As an advanced feature, HashDist builds can be made relocatable, allowing the easy redistribution of binaries on all three major operating systems as well as cloud, and supercomputing platforms. As a final benefit, all HashDist builds are reproducible, with a build hash specifying exactly how each component of the software stack was installed. This talk discusses the role of HashDist in the hydrological sciences, including its use by the Coastal and Hydraulics Laboratory in the development and deployment of the Proteus Toolkit as well as the Rapid Operational Access and Maneuver Support project. We demonstrate HashDist in action, and show how it can effectively support development, deployment, teaching, and reproducibility for scientists working in the hydrological sciences. The HashDist documentation is available from: http://hashdist.readthedocs.org/en/latest/ HashDist is currently hosted at: https://github.com/hashdist/hashdist

  6. Application of kernel functions for accurate similarity search in large chemical databases.

    PubMed

    Wang, Xiaohong; Huan, Jun; Smalter, Aaron; Lushington, Gerald H

    2010-04-29

    Similarity search in chemical structure databases is an important problem with many applications in chemical genomics, drug design, and efficient chemical probe screening among others. It is widely believed that structure based methods provide an efficient way to do the query. Recently various graph kernel functions have been designed to capture the intrinsic similarity of graphs. Though successful in constructing accurate predictive and classification models, graph kernel functions can not be applied to large chemical compound database due to the high computational complexity and the difficulties in indexing similarity search for large databases. To bridge graph kernel function and similarity search in chemical databases, we applied a novel kernel-based similarity measurement, developed in our team, to measure similarity of graph represented chemicals. In our method, we utilize a hash table to support new graph kernel function definition, efficient storage and fast search. We have applied our method, named G-hash, to large chemical databases. Our results show that the G-hash method achieves state-of-the-art performance for k-nearest neighbor (k-NN) classification. Moreover, the similarity measurement and the index structure is scalable to large chemical databases with smaller indexing size, and faster query processing time as compared to state-of-the-art indexing methods such as Daylight fingerprints, C-tree and GraphGrep. Efficient similarity query processing method for large chemical databases is challenging since we need to balance running time efficiency and similarity search accuracy. Our previous similarity search method, G-hash, provides a new way to perform similarity search in chemical databases. Experimental study validates the utility of G-hash in chemical databases.

  7. SGFSC: speeding the gene functional similarity calculation based on hash tables.

    PubMed

    Tian, Zhen; Wang, Chunyu; Guo, Maozu; Liu, Xiaoyan; Teng, Zhixia

    2016-11-04

    In recent years, many measures of gene functional similarity have been proposed and widely used in all kinds of essential research. These methods are mainly divided into two categories: pairwise approaches and group-wise approaches. However, a common problem with these methods is their time consumption, especially when measuring the gene functional similarities of a large number of gene pairs. The problem of computational efficiency for pairwise approaches is even more prominent because they are dependent on the combination of semantic similarity. Therefore, the efficient measurement of gene functional similarity remains a challenging problem. To speed current gene functional similarity calculation methods, a novel two-step computing strategy is proposed: (1) establish a hash table for each method to store essential information obtained from the Gene Ontology (GO) graph and (2) measure gene functional similarity based on the corresponding hash table. There is no need to traverse the GO graph repeatedly for each method with the help of the hash table. The analysis of time complexity shows that the computational efficiency of these methods is significantly improved. We also implement a novel Speeding Gene Functional Similarity Calculation tool, namely SGFSC, which is bundled with seven typical measures using our proposed strategy. Further experiments show the great advantage of SGFSC in measuring gene functional similarity on the whole genomic scale. The proposed strategy is successful in speeding current gene functional similarity calculation methods. SGFSC is an efficient tool that is freely available at http://nclab.hit.edu.cn/SGFSC . The source code of SGFSC can be downloaded from http://pan.baidu.com/s/1dFFmvpZ .

  8. Hash Functions and Information Theoretic Security

    NASA Astrophysics Data System (ADS)

    Bagheri, Nasour; Knudsen, Lars R.; Naderi, Majid; Thomsen, Søren S.

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic attack costs and real costs. We show that in the information theoretic model, many well-known and commonly used hash functions such as MD5 and SHA-256 fail to be preimage resistant.

  9. Git as an Encrypted Distributed Version Control System

    DTIC Science & Technology

    2015-03-01

    options. The algorithm uses AES- 256 counter mode with an IV derived from SHA -1-HMAC hash (this is nearly identical to the GCM mode discussed earlier...built into the internal structure of Git. Every file in a Git repository is check summed with a SHA -1 hash, a one-way function with arbitrarily long...implementation. Git-encrypt calls OpenSSL cryptography library command line functions. The default cipher used is AES- 256 - Electronic Code Book (ECB), which is

  10. Self-Organized Link State Aware Routing for Multiple Mobile Agents in Wireless Network

    NASA Astrophysics Data System (ADS)

    Oda, Akihiro; Nishi, Hiroaki

    Recently, the importance of data sharing structures in autonomous distributed networks has been increasing. A wireless sensor network is used for managing distributed data. This type of distributed network requires effective information exchanging methods for data sharing. To reduce the traffic of broadcasted messages, reduction of the amount of redundant information is indispensable. In order to reduce packet loss in mobile ad-hoc networks, QoS-sensitive routing algorithm have been frequently discussed. The topology of a wireless network is likely to change frequently according to the movement of mobile nodes, radio disturbance, or fading due to the continuous changes in the environment. Therefore, a packet routing algorithm should guarantee QoS by using some quality indicators of the wireless network. In this paper, a novel information exchanging algorithm developed using a hash function and a Boolean operation is proposed. This algorithm achieves efficient information exchanges by reducing the overhead of broadcasting messages, and it can guarantee QoS in a wireless network environment. It can be applied to a routing algorithm in a mobile ad-hoc network. In the proposed routing algorithm, a routing table is constructed by using the received signal strength indicator (RSSI), and the neighborhood information is periodically broadcasted depending on this table. The proposed hash-based routing entry management by using an extended MAC address can eliminate the overhead of message flooding. An analysis of the collision of hash values contributes to the determination of the length of the hash values, which is minimally required. Based on the verification of a mathematical theory, an optimum hash function for determining the length of hash values can be given. Simulations are carried out to evaluate the effectiveness of the proposed algorithm and to validate the theory in a general wireless network routing algorithm.

  11. A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.

    PubMed

    Ko, Hoon; Song, MoonBae

    2016-01-01

    Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.

  12. Self-Supervised Video Hashing With Hierarchical Binary Auto-Encoder.

    PubMed

    Song, Jingkuan; Zhang, Hanwang; Li, Xiangpeng; Gao, Lianli; Wang, Meng; Hong, Richang

    2018-07-01

    Existing video hash functions are built on three isolated stages: frame pooling, relaxed learning, and binarization, which have not adequately explored the temporal order of video frames in a joint binary optimization model, resulting in severe information loss. In this paper, we propose a novel unsupervised video hashing framework dubbed self-supervised video hashing (SSVH), which is able to capture the temporal nature of videos in an end-to-end learning to hash fashion. We specifically address two central problems: 1) how to design an encoder-decoder architecture to generate binary codes for videos and 2) how to equip the binary codes with the ability of accurate video retrieval. We design a hierarchical binary auto-encoder to model the temporal dependencies in videos with multiple granularities, and embed the videos into binary codes with less computations than the stacked architecture. Then, we encourage the binary codes to simultaneously reconstruct the visual content and neighborhood structure of the videos. Experiments on two real-world data sets show that our SSVH method can significantly outperform the state-of-the-art methods and achieve the current best performance on the task of unsupervised video retrieval.

  13. Self-Supervised Video Hashing With Hierarchical Binary Auto-Encoder

    NASA Astrophysics Data System (ADS)

    Song, Jingkuan; Zhang, Hanwang; Li, Xiangpeng; Gao, Lianli; Wang, Meng; Hong, Richang

    2018-07-01

    Existing video hash functions are built on three isolated stages: frame pooling, relaxed learning, and binarization, which have not adequately explored the temporal order of video frames in a joint binary optimization model, resulting in severe information loss. In this paper, we propose a novel unsupervised video hashing framework dubbed Self-Supervised Video Hashing (SSVH), that is able to capture the temporal nature of videos in an end-to-end learning-to-hash fashion. We specifically address two central problems: 1) how to design an encoder-decoder architecture to generate binary codes for videos; and 2) how to equip the binary codes with the ability of accurate video retrieval. We design a hierarchical binary autoencoder to model the temporal dependencies in videos with multiple granularities, and embed the videos into binary codes with less computations than the stacked architecture. Then, we encourage the binary codes to simultaneously reconstruct the visual content and neighborhood structure of the videos. Experiments on two real-world datasets (FCVID and YFCC) show that our SSVH method can significantly outperform the state-of-the-art methods and achieve the currently best performance on the task of unsupervised video retrieval.

  14. Enhanced K-means clustering with encryption on cloud

    NASA Astrophysics Data System (ADS)

    Singh, Iqjot; Dwivedi, Prerna; Gupta, Taru; Shynu, P. G.

    2017-11-01

    This paper tries to solve the problem of storing and managing big files over cloud by implementing hashing on Hadoop in big-data and ensure security while uploading and downloading files. Cloud computing is a term that emphasis on sharing data and facilitates to share infrastructure and resources.[10] Hadoop is an open source software that gives us access to store and manage big files according to our needs on cloud. K-means clustering algorithm is an algorithm used to calculate distance between the centroid of the cluster and the data points. Hashing is a algorithm in which we are storing and retrieving data with hash keys. The hashing algorithm is called as hash function which is used to portray the original data and later to fetch the data stored at the specific key. [17] Encryption is a process to transform electronic data into non readable form known as cipher text. Decryption is the opposite process of encryption, it transforms the cipher text into plain text that the end user can read and understand well. For encryption and decryption we are using Symmetric key cryptographic algorithm. In symmetric key cryptography are using DES algorithm for a secure storage of the files. [3

  15. The Amordad database engine for metagenomics.

    PubMed

    Behnam, Ehsan; Smith, Andrew D

    2014-10-15

    Several technical challenges in metagenomic data analysis, including assembling metagenomic sequence data or identifying operational taxonomic units, are both significant and well known. These forms of analysis are increasingly cited as conceptually flawed, given the extreme variation within traditionally defined species and rampant horizontal gene transfer. Furthermore, computational requirements of such analysis have hindered content-based organization of metagenomic data at large scale. In this article, we introduce the Amordad database engine for alignment-free, content-based indexing of metagenomic datasets. Amordad places the metagenome comparison problem in a geometric context, and uses an indexing strategy that combines random hashing with a regular nearest neighbor graph. This framework allows refinement of the database over time by continual application of random hash functions, with the effect of each hash function encoded in the nearest neighbor graph. This eliminates the need to explicitly maintain the hash functions in order for query efficiency to benefit from the accumulated randomness. Results on real and simulated data show that Amordad can support logarithmic query time for identifying similar metagenomes even as the database size reaches into the millions. Source code, licensed under the GNU general public license (version 3) is freely available for download from http://smithlabresearch.org/amordad andrewds@usc.edu Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  16. Unsupervised Deep Hashing With Pseudo Labels for Scalable Image Retrieval.

    PubMed

    Zhang, Haofeng; Liu, Li; Long, Yang; Shao, Ling

    2018-04-01

    In order to achieve efficient similarity searching, hash functions are designed to encode images into low-dimensional binary codes with the constraint that similar features will have a short distance in the projected Hamming space. Recently, deep learning-based methods have become more popular, and outperform traditional non-deep methods. However, without label information, most state-of-the-art unsupervised deep hashing (DH) algorithms suffer from severe performance degradation for unsupervised scenarios. One of the main reasons is that the ad-hoc encoding process cannot properly capture the visual feature distribution. In this paper, we propose a novel unsupervised framework that has two main contributions: 1) we convert the unsupervised DH model into supervised by discovering pseudo labels; 2) the framework unifies likelihood maximization, mutual information maximization, and quantization error minimization so that the pseudo labels can maximumly preserve the distribution of visual features. Extensive experiments on three popular data sets demonstrate the advantages of the proposed method, which leads to significant performance improvement over the state-of-the-art unsupervised hashing algorithms.

  17. Feature hashing for fast image retrieval

    NASA Astrophysics Data System (ADS)

    Yan, Lingyu; Fu, Jiarun; Zhang, Hongxin; Yuan, Lu; Xu, Hui

    2018-03-01

    Currently, researches on content based image retrieval mainly focus on robust feature extraction. However, due to the exponential growth of online images, it is necessary to consider searching among large scale images, which is very timeconsuming and unscalable. Hence, we need to pay much attention to the efficiency of image retrieval. In this paper, we propose a feature hashing method for image retrieval which not only generates compact fingerprint for image representation, but also prevents huge semantic loss during the process of hashing. To generate the fingerprint, an objective function of semantic loss is constructed and minimized, which combine the influence of both the neighborhood structure of feature data and mapping error. Since the machine learning based hashing effectively preserves neighborhood structure of data, it yields visual words with strong discriminability. Furthermore, the generated binary codes leads image representation building to be of low-complexity, making it efficient and scalable to large scale databases. Experimental results show good performance of our approach.

  18. FBC: a flat binary code scheme for fast Manhattan hash retrieval

    NASA Astrophysics Data System (ADS)

    Kong, Yan; Wu, Fuzhang; Gao, Lifa; Wu, Yanjun

    2018-04-01

    Hash coding is a widely used technique in approximate nearest neighbor (ANN) search, especially in document search and multimedia (such as image and video) retrieval. Based on the difference of distance measurement, hash methods are generally classified into two categories: Hamming hashing and Manhattan hashing. Benefitting from better neighborhood structure preservation, Manhattan hashing methods outperform earlier methods in search effectiveness. However, due to using decimal arithmetic operations instead of bit operations, Manhattan hashing becomes a more time-consuming process, which significantly decreases the whole search efficiency. To solve this problem, we present an intuitive hash scheme which uses Flat Binary Code (FBC) to encode the data points. As a result, the decimal arithmetic used in previous Manhattan hashing can be replaced by more efficient XOR operator. The final experiments show that with a reasonable memory space growth, our FBC speeds up more than 80% averagely without any search accuracy loss when comparing to the state-of-art Manhattan hashing methods.

  19. Fast perceptual image hash based on cascade algorithm

    NASA Astrophysics Data System (ADS)

    Ruchay, Alexey; Kober, Vitaly; Yavtushenko, Evgeniya

    2017-09-01

    In this paper, we propose a perceptual image hash algorithm based on cascade algorithm, which can be applied in image authentication, retrieval, and indexing. Image perceptual hash uses for image retrieval in sense of human perception against distortions caused by compression, noise, common signal processing and geometrical modifications. The main disadvantage of perceptual hash is high time expenses. In the proposed cascade algorithm of image retrieval initializes with short hashes, and then a full hash is applied to the processed results. Computer simulation results show that the proposed hash algorithm yields a good performance in terms of robustness, discriminability, and time expenses.

  20. The effects of crushing speed on the energy-absorption capability of composite material

    NASA Technical Reports Server (NTRS)

    Farley, Gary L.

    1987-01-01

    The energy-absorption capability as a function of crushing speed was determined for Thornel 300/Fiberite 934 (Gr/E) and Kevlar-49/Fiberite 934 (K/E) composite material. Circular cross section tube specimens were crushed at quasi-static, 6 m/sec, and 12 m/sec speeds. Ply orientations of the tube specimens were (0/+ or - theta) sub 2 and (+ or - theta) sub 3 where theta=15, 45, and 75 degress. Based on the results of these tests the energy-absortion capability of Gr/E and K/E was determined to be a function of crushing speed. The crushing modes based on exterior appearance of the crushed tubes were unchanged for either material. However, the interlaminar crushing behavior changed with crushing speed.

  1. Best-First Heuristic Search for Multicore Machines

    DTIC Science & Technology

    2010-01-01

    Otto, 1998) to implement an asynchronous version of PRA* that they call Hash Distributed A* ( HDA *). HDA * distributes nodes using a hash function in...nodes which are being communicated between peers are in transit. In contact with the authors of HDA *, we have created an implementation of HDA * for...Also, our implementation of HDA * allows us to make a fair comparison between algorithms by sharing common data structures such as priority queues and

  2. G-Hash: Towards Fast Kernel-based Similarity Search in Large Graph Databases.

    PubMed

    Wang, Xiaohong; Smalter, Aaron; Huan, Jun; Lushington, Gerald H

    2009-01-01

    Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and similarity search. With the fast accumulation of graph databases, similarity search in graph databases has emerged as an important research topic. Graph similarity search has applications in a wide range of domains including cheminformatics, bioinformatics, sensor network management, social network management, and XML documents, among others.Most of the current graph indexing methods focus on subgraph query processing, i.e. determining the set of database graphs that contains the query graph and hence do not directly support similarity search. In data mining and machine learning, various graph kernel functions have been designed to capture the intrinsic similarity of graphs. Though successful in constructing accurate predictive and classification models for supervised learning, graph kernel functions have (i) high computational complexity and (ii) non-trivial difficulty to be indexed in a graph database.Our objective is to bridge graph kernel function and similarity search in graph databases by proposing (i) a novel kernel-based similarity measurement and (ii) an efficient indexing structure for graph data management. Our method of similarity measurement builds upon local features extracted from each node and their neighboring nodes in graphs. A hash table is utilized to support efficient storage and fast search of the extracted local features. Using the hash table, a graph kernel function is defined to capture the intrinsic similarity of graphs and for fast similarity query processing. We have implemented our method, which we have named G-hash, and have demonstrated its utility on large chemical graph databases. Our results show that the G-hash method achieves state-of-the-art performance for k-nearest neighbor (k-NN) classification. Most importantly, the new similarity measurement and the index structure is scalable to large database with smaller indexing size, faster indexing construction time, and faster query processing time as compared to state-of-the-art indexing methods such as C-tree, gIndex, and GraphGrep.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    AISL-CRYPTO is a library of cryptography functions supporting other AISL software. It provides various crypto functions for Common Lisp, including Digital Signature Algorithm, Data Encryption Standard, Secure Hash Algorithm, and public-key cryptography.

  4. Image Hashes as Templates for Verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Janik, Tadeusz; Jarman, Kenneth D.; Robinson, Sean M.

    2012-07-17

    Imaging systems can provide measurements that confidently assess characteristics of nuclear weapons and dismantled weapon components, and such assessment will be needed in future verification for arms control. Yet imaging is often viewed as too intrusive, raising concern about the ability to protect sensitive information. In particular, the prospect of using image-based templates for verifying the presence or absence of a warhead, or of the declared configuration of fissile material in storage, may be rejected out-of-hand as being too vulnerable to violation of information barrier (IB) principles. Development of a rigorous approach for generating and comparing reduced-information templates from images,more » and assessing the security, sensitivity, and robustness of verification using such templates, are needed to address these concerns. We discuss our efforts to develop such a rigorous approach based on a combination of image-feature extraction and encryption-utilizing hash functions to confirm proffered declarations, providing strong classified data security while maintaining high confidence for verification. The proposed work is focused on developing secure, robust, tamper-sensitive and automatic techniques that may enable the comparison of non-sensitive hashed image data outside an IB. It is rooted in research on so-called perceptual hash functions for image comparison, at the interface of signal/image processing, pattern recognition, cryptography, and information theory. Such perceptual or robust image hashing—which, strictly speaking, is not truly cryptographic hashing—has extensive application in content authentication and information retrieval, database search, and security assurance. Applying and extending the principles of perceptual hashing to imaging for arms control, we propose techniques that are sensitive to altering, forging and tampering of the imaged object yet robust and tolerant to content-preserving image distortions and noise. Ensuring that the information contained in the hashed image data (available out-of-IB) cannot be used to extract sensitive information about the imaged object is of primary concern. Thus the techniques are characterized by high unpredictability to guarantee security. We will present an assessment of the performance of our techniques with respect to security, sensitivity and robustness on the basis of a methodical and mathematically precise framework.« less

  5. A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map

    NASA Astrophysics Data System (ADS)

    Lin, Zhuosheng; Yu, Simin; Lü, Jinhu

    2017-06-01

    In this paper, a novel approach for constructing one-way hash function based on 8D hyperchaotic map is presented. First, two nominal matrices both with constant and variable parameters are adopted for designing 8D discrete-time hyperchaotic systems, respectively. Then each input plaintext message block is transformed into 8 × 8 matrix following the order of left to right and top to bottom, which is used as a control matrix for the switch of the nominal matrix elements both with the constant parameters and with the variable parameters. Through this switching control, a new nominal matrix mixed with the constant and variable parameters is obtained for the 8D hyperchaotic map. Finally, the hash function is constructed with the multiple low 8-bit hyperchaotic system iterative outputs after being rounded down, and its secure analysis results are also given, validating the feasibility and reliability of the proposed approach. Compared with the existing schemes, the main feature of the proposed method is that it has a large number of key parameters with avalanche effect, resulting in the difficulty for estimating or predicting key parameters via various attacks.

  6. FSH: fast spaced seed hashing exploiting adjacent hashes.

    PubMed

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  7. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  8. Model-based vision using geometric hashing

    NASA Astrophysics Data System (ADS)

    Akerman, Alexander, III; Patton, Ronald

    1991-04-01

    The Geometric Hashing technique developed by the NYU Courant Institute has been applied to various automatic target recognition applications. In particular, I-MATH has extended the hashing algorithm to perform automatic target recognition ofsynthetic aperture radar (SAR) imagery. For this application, the hashing is performed upon the geometric locations of dominant scatterers. In addition to being a robust model-based matching algorithm -- invariant under translation, scale, and 3D rotations of the target -- hashing is of particular utility because it can still perform effective matching when the target is partially obscured. Moreover, hashing is very amenable to a SIMD parallel processing architecture, and thus potentially realtime implementable.

  9. Digital camera with apparatus for authentication of images produced from an image file

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1993-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.

  10. Hash Bit Selection for Nearest Neighbor Search.

    PubMed

    Xianglong Liu; Junfeng He; Shih-Fu Chang

    2017-11-01

    To overcome the barrier of storage and computation when dealing with gigantic-scale data sets, compact hashing has been studied extensively to approximate the nearest neighbor search. Despite the recent advances, critical design issues remain open in how to select the right features, hashing algorithms, and/or parameter settings. In this paper, we address these by posing an optimal hash bit selection problem, in which an optimal subset of hash bits are selected from a pool of candidate bits generated by different features, algorithms, or parameters. Inspired by the optimization criteria used in existing hashing algorithms, we adopt the bit reliability and their complementarity as the selection criteria that can be carefully tailored for hashing performance in different tasks. Then, the bit selection solution is discovered by finding the best tradeoff between search accuracy and time using a modified dynamic programming method. To further reduce the computational complexity, we employ the pairwise relationship among hash bits to approximate the high-order independence property, and formulate it as an efficient quadratic programming method that is theoretically equivalent to the normalized dominant set problem in a vertex- and edge-weighted graph. Extensive large-scale experiments have been conducted under several important application scenarios of hash techniques, where our bit selection framework can achieve superior performance over both the naive selection methods and the state-of-the-art hashing algorithms, with significant accuracy gains ranging from 10% to 50%, relatively.

  11. Deep Constrained Siamese Hash Coding Network and Load-Balanced Locality-Sensitive Hashing for Near Duplicate Image Detection.

    PubMed

    Hu, Weiming; Fan, Yabo; Xing, Junliang; Sun, Liang; Cai, Zhaoquan; Maybank, Stephen

    2018-09-01

    We construct a new efficient near duplicate image detection method using a hierarchical hash code learning neural network and load-balanced locality-sensitive hashing (LSH) indexing. We propose a deep constrained siamese hash coding neural network combined with deep feature learning. Our neural network is able to extract effective features for near duplicate image detection. The extracted features are used to construct a LSH-based index. We propose a load-balanced LSH method to produce load-balanced buckets in the hashing process. The load-balanced LSH significantly reduces the query time. Based on the proposed load-balanced LSH, we design an effective and feasible algorithm for near duplicate image detection. Extensive experiments on three benchmark data sets demonstrate the effectiveness of our deep siamese hash encoding network and load-balanced LSH.

  12. Novel Duplicate Address Detection with Hash Function

    PubMed Central

    Song, GuangJia; Ji, ZhenZhou

    2016-01-01

    Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the “Hash_64” field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901

  13. Binary Multidimensional Scaling for Hashing.

    PubMed

    Huang, Yameng; Lin, Zhouchen

    2017-10-04

    Hashing is a useful technique for fast nearest neighbor search due to its low storage cost and fast query speed. Unsupervised hashing aims at learning binary hash codes for the original features so that the pairwise distances can be best preserved. While several works have targeted on this task, the results are not satisfactory mainly due to the oversimplified model. In this paper, we propose a unified and concise unsupervised hashing framework, called Binary Multidimensional Scaling (BMDS), which is able to learn the hash code for distance preservation in both batch and online mode. In the batch mode, unlike most existing hashing methods, we do not need to simplify the model by predefining the form of hash map. Instead, we learn the binary codes directly based on the pairwise distances among the normalized original features by Alternating Minimization. This enables a stronger expressive power of the hash map. In the online mode, we consider the holistic distance relationship between current query example and those we have already learned, rather than only focusing on current data chunk. It is useful when the data come in a streaming fashion. Empirical results show that while being efficient for training, our algorithm outperforms state-of-the-art methods by a large margin in terms of distance preservation, which is practical for real-world applications.

  14. Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function

    NASA Astrophysics Data System (ADS)

    Moon, Dukjae; Hong, Deukjo; Kwon, Daesung; Hong, Seokhie

    We assume that the domain extender is the Merkle-Damgård (MD) scheme and he message is padded by a ‘1’, and minimum number of ‘0’s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-the-Middle (MitM) preimage attack techniques, and develop several useful initial structures.

  15. Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools

    DTIC Science & Technology

    2008-08-19

    1 hash of the page page%d sha256 The segment for the SHA256 hash of the page Bad Sector Management: badsectors The number of sectors in the image...written, AFFLIB can automatically compute the page’s MD5, SHA-1, and/or SHA256 hash and write an associated segment containing the hash value. The...are written into segments themselves, with the segment name being name/ sha256 where name is the original segment name sha256 is the hash algorithm used

  16. Double hashing technique in closed hashing search process

    NASA Astrophysics Data System (ADS)

    Rahim, Robbi; Zulkarnain, Iskandar; Jaya, Hendra

    2017-09-01

    The search process is used in various activities performed both online and offline, many algorithms that can be used to perform the search process one of which is a hash search algorithm, search process with hash search algorithm used in this study using double hashing technique where the data will be formed into the table with same length and then search, the results of this study indicate that the search process with double hashing technique allows faster searching than the usual search techniques, this research allows to search the solution by dividing the value into the main table and overflow table so that the search process is expected faster than the data stacked in the form of one table and collision data could avoided.

  17. Robust hashing for 3D models

    NASA Astrophysics Data System (ADS)

    Berchtold, Waldemar; Schäfer, Marcel; Rettig, Michael; Steinebach, Martin

    2014-02-01

    3D models and applications are of utmost interest in both science and industry. With the increment of their usage, their number and thereby the challenge to correctly identify them increases. Content identification is commonly done by cryptographic hashes. However, they fail as a solution in application scenarios such as computer aided design (CAD), scientific visualization or video games, because even the smallest alteration of the 3D model, e.g. conversion or compression operations, massively changes the cryptographic hash as well. Therefore, this work presents a robust hashing algorithm for 3D mesh data. The algorithm applies several different bit extraction methods. They are built to resist desired alterations of the model as well as malicious attacks intending to prevent correct allocation. The different bit extraction methods are tested against each other and, as far as possible, the hashing algorithm is compared to the state of the art. The parameters tested are robustness, security and runtime performance as well as False Acceptance Rate (FAR) and False Rejection Rate (FRR), also the probability calculation of hash collision is included. The introduced hashing algorithm is kept adaptive e.g. in hash length, to serve as a proper tool for all applications in practice.

  18. Deep classification hashing for person re-identification

    NASA Astrophysics Data System (ADS)

    Wang, Jiabao; Li, Yang; Zhang, Xiancai; Miao, Zhuang; Tao, Gang

    2018-04-01

    As the development of surveillance in public, person re-identification becomes more and more important. The largescale databases call for efficient computation and storage, hashing technique is one of the most important methods. In this paper, we proposed a new deep classification hashing network by introducing a new binary appropriation layer in the traditional ImageNet pre-trained CNN models. It outputs binary appropriate features, which can be easily quantized into binary hash-codes for hamming similarity comparison. Experiments show that our deep hashing method can outperform the state-of-the-art methods on the public CUHK03 and Market1501 datasets.

  19. Learning Short Binary Codes for Large-scale Image Retrieval.

    PubMed

    Liu, Li; Yu, Mengyang; Shao, Ling

    2017-03-01

    Large-scale visual information retrieval has become an active research area in this big data era. Recently, hashing/binary coding algorithms prove to be effective for scalable retrieval applications. Most existing hashing methods require relatively long binary codes (i.e., over hundreds of bits, sometimes even thousands of bits) to achieve reasonable retrieval accuracies. However, for some realistic and unique applications, such as on wearable or mobile devices, only short binary codes can be used for efficient image retrieval due to the limitation of computational resources or bandwidth on these devices. In this paper, we propose a novel unsupervised hashing approach called min-cost ranking (MCR) specifically for learning powerful short binary codes (i.e., usually the code length shorter than 100 b) for scalable image retrieval tasks. By exploring the discriminative ability of each dimension of data, MCR can generate one bit binary code for each dimension and simultaneously rank the discriminative separability of each bit according to the proposed cost function. Only top-ranked bits with minimum cost-values are then selected and grouped together to compose the final salient binary codes. Extensive experimental results on large-scale retrieval demonstrate that MCR can achieve comparative performance as the state-of-the-art hashing algorithms but with significantly shorter codes, leading to much faster large-scale retrieval.

  20. Speaker Linking and Applications using Non-Parametric Hashing Methods

    DTIC Science & Technology

    2016-09-08

    clustering method based on hashing—canopy- clustering . We apply this method to a large corpus of speaker recordings, demonstrate performance tradeoffs...and compare to other hash- ing methods. Index Terms: speaker recognition, clustering , hashing, locality sensitive hashing. 1. Introduction We assume...speaker in our corpus. Second, given a QBE method, how can we perform speaker clustering —each clustering should be a single speaker, and a cluster should

  1. Thermographic evaluation of hind paw skin temperature and functional recovery of locomotion after sciatic nerve crush in rats

    PubMed Central

    Z. Sacharuk, Viviane; A. Lovatel, Gisele; Ilha, Jocemar; Marcuzzo, Simone; Severo do Pinho, Alexandre; L. Xavier, Léder; A. Zaro, Milton; Achaval, Matilde

    2011-01-01

    INTRODUCTION: Peripheral nerves are often damaged by direct mechanical injury, diseases, and tumors. The peripheral nerve injuries that result from these conditions can lead to a partial or complete loss of motor, sensory, and autonomic functions, which in turn are related to changes in skin temperature, in the involved segments of the body. The aim of this study was to evaluate the changes in hind paw skin temperature after sciatic nerve crush in rats in an attempt to determine whether changes in skin temperature correlate with the functional recovery of locomotion. METHODS: Wistar rats were divided into three groups: control (n = 7), sham (n = 25), and crush (n = 25). All groups were subjected to thermographic, functional, and histological assessments. RESULTS: ΔT in the crush group was different from the control and sham groups at the 1st, 3rd and 7rd postoperative days (p<0.05). The functional recovery from the crush group returned to normal values between the 3rd and 4th week post-injury, and morphological analysis of the nerve revealed incomplete regeneration at the 4th week after injury. DISCUSSION: This study is the first demonstration that sciatic nerve crush in rats induces an increase in hind paw skin temperature and that skin temperature changes do not correlate closely with functional recovery PMID:21876984

  2. Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic

    NASA Astrophysics Data System (ADS)

    Matsumoto, Yoshihide; Hazeyama, Hiroaki; Kadobayashi, Youki

    The Bloom Filter (BF), a space-and-time-efficient hashcoding method, is used as one of the fundamental modules in several network processing algorithms and applications such as route lookups, cache hits, packet classification, per-flow state management or network monitoring. BF is a simple space-efficient randomized data structure used to represent a data set in order to support membership queries. However, BF generates false positives, and cannot count the number of distinct elements. A counting Bloom Filter (CBF) can count the number of distinct elements, but CBF needs more space than BF. We propose an alternative data structure of CBF, and we called this structure an Adaptive Bloom Filter (ABF). Although ABF uses the same-sized bit-vector used in BF, the number of hash functions employed by ABF is dynamically changed to record the number of appearances of a each key element. Considering the hash collisions, the multiplicity of a each key element on ABF can be estimated from the number of hash functions used to decode the membership of the each key element. Although ABF can realize the same functionality as CBF, ABF requires the same memory size as BF. We describe the construction of ABF and IABF (Improved ABF), and provide a mathematical analysis and simulation using Zipf's distribution. Finally, we show that ABF can be used for an unpredictable data set such as real network traffic.

  3. Semi-Supervised Geographical Feature Detection

    NASA Astrophysics Data System (ADS)

    Yu, H.; Yu, L.; Kuo, K. S.

    2016-12-01

    Extraction and tracking geographical features is a fundamental requirement in many geoscience fields. However, this operation has become an increasingly challenging task for domain scientists when tackling a large amount of geoscience data. Although domain scientists may have a relatively clear definition of features, it is difficult to capture the presence of features in an accurate and efficient fashion. We propose a semi-supervised approach to address large geographical feature detection. Our approach has two main components. First, we represent a heterogeneous geoscience data in a unified high-dimensional space, which can facilitate us to evaluate the similarity of data points with respect to geolocation, time, and variable values. We characterize the data from these measures, and use a set of hash functions to parameterize the initial knowledge of the data. Second, for any user query, our approach can automatically extract the initial results based on the hash functions. To improve the accuracy of querying, our approach provides a visualization interface to display the querying results and allow users to interactively explore and refine them. The user feedback will be used to enhance our knowledge base in an iterative manner. In our implementation, we use high-performance computing techniques to accelerate the construction of hash functions. Our design facilitates a parallelization scheme for feature detection and extraction, which is a traditionally challenging problem for large-scale data. We evaluate our approach and demonstrate the effectiveness using both synthetic and real world datasets.

  4. Algorithm That Synthesizes Other Algorithms for Hashing

    NASA Technical Reports Server (NTRS)

    James, Mark

    2010-01-01

    An algorithm that includes a collection of several subalgorithms has been devised as a means of synthesizing still other algorithms (which could include computer code) that utilize hashing to determine whether an element (typically, a number or other datum) is a member of a set (typically, a list of numbers). Each subalgorithm synthesizes an algorithm (e.g., a block of code) that maps a static set of key hashes to a somewhat linear monotonically increasing sequence of integers. The goal in formulating this mapping is to cause the length of the sequence thus generated to be as close as practicable to the original length of the set and thus to minimize gaps between the elements. The advantage of the approach embodied in this algorithm is that it completely avoids the traditional approach of hash-key look-ups that involve either secondary hash generation and look-up or further searching of a hash table for a desired key in the event of collisions. This algorithm guarantees that it will never be necessary to perform a search or to generate a secondary key in order to determine whether an element is a member of a set. This algorithm further guarantees that any algorithm that it synthesizes can be executed in constant time. To enforce these guarantees, the subalgorithms are formulated to employ a set of techniques, each of which works very effectively covering a certain class of hash-key values. These subalgorithms are of two types, summarized as follows: Given a list of numbers, try to find one or more solutions in which, if each number is shifted to the right by a constant number of bits and then masked with a rotating mask that isolates a set of bits, a unique number is thereby generated. In a variant of the foregoing procedure, omit the masking. Try various combinations of shifting, masking, and/or offsets until the solutions are found. From the set of solutions, select the one that provides the greatest compression for the representation and is executable in the minimum amount of time. Given a list of numbers, try to find one or more solutions in which, if each number is compressed by use of the modulo function by some value, then a unique value is generated.

  5. A novel class sensitive hashing technique for large-scale content-based remote sensing image retrieval

    NASA Astrophysics Data System (ADS)

    Reato, Thomas; Demir, Begüm; Bruzzone, Lorenzo

    2017-10-01

    This paper presents a novel class sensitive hashing technique in the framework of large-scale content-based remote sensing (RS) image retrieval. The proposed technique aims at representing each image with multi-hash codes, each of which corresponds to a primitive (i.e., land cover class) present in the image. To this end, the proposed method consists of a three-steps algorithm. The first step is devoted to characterize each image by primitive class descriptors. These descriptors are obtained through a supervised approach, which initially extracts the image regions and their descriptors that are then associated with primitives present in the images. This step requires a set of annotated training regions to define primitive classes. A correspondence between the regions of an image and the primitive classes is built based on the probability of each primitive class to be present at each region. All the regions belonging to the specific primitive class with a probability higher than a given threshold are highly representative of that class. Thus, the average value of the descriptors of these regions is used to characterize that primitive. In the second step, the descriptors of primitive classes are transformed into multi-hash codes to represent each image. This is achieved by adapting the kernel-based supervised locality sensitive hashing method to multi-code hashing problems. The first two steps of the proposed technique, unlike the standard hashing methods, allow one to represent each image by a set of primitive class sensitive descriptors and their hash codes. Then, in the last step, the images in the archive that are very similar to a query image are retrieved based on a multi-hash-code-matching scheme. Experimental results obtained on an archive of aerial images confirm the effectiveness of the proposed technique in terms of retrieval accuracy when compared to the standard hashing methods.

  6. Object-Location-Aware Hashing for Multi-Label Image Retrieval via Automatic Mask Learning.

    PubMed

    Huang, Chang-Qin; Yang, Shang-Ming; Pan, Yan; Lai, Han-Jiang

    2018-09-01

    Learning-based hashing is a leading approach of approximate nearest neighbor search for large-scale image retrieval. In this paper, we develop a deep supervised hashing method for multi-label image retrieval, in which we propose to learn a binary "mask" map that can identify the approximate locations of objects in an image, so that we use this binary "mask" map to obtain length-limited hash codes which mainly focus on an image's objects but ignore the background. The proposed deep architecture consists of four parts: 1) a convolutional sub-network to generate effective image features; 2) a binary "mask" sub-network to identify image objects' approximate locations; 3) a weighted average pooling operation based on the binary "mask" to obtain feature representations and hash codes that pay most attention to foreground objects but ignore the background; and 4) the combination of a triplet ranking loss designed to preserve relative similarities among images and a cross entropy loss defined on image labels. We conduct comprehensive evaluations on four multi-label image data sets. The results indicate that the proposed hashing method achieves superior performance gains over the state-of-the-art supervised or unsupervised hashing baselines.

  7. Bin-Hash Indexing: A Parallel Method for Fast Query Processing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bethel, Edward W; Gosink, Luke J.; Wu, Kesheng

    2008-06-27

    This paper presents a new parallel indexing data structure for answering queries. The index, called Bin-Hash, offers extremely high levels of concurrency, and is therefore well-suited for the emerging commodity of parallel processors, such as multi-cores, cell processors, and general purpose graphics processing units (GPU). The Bin-Hash approach first bins the base data, and then partitions and separately stores the values in each bin as a perfect spatial hash table. To answer a query, we first determine whether or not a record satisfies the query conditions based on the bin boundaries. For the bins with records that can not bemore » resolved, we examine the spatial hash tables. The procedures for examining the bin numbers and the spatial hash tables offer the maximum possible level of concurrency; all records are able to be evaluated by our procedure independently in parallel. Additionally, our Bin-Hash procedures access much smaller amounts of data than similar parallel methods, such as the projection index. This smaller data footprint is critical for certain parallel processors, like GPUs, where memory resources are limited. To demonstrate the effectiveness of Bin-Hash, we implement it on a GPU using the data-parallel programming language CUDA. The concurrency offered by the Bin-Hash index allows us to fully utilize the GPU's massive parallelism in our work; over 12,000 records can be simultaneously evaluated at any one time. We show that our new query processing method is an order of magnitude faster than current state-of-the-art CPU-based indexing technologies. Additionally, we compare our performance to existing GPU-based projection index strategies.« less

  8. Preparation-induced errors in EPR dosimetry of enamel: pre- and post-crushing sensitivity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haskell, E.H.; Hayes, R.B.; Kenner, G.H.

    1996-01-01

    Errors in dose estimation as a function of grain size for tooth enamel has been previously shown for beta irradiation after crushing. We tested the effect of gamma radiation applied to specimens before and after crushing. We extend the previous work in that we found that post-crushing irradiation altered the slope of the dose-response curve of the hydroxyapatite signal and produced a grain-size dependent offset. No changes in the slope of the dose-response curve were seen in enamel caps irradiated before crushing.

  9. Digital data storage systems, computers, and data verification methods

    DOEpatents

    Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A.

    2005-12-27

    Digital data storage systems, computers, and data verification methods are provided. According to a first aspect of the invention, a computer includes an interface adapted to couple with a dynamic database; and processing circuitry configured to provide a first hash from digital data stored within a portion of the dynamic database at an initial moment in time, to provide a second hash from digital data stored within the portion of the dynamic database at a subsequent moment in time, and to compare the first hash and the second hash.

  10. Improving the efficiency of quantum hash function by dense coding of coin operators in discrete-time quantum walk

    NASA Astrophysics Data System (ADS)

    Yang, YuGuang; Zhang, YuChen; Xu, Gang; Chen, XiuBo; Zhou, Yi-Hua; Shi, WeiMin

    2018-03-01

    Li et al. first proposed a quantum hash function (QHF) in a quantum-walk architecture. In their scheme, two two-particle interactions, i.e., I interaction and π-phase interaction are introduced and the choice of I or π-phase interactions at each iteration depends on a message bit. In this paper, we propose an efficient QHF by dense coding of coin operators in discrete-time quantum walk. Compared with existing QHFs, our protocol has the following advantages: the efficiency of the QHF can be doubled and even more; only one particle is enough and two-particle interactions are unnecessary so that quantum resources are saved. It is a clue to apply the dense coding technique to quantum cryptographic protocols, especially to the applications with restricted quantum resources.

  11. Perl Modules for Constructing Iterators

    NASA Technical Reports Server (NTRS)

    Tilmes, Curt

    2009-01-01

    The Iterator Perl Module provides a general-purpose framework for constructing iterator objects within Perl, and a standard API for interacting with those objects. Iterators are an object-oriented design pattern where a description of a series of values is used in a constructor. Subsequent queries can request values in that series. These Perl modules build on the standard Iterator framework and provide iterators for some other types of values. Iterator::DateTime constructs iterators from DateTime objects or Date::Parse descriptions and ICal/RFC 2445 style re-currence descriptions. It supports a variety of input parameters, including a start to the sequence, an end to the sequence, an Ical/RFC 2445 recurrence describing the frequency of the values in the series, and a format description that can refine the presentation manner of the DateTime. Iterator::String constructs iterators from string representations. This module is useful in contexts where the API consists of supplying a string and getting back an iterator where the specific iteration desired is opaque to the caller. It is of particular value to the Iterator::Hash module which provides nested iterations. Iterator::Hash constructs iterators from Perl hashes that can include multiple iterators. The constructed iterators will return all the permutations of the iterations of the hash by nested iteration of embedded iterators. A hash simply includes a set of keys mapped to values. It is a very common data structure used throughout Perl programming. The Iterator:: Hash module allows a hash to include strings defining iterators (parsed and dispatched with Iterator::String) that are used to construct an overall series of hash values.

  12. System using data compression and hashing adapted for use for multimedia encryption

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coffland, Douglas R

    2011-07-12

    A system and method is disclosed for multimedia encryption. Within the system of the present invention, a data compression module receives and compresses a media signal into a compressed data stream. A data acquisition module receives and selects a set of data from the compressed data stream. And, a hashing module receives and hashes the set of data into a keyword. The method of the present invention includes the steps of compressing a media signal into a compressed data stream; selecting a set of data from the compressed data stream; and hashing the set of data into a keyword.

  13. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  14. Digital Camera with Apparatus for Authentication of Images Produced from an Image File

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1996-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.

  15. Clamp-crushing vs. radiofrequency-assisted liver resection:changes in liver function tests.

    PubMed

    Palibrk, Ivan; Milicic, Biljana; Stojiljkovic, Ljuba; Manojlovic, Nebojsa; Dugalic, Vladimir; Bumbasirevic, Vesna; Kalezic, Nevena; Zuvela, Marinko; Milicevic, Miroslav

    2012-05-01

    Liver resection is the gold standard in managing patients with metastatic or primary liver cancer. The aim of our study was to compare the traditional clamp-crushing technique to the radiofrequency- assisted liver resection technique in terms of postoperative liver function. Liver function was evaluated preoperatively and on postoperative days 3 and 7. Liver synthetic function parameters (serum albumin level, prothrombin time and international normalized ratio), markers of hepatic injury and necrosis (serum alanine aminotransferase, aspartate aminotransferase and total bilirubin level) and microsomal activity (quantitative lidocaine test) were compared. Forty three patients completed the study (14 had clamp-crushing and 29 had radiofrequency assisted liver resection). The groups did not differ in demographic characteristics, pre-operative liver function, operative time and perioperative transfusion rate. In postoperative period, there were similar changes in monitored parameters in both groups except albumin levels, that were higher in radiofrequency-assisted liver resection group (p=0.047). Both, traditional clamp-crushing technique and radiofrequency assisted liver resection technique, result in similar postoperative changes of most monitored liver function parameters.

  16. 9 CFR 319.303 - Corned beef hash.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 2 2013-01-01 2013-01-01 false Corned beef hash. 319.303 Section 319.303 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY... Products § 319.303 Corned beef hash. (a) “Corned Beef Hash” is the semi-solid food product in the form of a...

  17. 9 CFR 319.303 - Corned beef hash.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 9 Animals and Animal Products 2 2014-01-01 2014-01-01 false Corned beef hash. 319.303 Section 319.303 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY... Products § 319.303 Corned beef hash. (a) “Corned Beef Hash” is the semi-solid food product in the form of a...

  18. 9 CFR 319.303 - Corned beef hash.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 2 2012-01-01 2012-01-01 false Corned beef hash. 319.303 Section 319.303 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY... Products § 319.303 Corned beef hash. (a) “Corned Beef Hash” is the semi-solid food product in the form of a...

  19. 9 CFR 319.303 - Corned beef hash.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Corned beef hash. 319.303 Section 319.303 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY... Products § 319.303 Corned beef hash. (a) “Corned Beef Hash” is the semi-solid food product in the form of a...

  20. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    PubMed

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  1. An image retrieval framework for real-time endoscopic image retargeting.

    PubMed

    Ye, Menglong; Johns, Edward; Walter, Benjamin; Meining, Alexander; Yang, Guang-Zhong

    2017-08-01

    Serial endoscopic examinations of a patient are important for early diagnosis of malignancies in the gastrointestinal tract. However, retargeting for optical biopsy is challenging due to extensive tissue variations between examinations, requiring the method to be tolerant to these changes whilst enabling real-time retargeting. This work presents an image retrieval framework for inter-examination retargeting. We propose both a novel image descriptor tolerant of long-term tissue changes and a novel descriptor matching method in real time. The descriptor is based on histograms generated from regional intensity comparisons over multiple scales, offering stability over long-term appearance changes at the higher levels, whilst remaining discriminative at the lower levels. The matching method then learns a hashing function using random forests, to compress the string and allow for fast image comparison by a simple Hamming distance metric. A dataset that contains 13 in vivo gastrointestinal videos was collected from six patients, representing serial examinations of each patient, which includes videos captured with significant time intervals. Precision-recall for retargeting shows that our new descriptor outperforms a number of alternative descriptors, whilst our hashing method outperforms a number of alternative hashing approaches. We have proposed a novel framework for optical biopsy in serial endoscopic examinations. A new descriptor, combined with a novel hashing method, achieves state-of-the-art retargeting, with validation on in vivo videos from six patients. Real-time performance also allows for practical integration without disturbing the existing clinical workflow.

  2. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  3. Rotation invariant deep binary hashing for fast image retrieval

    NASA Astrophysics Data System (ADS)

    Dai, Lai; Liu, Jianming; Jiang, Aiwen

    2017-07-01

    In this paper, we study how to compactly represent image's characteristics for fast image retrieval. We propose supervised rotation invariant compact discriminative binary descriptors through combining convolutional neural network with hashing. In the proposed network, binary codes are learned by employing a hidden layer for representing latent concepts that dominate on class labels. A loss function is proposed to minimize the difference between binary descriptors that describe reference image and the rotated one. Compared with some other supervised methods, the proposed network doesn't have to require pair-wised inputs for binary code learning. Experimental results show that our method is effective and achieves state-of-the-art results on the CIFAR-10 and MNIST datasets.

  4. Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs.

    PubMed

    Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L

    2006-12-01

    Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.

  5. Compact binary hashing for music retrieval

    NASA Astrophysics Data System (ADS)

    Seo, Jin S.

    2014-03-01

    With the huge volume of music clips available for protection, browsing, and indexing, there is an increased attention to retrieve the information contents of the music archives. Music-similarity computation is an essential building block for browsing, retrieval, and indexing of digital music archives. In practice, as the number of songs available for searching and indexing is increased, so the storage cost in retrieval systems is becoming a serious problem. This paper deals with the storage problem by extending the supervector concept with the binary hashing. We utilize the similarity-preserving binary embedding in generating a hash code from the supervector of each music clip. Especially we compare the performance of the various binary hashing methods for music retrieval tasks on the widely-used genre dataset and the in-house singer dataset. Through the evaluation, we find an effective way of generating hash codes for music similarity estimation which improves the retrieval performance.

  6. Performance of hashed cache data migration schemes on multicomputers

    NASA Technical Reports Server (NTRS)

    Hiranandani, Seema; Saltz, Joel; Mehrotra, Piyush; Berryman, Harry

    1991-01-01

    After conducting an examination of several data-migration mechanisms which permit an explicit and controlled mapping of data to memory, a set of schemes for storage and retrieval of off-processor array elements is experimentally evaluated and modeled. All schemes considered have their basis in the use of hash tables for efficient access of nonlocal data. The techniques in question are those of hashed cache, partial enumeration, and full enumeration; in these, nonlocal data are stored in hash tables, so that the operative difference lies in the amount of memory used by each scheme and in the retrieval mechanism used for nonlocal data.

  7. Single-pixel non-imaging object recognition by means of Fourier spectrum acquisition

    NASA Astrophysics Data System (ADS)

    Chen, Huichao; Shi, Jianhong; Liu, Xialin; Niu, Zhouzhou; Zeng, Guihua

    2018-04-01

    Single-pixel imaging has emerged over recent years as a novel imaging technique, which has significant application prospects. In this paper, we propose and experimentally demonstrate a scheme that can achieve single-pixel non-imaging object recognition by acquiring the Fourier spectrum. In an experiment, a four-step phase-shifting sinusoid illumination light is used to irradiate the object image, the value of the light intensity is measured with a single-pixel detection unit, and the Fourier coefficients of the object image are obtained by a differential measurement. The Fourier coefficients are first cast into binary numbers to obtain the hash value. We propose a new method of perceptual hashing algorithm, which is combined with a discrete Fourier transform to calculate the hash value. The hash distance is obtained by calculating the difference of the hash value between the object image and the contrast images. By setting an appropriate threshold, the object image can be quickly and accurately recognized. The proposed scheme realizes single-pixel non-imaging perceptual hashing object recognition by using fewer measurements. Our result might open a new path for realizing object recognition with non-imaging.

  8. Effects Of Rapid Crushing On Composites

    NASA Technical Reports Server (NTRS)

    Farley, Gary L.

    1990-01-01

    Experimental study described in NASA technical memorandum performed to determine whether crash energy-absorption capabilities of graphite/epoxy and Kevlar/epoxy composite materials are functions of speed of crushing. Additional objective to develop understanding of mechanisms of crushing. Technology applied to enhancement of safety and crashworthiness of automobiles, design of energy-absorbing devices in machinery, and problems involving explosions and impacts.

  9. A dynamic re-partitioning strategy based on the distribution of key in Spark

    NASA Astrophysics Data System (ADS)

    Zhang, Tianyu; Lian, Xin

    2018-05-01

    Spark is a memory-based distributed data processing framework, has the ability of processing massive data and becomes a focus in Big Data. But the performance of Spark Shuffle depends on the distribution of data. The naive Hash partition function of Spark can not guarantee load balancing when data is skewed. The time of job is affected by the node which has more data to process. In order to handle this problem, dynamic sampling is used. In the process of task execution, histogram is used to count the key frequency distribution of each node, and then generate the global key frequency distribution. After analyzing the distribution of key, load balance of data partition is achieved. Results show that the Dynamic Re-Partitioning function is better than the default Hash partition, Fine Partition and the Balanced-Schedule strategy, it can reduce the execution time of the task and improve the efficiency of the whole cluster.

  10. Limitations and requirements of content-based multimedia authentication systems

    NASA Astrophysics Data System (ADS)

    Wu, Chai W.

    2001-08-01

    Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applications including the authentication of images on CD-ROM and handwritten documents will be discussed.

  11. Microbiological quality of five potato products obtained at retail markets.

    PubMed Central

    Duran, A P; Swartzentruber, A; Lanier, J M; Wentz, B A; Schwab, A H; Barnard, R J; Read, R B

    1982-01-01

    The microbiological quality of frozen hash brown potatoes, dried hash brown potatoes with onions, frozen french fried potatoes, dried instant mashed potatoes, and potato salad was determined by a national sampling at the retail level. A wide range of results was obtained, with most sampling units of each products having excellent microbiological quality. Geometric mean aerobic plate counts were as follows: dried hash brown potatoes, 270/g; frozen hash brown potatoes with onions, 580/g; frozen french fried potatoes 78/g; dried instant mashed potatoes, 1.1 x 10(3)/g; and potato salad, 3.6 x 10(3)/g. Mean values of coliforms, Escherichia coli, and Staphylococcus aureus were less than 10/g. PMID:6758695

  12. Forensic hash for multimedia information

    NASA Astrophysics Data System (ADS)

    Lu, Wenjun; Varna, Avinash L.; Wu, Min

    2010-01-01

    Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose novel approaches to perform multimedia forensics using compact side information to reconstruct the processing history of a document. We refer to this as FASHION, standing for Forensic hASH for informatION assurance. Based on the Radon transform and scale space theory, the proposed forensic hash is compact and can effectively estimate the parameters of geometric transforms and detect local tampering that an image may have undergone. Forensic hash is designed to answer a broader range of questions regarding the processing history of multimedia data than the simple binary decision from traditional robust image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic techniques that do not use any side information.

  13. A Complete and Accurate Ab Initio Repeat Finding Algorithm.

    PubMed

    Lian, Shuaibin; Chen, Xinwu; Wang, Peng; Zhang, Xiaoli; Dai, Xianhua

    2016-03-01

    It has become clear that repetitive sequences have played multiple roles in eukaryotic genome evolution including increasing genetic diversity through mutation, changes in gene expression and facilitating generation of novel genes. However, identification of repetitive elements can be difficult in the ab initio manner. Currently, some classical ab initio tools of finding repeats have already presented and compared. The completeness and accuracy of detecting repeats of them are little pool. To this end, we proposed a new ab initio repeat finding tool, named HashRepeatFinder, which is based on hash index and word counting. Furthermore, we assessed the performances of HashRepeatFinder with other two famous tools, such as RepeatScout and Repeatfinder, in human genome data hg19. The results indicated the following three conclusions: (1) The completeness of HashRepeatFinder is the best one among these three compared tools in almost all chromosomes, especially in chr9 (8 times of RepeatScout, 10 times of Repeatfinder); (2) in terms of detecting large repeats, HashRepeatFinder also performed best in all chromosomes, especially in chr3 (24 times of RepeatScout and 250 times of Repeatfinder) and chr19 (12 times of RepeatScout and 60 times of Repeatfinder); (3) in terms of accuracy, HashRepeatFinder can merge the abundant repeats with high accuracy.

  14. Recovery of function, peripheral sensitization and sensory neurone activation by novel pathways following axonal injury in Aplysia californica.

    PubMed

    Dulin, M F; Steffensen, I; Morris, C E; Walters, E T

    1995-10-01

    Recovery of behavioural and sensory function was examined following unilateral pedal nerve crush in Aplysia californica. Nerve crush that transected all axons connecting the tail to the central nervous system (CNS) eliminated the ipsilateral tail-evoked siphon reflex, whose sensory input travels in the crushed tail nerve (p9). The first reliable signs of recovery of this reflex were observed within 1 week, and most animals displayed tail-evoked siphon responses within 2 weeks. Wide-dynamic-range mechanosensory neurons with somata in the ventrocaudal (VC) cluster of the ipsilateral pleural ganglion exhibited a few receptive fields (RFs) on the tail 3 weeks after unilateral pedal nerve crush, indicating that the RFs had either regenerated or been reconnected to the central somata. These RFs were smaller and sensitized compared with corresponding RFs on the contralateral, uncrushed side. Centrally conducted axon responses of VC sensory neurones to electrical stimulation distal to the nerve crush site did not reappear until at least 10 days after the crush. Because the crush site was much closer to the CNS than to the tail, the failure of axon responses to be restored earlier than the behavioural responses indicates that early stages of reflex recovery are not due to regeneration of VC sensory neurone axons into the tail. Following nerve crush, VC sensory neurones often could be activated by stimulating central connectives or peripheral nerves that do not normally contain the sensory neurone's axons. These results suggest that recovery of behavioral function after nerve injury involves complex mechanisms, including regenerative growth of axotomized VC sensory neurones, sensitization of regenerating RFs and sprouting of VC sensory neurone fibres within the CNS. Furthermore, the rapidity of behavioural recovery indicates that its initial phases are mediated by additional mechanisms, perhaps centripetal regeneration of unidentified sensory neurones having peripheral somata, or transient reconnection of proximal and distal stumps of axotomized VC cells.

  15. Low-Level Laser Irradiation Improves Functional Recovery and Nerve Regeneration in Sciatic Nerve Crush Rat Injury Model

    PubMed Central

    Wang, Chau-Zen; Chen, Yi-Jen; Wang, Yan-Hsiung; Yeh, Ming-Long; Huang, Mao-Hsiung; Ho, Mei-Ling; Liang, Jen-I; Chen, Chia-Hsin

    2014-01-01

    The development of noninvasive approaches to facilitate the regeneration of post-traumatic nerve injury is important for clinical rehabilitation. In this study, we investigated the effective dose of noninvasive 808-nm low-level laser therapy (LLLT) on sciatic nerve crush rat injury model. Thirty-six male Sprague Dawley rats were divided into 6 experimental groups: a normal group with or without 808-nm LLLT at 8 J/cm2 and a sciatic nerve crush injury group with or without 808-nm LLLT at 3, 8 or 15 J/cm2. Rats were given consecutive transcutaneous LLLT at the crush site and sacrificed 20 days after the crush injury. Functional assessments of nerve regeneration were analyzed using the sciatic functional index (SFI) and hindlimb range of motion (ROM). Nerve regeneration was investigated by measuring the myelin sheath thickness of the sciatic nerve using transmission electron microscopy (TEM) and by analyzing the expression of growth-associated protein 43 (GAP43) in sciatic nerve using western blot and immunofluorescence staining. We found that sciatic-injured rats that were irradiated with LLLT at both 3 and 8 J/cm2 had significantly improved SFI but that a significant improvement of ROM was only found in rats with LLLT at 8 J/cm2. Furthermore, the myelin sheath thickness and GAP43 expression levels were significantly enhanced in sciatic nerve-crushed rats receiving 808-nm LLLT at 3 and 8 J/cm2. Taken together, these results suggest that 808-nm LLLT at a low energy density (3 J/cm2 and 8 J/cm2) is capable of enhancing sciatic nerve regeneration following a crush injury. PMID:25119457

  16. Unified Communications: Simplifying DoD Communication Methods

    DTIC Science & Technology

    2013-04-18

    private key to encrypt the hash. The encrypted hash, together with some other information, such as the hashing algorithm , is known as a digital...virtual private network (VPN). The use of a VPN would allow users to access corporate data while encrypting traffic.35 Another layer of protection would...sign and encrypt emails as well as controlling access to restricted sites. PKI uses a combination of public and private keys for encryption and

  17. A Fast Optimization Method for General Binary Code Learning.

    PubMed

    Shen, Fumin; Zhou, Xiang; Yang, Yang; Song, Jingkuan; Shen, Heng; Tao, Dacheng

    2016-09-22

    Hashing or binary code learning has been recognized to accomplish efficient near neighbor search, and has thus attracted broad interests in recent retrieval, vision and learning studies. One main challenge of learning to hash arises from the involvement of discrete variables in binary code optimization. While the widely-used continuous relaxation may achieve high learning efficiency, the pursued codes are typically less effective due to accumulated quantization error. In this work, we propose a novel binary code optimization method, dubbed Discrete Proximal Linearized Minimization (DPLM), which directly handles the discrete constraints during the learning process. Specifically, the discrete (thus nonsmooth nonconvex) problem is reformulated as minimizing the sum of a smooth loss term with a nonsmooth indicator function. The obtained problem is then efficiently solved by an iterative procedure with each iteration admitting an analytical discrete solution, which is thus shown to converge very fast. In addition, the proposed method supports a large family of empirical loss functions, which is particularly instantiated in this work by both a supervised and an unsupervised hashing losses, together with the bits uncorrelation and balance constraints. In particular, the proposed DPLM with a supervised `2 loss encodes the whole NUS-WIDE database into 64-bit binary codes within 10 seconds on a standard desktop computer. The proposed approach is extensively evaluated on several large-scale datasets and the generated binary codes are shown to achieve very promising results on both retrieval and classification tasks.

  18. The self-crosslinking smart hyaluronic acid hydrogels as injectable three-dimensional scaffolds for cells culture.

    PubMed

    Bian, Shaoquan; He, Mengmeng; Sui, Junhui; Cai, Hanxu; Sun, Yong; Liang, Jie; Fan, Yujiang; Zhang, Xingdong

    2016-04-01

    Although the disulfide bond crosslinked hyaluronic acid hydrogels have been reported by many research groups, the major researches were focused on effectively forming hydrogels. However, few researchers paid attention to the potential significance of controlling the hydrogel formation and degradation, improving biocompatibility, reducing the toxicity of exogenous and providing convenience to the clinical operations later on. In this research, the novel controllable self-crosslinking smart hydrogels with in-situ gelation property was prepared by a single component, the thiolated hyaluronic acid derivative (HA-SH), and applied as a three-dimensional scaffold to mimic native extracellular matrix (ECM) for the culture of fibroblasts cells (L929) and chondrocytes. A series of HA-SH hydrogels were prepared depending on different degrees of thiol substitution (ranging from 10 to 60%) and molecule weights of HA (0.1, 0.3 and 1.0 MDa). The gelation time, swelling property and smart degradation behavior of HA-SH hydrogel were evaluated. The results showed that the gelation and degradation time of hydrogels could be controlled by adjusting the component of HA-SH polymers. The storage modulus of HA-SH hydrogels obtained by dynamic modulus analysis (DMA) could be up to 44.6 kPa. In addition, HA-SH hydrogels were investigated as a three-dimensional scaffold for the culture of fibroblasts cells (L929) and chondrocytes cells in vitro and as an injectable hydrogel for delivering chondrocytes cells in vivo. These results illustrated that HA-SH hydrogels with controllable gelation process, intelligent degradation behavior, excellent biocompatibility and convenient operational characteristics supplied potential clinical application capacity for tissue engineering and regenerative medicine. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. A Comparison of Nutrient Intakes between a Ft. Riley Contractor-Operated and a Ft. Lewis Military-Operated Garrison Dining Facility

    DTIC Science & Technology

    1987-10-01

    Meatsauce Rissole Potatoes Turkey Nuggets (I/o) Hash Browned Potatoes (I/o) Mashed Potatoes Buttered Mixed Vegetables Toasted Garlic Bread Brussels...Chicken Curry Baked Ham/P/A Sauce Parsley Buttered Potatoes Brown Gravy Hash Browned Potatoes (I/o) Steamed Rice Steamed Carrots Mashed Potatoes...Steak Mashed Potatoes Mashed Potatoes Rissole Potatoes Steamed Rice Hash Browned Potatoes (I/o) Green Beans Steamed Carrots Broccoli w/Cheese sauce

  20. Optimal hash arrangement of tentacles in jellyfish

    NASA Astrophysics Data System (ADS)

    Okabe, Takuya; Yoshimura, Jin

    2016-06-01

    At first glance, the trailing tentacles of a jellyfish appear to be randomly arranged. However, close examination of medusae has revealed that the arrangement and developmental order of the tentacles obey a mathematical rule. Here, we show that medusa jellyfish adopt the best strategy to achieve the most uniform distribution of a variable number of tentacles. The observed order of tentacles is a real-world example of an optimal hashing algorithm known as Fibonacci hashing in computer science.

  1. Large-scale Cross-modality Search via Collective Matrix Factorization Hashing.

    PubMed

    Ding, Guiguang; Guo, Yuchen; Zhou, Jile; Gao, Yue

    2016-09-08

    By transforming data into binary representation, i.e., Hashing, we can perform high-speed search with low storage cost, and thus Hashing has collected increasing research interest in the recent years. Recently, how to generate Hashcode for multimodal data (e.g., images with textual tags, documents with photos, etc) for large-scale cross-modality search (e.g., searching semantically related images in database for a document query) is an important research issue because of the fast growth of multimodal data in the Web. To address this issue, a novel framework for multimodal Hashing is proposed, termed as Collective Matrix Factorization Hashing (CMFH). The key idea of CMFH is to learn unified Hashcodes for different modalities of one multimodal instance in the shared latent semantic space in which different modalities can be effectively connected. Therefore, accurate cross-modality search is supported. Based on the general framework, we extend it in the unsupervised scenario where it tries to preserve the Euclidean structure, and in the supervised scenario where it fully exploits the label information of data. The corresponding theoretical analysis and the optimization algorithms are given. We conducted comprehensive experiments on three benchmark datasets for cross-modality search. The experimental results demonstrate that CMFH can significantly outperform several state-of-the-art cross-modality Hashing methods, which validates the effectiveness of the proposed CMFH.

  2. Internet traffic load balancing using dynamic hashing with flow volume

    NASA Astrophysics Data System (ADS)

    Jo, Ju-Yeon; Kim, Yoohwan; Chao, H. Jonathan; Merat, Francis L.

    2002-07-01

    Sending IP packets over multiple parallel links is in extensive use in today's Internet and its use is growing due to its scalability, reliability and cost-effectiveness. To maximize the efficiency of parallel links, load balancing is necessary among the links, but it may cause the problem of packet reordering. Since packet reordering impairs TCP performance, it is important to reduce the amount of reordering. Hashing offers a simple solution to keep the packet order by sending a flow over a unique link, but static hashing does not guarantee an even distribution of the traffic amount among the links, which could lead to packet loss under heavy load. Dynamic hashing offers some degree of load balancing but suffers from load fluctuations and excessive packet reordering. To overcome these shortcomings, we have enhanced the dynamic hashing algorithm to utilize the flow volume information in order to reassign only the appropriate flows. This new method, called dynamic hashing with flow volume (DHFV), eliminates unnecessary flow reassignments of small flows and achieves load balancing very quickly without load fluctuation by accurately predicting the amount of transferred load between the links. In this paper we provide the general framework of DHFV and address the challenges in implementing DHFV. We then introduce two algorithms of DHFV with different flow selection strategies and show their performances through simulation.

  3. Adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador

    NASA Astrophysics Data System (ADS)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2018-04-01

    The Hash security algorithm was analyzed in order to mitigate information security in a distributed architecture. The objective of this research is to develop a prototype for the Adoption of the algorithm Hash in a conceptual model for the Civil Registry of Ecuador. The deductive method was used in order to analyze the published articles that have a direct relation with the research project "Algorithms and Security Protocols for the Civil Registry of Ecuador" and articles related to the Hash security algorithm. It resulted from this research: That the SHA-1 security algorithm is appropriate for use in Ecuador's civil registry; we adopted the SHA-1 algorithm used in the flowchart technique and finally we obtained the adoption of the hash algorithm in a conceptual model. It is concluded that from the comparison of the DM5 and SHA-1 algorithm, it is suggested that in the case of an implementation, the SHA-1 algorithm is taken due to the amount of information and data available from the Civil Registry of Ecuador; It is determined that the SHA-1 algorithm that was defined using the flowchart technique can be modified according to the requirements of each institution; the model for adopting the hash algorithm in a conceptual model is a prototype that can be modified according to all the actors that make up each organization.

  4. Implementation analysis of RC5 algorithm on Preneel-Govaerts-Vandewalle (PGV) hashing schemes using length extension attack

    NASA Astrophysics Data System (ADS)

    Siswantyo, Sepha; Susanti, Bety Hayat

    2016-02-01

    Preneel-Govaerts-Vandewalle (PGV) schemes consist of 64 possible single-block-length schemes that can be used to build a hash function based on block ciphers. For those 64 schemes, Preneel claimed that 4 schemes are secure. In this paper, we apply length extension attack on those 4 secure PGV schemes which use RC5 algorithm in its basic construction to test their collision resistance property. The attack result shows that the collision occurred on those 4 secure PGV schemes. Based on the analysis, we indicate that Feistel structure and data dependent rotation operation in RC5 algorithm, XOR operations on the scheme, along with selection of additional message block value also give impact on the collision to occur.

  5. Data Collision Prevention with Overflow Hashing Technique in Closed Hash Searching Process

    NASA Astrophysics Data System (ADS)

    Rahim, Robbi; Nurjamiyah; Rafika Dewi, Arie

    2017-12-01

    Hash search is a method that can be used for various search processes such as search engines, sorting, machine learning, neural network and so on, in the search process the possibility of collision data can happen and to prevent the occurrence of collision can be done in several ways one of them is to use Overflow technique, the use of this technique perform with varying length of data and this technique can prevent the occurrence of data collisions.

  6. Using Distinct Sectors in Media Sampling and Full Media Analysis to Detect Presence of Documents from a Corpus

    DTIC Science & Technology

    2012-09-01

    relative performance of several conventional SQL and NoSQL databases with a set of one billion file block hashes. Digital Forensics, Sector Hashing, Full... NoSQL databases with a set of one billion file block hashes. v THIS PAGE INTENTIONALLY LEFT BLANK vi Table of Contents List of Acronyms and...Operating System NOOP No Operation assembly instruction NoSQL “Not only SQL” model for non-relational database management NSRL National Software

  7. 9 CFR 319.303 - Corned beef hash.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... combination, are salt, sugar (sucrose or dextrose), spice, and flavoring, including essential oils, oleoresins, and other spice extractives. (b) Corned beef hash may contain one or more of the following optional...

  8. A novel motion analysis approach reveals late recovery in C57BL/6 mice and deficits in NCAM-deficient mice after sciatic nerve crush.

    PubMed

    Fey, Andreas; Schachner, Melitta; Irintchev, Andrey

    2010-05-01

    Assessment of motor abilities after sciatic nerve injury in rodents, in particular mice, relies exclusively on walking track (footprint) analysis despite known limitations of this method. Using principles employed recently for video-based motion analyses after femoral nerve and spinal cord injuries, we have designed and report here a novel approach for functional assessments after sciatic nerve lesions in mice. Functional deficits are estimated by angle and distance measurements on single video frames recorded during beam-walking and inclined ladder climbing. Analyses of adult C57BL/6J mice after crush of the sciatic, tibial, or peroneal nerve allowed the identification of six numerical parameters, detecting impairments of the plantar flexion of the foot and the toe spread. Some of these parameters, as well as footprint functional indices, revealed severe impairment after crush injury of the sciatic or tibial, but not the peroneal nerve, and complete recovery within 3 weeks after lesion. Other novel estimates, however, showed that complete recovery is reached as late as 2-3 months after sciatic nerve crush. These measures detected both tibial and peroneal dysfunction. In contrast to the complete restoration of function in wild-type mice (100%), our new parameters, in contrast to the sciatic functional index, showed incomplete recovery (85%) 90 days after sciatic nerve crush in mice deficient in the neural cell adhesion molecule (NCAM). We conclude that the novel video-based approach is more precise, sensitive, and versatile than established tests, allowing objective numerical assessment of different motor functions in a sciatic nerve injury paradigm in mice.

  9. Toward Optimal Manifold Hashing via Discrete Locally Linear Embedding.

    PubMed

    Rongrong Ji; Hong Liu; Liujuan Cao; Di Liu; Yongjian Wu; Feiyue Huang

    2017-11-01

    Binary code learning, also known as hashing, has received increasing attention in large-scale visual search. By transforming high-dimensional features to binary codes, the original Euclidean distance is approximated via Hamming distance. More recently, it is advocated that it is the manifold distance, rather than the Euclidean distance, that should be preserved in the Hamming space. However, it retains as an open problem to directly preserve the manifold structure by hashing. In particular, it first needs to build the local linear embedding in the original feature space, and then quantize such embedding to binary codes. Such a two-step coding is problematic and less optimized. Besides, the off-line learning is extremely time and memory consuming, which needs to calculate the similarity matrix of the original data. In this paper, we propose a novel hashing algorithm, termed discrete locality linear embedding hashing (DLLH), which well addresses the above challenges. The DLLH directly reconstructs the manifold structure in the Hamming space, which learns optimal hash codes to maintain the local linear relationship of data points. To learn discrete locally linear embeddingcodes, we further propose a discrete optimization algorithm with an iterative parameters updating scheme. Moreover, an anchor-based acceleration scheme, termed Anchor-DLLH, is further introduced, which approximates the large similarity matrix by the product of two low-rank matrices. Experimental results on three widely used benchmark data sets, i.e., CIFAR10, NUS-WIDE, and YouTube Face, have shown superior performance of the proposed DLLH over the state-of-the-art approaches.

  10. Bipolar electrocautery: A rodent model of Sunderland third-degree nerve injury.

    PubMed

    Moradzadeh, Arash; Brenner, Michael J; Whitlock, Elizabeth L; Tong, Alice Y; Luciano, Janina P; Hunter, Daniel A; Myckatyn, Terence M; Mackinnon, Susan E

    2010-01-01

    To determine the Sunderland classification of a bipolar electrocautery injury. Twenty-two rats received crush (a reproducible Sunderland second-degree injury) or bipolar electrocautery injury and were evaluated for functional, histomorphometric, and immunohistochemical recovery at 21 or 42 days. Animal experiments were performed between July 3 and December 12, 2007. Axonal regeneration and end plate reinnervation were evaluated in double transgenic cyan fluorescent protein-conjugated Thy1 and green fluorescent protein-conjugated S100 mice. Compared with crush injury, bipolar electrocautery injury caused greater disruption of myelin and neurofilament architecture at the injury site and decreased nerve fiber counts and percentage of neural tissue distal to the injury (P =.007). Complete functional recovery was seen after crush but not bipolar electrocautery injury. Serial live imaging demonstrated axonal regeneration at week 1 after crush and at week 3 after bipolar electrocautery injury. Qualitative assessment of motor end plate reinnervation at 42 days demonstrated complete neuromuscular end plate reinnervation in the crush group and only limited reinnervation in the bipolar electrocautery group. Bipolar electrocautery injury in a rodent model resulted in a Sunderland third-degree injury, characterized by gradual, incomplete recovery without intervention.

  11. Discriminative Projection Selection Based Face Image Hashing

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Erdogan, Hakan

    Face image hashing is an emerging method used in biometric verification systems. In this paper, we propose a novel face image hashing method based on a new technique called discriminative projection selection. We apply the Fisher criterion for selecting the rows of a random projection matrix in a user-dependent fashion. Moreover, another contribution of this paper is to employ a bimodal Gaussian mixture model at the quantization step. Our simulation results on three different databases demonstrate that the proposed method has superior performance in comparison to previously proposed random projection based methods.

  12. Provably secure Rabin-p cryptosystem in hybrid setting

    NASA Astrophysics Data System (ADS)

    Asbullah, Muhammad Asyraf; Ariffin, Muhammad Rezal Kamel

    2016-06-01

    In this work, we design an efficient and provably secure hybrid cryptosystem depicted by a combination of the Rabin-p cryptosystem with an appropriate symmetric encryption scheme. We set up a hybrid structure which is proven secure in the sense of indistinguishable against the chosen-ciphertext attack. We presume that the integer factorization problem is hard and the hash function that modeled as a random function.

  13. Changes in Benthos Associated with Mussel (Mytilus edulis L.) Farms on the West-Coast of Scotland

    PubMed Central

    Wilding, Thomas A.; Nickell, Thomas D.

    2013-01-01

    Aquaculture, as a means of food production, is growing rapidly in response to an increasing demand for protein and the over-exploitation of wild fisheries. This expansion includes mussels (family Mytilidae) where production currently stands at 1.5 million tonnes per annum. Mussel culture is frequently perceived as having little environmental impact yet mussel biodeposits and shell debris accumulate around the production site and are linked to changes in the benthos. To assess the extent and nature of changes in benthos associated with mussel farming grab and video sampling around seven mussel farms was conducted. Grab samples were analysed for macrofauna and shell-hash content whilst starfish were counted and the shell-hash cover estimated from video imaging. Shell-hash was patchily distributed and occasionally dominated sediments (maximum of 2116 g per 0.1 m2 grab). Mean shell-hash content decreased rapidly at distances >5 m from the line and, over the distance 1–64 m, decreased by three orders of magnitude. The presence of shell-hash and the distance-from-line influenced macrofaunal assemblages but this effect differed between sites. There was no evidence that mussel farming was associated with changes in macrobenthic diversity, species count or feeding strategy. However, total macrofaunal count was estimated to be 2.5 times higher in close proximity to the lines, compared with 64 m distance, and there was evidence that this effect was conditional on the presence of shell-hash. Starfish density varied considerably between sites but, overall, they were approximately 10 times as abundant close to the mussel-lines compared with 64 m distance. There was no evidence that starfish were more abundant in the presence of shell-hash visible on the sediment surface. In terms of farm-scale benthic impacts these data suggest that mussel farming is a relatively benign way of producing food, compared with intensive fish-farming, in similar environments. PMID:23874583

  14. Exploiting the HASH Planetary Nebula Research Platform

    NASA Astrophysics Data System (ADS)

    Parker, Quentin A.; Bojičić, Ivan; Frew, David J.

    2017-10-01

    The HASH (Hong Kong/ AAO/ Strasbourg/ Hα) planetary nebula research platform is a unique data repository with a graphical interface and SQL capability that offers the community powerful, new ways to undertake Galactic PN studies. HASH currently contains multi-wavelength images, spectra, positions, sizes, morphologies and other data whenever available for 2401 true, 447 likely, and 692 possible Galactic PNe, for a total of 3540 objects. An additional 620 Galactic post-AGB stars, pre-PNe, and PPN candidates are included. All objects were classified and evaluated following the precepts and procedures established and developed by our group over the last 15 years. The complete database contains over 6,700 Galactic objects including the many mimics and related phenomena previously mistaken or confused with PNe. Curation and updating currently occurs on a weekly basis to keep the repository as up to date as possible until the official release of HASH v1 planned in the near future.

  15. Comparison of Grouping Methods for Template Extraction from VA Medical Record Text.

    PubMed

    Redd, Andrew M; Gundlapalli, Adi V; Divita, Guy; Tran, Le-Thuy; Pettey, Warren B P; Samore, Matthew H

    2017-01-01

    We investigate options for grouping templates for the purpose of template identification and extraction from electronic medical records. We sampled a corpus of 1000 documents originating from Veterans Health Administration (VA) electronic medical record. We grouped documents through hashing and binning tokens (Hashed) as well as by the top 5% of tokens identified as important through the term frequency inverse document frequency metric (TF-IDF). We then compared the approaches on the number of groups with 3 or more and the resulting longest common subsequences (LCSs) common to all documents in the group. We found that the Hashed method had a higher success rate for finding LCSs, and longer LCSs than the TF-IDF method, however the TF-IDF approach found more groups than the Hashed and subsequently more long sequences, however the average length of LCSs were lower. In conclusion, each algorithm appears to have areas where it appears to be superior.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bauer, Stephen J.; Urquhart, Alexander

    Reconsolidated crushed salt is being considered as a backfilling material placed upon nuclear waste within a salt repository environment. In-depth knowledge of thermal and mechanical properties of the crushed salt as it reconsolidates is critical to thermal/mechanical modeling of the reconsolidation process. An experimental study was completed to quantitatively evaluate the thermal conductivity of reconsolidated crushed salt as a function of porosity and temperature. The crushed salt for this study came from the Waste Isolation Pilot Plant (WIPP). In this work the thermal conductivity of crushed salt with porosity ranging from 1% to 40% was determined from room temperature upmore » to 300°C, using two different experimental methods. Thermal properties (including thermal conductivity, thermal diffusivity and specific heat) of single-crystal salt were determined for the same temperature range. The salt was observed to dewater during heating; weight loss from the dewatering was quantified. The thermal conductivity of reconsolidated crushed salt decreases with increasing porosity; conversely, thermal conductivity increases as the salt consolidates. The thermal conductivity of reconsolidated crushed salt for a given porosity decreases with increasing temperature. A simple mixture theory model is presented to predict and compare to the data developed in this study.« less

  17. Crash Energy Management Crush Zone Designs : Features, Functions and Forms

    DOT National Transportation Integrated Search

    2007-03-13

    On March 23, 2006, a full-scale test was conducted on a passenger train retrofitted with newly developed cab and coach car crush zone designs. This test was conducted as part of a larger testing program to establish the degree of enhanced performance...

  18. Crushing motor patterns in drum (Teleostei: Sciaenidae): functional novelties associated with molluscivory.

    PubMed

    Grubich, J R

    2000-10-01

    This study explores the evolution of molluscivory in the marine teleost family Sciaenidae by comparing the motor activity patterns of the pharyngeal muscles of two closely related taxa, the molluscivorous black drum (Pogonias cromis) and the generalist red drum (Sciaenops ocellatus). Muscle activity patterns were recorded simultaneously from eight pharyngeal muscles. Electromyographic (EMG) activity was recorded during feeding on three prey types that varied in shell hardness. Canonical variate and discriminant function analyses were used to describe the distinctness of drum pharyngeal processing behaviors. Discriminant functions built of EMG timing variables were more accurate than muscle activity intensity at identifying cycles by prey type and species. Both drum species demonstrated the ability to modulate pharyngeal motor patterns in response to prey hardness. The mean motor patterns and the canonical variate space of crushing behavior indicated that black drum employed a novel motor pattern during molluscivory. The mollusc-crushing motor pattern of black drum is different from other neoteleost pharyngeal behaviors in lacking upper jaw retraction by the retractor dorsalis muscle. This functional modification suggests that crushing hard-shelled marine bivalves requires a 'vice-like' compression bite in contrast to the shearing forces that are applied to weaker-shelled fiddler crabs by red drum and to freshwater snails by redear sunfish.

  19. The Effect of Memantine on Functional Recovery of the Sciatic Nerve Crush Injury in Rats.

    PubMed

    Ghayour, Mohammad-Bagher; Abdolmaleki, Arash; Behnam-Rassouli, Morteza

    2017-01-01

    Following severe peripheral nerve injury (PNI), regeneration is often insufficient and functional recovery is incomplete. In this regard, glutamate N-methyl-D-aspartate (NMDA) receptor antagonist such as Memantine have been shown to have neuroprotective effects. We evaluated the effects of Memantine against sciatic nerve crush injury in male Wistar Rats. Memantine or vehicle was given parenteraly to rats for 7 days postoperative. In Memantine treatment groups, a single dose of agent (5 and 10 mg/kg) was administered daily. The control group was given vehicle in the same manner. The rats were subjected to crush injury in the left sciatic nerve with non-serrated clamp for 30 seconds. Behavioural, electrophysiological and morphological alterations were evaluated during the experimental period. Results showed that Memantine has no significant effect on regeneration process rate and functional recovery quality. In the sciatic functional index (SFI) test no significant difference was observed between Memantine treatment groups (5 and 10 mg/ kg) at any week. Since the major neuroprotective effect of Memantine is due to its protective activity against NMDA receptormediated excitotoxicity, it seems that glutamate excitotoxicity is less important in motor impairment due to sciatic nerve crush injury. It is clear that more research is needed to confirm these findings.

  20. L-carnitine alleviates sciatic nerve crush injury in rats: functional and electron microscopy assessments

    PubMed Central

    Avsar, Ümmü Zeynep; Avsar, Umit; Aydin, Ali; Yayla, Muhammed; Ozturkkaragoz, Berna; Un, Harun; Saritemur, Murat; Mercantepe, Tolga

    2014-01-01

    Several studies have demonstrated that L-carnitine exhibits neuroprotective effects on injured sciatic nerve of rats with diabetes mellitus. It is hypothesized that L-carnitine exhibits neuroprotective effects on injured sciatic nerve of rats. Rat sciatic nerve was crush injured by a forceps and exhibited degenerative changes. After intragastric administration of 50 and 100 mg/kg L-carnitine for 30 days, axon area, myelin sheath area, axon diameter, myelin sheath diameter, and numerical density of the myelinated axons of injured sciatic nerve were similar to normal, and the function of injured sciatic nerve also improved significantly. These findings suggest that L-carnitine exhibits neuroprotective effects on sciatic nerve crush injury in rats. PMID:25206754

  1. NHash: Randomized N-Gram Hashing for Distributed Generation of Validatable Unique Study Identifiers in Multicenter Research.

    PubMed

    Zhang, Guo-Qiang; Tao, Shiqiang; Xing, Guangming; Mozes, Jeno; Zonjy, Bilal; Lhatoo, Samden D; Cui, Licong

    2015-11-10

    A unique study identifier serves as a key for linking research data about a study subject without revealing protected health information in the identifier. While sufficient for single-site and limited-scale studies, the use of common unique study identifiers has several drawbacks for large multicenter studies, where thousands of research participants may be recruited from multiple sites. An important property of study identifiers is error tolerance (or validatable), in that inadvertent editing mistakes during their transmission and use will most likely result in invalid study identifiers. This paper introduces a novel method called "Randomized N-gram Hashing (NHash)," for generating unique study identifiers in a distributed and validatable fashion, in multicenter research. NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. NHash consists of 2 phases. First, an intermediate string using randomized N-gram hashing is generated. This string consists of a collection of N-gram hashes f1, f2, ..., fk. The input for each function fi has 3 components: a random number r, an integer n, and input data m. The result, fi(r, n, m), is an n-gram of m with a starting position s, which is computed as (r mod |m|), where |m| represents the length of m. The output for Step 1 is the concatenation of the sequence f1(r1, n1, m1), f2(r2, n2, m2), ..., fk(rk, nk, mk). In the second phase, the intermediate string generated in Phase 1 is encrypted using techniques such as shift cipher. The result of the encryption, concatenated with the random number r, is the final NHash study identifier. We performed experiments using a large synthesized dataset comparing NHash with random strings, and demonstrated neglegible probability for collision. We implemented NHash for the Center for SUDEP Research (CSR), a National Institute for Neurological Disorders and Stroke-funded Center Without Walls for Collaborative Research in the Epilepsies. This multicenter collaboration involves 14 institutions across the United States and Europe, bringing together extensive and diverse expertise to understand sudden unexpected death in epilepsy patients (SUDEP). The CSR Data Repository has successfully used NHash to link deidentified multimodal clinical data collected in participating CSR institutions, meeting all desired objectives of NHash.

  2. Interactions between colour and synaesthetic colour: an effect of simultaneous colour contrast on synaesthetic colours.

    PubMed

    Nijboer, Tanja C W; Gebuis, Titia; te Pas, Susan F; van der Smagt, Maarten J

    2011-01-01

    We investigated whether simultaneous colour contrast affects the synaesthetic colour experience and normal colour percept in a similar manner. We simultaneously presented a target stimulus (i.e. grapheme) and a reference stimulus (i.e. hash). Either the grapheme or the hash was presented on a saturated background of the same or opposite colour category as the synaesthetic colour and the other stimulus on a grey background. In both conditions, grapheme-colour synaesthetes were asked to colour the hash in a colour similar to the synaesthetic colour of the grapheme. Controls that were pair-matched to the synaesthetes performed the same experiment, but for them, the grapheme was presented in the colour induced by the grapheme in synaesthetes. When graphemes were presented on a grey and the hash on a coloured background, a traditional simultaneous colour-contrast effect was found for controls as well as synaesthetes. When graphemes were presented on colour and the hash on grey, the controls again showed a traditional simultaneous colour-contrast effect, whereas the synaesthetes showed the opposite effect. Our results show that synaesthetic colour experiences differ from normal colour perception; both are susceptible to different surrounding colours, but not in a comparable manner. Copyright © 2010 Elsevier Ltd. All rights reserved.

  3. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  4. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.

  5. Quantum Authencryption with Two-Photon Entangled States for Off-Line Communicants

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu

    2016-02-01

    In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice's classical bits with the two-photon joint measurements and authenticates the integrity of Alice's secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.

  6. A strategy to load balancing for non-connectivity MapReduce job

    NASA Astrophysics Data System (ADS)

    Zhou, Huaping; Liu, Guangzong; Gui, Haixia

    2017-09-01

    MapReduce has been widely used in large scale and complex datasets as a kind of distributed programming model. Original Hash partitioning function in MapReduce often results the problem of data skew when data distribution is uneven. To solve the imbalance of data partitioning, we proposes a strategy to change the remaining partitioning index when data is skewed. In Map phase, we count the amount of data which will be distributed to each reducer, then Job Tracker monitor the global partitioning information and dynamically modify the original partitioning function according to the data skew model, so the Partitioner can change the index of these partitioning which will cause data skew to the other reducer that has less load in the next partitioning process, and can eventually balance the load of each node. Finally, we experimentally compare our method with existing methods on both synthetic and real datasets, the experimental results show our strategy can solve the problem of data skew with better stability and efficiency than Hash method and Sampling method for non-connectivity MapReduce task.

  7. Severe Crush Injury to the Forearm and Hand: The Role of Microsurgery.

    PubMed

    Del Piñal, Francisco; Urrutia, Esteban; Klich, Maciej

    2017-04-01

    The main goals of treating severe crush injuries are debriding away devitalized tissue and filling any resultant dead space with vascularized tissue. In the authors' experience, the most ideal methods for soft tissue coverage in treating crush injuries are the iliac flap, the adipofascial lateral arm flap, and the gracilis flap. Accompanying bone defects respond very well to free corticoperiosteal flaps. Digital defects often require the use of complete or subtotal toe transfer to avoid amputation and restore function to the hand. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. Effects of ozone therapy on facial nerve regeneration.

    PubMed

    Ozbay, Isa; Ital, Ilker; Kucur, Cuneyt; Akcılar, Raziye; Deger, Aysenur; Aktas, Savas; Oghan, Fatih

    Ozone may promote moderate oxidative stress, which increases antioxidant endogenous systems. There are a number of antioxidants that have been investigated therapeutically for improving peripheral nerve regeneration. However, no previous studies have reported the effect of ozone therapy on facial nerve regeneration. We aimed to evaluate the effect of ozone therapy on facial nerve regeneration. Fourteen Wistar albino rats were randomly divided into two groups with experimental nerve crush injuries: a control group, which received saline treatment post-crush, and an experimental group, which received ozone treatment. All animals underwent surgery in which the left facial nerve was exposed and crushed. Treatment with saline or ozone began on the day of the nerve crush. Left facial nerve stimulation thresholds were measured before crush, immediately after crush, and after 30 days. After measuring nerve stimulation thresholds at 30 days post-injury, the crushed facial nerve was excised. All specimens were studied using light and electron microscopy. Post-crushing, the ozone-treated group had lower stimulation thresholds than the saline group. Although this did not achieve statistical significance, it is indicative of greater functional improvement in the ozone group. Significant differences were found in vascular congestion, macrovacuolization, and myelin thickness between the ozone and control groups. Significant differences were also found in axonal degeneration and myelin ultrastructure between the two groups. We found that ozone therapy exerted beneficial effect on the regeneration of crushed facial nerves in rats. Copyright © 2016 Associação Brasileira de Otorrinolaringologia e Cirurgia Cérvico-Facial. Published by Elsevier Editora Ltda. All rights reserved.

  9. Granulocyte colony-stimulating factor (G-CSF) positive effects on muscle fiber degeneration and gait recovery after nerve lesion in MDX mice

    PubMed Central

    Simões, Gustavo F; Benitez, Suzana U; Oliveira, Alexandre L R

    2014-01-01

    Background G-CSF has been shown to decrease inflammatory processes and to act positively on the process of peripheral nerve regeneration during the course of muscular dystrophy. Aims The aims of this study were to investigate the effects of treatment of G-CSF during sciatic nerve regeneration and histological analysis in the soleus muscle in MDX mice. Methods Six-week-old male MDX mice underwent left sciatic nerve crush and were G-CSF treated at 7 days prior to and 21 days after crush. Ten and twenty-one days after surgery, the mice were euthanized, and the sciatic nerves were processed for immunohistochemistry (anti-p75NTR and anti-neurofilament) and transmission electron microscopy. The soleus muscles were dissected out and processed for H&E staining and subsequent morphologic analysis. Motor function analyses were performed at 7 days prior to and 21 days after sciatic crush using the CatWalk system and the sciatic nerve index. Results Both groups treated with G-CSF showed increased p75NTR and neurofilament expression after sciatic crush. G-CSF treatment decreased the number of degenerated and regenerated muscle fibers, thereby increasing the number of normal muscle fibers. Conclusions The reduction in p75NTR and neurofilament indicates a decreased regenerative capacity in MDX mice following a lesion to a peripheral nerve. The reduction in motor function in the crushed group compared with the control groups may reflect the cycles of muscle degeneration/regeneration that occur postnatally. Thus, G-CSF treatment increases motor function in MDX mice. Nevertheless, the decrease in baseline motor function in these mice is not reversed completely by G-CSF. PMID:25328849

  10. A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Wang, Siwei; Zhang, Yingqian; Luo, Chao

    2018-04-01

    A novel image encryption algorithm is proposed that combines the SHA-3 hash function and two chaotic systems: the hyper-chaotic Lorenz and Chen systems. First, 384 bit keystream hash values are obtained by applying SHA-3 to plaintext. The sensitivity of the SHA-3 algorithm and chaotic systems ensures the effect of a one-time pad. Second, the color image is expanded into three-dimensional space. During permutation, it undergoes plane-plane displacements in the x, y and z dimensions. During diffusion, we use the adjacent pixel dataset and corresponding chaotic value to encrypt each pixel. Finally, the structure of alternating between permutation and diffusion is applied to enhance the level of security. Furthermore, we design techniques to improve the algorithm's encryption speed. Our experimental simulations show that the proposed cryptosystem achieves excellent encryption performance and can resist brute-force, statistical, and chosen-plaintext attacks.

  11. 9 CFR 319.302 - Hash.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Canned, Frozen, or Dehydrated Meat Food... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Hash. 319.302 Section 319.302 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION...

  12. 9 CFR 319.302 - Hash.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Canned, Frozen, or Dehydrated Meat Food... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Hash. 319.302 Section 319.302 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION...

  13. A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol.

    PubMed

    Zeng, Ping; Tan, Qingping; Meng, Xiankai; Shao, Zeming; Xie, Qinzheng; Yan, Ying; Cao, Wei; Xu, Jianjun

    2017-01-01

    In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on-all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications.

  14. The Speech multi features fusion perceptual hash algorithm based on tensor decomposition

    NASA Astrophysics Data System (ADS)

    Huang, Y. B.; Fan, M. H.; Zhang, Q. Y.

    2018-03-01

    With constant progress in modern speech communication technologies, the speech data is prone to be attacked by the noise or maliciously tampered. In order to make the speech perception hash algorithm has strong robustness and high efficiency, this paper put forward a speech perception hash algorithm based on the tensor decomposition and multi features is proposed. This algorithm analyses the speech perception feature acquires each speech component wavelet packet decomposition. LPCC, LSP and ISP feature of each speech component are extracted to constitute the speech feature tensor. Speech authentication is done by generating the hash values through feature matrix quantification which use mid-value. Experimental results showing that the proposed algorithm is robust for content to maintain operations compared with similar algorithms. It is able to resist the attack of the common background noise. Also, the algorithm is highly efficiency in terms of arithmetic, and is able to meet the real-time requirements of speech communication and complete the speech authentication quickly.

  15. A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol

    PubMed Central

    Tan, Qingping; Meng, Xiankai; Shao, Zeming; Xie, Qinzheng; Yan, Ying; Cao, Wei; Xu, Jianjun

    2017-01-01

    In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on—all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications. PMID:28399157

  16. Evolution and function of the upper molar talon and its dietary implications in microbats.

    PubMed

    Gutzwiller, Sarah C; Hunter, John P

    2015-11-01

    The evolution of mammalian molars has been marked by transitions representing significant changes in shape and function. One such transition is the addition and elaboration of the talon, the distolingual region of the ancestral tribosphenic upper molar of therian mammals and some extinct relatives. This study uses suborder Microchiroptera as a case study to explore the adaptive implications of the expansion of the talon on the tribosphenic molar, specifically focusing on the talon's role in the compression and shear of food during breakdown. Three-dimensional computer renderings of casts of the upper left first molars were created for microbat species of a variety of dietary categories (frugivore, etc.) and physical properties of food (hard and soft). Relief Index (RFI) was measured to estimate the topography and function of the whole tooth and of the talon and trigon (the remaining primitive tribosphenic region) individually, in order to examine 1) how the shape of the whole tooth, trigon, and talon reflects the compromise between their crushing and shearing functions, 2) how whole tooth, trigon, and talon function differs according to diet, and 3) how the presence of the talon affects overall molar function. Results suggest that RFI of both the whole tooth and the trigon varies according to dietary groups, with frugivores having greater crushing function when compared with the other groups. The talon, however, consistently has low RFI (a flatter topography), and its presence lowers the RFI of the whole tooth across all dietary categories, suggesting that the talon is primarily functioning in crushing during food breakdown. The potential benefits of a crushing talon for microbats of various dietary groups are discussed. © 2015 Wiley Periodicals, Inc.

  17. Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security

    DTIC Science & Technology

    2012-11-05

    from 2001, Barak (FOCS’01) introduced a novel non-black-box simulation technique. This technique enabled the construc- tion of new cryptographic...primitives, such as resettably-sound zero-knowledge arguments, that cannot be proven secure using just black-box simulation techniques. The work of Barak ... Barak requires the existence of collision-resistant hash functions, and a very recent result by Bitansky and Paneth (FOCS’12) instead requires the

  18. Totally S-protected hyaluronic acid: Evaluation of stability and mucoadhesive properties as liquid dosage form.

    PubMed

    Pereira de Sousa, Irene; Suchaoin, Wongsakorn; Zupančič, Ožbej; Leichner, Christina; Bernkop-Schnürch, Andreas

    2016-11-05

    It is the aim of this study to synthesize hyaluronic acid (HA) derivatives bearing mucoadhesive properties and showing prolonged stability at pH 7.4 and under oxidative condition as liquid dosage form. HA was modified by thiolation with l-cysteine (HA-SH) and by conjugation with 2-mercaptonicotinic acid-l-cysteine ligand to obtain an S-protected derivative (HA-MNA). The polymers were characterized by determination of thiol group content and mercaptonicotinic acid content. Cytotoxicity, stability and mucoadhesive properties (rheological evaluation and tensile test) of the polymers were evaluated. HA-SH and HA-MNA could be successfully synthesized with a degree of modification of 5% and 9% of the total moles of carboxylic acid groups, respectively. MTT assay revealed no toxicity for the polymers. HA-SH resulted to be unstable both at pH 7.4 and under oxidative conditions, whereas HA-MNA was stable under both conditions. Rheological assessment showed a 52-fold and a 3-fold increase in viscosity for HA-MNA incubated with mucus compared to unmodified HA and HA-SH, respectively. Tensile evaluation carried out with intestinal and conjunctival mucosa confirmed the higher mucoadhesive properties of HA-MNA compared to HA-SH. According to the presented results, HA-MNA appears to be a potent excipient for the formulation of stable liquid dosage forms showing comparatively high mucodhesive properties. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Using the Hill Cipher to Teach Cryptographic Principles

    ERIC Educational Resources Information Center

    McAndrew, Alasdair

    2008-01-01

    The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…

  20. Network-Aware Mechanisms for Tolerating Byzantine Failures in Distributed Systems

    DTIC Science & Technology

    2012-01-01

    In Digest, we use SHA-256 as the collision-resistant hash function. We use the realization of SHA-256 from the OpenSSL toolkit [48]. The results...vol. 46, pp. 372–378, 1997. [48] “ Openssl project.” [Online]. Available: http://www.openssl.org/ 154 [49] M. J. Fischer, N. A. Lynch, and M. Merritt

  1. A comparative study of Message Digest 5(MD5) and SHA256 algorithm

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Tarigan, J. T.; Ginting, A. B. C.

    2018-03-01

    The document is a collection of written or printed data containing information. The more rapid advancement of technology, the integrity of a document should be kept. Because of the nature of an open document means the document contents can be read and modified by many parties so that the integrity of the information as a content of the document is not preserved. To maintain the integrity of the data, it needs to create a mechanism which is called a digital signature. A digital signature is a specific code which is generated from the function of producing a digital signature. One of the algorithms that used to create the digital signature is a hash function. There are many hash functions. Two of them are message digest 5 (MD5) and SHA256. Those both algorithms certainly have its advantages and disadvantages of each. The purpose of this research is to determine the algorithm which is better. The parameters which used to compare that two algorithms are the running time and complexity. The research results obtained from the complexity of the Algorithms MD5 and SHA256 is the same, i.e., ⊖ (N), but regarding the speed is obtained that MD5 is better compared to SHA256.

  2. Lack of effectiveness of laser therapy applied to the nerve course and the correspondent medullary roots

    PubMed Central

    Sousa, Fausto Fernandes de Almeida; Ribeiro, Thaís Lopes; Fazan, Valéria Paula Sassoli; Barbieri, Claudio Henrique

    2013-01-01

    OBJECTIVE: To investigate the influence of low intensity laser irradiation on the regeneration of the fibular nerve of rats after crush injury. METHODS: Twenty-five rats were used, divided into three groups: 1) intact nerve, no treatment; 2) crushed nerve, no treatment; 3) crush injury, laser irradiation applied on the medullary region corresponding to the roots of the sciatic nerve and subsequently on the course of the damaged nerve. Laser irradiation was carried out for 14 consecutive days. RESULTS: Animals were evaluated by functional gait analysis with the peroneal functional index and by histomorphometric analysis using the total number of myelinated nerve fibers and their density, total number of Schwann cells, total number of blood vessels and the occupied area, minimum diameter of the fiber diameter and G-quotient. CONCLUSION: According to the statistical analysis there was no significant difference among groups and the authors conclude that low intensity laser irradiation has little or no influence on nerve regeneration and functional recovery. Laboratory investigation. PMID:24453650

  3. NHash: Randomized N-Gram Hashing for Distributed Generation of Validatable Unique Study Identifiers in Multicenter Research

    PubMed Central

    Zhang, Guo-Qiang; Tao, Shiqiang; Xing, Guangming; Mozes, Jeno; Zonjy, Bilal; Lhatoo, Samden D

    2015-01-01

    Background A unique study identifier serves as a key for linking research data about a study subject without revealing protected health information in the identifier. While sufficient for single-site and limited-scale studies, the use of common unique study identifiers has several drawbacks for large multicenter studies, where thousands of research participants may be recruited from multiple sites. An important property of study identifiers is error tolerance (or validatable), in that inadvertent editing mistakes during their transmission and use will most likely result in invalid study identifiers. Objective This paper introduces a novel method called "Randomized N-gram Hashing (NHash)," for generating unique study identifiers in a distributed and validatable fashion, in multicenter research. NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. Methods NHash consists of 2 phases. First, an intermediate string using randomized N-gram hashing is generated. This string consists of a collection of N-gram hashes f 1, f 2, ..., f k. The input for each function f i has 3 components: a random number r, an integer n, and input data m. The result, f i(r, n, m), is an n-gram of m with a starting position s, which is computed as (r mod |m|), where |m| represents the length of m. The output for Step 1 is the concatenation of the sequence f 1(r 1, n 1, m 1), f 2(r 2, n 2, m 2), ..., f k(r k, n k, m k). In the second phase, the intermediate string generated in Phase 1 is encrypted using techniques such as shift cipher. The result of the encryption, concatenated with the random number r, is the final NHash study identifier. Results We performed experiments using a large synthesized dataset comparing NHash with random strings, and demonstrated neglegible probability for collision. We implemented NHash for the Center for SUDEP Research (CSR), a National Institute for Neurological Disorders and Stroke-funded Center Without Walls for Collaborative Research in the Epilepsies. This multicenter collaboration involves 14 institutions across the United States and Europe, bringing together extensive and diverse expertise to understand sudden unexpected death in epilepsy patients (SUDEP). Conclusions The CSR Data Repository has successfully used NHash to link deidentified multimodal clinical data collected in participating CSR institutions, meeting all desired objectives of NHash. PMID:26554419

  4. Ontology-Based Peer Exchange Network (OPEN)

    ERIC Educational Resources Information Center

    Dong, Hui

    2010-01-01

    In current Peer-to-Peer networks, distributed and semantic free indexing is widely used by systems adopting "Distributed Hash Table" ("DHT") mechanisms. Although such systems typically solve a. user query rather fast in a deterministic way, they only support a very narrow search scheme, namely the exact hash key match. Furthermore, DHT systems put…

  5. Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing

    NASA Astrophysics Data System (ADS)

    Jin, Zhe; Jin Teoh, Andrew Beng; Ong, Thian Song; Tee, Connie

    Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recently. It is a challenging task to design a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining acceptable performance. Many methods have been proposed to resolve this problem, and cancelable biometrics is one of them. In this paper, we propose a scheme coined as Random Triangle Hashing which follows the concept of cancelable biometrics in the fingerprint domain. In this method, re-alignment of fingerprints is not required as all the minutiae are translated into a pre-defined 2 dimensional space based on a reference minutia. After that, the proposed Random Triangle hashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed method is resistant to minor translation error and rotation distortion. Finally, the hash vectors are converted into bit-strings to be stored in the database. The proposed method is evaluated using the public database FVC2004 DB1. An EER of less than 1% is achieved by using the proposed method.

  6. Method and system for analyzing and classifying electronic information

    DOEpatents

    McGaffey, Robert W.; Bell, Michael Allen; Kortman, Peter J.; Wilson, Charles H.

    2003-04-29

    A data analysis and classification system that reads the electronic information, analyzes the electronic information according to a user-defined set of logical rules, and returns a classification result. The data analysis and classification system may accept any form of computer-readable electronic information. The system creates a hash table wherein each entry of the hash table contains a concept corresponding to a word or phrase which the system has previously encountered. The system creates an object model based on the user-defined logical associations, used for reviewing each concept contained in the electronic information in order to determine whether the electronic information is classified. The data analysis and classification system extracts each concept in turn from the electronic information, locates it in the hash table, and propagates it through the object model. In the event that the system can not find the electronic information token in the hash table, that token is added to a missing terms list. If any rule is satisfied during propagation of the concept through the object model, the electronic information is classified.

  7. In Vitro and Ex Vivo Evaluation of Novel Curcumin-Loaded Excipient for Buccal Delivery.

    PubMed

    Laffleur, Flavia; Schmelzle, Franziska; Ganner, Ariane; Vanicek, Stefan

    2017-08-01

    This study aimed to develop a mucoadhesive polymeric excipient comprising curcumin for buccal delivery. Curcumin encompasses broad range of benefits such as antioxidant, anti-inflammatory, and chemotherapeutic activity. Hyaluronic acid (HA) as polymeric excipient was modified by immobilization of thiol bearing ligands. L-Cysteine (SH) ethyl ester was covalently attached via amide bond formation between cysteine and the carboxylic moiety of hyaluronic acid. Succeeded synthesis was proved by H-NMR and IR spectra. The obtained thiolated polymer hyaluronic acid ethyl ester (HA-SH) was evaluated in terms of stability, safety, mucoadhesiveness, drug release, and permeation-enhancing properties. HA-SH showed 2.75-fold higher swelling capacity over time in comparison to unmodified polymer. Furthermore, mucoadhesion increased 3.4-fold in case of HA-SH and drug release was increased 1.6-fold versus HA control, respectively. Curcumin-loaded HA-SH exhibits a 4.4-fold higher permeation compared with respective HA. Taking these outcomes in consideration, novel curcumin-loaded excipient, namely thiolated hyaluronic acid ethyl ester appears as promising tool for pharyngeal diseases.

  8. [PREPARATION AND BIOCOMPATIBILITY OF IN SITU CROSSLINKING HYALURONIC ACID HYDROGEL].

    PubMed

    Liang, Jiabi; Li, Jun; Wang, Ting; Liang, Yuhong; Zou, Xuenong; Zhou, Guangqian; Zhou, Zhiyu

    2016-06-08

    To fabricate in situ crosslinking hyaluronic acid hydrogel and evaluate its biocompatibility in vitro. The acrylic acid chloride and polyethylene glycol were added to prepare crosslinking agent polyethylene glycol acrylate (PEGDA), and the molecular structure of PEGDA was analyzed by Flourier transformation infrared spectroscopy and 1H nuclear magnetic resonance spectroscopy. Hyaluronic acid hydrogel was chemically modified to prepare hyaluronic acid thiolation (HA-SH). And the degree of HA-SH was analyzed qualitatively and quantitatively by Ellman method. HA-SH solution in concentrations ( W/V ) of 0.5%, 1.0%, and 1.5% and PEGDA solution in concentrations ( W/V ) of 2%, 4%, and 6% were prepared with PBS. The two solutions were mixed in different ratios, and in situ crosslinking hyaluronic acid hydrogel was obtained; the crosslinking time was recorded. The cellular toxicity of in situ crosslinking hyaluronic acid hydrogel (1.5% HA-SH and 4% PEGDA mixed) was tested by L929 cells. Meanwhile, the biocompatibility of hydrogel was tested by co-cultured with human bone mesenchymal stem cells (hBMSCs). Flourier transformation infrared spectroscopy showed that most hydroxyl groups were replaced by acrylate groups; 1H nuclear magnetic resonance spectroscopy showed 3 characteristic peaks of hydrogen representing acrylate and olefinic bond at 5-7 ppm. The thiolation yield of HA-SH was 65.4%. In situ crosslinking time of hyaluronic acid hydrogel was 2 to 70 minutes in the PEGDA concentrations of 2%-6% and HA-SH concentrations of 0.5%-1.5%. The hyaluronic acid hydrogel appeared to be transparent. The toxicity grade of leaching solution of hydrogel was grade 1. hBMSCs grew well and distributed evenly in hydrogel with a very high viability. In situ crosslinking hyaluronic acid hydrogel has low cytotoxicity, good biocompatibility, and controllable crosslinking time, so it could be used as a potential tissue engineered scaffold or repairing material for tissue regeneration.

  9. Cost-Sensitive Local Binary Feature Learning for Facial Age Estimation.

    PubMed

    Lu, Jiwen; Liong, Venice Erin; Zhou, Jie

    2015-12-01

    In this paper, we propose a cost-sensitive local binary feature learning (CS-LBFL) method for facial age estimation. Unlike the conventional facial age estimation methods that employ hand-crafted descriptors or holistically learned descriptors for feature representation, our CS-LBFL method learns discriminative local features directly from raw pixels for face representation. Motivated by the fact that facial age estimation is a cost-sensitive computer vision problem and local binary features are more robust to illumination and expression variations than holistic features, we learn a series of hashing functions to project raw pixel values extracted from face patches into low-dimensional binary codes, where binary codes with similar chronological ages are projected as close as possible, and those with dissimilar chronological ages are projected as far as possible. Then, we pool and encode these local binary codes within each face image as a real-valued histogram feature for face representation. Moreover, we propose a cost-sensitive local binary multi-feature learning method to jointly learn multiple sets of hashing functions using face patches extracted from different scales to exploit complementary information. Our methods achieve competitive performance on four widely used face aging data sets.

  10. Documentation of the Tonge-Ramesh Material Model for Release 2015-06-05-152756

    DTIC Science & Technology

    2015-10-01

    crush curves showing pressure required to initiate pore collapse for pure hydrostatic loading as a function of distension for the 2 different granular...Illustration of the crush curves showing pressure required to initiate pore collapse for pure hydrostatic loading as a function of distension for the 2...is an additional yield surface that depends on only the hydrostatic pressure (p = −1/3tr(σ)). 13 It is defined by fφ(P, J GP , J) =  P Pc−P0

  11. A Study of Gaps in Cyber Defense Automation

    DTIC Science & Technology

    2015-10-18

    to lowercase. Next, the normalized file is tokenized using an n -length window. These n -tokens are then hashed into a Bloom filter for that file. In the...readily available to most developers. However, with a complexity of O(N2) where N is the number of files (or the number of functions if using function...that measure the impact of each feature on the website’s chances of becoming compromised, and the top N features are submitted to the classification

  12. Simultenious binary hash and features learning for image retrieval

    NASA Astrophysics Data System (ADS)

    Frantc, V. A.; Makov, S. V.; Voronin, V. V.; Marchuk, V. I.; Semenishchev, E. A.; Egiazarian, K. O.; Agaian, S.

    2016-05-01

    Content-based image retrieval systems have plenty of applications in modern world. The most important one is the image search by query image or by semantic description. Approaches to this problem are employed in personal photo-collection management systems, web-scale image search engines, medical systems, etc. Automatic analysis of large unlabeled image datasets is virtually impossible without satisfactory image-retrieval technique. It's the main reason why this kind of automatic image processing has attracted so much attention during recent years. Despite rather huge progress in the field, semantically meaningful image retrieval still remains a challenging task. The main issue here is the demand to provide reliable results in short amount of time. This paper addresses the problem by novel technique for simultaneous learning of global image features and binary hash codes. Our approach provide mapping of pixel-based image representation to hash-value space simultaneously trying to save as much of semantic image content as possible. We use deep learning methodology to generate image description with properties of similarity preservation and statistical independence. The main advantage of our approach in contrast to existing is ability to fine-tune retrieval procedure for very specific application which allow us to provide better results in comparison to general techniques. Presented in the paper framework for data- dependent image hashing is based on use two different kinds of neural networks: convolutional neural networks for image description and autoencoder for feature to hash space mapping. Experimental results confirmed that our approach has shown promising results in compare to other state-of-the-art methods.

  13. A new method of cannabis ingestion: the dangers of dabs?

    PubMed

    Loflin, Mallory; Earleywine, Mitch

    2014-10-01

    A new method for administering cannabinoids, called butane hash oil ("dabs"), is gaining popularity among marijuana users. Despite press reports that suggest that "dabbing" is riskier than smoking flower cannabis, no data address whether dabs users experience more problems from use than those who prefer flower cannabis. The present study aimed to gather preliminary information on dabs users and test whether dabs use is associated with more problems than using flower cannabis. Participants (n=357) reported on their history of cannabis use, their experience with hash oil and the process of "dabbing," reasons for choosing "dabs" over other methods, and any problems related to both flower cannabis and butane hash oil. Analyses revealed that using "dabs" created no more problems or accidents than using flower cannabis. Participants did report that "dabs" led to higher tolerance and withdrawal (as defined by the participants), suggesting that the practice might be more likely to lead to symptoms of addiction or dependence. The use of butane hash oil has spread outside of the medical marijuana community, and users view it as significantly more dangerous than other forms of cannabis use. Published by Elsevier Ltd.

  14. Unique method of tooth replacement in durophagous placodont marine reptiles, with new data on the dentition of Chinese taxa

    PubMed Central

    Neenan, James M; Li, Chun; Rieppel, Olivier; Bernardini, Federico; Tuniz, Claudio; Muscio, Giuseppe; Scheyer, Torsten M

    2014-01-01

    The placodonts of the Triassic period (˜252–201 mya) represent one of the earliest and most extreme specialisations to a durophagous diet of any known reptile group. Exceptionally enlarged crushing tooth plates on the maxilla, dentary and palatine cooperated to form functional crushing areas in the buccal cavity. However, the extreme size of these teeth, combined with the unusual way they occluded, constrained how replacement occurred. Using an extensive micro-computed tomographic dataset of 11 specimens that span all geographic regions and placodont morphotypes, tooth replacement patterns were investigated. In addition, the previously undescribed dental morphologies and formulae of Chinese taxa are described for the first time and incorporated into the analysis. Placodonts have a unique tooth replacement pattern and results follow a phylogenetic trend. The plesiomorphic Placodus species show many replacement teeth at various stages of growth, with little or no discernible pattern. On the other hand, the more derived cyamodontoids tend to have fewer replacement teeth growing at any one time, replacing teeth unilaterally and/or in functional units, thus maintaining at least one functional crushing area at all times. The highly derived placochelyids have fewer teeth and, as a result, only have one or two replacement teeth in the upper jaw. This supports previous suggestions that these taxa had an alternative diet to other placodonts. Importantly, all specimens show at least one replacement tooth growing at the most posterior palatine tooth plates, indicating increased wear at this point and thus the most efficient functional crushing area. PMID:24517163

  15. Curcumin promotes nerve regeneration and functional recovery after sciatic nerve crush injury in diabetic rats.

    PubMed

    Ma, Junxiong; Yu, Hailong; Liu, Jun; Chen, Yu; Wang, Qi; Xiang, Liangbi

    2016-01-01

    Curcumin is capable of promoting peripheral nerve regeneration in normal condition. However, it is unclear whether its beneficial effect on nerve regeneration still exists under diabetic mellitus. The present study was designed to investigate such a possibility. Diabetes in rats was developed by a single dose of streptozotocin at 50 mg/kg. Immediately after nerve crush injury, the diabetic rats were intraperitoneally administrated daily for 4 weeks with curcumin (50 mg/kg, 100 mg/kg and 300 mg/kg), or normal saline, respectively. The axonal regeneration was investigated by morphometric analysis and retrograde labeling. The functional recovery was evaluated by electrophysiological studies and behavioral analysis. Axonal regeneration and functional recovery was significantly enhanced by curcumin, which were significantly better than those in vehicle saline group. In addition, high doses of curcumin (100 mg/kg and 300 mg/kg) achieved better axonal regeneration and functional recovery than low dose (50 mg/kg). In conclusion, curcumin is capable of promoting nerve regeneration after sciatic nerve crush injury in diabetes mellitus, highlighting its therapeutic values as a neuroprotective agent for peripheral nerve injury repair in diabetes mellitus. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  16. Fast Exact Search in Hamming Space With Multi-Index Hashing.

    PubMed

    Norouzi, Mohammad; Punjani, Ali; Fleet, David J

    2014-06-01

    There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 bits are not being used as such, as it was thought to be ineffective. We introduce a rigorous way to build multiple hash tables on binary code substrings that enables exact k-nearest neighbor search in Hamming space. The approach is storage efficient and straight-forward to implement. Theoretical analysis shows that the algorithm exhibits sub-linear run-time behavior for uniformly distributed codes. Empirical results show dramatic speedups over a linear scan baseline for datasets of up to one billion codes of 64, 128, or 256 bits.

  17. HASH: the Hong Kong/AAO/Strasbourg Hα planetary nebula database

    NASA Astrophysics Data System (ADS)

    Parker, Quentin A.; Bojičić, Ivan S.; Frew, David J.

    2016-07-01

    By incorporating our major recent discoveries with re-measured and verified contents of existing catalogues we provide, for the first time, an accessible, reliable, on-line SQL database for essential, up-to date information for all known Galactic planetary nebulae (PNe). We have attempted to: i) reliably remove PN mimics/false ID's that have biased previous studies and ii) provide accurate positions, sizes, morphologies, multi-wavelength imagery and spectroscopy. We also provide a link to CDS/Vizier for the archival history of each object and other valuable links to external data. With the HASH interface, users can sift, select, browse, collate, investigate, download and visualise the entire currently known Galactic PNe diversity. HASH provides the community with the most complete and reliable data with which to undertake new science.

  18. Crush Can Behaviour as an Energy Absorber in a Frontal Impact

    NASA Astrophysics Data System (ADS)

    Bhuyan, Atanu; Ganilova, Olga

    2012-08-01

    The work presented is devoted to the investigation of a state-of-the-art technological solution for the design of a crush-can characterized by optimal energy absorbing properties. The work is focused on the theoretical background of the square tubes, circular tubes and inverbucktube performance under impact with the purpose of design of a novel optimized structure. The main system under consideration is based on the patent US 2008/0185851 A1 and includes a base flange with elongated crush boxes and back straps for stabilization of the crush boxes with the purpose of improvement of the energy-absorbing functionality. The modelling of this system is carried out applying both a theoretical approach and finite element analysis concentrating on the energy absorbing abilities of the crumple zones. The optimization process is validated under dynamic and quasi-static loading conditions whilst considering various modes of deformation and stress distribution along the tubular components. Energy absorbing behaviour of the crush-cans is studied concentrating on their geometrical properties and their diamond or concertina modes of deformation. Moreover, structures made of different materials, steel, aluminium and polymer composites are considered for the material effect analysis and optimization through their combination. Optimization of the crush-can behaviour is done within the limits of the frontal impact scenario with the purpose of improvement of the structural performance in the Euro NCAP tests.

  19. Significance of cannabis use to dental practice.

    PubMed

    Maloney, William James

    2011-04-01

    The illicit use of the three main forms of cannabis-marijuana, hash, hash oil-pose certain obstacles and challenges to the dental professional. There are a number of systemic, as well as oral/head and neck manifestations, associated with cannabis use. Dentists need to be aware of these manifestations in order to take whatever precautions and/or modifications to the proposed treatment that might be necessary.

  20. Portable Language-Independent Adaptive Translation from OCR. Phase 1

    DTIC Science & Technology

    2009-04-01

    including brute-force k-Nearest Neighbors ( kNN ), fast approximate kNN using hashed k-d trees, classification and regression trees, and locality...achieved by refinements in ground-truthing protocols. Recent algorithmic improvements to our approximate kNN classifier using hashed k-D trees allows...recent years discriminative training has been shown to outperform phonetic HMMs estimated using ML for speech recognition. Standard ML estimation

  1. Octadecyl Chains Immobilized onto Hyaluronic Acid Coatings by Thiol-ene "Click Chemistry" Increase the Surface Antimicrobial Properties and Prevent Platelet Adhesion and Activation to Polyurethane.

    PubMed

    Felgueiras, Helena P; Wang, L M; Ren, K F; Querido, M M; Jin, Q; Barbosa, M A; Ji, J; Martins, M C L

    2017-03-08

    Infection and thrombus formation are still the biggest challenges for the success of blood contact medical devices. This work aims the development of an antimicrobial and hemocompatible biomaterial coating through which selective binding of albumin (passivant protein) from the bloodstream is promoted and, thus, adsorption of other proteins responsible for bacterial adhesion and thrombus formation can be prevented. Polyurethane (PU) films were coated with hyaluronic acid, an antifouling agent, that was previously modified with thiol groups (HA-SH), using polydopamine as the binding agent. Octadecyl acrylate (C18) was used to attract albumin since it resembles the circulating free fatty acids and albumin is a fatty acid transporter. Thiol-ene "click chemistry" was explored for C18 immobilization on HA-SH through a covalent bond between the thiol groups from the HA and the alkene groups from the C18 chains. Surfaces were prepared with different C18 concentrations (0, 5, 10, and 20%) and successful immobilization was demonstrated by scanning electron microscopy (SEM), water contact angle determinations, X-ray photoelectron spectroscopy (XPS) and Fourier transform infrared spectroscopy (FTIR). The ability of surfaces to bind albumin selectively was determined by quartz crystal microbalance with dissipation (QCM-D). Albumin adsorption increased in response to the hydrophobic nature of the surfaces, which augmented with C18 saturation. HA-SH coating reduced albumin adsorption to PU. C18 immobilized onto HA-SH at 5% promoted selective binding of albumin, decreased Staphylococcus aureus adhesion and prevented platelet adhesion and activation to PU in the presence of human plasma. C18/HA-SH coating was established as an innovative and promising strategy to improve the antimicrobial properties and hemocompatibility of any blood contact medical device.

  2. Range image registration based on hash map and moth-flame optimization

    NASA Astrophysics Data System (ADS)

    Zou, Li; Ge, Baozhen; Chen, Lei

    2018-03-01

    Over the past decade, evolutionary algorithms (EAs) have been introduced to solve range image registration problems because of their robustness and high precision. However, EA-based range image registration algorithms are time-consuming. To reduce the computational time, an EA-based range image registration algorithm using hash map and moth-flame optimization is proposed. In this registration algorithm, a hash map is used to avoid over-exploitation in registration process. Additionally, we present a search equation that is better at exploration and a restart mechanism to avoid being trapped in local minima. We compare the proposed registration algorithm with the registration algorithms using moth-flame optimization and several state-of-the-art EA-based registration algorithms. The experimental results show that the proposed algorithm has a lower computational cost than other algorithms and achieves similar registration precision.

  3. Matching CCD images to a stellar catalog using locality-sensitive hashing

    NASA Astrophysics Data System (ADS)

    Liu, Bo; Yu, Jia-Zong; Peng, Qing-Yu

    2018-02-01

    The usage of a subset of observed stars in a CCD image to find their corresponding matched stars in a stellar catalog is an important issue in astronomical research. Subgraph isomorphic-based algorithms are the most widely used methods in star catalog matching. When more subgraph features are provided, the CCD images are recognized better. However, when the navigation feature database is large, the method requires more time to match the observing model. To solve this problem, this study investigates further and improves subgraph isomorphic matching algorithms. We present an algorithm based on a locality-sensitive hashing technique, which allocates quadrilateral models in the navigation feature database into different hash buckets and reduces the search range to the bucket in which the observed quadrilateral model is located. Experimental results indicate the effectivity of our method.

  4. Gastric pentadecapeptide BPC 157 as an effective therapy for muscle crush injury in the rat.

    PubMed

    Novinscak, Tomislav; Brcic, Luka; Staresinic, Mario; Jukic, Ivana; Radic, Bozo; Pevec, Danira; Mise, Sandro; Tomasovic, Sanja; Brcic, Iva; Banic, Tihomir; Jakir, Ana; Buljat, Gojko; Anic, Tomislav; Zoricic, Ivan; Romic, Zeljko; Seiwerth, Sven; Sikiric, Predrag

    2008-01-01

    Stable gastric pentadecapeptide BPC 157 accelerates the healing of a transected Achilles tendon and a transected quadriceps muscle. It may also be of clinical relevance as a systemic and local peptide treatment for crush injury of a major muscle, such as gastrocnemius muscle complex. BPC 157 is effective without a carrier, and it is presently undergoing trials for inflammatory bowel disease, and no toxicity has so far been reported. In crushed rats (force delivered 0.727 Ns/cm2), BPC 157 was applied either intraperitoneally or locally, as a thin cream layer, immediately after injury (sacrifice at 2 h), and once a day for 14 days. BPC 157 improved muscle healing, macroscopically (less hematoma and edema, no post-injury leg contracture), microscopically, functionally, and also based on enzyme activity (creatine kinase, lactate dehydrogenase, aspartate aminotransferase, alanine aminotransferase). BPC 157, at all investigated intervals, given locally or intraperitoneally, accelerated post-injury muscle healing and also helped to restore the full function.

  5. Swimming Exercise in the Acute or Late Phase after Sciatic Nerve Crush Accelerates Nerve Regeneration

    PubMed Central

    Teodori, Rosana Macher; Betini, Joice; de Oliveira, Larissa Salgado; Sobral, Luciane Lobato; Takeda, Sibele Yoko Mattozo; Montebelo, Maria Imaculada de Lima

    2011-01-01

    There is no consensus about the best time to start exercise after peripheral nerve injury. We evaluated the morphological and functional characteristics of the sciatic nerves of rats that began to swim immediately after crush nerve injury (CS1), those that began to swim 14 days after injury (CS14), injured rats not submitted to swimming (C), and uninjured rats submitted to swimming (S). After 30 days the number of axons in CS1 and CS14 was lower than in C (P < 0.01). The diameter of axons and nerve fibers was larger in CS1 (P < 0.01) and CS14 (P < 0.05) than in C, and myelin sheath thickness was lower in all crushed groups (P < 0.05). There was no functional difference between CS1 and CS14 (P > 0.05). Swimming exercise applied during the acute or late phase of nerve injury accelerated nerve regeneration and synaptic elimination after axonotmesis, suggesting that exercise may be initiated immediately after injury. PMID:21876821

  6. Experimental Characterization of the Energy Absorption of Functionally Graded Foam Filled Tubes Under Axial Crushing Loads

    NASA Astrophysics Data System (ADS)

    Ebrahimi, Saeed; Vahdatazad, Nader; Liaghat, Gholamhossein

    2018-03-01

    This paper deals with the energy absorption characterization of functionally graded foam (FGF) filled tubes under axial crushing loads by experimental method. The FGF tubes are filled axially by gradient layers of polyurethane foams with different densities. The mechanical properties of the polyurethane foams are firstly obtained from axial compressive tests. Then, the quasi-static compressive tests are carried out for empty tubes, uniform foam filled tubes and FGF filled tubes. Before to present the experimental test results, a nonlinear FEM simulation of the FGF filled tube is carried out in ABAQUS software to gain more insight into the crush deformation patterns, as well as the energy absorption capability of the FGF filled tube. A good agreement between the experimental and simulation results is observed. Finally, the results of experimental test show that an FGF filled tube has excellent energy absorption capacity compared to the ordinary uniform foam-filled tube with the same weight.

  7. [Experimental study on establishment of a simple model of rats crush injury-crush syndrome].

    PubMed

    Chen, Xi; Liu, Yuehong; Xu, Wei; Qin, Tingwu; Zhao, Luping; Liu, Shuping; Zhang, Yi; Tan, Hong; Zhou, Yu

    2013-01-01

    To establish a repeatable, simple, and effective model of rat crush injury and crush syndrome. A total of 42 female Sprague Dawley rats (2-month-old, (CS) so as to lay a foundation for further study on CS. weighing 160-180 g) were divided randomly into the control group (n=6) and experimental group (n=36). The rats of the experimental group were used to establish the crush injury and CS model in both lower limbs by self-made crush injury mould. The survival rate and hematuria rate were observed after decompression. The biochemical indexes of blood were measured at 2, 4, 8, 12, 24, and 48 hours after decompression. The samples of muscle, kidney, and heart were harvested for morphological observation. There was no treatment in the control group, and the same tests were performed. Seven rats died and 15 rats had hematuria during compression in the experimental group. Swelling of the lower limb and muscle tissue was observed in the survival rats after reperfusion. The liver function test results showed that the levels of alanine transaminase and aspartate aminotransferase in the experimental group were significantly higher than those in the control group (P < 0.05). The renal function test results showed that blood urea nitrogen level increased significantly after 2 hours of decompression in the experimental group, showing significant difference when compared with that in the control group at 12, 24, and 48 hours after decompression (P < 0.05); the creatinine level of the experimental group was higher than that of the control group at 4, 8, 12, and 24 hours, showing significant difference at 8, 12, and 24 hours (P < 0.05). The serum K+ concentration of the experimental group was higher than that of the control group at all time, showing significant difference at the other time (P < 0.05) except at 2 hours. The creatine kinase level showed an increasing tendency in the experimental group, showing significant difference when compared with the level of the control group at 4, 8, 12, and 24 hours (P < 0.05). The histological examination of the experimental group showed that obvious edema and necrosis of the muscle were observed at different time points; glomeruli congestion and swelling, renal tubular epithelial cell degeneration, edema, necrosis, and myoglobin tube type were found in the kidneys; and myocardial structure had no obvious changes. The method of the crush injury and CS model by self-made crush injury mould is a simple and effective procedure and the experimental result is stable. It is a simple method to establish an effective model of rats crush injury and CS.

  8. Architectural design of an Algol interpreter

    NASA Technical Reports Server (NTRS)

    Jackson, C. K.

    1971-01-01

    The design of a syntax-directed interpreter for a subset of Algol is described. It is a conceptual design with sufficient details and completeness but as much independence of implementation as possible. The design includes a detailed description of a scanner, an analyzer described in the Floyd-Evans productions, a hash-coded symbol table, and an executor. Interpretation of sample programs is also provided to show how the interpreter functions.

  9. Discrete cosine transform and hash functions toward implementing a (robust-fragile) watermarking scheme

    NASA Astrophysics Data System (ADS)

    Al-Mansoori, Saeed; Kunhu, Alavi

    2013-10-01

    This paper proposes a blind multi-watermarking scheme based on designing two back-to-back encoders. The first encoder is implemented to embed a robust watermark into remote sensing imagery by applying a Discrete Cosine Transform (DCT) approach. Such watermark is used in many applications to protect the copyright of the image. However, the second encoder embeds a fragile watermark using `SHA-1' hash function. The purpose behind embedding a fragile watermark is to prove the authenticity of the image (i.e. tamper-proof). Thus, the proposed technique was developed as a result of new challenges with piracy of remote sensing imagery ownership. This led researchers to look for different means to secure the ownership of satellite imagery and prevent the illegal use of these resources. Therefore, Emirates Institution for Advanced Science and Technology (EIAST) proposed utilizing existing data security concept by embedding a digital signature, "watermark", into DubaiSat-1 satellite imagery. In this study, DubaiSat-1 images with 2.5 meter resolution are used as a cover and a colored EIAST logo is used as a watermark. In order to evaluate the robustness of the proposed technique, a couple of attacks are applied such as JPEG compression, rotation and synchronization attacks. Furthermore, tampering attacks are applied to prove image authenticity.

  10. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    PubMed Central

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  11. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  12. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  13. Contractile properties of rat fast-twitch skeletal muscle during reinnervation - Effects of testosterone and castration

    NASA Technical Reports Server (NTRS)

    Yeagle, S. P.; Mayer, R. F.; Max, S. R.

    1983-01-01

    The peroneal nerve of subject rats were crushed 1 cm from the muscle in order to examine the isometric contractile properties of skeletal muscle in the recovery sequency during reinnervation of normal, castrated, and testosterone-treated rats. The particular muscle studied was the extensor digitorum longus, with functional reinnervation first observed 8-9 days after nerve crush. No evidence was found that either castration or testosterone injections altered the process of reinnervation after the nerve crush, with the conclusion being valid at the 0.05 p level. The most reliable index of reinnervation was found to be the twitch:tetanus ratio, a factor of use in future studies of the reinnervation of skeletal muscle.

  14. The effect of cavernous nerve traction on erectile function in rats

    PubMed Central

    Chen, Liping; Wang, Tao; Wang, Shaogang; Liu, Jihong

    2017-01-01

    We performed this study to evaluate the effect of cavernous nerve (CN) traction on erectile function in rats. Thirty-two 8- week-old Sprague–Dawley rats were divided into four groups: control, 1-minute CN traction, 2-minute CN traction, and 2-minute CN crush. CN traction was performed using a glass hook with a tensile force of 0.2 Newton. One month later, the mean arterial pressure (MAP) and intracavernosal pressure (ICP) in response to CN stimulation were measured to assess erectile function. The penis and major pelvic ganglion (MPG) were harvested to explore the expression of neuronal nitric oxide synthase (nNOS) and neurofilament, fibrosis and apoptosis. The ICP/MAP ratio was reduced in the 2-minute CN traction group compared with the control group (P < 0.05). The ICP/MAP ratio in the CN crush group was lower than in the other three groups (P < 0.05, for each). Expression of nNOS in both MPG and dorsal penile nerve was lower in the CN traction group than in the control group, but was higher than in the CN crush group (P < 0.05). Nerve fiber number in the dorsal penile nerve was reduced by 2-minute CN traction (P < 0.05). The ratios of collagen to smooth muscle content and the apoptosis were both increased the in 2-minute CN traction group compared with the control group (P < 0.05). The findings indicate that CN traction is an effective CN injury model and the injury it caused is relatively mild compared with the CN crush model. PMID:28982169

  15. A Tree Locality-Sensitive Hash for Secure Software Testing

    DTIC Science & Technology

    2017-09-14

    errors, or to look for vulnerabilities that could allow a nefarious actor to use our software against us. Ultimately, all testing is designed to find...and an equivalent number of feasible paths discovered by Klee. 1.5 Summary This document the Tree Locality-Sensitive Hash (TLSH), a locality-senstive...performing two groups of tests that verify the accuracy and usefulness of TLSH. Chapter 5 summarizes the contents of the dissertation and lists avenues

  16. Checking Questionable Entry of Personally Identifiable Information Encrypted by One-Way Hash Transformation

    PubMed Central

    Chen, Xianlai; Fann, Yang C; McAuliffe, Matthew; Vismer, David

    2017-01-01

    Background As one of the several effective solutions for personal privacy protection, a global unique identifier (GUID) is linked with hash codes that are generated from combinations of personally identifiable information (PII) by a one-way hash algorithm. On the GUID server, no PII is permitted to be stored, and only GUID and hash codes are allowed. The quality of PII entry is critical to the GUID system. Objective The goal of our study was to explore a method of checking questionable entry of PII in this context without using or sending any portion of PII while registering a subject. Methods According to the principle of GUID system, all possible combination patterns of PII fields were analyzed and used to generate hash codes, which were stored on the GUID server. Based on the matching rules of the GUID system, an error-checking algorithm was developed using set theory to check PII entry errors. We selected 200,000 simulated individuals with randomly-planted errors to evaluate the proposed algorithm. These errors were placed in the required PII fields or optional PII fields. The performance of the proposed algorithm was also tested in the registering system of study subjects. Results There are 127,700 error-planted subjects, of which 114,464 (89.64%) can still be identified as the previous one and remaining 13,236 (10.36%, 13,236/127,700) are discriminated as new subjects. As expected, 100% of nonidentified subjects had errors within the required PII fields. The possibility that a subject is identified is related to the count and the type of incorrect PII field. For all identified subjects, their errors can be found by the proposed algorithm. The scope of questionable PII fields is also associated with the count and the type of the incorrect PII field. The best situation is to precisely find the exact incorrect PII fields, and the worst situation is to shrink the questionable scope only to a set of 13 PII fields. In the application, the proposed algorithm can give a hint of questionable PII entry and perform as an effective tool. Conclusions The GUID system has high error tolerance and may correctly identify and associate a subject even with few PII field errors. Correct data entry, especially required PII fields, is critical to avoiding false splits. In the context of one-way hash transformation, the questionable input of PII may be identified by applying set theory operators based on the hash codes. The count and the type of incorrect PII fields play an important role in identifying a subject and locating questionable PII fields. PMID:28213343

  17. Checking Questionable Entry of Personally Identifiable Information Encrypted by One-Way Hash Transformation.

    PubMed

    Chen, Xianlai; Fann, Yang C; McAuliffe, Matthew; Vismer, David; Yang, Rong

    2017-02-17

    As one of the several effective solutions for personal privacy protection, a global unique identifier (GUID) is linked with hash codes that are generated from combinations of personally identifiable information (PII) by a one-way hash algorithm. On the GUID server, no PII is permitted to be stored, and only GUID and hash codes are allowed. The quality of PII entry is critical to the GUID system. The goal of our study was to explore a method of checking questionable entry of PII in this context without using or sending any portion of PII while registering a subject. According to the principle of GUID system, all possible combination patterns of PII fields were analyzed and used to generate hash codes, which were stored on the GUID server. Based on the matching rules of the GUID system, an error-checking algorithm was developed using set theory to check PII entry errors. We selected 200,000 simulated individuals with randomly-planted errors to evaluate the proposed algorithm. These errors were placed in the required PII fields or optional PII fields. The performance of the proposed algorithm was also tested in the registering system of study subjects. There are 127,700 error-planted subjects, of which 114,464 (89.64%) can still be identified as the previous one and remaining 13,236 (10.36%, 13,236/127,700) are discriminated as new subjects. As expected, 100% of nonidentified subjects had errors within the required PII fields. The possibility that a subject is identified is related to the count and the type of incorrect PII field. For all identified subjects, their errors can be found by the proposed algorithm. The scope of questionable PII fields is also associated with the count and the type of the incorrect PII field. The best situation is to precisely find the exact incorrect PII fields, and the worst situation is to shrink the questionable scope only to a set of 13 PII fields. In the application, the proposed algorithm can give a hint of questionable PII entry and perform as an effective tool. The GUID system has high error tolerance and may correctly identify and associate a subject even with few PII field errors. Correct data entry, especially required PII fields, is critical to avoiding false splits. In the context of one-way hash transformation, the questionable input of PII may be identified by applying set theory operators based on the hash codes. The count and the type of incorrect PII fields play an important role in identifying a subject and locating questionable PII fields. ©Xianlai Chen, Yang C Fann, Matthew McAuliffe, David Vismer, Rong Yang. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 17.02.2017.

  18. Combinatorial treatments enhance recovery following facial nerve crush.

    PubMed

    Sharma, Nijee; Moeller, Carl W; Marzo, Sam J; Jones, Kathryn J; Foecking, Eileen M

    2010-08-01

    To investigate the effects of various combinatorial treatments, consisting of a tapering dose of prednisone (P), a brief period of nerve electrical stimulation (ES), and systemic testosterone propionate (TP) on improving functional recovery following an intratemporal facial nerve crush injury. Prospective, controlled animal study. After a right intratemporal facial nerve crush, adult male Sprague-Dawley rats were divided into the following eight treatment groups: 1) no treatment, 2) P only, 3) ES only, 4) ES + P, 5) TP only, 6) TP + P, 7) ES + TP, and 8) ES + TP + P. For each group n = 4-8. Recovery of the eyeblink reflex and vibrissae orientation and movement were assessed. Changes in peak amplitude and latency of evoked response, in response to facial nerve stimulation, was also recorded weekly. : Brief ES of the proximal nerve stump most effectively accelerated the initiation of functional recovery. Also, ES or TP treatments enhanced recovery of some functional parameters more than P treatment. When administered alone, none of the three treatments improved recovery of complete facial function. Only the combinatorial treatment of ES + TP, regardless of the presence of P, accelerated complete functional recovery and return of normal motor nerve conduction. Our findings suggest that a combinatorial treatment strategy of using brief ES and TP together promises to be an effective therapeutic intervention for promoting regeneration following facial nerve injury. Administration of P neither augments nor hinders recovery.

  19. Status of MAPA (Modular Accelerator Physics Analysis) and the Tech-X Object-Oriented Accelerator Library

    NASA Astrophysics Data System (ADS)

    Cary, J. R.; Shasharina, S.; Bruhwiler, D. L.

    1998-04-01

    The MAPA code is a fully interactive accelerator modeling and design tool consisting of a GUI and two object-oriented C++ libraries: a general library suitable for treatment of any dynamical system, and an accelerator library including many element types plus an accelerator class. The accelerator library inherits directly from the system library, which uses hash tables to store any relevant parameters or strings. The GUI can access these hash tables in a general way, allowing the user to invoke a window displaying all relevant parameters for a particular element type or for the accelerator class, with the option to change those parameters. The system library can advance an arbitrary number of dynamical variables through an arbitrary mapping. The accelerator class inherits this capability and overloads the relevant functions to advance the phase space variables of a charged particle through a string of elements. Among other things, the GUI makes phase space plots and finds fixed points of the map. We discuss the object hierarchy of the two libraries and use of the code.

  20. Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree

    2004-10-01

    We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof ofmore » security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.« less

  1. ProGeRF: Proteome and Genome Repeat Finder Utilizing a Fast Parallel Hash Function

    PubMed Central

    Moraes, Walas Jhony Lopes; Rodrigues, Thiago de Souza; Bartholomeu, Daniella Castanheira

    2015-01-01

    Repetitive element sequences are adjacent, repeating patterns, also called motifs, and can be of different lengths; repetitions can involve their exact or approximate copies. They have been widely used as molecular markers in population biology. Given the sizes of sequenced genomes, various bioinformatics tools have been developed for the extraction of repetitive elements from DNA sequences. However, currently available tools do not provide options for identifying repetitive elements in the genome or proteome, displaying a user-friendly web interface, and performing-exhaustive searches. ProGeRF is a web site for extracting repetitive regions from genome and proteome sequences. It was designed to be efficient, fast, and accurate and primarily user-friendly web tool allowing many ways to view and analyse the results. ProGeRF (Proteome and Genome Repeat Finder) is freely available as a stand-alone program, from which the users can download the source code, and as a web tool. It was developed using the hash table approach to extract perfect and imperfect repetitive regions in a (multi)FASTA file, while allowing a linear time complexity. PMID:25811026

  2. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  3. HECLIB. Volume 2: HECDSS Subroutines Programmer’s Manual

    DTIC Science & Technology

    1991-05-01

    algorithm and hierarchical design for database accesses. This algorithm provides quick access to data sets and an efficient means of adding new data set...Description of How DSS Works DSS version 6 utilizes a modified hash algorithm based upon the pathname to store and retrieve data. This structure allows...balancing disk space and record access times. A variation in this algorithm is for "stable" files. In a stable file, a hash table is not utilized

  4. Stable carbon and oxygen isotope record of central Lake Erie sediments

    USGS Publications Warehouse

    Tevesz, M.J.S.; Spongberg, A.L.; Fuller, J.A.

    1998-01-01

    Stable carbon and oxygen isotope data from mollusc aragonite extracted from sediment cores provide new information on the origin and history of sedimentation in the southwestern area of the central basin of Lake Erie. Sediments infilling the Sandusky subbasin consist of three lithologic units overlying glacial deposits. The lowest of these is a soft gray mud overlain by a shell hash layer containing Sphaerium striatinum fragments. A fluid mud unit caps the shell hash layer and extends upwards to the sediment-water interface. New stable isotope data suggest that the soft gray mud unit is of postglacial, rather than proglacial, origin. These data also suggest that the shell hash layer was derived from erosional winnowing of the underlying soft gray mud layer. This winnowing event may have occurred as a result of the Nipissing flood. The Pelee-Lorain moraine, which forms the eastern boundary of the Sandusky subbasin, is an elevated area of till capped by a sand deposit that originated as a beach. The presence of both the shell hash layer and relict beach deposit strengthens the interpretation that the Nipissing flood was a critical event in the development of the southwestern area of the central basin of Lake Erie. This event, which returned drainage from the upper lakes to the Lake Erie basin, was a dominant influence on regional stratigraphy, bathymetry, and depositional setting.

  5. Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

    PubMed Central

    Chen, Huifang; Xie, Lei

    2014-01-01

    Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC) and the revocation polynomial (RP), the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked. PMID:25529204

  6. Generating region proposals for histopathological whole slide image retrieval.

    PubMed

    Ma, Yibing; Jiang, Zhiguo; Zhang, Haopeng; Xie, Fengying; Zheng, Yushan; Shi, Huaqiang; Zhao, Yu; Shi, Jun

    2018-06-01

    Content-based image retrieval is an effective method for histopathological image analysis. However, given a database of huge whole slide images (WSIs), acquiring appropriate region-of-interests (ROIs) for training is significant and difficult. Moreover, histopathological images can only be annotated by pathologists, resulting in the lack of labeling information. Therefore, it is an important and challenging task to generate ROIs from WSI and retrieve image with few labels. This paper presents a novel unsupervised region proposing method for histopathological WSI based on Selective Search. Specifically, the WSI is over-segmented into regions which are hierarchically merged until the WSI becomes a single region. Nucleus-oriented similarity measures for region mergence and Nucleus-Cytoplasm color space for histopathological image are specially defined to generate accurate region proposals. Additionally, we propose a new semi-supervised hashing method for image retrieval. The semantic features of images are extracted with Latent Dirichlet Allocation and transformed into binary hashing codes with Supervised Hashing. The methods are tested on a large-scale multi-class database of breast histopathological WSIs. The results demonstrate that for one WSI, our region proposing method can generate 7.3 thousand contoured regions which fit well with 95.8% of the ROIs annotated by pathologists. The proposed hashing method can retrieve a query image among 136 thousand images in 0.29 s and reach precision of 91% with only 10% of images labeled. The unsupervised region proposing method can generate regions as predictions of lesions in histopathological WSI. The region proposals can also serve as the training samples to train machine-learning models for image retrieval. The proposed hashing method can achieve fast and precise image retrieval with small amount of labels. Furthermore, the proposed methods can be potentially applied in online computer-aided-diagnosis systems. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. Differential motor and sensory functional recovery in male but not female adult rats is associated with remyelination rather than axon regeneration after sciatic nerve crush.

    PubMed

    Tong, Ling-Ling; Ding, You-Quan; Jing, Hong-Bo; Li, Xuan-Yang; Qi, Jian-Guo

    2015-05-06

    Peripheral nerve functional recovery after injuries relies on both axon regeneration and remyelination. Both axon regeneration and remyelination require intimate interactions between regenerating neurons and their accompanying Schwann cells. Previous studies have shown that motor and sensory neurons are intrinsically different in their regeneration potentials. Moreover, denervated Schwann cells accompanying myelinated motor and sensory axons have distinct gene expression profiles for regeneration-associated growth factors. However, it is unknown whether differential motor and sensory functional recovery exists. If so, the particular one among axon regeneration and remyelination responsible for this difference remains unclear. Here, we aimed to establish an adult rat sciatic nerve crush model with the nonserrated microneedle holders and measured rat motor and sensory functions during regeneration. Furthermore, axon regeneration and remyelination was evaluated by morphometric analysis of electron microscopic images on the basis of nerve fiber classification. Our results showed that Aα fiber-mediated motor function was successfully recovered in both male and female rats. Aδ fiber-mediated sensory function was partially restored in male rats, but completely recovered in female littermates. For both male and female rats, the numbers of regenerated motor and sensory axons were quite comparable. However, remyelination was diverse among myelinated motor and sensory nerve fibers. In detail, Aβ and Aδ fibers incompletely remyelinated in male, but not female rats, whereas Aα fibers fully remyelinated in both sexes. Our result indicated that differential motor and sensory functional recovery in male but not female adult rats is associated with remyelination rather than axon regeneration after sciatic nerve crush.

  8. Improving Sector Hash Carving with Rule-Based and Entropy-Based Non-Probative Block Filters

    DTIC Science & Technology

    2015-03-01

    0x20 exceeds the histogram rule’s threshold of 256 instances of a single 4-byte value. The 0x20 bytes are part of an Extensible Metadata Platform (XMP...block consists of data separated by NULL bytes of padding. The histogram rule is triggered for the block because the block contains more than 256 4...sdash can reduce the rate of false positive matches. After characteristic features have been selected, the features are hashed using SHA -1, which creates

  9. Design Considerations for a Computationally-Lightweight Authentication Mechanism for Passive RFID Tags

    DTIC Science & Technology

    2009-09-01

    suffer the power and complexity requirements of a public key system. 28 In [18], a simulation of the SHA –1 algorithm is performed on a Xilinx FPGA ... 256 bits. Thus, the construction of a hash table would need 2512 independent comparisons. It is known that hash collisions of the SHA –1 algorithm... SHA –1 algorithm for small-core FPGA design. Small-core FPGA design is the process by which a circuit is adapted to use the minimal amount of logic

  10. Anomalous trapping of noble gases during sample crushing

    NASA Astrophysics Data System (ADS)

    Cox, S. E.; Miller, H.; Farley, K. A.; Hofmann, F.

    2017-12-01

    Fine-grained mineral samples are commonly analyzed for noble gas composition. Many coarse minerals contain inclusions that require that the samples be crushed and purified before analysis. Other samples are crushed because fine-grained samples may be degassed at lower temperature. And many rocks lack coarse mineral grains entirely. Protin et al. (2016) showed that crushed fine-grained olivine absorbs He from the atmosphere and retains it under heating to at least 900 degrees. We show that the act of crushing itself is responsible for the vast majority of this trapping. Samples crushed in the presence of pure He retain 25 times as much He as samples crushed in vacuum and immediately exposed to pure helium. We tested several ways to mitigate this problem, including acid leaching and crushing under a liquid. We find that crushing samples under water is the simplest, most effective way to avoid contamination with He during crushing. This approach resulted in no significant contamination of crushed fine-grained olivine, even when the submerged crushing was conducted under a headspace of pure He. Protin, M. (2016), et al. GCA 179, 76-88.

  11. Ordered versus Unordered Map for Primitive Data Types

    DTIC Science & Technology

    2015-09-01

    mapped to some element. C++ provides two types of map containers within the standard template library, the std ::map and the std ::unordered_map...classes. As the name implies, the containers main functional difference is that the elements in the std ::map are ordered by the key, and the std ...unordered_map are not ordered based on their key. The std ::unordered_map elements are placed into “buckets” based on a hash value computed for their key

  12. Comparison of Spatiotemporal Mapping Techniques for Enormous Etl and Exploitation Patterns

    NASA Astrophysics Data System (ADS)

    Deiotte, R.; La Valley, R.

    2017-10-01

    The need to extract, transform, and exploit enormous volumes of spatiotemporal data has exploded with the rise of social media, advanced military sensors, wearables, automotive tracking, etc. However, current methods of spatiotemporal encoding and exploitation simultaneously limit the use of that information and increase computing complexity. Current spatiotemporal encoding methods from Niemeyer and Usher rely on a Z-order space filling curve, a relative of Peano's 1890 space filling curve, for spatial hashing and interleaving temporal hashes to generate a spatiotemporal encoding. However, there exist other space-filling curves, and that provide different manifold coverings that could promote better hashing techniques for spatial data and have the potential to map spatiotemporal data without interleaving. The concatenation of Niemeyer's and Usher's techniques provide a highly efficient space-time index. However, other methods have advantages and disadvantages regarding computational cost, efficiency, and utility. This paper explores the several methods using a range of sizes of data sets from 1K to 10M observations and provides a comparison of the methods.

  13. Crush Testing at Oak Ridge National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feldman, Matthew R

    2011-01-01

    The dynamic crush test is required in the certification testing of some small Type B transportation packages. International Atomic Energy Agency regulations state that the test article must be 'subjected to a dynamic crush test by positioning the specimen on the target so as to suffer maximum damage.' Oak Ridge National Laboratory (ORNL) Transportation Technologies Group performs testing of Type B transportation packages, including the crush test, at the National Transportation Research Center in Knoxville, Tennessee (United States). This paper documents ORNL's experiences performing crush tests on several different Type B packages. ORNL has crush tested five different drum-type packagemore » designs, continuing its 60 year history of RAM package testing. A total of 26 crush tests have been performed in a wide variety of package orientations and crush plate CG alignments. In all cases, the deformation of the outer drum created by the crush test was significantly greater than the deformation damage caused by the 9 m drop test. The crush test is a highly effective means for testing structural soundness of smaller nondense Type B shipping package designs. Further regulatory guidance could alleviate the need to perform the crush test in a wide range of orientations and crush plate CG alignments.« less

  14. Automation for Crushing and Screening Equipment to Produce Graded Paving Crushed Stone

    NASA Astrophysics Data System (ADS)

    Tikhonov, Anatoly; Velichkin, Vladimir

    2017-10-01

    This paper offers analysis of factors related to production and storage of graded crushed stone, which adversely impact the service life and wear resistance of asphalt-concrete motor road pavements. The paper describes external and technology-related parameters that may cause changes of the preset ratio in graded crushed stone. Control factors are described that ensure the formulated fraction ratio in crushed stone by controlling the operation mode of the crushing and screening equipment. The paper also contains an ACS flow chart for crushing and screening equipment engaged in continuous closed-cycle two-stage technology. Performance of the ACS to maintain the preset fractionated crushed stone ratio has been confirmed with a mathematical model.

  15. Community Detection in Sparse Random Networks

    DTIC Science & Technology

    2013-08-13

    if, (i, j) ∈ E , meaning there is an edge between nodes i, j ∈ V. Note that W is symmetric, and we assume that Wii = 0 for all i. Under the null... Wii = 0.) Our arguments are parallel to those we used under P0, the only difficulty being that Wi is not binomial anymore. Indeed, WSi ∼ Bin(n − 1, p1...Berlin: Springer. Alon, N. and S. Gutner (2010). Balanced families of perfect hash functions and their applications. ACM Trans. Algorithms 6 (3), Art

  16. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Jinbin, E-mail: jbzheng518@163.com

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  17. An efficient (t,n) threshold quantum secret sharing without entanglement

    NASA Astrophysics Data System (ADS)

    Qin, Huawang; Dai, Yuewei

    2016-04-01

    An efficient (t,n) threshold quantum secret sharing (QSS) scheme is proposed. In our scheme, the Hash function is used to check the eavesdropping, and no particles need to be published. So the utilization efficiency of the particles is real 100%. No entanglement is used in our scheme. The dealer uses the single particles to encode the secret information, and the participants get the secret through measuring the single particles. Compared to the existing schemes, our scheme is simpler and more efficient.

  18. Deep Hashing for Scalable Image Search.

    PubMed

    Lu, Jiwen; Liong, Venice Erin; Zhou, Jie

    2017-05-01

    In this paper, we propose a new deep hashing (DH) approach to learn compact binary codes for scalable image search. Unlike most existing binary codes learning methods, which usually seek a single linear projection to map each sample into a binary feature vector, we develop a deep neural network to seek multiple hierarchical non-linear transformations to learn these binary codes, so that the non-linear relationship of samples can be well exploited. Our model is learned under three constraints at the top layer of the developed deep network: 1) the loss between the compact real-valued code and the learned binary vector is minimized, 2) the binary codes distribute evenly on each bit, and 3) different bits are as independent as possible. To further improve the discriminative power of the learned binary codes, we extend DH into supervised DH (SDH) and multi-label SDH by including a discriminative term into the objective function of DH, which simultaneously maximizes the inter-class variations and minimizes the intra-class variations of the learned binary codes with the single-label and multi-label settings, respectively. Extensive experimental results on eight widely used image search data sets show that our proposed methods achieve very competitive results with the state-of-the-arts.

  19. Regeneration of synapses in the olfactory pathway of locusts after antennal deafferentation.

    PubMed

    Wasser, Hannah; Stern, Michael

    2017-10-01

    The olfactory pathway of the locust is capable of fast and precise regeneration on an anatomical level. Following deafferentation of the antenna either of young adult locusts, or of fifth instar nymphs, severed olfactory receptor neurons (ORNs) reinnervate the antennal lobe (AL) and arborize in AL microglomeruli. In the present study we tested whether these regenerated fibers establish functional synapses again. Intracellular recordings from AL projection neurons revealed that the first few odor stimulus evoked postsynaptic responses from regenerated ORNs from day 4-7 post crush on. On average, synaptic connections of regenerated afferents appeared faster in younger locusts operated as fifth instar nymphs than in adults. The proportions of response categories (excitatory vs. inhibitory) changed during regeneration, but were back to normal within 21 days. Odor-evoked oscillating extracellular local field potentials (LFP) were recorded in the mushroom body. These responses, absent after antennal nerve crush, reappeared, in a few animals as soon as 4 days post crush. Odor-induced oscillation patterns were restored within 7 days post crush. Both intra- and extracellular recordings indicate the capability of the locust olfactory system to re-establish synaptic contacts in the antennal lobe after antennal nerve lesion.

  20. Rivaroxaban crushed tablet suspension characteristics and relative bioavailability in healthy adults when administered orally or via nasogastric tube.

    PubMed

    Moore, Kenneth T; Krook, Mark A; Vaidyanathan, Seema; Sarich, Troy C; Damaraju, C V; Fields, Larry E

    2014-07-01

    Because some patients have difficulty swallowing a whole tablet, we investigated the relative bioavailability of a crushed 20 mg rivaroxaban tablet and of 2 alternative crushed tablet dosing strategies. Stability and nasogastric (NG) tube adsorption characteristics of a crushed rivaroxaban tablet were assessed. Then, in 55 healthy adults, relative bioavailability of rivaroxaban administered orally as a whole tablet (Reference [Whole-Oral]), crushed tablet in applesauce suspension (Crushed-Oral), or crushed tablet in water suspension via NG tube (Crushed-NG) were determined. There were no significant changes in mean percent of non-degraded rivaroxaban recovered over 4 hours from crushed tablet suspensions (>98.4% recovery across all suspensions and time points) or after NG tube exposure (recovery: 99.1% for silicone and 98.9% for polyvinyl chloride NG tubes). Relative bioavailability was similar between Crushed-Oral and Reference dosing (Cmax and AUC∞ were within the 80-125% bioequivalence limits). Relative bioavailability was also similar between the Crushed-NG and Reference dosing (AUC∞ was within bioequivalence limits; Cmax [90% CI range: 78.5-85.8%] was only slightly below the 80% lower bioequivalence limit). A crushed rivaroxaban tablet was stable and when administered orally or via NG tube, displayed similar relative bioavailability compared to a whole tablet administered orally. © 2014, The American College of Clinical Pharmacology.

  1. Deficient functional recovery after facial nerve crush in rats is associated with restricted rearrangements of synaptic terminals in the facial nucleus.

    PubMed

    Hundeshagen, G; Szameit, K; Thieme, H; Finkensieper, M; Angelov, D N; Guntinas-Lichius, O; Irintchev, A

    2013-09-17

    Crush injuries of peripheral nerves typically lead to axonotmesis, axonal damage without disruption of connective tissue sheaths. Generally, human patients and experimental animals recover well after axonotmesis and the favorable outcome has been attributed to precise axonal reinnervation of the original peripheral targets. Here we assessed functionally and morphologically the long-term consequences of facial nerve axonotmesis in rats. Expectedly, we found that 5 months after crush or cryogenic nerve lesion, the numbers of motoneurons with regenerated axons and their projection pattern into the main branches of the facial nerve were similar to those in control animals suggesting precise target reinnervation. Unexpectedly, however, we found that functional recovery, estimated by vibrissal motion analysis, was incomplete at 2 months after injury and did not improve thereafter. The maximum amplitude of whisking remained substantially, by more than 30% lower than control values even 5 months after axonotmesis. Morphological analyses showed that the facial motoneurons ipsilateral to injury were innervated by lower numbers of glutamatergic terminals (-15%) and cholinergic perisomatic boutons (-26%) compared with the contralateral non-injured motoneurons. The structural deficits were correlated with functional performance of individual animals and associated with microgliosis in the facial nucleus but not with polyinnervation of muscle fibers. These results support the idea that restricted CNS plasticity and insufficient afferent inputs to motoneurons may substantially contribute to functional deficits after facial nerve injuries, possibly including pathologic conditions in humans like axonotmesis in idiopathic facial nerve (Bell's) palsy. Copyright © 2013 IBRO. Published by Elsevier Ltd. All rights reserved.

  2. Having and Being an Other-Sex Crush during Early Adolescence

    ERIC Educational Resources Information Center

    Bowker, Julie C.; Spencer, Sarah V.; Thomas, Katelyn K.; Gyoerkoe, Elizabeth A.

    2012-01-01

    This study examined other-sex crush experiences (both having and being perceived as an other-sex crush) among 544 young adolescents (mean age = 12.74 years). Results indicated that 56% had at least one current other-sex crush, with little overlap between crushes, friends, and boyfriends/girlfriends. Significant associations between other-sex crush…

  3. Hydrogen-rich saline promotes survival of retinal ganglion cells in a rat model of optic nerve crush.

    PubMed

    Sun, Jing-chuan; Xu, Tao; Zuo, Qiao; Wang, Ruo-bing; Qi, Ai-qing; Cao, Wen-luo; Sun, Ai-jun; Sun, Xue-jun; Xu, Jiajun

    2014-01-01

    To investigate the effect of molecular hydrogen (H2) in a rat model subjected to optic nerve crush (ONC). We tested the hypothesis that after optic nerve crush (ONC), retinal ganglion cell (RGC) could be protected by H₂. Rats in different groups received saline or hydrogen-rich saline every day for 14 days after ONC. Retinas from animals in each group underwent measurements of hematoxylin and eosin (H&E) staining, cholera toxin beta (CTB) tracing, gamma synuclein staining, and terminal deoxynucleotidyltransferase-mediated dUTP nick end labeling (TUNEL) staining 2 weeks post operation. Flash visual evoked potentials (FVEP) and pupillary light reflex (PLR) were then tested to evaluate the function of optic nerve. The malondialdehyde (MDA) level in retina was evaluated. H&E, gamma synuclein staining and CTB tracing showed that the survival rate of RGCs in hydrogen saline-treated group was significantly higher than that in saline-treated group. Apoptosis of RGCs assessed by TUNEL staining were less observed in hydrogen saline-treated group. The MDA level in retina of H₂ group was much lower than that in placebo group. Furthermore, animals treated with hydrogen saline showed better function of optic nerve in assessments of FVEP and PLR. These results demonstrated that H₂ protects RGCs and helps preserve the visual function after ONC and had a neuroprotective effect in a rat model subjected to ONC.

  4. Using global unique identifiers to link autism collections.

    PubMed

    Johnson, Stephen B; Whitney, Glen; McAuliffe, Matthew; Wang, Hailong; McCreedy, Evan; Rozenblit, Leon; Evans, Clark C

    2010-01-01

    To propose a centralized method for generating global unique identifiers to link collections of research data and specimens. The work is a collaboration between the Simons Foundation Autism Research Initiative and the National Database for Autism Research. The system is implemented as a web service: an investigator inputs identifying information about a participant into a client application and sends encrypted information to a server application, which returns a generated global unique identifier. The authors evaluated the system using a volume test of one million simulated individuals and a field test on 2000 families (over 8000 individual participants) in an autism study. Inverse probability of hash codes; rate of false identity of two individuals; rate of false split of single individual; percentage of subjects for which identifying information could be collected; percentage of hash codes generated successfully. Large-volume simulation generated no false splits or false identity. Field testing in the Simons Foundation Autism Research Initiative Simplex Collection produced identifiers for 96% of children in the study and 77% of parents. On average, four out of five hash codes per subject were generated perfectly (only one perfect hash is required for subsequent matching). The system must achieve balance among the competing goals of distinguishing individuals, collecting accurate information for matching, and protecting confidentiality. Considerable effort is required to obtain approval from institutional review boards, obtain consent from participants, and to achieve compliance from sites during a multicenter study. Generic unique identifiers have the potential to link collections of research data, augment the amount and types of data available for individuals, support detection of overlap between collections, and facilitate replication of research findings.

  5. Neuroimmunophilin Ligands Protect Cavernous Nerves after Crush Injury in the Rat: New Experimental Paradigms

    PubMed Central

    Valentine, Heather; Chen, Yi; Guo, Hongzhi; McCormick, Jocelyn; Wu, Yong; Sezen, Sena F.; Hoke, Ahmet; Burnett, Arthur L.; Steiner, Joseph P.

    2009-01-01

    Objectives We investigated the effects of the orally bioavailable non-immunosuppressive immunophilin ligand GPI 1046 (GPI) on erectile function and cavernous nerve (CN) histology following unilateral or bilateral crush injury (UCI, BCI, respectively) of the CNs. Methods Adult male Sprague-Dawley rats were administered GPI 15 mg/kg intraperitoneally (ip) or 30 mg/kg orally (po), FK506 1 mg/kg, ip, or vehicle controls for each route of administration just prior to UCI or BCI and daily up to 7 d following injury. At day 1 or 7 of treatment, erectile function induced by CN electrical stimulation was measured, and electron microscopic analysis of the injured CN was performed. Results Intraperitoneal administration of GPI to rats with injured CN protected erectile function, in a fashion similar to the prototypic immunophilin ligand FK506, compared with vehicle-treated animals (93% ± 9% vs. 70% ± 5% vs. 45% ± 1%, p < 0.01, respectively). Oral administration of GPI elicited the same level of significant protection from CN injury. GPI administered PO at 30 mg/kg/d, dosing either once daily or four times daily with 7.5 mg/kg, provided nearly complete protection of erectile function. In a more severe BCI model, PO administration of GPI maintained erectile function at 24 h after CN injury. Ultrastructural analysis of injured CNs indicated that GPI administered at the time of CN injury prevents degeneration of about 83% of the unmyelinated axons at 7 d after CN injury. Conclusions The orally administered immunophilin ligand GPI neuroprotects CNs and maintains erectile function in rats under various conditions of CN crush injury. PMID:17145129

  6. Twitter K-H networks in action: Advancing biomedical literature for drug search.

    PubMed

    Hamed, Ahmed Abdeen; Wu, Xindong; Erickson, Robert; Fandy, Tamer

    2015-08-01

    The importance of searching biomedical literature for drug interaction and side-effects is apparent. Current digital libraries (e.g., PubMed) suffer infrequent tagging and metadata annotation updates. Such limitations cause absence of linking literature to new scientific evidence. This demonstrates a great deal of challenges that stand in the way of scientists when searching biomedical repositories. In this paper, we present a network mining approach that provides a bridge for linking and searching drug-related literature. Our contributions here are two fold: (1) an efficient algorithm called HashPairMiner to address the run-time complexity issues demonstrated in its predecessor algorithm: HashnetMiner, and (2) a database of discoveries hosted on the web to facilitate literature search using the results produced by HashPairMiner. Though the K-H network model and the HashPairMiner algorithm are fairly young, their outcome is evidence of the considerable promise they offer to the biomedical science community in general and the drug research community in particular. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Controllable band structure and topological phase transition in two-dimensional hydrogenated arsenene

    PubMed Central

    Wang, Ya-ping; Ji, Wei-xiao; Zhang, Chang-wen; Li, Ping; Li, Feng; Ren, Miao-juan; Chen, Xin-Lian; Yuan, Min; Wang, Pei-ji

    2016-01-01

    Discovery of two-dimensional (2D) topological insulator such as group-V films initiates challenges in exploring exotic quantum states in low dimensions. Here, we perform first-principles calculations to study the geometric and electronic properties in 2D arsenene monolayer with hydrogenation (HAsH). We predict a new σ-type Dirac cone related to the px,y orbitals of As atoms in HAsH, dependent on in-plane tensile strain. Noticeably, the spin-orbit coupling (SOC) opens a quantum spin Hall (QSH) gap of 193 meV at the Dirac cone. A single pair of topologically protected helical edge states is established for the edges, and its QSH phase is confirmed with topological invariant Z2 = 1. We also propose a 2D quantum well (QW) encapsulating HAsH with the h-BN sheet on each side, which harbors a nontrivial QSH state with the Dirac cone lying within the band gap of cladding BN substrate. These findings provide a promising innovative platform for QSH device design and fabrication operating at room temperature. PMID:26839209

  8. Supervised graph hashing for histopathology image retrieval and classification.

    PubMed

    Shi, Xiaoshuang; Xing, Fuyong; Xu, KaiDi; Xie, Yuanpu; Su, Hai; Yang, Lin

    2017-12-01

    In pathology image analysis, morphological characteristics of cells are critical to grade many diseases. With the development of cell detection and segmentation techniques, it is possible to extract cell-level information for further analysis in pathology images. However, it is challenging to conduct efficient analysis of cell-level information on a large-scale image dataset because each image usually contains hundreds or thousands of cells. In this paper, we propose a novel image retrieval based framework for large-scale pathology image analysis. For each image, we encode each cell into binary codes to generate image representation using a novel graph based hashing model and then conduct image retrieval by applying a group-to-group matching method to similarity measurement. In order to improve both computational efficiency and memory requirement, we further introduce matrix factorization into the hashing model for scalable image retrieval. The proposed framework is extensively validated with thousands of lung cancer images, and it achieves 97.98% classification accuracy and 97.50% retrieval precision with all cells of each query image used. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Modeling and Simulation of the Economics of Mining in the Bitcoin Market.

    PubMed

    Cocco, Luisanna; Marchesi, Michele

    2016-01-01

    In January 3, 2009, Satoshi Nakamoto gave rise to the "Bitcoin Blockchain", creating the first block of the chain hashing on his computer's central processing unit (CPU). Since then, the hash calculations to mine Bitcoin have been getting more and more complex, and consequently the mining hardware evolved to adapt to this increasing difficulty. Three generations of mining hardware have followed the CPU's generation. They are GPU's, FPGA's and ASIC's generations. This work presents an agent-based artificial market model of the Bitcoin mining process and of the Bitcoin transactions. The goal of this work is to model the economy of the mining process, starting from GPU's generation, the first with economic significance. The model reproduces some "stylized facts" found in real-time price series and some core aspects of the mining business. In particular, the computational experiments performed can reproduce the unit root property, the fat tail phenomenon and the volatility clustering of Bitcoin price series. In addition, under proper assumptions, they can reproduce the generation of Bitcoins, the hashing capability, the power consumption, and the mining hardware and electrical energy expenditures of the Bitcoin network.

  10. Controllable band structure and topological phase transition in two-dimensional hydrogenated arsenene

    NASA Astrophysics Data System (ADS)

    Wang, Ya-Ping; Ji, Wei-Xiao; Zhang, Chang-Wen; Li, Ping; Li, Feng; Ren, Miao-Juan; Chen, Xin-Lian; Yuan, Min; Wang, Pei-Ji

    2016-02-01

    Discovery of two-dimensional (2D) topological insulator such as group-V films initiates challenges in exploring exotic quantum states in low dimensions. Here, we perform first-principles calculations to study the geometric and electronic properties in 2D arsenene monolayer with hydrogenation (HAsH). We predict a new σ-type Dirac cone related to the px,y orbitals of As atoms in HAsH, dependent on in-plane tensile strain. Noticeably, the spin-orbit coupling (SOC) opens a quantum spin Hall (QSH) gap of 193 meV at the Dirac cone. A single pair of topologically protected helical edge states is established for the edges, and its QSH phase is confirmed with topological invariant Z2 = 1. We also propose a 2D quantum well (QW) encapsulating HAsH with the h-BN sheet on each side, which harbors a nontrivial QSH state with the Dirac cone lying within the band gap of cladding BN substrate. These findings provide a promising innovative platform for QSH device design and fabrication operating at room temperature.

  11. BIOMECHANICS. Why the seahorse tail is square.

    PubMed

    Porter, Michael M; Adriaens, Dominique; Hatton, Ross L; Meyers, Marc A; McKittrick, Joanna

    2015-07-03

    Whereas the predominant shapes of most animal tails are cylindrical, seahorse tails are square prisms. Seahorses use their tails as flexible grasping appendages, in spite of a rigid bony armor that fully encases their bodies. We explore the mechanics of two three-dimensional-printed models that mimic either the natural (square prism) or hypothetical (cylindrical) architecture of a seahorse tail to uncover whether or not the square geometry provides any functional advantages. Our results show that the square prism is more resilient when crushed and provides a mechanism for preserving articulatory organization upon extensive bending and twisting, as compared with its cylindrical counterpart. Thus, the square architecture is better than the circular one in the context of two integrated functions: grasping ability and crushing resistance. Copyright © 2015, American Association for the Advancement of Science.

  12. Dynamic Response and Residual Helmet Liner Crush Using Cadaver Heads and Standard Headforms.

    PubMed

    Bonin, S J; Luck, J F; Bass, C R; Gardiner, J C; Onar-Thomas, A; Asfour, S S; Siegmund, G P

    2017-03-01

    Biomechanical headforms are used for helmet certification testing and reconstructing helmeted head impacts; however, their biofidelity and direct applicability to human head and helmet responses remain unclear. Dynamic responses of cadaver heads and three headforms and residual foam liner deformations were compared during motorcycle helmet impacts. Instrumented, helmeted heads/headforms were dropped onto the forehead region against an instrumented flat anvil at 75, 150, and 195 J. Helmets were CT scanned to quantify maximum liner crush depth and crush volume. General linear models were used to quantify the effect of head type and impact energy on linear acceleration, head injury criterion (HIC), force, maximum liner crush depth, and liner crush volume and regression models were used to quantify the relationship between acceleration and both maximum crush depth and crush volume. The cadaver heads generated larger peak accelerations than all three headforms, larger HICs than the International Organization for Standardization (ISO), larger forces than the Hybrid III and ISO, larger maximum crush depth than the ISO, and larger crush volumes than the DOT. These significant differences between the cadaver heads and headforms need to be accounted for when attempting to estimate an impact exposure using a helmet's residual crush depth or volume.

  13. Heat and moisture flow in concrete as a function of temperature

    NASA Technical Reports Server (NTRS)

    Hundt, J.

    1978-01-01

    Due to temperature, reactors in operation cause heat and moisture flows in the thick walled prestressed pressure vessels. These flows were studied in three beams of concrete made with crushed limestone aggregate, and in three beams made of crushed gravel/sand aggregate. The flow phenomena were related to the structural development of the concrete by determining the amount of non-evaporatable water, the total porosity, and the pore size distribution. Local temperature and moisture conditions also influenced the technical properties. Compressive strength, changes in length due to shrinkage and contraction, thermal expansion, and thermal conductivity were determined.

  14. Crush testing, characterizing, and modeling the crashworthiness of composite laminates

    NASA Astrophysics Data System (ADS)

    Garner, David Michael, Jr.

    Research in the field of crashworthiness of composite materials is presented. A new crush test method was produced to characterize the crush behavior of composite laminates. In addition, a model of the crush behavior and a method for rank ordering the energy absorption capability of various laminates were developed. The new crush test method was used for evaluating the crush behavior of flat carbon/epoxy composite specimens at quasi-static and dynamic rates. The University of Utah crush test fixture was designed to support the flat specimen against catastrophic buckling. A gap, where the specimen is unsupported, allowed unhindered crushing of the specimen. In addition, the specimen's failure modes could be clearly observed during crush testing. Extensive crush testing was conducted wherein the crush force and displacement data were collected to calculate the energy absorption, and high speed video was captured during dynamic testing. Crush tests were also performed over a range of fixture gap heights. The basic failure modes were buckling, crack growth, and fracture. Gap height variations resulted in poorly, properly, and overly constrained specimens. In addition, guidelines for designing a composite laminate for crashworthiness were developed. Modeling of the crush behavior consisted of the delamination and fracture of a single ply or group of like plies during crushing. Delamination crack extension was modeled using the mode I energy release rate, G lc, where an elastica approach was used to obtain the strain energy. Variations in Glc were briefly explored with double cantilever beam tests wherein crack extension occurred along a multidirectional ply interface. The model correctly predicted the failure modes for most of the test cases, and offered insight into how the input parameters affect the model. The ranking method related coefficients of the laminate and sublaminate stiffness matrices, the ply locations within the laminate, and the laminate thickness. The ranking method correctly ordered the laminates tested in this study with respect to their energy absorption.

  15. Creating an Assured Joint DOD and Interagency Interoperable Net-Centric Enterprise. Report of the Defense Science Board Task Force on Achieving Interoperability in a Net-Centric Environment

    DTIC Science & Technology

    2009-03-01

    policy, elliptic curve public key cryptography using the 256 -bit prime modulus elliptic curve as specified in FIPS-186-2 and SHA - 256 are appropriate for...publications/fips/fips186-2/fips186-2-change1.pdf 76 I P ART I . CH A PT E R 5 Hashing via the Secure Hash Algorithm (using SHA - 256 and...lithography and processing techniques. Field programmable gate arrays ( FPGAs ) are a chip design of interest. These devices are extensively used in

  16. Usage of Crushed Concrete Fines in Decorative Concrete

    NASA Astrophysics Data System (ADS)

    Pilipenko, Anton; Bazhenova, Sofia

    2017-10-01

    The article is devoted to the questions of usage of crushed concrete fines from concrete scrap for the production of high-quality decorative composite materials based on mixed binder. The main problem in the application of crushed concrete in the manufacture of decorative concrete products is extremely low decorative properties of crushed concrete fines itself, as well as concrete products based on them. However, crushed concrete fines could have a positive impact on the structure of the concrete matrix and could improve the environmental and economic characteristics of the concrete products. Dust fraction of crushed concrete fines contains non-hydrated cement grains, which can be opened in screening process due to the low strength of the contact zone between the hydrated and non-hydrated cement. In addition, the screening process could increase activity of the crushed concrete fines, so it can be used as a fine aggregate and filler for concrete mixes. Previous studies have shown that the effect of the usage of the crushed concrete fines is small and does not allow to obtain concrete products with high strength. However, it is possible to improve the efficiency of the crushed concrete fines as a filler due to the complex of measures prior to mixing. Such measures may include a preliminary mechanochemical activation of the binder (cement binder, iron oxide pigment, silica fume and crushed concrete fines), as well as the usage of polycarboxylate superplasticizers. The development of specific surface area of activated crushed concrete fines ensures strong adhesion between grains of binder and filler during the formation of cement stone matrix. The particle size distribution of the crushed concrete fines could achieve the densest structure of cement stone matrix and improve its resistance to environmental effects. The authors examined the mechanisms of structure of concrete products with crushed concrete fines as a filler. The results of studies of the properties of the crushed concrete fines were provided. It is shown that the admixture of the crushed concrete fines has little effect on the colour characteristics of the decorative concrete products. The preferred options to improve the surfaces of decorative concrete are also proposed.

  17. Durophagy in sharks: feeding mechanics of the hammerhead Sphyrna tiburo.

    PubMed

    Wilga, C D; Motta, P J

    2000-09-01

    This study investigates the motor pattern and head movements during feeding of a durophagus shark, the bonnethead Sphyrna tiburo, using electromyography and simultaneous high-speed video. Sphyrna tiburo feeds almost exclusively on hard-shelled crabs, with shrimp and fish taken occasionally. It captures crabs by ram feeding, then processes or reduces the prey by crushing it between molariform teeth, finally transporting the prey by suction for swallowing. The prey-crushing mechanism is distinct from that of ram or bite capture and suction transport. This crushing mechanism is accomplished by altering the duration of jaw adductor muscle activity and modifying jaw kinematics by the addition of a second jaw-closing phase. In crushing events, motor activity of the jaw adductor muscles continues (biting of the prey occurs as the jaws close and continues after the jaws have closed) throughout a second jaw-closing phase, unlike capture and transport events during which motor activity (biting) ceases at jaw closure. Sphyrna tiburo is able to take advantage of a resource (hard prey) that is not readily available to most sharks by utilizing a suite of durophagous characteristics: molariform teeth, a modified jaw protrusor muscle, altered jaw adductor activity and modified jaw kinematics. Sphyrna tiburo is a specialist feeder on crab prey as demonstrated by the lack of differences in kinematic or motor patterns when offered prey of differing hardness and its apparent lack of ability to modulate its behavior when feeding on other prey. Functional patterns are altered and coupled with modifications in dental and jaw morphology to produce diverse crushing behaviors in elasmobranchs.

  18. Crashworthiness characteristics of a carbon fiber reinforced dual-phase epoxy–polyurea hybrid matrix composite

    DOE PAGES

    Zhou, Hongyu; Attard, Thomas L.; Dhiradhamvit, Kittinan; ...

    2014-11-07

    In this paper, the crashworthiness characteristics of rectangular tubes made from a Carbon-fiber reinforced Hybrid-Polymeric Matrix (CHMC) composite were investigated using quasi-static and impact crush tests. The hybrid matrix formulation of the CHMC was created by combining an epoxy-based thermosetting polymer with a lightly crosslinked polyurea elastomer at various cure-time intervals and volumetric ratios. The load–displacement responses of both CHMC and carbon-fiber reinforced epoxy (CF/epoxy) specimens were obtained under various crushing speeds; and crashworthiness parameters, such as the average crushing force and specific energy absorption (SEA), were calculated using subsequent load–displacement relationships. The CHMC maintained a high level of structuralmore » integrity and post-crush performance, relative to traditional CF/epoxy. The influence of the curing time and volumetric ratios of the polyurea/epoxy dual-hybridized matrix system on the crashworthiness parameters was also investigated. The results reveal that the load carrying capacity and total energy absorption tend to increase with greater polyurea thickness and lower elapsed reaction curing time of the epoxy although this is typically a function of the loading rate. In conclusion, the mechanism by which the CHMC provides increased damage tolerance was also investigated using scanning electron microscopy (SEM).« less

  19. Convergence in a mechanically complex phenotype: detecting structural adaptations for crushing in cichlid fish.

    PubMed

    Hulsey, C Darrin; Roberts, Richard J; Lin, Angela S P; Guldberg, Robert; Streelman, J Todd

    2008-07-01

    Morphological convergence provides strong evidence that evolution is adaptive. However, putatively convergent morphology is often examined in two dimensions with no explicit model of function. In this study, we investigated structural and mechanical similarities of the lower pharyngeal jaw (LPJ) in cichlid fish that have evolved the ability to crush hard-shelled molluscs. Using a novel phylogeny, we demonstrated molluscivory has been gained and/or been lost numerous times in Heroine cichlids. Within this comparative framework, we produced three-dimensional computed tomography (CT) scans for LPJs of both morphotypes in the trophically polymorphic Herichthys minckleyi and six evolutionarily independent pairs of closely related species. Like H. minckleyi, these species exhibit divergence between a molluscivore and a nonmolluscivore. Using the CT scans, we generated finite element models of papilliform H. minckleyi LPJs to determine where stress would concentrate in a jaw not modified to crush molluscs. Then, we examined whether stress in the papilliform LPJ predicted structural modifications in molariform H. minckleyi and other molluscivorous species. Despite potential constraints, stresses imposed during prey processing explain 40% of LPJ variation in mollusc crushing species. The structural and mechanical analyses also suggest divergence found in polymorphic species could provide the substrate for trophic differences found in reproductively isolated cichlids.

  20. Sam68 promotes Schwann cell proliferation by enhancing the PI3K/Akt pathway and acts on regeneration after sciatic nerve crush

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Weijie, E-mail: 459586768@qq.com; Liu, Yuxi, E-mail: 924013616@qq.com; Wang, Youhua, E-mail: wyouhua1516@163.com

    Sam68 (Src-associated in mitosis of 68 kD), a KH domain RNA-binding protein, is not only important in signaling transduction cascades, but crucial in a variety of cellular processes. Sam68 is reported to be involved in the phospoinositide3-kinase (PI3K) and nuclear factor-kappa B (NF-κB) signaling pathways, and it is closely associated with cell proliferation, RNA metabolism, and tumor progression. However, we know little about the role of Sam68 during peripheral nervous system injury and regeneration. In this study, we investigated the expression of Sam68 and its biological significances in sciatic nerve crush. Interestingly, we found Sam68 had a co-localization with S100 (Schwannmore » cell marker). Moreover, after crush, Sam68 had a spatiotemporal protein expression, which was in parallel with proliferation cell nuclear antigen (PCNA). In vitro, we also observed increased expression of Sam68 during the process of TNF-α-induced Schwann cell proliferation model. Besides, flow cytometry analyses, CCK-8, and EDU were all performed with the purpose of investigating the role of Sam68 in the regulation of Schwann cell proliferation. Even more importantly, we discovered that Sam68 could enhance the phosphorylation of Akt while LY294002 (a PI3K inhibitor) obviously reversed Sam68-induced cell proliferation. Finally, we detected the variance during regeneration progress through the rat walk footprint test. In summary, all these evidences demonstrated that Sam68 might participate in Schwann cell proliferation partially via PI3K/Akt pathway and also regulate regeneration after sciatic nerve crush. -- Highlights: •The dynamic changes and location of Sam68 after sciatic nerve crush. •Sam68 promoted Schwann cell proliferation via PI3K/Akt pathway. •Sam68 modulated functional recovery after sciatic nerve crush.« less

  1. Recovery of metals from waste printed circuit boards by a mechanical method using a water medium.

    PubMed

    Duan, Chenlong; Wen, Xuefeng; Shi, Changsheng; Zhao, Yuemin; Wen, Baofeng; He, Yaqun

    2009-07-15

    Research on the recycling of waste printed circuit boards (PCB) is at the forefront of environmental pollution prevention and resource recycling. To effectively crush waste PCB and to solve the problem of secondary pollution from fugitive odors and dust created during the crushing process, a wet impacting crusher was employed to achieve comminution liberation of the PCB in a water medium. The function of water in the crushing process was analyzed. When using slippery hammerheads, a rotation speed of 1470 rpm, a water flow of 6m(3)/h and a sieve plate aperture of 2.2mm, 95.87% of the crushed product was sized less than 1mm. 94.30% of the metal was in this grade of product. Using smashed material graded -1mm for further research, a Falcon concentrator was used to recover the metal from the waste PCB. Engineering considerations were the liberation degree, the distribution ratio of the metal and a way to simplify the technology. The separation mechanism for fine particles of different densities in a Falcon concentrator was analyzed in detail and the separation process in the segregation and separation zones was deduced. Also, the magnitude of centrifugal acceleration, the back flow water pressure and the feed slurry concentration, any of which might affect separation results, were studied. A recovery model was established using Design-Expert software. Separating waste PCB, crushed to -1mm, with the Falcon separator gave a concentrated product graded 92.36% metal with a recovery of 97.05%. To do this the reverse water pressure was 0.05 MPa, the speed transducer frequency was set at 30 Hz and the feed density was 20 g/l. A flow diagram illustrating the new technique of wet impact crushing followed by separation with a Falcon concentrator is provided. The technique will prevent environmental pollution from waste PCB and allow the effective recovery of resources. Water was used as the medium throughout the whole process.

  2. Strain-rate effect on initial crush stress of irregular honeycomb under dynamic loading and its deformation mechanism

    NASA Astrophysics Data System (ADS)

    Wang, Peng; Zheng, Zhijun; Liao, Shenfei; Yu, Jilin

    2018-02-01

    The seemingly contradictory understandings of the initial crush stress of cellular materials under dynamic loadings exist in the literature, and a comprehensive analysis of this issue is carried out with using direct information of local stress and strain. Local stress/strain calculation methods are applied to determine the initial crush stresses and the strain rates at initial crush from a cell-based finite element model of irregular honeycomb under dynamic loadings. The initial crush stress under constant-velocity compression is identical to the quasi-static one, but less than the one under direct impact, i.e. the initial crush stresses under different dynamic loadings could be very different even though there is no strain-rate effect of matrix material. A power-law relation between the initial crush stress and the strain rate is explored to describe the strain-rate effect on the initial crush stress of irregular honeycomb when the local strain rate exceeds a critical value, below which there is no strain-rate effect of irregular honeycomb. Deformation mechanisms of the initial crush behavior under dynamic loadings are also explored. The deformation modes of the initial crush region in the front of plastic compaction wave are different under different dynamic loadings.

  3. Evolution of the hypercarnivorous dentition in mammals (Metatheria, Eutheria) and its bearing on the development of tribosphenic molars.

    PubMed

    Solé, Floréal; Ladevèze, Sandrine

    2017-03-01

    One major innovation of mammals is the tribosphenic molar, characterized by the evolution of a neomorphic upper cusp (=protocone) and a lower basin (=talonid) that occlude and provide shearing and crushing functions. This type of molar is an evolutionarily flexible structure that enabled mammals to achieve complex dental adaptations. Among carnivorous mammals, hypercarnivory is a common trend that evolved several times among therians (marsupials, placentals, and stem relatives). Hypercarnivory involves an important simplification of the carnassial molar pattern from the ancestral tribosphenic molar pattern, with the modification of the triangular tooth crown, and the loss of several cusps and cuspids typical of the tribosphenic molar. These losses confer to the molars of the hypercarnivorous mammals a plesiomorphic/paedomorphic morphology that resembles more the earliest mammaliaforms than the earliest therians. Here, we demonstrate that the modification of the molar morphology is fully explained by a patterning cascade mode of cusp development. Contrary to what was previously proposed, our study concludes that the metaconid (mesiolingual cusp of lower molars, associated with a puncturing function) does not influence cusp development of the talonid (distal crushing heel of lower molars). Moreover, it provides a new example of how heterochronic changes were crucial to the evolution of mammal dentition. To overcome the difficulty of applying behavioral or ecological definitions of diets to fossil animals, we characterize hypercarnivorous dentitions on the basis of the molar morphology and more particularly on the loss or retention of crushing structures, each dentition resulting from adaptations to a distinct ecomorphotype. Despite repeated and convergent evolution of hypercarnivorous forms, hypercarnivory appears as a highly constrained specialization (i.e., "dead end") that is unlikely to evolve back to omnivorous dentition, especially when the crushing structures are lost. © 2017 Wiley Periodicals, Inc.

  4. RGC Neuroprotection Following Optic Nerve Trauma Mediated By Intranasal Delivery of Amnion Cell Secretome

    PubMed Central

    Grinblat, Gabriela A.; Khan, Reas S.; Dine, Kimberly; Wessel, Howard; Brown, Larry; Shindler, Kenneth S.

    2018-01-01

    Purpose Intranasally delivered ST266, the biological, proteinaceous secretome of amnion-derived multipotent progenitor cells, reduces retinal ganglion cell (RGC) loss, optic nerve inflammation, and demyelination in experimental optic neuritis. This unique therapy and novel administration route delivers numerous cytokines and growth factors to the eye and optic nerve, suggesting a potential to also treat other optic neuropathies. Thus, ST266-mediated neuroprotection was examined following traumatic optic nerve injury. Methods Optic nerve crush injury was surgically induced in C57BL/6J mice. Mice were treated daily with intranasal PBS or ST266. RGC function was assessed by optokinetic responses (OKRs), RGCs were counted, and optic nerve sections were stained with luxol fast blue and anti-neurofilament antibodies to assess myelin and RGC axon damage. Results Intranasal ST266 administered daily for 5 days, beginning at the time that a 1-second optic nerve crush was performed, significantly attenuated OKR decreases. Furthermore, ST266 treatment reduced damage to RGC axons and myelin within optic nerves, and blocked RGC loss. Following a 4-second optic nerve crush, intranasal ST266 increased RGC survival and showed a trend toward reduced RGC axon and myelin damage. Ten days following optic nerve crush, ST266 prevented myelin damage, while also inducing a trend toward increased RGC survival and visual function. Conclusions ST266 significantly attenuates traumatic optic neuropathy. Neuroprotective effects of this unique combination of biologic molecules observed here and previously in optic neuritis suggest potential broad application for preventing neuronal damage in multiple optic nerve disorders. Furthermore, results support intranasal delivery as a novel, noninvasive therapeutic modality for eyes and optic nerves. PMID:29847652

  5. Spontaneous Recovery of Cavernous Nerve Crush Injury

    PubMed Central

    Kim, Hyo Jong; Kim, Ha Young; Kim, Sung Young; Lee, Seong Ho; Lee, Won Ki

    2011-01-01

    Purpose To investigate pathophysiological consequences and spontaneous recovery after cavernous nerve crush injury (CNCI) in a rat model. Materials and Methods Twenty 4-week-old male Sprague-Dawley rats were divided into the following groups: sham-operated group (n=10) and bilateral CNCI groups (n=10) for two different durations (12 and 24 weeks). At both time points, CN electrical stimulation was used to assess erectile function by measuring the intracavernous pressure. The expression of hypoxia inducible factor (HIF)-1α and sonic hedgehog (SHH) was examined in penile tissue. Immunohistochemical staining was performed for nerve growth factor (NGF), endothelial nitric oxide synthase (eNOS), neuronal nitric oxide synthase (nNOS), and smooth muscle α-actin. Results CNCI significantly decreased erectile function at 12 weeks (51.7% vs. 71.9%, mean ICP/BP ratio, p<0.05) and increased the expression of HIF-1α and decreased the expression of eNOS, nNOS, and SHH. At 24 weeks, erectile function in the CNCI group was improved with no significant difference versus the sham group (70.5% vs. 63.3%, mean ICP/BP ratio, p<0.05) or the CN group at 12 weeks (51.7% vs. 63.3%, mean ICP/BP ratio, p<0.05). By RT-PCR, the increase in HIF-1α and decrease in SHH mRNA was restored at 24 weeks. By immunohistochemistry, the expression of eNOS and nNOS was increased at 24 weeks. Conclusions CN injury induces significantly impaired erectile function and altered gene and protein expression, which suggests that local hypoxic and inflammatory processes may contribute to this change. Significant spontaneous recovery of erectile function was observed at 6 months after CN crush injury. PMID:21927704

  6. Glial-derived neurotrophic factor is essential for blood-nerve barrier functional recovery in an experimental murine model of traumatic peripheral neuropathy.

    PubMed

    Dong, Chaoling; Helton, E Scott; Zhou, Ping; Ouyang, Xuan; d'Anglemont de Tassigny, Xavier; Pascual, Alberto; López-Barneo, José; Ubogu, Eroboghene E

    2018-06-18

    There is emerging evidence that glial-derived neurotrophic factor (GDNF) is a potent inducer of restrictive barrier function in tight junction-forming microvascular endothelium and epithelium, including the human blood-nerve barrier (BNB) in vitro. We sought to determine the role of GDNF in restoring BNB function in vivo by evaluating sciatic nerve horseradish peroxidase (HRP) permeability in tamoxifen-inducible GDNF conditional knockout (CKO) adult mice following non-transecting crush injury via electron microscopy, with appropriate wildtype (WT) and heterozygous (HET) littermate controls. A total of 24 age-, genotype- and sex-matched mice >12 weeks of age were injected with 30 mg/kg HRP via tail vein injection 7 or 14 days following unilateral sciatic nerve crush, and both sciatic nerves were harvested 30 minutes later for morphometric assessment by light and electron microscopy. The number and percentage of HRP-permeable endoneurial microvessels were ascertained to determine the effect of GDNF in restoring barrier function in vivo. Following sciatic nerve crush, there was significant upregulation in GDNF protein expression in WT and HET mice that was abrogated in CKO mice. GDNF significantly restored sciatic nerve BNB HRP impermeability to near normal levels by day 7, with complete restoration seen by day 14 in WT and HET mice. A significant recovery lag was observed in CKO mice. This effect was independent on VE-Cadherin or claudin-5 expression on endoneurial microvessels. These results imply an important role of GDNF in restoring restrictive BNB function in vivo, suggesting a potential strategy to re-establish the restrictive endoneurial microenvironment following traumatic peripheral neuropathies.

  7. Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm

    NASA Astrophysics Data System (ADS)

    Brolin Sihite, Alfonso; Hayat Susanti, Bety

    2017-10-01

    A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.

  8. A numerical approach to model and predict the energy absorption and crush mechanics within a long-fiber composite crush tube

    NASA Astrophysics Data System (ADS)

    Pickett, Leon, Jr.

    Past research has conclusively shown that long fiber structural composites possess superior specific energy absorption characteristics as compared to steel and aluminum structures. However, destructive physical testing of composites is very costly and time consuming. As a result, numerical solutions are desirable as an alternative to experimental testing. Up until this point, very little numerical work has been successful in predicting the energy absorption of composite crush structures. This research investigates the ability to use commercially available numerical modeling tools to approximate the energy absorption capability of long-fiber composite crush tubes. This study is significant because it provides a preliminary analysis of the suitability of LS-DYNA to numerically characterize the crushing behavior of a dynamic axial impact crushing event. Composite crushing theory suggests that there are several crushing mechanisms occurring during a composite crush event. This research evaluates the capability and suitability of employing, LS-DYNA, to simulate the dynamic crush event of an E-glass/epoxy cylindrical tube. The model employed is the composite "progressive failure model", a much more limited failure model when compared to the experimental failure events which naturally occur. This numerical model employs (1) matrix cracking, (2) compression, and (3) fiber breakage failure modes only. The motivation for the work comes from the need to reduce the significant cost associated with experimental trials. This research chronicles some preliminary efforts to better understand the mechanics essential in pursuit of this goal. The immediate goal is to begin to provide deeper understanding of a composite crush event and ultimately create a viable alternative to destructive testing of composite crush tubes.

  9. HIA: a genome mapper using hybrid index-based sequence alignment.

    PubMed

    Choi, Jongpill; Park, Kiejung; Cho, Seong Beom; Chung, Myungguen

    2015-01-01

    A number of alignment tools have been developed to align sequencing reads to the human reference genome. The scale of information from next-generation sequencing (NGS) experiments, however, is increasing rapidly. Recent studies based on NGS technology have routinely produced exome or whole-genome sequences from several hundreds or thousands of samples. To accommodate the increasing need of analyzing very large NGS data sets, it is necessary to develop faster, more sensitive and accurate mapping tools. HIA uses two indices, a hash table index and a suffix array index. The hash table performs direct lookup of a q-gram, and the suffix array performs very fast lookup of variable-length strings by exploiting binary search. We observed that combining hash table and suffix array (hybrid index) is much faster than the suffix array method for finding a substring in the reference sequence. Here, we defined the matching region (MR) is a longest common substring between a reference and a read. And, we also defined the candidate alignment regions (CARs) as a list of MRs that is close to each other. The hybrid index is used to find candidate alignment regions (CARs) between a reference and a read. We found that aligning only the unmatched regions in the CAR is much faster than aligning the whole CAR. In benchmark analysis, HIA outperformed in mapping speed compared with the other aligners, without significant loss of mapping accuracy. Our experiments show that the hybrid of hash table and suffix array is useful in terms of speed for mapping NGS sequencing reads to the human reference genome sequence. In conclusion, our tool is appropriate for aligning massive data sets generated by NGS sequencing.

  10. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago

    PubMed Central

    Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-01-01

    Objective To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. Methods The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. Results The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Conclusions Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. PMID:26104741

  11. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago.

    PubMed

    Kho, Abel N; Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-09-01

    To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Effects of local application of methylprednisolone delivered by the C/GP-hydrogel on the recovery of facial nerves.

    PubMed

    Chao, Xiuhua; Fan, Zhaomin; Han, Yuechen; Wang, Yan; Li, Jianfeng; Chai, Renjie; Xu, Lei; Wang, Haibo

    2015-01-01

    Local administration of MP delivered by the C/GP-MP-hydrogel can improve the recovery of facial nerve following crush injury. The findings suggested that locally injected MP delivered by C/GP-hydrogel might be a promising treatment for facial nerve damage. In this study, the aim is to assess the effectiveness of locally administrating methylprednisolone(MP) loaded by chitosan-β-glycerophosphate hydrogel (C/GP-hydrogel) on the regeneration of facial nerve crush injury. After the crush of left facial nerves, Wistar rats were randomly divided into four different groups. Then, four different therapies were used to treat the damaged facial nerves. At the 1(st), 2(nd), 3(rd), and 4(th) week after injury, the functional recovery of facial nerves and the morphological changes of facial nerves were assessed. The expression of growth associated protein-43 (GAP-43) protein in the facial nucleus were also evaluated. Locally injected MP delivered by C/GP-hydrogel effectively accelerated the facial functional recovery. In addition, the regenerated facial nerves in the C/GP-MP group were more mature than those in the other groups. The expression of GAP-43 protein was also improved by the MP, especially in the C/GP-MP group.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pesaran, Ahmad; Zhang, Chao; Santhanagopalan, Shriram

    Propagation of failure in lithium-ion batteries during field events or under abuse is a strong function of the mechanical response of the different components in the battery. Whereas thermal and electrochemical models that capture the abuse response of batteries have been developed and matured over the years, the interaction between the mechanical behavior and the thermal response of these batteries is not very well understood. With support from the Department of Energy, NREL has made progress in coupling mechanical, thermal, and electrochemical lithium-ion models to predict the initiation and propagation of short circuits under external crush in a cell. Themore » challenge with a cell crush simulation is to estimate the magnitude and location of the short. To address this, the model includes an explicit representation of each individual component such as the active material, current collector, separator, etc., and predicts their mechanical deformation under different crush scenarios. Initial results show reasonable agreement with experiments. In this presentation, the versatility of the approach for use with different design factors, cell formats and chemistries is explored using examples.« less

  14. 31. VIEW FROM SOUTHWEST TO CORNER WHERE SAMPLING/CRUSHING ADDITIONS ABUT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    31. VIEW FROM SOUTHWEST TO CORNER WHERE SAMPLING/CRUSHING ADDITIONS ABUT CRUSHED OXIDIZED ORE BIN. INTACT BARREN SOLUTION TANK VISIBLE IN FRONT OF CRUSHED ORE BIN. - Bald Mountain Gold Mill, Nevada Gulch at head of False Bottom Creek, Lead, Lawrence County, SD

  15. The Effects of Phrenic Nerve Degeneration by Axotomy and Crush on the Electrical Activities of Diaphragm Muscles of Rats.

    PubMed

    Alkiş, Mehmet Eşref; Kavak, Servet; Sayır, Fuat; Him, Aydin

    2016-03-01

    The aim of this study was to investigate the effect of axotomy and crush-related degeneration on the electrical activities of diaphragm muscle strips of experimental rats. In the present study, twenty-one male Wistar-albino rats were used and divided into three groups. The animals in the first group were not crushed or axotomized and served as controls. Phrenic nerves of the rats in the second and third groups were crushed or axotomized in the diaphragm muscle. Resting membrane potential (RMP) was decreased significantly in both crush and axotomy of diaphragm muscle strips of experimental rats (p < 0.05). Depolarization time (T DEP) and half-repolarization (1/2 RT) time were significantly prolonged in crush and axotomy rats (p < 0.05). Crushing or axotomizing the phrenic nerves may produce electrical activities in the diaphragm muscle of the rat by depolarization time and half-repolarization time prolonged in crush and axotomy rats.

  16. Drug loss while crushing tablets: Comparison of 24 tablet crushing devices

    PubMed Central

    Thong, Min Yew; Manrique, Yady J.

    2018-01-01

    This study investigated 24 tablet crushing devices for drug loss using different methods to recover the crushed tablet. 24 devices were compared: 3 with disposable cups, 6 with disposable bags, 12 without separate vessels and 3 types of mortar and pestle. One paracetamol tablet was crushed and recovered by tapping the powder out. Where appropriate, depending on crusher size and manufacturer instructions, the powder was also recovered by mixing with water or food. Paracetamol recovery (quantity that can be delivered to a patient) and leftover (quantity remaining in the device) were measured using a validated UV method and the entire experiment was replicated 3 times. Drug recovery ranged from 86.7–98.1% when the crushed tablet was tapped out of the crushers (average loss 5.8%). Significant losses were measured for 18 crushers, particularly manually operated hand-twist crushers with a serrated crushing surface, and some devices with disposable bags or cups. Rinsing the crushed powder with water once resulted in an average of 24.2% drug loss, and this was reduced to 4.2% after a second rinse. If crushing is unavoidable, maximizing medication delivery to the patient is essential. Rinsing twice resulted in similar paracetamol recovery to tapping the powder out; however only water rinses have the potential for direct consumption by the patient, minimizing drug loss across the entire crushing and transfer process. PMID:29494695

  17. The effect of motorcycle helmet fit on estimating head impact kinematics from residual liner crush.

    PubMed

    Bonin, Stephanie J; Gardiner, John C; Onar-Thomas, Arzu; Asfour, Shihab S; Siegmund, Gunter P

    2017-09-01

    Proper helmet fit is important for optimizing head protection during an impact, yet many motorcyclists wear helmets that do not properly fit their heads. The goals of this study are i) to quantify how a mismatch in headform size and motorcycle helmet size affects headform peak acceleration and head injury criteria (HIC), and ii) to determine if peak acceleration, HIC, and impact speed can be estimated from the foam liner's maximum residual crush depth or residual crush volume. Shorty-style helmets (4 sizes of a single model) were tested on instrumented headforms (4 sizes) during linear impacts between 2.0 and 10.5m/s to the forehead region. Helmets were CT scanned to quantify residual crush depth and volume. Separate linear regression models were used to quantify how the response variables (peak acceleration (g), HIC, and impact speed (m/s)) were related to the predictor variables (maximum crush depth (mm), crush volume (cm 3 ), and the difference in circumference between the helmet and headform (cm)). Overall, we found that increasingly oversized helmets reduced peak headform acceleration and HIC for a given impact speed for maximum residual crush depths less than 7.9mm and residual crush volume less than 40cm 3 . Below these levels of residual crush, we found that peak headform acceleration, HIC, and impact speed can be estimated from a helmet's residual crush. Above these crush thresholds, large variations in headform kinematics are present, possibly related to densification of the foam liner during the impact. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Oscar Renda Contracting Inc. Navajo Nation Crushing/Screening Operation: Coverage Under General Air Quality Permit for Stone Quarrying, Crushing and Screening Facilities

    EPA Pesticide Factsheets

    Documents related to approved request for coverage under the Stone Quarrying, Crushing and Screening Facilities General Permit for Oscar Renda Contracting Inc. Navajo Nation Crushing/Screening Operation located in McKinley and San Juan Counties, NM.

  19. Possible role of antioxidative capacity of (-)-epigallocatechin-3-gallate treatment in morphological and neurobehavioral recovery after sciatic nerve crush injury.

    PubMed

    Renno, Waleed M; Benov, Ludmil; Khan, Khalid M

    2017-11-01

    OBJECTIVE This study examined the capacity of the major polyphenolic green tea extract (-)-epigallocatechin-3-gallate (EGCG) to suppress oxidative stress and stimulate the recovery and prompt the regeneration of sciatic nerve after crush injury. METHODS Adult male Wistar rats were randomly assigned to one of 4 groups: 1) Naïve, 2) Sham (sham injury, surgical control group), 3) Crush (sciatic nerve crush injury treated with saline), and 4) Crush+EGCG (sciatic nerve crush injury treated with intraperitoneally administered EGCG, 50 mg/kg). All animals were tested for motor and sensory neurobehavioral parameters throughout the study. Sciatic nerve and spinal cord tissues were harvested and processed for morphometric and stereological analysis. For the biochemical assays, the time points were Day 1, Day 7, Day 14, and Day 28 after nerve injury. RESULTS After sciatic nerve crush injury, the EGCG-treated animals (Crush+EGCG group) showed significantly better recovery of foot position and toe spread and 50% greater improvement in motor recovery than the saline-treated animals (Crush group). The Crush+EGCG group displayed an early hopping response at the beginning of the 3rd week postinjury. Animals in the Crush+EGCG group also showed a significant reduction in mechanical allodynia and hyperalgesia latencies and significant improvement in recovery from nociception deficits in both heat withdrawal and tail flick withdrawal latencies compared with the Crush group. In both the Crush+EGCG and Crush groups, quantitative evaluation revealed significant morphological evidence of neuroregeneration according to the following parameters: mean cross-sectional area of axons, myelin thickness in the sciatic nerve (from Week 4 to Week 8), increase of myelin basic protein concentration and gene expression in both the injured sciatic nerve and spinal cord, and fiber diameter to axon diameter ratio and myelin thickness to axon diameter ratio at Week 2 after sciatic nerve injury. However, the axon area remained much smaller in both the Crush+EGCG and Crush groups compared with the Sham and Naïve groups. The number of axons per unit area was significantly decreased in the Crush+EGCG and Crush groups compared with controls. Sciatic nerve injury produced generalized oxidative stress manifested as a significant increase of isoprostanes in the urine and decrease of the total antioxidant capacity (TAC) of the blood from Day 7 until Day 14. EGCG-treated rats showed significantly less increase of isoprostanes than saline-treated animals and also showed full recovery of TAC levels by Day 14 after nerve injury. In spinal cord tissue analysis, EGCG-treated animals showed induced glutathione reductase and suppressed induction of heme oxygenase 1 gene expression compared with nontreated animals. CONCLUSIONS EGCG treatment suppressed the crush-induced production of isoprostanes and stimulated the recovery of the TAC and was associated with remarkable alleviation of motor and sensory impairment and significant histomorphological evidence of neuronal regeneration following sciatic nerve crush injury in rats. The findings of this study suggest that EGCG can be used as an adjunctive therapeutic remedy for nerve injury. However, further investigations are needed to establish the antioxidative mechanism involved in the regenerative process after nerve injury. Only upregulation of glutathione reductase supports the idea that EGCG is acting indirectly via induction of enzymes or transcription factors.

  20. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  1. Graph Coarsening for Path Finding in Cybersecurity Graphs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh

    2013-01-01

    n the pass-the-hash attack, hackers repeatedly steal password hashes and move through a computer network with the goal of reaching a computer with high level administrative privileges. In this paper we apply graph coarsening in network graphs for the purpose of detecting hackers using this attack or assessing the risk level of the network's current state. We repeatedly take graph minors, which preserve the existence of paths in the graph, and take powers of the adjacency matrix to count the paths. This allows us to detect the existence of paths as well as find paths that have high risk ofmore » being used by adversaries.« less

  2. Deeply learnt hashing forests for content based image retrieval in prostate MR images

    NASA Astrophysics Data System (ADS)

    Shah, Amit; Conjeti, Sailesh; Navab, Nassir; Katouzian, Amin

    2016-03-01

    Deluge in the size and heterogeneity of medical image databases necessitates the need for content based retrieval systems for their efficient organization. In this paper, we propose such a system to retrieve prostate MR images which share similarities in appearance and content with a query image. We introduce deeply learnt hashing forests (DL-HF) for this image retrieval task. DL-HF effectively leverages the semantic descriptiveness of deep learnt Convolutional Neural Networks. This is used in conjunction with hashing forests which are unsupervised random forests. DL-HF hierarchically parses the deep-learnt feature space to encode subspaces with compact binary code words. We propose a similarity preserving feature descriptor called Parts Histogram which is derived from DL-HF. Correlation defined on this descriptor is used as a similarity metric for retrieval from the database. Validations on publicly available multi-center prostate MR image database established the validity of the proposed approach. The proposed method is fully-automated without any user-interaction and is not dependent on any external image standardization like image normalization and registration. This image retrieval method is generalizable and is well-suited for retrieval in heterogeneous databases other imaging modalities and anatomies.

  3. Modeling and Simulation of the Economics of Mining in the Bitcoin Market

    PubMed Central

    Marchesi, Michele

    2016-01-01

    In January 3, 2009, Satoshi Nakamoto gave rise to the “Bitcoin Blockchain”, creating the first block of the chain hashing on his computer’s central processing unit (CPU). Since then, the hash calculations to mine Bitcoin have been getting more and more complex, and consequently the mining hardware evolved to adapt to this increasing difficulty. Three generations of mining hardware have followed the CPU’s generation. They are GPU’s, FPGA’s and ASIC’s generations. This work presents an agent-based artificial market model of the Bitcoin mining process and of the Bitcoin transactions. The goal of this work is to model the economy of the mining process, starting from GPU’s generation, the first with economic significance. The model reproduces some “stylized facts” found in real-time price series and some core aspects of the mining business. In particular, the computational experiments performed can reproduce the unit root property, the fat tail phenomenon and the volatility clustering of Bitcoin price series. In addition, under proper assumptions, they can reproduce the generation of Bitcoins, the hashing capability, the power consumption, and the mining hardware and electrical energy expenditures of the Bitcoin network. PMID:27768691

  4. Modeling of Abrasion and Crushing of Unbound Granular Materials During Compaction

    NASA Astrophysics Data System (ADS)

    Ocampo, Manuel S.; Caicedo, Bernardo

    2009-06-01

    Unbound compacted granular materials are commonly used in engineering structures as layers in road pavements, railroad beds, highway embankments, and foundations. These structures are generally subjected to dynamic loading by construction operations, traffic and wheel loads. These repeated or cyclic loads cause abrasion and crushing of the granular materials. Abrasion changes a particle's shape, and crushing divides the particle into a mixture of many small particles of varying sizes. Particle breakage is important because the mechanical and hydraulic properties of these materials depend upon their grain size distribution. Therefore, it is important to evaluate the evolution of the grain size distribution of these materials. In this paper an analytical model for unbound granular materials is proposed in order to evaluate particle crushing of gravels and soils subjected to cyclic loads. The model is based on a Markov chain which describes the development of grading changes in the material as a function of stress levels. In the model proposed, each particle size is a state in the system, and the evolution of the material is the movement of particles from one state to another in n steps. Each step is a load cycle, and movement between states is possible with a transition probability. The crushing of particles depends on the mechanical properties of each grain and the packing density of the granular material. The transition probability was calculated using both the survival probability defined by Weibull and the compressible packing model developed by De Larrard. Material mechanical properties are considered using the Weibull probability theory. The size and shape of the grains, as well as the method of processing the packing density are considered using De Larrard's model. Results of the proposed analytical model show a good agreement with the experimental tests carried out using the gyratory compaction test.

  5. Miconazole enhances nerve regeneration and functional recovery after sciatic nerve crush injury.

    PubMed

    Lin, Tao; Qiu, Shuai; Yan, Liwei; Zhu, Shuang; Zheng, Canbin; Zhu, Qingtang; Liu, Xiaolin

    2018-05-01

    Improving axonal outgrowth and remyelination is crucial for peripheral nerve regeneration. Miconazole appears to enhance remyelination in the central nervous system. In this study we assess the effect of miconazole on axonal regeneration using a sciatic nerve crush injury model in rats. Fifty Sprague-Dawley rats were divided into control and miconazole groups. Nerve regeneration and myelination were determined using histological and electrophysiological assessment. Evaluation of sensory and motor recovery was performed using the pinprick assay and sciatic functional index. The Cell Counting Kit-8 assay and Western blotting were used to assess the proliferation and neurotrophic expression of RSC 96 Schwann cells. Miconazole promoted axonal regrowth, increased myelinated nerve fibers, improved sensory recovery and walking behavior, enhanced stimulated amplitude and nerve conduction velocity, and elevated proliferation and neurotrophic expression of RSC 96 Schwann cells. Miconazole was beneficial for nerve regeneration and functional recovery after peripheral nerve injury. Muscle Nerve 57: 821-828, 2018. © 2017 Wiley Periodicals, Inc.

  6. 21 CFR 137.195 - Crushed wheat.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Crushed wheat. 137.195 Section 137.195 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR HUMAN... Related Products § 137.195 Crushed wheat. Crushed wheat, coarse ground wheat, is the food prepared by so...

  7. Crushed Cartilage: A Rescue Procedure in Rhinoplasty.

    PubMed

    Boccieri, Armando; Marianetti, Tito M; Pascali, Michele

    2018-05-01

    While the use of crushed cartilage is now universally recognized as a valid procedure in rhinoplasty to mask irregularities and eliminate slight deficits, there is still no consensus as to the optimal degree of crushing and the rate of graft resorption over time. With a view to casting light on these 2 important aspects and providing some guidelines, the authors present a study of 123 patients subjected to grafts of cartilage with different degrees of crushing in the different areas of the nasal pyramid: upper third (45 patients), middle third (40), and lower third (38). The degree of crushing was medium for 95 patients and high for 28 who presented thinner and less elastic skin. Comparison of the performance over time of the cartilage grafts inserted in the same areas but with different degrees of crushing provides important indications as regard the best way of preparing the material. The results proved satisfactory with improvements for all of the 95 patients subjected to grafts of moderately crushed cartilage. The initial defect was instead still present, albeit with some partial improvement, at a distance of 12 months in 17 of the 28 patients where highly crushed cartilage was used. The study suggests that a moderate degree of crushing offers better results as regard flexibility and stability over time.

  8. Characteristics of Crushing Energy and Fractal of Magnetite Ore under Uniaxial Compression

    NASA Astrophysics Data System (ADS)

    Gao, F.; Gan, D. Q.; Zhang, Y. B.

    2018-03-01

    The crushing mechanism of magnetite ore is a critical theoretical problem on the controlling of energy dissipation and machine crushing quality in ore material processing. Uniaxial crushing tests were carried out to research the deformation mechanism and the laws of the energy evolution, based on which the crushing mechanism of magnetite ore was explored. The compaction stage and plasticity and damage stage are two main compression deformation stages, the main transitional forms from inner damage to fracture are plastic deformation and stick-slip. In the process of crushing, plasticity and damage stage is the key link on energy absorption for that the specimen tends to saturate energy state approaching to the peak stress. The characteristics of specimen deformation and energy dissipation can synthetically reply the state of existed defects inner raw magnetite ore and the damage process during loading period. The fast releasing of elastic energy and the work done by the press machine commonly make raw magnetite ore thoroughly broken after peak stress. Magnetite ore fragments have statistical self-similarity and size threshold of fractal characteristics under uniaxial squeezing crushing. The larger ratio of releasable elastic energy and dissipation energy and the faster energy change rate is the better fractal properties and crushing quality magnetite ore has under uniaxial crushing.

  9. Effect of warning symbols in combination with education on the frequency of erroneously crushing medication in nursing homes: an uncontrolled before and after study

    PubMed Central

    van Welie, Steven; Wijma, Linda; Beerden, Tim; van Doormaal, Jasperien; Taxis, Katja

    2016-01-01

    Objectives Residents of nursing homes often have difficulty swallowing (dysphagia), which complicates the administration of solid oral dosage formulations. Erroneously crushing medication is common, but few interventions have been tested to improve medication safety. Therefore, we evaluated the effect of warning symbols in combination with education on the frequency of erroneously crushing medication in nursing homes. Setting This was a prospective uncontrolled intervention study with a preintervention and postintervention measurement. The study was conducted on 18 wards (total of 200 beds) in 3 nursing homes in the North of the Netherlands. Participants We observed 36 nurses/nursing assistants (92% female; 92% nursing assistants) administering medication to 197 patients (62.9% female; mean age 81.6). Intervention The intervention consisted of a set of warning symbols printed on each patient's unit dose packaging indicating whether or not a medication could be crushed as well as education of ward staff (lectures, newsletter and poster). Primary outcome measure The relative risk (RR) of a crushing error occurring in the postintervention period compared to the preintervention period. A crushing error was defined as the crushing of a medication considered unsuitable to be crushed based on standard reference sources. Data were collected using direct (disguised) observation of nurses during drug administration. Results The crushing error rate decreased from 3.1% (21 wrongly crushed medicines out of 681 administrations) to 0.5% (3/636), RR=0.15 (95% CI 0.05 to 0.51). Likewise, there was a significant reduction using data from patients with swallowing difficulties only, 87.5% (21 errors/24 medications) to 30.0% (3/10) (RR 0.34, 95% CI 0.13 to 0.89). Medications which were erroneously crushed included enteric-coated formulations (eg, omeprazole), medication with regulated release systems (eg, Persantin; dipyridamol) and toxic substances (eg, finasteride). Conclusions Warning symbols combined with education reduced erroneous crushing of medication, a well-known and common problem in nursing homes. PMID:27496242

  10. Balance and coordination training, but not endurance training, enhances synaptophysin and neurotrophin-3 immunoreactivity in the lumbar spinal cord after sciatic nerve crush.

    PubMed

    Bonetti, Leandro Viçosa; Ilha, Jocemar; Schneider, Ana Paula Krauthein; Barbosa, Silvia; Faccioni-Heuser, Maria Cristina

    2016-04-01

    Numerous rehabilitation treatments have been shown to be useful for peripheral and central restoration after (PNI). After sciatic nerve crush, we investigated 4 weeks of endurance training (ET) and balance and coordination training (BCT) with sciatic function index, hind-paw stride length, and spinal cord dorsal horn synaptophysin and neurotrophin-3 immunoreactivity. Our results demonstrated no significant differences between the non-trained (NT), ET, and BCT groups in sciatic functional index, and in stride-length analysis, but the ET showed higher values compared with the NT group. Synaptophysin immunoreactivity was higher in the BCT group compared with the NT group, and neurotrophin-3 immunoreactivity in the BCT group was greater compared with the other groups. BCT can positively affect spinal cord plasticity after a (PNI), and these modifications are important in the rehabilitation process. © 2015 Wiley Periodicals, Inc.

  11. Modeling Composite Laminate Crushing for Crash Analysis

    NASA Technical Reports Server (NTRS)

    Fleming, David C.; Jones, Lisa (Technical Monitor)

    2002-01-01

    Crash modeling of composite structures remains limited in application and has not been effectively demonstrated as a predictive tool. While the global response of composite structures may be well modeled, when composite structures act as energy-absorbing members through direct laminate crushing the modeling accuracy is greatly reduced. The most efficient composite energy absorbing structures, in terms of energy absorbed per unit mass, are those that absorb energy through a complex progressive crushing response in which fiber and matrix fractures on a small scale dominate the behavior. Such failure modes simultaneously include delamination of plies, failure of the matrix to produce fiber bundles, and subsequent failure of fiber bundles either in bending or in shear. In addition, the response may include the significant action of friction, both internally (between delaminated plies or fiber bundles) or externally (between the laminate and the crushing surface). A figure shows the crushing damage observed in a fiberglass composite tube specimen, illustrating the complexity of the response. To achieve a finite element model of such complex behavior is an extremely challenging problem. A practical crushing model based on detailed modeling of the physical mechanisms of crushing behavior is not expected in the foreseeable future. The present research describes attempts to model composite crushing behavior using a novel hybrid modeling procedure. Experimental testing is done is support of the modeling efforts, and a test specimen is developed to provide data for validating laminate crushing models.

  12. Evaluating the Psychological Concomitants of Other-Sex Crush Experiences during Early Adolescence

    PubMed Central

    Bowker, Julie C.; Etkin, Rebecca G.

    2016-01-01

    Very little empirical attention has been paid to other-sex crush experiences during adolescence. As a result, it is not known whether such experiences, which appear to be relatively common, impact psychological adjustment outcomes. This two-wave (3 month interval) longitudinal study of 268 young adolescents (48% girls; M age at Time 1 = 11.84 years) examined the psychological concomitants of other-sex crush experiences (having and being viewed by others as a crush). Anxious-withdrawal and gender were evaluated as moderators. Peer nomination measures at Time 1 assessed both types of crush experiences and mutual friendship involvement, and participants completed self-report measures of loneliness and depressive symptoms at Times 1 and 2. The results from regression analyses revealed significant associations between having an other-sex crush and depressive symptoms at Time 1, after accounting for the effects of mutual friendship. Two interaction effects also revealed that crush status was a risk factor for depressive symptoms at low levels of anxious-withdrawal but a protective factor at high levels. The findings provide the first empirical evidence that other-sex crush experiences are developmentally significant during early adolescence. PMID:26984754

  13. Preconditioning crush increases the survival rate of motor neurons after spinal root avulsion

    PubMed Central

    Li, Lin; Zuo, Yizhi; He, Jianwen

    2014-01-01

    In a previous study, heat shock protein 27 was persistently upregulated in ventral motor neurons following nerve root avulsion or crush. Here, we examined whether the upregulation of heat shock protein 27 would increase the survival rate of motor neurons. Rats were divided into two groups: an avulsion-only group (avulsion of the L4 lumbar nerve root only) and a crush-avulsion group (the L4 lumbar nerve root was crushed 1 week prior to the avulsion). Immunofluorescent staining revealed that the survival rate of motor neurons was significantly greater in the crush-avulsion group than in the avulsion-only group, and this difference remained for at least 5 weeks after avulsion. The higher neuronal survival rate may be explained by the upregulation of heat shock protein 27 expression in motor neurons in the crush-avulsion group. Furthermore, preconditioning crush greatly attenuated the expression of nitric oxide synthase in the motor neurons. Our findings indicate that the neuroprotective action of preconditioning crush is mediated through the upregulation of heat shock protein 27 expression and the attenuation of neuronal nitric oxide synthase upregulation following avulsion. PMID:25206852

  14. Airborne particles released by crushing CNT composites

    NASA Astrophysics Data System (ADS)

    Ogura, I.; Okayama, C.; Kotake, M.; Ata, S.; Matsui, Y.; Gotoh, K.

    2017-06-01

    We investigated airborne particles released as a result of crushing carbon nanotube (CNT) composites using a laboratory scale crusher with rotor blades. For each crushing test, five pellets (approximately 0.1 g) of a polymer (polystyrene, polyamide, or polycarbonate) containing multiwall CNTs (Nanocyl NC7000 or CNano Flotube9000) or no CNTs were placed in the container of the crusher. The airborne particles released by the crushing of the samples were measured. The real-time aerosol measurements showed increases in the concentration of nanometer- and micrometer-sized particles, regardless of the sample type, even when CNT-free polymers were crushed. The masses of the airborne particles collected on filters were below the detection limit, which indicated that the mass ratios of the airborne particles to the crushed pellets were lower than 0.02%. In the electron microscopic analysis, particles with protruding CNTs were observed. However, free-standing CNTs were not found, except for a poorly dispersed CNT-polystyrene composite. This study demonstrated that the crushing test using a laboratory scale crusher is capable of evaluating the potential release of CNTs as a result of crushing CNT composites. The advantage of this method is that only a small amount of sample (several pieces of pellets) is required.

  15. Modelling and analysis of the crush zone of a typical Australian passenger train

    NASA Astrophysics Data System (ADS)

    Sun, Y. Q.; Cole, C.; Dhanasekar, M.; Thambiratnam, D. P.

    2012-07-01

    In this paper, a three-dimensional nonlinear rigid body model has been developed for the investigation of the crashworthiness of a passenger train using the multibody dynamics approach. This model refers to a typical design of passenger cars and train constructs commonly used in Australia. The high-energy and low-energy crush zones of the cars and the train constructs are assumed and the data are explicitly provided in the paper. The crash scenario is limited to the train colliding on to a fixed barrier symmetrically. The simulations of a single car show that this initial design is only applicable for the crash speed of 35 km/h or lower. For higher speeds (e.g. 140 km/h), the crush lengths or crush forces or both the crush zone elements will have to be enlarged. It is generally better to increase the crush length than the crush force in order to retain the low levels of the longitudinal deceleration of the passenger cars.

  16. Electrical stimulation and testosterone enhance recovery from recurrent laryngeal nerve crush.

    PubMed

    Monaco, Gina N; Brown, Todd J; Burgette, Ryan C; Fargo, Keith N; Akst, Lee M; Jones, Kathryn J; Foecking, Eileen M

    2015-01-01

    This study investigated the effects of a combinatorial treatment, consisting of a brief period of nerve electrical stimulation (ES) and systemic supraphysiologic testosterone, on functional recovery following a crush of the recurrent laryngeal nerve (RLN). Prospective, controlled animal study. After a crush of the left RLN, adult male Sprague-Dawley rats were divided into four treatment groups: 1) no treatment, 2) ES, 3) testosterone propionate (TP), and 4) ES + TP. Each group was subdivided into 1, 2, 3, or 4 weeks post-operative survival time points. Groups had an n of 4- 9. Recovery of vocal fold mobility (VFM) was assessed. Brief ES of the proximal nerve alone or in combination with TP accelerated the initiation of functional recovery. TP administration by itself also produced increased VFM scores compared to controls, but there were no statistical differences between the ES-treated and TP-treated animals. Treatment with brief ES alone was sufficient to decrease the time required to recover complete VFM. Animals with complete VFM were seen in treatment groups as early as 1 week following injury; in the untreated group, this was not observed until at least 3 weeks post-injury, translating into a 66% decrease in time to complete recovery. Brief ES, alone or in combination with TP, promise to be effective therapeutic interventions for promoting regeneration following RLN injury.

  17. Management of Crush Syndrome Casualties after Disasters

    PubMed Central

    Sever, Mehmet Sukru; Vanholder, Raymond

    2011-01-01

    After direct impact of the trauma, crush syndrome is the second most frequent cause of death after mass disasters. However, since crush syndrome is quite rare in daily practice, mistakes are frequent in the treatment of these cases. This paper summarizes the etiopathogenesis of traumatic rhabdomyolysis and of crush syndrome-based acute kidney injury. The clinical and laboratory features, prophylaxis, and treatment of crush cases are described as well. The importance of early and energetic fluid resuscitation is underlined for prophylaxis of acute kidney injury. Since there is chaos, and an overwhelming number of victims, logistic drawbacks create a specific problem in the treatment of crush victims after mass disasters. Potential solutions for logistic hurdles and disaster preparedness scenarios have also been provided in this review article. PMID:23908797

  18. The Hong Kong/AAO/Strasbourg Hα (HASH) Planetary Nebula Database

    NASA Astrophysics Data System (ADS)

    Bojičić, Ivan S.; Parker, Quentin A.; Frew, David J.

    2017-10-01

    The Hong Kong/AAO/Strasbourg Hα (HASH) planetary nebula database is an online research platform providing free and easy access to the largest and most comprehensive catalogue of known Galactic PNe and a repository of observational data (imaging and spectroscopy) for these and related astronomical objects. The main motivation for creating this system is resolving some of long standing problems in the field e.g. problems with mimics and dubious and/or misidentifications, errors in observational data and consolidation of the widely scattered data-sets. This facility allows researchers quick and easy access to the archived and new observational data and creating and sharing of non-redundant PN samples and catalogues.

  19. Comparison of Various Similarity Measures for Average Image Hash in Mobile Phone Application

    NASA Astrophysics Data System (ADS)

    Farisa Chaerul Haviana, Sam; Taufik, Muhammad

    2017-04-01

    One of the main issue in Content Based Image Retrieval (CIBR) is similarity measures for resulting image hashes. The main key challenge is to find the most benefits distance or similarity measures for calculating the similarity in term of speed and computing costs, specially under limited computing capabilities device like mobile phone. This study we utilize twelve most common and popular distance or similarity measures technique implemented in mobile phone application, to be compared and studied. The results show that all similarity measures implemented in this study was perform equally under mobile phone application. This gives more possibilities for method combinations to be implemented for image retrieval.

  20. Performance-Oriented Privacy-Preserving Data Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relationalmore » join operation between a massive public table and a relatively smaller private one.« less

  1. Planetary Nebula Candidates Uncovered with the HASH Research Platform

    NASA Astrophysics Data System (ADS)

    Fragkou, Vasiliki; Bojičić, Ivan; Frew, David; Parker, Quentin

    2017-10-01

    A detailed examination of new high quality radio catalogues (e.g. Cornish) in combination with available mid-infrared (MIR) satellite imagery (e.g. Glimpse) has allowed us to find 70 new planetary nebula (PN) candidates based on existing knowledge of their typical colors and fluxes. To further examine the nature of these sources, multiple diagnostic tools have been applied to these candidates based on published data and on available imagery in the HASH (Hong Kong/ AAO/ Strasbourg Hα planetary nebula) research platform. Some candidates have previously-missed optical counterparts allowing for spectroscopic follow-up. Indeed, the single object spectroscopically observed so far has turned out to be a bona fide PN.

  2. Blockade of Nogo Receptor Ligands Promotes Functional Regeneration of Sensory Axons After Dorsal Root Crush

    PubMed Central

    Harvey, Pamela A.; Lee, Daniel H.S.; Qian, Fang; Weinreb, Paul H.; Frank, Eric

    2010-01-01

    A major impediment for regeneration of axons within the central nervous system is the presence of multiple inhibitory factors associated with myelin. Three of these factors bind to the Nogo receptor, NgR, which is expressed on axons. Administration of exogenous blockers of NgR or NgR ligands promotes the regeneration of descending axonal projections after spinal cord hemisection. A more detailed analysis of CNS regeneration can be made by examining the growth of specific classes of sensory axons into the spinal cord after dorsal root crush injury . In this study, we assessed whether administration of a soluble peptide fragment of the NgR that binds to and blocks all three NgR ligands can promote regeneration after brachial dorsal root crush in adult rats. Intraventricular infusion of sNgR for one month results in extensive regrowth of myelinated sensory axons into the white and gray matter of the dorsal spinal cord, but unmyelinated sensory afferents do not regenerate. In concert with the anatomical growth of sensory axons into the cord, there is a gradual restoration of synaptic function in the denervated region, as revealed by extracellular microelectrode recordings from the spinal gray matter in response to stimulation of peripheral nerves. These positive synaptic responses are correlated with substantial improvements in use of the forelimb, as assessed by paw preference, paw withdrawal to tactile stimuli and the ability to grasp. These results suggest that sNgR may be a potential therapy for restoring sensory function following injuries to sensory roots. PMID:19439606

  3. State summaries: Illinois

    USGS Publications Warehouse

    Lasemi, Z.; Mikulic, Donald G.

    2006-01-01

    According to the United States Geological Survey (USGS), Illinois ranked third in the amount of crushed stone produced from underground mining operations. In 2004, Illinois produced more than 76.5 Mt of crushed stone and 38.7 Mt of sand-and-gravel. Preliminary data for 2005 showed an increase in the production of crushed stone and a slight decrease in the production of sand-and-gravel. The state remained 16th in total value of nonfuel mineral production. In decreasing order of value, the minerals produced included crushed stone, cement, construction sand and gravel, lime, clay, peat, tripoli, industrial sand, crushed sandstone and gemstone.

  4. Using Purpose-Built Functions and Block Hashes to Enable Small Block and Sub-file Forensics

    DTIC Science & Technology

    2010-01-01

    JPEGs. We tested precarve using the nps-2009-canon2-gen6 (Garfinkel et al., 2009) disk image. The disk image was created with a 32 MB SD card and a...analysis of n-grams in the fragment. Fig. 1 e Usage of a 160 GB iPod reported by iTunes 8.2.1 (6) (top), as reported by the file system (bottom center), and...as computing with random sampling (bottom right). Note that iTunes usage actually in GiB, even though the program displays the “GB” label. Fig. 2 e

  5. Effects of Bright Light Therapy on Sleep, Cognition, Brain Function, and Neurochemistry in Mild Traumatic Brain Injury

    DTIC Science & Technology

    2015-01-01

    rush”, nitrous oxide ("laughing gas"), amyl or butyl nitrate ("poppers").      Cannabis:   marijuana , hashish ("hash"), THC, "pot", "grass", "weed...have you used marijuana ? _______________ Have you ever used marijuana at other times in your life? YES NO If YES, at what age did you begin...smoking marijuana ? ______________ On approximately how many occasions have you used marijuana ? __________ Do you use any other street drugs currently

  6. Studies on questions of design and construction of chain scraper conveyors. [mining operations

    NASA Technical Reports Server (NTRS)

    Guder, H.

    1980-01-01

    The basic behavior of mining crushed goods in chain scraper conveyors was examined using a special test stand. The characteristics resistance lines of the upper end-piece were determined for conveyor idle as a function of the determinative crushed good characteristics (granular structure, moisture content, type of goods) on the size of the conveyor load, on the conveyor construction and on the stopped time of the conveyor. Crushed goods with a narrow granular profile and sphere-like grains caused about 35% greater resistance than fine coal and raw coal with broad granular profile. For goods containing water more than 10% by weight, the solids friction retreated in favor of flow friction. The coefficient of resistance decreased considerably in the range of lower speeds and then increased with increasing conveyor speed. The conveyance of sandstone ore required about 280% greater specific drive than the conveyance of raw coal. Resistance coefficients for coal and raw coal showed no dependence on the design of the conveyor. Start-up of loaded conveyors after longer stop times was simulated and the specific break-loose force was determined.

  7. Effect of warning symbols in combination with education on the frequency of erroneously crushing medication in nursing homes: an uncontrolled before and after study.

    PubMed

    van Welie, Steven; Wijma, Linda; Beerden, Tim; van Doormaal, Jasperien; Taxis, Katja

    2016-08-05

    Residents of nursing homes often have difficulty swallowing (dysphagia), which complicates the administration of solid oral dosage formulations. Erroneously crushing medication is common, but few interventions have been tested to improve medication safety. Therefore, we evaluated the effect of warning symbols in combination with education on the frequency of erroneously crushing medication in nursing homes. This was a prospective uncontrolled intervention study with a preintervention and postintervention measurement. The study was conducted on 18 wards (total of 200 beds) in 3 nursing homes in the North of the Netherlands. We observed 36 nurses/nursing assistants (92% female; 92% nursing assistants) administering medication to 197 patients (62.9% female; mean age 81.6). The intervention consisted of a set of warning symbols printed on each patient's unit dose packaging indicating whether or not a medication could be crushed as well as education of ward staff (lectures, newsletter and poster). The relative risk (RR) of a crushing error occurring in the postintervention period compared to the preintervention period. A crushing error was defined as the crushing of a medication considered unsuitable to be crushed based on standard reference sources. Data were collected using direct (disguised) observation of nurses during drug administration. The crushing error rate decreased from 3.1% (21 wrongly crushed medicines out of 681 administrations) to 0.5% (3/636), RR=0.15 (95% CI 0.05 to 0.51). Likewise, there was a significant reduction using data from patients with swallowing difficulties only, 87.5% (21 errors/24 medications) to 30.0% (3/10) (RR 0.34, 95% CI 0.13 to 0.89). Medications which were erroneously crushed included enteric-coated formulations (eg, omeprazole), medication with regulated release systems (eg, Persantin; dipyridamol) and toxic substances (eg, finasteride). Warning symbols combined with education reduced erroneous crushing of medication, a well-known and common problem in nursing homes. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  8. Impact of recommendations on crushing medications in geriatrics: from prescription to administration.

    PubMed

    Bourdenet, Gwladys; Giraud, Sophie; Artur, Marion; Dutertre, Sophie; Dufour, Marie; Lefèbvre-Caussin, Marie; Proux, Alice; Philippe, Sandrine; Capet, Corinne; Fontaine-Adam, Magali; Kadri, Karine; Landrin, Isabelle; Gréboval, Emmanuelle; Touflet, Myriam; Nanfack, Jules; Tharasse, Christine; Varin, Rémi; Rémy, Elise; Daouphars, Mikaël; Doucet, Jean

    2015-06-01

    The practice of crushing drugs is very common in geriatric units. In 2009 a first study, performed in all geriatric units of a university hospital, showed that numerous errors were made during prescription, preparation and administration. The aim of this second prospective study was to assess the impact of regional and national recommendations in the same geriatric units. A survey of 719 patients (85.3 ± 6.7 years) was performed in 2013. For each patient who received crushed drugs, we recorded the reason the drugs were crushed, pharmacological classes, galenic presentations and the technique used for preparation and administration. Results were compared to the previous study. The number of patients receiving drugs after crushing was significantly lower than in the previous study (22.9% vs. 32.3%, P < 0.001). The number of crushed drugs was lower too (594 per 165 patients vs. 966 per 224 patients (P < 0.01). The main indication for crushing drugs remained swallowing disorders. The dosage form prevented crushing in 24.9% of drugs (vs. 42.0% in 2009, P < 0.001), but the drugs generally remained crushed all together. A mortar was used less often (38.6% vs. 92.6%, P < 0.001), with preference for individual-specific cups (56.1%). Mortars were more often cleaned between each patient (56.0% vs. 11.6%). The vehicle was more often neutral (water 88.5% vs. 5.7%, P < 0.001). This second study shows that regional and national recommendations have led to an overall improvement of practices for crushing drugs. Technical improvements are still possible, in association with appropriate pharmacological studies. © 2015 Société Française de Pharmacologie et de Thérapeutique.

  9. Phosphate-binding efficacy of crushed vs. chewed lanthanum carbonate in hemodialysis patients.

    PubMed

    How, Priscilla P; Anattiwong, Prathana; Mason, Darius L; Arruda, Jose A; Lau, Alan H

    2011-01-01

    Lanthanum carbonate, a chewable noncalcium-containing phosphorus (P) binder, is useful for treating secondary hyperparathyroidism in patients who have hypercalcemia and cannot swallow whole tablets. However, some patients cannot chew tablets or prefer to crush and mix them with food. This study was conducted to determine the P-binding efficacy of crushed lanthanum and compare it with chewed lanthanum in hemodialysis (HD) patients. After a 1-week washout period, 11 hemodialysis patients (7 men, 4 women) were randomized to receive, in a crossover fashion, lanthanum 1000 mg 3 times daily chewed with meals and lanthanum 1000 mg 3 times daily crushed into a fine powder, mixed with applesauce and taken with meals, for 4 weeks each. Serum P was measured at the end of each washout (baseline) and weekly during treatment. Changes in serum P from baseline for crushed lanthanum were compared with chewed lanthanum using paired sample t test. Administration of crushed lanthanum resulted in a significant reduction in serum P from baseline (P reduction [mg/dL] for crushed lanthanum in week 1: 2.1 ± 0.4, week 2: 1.7 ± 0.5, week 3: 1.7 ± 0.5, week 4: 1.7 ± 0.4, P<0.05). No statistically significant differences were observed in serum P reduction from baseline and serum P attained during treatment with crushed when compared with chewed lanthanum. Crushed lanthanum is effective in reducing serum P and have similar P-binding efficacy to chewed lanthanum. Crushing lanthanum and mixing it with food can thus be an option for patients who are unable to chew or swallow whole tablets. © 2010 The Authors. Hemodialysis International © 2010 International Society for Hemodialysis.

  10. Pharmacokinetics of Lopinavir/Ritonavir Crushed versus Whole Tablets in Children

    PubMed Central

    Best, Brookie M.; Capparelli, Edmund V.; Diep, Huy; Rossi, Steven S.; Farrell, Michael J.; Williams, Elaine; Lee, Grace; van den Anker, John N.; Rakhmanina, Natella

    2011-01-01

    Objective Lopinavir/ritonavir (Kaletra®) is first line therapy for pediatric HIV infection. In clinical practice, Kaletra® tablets are occasionally crushed for pediatric administration. This study compared lopinavir/ritonavir exposure between whole and crushed tablets in HIV-infected children. Design This was a randomized, open-label, cross-over study of pediatric patients taking lopinavir/ritonavir as part of their antiretroviral regimen. Each subject had two separate (within 30 days) steady-state 12-hour pharmacokinetic (PK) studies with crushed and whole 200/50 mg lopinavir/ritonavir tablets. Methods PK blood samples were drawn at 0 (pre-dose), 1, 2, 4, 6, 8, and 12 hours post-dose. Lopinavir and ritonavir plasma concentrations measured by high performance liquid chromatography were used to calculate non-compartmental area under the concentration versus time curve (AUC) and clearance (CL/F). Wilcoxon signed-rank tests compared PK values between crushed and whole tablets. Results Twelve children, median age of 13 years (10–16 years), took 550/138 mg/m2/day lopinavir/ritonavir divided every 12 hours. The median lopinavir AUC following crushed and whole tablets were 92 mg*hr/L and 144 mg*hr/L, respectively, with an AUC ratio of 0.55 (p=0.003). Median ritonavir AUC of crushed and whole tablets were 7 mg*hr/L and 13.3 mg*hr/L, respectively, with an AUC ratio of 0.53 (p=0.006). Conclusions Administration of crushed 200/50 mg lopinavir/ritonavir tablets to children significantly reduced lopinavir and ritonavir exposure with a decrease in AUC by 45% and 47%, respectively. The administration of crushed tablets would require higher doses and therapeutic drug monitoring to ensure adequate lopinavir exposure in patients requiring this practice. The use of crushed lopinavir/ritonavir tablets should be avoided, if possible. PMID:21876444

  11. A historical perspective on crush syndrome: the clinical application of its pathogenesis, established by the study of wartime crush injuries.

    PubMed

    Peiris, Dilini

    2017-04-01

    Crush syndrome is a fine example of how pathology can play a direct role in revealing the best treatment and management for diseases. It can occur when crush injuries are sustained. Skeletal muscle becomes damaged under the weight of a heavy object, and victims experience severe shock and renal failure. The discovery of the pathology of crush syndrome belongs to two individuals: Seigo Minami and Eric Bywaters. They separately helped to define the pathogenesis of crush syndrome during World Wars I and II. Seigo Minami is believed to have been the first to record the pathogenesis of crush syndrome. In 1923, he described the cases of three soldiers who died of renal failure caused by crush injury during World War I. Using microscopic studies to investigate the pathology of their kidneys, he found the soldiers had died due to 'autointoxication' caused by rhabdomyolysis. This discovery was not known to Eric Bywaters, who described crush syndrome in 1941, having studied victims of the London Blitz during World War II. He defined the 'autointoxication' as the release of rhabdomyolysis products via reperfusion. He therefore established the need for emergency fluid replacement to treat crush syndrome. The findings made by Minami and Bywaters highlight a remarkable achievement in clinical pathology, despite the adversity of war. It is these findings on which current guidelines are based. By reviewing their work, it is hoped that the role of pathology can be better appreciated as a valuable resource for delineating the treatment and management of diseases. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  12. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and [InlineEquation not available: see fulltext.] Discretization

    NASA Astrophysics Data System (ADS)

    Wai Kuan, Yip; Teoh, Andrew B. J.; Ngo, David C. L.

    2006-12-01

    We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and[InlineEquation not available: see fulltext.] discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific[InlineEquation not available: see fulltext.] discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT) and discrete fourier transform (DFT). Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of[InlineEquation not available: see fulltext.] and[InlineEquation not available: see fulltext.] for random and skilled forgeries for stolen token (worst case) scenario, and[InlineEquation not available: see fulltext.] for both forgeries in the genuine token (optimal) scenario.

  13. Dynamic axial crushing of bitubular tubes with curvy polygonal inner-tube sections

    NASA Astrophysics Data System (ADS)

    Ahmed, Naveed; Xue, Pu; Zafar, Naeem

    Bitubular structural configurations, where the outer tube is circular, square and curvy square in shape while the inner-tube section is curvy triangular, square and hexagonal in different proposed configurations, are numerically crushed under dynamic axial loading. The crashworthiness effectiveness for changing inner-tube polygonal cross-section for each of the outer tube sections is studied and compared with changing outer tube shape. The deformation plots and energy absorption (EA) parameters such as peak crushing force (PCF) mean crushing force (MCF), energy absorption and crush force efficiency for each case are evaluated. Most of the configurations showed ovalization with low PCF and MCF and moderate crush force efficiency. Afterwards, effects of L/D and t/R on deformation modes and EA are demonstrated by selecting one of the configurations from each group using published experimental results.

  14. Joining and reinforcing a composite bumper beam and a composite crush can for a vehicle

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berger, Elisabeth; Decker, Leland; Armstrong, Dale

    A front bumper beam and crush can (FBCC) system is provided for a vehicle. A bumper beam has an interior surface with a plurality of ribs extending therefrom. The ribs and the interior surface are made of a chopped fiber composite and cooperate to engage a crush can. The chopped fiber composite reinforces the engaging surfaces of the crush can and the interior surface of the bumper beam. The crush can has a tubular body made of a continuous fiber composite. The crush can has outwardly-extending flanges at an end spaced away from the bumper beam. The flanges are atmore » least partially provided with a layer of chopped fiber composite to reinforce a joint between the outwardly-extending flange and the vehicle frame.« less

  15. Studying Biological Rhythms of Person's Skin-galvanic Reaction and Dynamics of Light Transmission by Isomeric Substance in Space Flight Conditions

    NASA Technical Reports Server (NTRS)

    Glushko, Vladimir

    2004-01-01

    Intensity and amplitude of human functional systems and human most important organs are wavelike, rhythmic by nature. These waves have constant periodicity, phase and amplitude. The mentioned characteristics can vary, however their variations have a pronounced reiteration in the course of time. This indicates a hashing of several wave processes and their interference. Stochastic changes in wave processes characteristics of a human organism are explained either by 'pulsations' associated with hashing (superposition) of several wave processes and their interference, or by single influence of environmental physical factors on a human organism. Human beings have respectively periods of higher and lower efficiency, state of health and so on, depending not only of environmental factors, but also of 'internal' rhythmic factor. Sometimes peaks and falls periodicity of some or other characteristics is broken. Disturbance of steady-state biological rhythms is usually accompanied by reduction of activity steadiness of the most important systems of a human organism. In its turn this has an effect on organism's adaptation to changing living conditions as well as on general condition and efficiency of a human being. The latter factor is very important for space medicine. Biological rhythmology is a special branch of biology and medicine, it studies rhythmic activity mechanisms of organs, their systems, individuals and species. Appropriate researches were also carried out in space medicine.

  16. Ultrasound-guided plasma rich in growth factors injections and scaffolds hasten motor nerve functional recovery in an ovine model of nerve crush injury.

    PubMed

    Sánchez, Mikel; Anitua, E; Delgado, D; Prado, R; Sánchez, P; Fiz, N; Guadilla, J; Azofra, J; Pompei, O; Orive, G; Ortega, M; Yoshioka, T; Padilla, S

    2017-05-01

    In the present study we evaluated the motor recovery process of peripheral nerve injury (PNI), based on electrophysiological and histomorphometric criteria, after treatment with plasma rich in growth factors (PRGF) injections and scaffolds in an ovine model. Three groups of sheep underwent a nerve crush lesion: the first group (n = 3) was left to recover spontaneously (SR); the second group was administered saline injections (SI; n = 5) and a third group (n = 6) received PRGF injections and scaffolds immediately after the crush injury. At post-intervention week 8, 70% of sheep in the PRGF group were CMAP-positive, with no electrophysiological response in the rest of the groups. Histomorphometric analysis 12 weeks after the surgical intervention revealed that the average axonal density of the SR (1184 ± 864 axons/µm 2 ) and SI (3109 ± 2450 axons/µm 2 ) groups was significantly inferior to the control (8427 ± 2433 axons/µm 2 ) and also inferior to the PRGF group (5276 ± 4148 axons/µm 2 ), showing no significant differences between the control and PRGF groups. The axonal size of the SR and SI groups was significantly smaller compared with the control group (18 ± 4 µm 2 ), whereas the axonal size of the PRGF group (6 ± 5 µm 2 ) did not show statistical differences from the control. Morphometry of the target muscles indicated that the PRGF group had the lowest percentage volume reduction 12 weeks after the crush injury. The PRGF group had larger muscle fibre areas than the SI and SR groups, although the differences did not reach statistical significance. Overall, these data suggest that the PRGF injections and scaffolds hastened functional axon recovery and dampened atrophy of the target muscles in an ovine model. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  17. Case Report: The casting motion to mobilize stiffness technique for rehabilitation after a crush and degloving injury of the hand.

    PubMed

    Midgley, Robyn

    2016-01-01

    Case report. This case report describes the use of the casting motion to mobilize stiffness (CMMS) technique in the management of a crush and degloving injury of the hand. The patient was unable to attend multiple hand therapy sessions due to geographic constraints. The CMMS technique involved the application of a nonremovable plaster of paris cast that selectively immobilizes proximal joints in an ideal position while constraining distal joints to direct desired motion over a long period. This uses active motion only. Traditional hand therapy techniques or modalities are not used. This treatment approach was beneficial to the patient as a minimum of 2 appointments per month were needed to regain functional hand use. To document the use of the CMMS technique as an effective treatment approach in the management of a crush and degloving injury of the hand. The CMMS technique was applied to the patient's left (nondominant) hand 8 weeks after injury. The technique's aim was to improve the 30° flexion deformity of the left wrist and flexion contractures of the index, middle, and ring fingers with a total active motion of 0°. Orthotic devices and traditional therapy were applied once joint stiffness was resolved, and a normal pattern of motion was reinstated. At 6 months, substantial improvement was noted in wrist as well as metacarpophalangeal and interphalangeal joints. Total active motion exceeded 170° in all fingers excellent functional outcome resulted as measured with the upper limb functional index short form-10. The upper limb functional index increased from 0% to 55% of preinjury status (or capacity) over the 18 months of therapy. Brief immobilization through casting causes certain functional losses, but these are temporary and reversible. Finger stiffness, edema, and tissue fibrosis were successfully managed with the CMMS technique without the need for attendance at multiple hand therapy sessions. Level V. Copyright © 2016 Hanley & Belfus. Published by Elsevier Inc. All rights reserved.

  18. An Overview on Impact Behaviour and Energy Absorption of Collapsible Metallic and Non-Metallic Energy Absorbers used in Automotive Applications

    NASA Astrophysics Data System (ADS)

    Shinde, R. B.; Mali, K. D.

    2018-04-01

    Collapsible impact energy absorbers play an important role of protecting automotive components from damage during collision. Collision of the two objects results into the damage to one or both of them. Damage may be in the form of crack, fracture and scratch. Designers must know about how the material and object behave under impact event. Owing to above reasons different types of collapsible impact energy absorbers are developed. In the past different studies were undertaken to improve such collapsible impact energy absorbers. This article highlights such studies on common shapes of collapsible impact energy absorber and their impact behaviour under the axial compression. The literature based on studies and analyses of effects of different geometrical parameters on the crushing behaviour of impact energy absorbers is presented in detail. The energy absorber can be of different shape such as circular tube, square tube, and frustums of cone and pyramids. The crushing behaviour of energy absorbers includes studies on crushing mechanics, modes of deformation, energy absorbing capacity, effect on peak and mean crushing load. In this work efforts are made to cover major outcomes from past studies on such behavioural parameters. Even though the major literature reviewed is related to metallic energy absorbers, emphasis is also laid on covering literature on use of composite tube, fiber metal lamination (FML) member, honeycomb plate and functionally graded thickness (FGT) tube as a collapsible impact energy absorber.

  19. Traumatic Neuroma in Continuity Injury Model in Rodents

    PubMed Central

    Kemp, Stephen William Peter; Khu, Kathleen Joy Ong Lopez; Kumar, Ranjan; Webb, Aubrey A.; Midha, Rajiv

    2012-01-01

    Abstract Traumatic neuroma in continuity (NIC) results in profound neurological deficits, and its management poses the most challenging problem to peripheral nerve surgeons today. The absence of a clinically relevant experimental model continues to handicap our ability to investigate ways of better diagnosis and treatment for these disabling injuries. Various injury techniques were tested on Lewis rat sciatic nerves. Optimal experimental injuries that consistently resulted in NIC combined both intense focal compression and traction forces. Nerves were harvested at 0, 5, 13, 21, and 65 days for histological examination. Skilled locomotion and ground reaction force (GRF) analysis were performed up to 9 weeks on the experimental (n=6) and crush-control injuries (n=5). Focal widening, disruption of endoneurium and perineurium with aberrant intra- and extrafascicular axonal regeneration and progressive fibrosis was consistently demonstrated in 14 of 14 nerves with refined experimental injuries. At 8 weeks, experimental animals displayed a significantly greater slip ratio in both skilled locomotor assessments, compared to nerve crush animals (p<0.01). GRFs of the crush- injured animals showed earlier improvement compared to the experimental animals, whose overall GRF patterns failed to recover as well as the crush group. We have demonstrated histological features and poor functional recovery consistent with NIC formation in a rat model. The injury mechanism employed combines traction and compression forces akin to the physical forces at play in clinical nerve injuries. This model may serve as a tool to help diagnose this injury earlier and to develop intervention strategies to improve patient outcomes. PMID:22011082

  20. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  1. Crushed cement concrete substitution for construction aggregates; a materials flow analysis

    USGS Publications Warehouse

    Kelly, Thomas

    1998-01-01

    An analysis of the substitution of crushed cement concrete for natural construction aggregates is performed by using a materials flow diagram that tracks all material flows into and out of the cement concrete portion of the products made with cement concrete: highways, roads, and buildings. Crushed cement concrete is only one of the materials flowing into these products, and the amount of crushed cement concrete substituted influences the amount of other materials in the flow. Factors such as availability and transportation costs, as well as physical properties, that can affect stability and finishability, influence whether crushed cement concrete or construction aggregates should be used or predominate for a particular end use.

  2. An investigation of palaeodietary variability in European Pleistocene canids

    NASA Astrophysics Data System (ADS)

    Flower, Lucy O. H.; Schreve, Danielle C.

    2014-07-01

    Temporal and interspecific dietary variability were investigated in three canid taxa, Canis lupus, Canis mosbachensis and Canis etruscus, across a range of British and mainland European wolf assemblages from the Early Pleistocene to Recent periods. Using established cranio-dental indicators to reveal dietary specialisations towards bone eating, flesh slicing, and non-flesh food crushing, inferences were made concerning the proportions of flesh to non-flesh foods in the diet, and hence the level of carnivory adopted by each taxon. Significant temporal differences were found in the diet and frequency of tooth wear of C. lupus from MIS 3, 5a and 7 in Britain. Relative body size comparisons based on lower carnassial length also revealed variation in body size for the Pleistocene age groups, correlating with differences in diet. Stepwise Discriminant Function Analyses revealed large-bodied MIS 5a C. lupus to be hypercarnivorous and specialised in fast flesh slicing and to some extent bone consumption, whereas relatively smaller-bodied MIS 3 and 7 C. lupus were both less carnivorous and more specialised in crushing non-meat foods. Modern wolves from central Sweden are smaller than those of MIS 5a and hypercarnivorous, although with greater specialisation towards crushing of non-meat foods. Temporal variations in diet were related to changes in prey diversity, competition from other carnivores, openness of the environment, and ultimately climate, and reflect the cranio-dental plasticity of C. lupus. In contrast, no temporal differences in diet were found in age groups of C. mosbachensis and C. etruscus, which may relate to more stable overall conditions in comparison to the later Pleistocene. The cranio-dental characteristics of the smaller-bodied mesocarnivore C. etruscus indicate adaptations to non-meat food crushing, whereas in the similarly small C. mosbachensis, enhanced flesh slicing capabilities and reduced crushing abilities indicate that it was more carnivorous than C. etruscus. C. etruscus and C. mosbachensis were both more specialised than C. lupus.

  3. Crushed tablets: does the administration of food vehicles and thickened fluids to aid medication swallowing alter drug release?

    PubMed

    Manrique, Yady J; Lee, Danielle J; Islam, Faiza; Nissen, Lisa M; Cichero, Julie A Y; Stokes, Jason R; Steadman, Kathryn J

    2014-01-01

    To evaluate the influence of co-administered vehicles on in vitro dissolution in simulated gastric fluid of crushed immediate release tablets as an indicator for potential drug bioavailability compromise. Release and dissolution of crushed amlodipine, atenolol, carbamazepine and warfarin tablets were tested with six foods and drinks that are frequently used in the clinical setting as mixers for crushed medications (water, orange juice, honey, yoghurt, strawberry jam and water thickened with Easythick powder) in comparison to whole tablets. Five commercial thickening agents (Easythick Advanced, Janbak F, Karicare, Nutilis, Viscaid) at three thickness levels were tested for their effect on the dissolution of crushed atenolol tablets. Atenolol dissolution was unaffected by mixing crushed tablets with thin fluids or food mixers in comparison to whole tablets or crushed tablets in water, but amlodipine was delayed by mixing with jam. Mixing crushed warfarin and carbamazepine tablets with honey, jam or yoghurt caused them to resemble the slow dissolution of whole tablets rather than the faster dissolution of crushed tablets in water or orange juice. Crushing and mixing any of the four medications with thickened water caused a significant delay in dissolution. When tested with atenolol, all types of thickening agents at the greatest thickness significantly restricted dissolution, and products that are primarily based on xanthan gum also delayed dissolution at the intermediate thickness level. Dissolution testing, while simplistic, is a widely used and accepted method for comparing drug release from different formulations as an indicator for in vivo bioavailability. Thickened fluids have the potential to retard drug dissolution when used at the thickest levels. These findings highlight potential clinical implications of the addition of these agents to medications for the purpose of dose delivery and indicate that further investigation of thickened fluids and their potential to influence therapeutic outcomes is warranted.

  4. Human amniotic fluid mesenchymal stem cells in combination with hyperbaric oxygen augment peripheral nerve regeneration.

    PubMed

    Pan, Hung-Chuan; Chin, Chun-Shih; Yang, Dar-Yu; Ho, Shu-Peng; Chen, Chung-Jung; Hwang, Shiaw-Min; Chang, Ming-Hong; Cheng, Fu-Chou

    2009-07-01

    Attenuation of pro-inflammatory cytokines and associated inflammatory cell deposits rescues human amniotic fluid mesenchymal stem cells (AFS) from apoptosis. Hyperbaric oxygen (HBO) suppressed stimulus-induced pro-inflammatory cytokine production in blood-derived monocyte-macrophages. Herein, we evaluate the beneficial effect of hyperbaric oxygen on transplanted AFS in a sciatic nerve injury model. Peripheral nerve injury was produced in Sprague-Dawley rats by crushing the left sciatic nerve using a vessel clamp. The AFS were embedded in fibrin glue and delivered to the injured site. Hyperbaric oxygen (100% oxygen, 2 ATA, 60 min/day) was administered 12 h after operation for seven consecutive days. Transplanted cell apoptosis, oxidative stress, inflammatory cell deposits and associated chemokines, pro-inflammatory cytokines, motor function, and nerve regeneration were evaluated 7 and 28 days after injury. Crush injury induced an inflammatory response, disrupted nerve integrity, and impaired nerve function in the sciatic nerve. However, crush injury-provoked inflammatory cytokines, deposits of inflammatory cytokines, and associated macrophage migration chemokines were attenuated in groups receiving hyperbaric oxygen but not in the AFS-only group. No significant increase in oxidative stress was observed after administration of HBO. In transplanted AFS, marked apoptosis was detected and this event was reduced by HBO treatment. Increased nerve myelination and improved motor function were observed in AFS-transplant, HBO-administrated, and AFS/HBO-combined treatment groups. Significantly, the AFS/HBO combined treatment showed the most beneficial effect. AFS in combination with HBO augment peripheral nerve regeneration, which may involve the suppression of apoptotic death in implanted AFS and the attenuation of an inflammatory response detrimental to peripheral nerve regeneration.

  5. Histopathology of balloon-dilation Eustachian tuboplasty.

    PubMed

    Kivekäs, Ilkka; Chao, Wei-Chieh; Faquin, William; Hollowell, Monica; Silvola, Juha; Rasooly, Tali; Poe, Dennis

    2015-02-01

    Surgical intervention of the Eustachian tube (ET) has become increasingly common in the past decade, and balloon dilation has shown promising results in recent studies. It is unclear how balloon dilation enhances ET function. Our aim was to evaluate histological changes in the ET's mucosal lumen comparing before balloon dilation, immediately after, and postoperatively. Case series. Thirteen patients with bilateral ET dysfunction were enrolled. Biopsies of the ET mucosa were obtained just before balloon dilation; immediately after; and in three cases, 5 to 12 weeks postoperatively. Specimens were retrospectively examined under light microscopy by two pathologists blinded to the clinical information and whether specimens were pre- or postballoon dilation. Preoperative biopsies were characterized by inflammatory changes within the epithelium and submucosal layer. Immediate response to balloon dilation was thinning of the mucosa, shearing of epithelium and crush injury to the submucosa, especially to lymphocytic infiltrates. Postoperative biopsies demonstrated healthy pseudocolumnar epithelium and replacement of lymphocytic infiltrate with a thinner layer of fibrous tissue. Reduction of inflammatory epithelial changes and submucosal inflammatory infiltrate appeared to be the principal result of balloon dilation. The balloon may shear or crush portions of inflamed epithelium but usually spared the basal layer, allowing for rapid healing. Additionally, it appeared to effectively crush lymphocytes and lymphocytic follicles that may become replaced with thinner fibrous scar. Histopathology of the ET undergoing balloon dilation demonstrated effects that could reduce the overall inflammatory burden and may contribute to clinical improvement in ET function. 4. © 2014 The American Laryngological, Rhinological and Otological Society, Inc.

  6. Development of a passenger rail vehicle crush zone

    DOT National Transportation Integrated Search

    1999-04-13

    The use of crush zones in passenger rail vehicles is rapidly growing in the United States and throughout the world. Such crush zones are an important part of the crash energy management philosophy of train occupant protection. The objective of this s...

  7. VIEW FROM SOUTHEAST CORNER OF THE CRUSHING MILL LOOKING TOWARD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW FROM SOUTHEAST CORNER OF THE CRUSHING MILL LOOKING TOWARD THE EAST WALL OF THE CRYSTALLIZER WING. FENESTRA WINDOWS IN CRUSHING MILL WALL. VIEW FROM THE NORTHEAST - Kekaha Sugar Company, Sugar Mill Building, 8315 Kekaha Road, Kekaha, Kauai County, HI

  8. Stability and recovery of DIFICID(®) (Fidaxomicin) 200-mg crushed tablet preparations from three delivery vehicles, and administration of an aqueous dispersion via nasogastric tube.

    PubMed

    Tousseeva, Anna; Jackson, J Derek; Redell, Mark; Henry, Teresa; Hui, Michael; Capurso, Shelley; DeRyke, C Andrew

    2014-12-01

    Fidaxomicin is approved for the treatment of adults with Clostridium difficile-associated diarrhea, many of whom have difficulty swallowing an intact tablet. The study objective was to evaluate the stability and recovery of crushed DIFICID(®) (fidaxomicin) 200-mg tablets dispersed in water, applesauce, or Ensure(®) brand liquid nutritional supplement, and to determine the recovery of fidaxomicin from the administration of an aqueous dispersion of a crushed DIFICID(®) tablet through a nasogastric (NG) tube. DIFICID(®) tablets were crushed and dispersed in water, applesauce, or Ensure(®). The stability and recovery of fidaxomicin were evaluated over 24 h in these vehicles. In a separate experiment, the ability to recover a full dose of fidaxomicin when administering as an aqueous dispersion through an NG tube was assessed. When DIFICID(®) tablets were crushed and dispersed in water, the active ingredient, fidaxomicin, was stable for up to 2 h at room temperature. Additionally, it was stable for up to 24 h in dispersions with applesauce or Ensure(®). Recovery of fidaxomicin after crushing and dispersing in any of the three vehicles studied ranged from 95 to 108 %, which is within the normal range of individual tablet variability. When crushed, dispersed in water, and administered through an NG tube, the average recovery of fidaxomicin was 96 %. Stability and recovery of fidaxomicin were confirmed when DIFICID(®) tablets were crushed and dispersed in water, applesauce, or Ensure(®). In addition, administration of an aqueous dispersion of a crushed tablet through an NG tube is supported by acceptable recovery of fidaxomicin.

  9. [Clinical observation on the influence of earthquake crush injury on postoperative wound healing of extremity fractures].

    PubMed

    Chen, Fu-hong; Chen, Ze; Duan, Heng-qiong; Wan, Zhong-xian

    2008-10-01

    To observe the influence of earthquake crush injury on postoperative wound healing of extremity fractures. The study involved 85 patients with extremities fracture underwent internal fixation operation in 3 group, including 28 earthquake casualties with crush injuries in observation group, 27 earthquake casualties without crush injuries in control I group and 30 local patients during the same period in control II group. Urine routine, blood creatine kinase (CK) and wound conditions of patients in 3 groups were observed respectively. There was no significant difference in Urine routine and blood CK between 3 groups and was significant difference in wound conditions between observation group and each control group. Earthquake crush injuries can influence the postoperative wound healing of extremity fractures.

  10. Mechanical properties of acacia and eucalyptus wood chars

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kumar, M.; Verma, B.B.; Gupta, R.C.

    1999-10-01

    In the present investigation the effects of carbonization conditions (temperature and heating rate) on the mechanical properties (such as crushing and impact strengths and shatter index) of acacia and eucalyptus wood chars have been determined. The crushing and impact strengths of both the acacia and eucalyptus wood chars (made by slow carbonization) decreased with increase of preparation temperature up to 600 C, followed by an increase thereafter. These wood chars showed a continuous increase in shatter index values with carbonization temperature. In contrast to slow carbonization (heating rate 4 C min{sup {minus}1}), rapid carbonization (heating rate 30 C min{sup {minus}1})more » yielded chars of lower crushing strengths. Slowly carbonized eucalyptus wood gave chars of superior crushing and impact strengths than those produced from acacia wood under the same carbonization conditions. The crushing and impact strengths of these wood chars, in general, have shown an increase with increase in their apparent density. The crushing strength of cubic-shaped wood char decreased with increase in size.« less

  11. ACMES: fast multiple-genome searches for short repeat sequences with concurrent cross-species information retrieval

    PubMed Central

    Reneker, Jeff; Shyu, Chi-Ren; Zeng, Peiyu; Polacco, Joseph C.; Gassmann, Walter

    2004-01-01

    We have developed a web server for the life sciences community to use to search for short repeats of DNA sequence of length between 3 and 10 000 bases within multiple species. This search employs a unique and fast hash function approach. Our system also applies information retrieval algorithms to discover knowledge of cross-species conservation of repeat sequences. Furthermore, we have incorporated a part of the Gene Ontology database into our information retrieval algorithms to broaden the coverage of the search. Our web server and tutorial can be found at http://acmes.rnet.missouri.edu. PMID:15215469

  12. Effects of Bright Light Therapy on Sleep, Cognition, Brain Function, and Neurochemistry in Mild Traumatic Brain Injury

    DTIC Science & Technology

    2014-01-30

    34poppers").      Cannabis:   marijuana , hashish ("hash"), THC, "pot", "grass", "weed", "reefer".        Tranquilizers:  Quaalude, Seconal ("reds"), Valium...How many times in the past year have you used marijuana ? _______________ Have you ever used marijuana at other times in your life? YES NO...If YES, at what age did you begin smoking marijuana ? ______________ On approximately how many occasions have you used marijuana ? __________ Do

  13. The effects of pre-slaughter restraint (for the purpose of cattle identification) on post-slaughter responses and carcass quality following the electrical stun/killing of cattle in a Jarvis Beef stunner.

    PubMed

    Mpamhanga, C J; Wotton, S B

    2015-09-01

    This study compared normal post-Jarvis stun/kill responses and carcass quality with those occurring when crush restraint was not used during pre-slaughter. The carcasses of 1065 cattle slaughtered during one week at a commercial abattoir were evaluated for quality. The post-stun/kill responses of 788 of these animals were also assessed. An additional study of data from the carcasses of 6061 cattle was further evaluated for quality findings. A significant reduction in post-stun/kill limb movement, muscle tone and the expression of brainstem functions was recorded when restraint was not used. Abolishing crush restraint pre-slaughter also produced a significant reduction in the incidence of blood splash. In addition, the study also showed that animal identification post-slaughter could be successfully implemented with no negative consequences to food safety or traceability. It is suggested that abolishing the use of pre-slaughter crush restraint of cattle would enhance animal welfare and operator safety in plants whether electrical, or mechanical stunning was employed. Copyright © 2015. Published by Elsevier Ltd.

  14. Collision dynamics modeling of crash energy management passenger rail equipment : a thesis submitted by Karina M. Jacobsen

    DOT National Transportation Integrated Search

    2008-01-31

    Crash Energy Management (CEM) is a crashworthiness strategy that : incorporates crush zones into the design of passenger railcars. In the event of a : collision, crush zones are engineered to collapse in a controlled manner and : distribute crush to ...

  15. Micromechanics of pressure-induced grain crushing in porous rocks

    NASA Astrophysics Data System (ADS)

    Davis, Daniel M.

    1990-01-01

    The hydrostatic compaction behavior of a suite of porous sandstones was investigated at confining pressures up to 600 MPa and constant pore pressures ranging up to 50 MPa. These five sandstones (Boise, Kayenta, St. Peter, Berea, and Weber) were selected because of their wide range of porosity (5-35%) and grain size (60-460 μm). We tested the law of effective stress for the porosity change as a function of pressure. Except for Weber sandstone (which has the lowest porosity and smallest grain size), the hydrostat of each sandstone shows an inflection point corresponding to a critical effective pressure beyond which an accelerated, irrecoverable compaction occurs. Our microstructural observations show that brittle grain crushing initiates at this critical pressure. We also observed distributed cleavage cracking in calcite and intensive kinking in mica. The critical pressures for grain crushing in our sandstones range from 75 to 380 MPa. In general, a sandstone with higher porosity and larger grain size has a critical pressure which is lower than that of a sandstone with lower porosity and smaller grain size. We formulate a Hertzian fracture model to analyze the micromechanics of grain crushing. Assuming that the solid grains have preexisting microcracks with dimensions which scale with grain size, we derive an expression for the critical pressure which depends on the porosity, grain size, and fracture toughness of the solid matrix. The theoretical prediction is in reasonable agreement with our experimental data as well as other data from soil and rock mechanics studies for which the critical pressures range over 3 orders of magnitude.

  16. Use of aggregate screenings as a substitute for silica sand in portland cement concrete (PCC).

    DOT National Transportation Integrated Search

    2010-06-01

    The State of Florida is the third largest consumer of crushed rock products in the United States and is the largest : single contractor/user of crushed stone resources in the state. Crushed stone in Florida is produced from : limestone, which is mine...

  17. Quasi-Uniform High Speed Foam Crush Testing Using a Guided Drop Mass Impact

    NASA Technical Reports Server (NTRS)

    Jones, Lisa E. (Technical Monitor); Kellas, Sotiris

    2004-01-01

    A relatively simple method for measuring the dynamic crush response of foam materials at various loading rates is described. The method utilizes a drop mass impact configuration with mass and impact velocity selected such that the crush speed remains approximately uniform during the entire sample crushing event. Instrumentation, data acquisition, and data processing techniques are presented, and limitations of the test method are discussed. The objective of the test method is to produce input data for dynamic finite element modeling involving crash and energy absorption characteristics of foam materials.

  18. Gencrypt: one-way cryptographic hashes to detect overlapping individuals across samples

    PubMed Central

    Turchin, Michael C.; Hirschhorn, Joel N.

    2012-01-01

    Summary: Meta-analysis across genome-wide association studies is a common approach for discovering genetic associations. However, in some meta-analysis efforts, individual-level data cannot be broadly shared by study investigators due to privacy and Institutional Review Board concerns. In such cases, researchers cannot confirm that each study represents a unique group of people, leading to potentially inflated test statistics and false positives. To resolve this problem, we created a software tool, Gencrypt, which utilizes a security protocol known as one-way cryptographic hashes to allow overlapping participants to be identified without sharing individual-level data. Availability: Gencrypt is freely available under the GNU general public license v3 at http://www.broadinstitute.org/software/gencrypt/ Contact: joelh@broadinstitute.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:22302573

  19. A multi-particle crushing apparatus for studying rock fragmentation due to repeated impacts

    NASA Astrophysics Data System (ADS)

    Huang, S.; Mohanty, B.; Xia, K.

    2017-12-01

    Rock crushing is a common process in mining and related operations. Although a number of particle crushing tests have been proposed in the literature, most of them are concerned with single-particle crushing, i.e., a single rock sample is crushed in each test. Considering the realistic scenario in crushers where many fragments are involved, a laboratory crushing apparatus is developed in this study. This device consists of a Hopkinson pressure bar system and a piston-holder system. The Hopkinson pressure bar system is used to apply calibrated dynamic loads to the piston-holder system, and the piston-holder system is used to hold rock samples and to recover fragments for subsequent particle size analysis. The rock samples are subjected to three to seven impacts under three impact velocities (2.2, 3.8, and 5.0 m/s), with the feed size of the rock particle samples limited between 9.5 and 12.7 mm. Several key parameters are determined from this test, including particle size distribution parameters, impact velocity, loading pressure, and total work. The results show that the total work correlates well with resulting fragmentation size distribution, and the apparatus provides a useful tool for studying the mechanism of crushing, which further provides guidelines for the design of commercial crushers.

  20. Multifocal Neuropathy: Expanding the Scope of Double Crush Syndrome.

    PubMed

    Cohen, Brian H; Gaspar, Michael P; Daniels, Alan H; Akelman, Edward; Kane, Patrick M

    2016-12-01

    Double crush syndrome (DCS), as it is classically defined, is a clinical condition composed of neurological dysfunction due to compressive pathology at multiple sites along a single peripheral nerve. The traditional definition of DCS is narrow in scope because many systemic pathologic processes, such as diabetes mellitus, drug-induced neuropathy, vascular disease and autoimmune neuronal damage, can have deleterious effects on nerve function. Multifocal neuropathy is a more appropriate term describing the multiple etiologies (including compressive lesions) that may synergistically contribute to nerve dysfunction and clinical symptoms. This paper examines the history of DCS and multifocal neuropathy, including the epidemiology and pathophysiology in addition to principles of evaluation and management. Copyright © 2016 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  1. Design and application of a quasistatic crush test fixture for investigating scale effects in energy absorbing composite plates

    NASA Astrophysics Data System (ADS)

    Lavoie, J. Andre; Morton, John

    1993-07-01

    A crush test fixture for measuring energy absorption of flat plate specimens from an earlier study was redesigned to eliminate the problem of binding of the load transfer platen with the guide posts. Further modifications were to increase the stroke, and combine the two scaled text fixtures into one. This new crush text fixture was shown to produce load-displacement histories exhibiting well developed sustained crushing loads over long strokes. An experimental study was conducted on two material systems: AS4/3502 graphite/epoxy, and a hybrid AS4-Kevlar/3502 composite. The effect of geometric scaling of specimen size, the effect of ply level and sublaminate-level scaling of the stacking sequence of the full scale specimens, and the effect of trigger mechanism on the energy absorption capability were investigated. The new crush test fixture and flat plate specimens produced peak and sustained crushing loads that were lower than obtained with the old crush text fixture. The trigger mechanism used influenced the specific sustained crushing stress (SSCS). The results indicated that to avoid any reduction in the SSCS when scaling from the 1/2 scale to full scale specimen size, the sublaminate-level scaling approach should be used, in agreement with experiments on tubes. The use of Kevlar in place of the graphite 45 deg plies was not as effective a means for supporting and containing the 0 deg graphite plies for rushing of flat plates and resulted in a drop in the SSCS. This result did not correlate with that obtained for tubes.

  2. Design and application of a quasistatic crush test fixture for investigating scale effects in energy absorbing composite plates. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Lavoie, J. Andre; Morton, John

    1993-01-01

    A crush test fixture for measuring energy absorption of flat plate specimens from an earlier study was redesigned to eliminate the problem of binding of the load transfer platen with the guide posts. Further modifications were to increase the stroke, and combine the two scaled text fixtures into one. This new crush text fixture was shown to produce load-displacement histories exhibiting well developed sustained crushing loads over long strokes. An experimental study was conducted on two material systems: AS4/3502 graphite/epoxy, and a hybrid AS4-Kevlar/3502 composite. The effect of geometric scaling of specimen size, the effect of ply level and sublaminate-level scaling of the stacking sequence of the full scale specimens, and the effect of trigger mechanism on the energy absorption capability were investigated. The new crush test fixture and flat plate specimens produced peak and sustained crushing loads that were lower than obtained with the old crush text fixture. The trigger mechanism used influenced the specific sustained crushing stress (SSCS). The results indicated that to avoid any reduction in the SSCS when scaling from the 1/2 scale to full scale specimen size, the sublaminate-level scaling approach should be used, in agreement with experiments on tubes. The use of Kevlar in place of the graphite 45 deg plies was not as effective a means for supporting and containing the 0 deg graphite plies for rushing of flat plates and resulted in a drop in the SSCS. This result did not correlate with that obtained for tubes.

  3. The role of Facebook in Crush the Crave, a mobile- and social media-based smoking cessation intervention: qualitative framework analysis of posts.

    PubMed

    Struik, Laura Louise; Baskerville, Neill Bruce

    2014-07-11

    Social networking sites, particularly Facebook, are increasingly included in contemporary smoking cessation interventions directed toward young adults. Little is known about the role of Facebook in smoking cessation interventions directed toward this age demographic. The aim of this study was to characterize the content of posts on the Facebook page of Crush the Crave, an evidence-informed smoking cessation intervention directed toward young adults aged 19 to 29 years. Crush the Crave Facebook posts between October 10, 2012 and June 12, 2013 were collected for analysis, representing page activity during the pilot phase of Crush the Crave. Of the 399 posts included for analysis, 121 were original posts, whereas the remaining 278 were reply posts. Posts were coded according to themes using framework analysis. We found that the original Crush the Crave Facebook posts served two main purposes: to support smoking cessation and to market Crush the Crave. Most of the original posts (86/121, 71.1%) conveyed support of smoking cessation through the following 7 subthemes: encouraging cessation, group stimulation, management of cravings, promoting social support, denormalizing smoking, providing health information, and exposing tobacco industry tactics. The remaining original posts (35/121, 28.9%) aimed to market Crush the Crave through 2 subthemes: Crush the Crave promotion and iPhone 5 contest promotion. Most of the reply posts (214/278, 77.0%) were in response to the supporting smoking cessation posts and the remaining 64 (23.0%) were in response to the marketing Crush the Crave posts. The most common response to both the supporting smoking cessation and marketing Crush the Crave posts was user engagement with the images associated with each post at 40.2% (86/214) and 45% (29/64), respectively. The second most common response consisted of users sharing their smoking-related experiences. More users shared their smoking-related experiences in response to the supporting smoking cessation posts (81/214, 37.9%) compared to the marketing Crush the Crave posts (11/64, 17%). With the exception of 4 posts, a moderator posted all the original posts. In addition, although 56.00% (18,937/33,815) of Crush the Crave Facebook page users were men, only 19.8% (55/278) of the reply posts were made by men. Finally, men were found to be more likely to express sarcasm or make strong assertions about quitting smoking and Crush the Crave than women. The CTC Facebook page presents as a unique platform for supporting young adult smoking cessation at all stages of the cessation process. The findings of this study indicate that social networking sites, especially Facebook, warrant inclusion in tobacco control efforts directed towards young adults. Research on effectiveness of the Facebook page for quitting smoking is needed.

  4. The Role of Facebook in Crush the Crave, a Mobile- and Social Media-Based Smoking Cessation Intervention: Qualitative Framework Analysis of Posts

    PubMed Central

    2014-01-01

    Background Social networking sites, particularly Facebook, are increasingly included in contemporary smoking cessation interventions directed toward young adults. Little is known about the role of Facebook in smoking cessation interventions directed toward this age demographic. Objective The aim of this study was to characterize the content of posts on the Facebook page of Crush the Crave, an evidence-informed smoking cessation intervention directed toward young adults aged 19 to 29 years. Methods Crush the Crave Facebook posts between October 10, 2012 and June 12, 2013 were collected for analysis, representing page activity during the pilot phase of Crush the Crave. Of the 399 posts included for analysis, 121 were original posts, whereas the remaining 278 were reply posts. Posts were coded according to themes using framework analysis. Results We found that the original Crush the Crave Facebook posts served two main purposes: to support smoking cessation and to market Crush the Crave. Most of the original posts (86/121, 71.1%) conveyed support of smoking cessation through the following 7 subthemes: encouraging cessation, group stimulation, management of cravings, promoting social support, denormalizing smoking, providing health information, and exposing tobacco industry tactics. The remaining original posts (35/121, 28.9%) aimed to market Crush the Crave through 2 subthemes: Crush the Crave promotion and iPhone 5 contest promotion. Most of the reply posts (214/278, 77.0%) were in response to the supporting smoking cessation posts and the remaining 64 (23.0%) were in response to the marketing Crush the Crave posts. The most common response to both the supporting smoking cessation and marketing Crush the Crave posts was user engagement with the images associated with each post at 40.2% (86/214) and 45% (29/64), respectively. The second most common response consisted of users sharing their smoking-related experiences. More users shared their smoking-related experiences in response to the supporting smoking cessation posts (81/214, 37.9%) compared to the marketing Crush the Crave posts (11/64, 17%). With the exception of 4 posts, a moderator posted all the original posts. In addition, although 56.00% (18,937/33,815) of Crush the Crave Facebook page users were men, only 19.8% (55/278) of the reply posts were made by men. Finally, men were found to be more likely to express sarcasm or make strong assertions about quitting smoking and Crush the Crave than women. Conclusions The CTC Facebook page presents as a unique platform for supporting young adult smoking cessation at all stages of the cessation process. The findings of this study indicate that social networking sites, especially Facebook, warrant inclusion in tobacco control efforts directed towards young adults. Research on effectiveness of the Facebook page for quitting smoking is needed. PMID:25016998

  5. 40 CFR 436.20 - Applicability; description of the crushed stone subcategory.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MINERAL MINING AND PROCESSING POINT SOURCE CATEGORY Crushed... stone and riprap. This subpart includes all types of rock and stone. Rock and stone that is crushed or broken prior to the extraction of a mineral are elsewhere covered. The processing of calcite, however, in...

  6. 40 CFR 436.20 - Applicability; description of the crushed stone subcategory.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MINERAL MINING AND PROCESSING POINT SOURCE CATEGORY Crushed... stone and riprap. This subpart includes all types of rock and stone. Rock and stone that is crushed or broken prior to the extraction of a mineral are elsewhere covered. The processing of calcite, however, in...

  7. Recovery of salmonella serovar enteritidis from inoculated broiler hatching eggs using shell rinse and shell crush sampling methods

    USDA-ARS?s Scientific Manuscript database

    This study compared the recovery of Salmonella from hatching eggs using three sampling methods (eggshell rinsing, eggshell crush following a previous rinse, and eggshell crush without previous rinse). Eggshells were drop-inoculated with approximately 10, 100, or 1,000 cfu/eggshell of S. Enteritidis...

  8. Gas adsorption on crushed quartz and basalt. [in vacuum

    NASA Technical Reports Server (NTRS)

    Barker, C.; Torkelson, B. E.

    1975-01-01

    The new surfaces generated by crushing rocks and minerals adsorb gases. Different gases are adsorbed to different extents so that both the total amount and composition of the released gases are changed. This affects the interpretation of the composition of the gases obtained by vacuum crushing lunar basalts, meteorites and minerals with fluid inclusions.

  9. 64. NORTH WALL OF CRUSHED OXIDIZED ORE BIN. THE PRIMARY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    64. NORTH WALL OF CRUSHED OXIDIZED ORE BIN. THE PRIMARY MILL FEEDS AT BOTTOM. MILL SOLUTION TANKS WERE TO THE LEFT (EAST) AND BARREN SOLUTION TANK TO THE RIGHT (WEST) OR THE CRUSHED ORE BIN. - Bald Mountain Gold Mill, Nevada Gulch at head of False Bottom Creek, Lead, Lawrence County, SD

  10. 75 FR 27574 - Agency Information Collection Activities: Comment Request for the Production Estimate, Quarterly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-17

    ... Request for the Production Estimate, Quarterly Construction Sand and Gravel and Crushed and Broken Stone... Production Estimate, Quarterly Construction Sand and Gravel and Crushed and Broken Stone. This collection... Construction Sand and Gravel and Crushed and Broken Stone. Type of Request: Extension of a currently approved...

  11. 27 CFR 24.176 - Crushing and fermentation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Crushing and fermentation..., DEPARTMENT OF THE TREASURY LIQUORS WINE Production of Wine § 24.176 Crushing and fermentation. (a) Natural... fermentation but the density of the juice may not be reduced below 22 degrees Brix. However, if the juice is...

  12. The Big Crush: An Introduction to Materials Testing

    ERIC Educational Resources Information Center

    Roman, Harry T.

    2011-01-01

    Lots of engineering thinking can be involved in crushing things. As an example, engineers spend a great deal of time designing crush-proof packaging for delicate equipment and packing materials for items that must be stored or shipped. This article presents an activity wherein students can begin to appreciate the technology behind the engineering.…

  13. Energy-absorption capability of composite tubes and beams. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Farley, Gary L.; Jones, Robert M.

    1989-01-01

    In this study the objective was to develop a method of predicting the energy-absorption capability of composite subfloor beam structures. Before it is possible to develop such an analysis capability, an in-depth understanding of the crushing process of composite materials must be achieved. Many variables affect the crushing process of composite structures, such as the constituent materials' mechanical properties, specimen geometry, and crushing speed. A comprehensive experimental evaluation of tube specimens was conducted to develop insight into how composite structural elements crush and what are the controlling mechanisms. In this study the four characteristic crushing modes, transverse shearing, brittle fracturing, lamina bending, and local buckling were identified and the mechanisms that control the crushing process defined. An in-depth understanding was developed of how material properties affect energy-absorption capability. For example, an increase in fiber and matrix stiffness and failure strain can, depending upon the configuration of the tube, increase energy-absorption capability. An analysis to predict the energy-absorption capability of composite tube specimens was developed and verified. Good agreement between experiment and prediction was obtained.

  14. Canine model of crush syndrome established by a digital crush injury device platform

    PubMed Central

    Song, Jie; Ding, Hui; Fan, Hao-Jun; Dong, Wen-Long; Sun, Zhen-Xing; Hou, Shi-Ke

    2015-01-01

    Objective: To establish a canine model of crush syndrome (CS). Methods: A total of 16 healthy adult female Beagle dogs were randomly divided into the control group (n=8) and the experimental group (n=8). The crush injury was created in the left hind leg of each dog in the experimental group. Results: The biochemical indexes in the experimental group changed significantly compared to the values before extrusion. And they were also significantly different from the values of the control group. The glomerular capillary dilation, renal tubular epithelial cell degeneration, and renal interstitial lymphocytic infiltration were found in the kidneys. Conclusion: The canine CS model established by the digital crush injury device platform was successful according with the diagnosis of CS. It is good for the investigation of the CS mechanism and treatment using this model. PMID:26261489

  15. Capturing the Energy Absorbing Mechanisms of Composite Structures under Crash Loading

    NASA Astrophysics Data System (ADS)

    Wade, Bonnie

    As fiber reinforced composite material systems become increasingly utilized in primary aircraft and automotive structures, the need to understand their contribution to the crashworthiness of the structure is of great interest to meet safety certification requirements. The energy absorbing behavior of a composite structure, however, is not easily predicted due to the great complexity of the failure mechanisms that occur within the material. Challenges arise both in the experimental characterization and in the numerical modeling of the material/structure combination. At present, there is no standardized test method to characterize the energy absorbing capability of composite materials to aide crashworthy structural design. In addition, although many commercial finite element analysis codes exist and offer a means to simulate composite failure initiation and propagation, these models are still under development and refinement. As more metallic structures are replaced by composite structures, the need for both experimental guidelines to characterize the energy absorbing capability of a composite structure, as well as guidelines for using numerical tools to simulate composite materials in crash conditions has become a critical matter. This body of research addresses both the experimental characterization of the energy absorption mechanisms occurring in composite materials during crushing, as well as the numerical simulation of composite materials undergoing crushing. In the experimental investigation, the specific energy absorption (SEA) of a composite material system is measured using a variety of test element geometries, such as corrugated plates and tubes. Results from several crush experiments reveal that SEA is not a constant material property for laminated composites, and varies significantly with the geometry of the test specimen used. The variation of SEA measured for a single material system requires that crush test data must be generated for a range of different test geometries in order to define the range of its energy absorption capability. Further investigation from the crush tests has led to the development of a direct link between geometric features of the crush specimen and its resulting SEA. Through micrographic analysis, distinct failure modes are shown to be guided by the geometry of the specimen, and subsequently are shown to directly influence energy absorption. A new relationship between geometry, failure mode, and SEA has been developed. This relationship has allowed for the reduction of the element-level crush testing requirement to characterize the composite material energy absorption capability. In the numerical investigation, the LS-DYNA composite material model MAT54 is selected for its suitability to model composite materials beyond failure determination, as required by crush simulation, and its capability to remain within the scope of ultimately using this model for large-scale crash simulation. As a result of this research, this model has been thoroughly investigated in depth for its capacity to simulate composite materials in crush, and results from several simulations of the element-level crush experiments are presented. A modeling strategy has been developed to use MAT54 for crush simulation which involves using the experimental data collected from the coupon- and element-level crush tests to directly calibrate the crush damage parameter in MAT54 such that it may be used in higher-level simulations. In addition, the source code of the material model is modified to improve upon its capability. The modifications include improving the elastic definition such that the elastic response to multi-axial load cases can be accurately portrayed simultaneously in each element, which is a capability not present in other composite material models. Modifications made to the failure determination and post-failure model have newly emphasized the post-failure stress degradation scheme rather than the failure criterion which is traditionally considered the most important composite material model definition for crush simulation. The modification efforts have also validated the use of the MAT54 failure criterion and post-failure model for crash modeling when its capabilities and limitations are well understood, and for this reason guidelines for using MAT54 for composite crush simulation are presented. This research has effectively (a) developed and demonstrated a procedure that defines a set of experimental crush results that characterize the energy absorption capability of a composite material system, (b) used the experimental results in the development and refinement of a composite material model for crush simulation, (c) explored modifying the material model to improve its use in crush modeling, and (d) provided experimental and modeling guidelines for composite structures under crush at the element-level in the scope of the Building Block Approach.

  16. Analysis of Crushing Response of Composite Crashworthy Structures

    NASA Astrophysics Data System (ADS)

    David, Matthew; Johnson, Alastair F.; Voggenreiter, H.

    2013-10-01

    The paper describes quasi-static and dynamic tests to characterise the energy absorption properties of polymer composite crash energy absorbing segment elements under axial loads. Detailed computer tomography scans of failed specimens are used to identify local compression crush failure mechanisms at the crush front. The varied crushing morphology between the compression strain rates identified in this paper is observed to be due to the differences in the response modes and mechanical properties of the strain dependent epoxy matrix. The importance of understanding the role of strain rate effects in composite crash energy absorbing structures is highlighted in this paper.

  17. Magnesium supplement promotes sciatic nerve regeneration and down-regulates inflammatory response.

    PubMed

    Pan, Hung-Chuan; Sheu, Meei-Ling; Su, Hong-Lin; Chen, Ying-Ju; Chen, Chun-Jung; Yang, Dar-Yu; Chiu, Wen-Ta; Cheng, Fu-Chou

    2011-06-01

    Magnesium (Mg) supplements have been shown to significantly improve functional recovery in various neurological disorders. The essential benefits of Mg supplementation in peripheral nerve disorders have not been elucidated yet. The effect and mechanism of Mg supplementation on a sciatic nerve crush injury model was investigated. Sciatic nerve injury was induced in mice by crushing the left sciatic nerve. Mice were randomly divided into three groups with low-, basal- or high-Mg diets (corresponding to 10, 100 or 200% Mg of the basal diet). Neurobehavioral, electrophysiological and regeneration marker studies were conducted to explore nerve regeneration. First, a high Mg diet significantly increased plasma and nerve tissue Mg concentrations. In addition, Mg supplementation improved neurobehavioral, electrophysiological functions, enhanced regeneration marker, and reduced deposits of inflammatory cells as well as expression of inflammatory cytokines. Furthermore, reduced Schwann cell apoptosis was in line with the significant expression of bcl-2, bcl-X(L) and down-regulated expression of active caspase-3 and cytochrome C. In summary, improved neurological function recovery and enhanced nerve regeneration were found in mice with a sciatic nerve injury that were fed a high- Mg diet, and Schwann cells may have been rescued from apoptosis by the suppression of inflammatory responses.

  18. [Physics of materials and female stress urinary continence: New concepts: I) Elasticity under bladder].

    PubMed

    Guerquin, B

    2015-09-01

    Improving the understanding of the adaptation to stress of urinary continence. A transversal analysis between physics of materials and the female anatomy. Laws of physics of the materials and of their viscoelastic behavior are applied to the anatomy of the anterior vaginal wall. The anterior vaginal wall may be divided into two segments of different viscoelastic behavior, the vertical segment below the urethra and the horizontal segment below the bladder. If the urethra gets crushed on the first segment according to the hammock theory, the crushing of the bladder on the second segment is, on the other hand, damped by its important elasticity. The importance of this elasticity evokes an unknown function: damping under the bladder that moderates and delays the increase of intravesical pressure. This damping function below the bladder is increased in the cystocele, which is therefore a continence factor; on the other hand, it is impaired in obesity, which is therefore a factor of SUI. It is necessary to include in the theory of stress continence, the notion of a damping function below the bladder. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  19. Escalated regeneration in sciatic nerve crush injury by the combined therapy of human amniotic fluid mesenchymal stem cells and fermented soybean extracts, Natto.

    PubMed

    Pan, Hung-Chuan; Yang, Dar-Yu; Ho, Shu-Peng; Sheu, Meei-Ling; Chen, Chung-Jung; Hwang, Shiaw-Min; Chang, Ming-Hong; Cheng, Fu-Chou

    2009-08-23

    Attenuation of inflammatory cell deposits and associated cytokines prevented the apoptosis of transplanted stem cells in a sciatic nerve crush injury model. Suppression of inflammatory cytokines by fermented soybean extracts (Natto) was also beneficial to nerve regeneration. In this study, the effect of Natto on transplanted human amniotic fluid mesenchymal stem cells (AFS) was evaluated. Peripheral nerve injury was induced in SD rats by crushing a sciatic nerve using a vessel clamp. Animals were categorized into four groups: Group I: no treatment; Group II: fed with Natto (16 mg/day for 7 consecutive days); Group III: AFS embedded in fibrin glue; Group IV: Combination of group II and III therapy. Transplanted AFS and Schwann cell apoptosis, inflammatory cell deposits and associated cytokines, motor function, and nerve regeneration were evaluated 7 or 28 days after injury. The deterioration of neurological function was attenuated by AFS, Natto, or the combined therapy. The combined therapy caused the most significantly beneficial effects. Administration of Natto suppressed the inflammatory responses and correlated with decreased AFS and Schwann cell apoptosis. The decreased AFS apoptosis was in line with neurological improvement such as expression of early regeneration marker of neurofilament and late markers of S-100 and decreased vacuole formation. Administration of either AFS, or Natto, or combined therapy augmented the nerve regeneration. In conclusion, administration of Natto may rescue the AFS and Schwann cells from apoptosis by suppressing the macrophage deposits, associated inflammatory cytokines, and fibrin deposits.

  20. Potential source for crushed granite aggregate in Heard County, Georgia

    USGS Publications Warehouse

    Atkins, R.L.; Higgins, Michael W.; Dickerson, Robert P.

    1981-01-01

    The production of crushed stone suitable for highway and general construction is a major industry in Georgia. The state ranks eighth in the nation in overall crushed stone production, and first in crushed granite production. Crushed stone production in Georgia in 1979 was 40,902,000 short tons worth $154,021,000 (D.H. White, Jr., US Bureau of Mines, personal commun., Aug. 1980). More than 3,000 people were employed by the crushed stone industry in Georgia during that year.Presently, the only active quarry in Heard County is located in an amphibolite. Amphibolite is not a conventional aggregate. It has a high specific gravity, a tendency to make elongate fragments, and varies considerably in abrasion tests.Because the nearest approved aggregate quarry is more than 25 miles from Franklin, the county seat, the purpose of this brief report is to describe a body of granite gneiss that may provide suitable aggregate for the crushed stone industry, potential quarry operators and various agencies in Heard County. This report is part of a project to study the geology and mineral resources of the Piedmont south of the Brevard Zone, and is not intended to supplant detailed site investigations by industry or consultants. The report is a joint effort between the Georgia Geologic Survey and the Office of Materials and Research of the Georgia Department of Transportation.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, R.C.; Garard, R.J.; Lokhandwala, K.K.

    The crush behavior (specific energy absorption and crush load stability) of unidirectional fiber composite rods having tougher matrices than vinyl ester were investigated and compared with the crush behavior of similar specimens having a vinyl ester matrix. The matrices were a cyclic polyester and two rubber-toughened vinyl esters. The specific energy absorption with the cyclic polyester matrix, 180 MJ/m{sup 3}, was slightly lower than that with the vinyl ester matrix, 230 MJ/m{sup 3}. On the other hand, the crush stability was markedly better. The average deviation of the crush load about the mean was as small as 3.5% with themore » cyclic polyester matrix, in contrast to about 12% with the vinyl ester matrix. The higher ductility of the cyclic polyester and the good fiber-matrix bond strength together resulted in less fracturing of the matrix and more uniform kink-band formation across the composite cross section than occurred with the vinyl ester matrix. There was also a reduction in the tendency for fibers at the periphery of the rod to splay outward rather than being crushed. Of the two rubber-toughened vinyl ester matrices, a 30% reduction was found in the average deviation of the crush load about the mean with the matrix toughened with a core-shell material, although no improvement was found with the CTBN rubber-modified vinyl ester resin.« less

  2. Riveting in metal airplane construction. Part IV : strength of riveted joints in duralumin (concluded)

    NASA Technical Reports Server (NTRS)

    Pleines, Wilhelm

    1930-01-01

    Tests were made to determine the crushing strength of a riveted joint, in order to define the difference in crushing stregth between a strictly bolted joint and a riveted joint. The object was to tabulate the crushing strength by failure on various plate thicknesses for a one-rivet double-shear riveted joint.

  3. Modeling of the endosperm crush response profile of hard red spring wheat using a single kernel characterization system

    USDA-ARS?s Scientific Manuscript database

    When a wheat endosperm is crushed the force profile shows viscoelastic response and the modulus of elasticity is an important parameter that might have substantial influence on wheat milling. An experiment was performed to model endosperm crush response profile (ECRP) and to determine the modulus o...

  4. Rollerjaw Rock Crusher

    NASA Technical Reports Server (NTRS)

    Peters, Gregory; Brown, Kyle; Fuerstenau, Stephen

    2009-01-01

    The rollerjaw rock crusher melds the concepts of jaw crushing and roll crushing long employed in the mining and rock-crushing industries. Rollerjaw rock crushers have been proposed for inclusion in geological exploration missions on Mars, where they would be used to pulverize rock samples into powders in the tens of micrometer particle size range required for analysis by scientific instruments.

  5. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  6. An evaluation of multi-probe locality sensitive hashing for computing similarities over web-scale query logs.

    PubMed

    Cormode, Graham; Dasgupta, Anirban; Goyal, Amit; Lee, Chi Hoon

    2018-01-01

    Many modern applications of AI such as web search, mobile browsing, image processing, and natural language processing rely on finding similar items from a large database of complex objects. Due to the very large scale of data involved (e.g., users' queries from commercial search engines), computing such near or nearest neighbors is a non-trivial task, as the computational cost grows significantly with the number of items. To address this challenge, we adopt Locality Sensitive Hashing (a.k.a, LSH) methods and evaluate four variants in a distributed computing environment (specifically, Hadoop). We identify several optimizations which improve performance, suitable for deployment in very large scale settings. The experimental results demonstrate our variants of LSH achieve the robust performance with better recall compared with "vanilla" LSH, even when using the same amount of space.

  7. A fast exact simulation method for a class of Markov jump processes.

    PubMed

    Li, Yao; Hu, Lili

    2015-11-14

    A new method of the stochastic simulation algorithm (SSA), named the Hashing-Leaping method (HLM), for exact simulations of a class of Markov jump processes, is presented in this paper. The HLM has a conditional constant computational cost per event, which is independent of the number of exponential clocks in the Markov process. The main idea of the HLM is to repeatedly implement a hash-table-like bucket sort algorithm for all times of occurrence covered by a time step with length τ. This paper serves as an introduction to this new SSA method. We introduce the method, demonstrate its implementation, analyze its properties, and compare its performance with three other commonly used SSA methods in four examples. Our performance tests and CPU operation statistics show certain advantages of the HLM for large scale problems.

  8. Tangible interactive system for document browsing and visualisation of multimedia data

    NASA Astrophysics Data System (ADS)

    Rytsar, Yuriy; Voloshynovskiy, Sviatoslav; Koval, Oleksiy; Deguillaume, Frederic; Topak, Emre; Startchik, Sergei; Pun, Thierry

    2006-01-01

    In this paper we introduce and develop a framework for document interactive navigation in multimodal databases. First, we analyze the main open issues of existing multimodal interfaces and then discuss two applications that include interaction with documents in several human environments, i.e., the so-called smart rooms. Second, we propose a system set-up dedicated to the efficient navigation in the printed documents. This set-up is based on the fusion of data from several modalities that include images and text. Both modalities can be used as cover data for hidden indexes using data-hiding technologies as well as source data for robust visual hashing. The particularities of the proposed robust visual hashing are described in the paper. Finally, we address two practical applications of smart rooms for tourism and education and demonstrate the advantages of the proposed solution.

  9. A new pre-classification method based on associative matching method

    NASA Astrophysics Data System (ADS)

    Katsuyama, Yutaka; Minagawa, Akihiro; Hotta, Yoshinobu; Omachi, Shinichiro; Kato, Nei

    2010-01-01

    Reducing the time complexity of character matching is critical to the development of efficient Japanese Optical Character Recognition (OCR) systems. To shorten processing time, recognition is usually split into separate preclassification and recognition stages. For high overall recognition performance, the pre-classification stage must both have very high classification accuracy and return only a small number of putative character categories for further processing. Furthermore, for any practical system, the speed of the pre-classification stage is also critical. The associative matching (AM) method has often been used for fast pre-classification, because its use of a hash table and reliance solely on logical bit operations to select categories makes it highly efficient. However, redundant certain level of redundancy exists in the hash table because it is constructed using only the minimum and maximum values of the data on each axis and therefore does not take account of the distribution of the data. We propose a modified associative matching method that satisfies the performance criteria described above but in a fraction of the time by modifying the hash table to reflect the underlying distribution of training characters. Furthermore, we show that our approach outperforms pre-classification by clustering, ANN and conventional AM in terms of classification accuracy, discriminative power and speed. Compared to conventional associative matching, the proposed approach results in a 47% reduction in total processing time across an evaluation test set comprising 116,528 Japanese character images.

  10. Fault parameter constraints using relocated earthquakes: A validation of first-motion focal-mechanism data

    USGS Publications Warehouse

    Kilb, Debi; Hardebeck, J.L.

    2006-01-01

    We estimate the strike and dip of three California fault segments (Calaveras, Sargent, and a portion of the San Andreas near San Jaun Bautistia) based on principle component analysis of accurately located microearthquakes. We compare these fault orientations with two different first-motion focal mechanism catalogs: the Northern California Earthquake Data Center (NCEDC) catalog, calculated using the FPFIT algorithm (Reasenberg and Oppenheimer, 1985), and a catalog created using the HASH algorithm that tests mechanism stability relative to seismic velocity model variations and earthquake location (Hardebeck and Shearer, 2002). We assume any disagreement (misfit >30° in strike, dip, or rake) indicates inaccurate focal mechanisms in the catalogs. With this assumption, we can quantify the parameters that identify the most optimally constrained focal mechanisms. For the NCEDC/FPFIT catalogs, we find that the best quantitative discriminator of quality focal mechanisms is the station distribution ratio (STDR) parameter, an indicator of how the stations are distributed about the focal sphere. Requiring STDR > 0.65 increases the acceptable mechanisms from 34%–37% to 63%–68%. This suggests stations should be uniformly distributed surrounding, rather than aligning, known fault traces. For the HASH catalogs, the fault plane uncertainty (FPU) parameter is the best discriminator, increasing the percent of acceptable mechanisms from 63%–78% to 81%–83% when FPU ≤ 35°. The overall higher percentage of acceptable mechanisms and the usefulness of the formal uncertainty in identifying quality mechanisms validate the HASH approach of testing for mechanism stability.

  11. High-performance sparse matrix-matrix products on Intel KNL and multicore architectures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nagasaka, Y; Matsuoka, S; Azad, A

    Sparse matrix-matrix multiplication (SpGEMM) is a computational primitive that is widely used in areas ranging from traditional numerical applications to recent big data analysis and machine learning. Although many SpGEMM algorithms have been proposed, hardware specific optimizations for multi- and many-core processors are lacking and a detailed analysis of their performance under various use cases and matrices is not available. We firstly identify and mitigate multiple bottlenecks with memory management and thread scheduling on Intel Xeon Phi (Knights Landing or KNL). Specifically targeting multi- and many-core processors, we develop a hash-table-based algorithm and optimize a heap-based shared-memory SpGEMM algorithm. Wemore » examine their performance together with other publicly available codes. Different from the literature, our evaluation also includes use cases that are representative of real graph algorithms, such as multi-source breadth-first search or triangle counting. Our hash-table and heap-based algorithms are showing significant speedups from libraries in the majority of the cases while different algorithms dominate the other scenarios with different matrix size, sparsity, compression factor and operation type. We wrap up in-depth evaluation results and make a recipe to give the best SpGEMM algorithm for target scenario. A critical finding is that hash-table-based SpGEMM gets a significant performance boost if the nonzeros are not required to be sorted within each row of the output matrix.« less

  12. Manipulating soil microbial communities in extensive green roof substrates.

    PubMed

    Molineux, Chloe J; Connop, Stuart P; Gange, Alan C

    2014-09-15

    There has been very little investigation into the soil microbial community on green roofs, yet this below ground habitat is vital for ecosystem functioning. Green roofs are often harsh environments that would greatly benefit from having a healthy microbial system, allowing efficient nutrient cycling and a degree of drought tolerance in dry summer months. To test if green roof microbial communities could be manipulated, we added mycorrhizal fungi and a microbial mixture ('compost tea') to green roof rootzones, composed mainly of crushed brick or crushed concrete. The study revealed that growing media type and depth play a vital role in the microbial ecology of green roofs. There are complex relationships between depth and type of substrate and the biomass of different microbial groups, with no clear pattern being observed. Following the addition of inoculants, bacterial groups tended to increase in biomass in shallower substrates, whereas fungal biomass change was dependent on depth and type of substrate. Increased fungal biomass was found in shallow plots containing more crushed concrete and deeper plots containing more crushed brick where compost tea (a live mixture of beneficial bacteria) was added, perhaps due to the presence of helper bacteria for arbuscular mycorrhizal fungi (AMF). Often there was not an additive affect of the microbial inoculations but instead an antagonistic interaction between the added AM fungi and the compost tea. This suggests that some species of microbes may not be compatible with others, as competition for limited resources occurs within the various substrates. The overall results suggest that microbial inoculations of green roof habitats are sustainable. They need only be done once for increased biomass to be found in subsequent years, indicating that this is a novel and viable method of enhancing roof community composition. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Noble gases released by vacuum crushing of EETA 79001 glass

    NASA Technical Reports Server (NTRS)

    Wiens, R. C.

    1988-01-01

    An EETA 79001 glass sample was crushed in a vacuum to observe the gases released. About 15 pct of the total gas concentrations were a mixture of a small amount of SPB-type gas with larger proportions of another air-like component. Less than 5 pct of the SPB gas was released by crushing, while 36-40 pct of the EETV (indigenous) gas was crush-released. The results are consistent with a siting of the EETV component in 10-100 micron vesicles seen in the glass. It is suggested that the SPB component is either in vesicles less than 6 microns in diameter or is primarily sited elsewhere.

  14. Nose biopsy: a comparison between two sampling techniques.

    PubMed

    Segal, Nili; Osyntsov, Lidia; Olchowski, Judith; Kordeluk, Sofia; Plakht, Ygal

    2016-06-01

    Pre operative biopsy is important in obtaining preliminary information that may help in tailoring the optimal treatment. The aim of this study was to compare two sampling techniques of obtaining nasal biopsy-nasal forceps and nasal scissors in terms of pathological results. Biopsies of nasal lesions were taken from patients undergoing nasal surgery by two techniques- with nasal forceps and with nasal scissors. Each sample was examined by a senior pathologist that was blinded to the sampling method. A grading system was used to rate the crush artifact in every sample (none, mild, moderate, severe). A comparison was made between the severity of the crush artifact and the pathological results of the two techniques. One hundred and forty-four samples were taken from 46 patients. Thirty-one were males and the mean age was 49.6 years. Samples taken by forceps had significantly higher grades of crush artifacts compared to those taken by scissors. The degree of crush artifacts had a significant influence on the accuracy of the pre operative biopsy. Forceps cause significant amount of crush artifacts compared to scissors. The degree of crush artifact in the tissue sample influences the accuracy of the biopsy.

  15. Accelerated retinal ganglion cell death in mice deficient in the Sigma-1 receptor.

    PubMed

    Mavlyutov, Timur A; Nickells, Robert W; Guo, Lian-Wang

    2011-04-26

    The sigma-1 receptor (σR1), a ligand-operated chaperone, has been inferred to be neuroprotective in previous studies using σR1 ligands. The σR1 specificity of the protective function, however, has yet to be firmly established, due to the existence of non-σR1 targets of the ligands. Here, we used the σR1-knockout mouse (Sigmar1(-/-)) to demonstrate unambiguously the role of the σR1 in protecting the retinal ganglion cells against degeneration after acute damage to the optic nerve. Retinal σR binding sites were labeled with radioiodinated σR ligands and analyzed by autoradiography. Localization of the σR1 was performed by indirect immunofluorescence on frozen retinal sections. Retinal ganglion cell death was induced by acute optic nerve crush in wild-type and Sigmar1(-/-) mice. Surviving cells in the ganglion cell layer were counted on Nissl-stained retinal whole mounts 7 days after the crush surgery. Photoaffinity labeling indicated the presence of the σR1 in the retina, in concentrations equivalent to those in liver tissue. Immunolabeling detected this receptor in cells of both the ganglion cell layer and the photoreceptor cell layer in wild-type retinas. Quantification of cells remaining after optic nerve crush showed that 86.8±7.9% cells remained in the wild-type ganglion cell layer, but only 68.3±3.4% survived in the Sigmar1(-/-), demonstrating a significant difference between the wild-type and the Sigmar1(-/-) in crush-induced ganglion cell loss. Our data indicated faster retinal ganglion cell death in Sigmar1(-/-) than in wild-type mice under the stresses caused by optic nerve crush, providing direct evidence for a role of the σR1 in alleviating retinal degeneration. This conclusion is consistent with the previous pharmacological studies using σR1 agonists. Thus, our study supports the idea that the σR1 is a promising therapeutic target for neurodegenerative retinal diseases, such as glaucoma.

  16. Accelerated retinal ganglion cell death in mice deficient in the Sigma-1 receptor

    PubMed Central

    Mavlyutov, Timur A.; Nickells, Robert W.

    2011-01-01

    Purpose The sigma-1 receptor (σR1), a ligand-operated chaperone, has been inferred to be neuroprotective in previous studies using σR1 ligands. The σR1 specificity of the protective function, however, has yet to be firmly established, due to the existence of non-σR1 targets of the ligands. Here, we used the σR1-knockout mouse (Sigmar1−/−) to demonstrate unambiguously the role of the σR1 in protecting the retinal ganglion cells against degeneration after acute damage to the optic nerve. Methods Retinal σR binding sites were labeled with radioiodinated σR ligands and analyzed by autoradiography. Localization of the σR1 was performed by indirect immunofluorescence on frozen retinal sections. Retinal ganglion cell death was induced by acute optic nerve crush in wild-type and Sigmar1−/− mice. Surviving cells in the ganglion cell layer were counted on Nissl-stained retinal whole mounts 7 days after the crush surgery. Results Photoaffinity labeling indicated the presence of the σR1 in the retina, in concentrations equivalent to those in liver tissue. Immunolabeling detected this receptor in cells of both the ganglion cell layer and the photoreceptor cell layer in wild-type retinas. Quantification of cells remaining after optic nerve crush showed that 86.8±7.9% cells remained in the wild-type ganglion cell layer, but only 68.3±3.4% survived in the Sigmar1−/−, demonstrating a significant difference between the wild-type and the Sigmar1−/− in crush-induced ganglion cell loss. Conclusions Our data indicated faster retinal ganglion cell death in Sigmar1−/− than in wild-type mice under the stresses caused by optic nerve crush, providing direct evidence for a role of the σR1 in alleviating retinal degeneration. This conclusion is consistent with the previous pharmacological studies using σR1 agonists. Thus, our study supports the idea that the σR1 is a promising therapeutic target for neurodegenerative retinal diseases, such as glaucoma. PMID:21541278

  17. Resveratrol Promotes Nerve Regeneration via Activation of p300 Acetyltransferase-Mediated VEGF Signaling in a Rat Model of Sciatic Nerve Crush Injury.

    PubMed

    Ding, Zhuofeng; Cao, Jiawei; Shen, Yu; Zou, Yu; Yang, Xin; Zhou, Wen; Guo, Qulian; Huang, Changsheng

    2018-01-01

    Peripheral nerve injuries are generally associated with incomplete restoration of motor function. The slow rate of nerve regeneration after injury may account for this. Although many benefits of resveratrol have been shown in the nervous system, it is not clear whether resveratrol could promote fast nerve regeneration and motor repair after peripheral nerve injury. This study showed that the motor deficits caused by sciatic nerve crush injury were alleviated by daily systematic resveratrol treatment within 10 days. Resveratrol increased the number of axons in the distal part of the injured nerve, indicating enhanced nerve regeneration. In the affected ventral spinal cord, resveratrol enhanced the expression of several vascular endothelial growth factor family proteins (VEGFs) and increased the phosphorylation of p300 through Akt signaling, indicating activation of p300 acetyltransferase. Inactivation of p300 acetyltransferase reversed the resveratrol-induced expression of VEGFs and motor repair in rats that had undergone sciatic nerve crush injury. The above results indicated that daily systematic resveratrol treatment promoted nerve regeneration and led to rapid motor repair. Resveratrol activated p300 acetyltransferase-mediated VEGF signaling in the affected ventral spinal cord, which may have thus contributed to the acceleration of nerve regeneration and motor repair.

  18. Axial Crushing of Thin-Walled Columns with Octagonal Section: Modeling and Design

    NASA Astrophysics Data System (ADS)

    Liu, Yucheng; Day, Michael L.

    This chapter focus on numerical crashworthiness analysis of straight thinwalled columns with octagonal cross sections. Two important issues in this analysis are demonstrated here: computer modeling and crashworthiness design. In the first part, this chapter introduces a method of developing simplified finite element (FE) models for the straight thin-walled octagonal columns, which can be used for the numerical crashworthiness analysis. Next, this chapter performs a crashworthiness design for such thin-walled columns in order to maximize their energy absorption capability. Specific energy absorption (SEA) is set as the design objective, side length of the octagonal cross section and wall thickness are selected as design variables, and maximum crushing force (Pm) occurs during crashes is set as design constraint. Response surface method (RSM) is employed to formulate functions for both SEA and Pm.

  19. Recovery of contractile and metabolic phenotypes in regenerating slow muscle after notexin-induced or crush injury.

    PubMed

    Fink, E; Fortin, D; Serrurier, B; Ventura-Clapier, R; Bigard, A X

    2003-01-01

    The recovery of metabolic pathways after muscle damage has been poorly studied. We investigated the myosin heavy chain (MHC) isoform transitions and the recovery of citrate synthase (CS) activity, isoform distribution of lactate dehydrogenase (LDH) and creatine kinase (CK) in slow muscles after two types of injury. Muscle degeneration was induced in left soleus muscles of male Wistar rats by either notexin injection or crushing and the regenerative process was examined from 2 to 56 days after injury. Myosin transition occurred earlier after notexin than after crush injury. Fast-type IIx and more particularly type IIa MHC isoform disappeared by day 28 after notexin inoculation, while they were still detected long after in crushed muscles. A full recovery of both the CS activity and the specific activity of the H-LDH subunit was observed from day 42 in notexin-treated muscles, while values measured in crushed muscles remained significantly lower than in non-injured muscles (P < 0.05). The activity of the mitochondrial isoform of CK (mi-CK) was markedly affected by the type of injury (P < 0.001), and failed to reach normal levels after crush injury (P < 0.05). The results of this study show that the relatively rapid MHC transitions during regeneration contrasts with the slow recovery in the oxidative capacity. The recovery of the oxidative capacity remained incomplete after crush injury, a model of injury known to lead to disruption of the basal lamina and severe interruption of the vascular and nerve supply.

  20. Evaluation of Crushed Tablet for Oral Administration and the Effect of Food on Apixaban Pharmacokinetics in Healthy Adults.

    PubMed

    Song, Yan; Chang, Ming; Suzuki, Akiyuki; Frost, Robert J A; Kelly, Anne; LaCreta, Frank; Frost, Charles

    2016-07-01

    These studies evaluate the relative bioavailability of crushed apixaban tablets and the effect of food on apixaban pharmacokinetic properties. An open-label, randomized, crossover study in 33 healthy adults compared the bioavailability of 2 × 5-mg apixaban tablets administered whole (reference), crushed and suspended in 30 mL of water, and crushed and mixed with 30 g of applesauce. A second open-label, randomized, crossover study in 22 healthy adults compared apixaban 1 × 5-mg tablet administered when fasted (reference) or immediately after consumption of a high-fat, high-calorie meal. Point estimates and 90% CIs for geometric mean ratios were generated for Cmax, AUC0-∞, and AUC0-t. Cmax and AUC met bioequivalence criteria for crushed tablets in water. Cmax and AUC decreased by 21.1% and 16.4%, respectively, with the lower bound of the CIs falling below the bioequivalence criteria for crushed tablets with applesauce. Similarly, administration of whole tablets with a high-fat, high-calorie meal reduced apixaban Cmax and AUC by 14.9% and 20.1%, respectively. The exposure reductions in both studies were considered not clinically significant. Apixaban tablets can be administered crushed or whole, with or without food. The results of these alternative methods of administration support their use in patients who have difficulty swallowing tablets. ClinicalTrials.gov identifiers: NCT02101112 and NCT01437839. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  1. Efficacy of chewed vs. crushed lanthanum on phosphorus binding in healthy volunteers.

    PubMed

    How, P P; Mason, D L; Arruda, J A; Lau, A H

    2010-05-01

    For effective dietary phosphorous (P) binding, patients are recommended to chew lanthanum tablets completely before swallowing, with or immediately after meals. However, some patients are unable to chew the tablets. It is not known if crushing the tablets prior to taking them with food is as efficacious as chewing them. This study was conducted to compare the efficacy of chewed vs. crushed lanthanum on P binding. 12 healthy subjects were randomized and crossed-over to receive: (A) a standardized meal containing 1 g (32 mmol) of elemental P; (B) a single 1 g oral dose of lanthanum, chewed and taken with the standardized meal; (C) a single 1 g oral dose of lanthanum, crushed into a fine powder using a pestle and mortar, mixed with applesauce, and taken with the standardized meal. Blood and urine samples were collected from baseline to 8 hours after meal completion. The changes in serum P, urinary P excretion and fractional excretion of P (FePi) were compared among treatment arms using ANOVA. Co-administration of lanthanum with meal resulted in a smaller increase in serum P, compared with meal alone (p < 0.05). The smaller increase in serum P was similar for both chewed and crushed lanthanum. The amount of P excreted and FePi were also lower when chewed or crushed lanthanum was administered with meal, compared with meal alone (p = n.s. and p < 0.05, respectively). Both chewed and crushed lanthanum are effective in lowering P absorption after a dietary P load.

  2. Stability and compatibility of tegaserod from crushed tablets mixed in beverages and foods.

    PubMed

    Carrier, Marie-Noëlle; Garinot, Olivier; Vitzling, Christian

    2004-06-01

    The stability and compatibility of tegaserod from crushed tablets in selected beverages and foods were studied. Suspensions of tegaserod maleate tablets containing 6 mg of the drug base were prepared by crushing the tablets and mixing the powder with tap water, apple juice, orange juice, milk, applesauce, yogurt, and chocolate-hazelnut spread. Drug stability, drug comparability, suspension homogeneity, and completeness of a dose were measured by high-performance liquid chromatography at intervals up to three days at 20-25 degrees C and 5 degrees C. In vitro dissolution profiles were determined for crushed tegaserod tablets in water, apple juice, orange juice, and applesauce. Tegaserod from crushed tablets was stable in and compatible with water, apple juice, orange juice, and applesauce, and the suspensions were homogeneous. The complete dose was delivered with these media. The dissolution profiles of crushed tegaserod tablets in water and in apple juice were comparable to those of intact tablets; the dissolution profiles in orange juice and applesauce were not comparable with those of intact tablets. The results with milk, yogurt, and chocolate-hazelnut spread as vehicles were inconclusive. The suspension in milk was not homogeneous, and the dose was incomplete. Tegaserod from crushed tablets was stable in and compatible with water, apple juice, orange juice, and applesauce, but the dissolution profile in orange juice or applesauce was not acceptable. Apple juice may be the preferred vehicle because it masks the drug's taste.

  3. The Candy Crush Sweet Tooth: How 'Near-misses' in Candy Crush Increase Frustration, and the Urge to Continue Gameplay.

    PubMed

    Larche, Chanel J; Musielak, Natalia; Dixon, Mike J

    2017-06-01

    Like many gambling games, the exceedingly popular and lucrative smartphone game "Candy Crush" features near-miss outcomes. In slot machines, a near-miss involves getting two of the needed three high-paying symbols on the pay-line (i.e., just missing the big win). In Candy Crush, the game signals when you just miss getting to the next level by one or two moves. Because near-misses in gambling games have consistently been shown to invigorate play despite being frustrating outcomes, the goal of the present study was to examine whether such near-misses trigger increases in player arousal, frustration and urge to continue play in Candy Crush. Sixty avid Candy Crush players were recruited to play the game for 30 min while having their Heart Rate, Skin Conductance Level, subjective arousal, frustration and urge to play recorded for three types of outcomes: wins (where they level up), losses (where they don't come close to levelling up), and near-misses (where they just miss levelling up). Near-misses were more arousing than losses as indexed by increased heart rate and greater subjective arousal. Near-misses were also subjectively rated as the most frustrating of all outcomes. Most importantly, of any type of outcome, near-misses triggered the most substantial urge to continue play. These findings suggest that near-misses in Candy Crush play a role in player commitment to the game, and may contribute to players playing longer than intended.

  4. Evaluation of roll designs on a roll-crusher/ crusher/splitter biomass harvester: test bench results

    Treesearch

    Colin Ashmore; Donald L. Sirois; Bryce J. Stokes

    1987-01-01

    Four different roll designs were evaluated on a test bench roll crusher/splitter to determine feeding and crushing efficiencies. For each design, different gap settings for the primary and secondary rolls were tested at two hydraulic cylinder pressures on the primary crush roll to determine their ability to crush and/or feed tree bolts. Seven different diameter classes...

  5. Energy-Absorption Capability of Composite Tubes and Beams

    DTIC Science & Technology

    1989-09-01

    Beom Ga Farley D I arnd T RobertMKJow~ ELFCTE MAR 2 71991 I C September 1989 National Aeronautics and Space AdministrationUSAM LWOWle Research Cente...composite structural elements crush and what are the controlling medanisms. In this study the four characteristic crushing modes, transverse shearing, brittle...fracturing, lamina bending, and local buckling were identified and the mechanisms that control the crushing process defined. An in-depth

  6. Measurements of the stress supported by the crush zone in open hole composite laminates loaded in compression

    NASA Technical Reports Server (NTRS)

    Guynn, E. Gail; Bradley, Walter L.

    1989-01-01

    Measurements of the stress supported by the crush zone in open hole specimens loaded in compression were carried out on two composite laminates, AS4/PEEK and IM6/HST-7, containing circular holes of three different diameters. Compression tests were conducted in a specially designed high-axial-alignment material test system machine. Results indicated that the local stress supported in the crush zone is much less than the stress required to initiate the crush, providing the reason for the finding of Guynn et al. (1987) that the Dugdale model does not accurately predict the load-damage size relationship of open hole composite specimens loaded in compression.

  7. Characterization of Aluminum Honeycomb and Experimentation for Model Development and Validation, Volume I: Discovery and Characterization Experiments for High-Density Aluminum Honeycomb

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lu, Wei-Yang; Korellis, John S.; Lee, Kenneth L.

    2006-08-01

    Honeycomb is a structure that consists of two-dimensional regular arrays of open cells. High-density aluminum honeycomb has been used in weapon assemblies to mitigate shock and protect payload because of its excellent crush properties. In order to use honeycomb efficiently and to certify the payload is protected by the honeycomb under various loading conditions, a validated honeycomb crush model is required and the mechanical properties of the honeycombs need to be fully characterized. Volume I of this report documents an experimental study of the crush behavior of high-density honeycombs. Two sets of honeycombs were included in this investigation: commercial grademore » for initial exploratory experiments, and weapon grade, which satisfied B61 specifications. This investigation also includes developing proper experimental methods for crush characterization, conducting discovery experiments to explore crush behaviors for model improvement, and identifying experimental and material uncertainties.« less

  8. Residual Mechanical Properties of Concrete Made with Crushed Clay Bricks and Roof Tiles Aggregate after Exposure to High Temperatures

    PubMed Central

    Miličević, Ivana; Štirmer, Nina; Banjad Pečur, Ivana

    2016-01-01

    This paper presents the residual mechanical properties of concrete made with crushed bricks and clay roof tile aggregates after exposure to high temperatures. One referent mixture and eight mixtures with different percentages of replacement of natural aggregate by crushed bricks and roof tiles are experimentally tested. The properties of the concrete were measured before and after exposure to 200, 400, 600 and 800 °C. In order to evaluate the basic residual mechanical properties of concrete with crushed bricks and roof tiles after exposure to high temperatures, ultrasonic pulse velocity is used as a non-destructive test method and the results are compared with those of a destructive method for validation. The mixture with the highest percentage of replacement of natural aggregate by crushed brick and roof tile aggregate has the best physical, mechanical, and thermal properties for application of such concrete in precast concrete elements exposed to high temperatures. PMID:28773420

  9. Treatment of Chronic Hepatitis C Virus Infection With Crushed Ledipasvir/Sofosbuvir Administered via a Percutaneous Endoscopic Gastrostomy Tube.

    PubMed

    Jindracek, Lauren; Stark, Jennifer

    2017-01-01

    Ledipasvir/sofosbuvir (Harvoni®) is a fixed-dose tablet indicated for the treatment of chronic hepatitis C virus (HCV) infection. There are currently no data available on the safety and efficacy of crushed ledipasvir/sofosbuvir tablets. This report describes the first documented case of successful treatment of chronic HCV infection in a patient crushing ledipasvir/sofosbuvir for administration via a percutaneous endoscopic gastrostomy (PEG) tube. The patient was treatment experienced and had evidence of compensated cirrhosis. Treatment duration was 24 weeks, and HCV RNA was undetectable 12 weeks after completion of treatment (SVR12) which is the accepted measure of a clinical cure. Issues may arise during or prior to starting HCV treatment that necessitate crushing tablets. Stopping or interrupting HCV treatment could lead to development of resistance or treatment failure. This is the first published case in which crushed ledipasvir/sofosbuvir administered via a PEG tube is documented as a safe and effective option for treatment of chronic HCV infection.

  10. Asymmetric distances for binary embeddings.

    PubMed

    Gordo, Albert; Perronnin, Florent; Gong, Yunchao; Lazebnik, Svetlana

    2014-01-01

    In large-scale query-by-example retrieval, embedding image signatures in a binary space offers two benefits: data compression and search efficiency. While most embedding algorithms binarize both query and database signatures, it has been noted that this is not strictly a requirement. Indeed, asymmetric schemes that binarize the database signatures but not the query still enjoy the same two benefits but may provide superior accuracy. In this work, we propose two general asymmetric distances that are applicable to a wide variety of embedding techniques including locality sensitive hashing (LSH), locality sensitive binary codes (LSBC), spectral hashing (SH), PCA embedding (PCAE), PCAE with random rotations (PCAE-RR), and PCAE with iterative quantization (PCAE-ITQ). We experiment on four public benchmarks containing up to 1M images and show that the proposed asymmetric distances consistently lead to large improvements over the symmetric Hamming distance for all binary embedding techniques.

  11. Paradeisos: A perfect hashing algorithm for many-body eigenvalue problems

    NASA Astrophysics Data System (ADS)

    Jia, C. J.; Wang, Y.; Mendl, C. B.; Moritz, B.; Devereaux, T. P.

    2018-03-01

    We describe an essentially perfect hashing algorithm for calculating the position of an element in an ordered list, appropriate for the construction and manipulation of many-body Hamiltonian, sparse matrices. Each element of the list corresponds to an integer value whose binary representation reflects the occupation of single-particle basis states for each element in the many-body Hilbert space. The algorithm replaces conventional methods, such as binary search, for locating the elements of the ordered list, eliminating the need to store the integer representation for each element, without increasing the computational complexity. Combined with the "checkerboard" decomposition of the Hamiltonian matrix for distribution over parallel computing environments, this leads to a substantial savings in aggregate memory. While the algorithm can be applied broadly to many-body, correlated problems, we demonstrate its utility in reducing total memory consumption for a series of fermionic single-band Hubbard model calculations on small clusters with progressively larger Hilbert space dimension.

  12. Handwriting: Feature Correlation Analysis for Biometric Hashes

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Steinmetz, Ralf

    2004-12-01

    In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  13. A fast exact simulation method for a class of Markov jump processes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Yao, E-mail: yaoli@math.umass.edu; Hu, Lili, E-mail: lilyhu86@gmail.com

    2015-11-14

    A new method of the stochastic simulation algorithm (SSA), named the Hashing-Leaping method (HLM), for exact simulations of a class of Markov jump processes, is presented in this paper. The HLM has a conditional constant computational cost per event, which is independent of the number of exponential clocks in the Markov process. The main idea of the HLM is to repeatedly implement a hash-table-like bucket sort algorithm for all times of occurrence covered by a time step with length τ. This paper serves as an introduction to this new SSA method. We introduce the method, demonstrate its implementation, analyze itsmore » properties, and compare its performance with three other commonly used SSA methods in four examples. Our performance tests and CPU operation statistics show certain advantages of the HLM for large scale problems.« less

  14. Genomics-Based Security Protocols: From Plaintext to Cipherprotein

    NASA Technical Reports Server (NTRS)

    Shaw, Harry; Hussein, Sayed; Helgert, Hermann

    2011-01-01

    The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.

  15. A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy

    NASA Astrophysics Data System (ADS)

    Popic, Victoria; Batzoglou, Serafim

    2017-05-01

    Low-cost clouds can alleviate the compute and storage burden of the genome sequencing data explosion. However, moving personal genome data analysis to the cloud can raise serious privacy concerns. Here, we devise a method named Balaur, a privacy preserving read mapper for hybrid clouds based on locality sensitive hashing and kmer voting. Balaur can securely outsource a substantial fraction of the computation to the public cloud, while being highly competitive in accuracy and speed with non-private state-of-the-art read aligners on short read data. We also show that the method is significantly faster than the state of the art in long read mapping. Therefore, Balaur can enable institutions handling massive genomic data sets to shift part of their analysis to the cloud without sacrificing accuracy or exposing sensitive information to an untrusted third party.

  16. A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy

    PubMed Central

    Popic, Victoria; Batzoglou, Serafim

    2017-01-01

    Low-cost clouds can alleviate the compute and storage burden of the genome sequencing data explosion. However, moving personal genome data analysis to the cloud can raise serious privacy concerns. Here, we devise a method named Balaur, a privacy preserving read mapper for hybrid clouds based on locality sensitive hashing and kmer voting. Balaur can securely outsource a substantial fraction of the computation to the public cloud, while being highly competitive in accuracy and speed with non-private state-of-the-art read aligners on short read data. We also show that the method is significantly faster than the state of the art in long read mapping. Therefore, Balaur can enable institutions handling massive genomic data sets to shift part of their analysis to the cloud without sacrificing accuracy or exposing sensitive information to an untrusted third party. PMID:28508884

  17. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  18. An evaluation of multi-probe locality sensitive hashing for computing similarities over web-scale query logs

    PubMed Central

    2018-01-01

    Many modern applications of AI such as web search, mobile browsing, image processing, and natural language processing rely on finding similar items from a large database of complex objects. Due to the very large scale of data involved (e.g., users’ queries from commercial search engines), computing such near or nearest neighbors is a non-trivial task, as the computational cost grows significantly with the number of items. To address this challenge, we adopt Locality Sensitive Hashing (a.k.a, LSH) methods and evaluate four variants in a distributed computing environment (specifically, Hadoop). We identify several optimizations which improve performance, suitable for deployment in very large scale settings. The experimental results demonstrate our variants of LSH achieve the robust performance with better recall compared with “vanilla” LSH, even when using the same amount of space. PMID:29346410

  19. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  20. Parameterizing Sound: Design Considerations for an Environmental Sound Database

    DTIC Science & Technology

    2015-04-01

    Accordion Car backfire Crushing a metal can Aerosol can Car crash Crushing a tin can Alarm clock Car ignition Crushing egg shells Alloette...top Coffee perking Eggs beaten in a bowl with a whisk Bowling Coffee pot whistling Elastic (snap) Bread cutting Coin dropping Electric...Bus Combination lock Female speaking Bus air break Cooking with fat Ferry Bus stop and go Cuckoo clock Ferry horn Camera Corduroy

  1. A novel model for examining recovery of phonation after vocal nerve damage.

    PubMed

    Bhama, Prabhat K; Hillel, Allen D; Merati, Albert L; Perkel, David J

    2011-05-01

    Recurrent laryngeal nerve injury remains a dominant clinical issue in laryngology. To date, no animal model of laryngeal reinnervation has offered an outcome measure that can reflect the degree of recovery based on vocal function. We present an avian model system for studying recovery of learned vocalizations after nerve injury. Prospective animal study. Digital recordings of bird song were made from 11 adult male zebra finches; nine birds underwent bilateral crushing of the nerve supplying the vocal organ, and two birds underwent sham surgery. Songs from all the birds were then recorded regularly and analyzed based on temporal and spectral characteristics using computer software. Indices were calculated to indicate the degree of similarity between preoperative and postoperative song. Nerve crush caused audible differences in song quality and significant drops (P<0.05) in measured spectral and, to a lesser degree, temporal indices. Spectral indices recovered significantly (mean=43.0%; standard deviation [SD]=40.7; P<0.02), and there was an insignificant trend toward recovery of temporal index (mean=28.0%; SD=41.4; P=0.0771). In five of the nine (56%) birds, there was a greater than 50% recovery of spectral indices within a 4-week period. Two birds exhibited substantially less recovery of spectral indices and two birds had a persistent decline in spectral indices. Recovery of temporal index was highly variable as well, ranging from persistent further declines of 45.1% to recovery of 87%. Neither sham bird exhibited significant (P>0.05) differences in song after nerve crush. The songbird model system allows functional analysis of learned vocalization after surgical damage to vocal nerves. Copyright © 2011 The Voice Foundation. Published by Mosby, Inc. All rights reserved.

  2. Bilateral Cavernous Nerve Crush Injury in the Rat Model: A Comparative Review of Pharmacologic Interventions.

    PubMed

    Haney, Nora M; Nguyen, Hoang M T; Honda, Matthew; Abdel-Mageed, Asim B; Hellstrom, Wayne J G

    2018-04-01

    It is common for men to develop erectile dysfunction after radical prostatectomy. The anatomy of the rat allows the cavernous nerve (CN) to be identified, dissected, and injured in a controlled fashion. Therefore, bilateral CN injury (BCNI) in the rat model is routinely used to study post-prostatectomy erectile dysfunction. To compare and contrast the available literature on pharmacologic intervention after BCNI in the rat. A literature search was performed on PubMed for cavernous nerve and injury and erectile dysfunction and rat. Only articles with BCNI and pharmacologic intervention that could be grouped into categories of immune modulation, growth factor therapy, receptor kinase inhibition, phosphodiesterase type 5 inhibition, and anti-inflammatory and antifibrotic interventions were included. To assess outcomes of pharmaceutical intervention on erectile function recovery after BCNI in the rat model. The ratio of maximum intracavernous pressure to mean arterial pressure was the main outcome measure chosen for this analysis. All interventions improved erectile function recovery after BCNI based on the ratio of maximum intracavernous pressure to mean arterial pressure results. Additional end-point analysis examined the corpus cavernosa and/or the major pelvic ganglion and CN. There was extreme heterogeneity within the literature, making accurate comparisons between crush injury and therapeutic interventions difficult. BCNI in the rat is the accepted animal model used to study nerve-sparing post-prostatectomy erectile dysfunction. However, an important limitation is extreme variability. Efforts should be made to decrease this variability and increase the translational utility toward clinical trials in humans. Haney NM, Nguyen HMT, Honda M, et al. Bilateral Cavernous Nerve Crush Injury in the Rat Model: A Comparative Review of Pharmacologic Interventions. Sex Med Rev 2018;6:234-241. Copyright © 2017 International Society for Sexual Medicine. Published by Elsevier Inc. All rights reserved.

  3. Effect of Raw Crushed Garlic (Allium sativum L.) on Components of Metabolic Syndrome.

    PubMed

    Choudhary, Prema Ram; Jani, Rameshchandra D; Sharma, Megh Shyam

    2017-09-28

    Metabolic syndrome consists of a group of risk factors characterized by abdominal obesity, hypertension, atherogenic dyslipidemia, hyperglycemia, and prothrombotic and proinflammatory conditions. Raw garlic homogenate has been reported to reduce serum lipid levels in animal model; however, no precise studies have been performed to evaluate the effect of raw crushed garlic (Allium sativum L.) on components of metabolic syndrome. Therefore, the present study was designed to investigate the effect of raw crushed garlic on components of metabolic syndrome. A total of 40 metabolic syndrome patients were randomly selected from the diabetic center of SP Medical College, Bikaner, Rajasthan, India. They underwent treatment with 100 mg/kg body weight raw crushed garlic 2 times a day with standard diet for 4 weeks; their anthropometric and serum biochemical variables were measured at both the beginning and the end of the study. Statistical analysis was performed using IBM SPSS version 20, and Student's paired "t" test was used to compare variables before and after treatment with garlic preparation. Raw crushed garlic significantly reduced components of metabolic syndrome including waist circumference (p < .05), systolic and diastolic blood pressure (p < .001), triglycerides (p < .01), fasting blood glucose (p < .0001) and significantly increased serum high-density lipoprotein cholesterol (p < .0001). There was no significant difference found in body mass index (p > .05) of patients with metabolic syndrome after consumption of raw crushed garlic for 4 weeks. Raw crushed garlic has beneficial effects on components of metabolic syndrome; therefore, it can be used as an accompanying remedy for prevention and treatment of patients with metabolic syndrome.

  4. Peripheral Nerve Regeneration Following Crush Injury to Rat Peroneal Nerve by Aqueous Extract of Medicinal Mushroom Hericium erinaceus (Bull.: Fr) Pers. (Aphyllophoromycetideae)

    PubMed Central

    Wong, Kah-Hui; Naidu, Murali; David, Pamela; Abdulla, Mahmood Ameen; Abdullah, Noorlidah; Kuppusamy, Umah Rani; Sabaratnam, Vikineswary

    2011-01-01

    Nerve crush injury is a well-established axonotmetic model in experimental regeneration studies to investigate the impact of various pharmacological treatments. Hericium erinaceus is a temperate mushroom but is now being cultivated in tropical Malaysia. In this study, we investigated the activity of aqueous extract of H. erinaceus fresh fruiting bodies in promoting functional recovery following an axonotmetic peroneal nerve injury in adult female Sprague-Dawley rats by daily oral administration. The aim was to investigate the possible use of this mushroom in the treatment of injured nerve. Functional recovery was assessed in behavioral experiment by walking track analysis. Peroneal functional index (PFI) was determined before surgery and after surgery as rats showed signs of recovery. Histological examinations were performed on peroneal nerve by immunofluorescence staining and neuromuscular junction by combined silver-cholinesterase stain. Analysis of PFI indicated that return of hind limb function occurred earlier in rats of aqueous extract or mecobalamin (positive control) group compared to negative control group. Regeneration of axons and reinnervation of motor endplates in extensor digitorum longus muscle in rats of aqueous extract or mecobalamin group developed better than in negative control group. These data suggest that daily oral administration of aqueous extract of H. erinaceus fresh fruiting bodies could promote the regeneration of injured rat peroneal nerve in the early stage of recovery. PMID:21941586

  5. Impact of pentadecapeptide BPC 157 on muscle healing impaired by systemic corticosteroid application.

    PubMed

    Pevec, Danira; Novinscak, Tomislav; Brcic, Luka; Sipos, Kristijan; Jukic, Ivana; Staresinic, Mario; Mise, Sandro; Brcic, Iva; Kolenc, Danijela; Klicek, Robert; Banic, Tihomir; Sever, Marko; Kocijan, Ana; Berkopic, Lidija; Radic, Bozo; Buljat, Gojko; Anic, Tomislav; Zoricic, Ivan; Bojanic, Ivan; Seiwerth, Sven; Sikiric, Predrag

    2010-03-01

    The effect of systemic and local peptide treatment effective in muscle contusion and then on counteraction of corticosteroid-induced impairment was tested. The pentadecapeptide BPC 157, given without a carrier, improved the healing of transected quadriceps muscle. It also improved muscle healing in rats with muscle crush injury when applied systemically or locally. Importantly, it counteracted corticosteroid-impairment in tendon to bone healing. Thus BPC 157 is proposed as an effective treatment that can improve muscle healing in spite of corticosteroid treatment. After the gastrocnemius muscle complex had been injured, rats received BPC 157 (intraperitoneally or locally as a cream) and/or 6alpha-methylprednisolone (intraperitoneally) only once (immediately after injury, sacrifice at 2 h) or once daily (final dose 24 hours before sacrifice and/or assessment procedure at days 1, 2, 4, 7, and 14). Muscle healing was evaluated functionally, macroscopically, and histologically. Without therapy, crushed gastrocnemius muscle complex controls showed limited improvement. 6alpha-methylprednisolone markedly aggravated healing. In contrast, BPC 157 induced faster muscle healing and full function restoration and improved muscle healing despite systemic corticosteroid treatment when given intraperitoneally or locally and demonstrated functionally, macroscopically, and histologically at all investigated intervals. BPC 157 completely reversed systemic corticosteroid-impaired muscle healing.

  6. Effects of laser therapy in peripheral nerve regeneration

    PubMed Central

    Sene, Giovana Almeida Leitão; Sousa, Fausto Fernandes de Almeida; Fazan, Valéria Sassoli; Barbieri, Cláudio Henrique

    2013-01-01

    OBJECTIVE: The influence of dose of low power lasertherapy (AsGaAl, 830 nm) on the regeneration of the fibular nerve of rats after a crush injury was evaluated by means of the functional gait analysis and histomorphometric parameters. METHODS: Controlled crush injury of the right common fibular nerve, immediately followed by increasing doses (G1: no irradiation; G2: simulated; G3: 5 J/cm2; G4: 10 J/cm2; G5: 20 J/cm2) laser irradiation directly on the lesion site for 21 consecutive days. Functional gait analysis was carried out at weekly intervals by measuring the peroneal/fibular functional index (PFI). The animals were killed on the 21st postoperative day for removal of the fibular nerve, which was prepared for the histomorphometric analysis. RESULTS: The PFI progressively increased during the observation period in all groups, without significant differences between them (p>0.05). The transverse nerve area was significantly wider in group 2 than in groups 3 and 4, while fiber density was significantly greater in group 4 than in all remaining groups. CONCLUSION: The low power AsGaAl laser irradiation did not accelerate nerve recovery with any of the doses used. Level of Evidence I, Therapeutic Studies Investigating the Results of Treatment. PMID:24453680

  7. 45. VIEW OF UPPER LEVEL CRUSHER ADDITION FROM CRUSHED OXIDIZED ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    45. VIEW OF UPPER LEVEL CRUSHER ADDITION FROM CRUSHED OXIDIZED ORE BIN. 18 INCH BELT CONVEYOR BIN FEED, LOWER CENTER, WITH STEPHENS-ADAMSON 25 TON/HR ELEVATOR SPLIT DISCHARGE (OXIDIZED/UNOXIDIZED) IN CENTER. CRUDE ORE BINS AND MACHINE SHOP BEYOND. NOTE TOP OF CRUSHED OXIDIZED ORE BIN IS BELOW TOP OF CRUDE ORE BINS. - Bald Mountain Gold Mill, Nevada Gulch at head of False Bottom Creek, Lead, Lawrence County, SD

  8. ARC-2007-ACD07-0184-003

    NASA Image and Video Library

    2007-09-26

    From left: Data Parallel Line Relaxation (DPLR) software team members Kerry Trumble, Deepak Bose and David Hash analyze and predict the extreme environments NASA's space shuttle experiences during its super high-speed reentry into Earth’s atmosphere.

  9. Crush Test Abuse Stand

    NASA Technical Reports Server (NTRS)

    Collins, Jacob; Jeevarajan, Judith; Salinas, Mike

    2011-01-01

    The purpose of this system is to simulate an internal short on battery cells by causing deformation (a crushing force) in a cell without penetration. This is performed by activating a hydraulic cylinder on one side of a blast wall with a hydraulic pump located on the other. The operator can control the rate of the crush by monitoring a local pressure gauge connected to the hydraulic cylinder or a load cell digital display located at the hydraulic pump control area. The internal short simulated would be considered a worst-case scenario of a manufacturer fs defect. This is a catastrophic failure of a cell and could be a very destructive event. Fully charged cells are to have an internal short simulated at the center of the length of the cell (away from terminals). The crush can be performed with a .- to 1-in. (.0.6- to 2.5-cm) rod placed crossways to the cell axis, causing deformation of the cell without penetration. The OCV (open-circuit voltage) and temperature of the cells, as well as the pressure and crushing force, are recorded during the operation. Occurrence of an internal short accompanied by any visible physical changes such as venting, fires, or explosions is reported. Typical analytical data examined after the test would be plots of voltage, temperature, and pressure or force versus time. The rate of crushing force can be increased or decreased based on how fast the operator pumps the hydraulic pump. The size of cylinder used to compress the battery cell can be easily changed by adding larger or smaller fittings onto the end of the hydraulic cylinder based on the battery/cell size being tested. The cell is crushed remotely and videotaped, allowing the operator to closely monitor the situation from a safe distance.

  10. Assessment of Clinical Practices for Crushing Medication in Geriatric Units.

    PubMed

    Fodil, M; Nghiem, D; Colas, M; Bourry, S; Poisson-Salomon, A-S; Rezigue, H; Trivalle, C

    2017-01-01

    To assess the modification of the form of medication and evaluate staff observance of good clinical practices. One-day assessment of clinical practices. 17 geriatrics units in the 3 Teaching Hospitals of Paris-Sud (APHP), France. Elderly in-patients with difficulties swallowing capsules and tablets. Assessment of target-patient prescriptions and direct observation of nurses' medical rounds. 155/526 in-patients (29.5%) were unable to swallow tablets or capsules: 98 (40.3%) in long-term care, 46 patients (23.8%) in the rehabilitation unit and 11 (12.2%) in the acute care unit (p = .005). In thirty-nine (27.3%) of the 143 prescriptions studied all tablets were safe to crush and all capsules were safe to open. In 104 cases, at least one medication could not be safely modified, including 26 cases (18.2%) in which none of the prescribed drugs were safe to crush or open. In 48.2% of the 110 medications that were crushed, crushing was forbidden, and presented a potential threat in 12.7% of cases or a reduced efficacy in 8.2% of cases. Crushing methods were rarely appropriate: no specific protective equipment was used (81.8%), crushing equipment was shared between patients without cleaning (95.1%), medications were spilled or lost (69.9%). The method of administration was appropriate (water, jellified water) in 25% of the cases, questionable (soup, coffee, compote, juice, cream) in 55% of the cases and unacceptable (laxative) in 21% of the cases. Management of drug prescriptions in patients with swallowing difficulties is not optimal, and may even have iatrogenic effects. In this study, 12.7% of the modifications of the drug form could have been harmful. Doctors, pharmacists and nurses need to reevaluate their practices.

  11. Comparisons of Cubed Ice, Crushed Ice, and Wetted Ice on Intramuscular and Surface Temperature Changes

    PubMed Central

    Dykstra, Joseph H; Hill, Holly M; Miller, Michael G; Cheatham, Christopher C; Michael, Timothy J; Baker, Robert J

    2009-01-01

    Context: Many researchers have investigated the effectiveness of different types of cold application, including cold whirlpools, ice packs, and chemical packs. However, few have investigated the effectiveness of different types of ice used in ice packs, even though ice is one of the most common forms of cold application. Objective: To evaluate and compare the cooling effectiveness of ice packs made with cubed, crushed, and wetted ice on intramuscular and skin surface temperatures. Design: Repeated-measures counterbalanced design. Setting: Human performance research laboratory. Patients or Other Participants: Twelve healthy participants (6 men, 6 women) with no history of musculoskeletal disease and no known preexisting inflammatory conditions or recent orthopaedic injuries to the lower extremities. Intervention(s): Ice packs made with cubed, crushed, or wetted ice were applied to a standardized area on the posterior aspect of the right gastrocnemius for 20 minutes. Each participant was given separate ice pack treatments, with at least 4 days between treatment sessions. Main Outcome Measure(s): Cutaneous and intramuscular (2 cm plus one-half skinfold measurement) temperatures of the right gastrocnemius were measured every 30 seconds during a 20-minute baseline period, a 20-minute treatment period, and a 120-minute recovery period. Results: Differences were observed among all treatments. Compared with the crushed-ice treatment, the cubed-ice and wetted-ice treatments produced lower surface and intramuscular temperatures. Wetted ice produced the greatest overall temperature change during treatment and recovery, and crushed ice produced the smallest change. Conclusions: As administered in our protocol, wetted ice was superior to cubed or crushed ice at reducing surface temperatures, whereas both cubed ice and wetted ice were superior to crushed ice at reducing intramuscular temperatures. PMID:19295957

  12. Randomized clinical trial of stapler versus clamp-crushing transection in elective liver resection.

    PubMed

    Rahbari, N N; Elbers, H; Koch, M; Vogler, P; Striebel, F; Bruckner, T; Mehrabi, A; Schemmer, P; Büchler, M W; Weitz, J

    2014-02-01

    Various devices have been developed to facilitate liver transection and reduce blood loss in liver resections. None of these has proven superiority compared with the classical clamp-crushing technique. This randomized clinical trial compared the effectiveness and safety of stapler transection with that of clamp-crushing during open liver resection. Patients admitted for elective open liver resection between January 2010 and October 2011 were assigned randomly to stapler transection or the clamp-crushing technique. The primary endpoint was the total amount of intraoperative blood loss. Secondary endpoints included transection time, duration of operation, complication rates and resection margins. A total of 130 patients were enrolled, 65 to clamp-crushing and 65 to stapler transection. There was no difference between groups in total intraoperative blood loss: median (i.q.r.) 1050 (525-1650) versus 925 (450-1425) ml respectively (P = 0·279). The difference in total intraoperative blood loss normalized to the transection surface area was not statistically significant (P = 0·092). Blood loss during parenchymal transection was significantly lower in the stapler transection group (P = 0·002), as were the parenchymal transection time (mean(s.d.) 30(21) versus 9(7) min for clamp-crushing and stapler transection groups respectively; P < 0·001) and total duration of operation (mean(s.d.) 221(86) versus 190(85) min; P = 0·047). There were no significant differences in postoperative morbidity (P = 0·863) or mortality (P = 0·684) between groups. Stapler transection is a safe technique but does not reduce intraoperative blood loss in elective liver resection compared with the clamp-crushing technique. NCT01049607 (http://www.clinicaltrials.gov). © 2014 BJS Society Ltd. Published by John Wiley & Sons Ltd.

  13. Quantum-secured blockchain

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Pozhar, N. O.; Anufriev, M. N.; Trushechkin, A. S.; Yunusov, R. R.; Kurochkin, Y. V.; Lvovsky, A. I.; Fedorov, A. K.

    2018-07-01

    Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards. Here we propose a possible solution to the quantum era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication. These results address important questions about realizability and scalability of quantum-safe blockchains for commercial and governmental applications.

  14. A statistical learning strategy for closed-loop control of fluid flows

    NASA Astrophysics Data System (ADS)

    Guéniat, Florimond; Mathelin, Lionel; Hussaini, M. Yousuff

    2016-12-01

    This work discusses a closed-loop control strategy for complex systems utilizing scarce and streaming data. A discrete embedding space is first built using hash functions applied to the sensor measurements from which a Markov process model is derived, approximating the complex system's dynamics. A control strategy is then learned using reinforcement learning once rewards relevant with respect to the control objective are identified. This method is designed for experimental configurations, requiring no computations nor prior knowledge of the system, and enjoys intrinsic robustness. It is illustrated on two systems: the control of the transitions of a Lorenz'63 dynamical system, and the control of the drag of a cylinder flow. The method is shown to perform well.

  15. Preliminary time-course study of antiinflammatory macrophage infiltration in crush-injured skeletal muscle.

    PubMed

    Shono, Jun-ichi; Sakaguchi, Shohei; Suzuki, Takahiro; Do, Mai-Khoi Q; Mizunoya, Wataru; Nakamura, Mako; Sato, Yusuke; Furuse, Mitsuhiro; Yamada, Koji; Ikeuchi, Yoshihide; Tatsumi, Ryuichi

    2013-11-01

    Muscle damage induces massive macrophage infiltration of the injury site, in which activated pro-inflammatory and anti-inflammatory phenotypes (currently classified as M1 and M2, respectively) have been documented as distinct functional populations predominant at different times after the conventional acute injury by intramuscular injection of snake venoms (cardiotoxin, notexin) or chemicals (bupivacaine hydrochloride, barium chloride). The present study employed a muscle-crush injury model that may better reflect the physiologic damage and repair processes initiated by contusing a gastrocnemius muscle in the lower hind-limb of adult mice with hemostat forceps, and examined the time-course invasion of M1 and M2 macrophages during muscle regeneration by immunocytochemistry of CD197 and CD206 marker proteins. CD197-positive M1 macrophages were observed exclusively at 1-4 days after crush followed by the alternative prevalence of CD206-positive M2 at 7 days of myogenic differentiation, characterized by increasing levels of myogenin messenger RNA expression. Preliminary PCR analysis showed that M2 may produce hepatocyte growth factor (HGF) in culture, providing additional benefit to understanding that M2 populations actively promote regenerative myogenesis (muscle fiber repair) and moto-neuritogenesis (re-attachment of motoneuron terminals onto damaged fibers) through their time-specific infiltration and release of growth factor at the injury site early in muscle regeneration. © 2013 Japanese Society of Animal Science.

  16. Environmental friendly crush-magnetic separation technology for recycling metal-plated plastics from end-of-life vehicles.

    PubMed

    Xue, Mianqiang; Li, Jia; Xu, Zhenming

    2012-03-06

    Metal-plated plastics (MPP), which are important from the standpoint of aesthetics or even performance, are increasingly employed in a wide variety of situations in the automotive industry. Serious environmental problems will be caused if they are not treated appropriately. Therefore, recycling of MPP is an important subject not only for resource recycling but also for environmental protection. This work represents a novel attempt to deal with the MPP. A self-designed hammer crusher was used to liberate coatings from the plastic substrate. The size distribution of particles was analyzed and described by the Rosin-Rammler function model. The optimum retaining time of materials in the crusher is 3 min. By this time, the liberation rate of the materials can reach 87.3%. When the density of the suspension is 31,250 g/m(3), the performance of liberation is the best. Two-step magnetic separation was adopted to avoid excessive crushing and to guarantee the quality of products. Concerning both the separation efficiency and grade of products, the optimum rotational speed of the magnetic separator is 50-70 rpm. On the basis of the above studies about the liberating and separating behavior of the materials, a continuous recycling system (the technology of crush-magnetic separation) is developed. This recycling system provides a feasible method for recycling MPP efficiently, economically, and environmentally.

  17. (-)-Epigallocatechin-3-Gallate Modulates Spinal Cord Neuronal Degeneration by Enhancing Growth-Associated Protein 43, B-Cell Lymphoma 2, and Decreasing B-Cell Lymphoma 2-Associated X Protein Expression after Sciatic Nerve Crush Injury

    PubMed Central

    Al-Maghrebi, May; Rao, Muddanna S.; Khraishah, Haitham

    2015-01-01

    Abstract Our previous studies have established that (-)-epigallocatechin-3-gallate (EGCG) has both neuroprotective and -regenerative capacity after sciatic nerve injury. Moreover, this improvement was evident on the behavioral level. The aim of this study was to investigate the central effects of ECGC on spinal cord motor neurons after sciatic nerve injury. Our study showed that administering 50 mg/kg intraperitoneally i.p. of EGCG to sciatic nerve-injured rats improved their performance on different motor functions and mechanical hyperesthesia neurobehavioral tests. Histological analysis of spinal cords of EGCG-treated sciatic nerve-injured (CRUSH+ECGC) animals showed an increase in the number of neurons in the anterior horn, when compared to the naïve, sham, and saline-treated sciatic nerve-injured (CRUSH) control groups. Additionally, immunohistochemical study of spinal cord sections revealed that EGCG reduced the expression of glial fibrillary acidic protein and increased the expression of growth-associated protein 43, a marker of regenerating axons. Finally, EGCG reduced the ratio of B-cell lymphoma 2 (Bcl-2)-associated X protein/Bcl-2 and increased the expression of survivin gene. This study may shed some light on the future clinical use of EGCG and its constituents in the treatment of peripheral nerve injury. PMID:25025489

  18. Study on characteristics of printed circuit board liberation and its crushed products.

    PubMed

    Quan, Cui; Li, Aimin; Gao, Ningbo

    2012-11-01

    Recycling printed circuit board waste (PCBW) waste is a hot issue of environmental protection and resource recycling. Mechanical and thermo-chemical methods are two traditional recycling processes for PCBW. In the present research, a two-step crushing process combined with a coarse-crushing step and a fine-pulverizing step was adopted, and then the crushed products were classified into seven different fractions with a standard sieve. The liberation situation and particle shape in different size fractions were observed. Properties of different size fractions, such as heating value, thermogravimetric, proximate, ultimate and chemical analysis were determined. The Rosin-Rammler model was applied to analyze the particle size distribution of crushed material. The results indicated that complete liberation of metals from the PCBW was achieved at a size less than 0.59 mm, but the nonmetal particle in the smaller-than-0.15 mm fraction is liable to aggregate. Copper was the most prominent metal in PCBW and mainly enriched in the 0.42-0.25 mm particle size. The Rosin-Rammler equation adequately fit particle size distribution data of crushed PCBW with a correlation coefficient of 0.9810. The results of heating value and proximate analysis revealed that the PCBW had a low heating value and high ash content. The combustion and pyrolysis process of PCBW was different and there was an obvious oxidation peak of Cu in combustion runs.

  19. Scaling of energy absorbing composite plates

    NASA Technical Reports Server (NTRS)

    Jackson, Karen; Morton, John; Traffanstedt, Catherine; Boitnott, Richard

    1992-01-01

    The energy absorption response and crushing characteristics of geometrically scaled graphite-Kevlar epoxy composite plates were investigated. Three different trigger mechanisms including chamfer, notch, and steeple geometries were incorporated into the plate specimens to initiate crushing. Sustained crushing was achieved with a simple test fixture which provided lateral support to prevent global buckling. Values of specific sustained crushing stress (SSCS) were obtained which were comparable to values reported for tube specimens from previously published data. Two sizes of hybrid plates were fabricated; a baseline or model plate, and a full-scale plate with in-plane dimensions scaled by a factor of two. The thickness dimension of the full-scale plates was increased using two different techniques; the ply-level method in which each ply orientation in the baseline laminate stacking sequence is doubled, and the sublaminate technique in which the baseline laminate stacking sequence is repeated as a group. Results indicated that the SSCS is independent of trigger mechanism geometry. However, a reduction in the SSCS of 10-25 percent was observed for the full-scale plates as compared with the baseline specimens, indicating a scaling effect in the crushing response.

  20. Scaling of energy absorbing composite plates

    NASA Technical Reports Server (NTRS)

    Jackson, Karen; Lavoie, J. Andre; Morton, John

    1994-01-01

    The energy absorption response and crushing characteristics of geometrically scaled graphite-Kevlar epoxy composite plates were investigated. Two different trigger mechanisms including notch, and steeple geometries were incorporated into the plate specimens to initiate crushing. Sustained crushing was achieved with a new test fixture which provided lateral support to prevent global buckling. Values of specific sustained crushing stress (SSCS) were obtained which were lower than values reported for tube specimens from previously published data. Two sizes of hybrid plates were fabricated; a baseline or model plate, and a full-scale plate with inplane dimensions scaled by a factor of two. The thickness dimension of the full-scale plates was increased using two different techniques: the ply-level method in which each ply orientation in the baseline laminate stacking sequence is doubled, and the sublaminate technique in which the baseline laminate stacking sequence is repeated as a group. Results indicated that the SSCS has a small dependence on trigger mechanism geometry. However, a reduction in the SSCS of 10-25% was observed for the full-scale plates as compared with the baseline specimens, indicating a scaling effect in the crushing response.

  1. Scaling of energy absorbing composite plates

    NASA Astrophysics Data System (ADS)

    Jackson, Karen; Morton, John; Traffanstedt, Catherine; Boitnott, Richard

    The energy absorption response and crushing characteristics of geometrically scaled graphite-Kevlar epoxy composite plates were investigated. Three different trigger mechanisms including chamfer, notch, and steeple geometries were incorporated into the plate specimens to initiate crushing. Sustained crushing was achieved with a simple test fixture which provided lateral support to prevent global buckling. Values of specific sustained crushing stress (SSCS) were obtained which were comparable to values reported for tube specimens from previously published data. Two sizes of hybrid plates were fabricated; a baseline or model plate, and a full-scale plate with in-plane dimensions scaled by a factor of two. The thickness dimension of the full-scale plates was increased using two different techniques; the ply-level method in which each ply orientation in the baseline laminate stacking sequence is doubled, and the sublaminate technique in which the baseline laminate stacking sequence is repeated as a group. Results indicated that the SSCS is independent of trigger mechanism geometry. However, a reduction in the SSCS of 10-25 percent was observed for the full-scale plates as compared with the baseline specimens, indicating a scaling effect in the crushing response.

  2. Pathological changes in the thyroid gland in crush asphyxia.

    PubMed

    Byard, Roger W

    2013-12-01

    To determine whether crush asphyxia may be associated with macro- and microscopic changes in the thyroid gland, four cases of death due to crush asphyxia were evaluated where the decedents (males aged 36, 37, 45, and 65 years respectively) suffered lethal chest compressions. The diagnosis of crush asphyxia in each case was suggested by the death scene description and confirmed by the finding of injuries to the torso, with marked congestion of the face, neck, and upper body associated with petechial and subconjunctival hemorrhages. In addition to other pathological findings, each decedent had intense congestion of their thyroid gland resulting in a dark/black appearance. Microscopically, stromal capillaries were engorged, with bulging of capillaries into the follicles. Rupture of these small vessels had created focal intrafollicular aggregates of erythrocytes within the colloid. As intense suffusion of the thyroid gland with blood in cases of crush asphyxia may impart an appearance of "black thyroid" this may be another feature of this condition to look for at autopsy, in addition to intrafollicular blood lakes on histology.

  3. Direct 40Ar/39Ar age determination of fluid inclusions using in-vacuo¬ stepwise crushing - Example of garnet from the Cycladic Blueschist Unit on Syros

    NASA Astrophysics Data System (ADS)

    Uunk, Bertram; Postma, Onno; Wijbrans, Jan; Brouwer, Fraukje

    2017-04-01

    Metamorphic minerals and veins commonly trap attending hydrous fluids in fluid inclusions, which yield a wealth of information on the history of the hosting metamorphic system. When these fluids are sufficiently saline, the KCl in the inclusions can be used as a K/Ar geochronologic system, potentially dating inclusion incorporation. Whilst primary fluid inclusions (PFIs) can date fluid incorporation during mineral or vein growth, secondary fluid inclusion trails (SFIs) can provide age constraints on later fluid flow events. At VU Amsterdam, a new in-vacuo crushing apparatus has been designed to extract fluid inclusions from minerals for 40Ar/39Ar analysis. Separates are crushed inside a crusher tube connected to a purification line and a quadrupole mass spectrometer. In-vacuo crushing is achieved by lifting and dropping a steel pestle using an externally controlled magnetic field. As the gas can be analyzed between different crushing steps, the setup permits stepwise crushing experiments. Additionally, crushed powder can be heated by inserting the crusher tube in an externally controlled furnace. Dating by 40Ar/39Ar stepwise crushing has the added advantage that, during neutron irradiation to produce 39Ar from 39K, 38Ar and 37Ar are also produced from 38Cl and 40Ca, respectively. Simultaneous analysis of these argon isotopes permits constraining the chemistry of the argon source sampled during the experiment. This allows a distinction between different fluid or crystal lattice sources. Garnet from three samples of the HP metamorphic Cycladic Blueschist Unit on Syros, Greece was stepwise crushed to obtain fluid inclusion ages. Initial steps for all three experiments yield significant components of excess argon, which are interpreted to originate from grain boundary fluids and secondary fluid inclusions trails. During subsequent steps, age results stabilize to a plateau age. One garnet from North Syros yields an unusually old 80 Ma plateau age. However, isochrons indicate the presence of excess argon in the PFIs and isochron ages overlap with other isotopic constraints on the age of garnet growth during eclogite metamorphism (55-50 Ma) in the underlying metabasite. Garnet from two samples from the center of Syros yields younger ages overlapping with greenschist overprinting (25-30 Ma). Further studies will indicate whether these younger ages reflect a young garnet growth age or a young fluid flow event affecting older garnet crystals. The stepwise crushing and heating approach shows to be effective in dating fluid inclusions in natural mineral systems. As many metamorphic processes occur under influence or in the presence of fluids, this method should greatly expand our possibilities to date crustal processes.

  4. Hybrid fluidized bed combuster

    DOEpatents

    Kantesaria, Prabhudas P.; Matthews, Francis T.

    1982-01-01

    A first atmospheric bubbling fluidized bed furnace is combined with a second turbulent, circulating fluidized bed furnace to produce heat efficiently from crushed solid fuel. The bed of the second furnace receives the smaller sizes of crushed solid fuel, unreacted limestone from the first bed, and elutriated solids extracted from the flu gases of the first bed. The two-stage combustion of crushed solid fuel provides a system with an efficiency greater than available with use of a single furnace of a fluidized bed.

  5. Running Clubs--A Combinatorial Investigation.

    ERIC Educational Resources Information Center

    Nissen, Phillip; Taylor, John

    1991-01-01

    Presented is a combinatorial problem based on the Hash House Harriers rule which states that the route of the run should not have previously been traversed by the club. Discovered is how many weeks the club can meet before the rule has to be broken. (KR)

  6. Publications - SR 59 | Alaska Division of Geological & Geophysical Surveys

    Science.gov Websites

    Peninsula; Alaska, State of; Antimony; Arsenic; Arsenopyrite; Barite; Base Metals; Big Delta; Bismuth Materials; Copper; Core Drilling; Council; Crushed Gravel; Crushed Rock; Delta Junction; Diamond Drilling

  7. Deficiency in Monocarboxylate Transporter 1 (MCT1) in Mice Delays Regeneration of Peripheral Nerves following Sciatic Nerve Crush

    PubMed Central

    Morrison, Brett M.; Tsingalia, Akivaga; Vidensky, Svetlana; Lee, Youngjin; Jin, Lin; Farah, Mohamed H.; Lengacher, Sylvain; Magistretti, Pierre J.; Pellerin, Luc; Rothstein, Jeffrey D.

    2014-01-01

    Peripheral nerve regeneration following injury occurs spontaneously, but many of the processes require metabolic energy. The mechanism of energy supply to axons has not previously been determined. In the central nervous system, monocarboxylate transporter 1 (MCT1), expressed in oligodendroglia, is critical for supplying lactate or other energy metabolites to axons. In the current study, MCT1 is shown to localize within the peripheral nervous system to perineurial cells, dorsal root ganglion neurons, and Schwann cells by MCT1 immunofluorescence and MCT1 tdTomato BAC reporter mice. To investigate whether MCT1 is necessary for peripheral nerve regeneration, sciatic nerves in MCT1 heterozygous null mice are crushed and peripheral nerve regeneration quantified electrophysiologically and anatomically. Compound muscle action potential (CMAP) recovery is delayed from a median of 21 days in wild-type mice to greater than 38 days in MCT1 heterozygote null mice. In fact, half of the MCT1 heterozygote null mice have no recovery of CMAP at 42 days, while all of the wild-type mice recovered. In addition, muscle fibers remain 40% more atrophic and neuromuscular junctions 40% more denervated at 42 days post-crush in the MCT1 heterozygote null mice than wild-type mice. The delay in nerve regeneration is not only in motor axons, as the number of regenerated axons in the sural sensory nerve of MCT1 heterozygote null mice at 4 weeks and tibial mixed sensory and motor nerve at 3 weeks is also significantly reduced compared to wild-type mice. This delay in regeneration may be partly through failed Schwann cell function, as there is reduced early phagocytosis of myelin debris and remyelination of axon segments. These data for the first time demonstrate that MCT1 is critical for regeneration of both sensory and motor axons in mice following sciatic nerve crush. PMID:25447940

  8. Deficiency in monocarboxylate transporter 1 (MCT1) in mice delays regeneration of peripheral nerves following sciatic nerve crush.

    PubMed

    Morrison, Brett M; Tsingalia, Akivaga; Vidensky, Svetlana; Lee, Youngjin; Jin, Lin; Farah, Mohamed H; Lengacher, Sylvain; Magistretti, Pierre J; Pellerin, Luc; Rothstein, Jeffrey D

    2015-01-01

    Peripheral nerve regeneration following injury occurs spontaneously, but many of the processes require metabolic energy. The mechanism of energy supply to axons has not previously been determined. In the central nervous system, monocarboxylate transporter 1 (MCT1), expressed in oligodendroglia, is critical for supplying lactate or other energy metabolites to axons. In the current study, MCT1 is shown to localize within the peripheral nervous system to perineurial cells, dorsal root ganglion neurons, and Schwann cells by MCT1 immunofluorescence in wild-type mice and tdTomato fluorescence in MCT1 BAC reporter mice. To investigate whether MCT1 is necessary for peripheral nerve regeneration, sciatic nerves of MCT1 heterozygous null mice are crushed and peripheral nerve regeneration was quantified electrophysiologically and anatomically. Compound muscle action potential (CMAP) recovery is delayed from a median of 21 days in wild-type mice to greater than 38 days in MCT1 heterozygote null mice. In fact, half of the MCT1 heterozygote null mice have no recovery of CMAP at 42 days, while all of the wild-type mice recovered. In addition, muscle fibers remain 40% more atrophic and neuromuscular junctions 40% more denervated at 42 days post-crush in the MCT1 heterozygote null mice than wild-type mice. The delay in nerve regeneration is not only in motor axons, as the number of regenerated axons in the sural sensory nerve of MCT1 heterozygote null mice at 4 weeks and tibial mixed sensory and motor nerve at 3 weeks is also significantly reduced compared to wild-type mice. This delay in regeneration may be partly due to failed Schwann cell function, as there is reduced early phagocytosis of myelin debris and remyelination of axon segments. These data for the first time demonstrate that MCT1 is critical for regeneration of both sensory and motor axons in mice following sciatic nerve crush. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. InChIKey collision resistance: an experimental testing

    PubMed Central

    2012-01-01

    InChIKey is a 27-character compacted (hashed) version of InChI which is intended for Internet and database searching/indexing and is based on an SHA-256 hash of the InChI character string. The first block of InChIKey encodes molecular skeleton while the second block represents various kinds of isomerism (stereo, tautomeric, etc.). InChIKey is designed to be a nearly unique substitute for the parent InChI. However, a single InChIKey may occasionally map to two or more InChI strings (collision). The appearance of collision itself does not compromise the signature as collision-free hashing is impossible; the only viable approach is to set and keep a reasonable level of collision resistance which is sufficient for typical applications. We tested, in computational experiments, how well the real-life InChIKey collision resistance corresponds to the theoretical estimates expected by design. For this purpose, we analyzed the statistical characteristics of InChIKey for datasets of variable size in comparison to the theoretical statistical frequencies. For the relatively short second block, an exhaustive direct testing was performed. We computed and compared to theory the numbers of collisions for the stereoisomers of Spongistatin I (using the whole set of 67,108,864 isomers and its subsets). For the longer first block, we generated, using custom-made software, InChIKeys for more than 3 × 1010 chemical structures. The statistical behavior of this block was tested by comparison of experimental and theoretical frequencies for the various four-letter sequences which may appear in the first block body. From the results of our computational experiments we conclude that the observed characteristics of InChIKey collision resistance are in good agreement with theoretical expectations. PMID:23256896

  10. InChIKey collision resistance: an experimental testing.

    PubMed

    Pletnev, Igor; Erin, Andrey; McNaught, Alan; Blinov, Kirill; Tchekhovskoi, Dmitrii; Heller, Steve

    2012-12-20

    InChIKey is a 27-character compacted (hashed) version of InChI which is intended for Internet and database searching/indexing and is based on an SHA-256 hash of the InChI character string. The first block of InChIKey encodes molecular skeleton while the second block represents various kinds of isomerism (stereo, tautomeric, etc.). InChIKey is designed to be a nearly unique substitute for the parent InChI. However, a single InChIKey may occasionally map to two or more InChI strings (collision). The appearance of collision itself does not compromise the signature as collision-free hashing is impossible; the only viable approach is to set and keep a reasonable level of collision resistance which is sufficient for typical applications.We tested, in computational experiments, how well the real-life InChIKey collision resistance corresponds to the theoretical estimates expected by design. For this purpose, we analyzed the statistical characteristics of InChIKey for datasets of variable size in comparison to the theoretical statistical frequencies. For the relatively short second block, an exhaustive direct testing was performed. We computed and compared to theory the numbers of collisions for the stereoisomers of Spongistatin I (using the whole set of 67,108,864 isomers and its subsets). For the longer first block, we generated, using custom-made software, InChIKeys for more than 3 × 1010 chemical structures. The statistical behavior of this block was tested by comparison of experimental and theoretical frequencies for the various four-letter sequences which may appear in the first block body.From the results of our computational experiments we conclude that the observed characteristics of InChIKey collision resistance are in good agreement with theoretical expectations.

  11. Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis.

    PubMed

    Lee, Junghye; Sun, Jimeng; Wang, Fei; Wang, Shuang; Jun, Chi-Hyuck; Jiang, Xiaoqian

    2018-04-13

    There is an urgent need for the development of global analytic frameworks that can perform analyses in a privacy-preserving federated environment across multiple institutions without privacy leakage. A few studies on the topic of federated medical analysis have been conducted recently with the focus on several algorithms. However, none of them have solved similar patient matching, which is useful for applications such as cohort construction for cross-institution observational studies, disease surveillance, and clinical trials recruitment. The aim of this study was to present a privacy-preserving platform in a federated setting for patient similarity learning across institutions. Without sharing patient-level information, our model can find similar patients from one hospital to another. We proposed a federated patient hashing framework and developed a novel algorithm to learn context-specific hash codes to represent patients across institutions. The similarities between patients can be efficiently computed using the resulting hash codes of corresponding patients. To avoid security attack from reverse engineering on the model, we applied homomorphic encryption to patient similarity search in a federated setting. We used sequential medical events extracted from the Multiparameter Intelligent Monitoring in Intensive Care-III database to evaluate the proposed algorithm in predicting the incidence of five diseases independently. Our algorithm achieved averaged area under the curves of 0.9154 and 0.8012 with balanced and imbalanced data, respectively, in κ-nearest neighbor with κ=3. We also confirmed privacy preservation in similarity search by using homomorphic encryption. The proposed algorithm can help search similar patients across institutions effectively to support federated data analysis in a privacy-preserving manner. ©Junghye Lee, Jimeng Sun, Fei Wang, Shuang Wang, Chi-Hyuck Jun, Xiaoqian Jiang. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 13.04.2018.

  12. UQlust: combining profile hashing with linear-time ranking for efficient clustering and analysis of big macromolecular data.

    PubMed

    Adamczak, Rafal; Meller, Jarek

    2016-12-28

    Advances in computing have enabled current protein and RNA structure prediction and molecular simulation methods to dramatically increase their sampling of conformational spaces. The quickly growing number of experimentally resolved structures, and databases such as the Protein Data Bank, also implies large scale structural similarity analyses to retrieve and classify macromolecular data. Consequently, the computational cost of structure comparison and clustering for large sets of macromolecular structures has become a bottleneck that necessitates further algorithmic improvements and development of efficient software solutions. uQlust is a versatile and easy-to-use tool for ultrafast ranking and clustering of macromolecular structures. uQlust makes use of structural profiles of proteins and nucleic acids, while combining a linear-time algorithm for implicit comparison of all pairs of models with profile hashing to enable efficient clustering of large data sets with a low memory footprint. In addition to ranking and clustering of large sets of models of the same protein or RNA molecule, uQlust can also be used in conjunction with fragment-based profiles in order to cluster structures of arbitrary length. For example, hierarchical clustering of the entire PDB using profile hashing can be performed on a typical laptop, thus opening an avenue for structural explorations previously limited to dedicated resources. The uQlust package is freely available under the GNU General Public License at https://github.com/uQlust . uQlust represents a drastic reduction in the computational complexity and memory requirements with respect to existing clustering and model quality assessment methods for macromolecular structure analysis, while yielding results on par with traditional approaches for both proteins and RNAs.

  13. Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis

    PubMed Central

    Sun, Jimeng; Wang, Fei; Wang, Shuang; Jun, Chi-Hyuck; Jiang, Xiaoqian

    2018-01-01

    Background There is an urgent need for the development of global analytic frameworks that can perform analyses in a privacy-preserving federated environment across multiple institutions without privacy leakage. A few studies on the topic of federated medical analysis have been conducted recently with the focus on several algorithms. However, none of them have solved similar patient matching, which is useful for applications such as cohort construction for cross-institution observational studies, disease surveillance, and clinical trials recruitment. Objective The aim of this study was to present a privacy-preserving platform in a federated setting for patient similarity learning across institutions. Without sharing patient-level information, our model can find similar patients from one hospital to another. Methods We proposed a federated patient hashing framework and developed a novel algorithm to learn context-specific hash codes to represent patients across institutions. The similarities between patients can be efficiently computed using the resulting hash codes of corresponding patients. To avoid security attack from reverse engineering on the model, we applied homomorphic encryption to patient similarity search in a federated setting. Results We used sequential medical events extracted from the Multiparameter Intelligent Monitoring in Intensive Care-III database to evaluate the proposed algorithm in predicting the incidence of five diseases independently. Our algorithm achieved averaged area under the curves of 0.9154 and 0.8012 with balanced and imbalanced data, respectively, in κ-nearest neighbor with κ=3. We also confirmed privacy preservation in similarity search by using homomorphic encryption. Conclusions The proposed algorithm can help search similar patients across institutions effectively to support federated data analysis in a privacy-preserving manner. PMID:29653917

  14. Matching Aerial Images to 3D Building Models Using Context-Based Geometric Hashing

    PubMed Central

    Jung, Jaewook; Sohn, Gunho; Bang, Kiin; Wichmann, Andreas; Armenakis, Costas; Kada, Martin

    2016-01-01

    A city is a dynamic entity, which environment is continuously changing over time. Accordingly, its virtual city models also need to be regularly updated to support accurate model-based decisions for various applications, including urban planning, emergency response and autonomous navigation. A concept of continuous city modeling is to progressively reconstruct city models by accommodating their changes recognized in spatio-temporal domain, while preserving unchanged structures. A first critical step for continuous city modeling is to coherently register remotely sensed data taken at different epochs with existing building models. This paper presents a new model-to-image registration method using a context-based geometric hashing (CGH) method to align a single image with existing 3D building models. This model-to-image registration process consists of three steps: (1) feature extraction; (2) similarity measure; and matching, and (3) estimating exterior orientation parameters (EOPs) of a single image. For feature extraction, we propose two types of matching cues: edged corner features representing the saliency of building corner points with associated edges, and contextual relations among the edged corner features within an individual roof. A set of matched corners are found with given proximity measure through geometric hashing, and optimal matches are then finally determined by maximizing the matching cost encoding contextual similarity between matching candidates. Final matched corners are used for adjusting EOPs of the single airborne image by the least square method based on collinearity equations. The result shows that acceptable accuracy of EOPs of a single image can be achievable using the proposed registration approach as an alternative to a labor-intensive manual registration process. PMID:27338410

  15. Fault tree analysis of failure cause of crushing plant and mixing bed hall at Khoy cement factory in Iran☆

    PubMed Central

    Nouri.Gharahasanlou, Ali; Mokhtarei, Ashkan; Khodayarei, Aliasqar; Ataei, Mohammad

    2014-01-01

    Evaluating and analyzing the risk in the mining industry is a new approach for improving the machinery performance. Reliability, safety, and maintenance management based on the risk analysis can enhance the overall availability and utilization of the mining technological systems. This study investigates the failure occurrence probability of the crushing and mixing bed hall department at Azarabadegan Khoy cement plant by using fault tree analysis (FTA) method. The results of the analysis in 200 h operating interval show that the probability of failure occurrence for crushing, conveyor systems, crushing and mixing bed hall department is 73, 64, and 95 percent respectively and the conveyor belt subsystem found as the most probable system for failure. Finally, maintenance as a method of control and prevent the occurrence of failure is proposed. PMID:26779433

  16. Characteristics of crushed rocks observed in drilled cores in landslide bodies located in accretionary complexes

    NASA Astrophysics Data System (ADS)

    Wakizaka, Yasuhiko

    2013-10-01

    The recent development of high-quality boring, which uses foam surfactants, has made it possible to examine the detailed geological constitution and structure of landslide bodies. However, geological information related to landslides has not been obtained appropriately even from undisturbed high-quality drilled cores. Moreover, it has been difficult to distinguish between rocks crushed by landslide movement and the fault breccia in accretionary complexes. We examined the detailed geology of high-quality drilled cores of landslide bodies on the Shimanto Belt and the Chichibu Belt. The fault breccia near the landslide bodies was found to exhibit planar fabrics while the crushed breccias in the landslide bodies showed a random fabric. We discovered that classifying the degree of crushing and inspecting the planar fabrics of rocks are effective in the geological determination of landslide bodies.

  17. Fault tree analysis of failure cause of crushing plant and mixing bed hall at Khoy cement factory in Iran.

    PubMed

    Nouri Gharahasanlou, Ali; Mokhtarei, Ashkan; Khodayarei, Aliasqar; Ataei, Mohammad

    2014-04-01

    Evaluating and analyzing the risk in the mining industry is a new approach for improving the machinery performance. Reliability, safety, and maintenance management based on the risk analysis can enhance the overall availability and utilization of the mining technological systems. This study investigates the failure occurrence probability of the crushing and mixing bed hall department at Azarabadegan Khoy cement plant by using fault tree analysis (FTA) method. The results of the analysis in 200 h operating interval show that the probability of failure occurrence for crushing, conveyor systems, crushing and mixing bed hall department is 73, 64, and 95 percent respectively and the conveyor belt subsystem found as the most probable system for failure. Finally, maintenance as a method of control and prevent the occurrence of failure is proposed.

  18. Torrefaction of Yacon and Jerusalem Artichoke Stems as a Contribution to the Alternative Production of Inulin

    NASA Astrophysics Data System (ADS)

    Veselý, V.; Sobek, J.; Hanika, J.; Punčochář, M.

    Recommendable torrefaction conditions were specified on the grounds of GT and DTA curves for the specimen of crushed stems of Yacon and Jerusalem artichoke. The impact of the size of crushed stems particle on the torrefaction process was monitored. The stem crushing process was optimized based on the results. We tested the effect of torrefaction performed on pellets made of raw material and wood chips, of which the pellets were made afterwards. It has been unambiguously proven that it was sensible to pelletize torrefied chips, otherwise the pellets were losing their coherence and crumbled. We calculated the fuel calorific value and its dependence on the residence time in the reactor. The economic benefit of torrefaction is that the power necessary for evaporation and leaching artichoke cuttings in water is obtained by combusting torrefied crushed stems.

  19. Anti-cyanobacterial activity of Moringa oleifera seeds

    PubMed Central

    Beekman, Wendy

    2009-01-01

    Filtrates from crushed Moringa oleifera seeds were tested for their effects on growth and Photosystem II efficiency of the common bloom-forming cyanobacterium Microcystis aeruginosa. M. aeruginosa populations exhibited good growth in controls and treatments with 4- and 8-mg crushed Moringa seeds per liter, having similar growth rates of 0.50 (±0.01) per day. In exposures of 20- to 160-mg crushed Moringa seeds L−1, growth rates were negative and on average −0.23 (±0.05) .day−1. Presumably, in the higher doses of 20- to 160-mg crushed seeds per liter, the cyanobacteria died, which was supported by a rapid drop in the Photosystem II efficiency (ΦPSII), while the ΦPSII was high and unaffected in 0, 4, and 8 mg L−1. High-density populations of M. aeruginosa (chlorophyll-a concentrations of ∼270 µg L−1) were reduced to very low levels within 2 weeks of exposure to ≥80-mg crushed seeds per liter. At the highest dosage of 160 mg L−1, the ΦPSII dropped to zero rapidly and remained nil during the course of the experiment (14 days). Hence, under laboratory conditions, a complete wipeout of the bloom could be achieved. This is the first study that yielded evidence for cyanobactericidal activity of filtrate from crushed Moringa seeds, suggesting that Moringa seed extracts might have a potential as an effect-oriented measure lessening cyanobacterial nuisance. PMID:20676212

  20. A Pharmacokinetic Study Comparing Eslicarbazepine Acetate Administered Orally as a Crushed or Intact Tablet in Healthy Volunteers.

    PubMed

    Sunkaraneni, Soujanya; Kharidia, Jahnavi; Schutz, Ralph; Blum, David; Cheng, Hailong

    2016-07-01

    The relative bioequivalence of crushed versus intact eslicarbazepine acetate (ESL) tablets (800 mg) administered orally in healthy adults was evaluated in an open-label, randomized, 2-period crossover study with a 5-day washout between treatments. Sample blood levels of eslicarbazepine and (R)-licarbazepine were determined; pharmacokinetic parameters were derived for eslicarbazepine. Bioequivalence was established if the 90% confidence intervals (CIs) for the geometric mean treatment ratios of eslicarbazepine AUC(0-∞) and Cmax were within the prespecified 80%-125% range. Twenty-seven subjects in the intent-to-treat population (n = 28) completed both treatment periods. Eslicarbazepine exposure measures were similar for crushed versus intact ESL tablets: average Cmax , 11 700 versus 11 500 ng/mL; AUC(0-∞) , 225 000 versus 234 000 ng·h/mL; AUC(0-last) , 222 000 versus 231 000 ng·h/mL, respectively. Geometric least squares mean ratios (90%CIs) comparing eslicarbazepine exposure measures were within the 80%-125% range (Cmax , 102.63% [97.07%-108.51%]; AUC(0-∞) , 96.72% [94.36%-99.13%]; AUC0-last , 96.69% [94.24%-99.21%]). In conclusion, ESL administered orally as a crushed tablet sprinkled on applesauce, or intact were bioequivalent in healthy subjects. Eslicarbazepine bioavailability was not significantly altered by crushing, indicating that ESL tablets can be administered intact or crushed. © 2016, The American College of Clinical Pharmacology.

  1. Intranasal Pharmacokinetics of Morphine ARER, a Novel Abuse-Deterrent Formulation: Results from a Randomized, Double-Blind, Four-Way Crossover Study in Nondependent, Opioid-Experienced Subjects

    PubMed Central

    Pantaleon, Carmela; Iverson, Matthew; Smith, Michael D.; Kinzler, Eric R.; Aigner, Stefan

    2018-01-01

    Objective To investigate the pharmacokinetics (PK) of Morphine ARER, an extended-release (ER), abuse-deterrent formulation of morphine sulfate after oral and intranasal administration. Methods This randomized, double-blind, double-dummy, placebo-controlled, four-way crossover study assessed the PK of morphine and its active metabolite, M6G, from crushed intranasal Morphine ARER and intact oral Morphine ARER compared with crushed intranasal ER morphine following administration to nondependent, recreational opioid users. The correlation between morphine PK and the pharmacodynamic parameter of drug liking, a measure of abuse potential, was also evaluated. Results Mean maximum observed plasma concentration (Cmax) for morphine was lower with crushed intranasal Morphine ARER (26.2 ng/mL) and intact oral Morphine ARER (18.6 ng/mL), compared with crushed intranasal ER morphine (49.5 ng/mL). The time to Cmax (Tmax) was the same for intact oral and crushed intranasal Morphine ARER (1.6 hours) and longer for crushed intranasal morphine ER (1.1 hours). Higher mean maximum morphine Cmax, Tmax, and abuse quotient (Cmax/Tmax) were positively correlated with maximum effect for drug liking (R2 ≥ 0.9795). Conclusion These data suggest that Morphine ARER maintains its ER profile despite physical manipulation and intranasal administration, which may be predictive of a lower intranasal abuse potential compared with ER morphine.

  2. Phenomena of Foamed Concrete under Rolling of Aircraft Wheels

    NASA Astrophysics Data System (ADS)

    Jiang, Chun-shui; Yao, Hong-yu; Xiao, Xian-bo; Kong, Xiang-jun; Shi, Ya-jie

    2014-04-01

    Engineered Material Arresting System (EMAS) is an effective technique to reduce hazards associated with aircraft overrunning runway. In order to ascertain phenomena of the foamed concrete used for EMAS under rolling of aircraft wheel, a specially designed experimental setup was built which employed Boeing 737 aircraft wheels bearing actual vertical loads to roll through the foamed concrete. A number of experiments were conducted upon this setup. It is discovered that the wheel rolls the concrete in a pure rolling manner and crushes the concrete downwards, instead of crushing it forward, as long as the concrete is not higher than the wheel axle. The concrete is compressed into powder in-situ by the wheel and then is brought to bottom of the wheel. The powder under the wheel is loose and thus is not able to sustain wheel braking. It is also found that after being rolled by the wheel the concrete exhibits either of two states, i.e. either 'crushed through' whole thickness of the concrete or 'crushed halfway', depending on combination of strength of the concrete, thickness of the concrete, vertical load the wheel carries, tire dimension and tire pressure. A new EMAS design concept is developed that if an EMAS design results in the 'crushed through' state for the main gears while the 'crushed halfway' state for the nose gear, the arresting bed would be optimal to accommodate the large difference in strength between the nose gear and the main gear of an aircraft.

  3. Double Kissing Crush Versus Provisional Stenting for Left Main Distal Bifurcation Lesions: DKCRUSH-V Randomized Trial.

    PubMed

    Chen, Shao-Liang; Zhang, Jue-Jie; Han, Yaling; Kan, Jing; Chen, Lianglong; Qiu, Chunguang; Jiang, Tiemin; Tao, Ling; Zeng, Hesong; Li, Li; Xia, Yong; Gao, Chuanyu; Santoso, Teguh; Paiboon, Chootopol; Wang, Yan; Kwan, Tak W; Ye, Fei; Tian, Nailiang; Liu, Zhizhong; Lin, Song; Lu, Chengzhi; Wen, Shangyu; Hong, Lang; Zhang, Qi; Sheiban, Imad; Xu, Yawei; Wang, Lefeng; Rab, Tanveer S; Li, Zhanquan; Cheng, Guanchang; Cui, Lianqun; Leon, Martin B; Stone, Gregg W

    2017-11-28

    Provisional stenting (PS) is the most common technique used to treat distal left main (LM) bifurcation lesions in patients with unprotected LM coronary artery disease undergoing percutaneous coronary intervention. The double kissing (DK) crush planned 2-stent technique has been shown to improve clinical outcomes in non-LM bifurcations compared with PS, and in LM bifurcations compared with culotte stenting, but has never been compared with PS in LM bifurcation lesions. The authors sought to determine whether a planned DK crush 2-stent technique is superior to PS for patients with true distal LM bifurcation lesions. The authors randomized 482 patients from 26 centers in 5 countries with true distal LM bifurcation lesions (Medina 1,1,1 or 0,1,1) to PS (n = 242) or DK crush stenting (n = 240). The primary endpoint was the 1-year composite rate of target lesion failure (TLF): cardiac death, target vessel myocardial infarction, or clinically driven target lesion revascularization. Routine 13-month angiographic follow-up was scheduled after ascertainment of the primary endpoint. TLF within 1 year occurred in 26 patients (10.7%) assigned to PS, and in 12 patients (5.0%) assigned to DK crush (hazard ratio: 0.42; 95% confidence interval: 0.21 to 0.85; p = 0.02). Compared with PS, DK crush also resulted in lower rates of target vessel myocardial infarction I (2.9% vs. 0.4%; p = 0.03) and definite or probable stent thrombosis (3.3% vs. 0.4%; p = 0.02). Clinically driven target lesion revascularization (7.9% vs. 3.8%; p = 0.06) and angiographic restenosis within the LM complex (14.6% vs. 7.1%; p = 0.10) also tended to be less frequent with DK crush compared with PS. There was no significant difference in cardiac death between the groups. In the present multicenter randomized trial, percutaneous coronary intervention of true distal LM bifurcation lesions using a planned DK crush 2-stent strategy resulted in a lower rate of TLF at 1 year than a PS strategy. (Double Kissing and Double Crush Versus Provisional T Stenting Technique for the Treatment of Unprotected Distal Left Main True Bifurcation Lesions: A Randomized, International, Multi-Center Clinical Trial [DKCRUSH-V]; ChiCTR-TRC-11001213). Copyright © 2017 American College of Cardiology Foundation. All rights reserved.

  4. Retrograde tracing and toe spreading after experimental autologous nerve transplantation and crush injury of the sciatic nerve: a descriptive methodological study.

    PubMed

    van Neerven, Sabien Ga; Bozkurt, Ahmet; O'Dey, Dan Mon; Scheffel, Juliane; Boecker, Arne H; Stromps, Jan-Philipp; Dunda, Sebastian; Brook, Gary A; Pallua, Norbert

    2012-04-30

    Evaluation of functional and structural recovery after peripheral nerve injury is crucial to determine the therapeutic effect of a nerve repair strategy. In the present study, we examined the relationship between the structural evaluation of regeneration by means of retrograde tracing and the functional analysis of toe spreading. Two standardized rat sciatic nerve injury models were used to address this relationship. As such, animals received either a 2 cm sciatic nerve defect (neurotmesis) followed by autologous nerve transplantation (ANT animals) or a crush injury with spontaneous recovery (axonotmesis; CI animals). Functional recovery of toe spreading was observed over an observation period of 84 days. In contrast to CI animals, ANT animals did not reach pre-surgical levels of toe spreading. After the observation period, the lipophilic dye DiI was applied to label sensory and motor neurons in dorsal root ganglia (DRG; sensory neurons) and spinal cord (motor neurons), respectively. No statistical difference in motor or sensory neuron counts could be detected between ANT and CI animals.In the present study we could indicate that there was no direct relationship between functional recovery (toe spreading) measured by SSI and the number of labelled (motor and sensory) neurons evaluated by retrograde tracing. The present findings demonstrate that a multimodal approach with a variety of independent evaluation tools is essential to understand and estimate the therapeutic benefit of a nerve repair strategy.

  5. Use of hybrid chitosan membranes and N1E-115 cells for promoting nerve regeneration in an axonotmesis rat model.

    PubMed

    Amado, S; Simões, M J; Armada da Silva, P A S; Luís, A L; Shirosaki, Y; Lopes, M A; Santos, J D; Fregnan, F; Gambarotta, G; Raimondo, S; Fornaro, M; Veloso, A P; Varejão, A S P; Maurício, A C; Geuna, S

    2008-11-01

    Many studies have been dedicated to the development of scaffolds for improving post-traumatic nerve regeneration. The goal of this study was to develop and test hybrid chitosan membranes to use in peripheral nerve reconstruction, either alone or enriched with N1E-115 neural cells. Hybrid chitosan membranes were tested in vitro, to assess their ability in supporting N1E-115 cell survival and differentiation, and in vivo to assess biocompatibility as well as to evaluate their effects on nerve fiber regeneration and functional recovery after a standardized rat sciatic nerve crush injury. Functional recovery was evaluated using the sciatic functional index (SFI), the static sciatic index (SSI), the extensor postural thrust (EPT), the withdrawal reflex latency (WRL) and ankle kinematics. Nerve fiber regeneration was assessed by quantitative stereological analysis and electron microscopy. All chitosan membranes showed good biocompatibility and proved to be a suitable substrate for plating the N1E-115 cellular system. By contrast, in vivo nerve regeneration assessment after crush injury showed that the freeze-dried chitosan type III, without N1E-115 cell addition, was the only type of membrane that significantly improved posttraumatic axonal regrowth and functional recovery. It can be thus suggested that local enwrapping with this type of chitosan membrane may represent an effective approach for the improvement of the clinical outcome in patients receiving peripheral nerve surgery.

  6. Age-Dependent Schwann Cell Phenotype Regulation Following Peripheral Nerve Injury.

    PubMed

    Chen, Wayne A; Luo, T David; Barnwell, Jonathan C; Smith, Thomas L; Li, Zhongyu

    2017-12-01

    Schwann cells are integral to the regenerative capacity of the peripheral nervous system, which declines after adolescence. The mechanisms underlying this decline are poorly understood. This study sought to compare the protein expression of Notch, c-Jun, and Krox-20 after nerve crush injury in adolescent and young adult rats. We hypothesized that these Schwann cell myelinating regulatory factors are down-regulated after nerve injury in an age-dependent fashion. Adolescent (2 months old) and young adult (12 months old) rats (n = 48) underwent sciatic nerve crush injury. Protein expression of Notch, c-Jun, and Krox-20 was quantified by Western blot analysis at 1, 3, and 7 days post-injury. Functional recovery was assessed in a separate group of animals (n = 8) by gait analysis (sciatic functional index) and electromyography (compound motor action potential) over an 8-week post-injury period. Young adult rats demonstrated a trend of delayed onset of the dedifferentiating regulatory factors, Notch and c-Jun, corresponding to the delayed functional recovery observed in young adult rats compared to adolescent rats. Compound motor action potential area was significantly greater in adolescent rats relative to young adult rats, while amplitude and velocity trended toward statistical significance. The process of Schwann cell dedifferentiation following peripheral nerve injury shows different trends with age. These trends of delayed onset of key regulatory factors responsible for Schwann cell myelination may be one of many possible factors mediating the significant differences in functional recovery between adolescent and young adult rats following peripheral nerve injury.

  7. An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

    NASA Astrophysics Data System (ADS)

    Khan, Muazzam A.; Ahmad, Jawad; Javaid, Qaisar; Saqib, Nazar A.

    2017-03-01

    Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN can be found in smart homes, intelligent buildings, health care, energy efficient smart grids and industrial control systems. In recent years, computer scientists has focused towards findings more applications of WSN in multimedia technologies, i.e. audio, video and digital images. Due to bulky nature of multimedia data, WSN process a large volume of multimedia data which significantly increases computational complexity and hence reduces battery time. With respect to battery life constraints, image compression in addition with secure transmission over a wide ranged sensor network is an emerging and challenging task in Wireless Multimedia Sensor Networks. Due to the open nature of the Internet, transmission of data must be secure through a process known as encryption. As a result, there is an intensive demand for such schemes that is energy efficient as well as highly secure since decades. In this paper, discrete wavelet-based partial image encryption scheme using hashing algorithm, chaotic maps and Hussain's S-Box is reported. The plaintext image is compressed via discrete wavelet transform and then the image is shuffled column-wise and row wise-wise via Piece-wise Linear Chaotic Map (PWLCM) and Nonlinear Chaotic Algorithm, respectively. To get higher security, initial conditions for PWLCM are made dependent on hash function. The permuted image is bitwise XORed with random matrix generated from Intertwining Logistic map. To enhance the security further, final ciphertext is obtained after substituting all elements with Hussain's substitution box. Experimental and statistical results confirm the strength of the anticipated scheme.

  8. [Crush syndrome].

    PubMed

    Scapellato, S; Maria, S; Castorina, G; Sciuto, G

    2007-08-01

    Crush injuries and crush syndrome are common after natural (e.g. earthquake, land-slide, tornadoes, tsunami) or man-made catastrophes (e.g. wars, terrorist attacks), in fact the history of this disease is well reported both in earthquake rescue reviews and in military literature. However, there are instances due to conventional causes, such as building collapses, road traffic accident, accident at work or altered level of consciousness after stroke or drug overdose. These situations of ''big or small'' catastrophes can occur at any time and anywhere, for this reason every clinician should be prepared to address issues of crush syndrome quickly and aggressively. The treatment has to manage and to predict clinical conditions before they present themselves. In particular, acute renal failure is one of the few life-threatening complications that can be reversed. This article reviews the various evidences and summarizes the treatment strategies available. Fundamental targets in crush syndrome management are early aggressive hydration, urine alkalinization and, when possible, forced diuresis. Since electrolyte imbalance may be fatal due to arrhythmias secondary to hyperkalemia (especially associated with hypocalcemia), it's necessary to correct these abnormalities using insulin-glucose solution and/or potassium binders, and if nevertheless serum potassium levels remain high this serious disease will necessitate dialysis, which is often a vital procedure.

  9. Role of Survival Time and Injury Severity in Fatal Pulmonary Fat Embolism.

    PubMed

    Jarmer, Juliane; Ampanozi, Garyfalia; Thali, Michael J; Bolliger, Stephan A

    2017-03-01

    Pulmonary fat embolism (PFE) is frequent in blunt trauma and may occasionally lead to death. A correlation between fracture grade and severity and PFE grade has been described before, but no correlation between PFE and survival time, fat crushing extent, fat crush grade, or number of body regions with fractures could be noted in this small study. To further examine this, we decided to examine the aforementioned points in a far larger study group.Autopsy protocols of 188 nonresuscitated fatalities with blunt trauma and without right heart injury, which underwent whole body dissection, were retrospectively reviewed concerning the presence and the severity of PFE, injuries, survival time, age, sex, and the body mass index.The fracture grade, the fracture severity, and the number of the fractured regions correlated very well with the grade of PFE, but the crushed regions, crush grade, and crush severity did not. We observed a time correlation between survival time and PFE only in the sense that very rapid deaths were often PFE negative. High-grade PFE was observed most often in patients having died less than 6 hours after the incident, and PFE grades of 2 or more were occasionally noted even after 48 hours.

  10. Cytosolic androgen receptor in regenerating rat levator ani muscle.

    PubMed Central

    Max, S R; Mufti, S; Carlson, B M

    1981-01-01

    The development of the cytosolic androgen receptor was studied after degeneration and regeneration of the rat levator ani muscle after a crush lesion. Muscle regeneration appears to recapitulate myogenesis in many respects. It therefore provides a model tissue in sufficiently in large quantity for investigating the ontogenesis of the androgen receptor. The receptor in the cytosol of the normal levator ani muscle has binding characteristics similar to those of the cytosolic receptor in other androgen-sensitive tissues. By day 3 after a crush lesion of the levator ani muscle, androgen binding decreased to 25% of control values. This decrease was followed by a 4-5 fold increase in hormone binding, which attained control values by day 7 after crush. Androgen binding remained stable at the control value up to day 60 after crushing. These results were correlated with the morphological development of the regenerating muscle after crushing. It is concluded that there is little, if any, androgen receptor present in the early myoblastic stages of regeneration; rather, synthesis of the receptor may occur after the fusion of myoblasts and during the differentiation of myotubes into cross-striated muscle fibres. Images PLATE 1 PLATE 2 PMID:6977357

  11. 76 FR 11433 - Federal Transition To Secure Hash Algorithm (SHA)-256

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... generating digital signatures. Current information systems, Web servers, applications and workstation operating systems were designed to process, and use SHA-1 generated signatures. National Institute of... cryptographic keys, and more robust algorithms by December 2013. Government systems may begin to encounter...

  12. Semantic Segmentation of Building Elements Using Point Cloud Hashing

    NASA Astrophysics Data System (ADS)

    Chizhova, M.; Gurianov, A.; Hess, M.; Luhmann, T.; Brunn, A.; Stilla, U.

    2018-05-01

    For the interpretation of point clouds, the semantic definition of extracted segments from point clouds or images is a common problem. Usually, the semantic of geometrical pre-segmented point cloud elements are determined using probabilistic networks and scene databases. The proposed semantic segmentation method is based on the psychological human interpretation of geometric objects, especially on fundamental rules of primary comprehension. Starting from these rules the buildings could be quite well and simply classified by a human operator (e.g. architect) into different building types and structural elements (dome, nave, transept etc.), including particular building parts which are visually detected. The key part of the procedure is a novel method based on hashing where point cloud projections are transformed into binary pixel representations. A segmentation approach released on the example of classical Orthodox churches is suitable for other buildings and objects characterized through a particular typology in its construction (e.g. industrial objects in standardized enviroments with strict component design allowing clear semantic modelling).

  13. Paradeisos: A perfect hashing algorithm for many-body eigenvalue problems

    DOE PAGES

    Jia, C. J.; Wang, Y.; Mendl, C. B.; ...

    2017-12-02

    Here, we describe an essentially perfect hashing algorithm for calculating the position of an element in an ordered list, appropriate for the construction and manipulation of many-body Hamiltonian, sparse matrices. Each element of the list corresponds to an integer value whose binary representation reflects the occupation of single-particle basis states for each element in the many-body Hilbert space. The algorithm replaces conventional methods, such as binary search, for locating the elements of the ordered list, eliminating the need to store the integer representation for each element, without increasing the computational complexity. Combined with the “checkerboard” decomposition of the Hamiltonian matrixmore » for distribution over parallel computing environments, this leads to a substantial savings in aggregate memory. While the algorithm can be applied broadly to many-body, correlated problems, we demonstrate its utility in reducing total memory consumption for a series of fermionic single-band Hubbard model calculations on small clusters with progressively larger Hilbert space dimension.« less

  14. LSHSIM: A Locality Sensitive Hashing based method for multiple-point geostatistics

    NASA Astrophysics Data System (ADS)

    Moura, Pedro; Laber, Eduardo; Lopes, Hélio; Mesejo, Daniel; Pavanelli, Lucas; Jardim, João; Thiesen, Francisco; Pujol, Gabriel

    2017-10-01

    Reservoir modeling is a very important task that permits the representation of a geological region of interest, so as to generate a considerable number of possible scenarios. Since its inception, many methodologies have been proposed and, in the last two decades, multiple-point geostatistics (MPS) has been the dominant one. This methodology is strongly based on the concept of training image (TI) and the use of its characteristics, which are called patterns. In this paper, we propose a new MPS method that combines the application of a technique called Locality Sensitive Hashing (LSH), which permits to accelerate the search for patterns similar to a target one, with a Run-Length Encoding (RLE) compression technique that speeds up the calculation of the Hamming similarity. Experiments with both categorical and continuous images show that LSHSIM is computationally efficient and produce good quality realizations. In particular, for categorical data, the results suggest that LSHSIM is faster than MS-CCSIM, one of the state-of-the-art methods.

  15. Matching Real and Synthetic Panoramic Images Using a Variant of Geometric Hashing

    NASA Astrophysics Data System (ADS)

    Li-Chee-Ming, J.; Armenakis, C.

    2017-05-01

    This work demonstrates an approach to automatically initialize a visual model-based tracker, and recover from lost tracking, without prior camera pose information. These approaches are commonly referred to as tracking-by-detection. Previous tracking-by-detection techniques used either fiducials (i.e. landmarks or markers) or the object's texture. The main contribution of this work is the development of a tracking-by-detection algorithm that is based solely on natural geometric features. A variant of geometric hashing, a model-to-image registration algorithm, is proposed that searches for a matching panoramic image from a database of synthetic panoramic images captured in a 3D virtual environment. The approach identifies corresponding features between the matched panoramic images. The corresponding features are to be used in a photogrammetric space resection to estimate the camera pose. The experiments apply this algorithm to initialize a model-based tracker in an indoor environment using the 3D CAD model of the building.

  16. Tuple spaces in hardware for accelerated implicit routing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baker, Zachary Kent; Tripp, Justin

    2010-12-01

    Organizing and optimizing data objects on networks with support for data migration and failing nodes is a complicated problem to handle as systems grow. The goal of this work is to demonstrate that high levels of speedup can be achieved by moving responsibility for finding, fetching, and staging data into an FPGA-based network card. We present a system for implicit routing of data via FPGA-based network cards. In this system, data structures are requested by name, and the network of FPGAs finds the data within the network and relays the structure to the requester. This is acheived through successive examinationmore » of hardware hash tables implemented in the FPGA. By avoiding software stacks between nodes, the data is quickly fetched entirely through FPGA-FPGA interaction. The performance of this system is orders of magnitude faster than software implementations due to the improved speed of the hash tables and lowered latency between the network nodes.« less

  17. Reducing computation in an i-vector speaker recognition system using a tree-structured universal background model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McClanahan, Richard; De Leon, Phillip L.

    The majority of state-of-the-art speaker recognition systems (SR) utilize speaker models that are derived from an adapted universal background model (UBM) in the form of a Gaussian mixture model (GMM). This is true for GMM supervector systems, joint factor analysis systems, and most recently i-vector systems. In all of the identified systems, the posterior probabilities and sufficient statistics calculations represent a computational bottleneck in both enrollment and testing. We propose a multi-layered hash system, employing a tree-structured GMM–UBM which uses Runnalls’ Gaussian mixture reduction technique, in order to reduce the number of these calculations. Moreover, with this tree-structured hash, wemore » can trade-off reduction in computation with a corresponding degradation of equal error rate (EER). As an example, we also reduce this computation by a factor of 15× while incurring less than 10% relative degradation of EER (or 0.3% absolute EER) when evaluated with NIST 2010 speaker recognition evaluation (SRE) telephone data.« less

  18. Reducing computation in an i-vector speaker recognition system using a tree-structured universal background model

    DOE PAGES

    McClanahan, Richard; De Leon, Phillip L.

    2014-08-20

    The majority of state-of-the-art speaker recognition systems (SR) utilize speaker models that are derived from an adapted universal background model (UBM) in the form of a Gaussian mixture model (GMM). This is true for GMM supervector systems, joint factor analysis systems, and most recently i-vector systems. In all of the identified systems, the posterior probabilities and sufficient statistics calculations represent a computational bottleneck in both enrollment and testing. We propose a multi-layered hash system, employing a tree-structured GMM–UBM which uses Runnalls’ Gaussian mixture reduction technique, in order to reduce the number of these calculations. Moreover, with this tree-structured hash, wemore » can trade-off reduction in computation with a corresponding degradation of equal error rate (EER). As an example, we also reduce this computation by a factor of 15× while incurring less than 10% relative degradation of EER (or 0.3% absolute EER) when evaluated with NIST 2010 speaker recognition evaluation (SRE) telephone data.« less

  19. Paradeisos: A perfect hashing algorithm for many-body eigenvalue problems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jia, C. J.; Wang, Y.; Mendl, C. B.

    Here, we describe an essentially perfect hashing algorithm for calculating the position of an element in an ordered list, appropriate for the construction and manipulation of many-body Hamiltonian, sparse matrices. Each element of the list corresponds to an integer value whose binary representation reflects the occupation of single-particle basis states for each element in the many-body Hilbert space. The algorithm replaces conventional methods, such as binary search, for locating the elements of the ordered list, eliminating the need to store the integer representation for each element, without increasing the computational complexity. Combined with the “checkerboard” decomposition of the Hamiltonian matrixmore » for distribution over parallel computing environments, this leads to a substantial savings in aggregate memory. While the algorithm can be applied broadly to many-body, correlated problems, we demonstrate its utility in reducing total memory consumption for a series of fermionic single-band Hubbard model calculations on small clusters with progressively larger Hilbert space dimension.« less

  20. A novel image retrieval algorithm based on PHOG and LSH

    NASA Astrophysics Data System (ADS)

    Wu, Hongliang; Wu, Weimin; Peng, Jiajin; Zhang, Junyuan

    2017-08-01

    PHOG can describe the local shape of the image and its relationship between the spaces. The using of PHOG algorithm to extract image features in image recognition and retrieval and other aspects have achieved good results. In recent years, locality sensitive hashing (LSH) algorithm has been superior to large-scale data in solving near-nearest neighbor problems compared with traditional algorithms. This paper presents a novel image retrieval algorithm based on PHOG and LSH. First, we use PHOG to extract the feature vector of the image, then use L different LSH hash table to reduce the dimension of PHOG texture to index values and map to different bucket, and finally extract the corresponding value of the image in the bucket for second image retrieval using Manhattan distance. This algorithm can adapt to the massive image retrieval, which ensures the high accuracy of the image retrieval and reduces the time complexity of the retrieval. This algorithm is of great significance.

  1. SUGAR BIN WITH EAST WALL OF CRUSHING MILL TO ITS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    SUGAR BIN WITH EAST WALL OF CRUSHING MILL TO ITS RIGHT. CONVEYOR FROM BOILING HOUSE ABOVE. VIEW FROM THE NORTHEAST - Kekaha Sugar Company, Sugar Mill Building, 8315 Kekaha Road, Kekaha, Kauai County, HI

  2. Vocal fold paralysis: improved adductor recovery by vincristine blockade of posterior cricoarytenoid.

    PubMed

    Paniello, Randal C

    2015-03-01

    A new treatment for acute unilateral vocal-fold paralysis (UVFP) was proposed in which a drug is injected into the posterior cricoarytenoid muscle (PCA) shortly after nerve injury, before the degree of natural recovery is known, to prevent antagonistic synkinetic reinnervation. This concept was tested in a series of canine experiments using vincristine as the blocking agent. Animal experiments. Laryngeal adductor function was measured at baseline and at 6 months following experimental recurrent laryngeal nerve (RLN) injuries, including complete transection, crush injury, and cautery. In the treatment animals, the PCA was injected with vincristine at the time of RLN injury. Adductor function in the vincristine-treated hemilarynges was significantly improved compared with injury-matched noninjected controls (total n = 43). Transection/repair controls recovered 56.1% of original adductor strength; vincristine-treated hemilarynges recovered to 73.1% (P = 0.002). Cautery injuries also improved with vincristine block (60.7% vs. 88.7%; P = 0.031). Crush injuries recovered well even without vincristine (104.8% vs. 111.2%; P = 0.35). These findings support a new paradigm of early, preemptive blockade of the antagonist muscle (PCA) to improve ultimate net adductor strength, which could potentially improve functional recovery in many UVFP patients and avoid the need for medialization procedures. Possible clinical aspects of this new approach are discussed. © 2014 The American Laryngological, Rhinological and Otological Society, Inc.

  3. On the computational aspects of comminution in discrete element method

    NASA Astrophysics Data System (ADS)

    Chaudry, Mohsin Ali; Wriggers, Peter

    2018-04-01

    In this paper, computational aspects of crushing/comminution of granular materials are addressed. For crushing, maximum tensile stress-based criterion is used. Crushing model in discrete element method (DEM) is prone to problems of mass conservation and reduction in critical time step. The first problem is addressed by using an iterative scheme which, depending on geometric voids, recovers mass of a particle. In addition, a global-local framework for DEM problem is proposed which tends to alleviate the local unstable motion of particles and increases the computational efficiency.

  4. Proposed method of producing large optical mirrors Single-point diamond crushing followed by polishing with a small-area tool

    NASA Technical Reports Server (NTRS)

    Wright, G.; Bryan, J. B.

    1986-01-01

    Faster production of large optical mirrors may result from combining single-point diamond crushing of the glass with polishing using a small area tool to smooth the surface and remove the damaged layer. Diamond crushing allows a surface contour accurate to 0.5 microns to be generated, and the small area computer-controlled polishing tool allows the surface roughness to be removed without destroying the initial contour. Final contours with an accuracy of 0.04 microns have been achieved.

  5. 41. VIEW NORTH OF UPPER LEVEL OF CRUSHER ADDITION. DINGS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    41. VIEW NORTH OF UPPER LEVEL OF CRUSHER ADDITION. DINGS MAGNETIC PULLEY AT CENTER. ALSO SHOWS 100-TON CRUSHED UNOXIDIZED ORE BIN (RIGHT), PULLEY FORM 18 INCH BELT CONVEYOR CRUSHED OXIDIZED ORE BIN FEED AND STEPHENSADAMSON 25 TON/HR BUCKET ELEVATOR (UPPER CENTER). THE UPPER PORTION OF THE SAMPLING ELEVATOR IS ABOVE THE MAGNETIC PULLEY (CENTER LEFT) WITH THE ROUTE OF THE 16 INCH BELT CONVEYOR FINES FEED TO CRUSHED OXIDIZED ORE BIN TO ITS LEFT. - Bald Mountain Gold Mill, Nevada Gulch at head of False Bottom Creek, Lead, Lawrence County, SD

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nusrat, H; Pang, G; Au, P

    Purpose: The doping of plastic scintillators with high-Z elements changes the radiation interaction cross section of the medium and therefore changes the intrinsic response of the detector. The selection of doped plastic scintillators available commercially is limited. This research aims to develop a novel methodology for the mechanical doping of plastic scintillating materials. The ultimate goal of this project is to use doped scintillators of varying intrinsic behavior to unfold the LET (energy) spectrum of any radiation beam. Methods: Commercially available BC408 plastic scintillator was obtained and crushed into uniform powder (using ball mill). Two separate materials were tested formore » light output signal: uncrushed scintillator and scintillating powder bound by glue. Commercially available U301 UV-hardening glue was used. Scintillation response was measured by creating a thin housing of black acrylic that allowed light from each scintillator to be guided to an optical fiber via a taper. The optical fiber was connected to a PMT; signal was measured using an electrometer. Tests were conducted to determine if crushing+bonding distorted linearity and energy dependence of detector response. Linearity was tested for by irradiating (uncrushed and crushed+glued) for varying durations ensuring signal scaled accordingly; this was done using 300kV x-rays and 6MeV electrons. The effect on energy dependence was examined by obtaining a signal ratio (100kV vs. 300kV; 6MeV vs. 18MeV) for both uncrushed and crushed+glued scintillating material. Results: Crushing and binding with U301 glue did not have an effect on linearity. Energy dependence was changed by 20.3%; crushing+bonding decreased the sensitivity at low energy radiation. Conclusion: This work indicates that crushing and binding of plastic scintillating material does not change the linearity of its response to radiation but does have an effect on the energy dependence. Future work involves addition of high-Z dopants (W, Mo, Pb) and characterization of the detector response.« less

  7. Recruitment of Intracavernously Injected Adipose-Derived Stem Cells to the Major Pelvic Ganglion Improves Erectile Function in a Rat Model of Cavernous Nerve Injury

    PubMed Central

    Fandel, Thomas M.; Albersen, Maarten; Lin, Guiting; Qiu, Xuefeng; Ning, Hongxiu; Banie, Lia; Lue, Tom F.; Lin, Ching-Shwun

    2011-01-01

    Background Intracavernous (IC) injection of stem cells has been shown to ameliorate cavernous-nerve (CN) injury-induced erectile dysfunction (ED). However, the mechanisms of action of adipose-derived stem cells (ADSC) remain unclear. Objectives To investigate the mechanism of action and fate of IC injected ADSC in a rat model of CN crush injury. Design, setting, and participants Sprague-Dawley rats (n = 110) were randomly divided into five groups. Thirty-five rats underwent sham surgery and IC injection of ADSC (n = 25) or vehicle (n = 10). Another 75 rats underwent bilateral CN crush injury and were treated with vehicle or ADSC injected either IC or in the dorsal penile perineural space. At 1, 3, 7 (n = 5), and 28 d (n = 10) postsurgery, penile tissues and major pelvic ganglia (MPG) were harvested for histology. ADSC were labeled with 5-ethynyl-2-deoxyuridine (EdU) before treatment. Rats in the 28-d groups were examined for erectile function prior to tissue harvest. Measurements IC pressure recording on CN electrostimulation, immunohistochemistry of the penis and the MPG, and number of EdU-positive (EdU+) cells in the injection site and the MPG. Results and limitations IC, but not perineural, injection of ADSC resulted in significantly improved erectile function. Significantly more EdU+ ADSC appeared in the MPG of animals with CN injury and IC injection of ADSC compared with those injected perineurally and those in the sham group. One day after crush injury, stromal cell-derived factor-1 (SDF-1) was upregulated in the MPG, providing an incentive for ADSC recruitment toward the MPG. Neuroregeneration was observed in the group that underwent IC injection of ADSC, and IC ADSC treatment had beneficial effects on the smooth muscle/collagen ratio in the corpus cavernosum. Conclusions CN injury upregulates SDF-1 expression in the MPG and thereby attracts intracavernously injected ADSC. At the MPG, ADSC exert neuroregenerative effects on the cell bodies of injured nerves, resulting in enhanced erectile response. PMID:21824718

  8. The development of a rail passenger coach car crush-zone

    DOT National Transportation Integrated Search

    2003-04-22

    This paper presents information on the design of a rail : vehicle crush zone for better occupant protection. The overall : design requirements and characteristics are described and the : configuration for the various structural subsystems is presente...

  9. Crush Analyses of Multi-Level Equipment

    DOT National Transportation Integrated Search

    2006-11-06

    Non-linear large deformation crush analyses were conducted on a multi-level cab car typical of those in operation by the Southern California Regional Rail Authority (SCRRA) in California. The motivation for these analyses was a collision, which occur...

  10. Using recycled concrete in MDOT's transportation infrastructure : manual of practice.

    DOT National Transportation Integrated Search

    2011-08-01

    "Crushed concrete aggregate (CCA) is granular material manufactured by removing, crushing, and : processing old concrete for reuse as an aggregate source in new construction. Although the Michigan : Department of Transportation (MDOT) has used CCA si...

  11. 53. VIEW OF CRUSHED OXIDIZED ORE BIN FROM EAST. SHOWS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    53. VIEW OF CRUSHED OXIDIZED ORE BIN FROM EAST. SHOWS ACCESS STAIR TO FEED LEVEL; DUST COLLECTOR ON LEFT. - Bald Mountain Gold Mill, Nevada Gulch at head of False Bottom Creek, Lead, Lawrence County, SD

  12. Crushing virtual cigarettes reduces tobacco addiction and treatment discontinuation.

    PubMed

    Girard, Benoit; Turcotte, Vincent; Bouchard, Stéphane; Girard, Bruno

    2009-10-01

    Pilot studies revealed promising results regarding crushing virtual cigarettes to reduce tobacco addiction. In this study, 91 regular smokers were randomly assigned to two treatment conditions that differ only by the action performed in the virtual environment: crushing virtual cigarettes or grasping virtual balls. All participants also received minimal psychosocial support from nurses during each of 12 visits to the clinic. An affordable virtual reality system was used (eMagin HMD) with a virtual environment created by modifying a 3D game. Results revealed that crushing virtual cigarettes during 4 weekly sessions led to a statistically significant reduction in nicotine addiction (assessed with the Fagerström test), abstinence rate (confirmed with exhaled carbon monoxide), and drop-out rate from the 12-week psychosocial minimal-support treatment program. Increased retention in the program is discussed as a potential explanation for treatment success, and hypotheses are raised about self-efficacy, motivation, and learning.

  13. A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing

    NASA Astrophysics Data System (ADS)

    Kakaei Kate, Hamidreza; Razmara, Jafar; Isazadeh, Ayaz

    2018-06-01

    Today, in the world of information communication, voice information has a particular importance. One way to preserve voice data from attacks is voice encryption. The encryption algorithms use various techniques such as hashing, chaotic, mixing, and many others. In this paper, an algorithm is proposed for voice encryption based on three different schemes to increase flexibility and strength of the algorithm. The proposed algorithm uses an innovative encoding scheme, the DNA encryption technique and a permutation function to provide a secure and fast solution for voice encryption. The algorithm is evaluated based on various measures including signal to noise ratio, peak signal to noise ratio, correlation coefficient, signal similarity and signal frequency content. The results demonstrate applicability of the proposed method in secure and fast encryption of voice files

  14. Interaction of 3H+ (as HTO) and 36Cl- (as Na36Cl) with crushed granite and corresponding fracture infill material investigated in column experiments.

    PubMed

    Štamberg, K; Palágyi, Š; Videnská, K; Havlová, V

    The transport of 3 H + (as HTO) and 36 Cl - (as Na 36 Cl) was investigated in the dynamic system, i.e., in the columns filled with crushed pure granite and fracture infill of various grain sizes. The aim of column experiments was to determine important transport parameter, such as the retardation, respectively distribution coefficients, Peclet numbers and hydrodynamic dispersion coefficients. Furthermore, the research was focused to quantification of the effect of grain size on migration of studied radionuclides. The experimental breakthrough curves were fitted by a model based on the erfc-function, assuming a linear reversible equilibrium sorption/desorption isotherm, and the above mentioned transport parameters were determined. The results showed that influence of grain size on sorption of 3 H + and 36 Cl - was negligible. Retardation and distribution coefficients of both tracers converged to one and zero, respectively, in case of all fractions of crushed granite and infill material. Generally, the presumed ion exclusion of 36 Cl in anionic form was proved under given conditions, only very weak one seems to exist in a case of infill material. In principal, both radionuclides behaved as non-sorbing, conservative tracers. On the other hand, the influence of grain size on Peclet numbers value and on dispersion coefficient was observed for both crystalline materials, namely in agreement with theoretical suppositions that the values of Peclet numbers decrease with increasing grain size and values of dispersion coefficient increase.

  15. Classification of Encrypted Web Traffic Using Machine Learning Algorithms

    DTIC Science & Technology

    2013-06-01

    DPI devices to block certain websites; Yu, Cong, Chen, and Lei [52] suggest hashing the domains of pornographic and illegal websites so ISPs can...Zhenming Lei. “Blocking pornographic , illegal websites by internet host domain using FPGA and Bloom Filter”. Network Infrastructure and Digital Content

  16. Fine-Needle Aspiration, Touch Imprint, and Crush Preparation Cytology for Diagnosing Thyroid Malignancies in Thyroid Nodules.

    PubMed

    Ahmadinejad, Mojtaba; Aliepour, Asghar; Anbari, Khatereh; Kaviani, Mojhgan; Ganjizadeh, Hasan; Nadri, Sedigheh; Foroutani, Niloufar; Meysami, Masoumeh; Almasi, Vahid

    2015-12-01

    Several methods are used to evaluate the thyroid nodules. The aim of this study was to determine the sensitivity, specificity, false positive and negative rates, positive predictive value (PPV), and negative predictive value (NPV) of touch imprint, crush preparation, and fine-needle aspiration (FNA) methods. This cross-sectional study was done in Shohada-ye Ashayer University Hospital in Khorramabad. All the patients who underwent thyroid surgery due to thyroid nodules in this hospital between March and September 2011 were evaluated. The thyroid nodules of all the patients were evaluated by touch imprint, crush preparation, FNA, and permanent pathology methods. Finally, the results of the first three methods were compared with the result of permanent pathology method. The mean age of 104 patients who underwent thyroid surgery was 42.6 ± 11.9 years old. Based on permanent pathology, touch imprint, crush preparation, and FNA methods, 15.3, 6.25, 6.25, and 4.4 % of thyroid nodules were malignant, respectively. Sensitivity, specificity, false positive rate, false negative rate, PPV, and NPV of FNA biopsy were 62.5, 100, 0, 37.5, 100, and 95.3 %, respectively. Also, sensitivity, specificity, false positive rate, false negative rate, PPV, and NPV of touch imprint and crush preparation were equal and were 80, 100, 0, 20, 100, and 96.7 %, respectively. Using touch imprint and crush preparation in evaluation of thyroid nodules for rapid evaluation of these nodules in operating rooms seems to be logical, and it can prevent further surgeries.

  17. Stone Quarrying, Crushing and Screening Facilities General Air Quality Permit Request for Coverage: US Silica - Parshall Transload Facility

    EPA Pesticide Factsheets

    Documents related to Request for Coverage under Stone Quarrying, Crushing, and Screening Facilities General Permit Indian Reservation, US Silica, Parshall Transload Facility, Fort Berthold Indian Reservation, North Dakota.

  18. Resilient modulus of compacted crushed stone aggregate bases.

    DOT National Transportation Integrated Search

    2007-11-07

    The main goal of this study was to establish a simple and efficient means of predicting the resilient modulus of different types of Kentucky crushed stone aggregate bases. To accomplish this purpose, resilient modulus of different tests were performe...

  19. [The neuroprotective effect of erigeron breviscapus (vant) hand-mazz on retinal ganglion cells after optic nerve crush injury].

    PubMed

    Jiang, Bing; Jiang, You-qin

    2003-08-01

    To investigate whether a Chinese herbal medicine, erigeron breviscapus (vant) hand-mazz (EBHM), can protect the retinal ganglion cells (RGC) damaged by calibrated optic nerve crush injury. Forty-two Sprague-Dawley rats were randomly divided into two groups. Calibrated optic nerve crush injury model was induced in the right eyes by a special designed optic nerve clip. The left eyes served as a control. All 42 rats were randomly divided into 2 groups. Group A consisted of the rats with calibrated optic nerve crush injury and group B consisted of rats with calibrated optic nerve crush injury treated with EBHM. In group B, EBHM solution was given once after the crush injury. According to the time interval between the optic nerve crush and the sacrifice, both groups A and B were further divided into three subgroups (day 4, day 14 and day 21). Therefore, there were 7 rats in each subgroup. Three days before sacrifice, 3% fast blue was injected into superior colliculi bilaterally. The eyes were enucleated after the rat was sacrificed, and flat mounts of the retina from both eyes were prepared on a slide and observed under a fluorescence microscope. Four photos with 400 x magnification were taken from each of the four quadrants of the retina 1 mm away from the optic disc. The labeled RGC were counted by a computerized image analyzer. The labeled RGC rate was used for statistical analysis (the labeled RGC rate = number of RGC in injured eye/control eye x 100%). In group A, the labeled RGC rate was (77.79 +/- 7.11)%, (63.76 +/- 3.79)% and (54.66 +/- 4.75)% on day 4, day 14 and day 21, respectively. In group B, the labeled RGC rate was (80.13 +/- 12.03)%, (78.17 +/- 9.19)% and (83.59 +/- 12.61)% on day 4, day 14 and day 21, respectively. In group B, which was treated with EBHM after injury, the labeled RGC rate was significantly higher than that of group A on day 14 and day 21. In the experimental optic nerve crush model in rats, EBHM therapy can increase the survival rate of the RGC and can rescue and/or restore the injured RGC.

  20. Performance Efficiency of a Crash Energy Management System

    DOT National Transportation Integrated Search

    2007-03-13

    Previous work has led to the development of a crash energy : management (CEM) system designed to distribute crush : throughout unoccupied areas of a passenger train in a collision : event. This CEM system is comprised of crush zones at the : front an...

  1. The Influence of Manufacturing Variations on a Crash Energy Management System

    DOT National Transportation Integrated Search

    2008-09-24

    Crash Energy Management (CEM) systems protect passengers in the event of a train collision. A CEM system distributes crush throughout designated unoccupied crush zones of a passenger rail consist. This paper examines the influence of manufacturing va...

  2. Influence of technical parameters of disk-shaped reactor on productivity of heat treatment of crushed wood

    NASA Astrophysics Data System (ADS)

    Safin, R. R.; Khasanshin, R. R.; Mukhametzyanov, S. R.

    2018-03-01

    The existing installations for heat treatment of the crushed wood are analyzed. The technology of heat treatment of the crushed wood in the devices of disk-shaped type is offered. The results of modeling for the purpose of determination of interrelation of the key design and technological parameters of the disk-shaped device are presented. It is established that the major factors, affecting duration of stay of the material in a device, are the speed of rotation of the mixer, the number of mixers and the number of rakes on the mixer.

  3. Evaluation of the Effects of Crushed and Expanded Waste Glass Aggregates on the Material Properties of Lightweight Concrete Using Image-Based Approaches

    PubMed Central

    Abd Elrahman, Mohamed; Sikora, Pawel; Rucinska, Teresa; Horszczaruk, Elzbieta

    2017-01-01

    Recently, the recycling of waste glass has become a worldwide issue in the reduction of waste and energy consumption. Waste glass can be utilized in construction materials, and understanding its effects on material properties is crucial in developing advanced materials. In this study, recycled crushed and expanded glasses are used as lightweight aggregates for concrete, and their relation to the material characteristics and properties is investigated using several approaches. Lightweight concrete specimens containing only crushed and expanded waste glass as fine aggregates are produced, and their pore and structural characteristics are examined using image-based methods, such as scanning electron microscopy (SEM), X-ray computed tomography (CT), and automated image analysis (RapidAir). The thermal properties of the materials are measured using both Hot Disk and ISOMET devices to enhance measurement accuracy. Mechanical properties are also evaluated, and the correlation between material characteristics and properties is evaluated. As a control group, a concrete specimen with natural fine sand is prepared, and its characteristics are compared with those of the specimens containing crushed and expanded waste glass aggregates. The obtained results support the usability of crushed and expanded waste glass aggregates as alternative lightweight aggregates. PMID:29186854

  4. Effect of Hybridized Fiber Wrapped Around the Aluminum Tubes on the Crushing Performances

    NASA Astrophysics Data System (ADS)

    Ismail, A. E.; Noranai, Z.; Mohd Nor, N. H.; Mohd Tobi, A. L.; Ahmad, M. H.

    2016-11-01

    Nowadays, synthetic fibres for an example glass fibres is frequently used to wrap the metallic tubes in order to increase their load-bearing capacity. Due to environmental considerations and non-biodegradable behaviour, natural fibres or materials are increasingly used to replace synthetic fibres. The use of synthetic fibres can be minimized by combining them with natural fibres. Based on the literature survey, combining both fibres (synthetic and natural) for crushing applications are relatively new and therefore the main work of this paper is to present the crushing performances of hybridized fibres wrapped around the aluminium tubes when subjected to quasi-static crushing forces. Glass fibres are then combined with yarn kenaf fibres according to these volume fractions: 0, 25, 50, 75 and 100%. The hybridized fibres are wrapped around the tubes twice using different orientations [0o/0o], [15°/-15°], [30o/-30o] and [45o/-45o] included empty tubes before they are immersed into polyester resin bath. The composite tubes are then quasi-statically compressed using a constant cross-head displacement of 10mm/min. The force-displacement curves for each tube conditions are recorded automatically and analysed. The relation between hybridized fibbers and fibre orientations with crashworthiness parameters are investigated and discussed associating with their crushing mechanisms.

  5. Regeneration of axotomized olfactory neurons in young and adult locusts quantified by fasciclin I immunofluorescence.

    PubMed

    Wasser, Hannah; Biller, Alexandra; Antonopoulos, Georgios; Meyer, Heiko; Bicker, Gerd; Stern, Michael

    2017-04-01

    The olfactory pathway of the locust Locusta migratoria is characterized by a multiglomerular innervation of the antennal lobe (AL) by olfactory receptor neurons (ORNs). After crushing the antenna and thereby severing ORN axons, changes in the AL were monitored. First, volume changes were measured at different times post-crush with scanning laser optical tomography in 5th instar nymphs. AL volume decreased significantly to a minimum volume at 4 days post-crush, followed by an increase. Second, anterograde labeling was used to visualize details in the AL and antennal nerve (AN) during de- and regeneration. Within 24 h post-crush (hpc) the ORN fragments distal to the lesion degenerated. After 48 hpc, regenerating fibers grew through the crush site. In the AL, labeled ORN projections disappeared completely and reappeared after a few days. A weak topographic match between ORN origin on the antenna and the position of innervated glomeruli that was present in untreated controls did not reappear after regeneration. Third, the cell surface marker fasciclin I that is expressed in ORNs was used for quantifying purposes. Immunofluorescence was measured in the AL during de- and regeneration in adults and 5th instar nymphs: after a rapid but transient, decrease, it reappeared. Both processes happen faster in 5th instar nymphs than in adults.

  6. Evaluation of the Effects of Crushed and Expanded Waste Glass Aggregates on the Material Properties of Lightweight Concrete Using Image-Based Approaches.

    PubMed

    Chung, Sang-Yeop; Abd Elrahman, Mohamed; Sikora, Pawel; Rucinska, Teresa; Horszczaruk, Elzbieta; Stephan, Dietmar

    2017-11-25

    Recently, the recycling of waste glass has become a worldwide issue in the reduction of waste and energy consumption. Waste glass can be utilized in construction materials, and understanding its effects on material properties is crucial in developing advanced materials. In this study, recycled crushed and expanded glasses are used as lightweight aggregates for concrete, and their relation to the material characteristics and properties is investigated using several approaches. Lightweight concrete specimens containing only crushed and expanded waste glass as fine aggregates are produced, and their pore and structural characteristics are examined using image-based methods, such as scanning electron microscopy (SEM), X-ray computed tomography (CT), and automated image analysis (RapidAir). The thermal properties of the materials are measured using both Hot Disk and ISOMET devices to enhance measurement accuracy. Mechanical properties are also evaluated, and the correlation between material characteristics and properties is evaluated. As a control group, a concrete specimen with natural fine sand is prepared, and its characteristics are compared with those of the specimens containing crushed and expanded waste glass aggregates. The obtained results support the usability of crushed and expanded waste glass aggregates as alternative lightweight aggregates.

  7. Characterization of lunar ilmenite resources

    NASA Astrophysics Data System (ADS)

    Heiken, G. H.; Vaniman, D. T.

    Ilmenite will be an important lunar resource, to be used mainly for oxygen production but also as a source of iron. Ilmenite abundances in high-Ti basaltic lavas are higher (9-19 vol pct) than in high-Ti mare soils (mostly less than 10 vol pct). This factor alone may make crushed high-Ti basaltic lavas most attractive as a target for ilmenite extraction. Concentration of ilmenite from either a crushed basalt or regolith requires size sorting to avoid polycrystalline fragments. In coarse-grained high-Ti basaltic lavas, about 60-80 percent of the ilmenite will consist of relatively 'clean' single crystals if the rocks are crushed to a size of 0.2 mm. Fine-grained high-Ti basalts, with thin skeletal or hopper-shaped ilmentes, would produce essentially no free or 'clean' ilmenite grains even if crushed to 0.15 mm and only about 7 percent free ilmenite if crushed to 0.05 mm. Data from the 2.8-m-thick regolith sampled by coring at the Apollo 17 site show that in even the most basalt-clast-rich and least mature stratigraphic intervals, free ilmenite grains make up less than 2 percent of the 0.02- to 0.2-mm size fraction and a mere 0.3 percent of the 0.2- to 2-mm size fraction.

  8. In Vitro Drug Release After Crushing: Evaluation of Xtampza® ER and Other ER Opioid Formulations.

    PubMed

    Mayock, Stephen P; Saim, Said; Fleming, Alison B

    2017-12-01

    Extended-release (ER) opioids are associated with high rates of abuse. Recreational opioid users often manipulate ER formulations to achieve a high plasma concentration in a short amount of time, resulting in a more rapid and intense high. Patients may also manipulate ER tablets to facilitate swallowing, without recognizing that manipulation could increase release rate. The goal of this study was to assess the ability of oxycodone DETERx (Xtampza ® ER, Collegium Pharmaceutical, Inc., Canton, MA, USA) and other commercially available ER opioid formulations with and without physicochemical abuse-deterrent characteristics to be manipulated by crushing in an in vitro setting. In vitro dissolution techniques were used to compare the opioid release from a variety of ER opioid formulations. Dissolution was assessed for intact and crushed dosage forms. Opioid release was quantified using high-performance liquid chromatography. Intact formulations exhibited drug release rates characteristic of 12- or 24-h dosage forms. After crushing using commonly available household tools, only Xtampza ER maintained ER of opioid. Xtampza ER maintained its ER characteristics after crushing, unlike many other commercially available opioid formulations, including some formulated with abuse-deterrent properties. As such, Xtampza ER may be less appealing to abusers and offer a margin of safety for patients who manipulate dosage forms to facilitate swallowing.

  9. Hyperbaric oxygenation therapy for crush injuries reduces the risk of complications: research report.

    PubMed

    Yamada, Noriaki; Toyoda, Izumi; Doi, Tomoaki; Kumada, Keisuke; Kato, Hisaaki; Yoshida, Shozo; Shirai, Kunihiro; Kanda, Norihide; Ogura, Shinji

    2014-01-01

    Hyperbaric oxygen (HBO2) therapy has been adopted for crush injuries, but there are few studies supporting its use. We therefore investigated the effects of HBO2 on management of patients with complicated crush injuries. This historic cohort study included patients with crush injuries and open fractures with severities greater than or equal to Gustilo class IIIA. We divided the patients into two groups: Control and HBO2. The control group received conventional treatment, while the HBO2 group received conventional treatment plus HBO2. We compared the groups with respect to the incidence of infection, need for additional surgery, and length of intensive care unit (ICU) and hospital stays. There were 16 patients in the HBO2 group and 13 in the control group. There were no patients with infections in the HBO2 group, whereas in the control group six patients had infections and five needed another drainage procedure. These incidences were significantly lower in the HBO2 group (p = 0.003 and 0.013). However, the durations of ICU and hospital stays were similar across the two groups. HBO2 is effective in the management of crush injuries from the viewpoint of reducing complications and reoperations. These observations should be verified in additional studies with larger sample sizes because the patient number is limited.

  10. Evaluation of crushed ticagrelor tablet doses: recovery following crushing and naso-gastric tube passage ex vivo.

    PubMed

    Crean, Barry; Finnie, Cindy; Crosby, Anna

    2013-06-01

    Orally available ticagrelor in combination with low-dose aspirin (75-100 mg/day) is indicated for adult patients with acute coronary syndromes. However, patients with swallowing difficulties may be unable to consume the currently available 90-mg tablet. It is hypothesized that ticagrelor could be given to this patient cohort as a crushed dose administered either orally or via a naso-gastric (NG) tube. To investigate the potential use of crushed ticagrelor tablets (90- and 180-mg doses) for oral dose or NG tube administration. Ticagrelor tablets (90 or 180 mg [two 90-mg tablets]) were prepared to emulate oral and NG tube administration by similar methods. For the oral dose, ticagrelor tablets were crushed using a mortar and pestle and transferred to a dosing cup. 100 mL of water was added to the mortar, stirred, and the contents were transferred to the dosing cup and stirred to form a suspension. At this stage, where the suspension would normally be administered to a patient, it was collected for high performance liquid chromatography (HPLC) analysis. The mortar was then flushed with 100 mL of water, and the contents were again transferred to the dosing cup, stirred, and collected for HPLC analysis. For the NG dose, polyvinylchloride, polyurethane, and silicone size CH10 NG tubes were used. The tablets were crushed using a mortar and pestle, diluted with 50 mL of water, and stirred. At this stage, where the suspension would normally be administered to a patient through an NG tube using a syringe, it was collected for HPLC analysis. The mortar was then flushed with two additional 50 mL aliquots of water and the contents were passed through the NG tube. HPLC analysis examined the recoverability of ticagrelor in each of the dose suspensions and flushes and the stability of the suspension when held in a syringe for up to 2 h. One or two crushed 90-mg ticagrelor tablets, prepared for either oral or NG tube administration, delivers a mean dose of ≥97% of the original tablet. No degradation of the suspensions was detected after ticagrelor had been held in the syringe for up to 2 h. Although not an approved method of administration, these results suggest that ticagrelor tablets can be crushed and prepared for oral administration or for administration via an NG tube. From a clinical perspective, a syringe hold-time of up to 2 h should allow for enough time between preparation and administration (orally or via an NG tube) of the dispersed tablets to the patient. Future studies are required to test the effect of crushed dosing on pharmacokinetic and pharmacodynamic parameters.

  11. 76 FR 7817 - Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...

  12. Implementation and Use of the Reference Analytics Module of LibAnswers

    ERIC Educational Resources Information Center

    Flatley, Robert; Jensen, Robert Bruce

    2012-01-01

    Academic libraries have traditionally collected reference statistics using hash marks on paper. Although efficient and simple, this method is not an effective way to capture the complexity of reference transactions. Several electronic tools are now available to assist libraries with collecting often elusive reference data--among them homegrown…

  13. Expressing Constitutively Active Rheb in Adult Dorsal Root Ganglion Neurons Enhances the Integration of Sensory Axons that Regenerate Across a Chondroitinase-Treated Dorsal Root Entry Zone Following Dorsal Root Crush

    PubMed Central

    Wu, Di; Klaw, Michelle C.; Kholodilov, Nikolai; Burke, Robert E.; Detloff, Megan R.; Côté, Marie-Pascale; Tom, Veronica J.

    2016-01-01

    While the peripheral branch of dorsal root ganglion neurons (DRG) can successfully regenerate after injury, lesioned central branch axons fail to regrow across the dorsal root entry zone (DREZ), the interface between the dorsal root and the spinal cord. This lack of regeneration is due to the limited regenerative capacity of adult sensory axons and the growth-inhibitory environment at the DREZ, which is similar to that found in the glial scar after a central nervous system (CNS) injury. We hypothesized that transduction of adult DRG neurons using adeno-associated virus (AAV) to express a constitutively-active form of the GTPase Rheb (caRheb) will increase their intrinsic growth potential after a dorsal root crush. Additionally, we posited that if we combined that approach with digestion of upregulated chondroitin sulfate proteoglycans (CSPG) at the DREZ with chondroitinase ABC (ChABC), we would promote regeneration of sensory axons across the DREZ into the spinal cord. We first assessed if this strategy promotes neuritic growth in an in vitro model of the glial scar containing CSPG. ChABC allowed for some regeneration across the once potently inhibitory substrate. Combining ChABC treatment with expression of caRheb in DRG significantly improved this growth. We then determined if this combination strategy also enhanced regeneration through the DREZ after dorsal root crush in adult rats in vivo. After unilaterally crushing C4-T1 dorsal roots, we injected AAV5-caRheb or AAV5-GFP into the ipsilateral C5-C8 DRGs. ChABC or PBS was injected into the ipsilateral dorsal horn at C5-C8 to digest CSPG, for a total of four animal groups (caRheb + ChABC, caRheb + PBS, GFP + ChABC, GFP + PBS). Regeneration was rarely observed in PBS-treated animals, whereas short-distance regrowth across the DREZ was observed in ChABC-treated animals. No difference in axon number or length between the ChABC groups was observed, which may be related to intraganglionic inflammation induced by the injection. ChABC-mediated regeneration is functional, as stimulation of ipsilateral median and ulnar nerves induced neuronal c-Fos expression in deafferented dorsal horn in both ChABC groups. Interestingly, caRheb + ChABC animals had significantly more c-Fos+ nuclei indicating that caRheb expression in DRGs promoted functional synaptogenesis of their axons that regenerated beyond a ChABC-treated DREZ. PMID:27458339

  14. Vision Integrating Strategies in Ophthalmology and Neurochemistry (VISION)

    DTIC Science & Technology

    2011-02-01

    in the above figure. We have already tested this virus in P23H Rhodopsin rat model of retinitis pigmentosa and found that it has a therapeutic...We have established three different mouse models of ocular injury with different injury-initiating mechanisms (i.e. optic nerve crush, retinal ...functionally and structurally rescue photoreceptor cells in rodent models of retinal degeneration. She brings expertise in gene therapy and in cellular

  15. Recycled Asphalt Pavement and Crushed Concrete Backfill: State-of-the-Art Review and Material Characterization

    DOT National Transportation Integrated Search

    2001-10-01

    This report describes research results from the first year of a three-year study focused on the use of recycled asphalt pavement (RAP) and crushed concrete (CC) as backfill for mechanically stabilized earth (MSE) walls.

  16. Performance of gravel aggregates in superpave mixes with 100/95 angularity.

    DOT National Transportation Integrated Search

    2010-04-01

    The research conducted in this study evaluated the asphalt mixture performance of various gravel and : crushed stone sources consisting of different levels of crushed face counts, as determined by ASTM D5821. : Along with ASTM D5821, two additional a...

  17. Stone Quarrying, Crushing and Screening Facilities General Air Quality Permit Request for Coverage: Unimin Corporation - Unimin Flat Storage

    EPA Pesticide Factsheets

    Documents related to Request for Coverage under Stone Quarrying, Crushing and Screening Facilities General Permit, for the Unimin Corporation Silica Sand Rail Transloading Facility on the Fort Berhold Indian Reservation, North Dakota.

  18. Recycled Portland cement concrete pavements : Part II, state-of-the art summary.

    DOT National Transportation Integrated Search

    1979-01-01

    This report constitutes a review of the literature concerning recycling of portland cement concrete pavements by crushing the old pavement and reusing the crushed material as aggregate in a number of applications. A summary of the major projects cond...

  19. Further study of the intrinsic safety of internally shorted lithium and lithium-ion cells within methane-air

    PubMed Central

    Dubaniewicz, Thomas H.; DuCarme, Joseph P.

    2015-01-01

    National Institute for Occupational Safety and Health (NIOSH) researchers continue to study the potential for lithium and lithium-ion battery thermal runaway from an internal short circuit in equipment for use in underground coal mines. Researchers conducted cell crush tests using a plastic wedge within a 20-L explosion-containment chamber filled with 6.5% CH4-air to simulate the mining hazard. The present work extends earlier findings to include a study of LiFePO4 cells crushed while under charge, prismatic form factor LiCoO2 cells, primary spiral-wound constructed LiMnO2 cells, and crush speed influence on thermal runaway susceptibility. The plastic wedge crush was a more severe test than the flat plate crush with a prismatic format cell. Test results indicate that prismatic Saft MP 174565 LiCoO2 and primary spiral-wound Saft FRIWO M52EX LiMnO2 cells pose a CH4-air ignition hazard from internal short circuit. Under specified test conditions, A123 systems ANR26650M1A LiFePO4 cylindrical cells produced no chamber ignitions while under a charge of up to 5 A. Common spiral-wound cell separators are too thin to meet intrinsic safety standards provisions for distance through solid insulation, suggesting that a hard internal short circuit within these cells should be considered for intrinsic safety evaluation purposes, even as a non-countable fault. Observed flames from a LiMnO2 spiral-wound cell after a chamber ignition within an inert atmosphere indicate a sustained exothermic reaction within the cell. The influence of crush speed on ignitions under specified test conditions was not statistically significant. PMID:26139958

  20. Reducing the startup time of aerobic granular sludge reactors through seeding floccular sludge with crushed aerobic granules.

    PubMed

    Pijuan, Maite; Werner, Ursula; Yuan, Zhiguo

    2011-10-15

    One of the main challenging issues for the aerobic granular sludge technology is the long startup time when dealing with real wastewaters. This study presents a novel strategy to reduce the time required for granulation while ensuring a high level of nutrient removal. This new approach consists of seeding the reactor with a mixture of crushed aerobic granules and floccular sludge. The effectiveness of the strategy was demonstrated using abattoir wastewater, containing nitrogen and phosphorus at approximately 250 mgN/L and 30 mgP/L, respectively. Seven different mixtures of crushed granules and floccular sludge at granular sludge fractions (w/w in dry mass) of 0%, 5%, 10%, 15%, 25%, 30% and 50% were used to start eight granulation processes. The granulation time (defined as the time when the 10th percentile bacterial aggregate size is larger than 200 μm) displayed a strong dependency on the fraction of granular sludge. The shortest granulation time of 18 days was obtained with 50% crushed granules, in comparison with 133 days with 5% crushed granules. Full granulation was not achieved in the two trials without seeding with crushed granules. In contrast to the 100% floccular sludge cases, where a substantial loss of biomass occurred during granulation, the biomass concentration in all other trails did not decrease during granulation. This allowed that good nitrogen removal was maintained in all the reactors during the granulation process. However, enhanced biological phosphorus removal was achieved in only one of the eight trials. This was likely due to the temporary accumulation of nitrite, a strong inhibitor of polyphosphate accumulating organisms. Copyright © 2011 Elsevier Ltd. All rights reserved.

  1. Further study of the intrinsic safety of internally shorted lithium and lithium-ion cells within methane-air.

    PubMed

    Dubaniewicz, Thomas H; DuCarme, Joseph P

    2014-11-01

    National Institute for Occupational Safety and Health (NIOSH) researchers continue to study the potential for lithium and lithium-ion battery thermal runaway from an internal short circuit in equipment for use in underground coal mines. Researchers conducted cell crush tests using a plastic wedge within a 20-L explosion-containment chamber filled with 6.5% CH 4 -air to simulate the mining hazard. The present work extends earlier findings to include a study of LiFePO 4 cells crushed while under charge, prismatic form factor LiCoO 2 cells, primary spiral-wound constructed LiMnO 2 cells, and crush speed influence on thermal runaway susceptibility. The plastic wedge crush was a more severe test than the flat plate crush with a prismatic format cell. Test results indicate that prismatic Saft MP 174565 LiCoO 2 and primary spiral-wound Saft FRIWO M52EX LiMnO 2 cells pose a CH 4 -air ignition hazard from internal short circuit. Under specified test conditions, A123 systems ANR26650M1A LiFePO 4 cylindrical cells produced no chamber ignitions while under a charge of up to 5 A. Common spiral-wound cell separators are too thin to meet intrinsic safety standards provisions for distance through solid insulation, suggesting that a hard internal short circuit within these cells should be considered for intrinsic safety evaluation purposes, even as a non-countable fault. Observed flames from a LiMnO 2 spiral-wound cell after a chamber ignition within an inert atmosphere indicate a sustained exothermic reaction within the cell. The influence of crush speed on ignitions under specified test conditions was not statistically significant.

  2. Effect of the crushing process on Raman analyses: consequences for the Mars 2018 mission

    NASA Astrophysics Data System (ADS)

    Foucher, Frédéric; Westall, Frances; Bost, Nicolas; Rull, Fernando; Lopez-Reyes, Guillermo; Rüßmann, Philipp

    2012-07-01

    The payload of the 2018 Mars mission will comprise a Raman spectrometer as part of its instrument suite. Analyses with this instrument will be made on crushed samples. The crushing process will cause loss of important structural context and could change the physical properties of the studied materials resulting in misinterpretation of the data. We therefore investigated the influence of granulometry on the Raman spectrum of various minerals and rocks using laboratory equipment and the RLS Raman instrument being developed for the Pasteur payload of the ExoMars mission. The aim was to determine what influence the crushing process could have on the correct identification of rocks and minerals and the detection of possible traces of life. Whatever the sample type, our study shows that the crushing process leads to a strong increase in the background level and to a decrease in the signal/noise ratio. Moreover, for certain minerals, the Raman spectra can be significantly modified: the peaks are shifted and broadened and new peaks can appear. Since mineral identification using Raman spectroscopy is made by comparison with database spectra, this kind of change could lead to misinterpretation of the spectra and thus must be taken into account during the in situ investigation. However, the results obtained with the ExoMars instrument showed that, probably due to its irradiance and resolution characteristics, these effects are relatively limited and most of the time not observed with the RLS instrument. Finally, the loss of texture associated with the crushing process is shown to complicate identification of rocks with subsequent consequences for the eventual detection and interpretation of past traces of life. But, on the other hand, it is shown that the mixing of the components in the powder could facilitate the detection of minor phases.

  3. TESS: a geometric hashing algorithm for deriving 3D coordinate templates for searching structural databases. Application to enzyme active sites.

    PubMed Central

    Wallace, A. C.; Borkakoti, N.; Thornton, J. M.

    1997-01-01

    It is well established that sequence templates such as those in the PROSITE and PRINTS databases are powerful tools for predicting the biological function and tertiary structure for newly derived protein sequences. The number of X-ray and NMR protein structures is increasing rapidly and it is apparent that a 3D equivalent of the sequence templates is needed. Here, we describe an algorithm called TESS that automatically derives 3D templates from structures deposited in the Brookhaven Protein Data Bank. While a new sequence can be searched for sequence patterns, a new structure can be scanned against these 3D templates to identify functional sites. As examples, 3D templates are derived for enzymes with an O-His-O "catalytic triad" and for the ribonucleases and lysozymes. When these 3D templates are applied to a large data set of nonidentical proteins, several interesting hits are located. This suggests that the development of a 3D template database may help to identify the function of new protein structures, if unknown, as well as to design proteins with specific functions. PMID:9385633

  4. Social Signals--Mike's Crush

    ERIC Educational Resources Information Center

    Mitelman, Stephanie; Kohorn, Olivia Von

    2012-01-01

    This review discusses the unique audiovisual-based curriculum "Mike's Crush", by Nancy Nowell, and briefly describes the autism spectrum and its associated challenges. The review explores the curriculum's noteworthy approach to teaching social skills and recommends it as helpful material for all educators, especially for those working with…

  5. The design of temporary sediment controls with special reference to water quality.

    DOT National Transportation Integrated Search

    1975-01-01

    The laboratory and field trapping efficiencies of several types of flow barriers were ascertained. The materials used to fabricate the barriers were various types of hay straw crushed stone and crushed stone/straw mixes. Field checks of systems of ba...

  6. VIEW ALONG RAW MATERIAL CONVEYOR AT RIGHT WITH CRUSHED SHELL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW ALONG RAW MATERIAL CONVEYOR AT RIGHT WITH CRUSHED SHELL CONVEYOR ABOVE. ENGINE AND RADIATOR AT LOWER LEFT. - F. & H. Benning Company Oyster Mill, 14430 Solomons Island Road (moved from 1014 Benning Road, Galesville, Anne Arundel County, Maryland), Solomons, Calvert County, MD

  7. Detoxification of castor meal through reactive seed crushing

    USDA-ARS?s Scientific Manuscript database

    Non-edible oil crops, such as castor or jatropha, contain several toxic components. Post-harvest treatments should be used to reduce the risks associated with the possible dispersion of toxic compounds in the environment. A new processing technology named Reactive Seed Crushing was developed, which ...

  8. Ball mill tool for crushing coffee and cocoa beans base on fraction size sieving results

    NASA Astrophysics Data System (ADS)

    Haryanto, B.; Sirait, M.; Azalea, M.; Alvin; Cahyani, S. E.

    2018-02-01

    Crushing is one of the operation units that aimed to convert the size of solid material to be smoother particle’s size. The operation unit that can be used in this crushing is ball mill. The purpose of this study is to foresee the effect of raw material mass, grinding time, and the number of balls that are used in the ball mill tool related to the amount of raw material of coffee and cocoa beans. Solid material that has become smooth is then sieved with sieve mesh with size number: 50, 70, 100, and 140. It is in order to obtain the mass fraction that escaped from each sieve mesh. From the experiment, it can be concluded that mass percentage fraction of coffee powder is bigger than cocoa powder that escaped from the mesh. Hardness and humidity of coffee beans and cocoa beans have been the important factors that made coffee beans is easier to be crushed than cocoa beans.

  9. Axial Crushing Behaviors of Thin-Walled Corrugated and Circular Tubes - A Comparative Study

    NASA Astrophysics Data System (ADS)

    Reyaz-Ur-Rahim, Mohd.; Bharti, P. K.; Umer, Afaque

    2017-10-01

    With the help of finite element analysis, this research paper deals with the energy absorption and collapse behavior with different corrugated section geometries of hollow tubes made of aluminum alloy 6060-T4. Literature available experimental data were used to validate the numerical models of the structures investigated. Based on the results available for symmetric crushing of circular tubes, models were developed to investigate corrugated thin-walled structures behavior. To study the collapse mechanism and energy absorbing ability in axial compression, the simulation was carried in ABAQUS /EXPLICIT code. In the simulation part, specimens were prepared and axially crushed to one-fourth length of the tube and the energy diagram of crushing force versus axial displacement is shown. The effect of various parameters such as pitch, mean diameter, corrugation, amplitude, the thickness is demonstrated with the help of diagrams. The overall result shows that the corrugated section geometry could be a good alternative to the conventional tubes.

  10. Intravenous mesenchymal stem cell therapy after recurrent laryngeal nerve injury: a preliminary study.

    PubMed

    Lerner, Michael Z; Matsushita, Takashi; Lankford, Karen L; Radtke, Christine; Kocsis, Jeffery D; Young, Nwanmegha O

    2014-11-01

    Intravenous administration of mesenchymal stem cells (MSCs) has been recently shown to enhance functional recovery after stroke and spinal cord injury. The therapeutic properties of MSCs are attributed to their secretion of a variety of potent antiinflammatory and neurotrophic factors. We hypothesize that intravenous administration of MSCs after recurrent laryngeal nerve (RLN) injury in the rat may enhance functional recovery. Animal Research. Twelve 250-gram Sprague-Dawley rats underwent a controlled crush injury to the left RLN. After confirming postoperative vocal fold immobility, each rat was intravenously infused with either green fluorescent protein-expressing MSCs or control media in a randomized and blinded fashion. Videolaryngoscopy was performed weekly. The laryngoscopy video recordings were reviewed and rated by a fellowship-trained laryngologist who remained blinded to the intervention using a 0 to 3 scale. At 1 week postinjury, the MSC-infused group showed a trend for higher average functional recovery scores compared to the control group (2.2 vs 1.3), but it did not reach statistical significance (P value of 0.06). By 2 weeks, however, both groups exhibited complete return of function. These pilot data indicate that with complete nerve transection by crush injury of the RLN in rat, there is complete recovery of vocal fold mobility at 2 weeks. At 1 week postinjury, animals receiving intravenous infusion of MSCs showed a trend for greater functional recovery, suggesting a potential beneficial effect of MSCs; however, this did not reach statistical significance. Therefore, no definite conclusions can be drawn from these data and further study is required. N/A. © 2014 The American Laryngological, Rhinological and Otological Society, Inc.

  11. The effect of roof strength on reducing occupant injury in rollovers.

    PubMed

    Herbst, Brian; Forrest, Steve; Orton, Tia; Meyer, Steven E; Sances, Anthony; Kumaresan, Srirangam

    2005-01-01

    Roof crush occurs and potentially contributes to serious or fatal occupant injury in 26% of rollovers. It is likely that glazing retention is related to the degree of roof crush experienced in rollover accidents. Occupant ejection (including partial ejection) is the leading cause of death and injury in rollover accidents. In fatal passenger car accidents involving ejection, 34% were ejected through the side windows. Side window glass retention during a rollover is likely to significantly reduce occupant ejections. The inverted drop test methodology is a test procedure to evaluate the structural integrity of roofs under loadings similar to those seen in real world rollovers. Recent testing on many different vehicle types indicates that damage consistent with field rollover accidents can be achieved through inverted drop testing at very small drop heights. Drop test comparisons were performed on 16 pairs of vehicles representing a large spectrum of vehicle types. Each vehicle pair includes a production vehicle and a vehicle with a reinforced roof structure dropped under the same test conditions. This paper offers several examples of post-production reinforcements to roof structures that significantly increase the crush resistance of the roof as measured by inverted drop tests. These modifications were implemented with minimal impact on vehicle styling, interior space and visual clearances. The results of these modifications indicate that roof crush can be mitigated by nearly an order of magnitude, as roof crush was reduced by 44-91% with only a 1-2.3% increase in vehicle weight. Additionally, this paper analyzes the glazing breakage patterns in the moveable tempered side windows on the side adjacent to the vehicle impact point in the inverted drop tests. A comparison is made between the production vehicles and the reinforced vehicles in order to determine if the amount roof crush is related to glazing integrity in the side windows. Lastly, two drop test pairs, performed with Hybrid III test dummies, indicates that the reduction of roof crush resulted in a direct reduction in neck loading and therefore an increase in occupant protection.

  12. MALDI-TOF MS identification of Anopheles gambiae Giles blood meal crushed on Whatman filter papers.

    PubMed

    Niare, Sirama; Almeras, Lionel; Tandina, Fatalmoudou; Yssouf, Amina; Bacar, Affane; Toilibou, Ali; Doumbo, Ogobara; Raoult, Didier; Parola, Philippe

    2017-01-01

    Identification of the source of mosquito blood meals is an important component for disease control and surveillance. Recently, matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) profiling has emerged as an effective tool for mosquito blood meal identification, using the abdomens of freshly engorged mosquitoes. In the field, mosquito abdomens are crushed on Whatman filter papers to determine the host feeding patterns by identifying the origin of their blood meals. The aim of this study was to test whether crushing engorged mosquito abdomens on Whatman filter papers was compatible with MALDI-TOF MS for mosquito blood meal identification. Both laboratory reared and field collected mosquitoes were tested. Sixty Anopheles gambiae Giles were experimentally engorged on the blood of six distinct vertebrate hosts (human, sheep, rabbit, dog, chicken and rat). The engorged mosquito abdomens were crushed on Whatman filter papers for MALDI-TOF MS analysis. 150 Whatman filter papers, with mosquitoes engorged on cow and goat blood, were preserved. A total of 77 engorged mosquito abdomens collected in the Comoros Islands and crushed on Whatman filter papers were tested with MALDI-TOF MS. The MS profiles generated from mosquito engorged abdomens crushed on Whatman filter papers exhibited high reproducibility according to the original host blood. The blood meal host was correctly identified from mosquito abdomens crushed on Whatman filter papers by MALDI-TOF MS. The MS spectra obtained after storage were stable regardless of the room temperature and whether or not they were frozen. The MS profiles were reproducible for up to three months. For the Comoros samples, 70/77 quality MS spectra were obtained and matched with human blood spectra. This was confirmed by molecular tools. The results demonstrated that MALDI-TOF MS could identify mosquito blood meals from Whatman filter papers collected in the field during entomological surveys. The application of MALDI-TOF MS has proved to be rapid and successful, making it a new and efficient tool for mosquito-borne disease surveillance.

  13. Technics study on high accuracy crush dressing and sharpening of diamond grinding wheel

    NASA Astrophysics Data System (ADS)

    Jia, Yunhai; Lu, Xuejun; Li, Jiangang; Zhu, Lixin; Song, Yingjie

    2011-05-01

    Mechanical grinding of artificial diamond grinding wheel was traditional wheel dressing process. The rotate speed and infeed depth of tool wheel were main technics parameters. The suitable technics parameters of metals-bonded diamond grinding wheel and resin-bonded diamond grinding wheel high accuracy crush dressing were obtained by a mount of experiment in super-hard material wheel dressing grind machine and by analysis of grinding force. In the same time, the effect of machine sharpening and sprinkle granule sharpening was contrasted. These analyses and lots of experiments had extent instruction significance to artificial diamond grinding wheel accuracy crush dressing.

  14. Municipal waste processing apparatus

    DOEpatents

    Mayberry, John L.

    1988-01-01

    Municipal waste materials are processed by crushing the materials so that pieces of noncombustible material are smaller than a selected size and pieces of combustible material are larger than the selected size. The crushed materials are placed on a vibrating mesh screen conveyor belt having openings which pass the smaller, noncombustible pieces of material, but do not pass the larger, combustible pieces of material. Pieces of material which become lodged in the openings of the conveyor belt may be removed by cylindrical deraggers or pressurized air. The crushed materials may be fed onto the conveyor belt by a vibrating feed plate which shakes the materials so that they tend to lie flat.

  15. 6. FF coal pulverizer (ball mill inside). GG building in ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. FF coal pulverizer (ball mill inside). GG building in background did preliminary crushing; pulverizer to left, coal conveyor and air cleaning towers to right; conveyor on left brought crushed coal to FF. Looking north/northeast - Rouge Steel Company, 3001 Miller Road, Dearborn, MI

  16. A field observation of rotational feeding by Neogobius melanostomus

    EPA Science Inventory

    Video documentation was obtained of the invasive benthic fish, Neogobius melanostomus, the round goby, feeding on crushed dreissenid mussels at a depth of 12 m in Georgian Bay of Lake Huron, Canada. Gobies used rotational or twist feeding to tear away particles from crushed musse...

  17. Use of wastes derived from earthquakes for the production of concrete masonry partition wall blocks.

    PubMed

    Xiao, Zhao; Ling, Tung-Chai; Kou, Shi-Cong; Wang, Qingyuan; Poon, Chi-Sun

    2011-08-01

    Utilization of construction and demolition (C&D) wastes as recycled aggregates in the production of concrete and concrete products have attracted much attention in recent years. However, the presence of large quantities of crushed clay brick in some the C&D waste streams (e.g. waste derived collapsed masonry buildings after an earthquake) renders the recycled aggregates unsuitable for high grade use. One possibility is to make use of the low grade recycled aggregates for concrete block production. In this paper, we report the results of a comprehensive study to assess the feasibility of using crushed clay brick as coarse and fine aggregates in concrete masonry block production. The effects of the content of crushed coarse and fine clay brick aggregates (CBA) on the mechanical properties of non-structural concrete block were quantified. From the experimental test results, it was observed that incorporating the crushed clay brick aggregates had a significant influence on the properties of blocks. The hardened density and drying shrinkage of the block specimens decreased with an increase in CBA content. The use of CBA increased the water absorption of block specimens. The results suggested that the amount of crushed clay brick to be used in concrete masonry blocks should be controlled at less than 25% (coarse aggregate) and within 50-75% for fine aggregates. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. The mechanism of muscle injury in the crush syndrome: ischemic versus pressure-stretch myopathy.

    PubMed

    Better, O S; Abassi, Z; Rubinstein, I; Marom, S; Winaver, Y; Silberman, M

    1990-01-01

    Crush injuries are ubiquitous, common sequelae in victims of seismic, industrial and military catastrophes, and were considered to be mainly due to ischemia of the affected limbs. Our clinical experience suggests that early in the crush syndrome, interference with the circulation may occur but is rare. The predominant earliest lesion in the crush syndrome is postulated to be pressure-stretch myopathy, rather than ischemic myopathy. It is proposed that at the membrane level, stretch increases sarcoplasmic influx of Na, Cl, H2O and Ca down their electrochemical gradient. Energy-requiring cationic extrusion pumps work at maximal capacity, but are unable to cope with the increased load. This results in cell swelling and increase in cytosolic and mitochondrial calcium with activation of autolytic destructive processes and interference with cellular respiration. Extensive muscle swelling may cause late muscle tamponade and myoneural ischemic damage (compartmental syndrome). Thus, whereas prevalent theory suggests that the sarcolemmal cationic pump activity is attenuated in the crush syndrome due to early ischemia, we propose that the cationic extrusion pump is maximally activated as in the amphotericin B model. Because the cationic pump is maximally activated in the stretched muscle and in cells exposed to amphotericin, these models rapidly deplete their scarce ATP stores and are susceptible to hypoxia in the face of initially normal circulation.

  19. Resource-Efficient Data-Intensive System Designs for High Performance and Capacity

    DTIC Science & Technology

    2015-09-01

    76, 79, 80, and 81.] [9] Anirudh Badam, KyoungSoo Park, Vivek S. Pai, and Larry L. Peterson. HashCache: cache storage for the next billion. In Proc...Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows , Tushar Chandra, Andrew Fikes, and Robert E. Gruber. Bigtable: A

  20. Two Improved Access Methods on Compact Binary (CB) Trees.

    ERIC Educational Resources Information Center

    Shishibori, Masami; Koyama, Masafumi; Okada, Makoto; Aoe, Jun-ichi

    2000-01-01

    Discusses information retrieval and the use of binary trees as a fast access method for search strategies such as hashing. Proposes new methods based on compact binary trees that provide faster access and more compact storage, explains the theoretical basis, and confirms the validity of the methods through empirical observations. (LRW)

Top