Sample records for identification strategy exploits

  1. User-driven sampling strategies in image exploitation

    NASA Astrophysics Data System (ADS)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  2. User-Driven Sampling Strategies in Image Exploitation

    DOE PAGES

    Harvey, Neal R.; Porter, Reid B.

    2013-12-23

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-drivenmore » sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. We discovered that in user-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. Furthermore, in preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.« less

  3. Optimal exploitation strategies for an animal population in a stochastic serially correlated environment

    USGS Publications Warehouse

    Anderson, D.R.

    1974-01-01

    Optimal exploitation strategies were studied for an animal population in a stochastic, serially correlated environment. This is a general case and encompasses a number of important cases as simplifications. Data on the mallard (Anas platyrhynchos) were used to explore the exploitation strategies and test several hypotheses because relatively much is known concerning the life history and general ecology of this species and extensive empirical data are available for analysis. The number of small ponds on the central breeding grounds was used as an index to the state of the environment. Desirable properties of an optimal exploitation strategy were defined. A mathematical model was formulated to provide a synthesis of the existing literature, estimates of parameters developed from an analysis of data, and hypotheses regarding the specific effect of exploitation on total survival. Both the literature and the analysis of data were inconclusive concerning the effect of exploitation on survival. Therefore, alternative hypotheses were formulated: (1) exploitation mortality represents a largely additive form of mortality, or (2 ) exploitation mortality is compensatory with other forms of mortality, at least to some threshold level. Models incorporating these two hypotheses were formulated as stochastic dynamic programming models and optimal exploitation strategies were derived numerically on a digital computer. Optimal exploitation strategies were found to exist under rather general conditions. Direct feedback control was an integral component in the optimal decision-making process. Optimal exploitation was found to be substantially different depending upon the hypothesis regarding the effect of exploitation on the population. Assuming that exploitation is largely an additive force of mortality, optimal exploitation decisions are a convex function of the size of the breeding population and a linear or slightly concave function of the environmental conditions. Optimal

  4. Effects of Behavioural Strategy on the Exploitative Competition Dynamics.

    PubMed

    Nguyen-Ngoc, Doanh; Nguyen-Phuong, Thuy

    2016-12-01

    We investigate a system of two species exploiting a common resource. We consider both abiotic (i.e. with a constant resource supply rate) and biotic (i.e. with resource reproduction and self-limitation) resources. We are interested in the asymmetric competition where a given consumer is the locally superior resource exploiter (LSE) and the other is the locally inferior resource exploiter (LIE). They also interact directly via interference competition in the sense that LIE individuals can use two opposite strategies to compete with LSE individuals: we assume, in the first case, that LIE uses an avoiding strategy, i.e. LIE individuals go to a non-competition patch to avoids competition with LSE individuals, and in the second one, LIE uses an aggressive strategy, i.e. being very aggressive so that LSE individuals have to go to a non-competition patch. We further assume that there is no resource in the non-competition patch so that individuals have to come back to the competition patch for their maintenance, and the migration process acts on a fast time scale in comparison with demography and competition processes. The models show that being aggressive is efficient for LIE's survival and even provoke global extinction of the LSE and this result does not depend on the nature of resource.

  5. Dissemination and Exploitation: Project Goals beyond Science

    NASA Astrophysics Data System (ADS)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  6. Self-organization, collective decision making and resource exploitation strategies in social insects

    NASA Astrophysics Data System (ADS)

    Nicolis, S. C.; Dussutour, A.

    2008-10-01

    Amplifying communications are a ubiquitous characteristic of group-living animals. This work is concerned with their role in the processes of food recruitment and resource exploitation by social insects. The collective choices made by ants faced with different food sources are analyzed using both a mean field description and a stochastic approach. Emphasis is placed on the possibility of optimizing the recruitment and exploitation strategies through an appropriate balance between individual variability, cooperative interactions and environmental constraints.

  7. Infomax Strategies for an Optimal Balance Between Exploration and Exploitation

    NASA Astrophysics Data System (ADS)

    Reddy, Gautam; Celani, Antonio; Vergassola, Massimo

    2016-06-01

    Proper balance between exploitation and exploration is what makes good decisions that achieve high reward, like payoff or evolutionary fitness. The Infomax principle postulates that maximization of information directs the function of diverse systems, from living systems to artificial neural networks. While specific applications turn out to be successful, the validity of information as a proxy for reward remains unclear. Here, we consider the multi-armed bandit decision problem, which features arms (slot-machines) of unknown probabilities of success and a player trying to maximize cumulative payoff by choosing the sequence of arms to play. We show that an Infomax strategy (Info-p) which optimally gathers information on the highest probability of success among the arms, saturates known optimal bounds and compares favorably to existing policies. Conversely, gathering information on the identity of the best arm in the bandit leads to a strategy that is vastly suboptimal in terms of payoff. The nature of the quantity selected for Infomax acquisition is then crucial for effective tradeoffs between exploration and exploitation.

  8. Optimal exploitation strategies for an animal population in a Markovian environment: A theory and an example

    USGS Publications Warehouse

    Anderson, D.R.

    1975-01-01

    Optimal exploitation strategies were studied for an animal population in a Markovian (stochastic, serially correlated) environment. This is a general case and encompasses a number of important special cases as simplifications. Extensive empirical data on the Mallard (Anas platyrhynchos) were used as an example of general theory. The number of small ponds on the central breeding grounds was used as an index to the state of the environment. A general mathematical model was formulated to provide a synthesis of the existing literature, estimates of parameters developed from an analysis of data, and hypotheses regarding the specific effect of exploitation on total survival. The literature and analysis of data were inconclusive concerning the effect of exploitation on survival. Therefore, two hypotheses were explored: (1) exploitation mortality represents a largely additive form of mortality, and (2) exploitation mortality is compensatory with other forms of mortality, at least to some threshold level. Models incorporating these two hypotheses were formulated as stochastic dynamic programming models and optimal exploitation strategies were derived numerically on a digital computer. Optimal exploitation strategies were found to exist under the rather general conditions. Direct feedback control was an integral component in the optimal decision-making process. Optimal exploitation was found to be substantially different depending upon the hypothesis regarding the effect of exploitation on the population. If we assume that exploitation is largely an additive force of mortality in Mallards, then optimal exploitation decisions are a convex function of the size of the breeding population and a linear or slight concave function of the environmental conditions. Under the hypothesis of compensatory mortality forces, optimal exploitation decisions are approximately linearly related to the size of the Mallard breeding population. Dynamic programming is suggested as a very general

  9. The Exploitive Mating Strategy of the Dark Triad Traits: Tests of Rape-Enabling Attitudes.

    PubMed

    Jonason, Peter K; Girgis, Mary; Milne-Home, Josephine

    2017-04-01

    The Dark Triad traits have been repeatedly labeled as facilitating an exploitive mating strategy. However, various researchers have repeatedly conflated short-term mating or casual sex with an exploitive mating strategy. In this study using Mechanical Turk participants (N = 252; 142 men, 110 women), we provided a better test of just how sexually exploitive those high on the Dark Triad traits might be by examining how the traits related to rape-enabling attitudes. We examined how each trait may facilitate rape, whether these associations were robust to partialing the variance associated with the Big Five traits and similar in men and women, and showed that one reason why men may be more likely to rape than women is they are characterized by the Dark Triad traits more than women are. In so doing, we test the confluence model of rape that asserts that personality traits similar to the Dark Triad traits act as one pathway to rape.

  10. Sampling strategies exploiting multi-pumping flow systems.

    PubMed

    Prior, João A V; Santos, João L M; Lima, José L F C

    2003-04-01

    In this work new strategies were exploited to implement multi-pumping flow systems relying on the utilisation of multiple devices that act simultaneously as sample-insertion, reagent-introduction, and solution-propelling units. The solenoid micro-pumps that were initially used as the only active elements of multi-pumping systems, and which were able to produce pulses of 3 to 25 microL, were replaced by syringe pumps with the aim of producing pulses between 1 and 4 microL. The performance of the developed flow system was assessed by using distinct sample-insertion strategies like single sample volume, merging zones, and binary sampling in the spectrophotometric determination of isoniazid in pharmaceutical formulations upon reaction with 1,2-naphthoquinone-4-sulfonate, in alkaline medium. The results obtained showed that enhanced sample/reagent mixing could be obtained with binary sampling and by using a 1 microL per step pump, even in limited dispersion conditions. Moreover, syringe pumps produce very reproducible flowing streams and are easily manipulated and controlled by a computer program, which is greatly simplified since they are the only active manifold component. Linear calibration plots up to 18.0 microg mL(-1), with a relative standard deviation of less than 1.48% (n=10) and a throughput of about 20 samples per hour, were obtained.

  11. Synergy in spreading processes: from exploitative to explorative foraging strategies.

    PubMed

    Pérez-Reche, Francisco J; Ludlam, Jonathan J; Taraskin, Sergei N; Gilligan, Christopher A

    2011-05-27

    An epidemiological model which incorporates synergistic effects that allow the infectivity and/or susceptibility of hosts to be dependent on the number of infected neighbors is proposed. Constructive synergy induces an exploitative behavior which results in a rapid invasion that infects a large number of hosts. Interfering synergy leads to a slower and sparser explorative foraging strategy that traverses larger distances by infecting fewer hosts. The model can be mapped to a dynamical bond percolation with spatial correlations that affect the mechanism of spread but do not influence the critical behavior of epidemics. © 2011 American Physical Society

  12. Laser vibrometry exploitation for vehicle identification

    NASA Astrophysics Data System (ADS)

    Nolan, Adam; Lingg, Andrew; Goley, Steve; Sigmund, Kevin; Kangas, Scott

    2014-06-01

    Vibration signatures sensed from distant vehicles using laser vibrometry systems provide valuable information that may be used to help identify key vehicle features such as engine type, engine speed, and number of cylinders. Through the use of physics models of the vibration phenomenology, features are chosen to support classification algorithms. Various individual exploitation algorithms were developed using these models to classify vibration signatures into engine type (piston vs. turbine), engine configuration (Inline 4 vs. Inline 6 vs. V6 vs. V8 vs. V12) and vehicle type. The results of these algorithms will be presented for an 8 class problem. Finally, the benefits of using a factor graph representation to link these independent algorithms together will be presented which constructs a classification hierarchy for the vibration exploitation problem.

  13. Exploitation of manipulators: 'hitch-hiking' as a parasite transmission strategy.

    PubMed

    Thomas; Renaud; Poulin

    1998-07-01

    For many parasites with complex life cycles, manipulation of host behaviour is an adaptation to increase the probability of successful transmission. Since manipulation is likely to be costly, other parasites may exploit hosts already manipulated so as to ensure their transmission without investing in manipulation. Such a cheating strategy, called 'hitch-hiking', could be adaptive in a range of situations. We first propose and discuss criteria that should be met by any parasite to be considered a hitch-hiker. Then, to understand the evolution of the hitch-hiking strategy, we use simple mathematical models to analyse the influence of several variables on the potential benefits for a nonmanipulative parasite of actively seeking a ride to the definitive host with a manipulative parasite. The models suggest that the prevalence or abundance of manipulative parasites will be a key determinant of whether hitch-hiking can be an advantageous option for other parasites. Copyright 1998 The Association for the Study of Animal Behaviour.

  14. Identification of NAFTA-induced opportunities for Louisiana's ports and waterways : technical summary.

    DOT National Transportation Integrated Search

    1996-11-01

    This study identifies NAFTA-induced market opportunities for Louisianas maritime sector and to help define the strategies, maritime services, and port infrastructure requirements necessary to exploit these opportunities. Identification of current ...

  15. Emerging new strategies for successful metabolite identification in metabolomics

    PubMed Central

    Bingol, Kerem; Bruschweiler-Li, Lei; Li, Dawei; Zhang, Bo; Xie, Mouzhe; Brüschweiler, Rafael

    2016-01-01

    This review discusses strategies for the identification of metabolites in complex biological mixtures, as encountered in metabolomics, which have emerged in the recent past. These include NMR database-assisted approaches for the identification of commonly known metabolites as well as novel combinations of NMR and MS analysis methods for the identification of unknown metabolites. The use of certain chemical additives to the NMR tube can permit identification of metabolites with specific physical chemical properties. PMID:26915807

  16. Sex workers perspectives on strategies to reduce sexual exploitation and HIV risk: a qualitative study in Tijuana, Mexico.

    PubMed

    Goldenberg, Shira M; Engstrom, David; Rolon, Maria Luisa; Silverman, Jay G; Strathdee, Steffanie A

    2013-01-01

    Globally, female sex workers are a population at greatly elevated risk of HIV infection, and the reasons for and context of sex industry involvement have key implications for HIV risk and prevention. Evidence suggests that experiences of sexual exploitation (i.e., forced/coerced sex exchange) contribute to health-related harms. However, public health interventions that address HIV vulnerability and sexual exploitation are lacking. Therefore, the objective of this study was to elicit recommendations for interventions to prevent sexual exploitation and reduce HIV risk from current female sex workers with a history of sexual exploitation or youth sex work. From 2010-2011, we conducted in-depth interviews with sex workers (n = 31) in Tijuana, Mexico who reported having previously experienced sexual exploitation or youth sex work. Participants recommended that interventions aim to (1) reduce susceptibility to sexual exploitation by providing social support and peer-based education; (2) mitigate harms by improving access to HIV prevention resources and psychological support, and reducing gender-based violence; and (3) provide opportunities to exit the sex industry via vocational supports and improved access to effective drug treatment. Structural interventions incorporating these strategies are recommended to reduce susceptibility to sexual exploitation and enhance capacities to prevent HIV infection among marginalized women and girls in Mexico and across international settings.

  17. Efficient and effective pruning strategies for health data de-identification.

    PubMed

    Prasser, Fabian; Kohlmayer, Florian; Kuhn, Klaus A

    2016-04-30

    Privacy must be protected when sensitive biomedical data is shared, e.g. for research purposes. Data de-identification is an important safeguard, where datasets are transformed to meet two conflicting objectives: minimizing re-identification risks while maximizing data quality. Typically, de-identification methods search a solution space of possible data transformations to find a good solution to a given de-identification problem. In this process, parts of the search space must be excluded to maintain scalability. The set of transformations which are solution candidates is typically narrowed down by storing the results obtained during the search process and then using them to predict properties of the output of other transformations in terms of privacy (first objective) and data quality (second objective). However, due to the exponential growth of the size of the search space, previous implementations of this method are not well-suited when datasets contain many attributes which need to be protected. As this is often the case with biomedical research data, e.g. as a result of longitudinal collection, we have developed a novel method. Our approach combines the mathematical concept of antichains with a data structure inspired by prefix trees to represent properties of a large number of data transformations while requiring only a minimal amount of information to be stored. To analyze the improvements which can be achieved by adopting our method, we have integrated it into an existing algorithm and we have also implemented a simple best-first branch and bound search (BFS) algorithm as a first step towards methods which fully exploit our approach. We have evaluated these implementations with several real-world datasets and the k-anonymity privacy model. When integrated into existing de-identification algorithms for low-dimensional data, our approach reduced memory requirements by up to one order of magnitude and execution times by up to 25 %. This allowed us to increase

  18. Early identification and high-risk strategies for bipolar disorder.

    PubMed

    Correll, Christoph U; Penzner, Julie B; Lencz, Todd; Auther, Andrea; Smith, Christopher W; Malhotra, Anil K; Kane, John M; Cornblatt, Barbara A

    2007-06-01

    To describe and compare the relative merits of different identification strategies for individuals at risk for bipolar disorder (BPD). Selective review of data that support early identification in BPD, with a particular focus on emerging clinical high-risk strategies. Early detection of individuals at risk for BPD can utilize genetic, endophenotypic and clinical methods. Most published work focuses on genetic familial endophenotypic risk markers for BPD. However, despite encouraging results, problems with specificity and sensitivity limit the application of these data to early prevention programs. In addition, offspring studies of BPD patients systematically exclude the majority of subjects without a first-degree bipolar relative. On the other hand, emerging work in the clinical-high-risk arena has already produced encouraging results. Although still preliminary, the identification of individuals in subsyndromal or attenuated symptom 'prodromal' stages of BPD seems to be an under-researched area that holds considerable promise deserving increased attention. Required next steps include the development of rating tools for attenuated and subsyndromal manic and depressive symptoms and of prodromal criteria that will allow prodromal symptomatology to be systematically studied in patients with recent-onset bipolar, as well as in prospective population-based phenomenology trials and attenuated symptom-based high-risk studies. Given the current limitations of each early identification method, combining clinical, endophenotypic and genetic strategies will increase prediction accuracy. Since reliable biological markers for BPD have not been established and since most patients with BPD lack a first-degree relative with this disorder, clinical high-risk approaches have great potential to inform early identification and intervention programs.

  19. Sex Workers Perspectives on Strategies to Reduce Sexual Exploitation and HIV Risk: A Qualitative Study in Tijuana, Mexico

    PubMed Central

    Goldenberg, Shira M.; Engstrom, David; Rolon, Maria Luisa; Silverman, Jay G.; Strathdee, Steffanie A.

    2013-01-01

    Globally, female sex workers are a population at greatly elevated risk of HIV infection, and the reasons for and context of sex industry involvement have key implications for HIV risk and prevention. Evidence suggests that experiences of sexual exploitation (i.e., forced/coerced sex exchange) contribute to health-related harms. However, public health interventions that address HIV vulnerability and sexual exploitation are lacking. Therefore, the objective of this study was to elicit recommendations for interventions to prevent sexual exploitation and reduce HIV risk from current female sex workers with a history of sexual exploitation or youth sex work. From 2010–2011, we conducted in-depth interviews with sex workers (n = 31) in Tijuana, Mexico who reported having previously experienced sexual exploitation or youth sex work. Participants recommended that interventions aim to (1) reduce susceptibility to sexual exploitation by providing social support and peer-based education; (2) mitigate harms by improving access to HIV prevention resources and psychological support, and reducing gender-based violence; and (3) provide opportunities to exit the sex industry via vocational supports and improved access to effective drug treatment. Structural interventions incorporating these strategies are recommended to reduce susceptibility to sexual exploitation and enhance capacities to prevent HIV infection among marginalized women and girls in Mexico and across international settings. PMID:24023661

  20. A comparative proteomics method for multiple samples based on a 18O-reference strategy and a quantitation and identification-decoupled strategy.

    PubMed

    Wang, Hongbin; Zhang, Yongqian; Gui, Shuqi; Zhang, Yong; Lu, Fuping; Deng, Yulin

    2017-08-15

    Comparisons across large numbers of samples are frequently necessary in quantitative proteomics. Many quantitative methods used in proteomics are based on stable isotope labeling, but most of these are only useful for comparing two samples. For up to eight samples, the iTRAQ labeling technique can be used. For greater numbers of samples, the label-free method has been used, but this method was criticized for low reproducibility and accuracy. An ingenious strategy has been introduced, comparing each sample against a 18 O-labeled reference sample that was created by pooling equal amounts of all samples. However, it is necessary to use proportion-known protein mixtures to investigate and evaluate this new strategy. Another problem for comparative proteomics of multiple samples is the poor coincidence and reproducibility in protein identification results across samples. In present study, a method combining 18 O-reference strategy and a quantitation and identification-decoupled strategy was investigated with proportion-known protein mixtures. The results obviously demonstrated that the 18 O-reference strategy had greater accuracy and reliability than other previously used comparison methods based on transferring comparison or label-free strategies. By the decoupling strategy, the quantification data acquired by LC-MS and the identification data acquired by LC-MS/MS are matched and correlated to identify differential expressed proteins, according to retention time and accurate mass. This strategy made protein identification possible for all samples using a single pooled sample, and therefore gave a good reproducibility in protein identification across multiple samples, and allowed for optimizing peptide identification separately so as to identify more proteins. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Challenges to the rapid identification of children who have been trafficked for commercial sexual exploitation.

    PubMed

    Rafferty, Yvonne

    2016-02-01

    Child trafficking for commercial sexual exploitation (CSE) is a complex phenomenon, requiring multifaceted programs and policies by various stakeholders. A number of publications have focused on preventing this heinous crime. Less attention, however, has been paid to the recovery and rehabilitation of children who have been traumatized as a result of being trafficked for CSE. This article focuses on the first step in the protection and recovery process, which is to ensure that procedures are in place for their identification, so that they might access timely and appropriate assistance. It highlights three situational and two child-related challenges to identification. In addition, it describes the additional victimization experienced by children who are wrongly arrested for crimes associated with prostitution or illegal border crossings, rather than being identified as victims. An extensive literature review was conducted, and included academic publications, as well as governmental and non-governmental reports. In addition, field-based qualitative research was undertaken in South and Southeast Asia, and involved interviews with representatives from United Nations and governmental agencies, non-governmental organizations (NGOs), and aftercare recovery programs. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Trait-based characterisation of soil exploitation strategies of banana, weeds and cover plant species

    PubMed Central

    Tardy, Florence; Damour, Gaëlle; Dorel, Marc; Moreau, Delphine

    2017-01-01

    Cover plants can be introduced in cropping systems to provide agroecosystem services, including weed control via competition for resources. There is currently no consensus on how to identify the best cover plant species, while trait-based approaches are promising for screening plant species due to their agroecosystem service provision potential. This study was carried out to characterize soil exploitation strategies of cover plant species in banana agroecosystems using a trait-based approach, and in turn identify cover plant species with a high weed control potential via competition for soil resources in banana cropping systems. A field experiment was conducted on 17 cover plant species, two weed species and two banana cultivars grown individually. Four functional traits were measured. Two of them (i.e., the size of the zone explored by roots and the root impact density) were used to characterize root system soil exploration patterns. Two other traits (i.e., specific root length and root diameter) were used to characterize resource acquisition within the soil zone explored by the roots. All studied traits exhibited marked variations among species. The findings suggested a trade-off between the abilities of species to develop a limited number of large diameter roots exploring a large soil zone versus many thin roots exploring a smaller soil zone. Three soil-resource exploitation strategies were identified among species: (i) with large diameter roots that explore a large soil zone; (ii) with small diameter roots and a high specific length that explore a smaller soil zone; and (iii) with a high total root-impact density and an intermediate specific root length that explore the uppermost soil layers. Interestingly, in our panel of species, no correlations with regard to belowground and aboveground strategies were noted: species with an acquisitive belowground strategy could display an acquisitive or a conservative aboveground strategy. The findings of this study

  3. Trait-based characterisation of soil exploitation strategies of banana, weeds and cover plant species.

    PubMed

    Tardy, Florence; Damour, Gaëlle; Dorel, Marc; Moreau, Delphine

    2017-01-01

    Cover plants can be introduced in cropping systems to provide agroecosystem services, including weed control via competition for resources. There is currently no consensus on how to identify the best cover plant species, while trait-based approaches are promising for screening plant species due to their agroecosystem service provision potential. This study was carried out to characterize soil exploitation strategies of cover plant species in banana agroecosystems using a trait-based approach, and in turn identify cover plant species with a high weed control potential via competition for soil resources in banana cropping systems. A field experiment was conducted on 17 cover plant species, two weed species and two banana cultivars grown individually. Four functional traits were measured. Two of them (i.e., the size of the zone explored by roots and the root impact density) were used to characterize root system soil exploration patterns. Two other traits (i.e., specific root length and root diameter) were used to characterize resource acquisition within the soil zone explored by the roots. All studied traits exhibited marked variations among species. The findings suggested a trade-off between the abilities of species to develop a limited number of large diameter roots exploring a large soil zone versus many thin roots exploring a smaller soil zone. Three soil-resource exploitation strategies were identified among species: (i) with large diameter roots that explore a large soil zone; (ii) with small diameter roots and a high specific length that explore a smaller soil zone; and (iii) with a high total root-impact density and an intermediate specific root length that explore the uppermost soil layers. Interestingly, in our panel of species, no correlations with regard to belowground and aboveground strategies were noted: species with an acquisitive belowground strategy could display an acquisitive or a conservative aboveground strategy. The findings of this study

  4. A new disaster victim identification management strategy targeting "near identification-threshold" cases: Experiences from the Boxing Day tsunami.

    PubMed

    Wright, Kirsty; Mundorff, Amy; Chaseling, Janet; Forrest, Alexander; Maguire, Christopher; Crane, Denis I

    2015-05-01

    The international disaster victim identification (DVI) response to the Boxing Day tsunami, led by the Royal Thai Police in Phuket, Thailand, was one of the largest and most complex in DVI history. Referred to as the Thai Tsunami Victim Identification operation, the group comprised a multi-national, multi-agency, and multi-disciplinary team. The traditional DVI approach proved successful in identifying a large number of victims quickly. However, the team struggled to identify certain victims due to incomplete or poor quality ante-mortem and post-mortem data. In response to these challenges, a new 'near-threshold' DVI management strategy was implemented to target presumptive identifications and improve operational efficiency. The strategy was implemented by the DNA Team, therefore DNA kinship matches that just failed to reach the reporting threshold of 99.9% were prioritized, however the same approach could be taken by targeting, for example, cases with partial fingerprint matches. The presumptive DNA identifications were progressively filtered through the Investigation, Dental and Fingerprint Teams to add additional information necessary to either strengthen or conclusively exclude the identification. Over a five-month period 111 victims from ten countries were identified using this targeted approach. The new identifications comprised 87 adults, 24 children and included 97 Thai locals. New data from the Fingerprint Team established nearly 60% of the total near-threshold identifications and the combined DNA/Physical method was responsible for over 30%. Implementing the new strategy, targeting near-threshold cases, had positive management implications. The process initiated additional ante-mortem information collections, and established a much-needed, distinct "end-point" for unresolved cases. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  5. Tobacco Industry Promotional Strategies Targeting American Indians/Alaska Natives and Exploiting Tribal Sovereignty.

    PubMed

    Lempert, Lauren K; Glantz, Stanton A

    2018-03-12

    American Indians/Alaska Natives have the highest commercial tobacco use in the United States, resulting in higher tobacco-caused deaths and diseases than the general population. Some American Indians/Alaska Natives use commercial tobacco for ceremonial as well as recreational uses. Because federally-recognized Tribal lands are sovereign, they are not subject to state cigarette taxes and smokefree laws. This study analyzes tobacco industry promotional efforts specifically targeting American Indians/Alaska Natives and exploiting Tribal lands to understand appropriate policy responses in light of American Indians'/Alaska Natives' unique sovereign status and culture. We analyzed previously secret tobacco industry documents available at the Truth Tobacco Documents Library (https://industrydocuments.library.ucsf.edu/tobacco/). Tobacco companies used promotional strategies targeting American Indians/Alaska Natives and exploiting Tribal lands that leveraged the federally-recognized Tribes' unique sovereign status exempting them from state cigarette taxes and smokefree laws, and exploited some Tribes' existing traditional uses of ceremonial tobacco and poverty. Tactics included price reductions, coupons, giveaways, gaming promotions, charitable contributions and sponsorships. Additionally, tobacco companies built alliances with Tribal leaders to help improve their corporate image, advance ineffective "youth smoking prevention" programs, and defeat tobacco control policies. The industry's promotional tactics likely contribute to disparities in smoking prevalence and smoking-related diseases among American Indians//Alaska Natives. Proven policy interventions to address these disparities including tobacco price increases, cigarette taxes, comprehensive smokefree laws, and industry denormalization campaigns to reduce smoking prevalence and smoking-related disease could be considered by Tribal communities. The sovereign status of federally-recognized Tribes does not prevent them

  6. Identification of natural metabolites in mixture: a pattern recognition strategy based on (13)C NMR.

    PubMed

    Hubert, Jane; Nuzillard, Jean-Marc; Purson, Sylvain; Hamzaoui, Mahmoud; Borie, Nicolas; Reynaud, Romain; Renault, Jean-Hugues

    2014-03-18

    Because of their highly complex metabolite profile, the chemical characterization of bioactive natural extracts usually requires time-consuming multistep purification procedures to achieve the structural elucidation of pure individual metabolites. The aim of the present work was to develop a dereplication strategy for the identification of natural metabolites directly within mixtures. Exploiting the polarity range of metabolites, the principle was to rapidly fractionate a multigram quantity of a crude extract by centrifugal partition extraction (CPE). The obtained fractions of simplified chemical composition were subsequently analyzed by (13)C NMR. After automatic collection and alignment of (13)C signals across spectra, hierarchical clustering analysis (HCA) was performed for pattern recognition. As a result, strong correlations between (13)C signals of a single structure within the mixtures of the fraction series were visualized as chemical shift clusters. Each cluster was finally assigned to a molecular structure with the help of a locally built (13)C NMR chemical shift database. The proof of principle of this strategy was achieved on a simple model mixture of commercially available plant secondary metabolites and then applied to a bark extract of the African tree Anogeissus leiocarpus Guill. & Perr. (Combretaceae). Starting from 5 g of this genuine extract, the fraction series was generated by CPE in only 95 min. (13)C NMR analyses of all fractions followed by pattern recognition of (13)C chemical shifts resulted in the unambiguous identification of seven major compounds, namely, sericoside, trachelosperogenin E, ellagic acid, an epimer mixture of (+)-gallocatechin and (-)-epigallocatechin, 3,3'-di-O-methylellagic acid 4'-O-xylopyranoside, and 3,4,3'-tri-O-methylflavellagic acid 4'-O-glucopyranoside.

  7. Exploiting water versus tolerating drought: water-use strategies of trees in a secondary successional tropical dry forest.

    PubMed

    Pineda-García, Fernando; Paz, Horacio; Meinzer, Frederick C; Angeles, Guillermo

    2016-02-01

    In seasonal plant communities where water availability changes dramatically both between and within seasons, understanding the mechanisms that enable plants to exploit water pulses and to survive drought periods is crucial. By measuring rates of physiological processes, we examined the trade-off between water exploitation and drought tolerance among seedlings of trees of a tropical dry forest, and identified biophysical traits most closely associated with plant water-use strategies. We also explored whether early and late secondary successional species occupy different portions of trade-off axes. As predicted, species that maintained carbon capture, hydraulic function and leaf area at higher plant water deficits during drought had low photosynthetic rates, xylem hydraulic conductivity and growth rate under non-limiting water supply. Drought tolerance was associated with more dense leaf, stem and root tissues, whereas rapid resource acquisition was associated with greater stem water storage, larger vessel diameter and larger leaf area per mass invested. We offer evidence that the water exploitation versus drought tolerance trade-off drives species differentiation in the ability of tropical dry forest trees to deal with alternating water-drought pulses. However, we detected no evidence of strong functional differentiation between early and late successional species along the proposed trade-off axes, suggesting that the environmental gradient of water availability across secondary successional habitats in the dry tropics does not filter out physiological strategies of water use among species, at least at the seedling stage. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Novel identification strategy for ground coffee adulteration based on UPLC-HRMS oligosaccharide profiling.

    PubMed

    Cai, Tie; Ting, Hu; Jin-Lan, Zhang

    2016-01-01

    Coffee is one of the most common and most valuable beverages. According to International Coffee Organization (ICO) reports, the adulteration of coffee for financial reasons is regarded as the most serious threat to the sustainable development of the coffee market. In this work, a novel strategy for adulteration identification in ground coffee was developed based on UPLC-HRMS oligosaccharide profiling. Along with integrated statistical analysis, 17 oligosaccharide composition were identified as markers for the identification of soybeans and rice in ground coffee. This strategy, validated by manual mixtures, optimized both the reliability and authority of adulteration identification. Rice and soybean adulterants present in ground coffee in amounts as low as 5% were identified and evaluated. Some commercial ground coffees were also successfully tested using this strategy. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Design strategies from sexual exploitation and sex work studies among women and girls: Methodological considerations in a hidden and vulnerable population.

    PubMed

    Gerassi, Lara; Edmond, Tonya; Nichols, Andrea

    2017-06-01

    The study of sex trafficking, prostitution, sex work, and sexual exploitation is associated with many methodological issues and challenges. Researchers' study designs must consider the many safety issues related to this vulnerable and hidden population. Community advisory boards and key stakeholder involvement are essential to study design to increase safety of participants, usefulness of study aims, and meaningfulness of conclusions. Nonrandomized sampling strategies are most often utilized when studying exploited women and girls, which have the capacity to provide rich data and require complex sampling and recruitment methods. This article reviews the current methodological issues when studying this marginalized population as well as strategies to address challenges while working with the community in order to bring about social change. The authors also discuss their own experiences in collaborating with community organizations to conduct research in this field.

  10. Design strategies from sexual exploitation and sex work studies among women and girls: Methodological considerations in a hidden and vulnerable population

    PubMed Central

    Gerassi, Lara; Edmond, Tonya; Nichols, Andrea

    2016-01-01

    The study of sex trafficking, prostitution, sex work, and sexual exploitation is associated with many methodological issues and challenges. Researchers’ study designs must consider the many safety issues related to this vulnerable and hidden population. Community advisory boards and key stakeholder involvement are essential to study design to increase safety of participants, usefulness of study aims, and meaningfulness of conclusions. Nonrandomized sampling strategies are most often utilized when studying exploited women and girls, which have the capacity to provide rich data and require complex sampling and recruitment methods. This article reviews the current methodological issues when studying this marginalized population as well as strategies to address challenges while working with the community in order to bring about social change. The authors also discuss their own experiences in collaborating with community organizations to conduct research in this field. PMID:28824337

  11. Content-based image exploitation for situational awareness

    NASA Astrophysics Data System (ADS)

    Gains, David

    2008-04-01

    Image exploitation is of increasing importance to the enterprise of building situational awareness from multi-source data. It involves image acquisition, identification of objects of interest in imagery, storage, search and retrieval of imagery, and the distribution of imagery over possibly bandwidth limited networks. This paper describes an image exploitation application that uses image content alone to detect objects of interest, and that automatically establishes and preserves spatial and temporal relationships between images, cameras and objects. The application features an intuitive user interface that exposes all images and information generated by the system to an operator thus facilitating the formation of situational awareness.

  12. Optimal sensor placement for time-domain identification using a wavelet-based genetic algorithm

    NASA Astrophysics Data System (ADS)

    Mahdavi, Seyed Hossein; Razak, Hashim Abdul

    2016-06-01

    This paper presents a wavelet-based genetic algorithm strategy for optimal sensor placement (OSP) effective for time-domain structural identification. Initially, the GA-based fitness evaluation is significantly improved by using adaptive wavelet functions. Later, a multi-species decimal GA coding system is modified to be suitable for an efficient search around the local optima. In this regard, a local operation of mutation is introduced in addition with regeneration and reintroduction operators. It is concluded that different characteristics of applied force influence the features of structural responses, and therefore the accuracy of time-domain structural identification is directly affected. Thus, the reliable OSP strategy prior to the time-domain identification will be achieved by those methods dealing with minimizing the distance of simulated responses for the entire system and condensed system considering the force effects. The numerical and experimental verification on the effectiveness of the proposed strategy demonstrates the considerably high computational performance of the proposed OSP strategy, in terms of computational cost and the accuracy of identification. It is deduced that the robustness of the proposed OSP algorithm lies in the precise and fast fitness evaluation at larger sampling rates which result in the optimum evaluation of the GA-based exploration and exploitation phases towards the global optimum solution.

  13. Strategies for target identification of antimicrobial natural products.

    PubMed

    Farha, Maya A; Brown, Eric D

    2016-05-04

    Covering: 2000 to 2015Despite a pervasive decline in natural product research at many pharmaceutical companies over the last two decades, natural products have undeniably been a prolific and unsurpassed source for new lead antibacterial compounds. Due to their inherent complexity, natural extracts face several hurdles in high-throughout discovery programs, including target identification. Target identification and validation is a crucial process for advancing hits through the discovery pipeline, but has remained a major bottleneck. In the case of natural products, extremely low yields and limited compound supply further impede the process. Here, we review the wealth of target identification strategies that have been proposed and implemented for the characterization of novel antibacterials. Traditionally, these have included genomic and biochemical-based approaches, which, in recent years, have been improved with modern-day technology and better honed for natural product discovery. Further, we discuss the more recent innovative approaches for uncovering the target of new antibacterial natural products, which have resulted from modern advances in chemical biology tools. Finally, we present unique screening platforms implemented to streamline the process of target identification. The different innovative methods to respond to the challenge of characterizing the mode of action for antibacterial natural products have cumulatively built useful frameworks that may advocate a renovated interest in natural product drug discovery programs.

  14. Rapid identification of red-flesh loquat cultivars using EST-SSR markers based on manual cultivar identification diagram strategy.

    PubMed

    Li, X Y; Xu, H X; Chen, J W

    2014-04-29

    Manual cultivar identification diagram is a new strategy for plant cultivar identification based on DNA markers, providing information to efficiently separate cultivars. We tested 25 pairs of apple EST-SSR primers for amplification of PCR products from loquat cultivars. These EST-SSR primers provided clear amplification products from the loquat cultivars, with a relatively high transferability rate of 84% to loquat; 11 pairs of primers amplified polymorphic products. After analysis of 24 red-fleshed loquat accessions, we found that only 7 pairs of primers could clearly separate all of them. A cultivar identification diagram of the 24 cultivars was constructed using polymorphic bands from the DNA fingerprints and EST-SSR primers. Any two of the 24 cultivars could be rapidly separated from each other, according to the polymorphic bands from the cultivars; the corresponding primers were marked in the correct position on the cultivar identification diagram. This red-flesh loquat cultivar identification diagram can separate the 24 red-flesh loquat cultivars, which is of benefit for loquat cultivar identification for germplasm management and breeding programs.

  15. [Progress in the spectral library based protein identification strategy].

    PubMed

    Yu, Derui; Ma, Jie; Xie, Zengyan; Bai, Mingze; Zhu, Yunping; Shu, Kunxian

    2018-04-25

    Exponential growth of the mass spectrometry (MS) data is exhibited when the mass spectrometry-based proteomics has been developing rapidly. It is a great challenge to develop some quick, accurate and repeatable methods to identify peptides and proteins. Nowadays, the spectral library searching has become a mature strategy for tandem mass spectra based proteins identification in proteomics, which searches the experiment spectra against a collection of confidently identified MS/MS spectra that have been observed previously, and fully utilizes the abundance in the spectrum, peaks from non-canonical fragment ions, and other features. This review provides an overview of the implement of spectral library search strategy, and two key steps, spectral library construction and spectral library searching comprehensively, and discusses the progress and challenge of the library search strategy.

  16. Availability Control for Means of Transport in Decisive Semi-Markov Models of Exploitation Process

    NASA Astrophysics Data System (ADS)

    Migawa, Klaudiusz

    2012-12-01

    The issues presented in this research paper refer to problems connected with the control process for exploitation implemented in the complex systems of exploitation for technical objects. The article presents the description of the method concerning the control availability for technical objects (means of transport) on the basis of the mathematical model of the exploitation process with the implementation of the decisive processes by semi-Markov. The presented method means focused on the preparing the decisive for the exploitation process for technical objects (semi-Markov model) and after that specifying the best control strategy (optimal strategy) from among possible decisive variants in accordance with the approved criterion (criteria) of the activity evaluation of the system of exploitation for technical objects. In the presented method specifying the optimal strategy for control availability in the technical objects means a choice of a sequence of control decisions made in individual states of modelled exploitation process for which the function being a criterion of evaluation reaches the extreme value. In order to choose the optimal control strategy the implementation of the genetic algorithm was chosen. The opinions were presented on the example of the exploitation process of the means of transport implemented in the real system of the bus municipal transport. The model of the exploitation process for the means of transports was prepared on the basis of the results implemented in the real transport system. The mathematical model of the exploitation process was built taking into consideration the fact that the model of the process constitutes the homogenous semi-Markov process.

  17. Commercial Sexual Exploitation of Children and State Child Welfare Systems.

    PubMed

    Bounds, Dawn; Julion, Wrenetha A; Delaney, Kathleen R

    2015-01-01

    In several states, commercial sexual exploitation of children (CSEC) is now a reportable child abuse offense. Illinois has taken the lead in tackling the issue and the Illinois experience illuminates valuable lessons. This article delineates the protection, practice, and policy implications that evolve when CSEC falls under a state child welfare system. The specific aims are to (a) discuss CSEC, its victims, risks, harms, and challenges inherent in providing effective care; (b) use Illinois as an exemplar to explicate the consequences and implementation challenges of establishing a state reporting system that frames CSEC as a child welfare issue; (c) recommend strategies for developing effective state reporting models, and (d) demonstrate how nurses are well poised to advocate for victims of human trafficking on both state and national levels. Recommendations for improving the identification of CSEC victims and overcoming challenges to state implementation are offered. © The Author(s) 2015.

  18. The Illusions and Juxtapositions of Commercial Sexual Exploitation among Youth: Identifying Effective Street-Outreach Strategies

    PubMed Central

    HOLGER-AMBROSE, BETH; LANGMADE, CHEREE; EDINBURGH, LAUREL D.; SAEWYC, ELIZABETH

    2015-01-01

    To explore sexually exploited youths’ perspectives of how street outreach workers can effectively provide outreach and connections to services, we conducted qualitative interviews with 13 female participants, ages 14–22, in a Midwestern U.S. city. Participants reported multiple types of exploitation, most first exploited by age 13, plus substance use, and recurrent homelessness. Nearly all had a pimp, and all used the internet as a venue for sexual exploitation. Participants wanted outreach workers to use “soft words” to refer to exploitation. They expressed contradictory images of their “boyfriend” pimps and their exploitation. They wanted outreach workers to “provide resources,” “be non-judgmental,” ”listen,” and “care.” Street outreach can be one way to support sexually exploited youth, but should occur in multiple settings. PMID:23590353

  19. Exploiting the Bioactive Properties of the Dentin-Pulp Complex in Regenerative Endodontics.

    PubMed

    Smith, Anthony J; Duncan, Henry F; Diogenes, Anibal; Simon, Stephane; Cooper, Paul R

    2016-01-01

    The development of regenerative endodontic therapies offers exciting opportunities for future improvements in treatment outcomes. Advances in our understanding of regenerative events at the molecular and cellular levels are helping to underpin development of these therapies, although the various strategies differ in the translational challenges they pose. The identification of a variety of bioactive molecules, including growth factors, cytokines, chemokines, and matrix molecules, sequestered within dentin and dental pulp provides the opportunity to present key signaling molecules promoting reparative and regenerative events after injury. The protection of the biological activity of these molecules by mineral in dentin before their release allows a continuing supply of these molecules, while avoiding the short half-life and the non-human origin of exogenous molecules. The ready release of these bioactive molecules by the various tissue preparation agents, medicaments, and materials commonly used in endodontics highlights the opportunities for translational regenerative strategies exploiting these molecules with little change to existing clinical practice. Copyright © 2016 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  20. Flies and humans share a motion estimation strategy that exploits natural scene statistics

    PubMed Central

    Clark, Damon A.; Fitzgerald, James E.; Ales, Justin M.; Gohl, Daryl M.; Silies, Marion A.; Norcia, Anthony M.; Clandinin, Thomas R.

    2014-01-01

    Sighted animals extract motion information from visual scenes by processing spatiotemporal patterns of light falling on the retina. The dominant models for motion estimation exploit intensity correlations only between pairs of points in space and time. Moving natural scenes, however, contain more complex correlations. Here we show that fly and human visual systems encode the combined direction and contrast polarity of moving edges using triple correlations that enhance motion estimation in natural environments. Both species extract triple correlations with neural substrates tuned for light or dark edges, and sensitivity to specific triple correlations is retained even as light and dark edge motion signals are combined. Thus, both species separately process light and dark image contrasts to capture motion signatures that can improve estimation accuracy. This striking convergence argues that statistical structures in natural scenes have profoundly affected visual processing, driving a common computational strategy over 500 million years of evolution. PMID:24390225

  1. Trauma-Focused Cognitive Behavioral Therapy for Commercially Sexually Exploited Youth.

    PubMed

    Cohen, Judith A; Mannarino, Anthony P; Kinnish, Kelly

    2017-06-01

    Commercially sexually exploited children and adolescents ("commercially exploited youth")present numerous clinical challenges that have led some mental health providers to question whether current evidence-based treatments are adequate to address the needs of this population. This paper 1) addresses commonalities between the trauma experiences, responses and treatment challenges of commercially exploited youth and those of youth with complex trauma; 2) highlights the importance of careful assessment to guide case conceptualization and treatment planning for commercially exploited youth; and 3) describes strategies for implementing Trauma-Focused Cognitive Behavioral Therapy for complex trauma specific to these youth.

  2. A multiple-dimension liquid chromatography coupled with mass spectrometry data strategy for the rapid discovery and identification of unknown compounds from a Chinese herbal formula (Er-xian decoction).

    PubMed

    Wang, Caihong; Zhang, Jinlan; Wu, Caisheng; Wang, Zhe

    2017-10-06

    It is very important to rapidly discover and identify the multiple components of traditional Chinese medicine (TCM) formula. High performance liquid chromatography with high resolution tandem mass spectrometry (HPLC-HRMS/MS) has been widely used to analyze TCM formula and contains multiple-dimension data including retention time (RT), high resolution mass (HRMS), multiple-stage mass spectrometric (MS n ), and isotope intensity distribution (IID) data. So it is very necessary to exploit a useful strategy to utilize multiple-dimension data to rapidly probe structural information and identify chemical compounds. In this study, a new strategy to initiatively use the multiple-dimension LC-MS data has been developed to discover and identify unknown compounds of TCM in many styles. The strategy guarantees the fast discovery of candidate structural information and provides efficient structure clues for identification. The strategy contains four steps in sequence: (1) to discover potential compounds and obtain sub-structure information by the mass spectral tree similarity filter (MTSF) technique, based on HRMS and MS n data; (2) to classify potential compounds into known chemical classes by discriminant analysis (DA) on the basis of RT and HRMS data; (3) to hit the candidate structural information of compounds by intersection sub-structure between MTSF and DA (M,D-INSS); (4) to annotate and confirm candidate structures by IID data. This strategy allowed for the high exclusion efficiency (greater than 41%) of irrelevant ions in er-xian decoction (EXD) while providing accurate structural information of 553 potential compounds and identifying 66 candidates, therefore accelerating and simplifying the discovery and identification of unknown compounds in TCM formula. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Understanding and Responding to the Needs of Commercially Sexually Exploited Youth: Recommendations for the Mental Health Provider.

    PubMed

    Ijadi-Maghsoodi, Roya; Cook, Mekeila; Barnert, Elizabeth S; Gaboian, Shushanik; Bath, Eraka

    2016-01-01

    Mental health providers are frequently at the forefront of addressing the multifaceted needs of commercially sexually exploited youth. This article provides an overview of the definition of commercial sexual exploitation of children and relevant legislation including the shift toward decriminalization of commercially sexually exploited youth. To provide clinicians with tools needed to deliver competent care to this population, a review of risk factors for commercial sexual exploitation of children and the role of the clinician in identification, assessment, and treatment of commercially sexually exploited youth are discussed. Published by Elsevier Inc.

  4. The Importance of the Eye Area in Face Identification Abilities and Visual Search Strategies in Persons with Asperger Syndrome

    ERIC Educational Resources Information Center

    Falkmer, Marita; Larsson, Matilda; Bjallmark, Anna; Falkmer, Torbjorn

    2010-01-01

    Partly claimed to explain social difficulties observed in people with Asperger syndrome, face identification and visual search strategies become important. Previous research findings are, however, disparate. In order to explore face identification abilities and visual search strategies, with special focus on the importance of the eye area, 24…

  5. Exploit and ignore the consequences: A mother of planetary issues.

    PubMed

    Moustafa, Khaled

    2016-07-01

    Many environmental and planetary issues are due to an exploitation strategy based on exploit, consume and ignore the consequences. As many natural and environmental resources are limited in time and space, such exploitation approach causes important damages on earth, in the sea and maybe soon in the space. To sustain conditions under which humans and other living species can coexist in productive and dynamic harmony with their environments, terrestrial and space exploration programs may need to be based on 'scrutinize the consequences, prepare adequate solutions and then, only then, exploit'. Otherwise, the exploitation of planetary resources may put the environmental stability and sustainability at a higher risk than it is currently predicted. Copyright © 2016 Elsevier B.V. All rights reserved.

  6. Exploit and ignore the consequences: A mother of planetary issues

    NASA Astrophysics Data System (ADS)

    Moustafa, K.

    2016-07-01

    Many environmental and planetary issues are due to an exploitation strategy based on exploit, consume and ignore the consequences. As many natural and environmental resources are limited in time and space, such exploitation approach causes important damages on earth, in the sea and maybe soon in the space. To sustain conditions under which humans and other living species can coexist in productive and dynamic harmony with their environments, terrestrial and space exploration programs may need to be based on 'scrutinize the consequences, prepare adequate solutions and then, only then, exploit'. Otherwise, the exploitation of planetary resources may put the environmental stability and sustainability at a higher risk than it is currently predicted. (C) 2016 Elsevier B.V. All rights reserved.

  7. The Illusions and Juxtapositions of Commercial Sexual Exploitation among Youth: Identifying Effective Street-Outreach Strategies

    ERIC Educational Resources Information Center

    Holger-Ambrose, Beth; Langmade, Cheree; Edinburgh, Laurel D.; Saewyc, Elizabeth

    2013-01-01

    To explore sexually exploited youths' perspectives of how street outreach workers can effectively provide outreach and connections to services, we conducted qualitative interviews with 13 female participants, ages 14 to 22, in a Midwest U.S. city. Participants reported multiple types of exploitation, most first exploited by age 13, plus substance…

  8. A new strategy for complete identification of sea buckthorn cultivars by using random amplified polymorphic DNA markers.

    PubMed

    Yang, G; Ding, J; Wu, L R; Duan, Y D; Li, A Y; Shan, J Y; Wu, Y X

    2015-03-13

    DNA fingerprinting is both a popular and important technique with several advantages in plant cultivar identification. However, this technique has not been used widely and efficiently in practical plant identification because the analysis and recording of data generated from fingerprinting and genotyping are tedious and difficult. We developed a novel approach known as a cultivar identification diagram (CID) strategy that uses DNA markers to separate plant individuals in a more efficient, practical, and referable manner. A CID was manually constructed and a polymorphic marker was generated from each polymerase chain reaction for sample separation. In this study, 67 important sea buckthorn cultivars cultivated in China were successfully separated with random amplified polymorphic DNA markers using the CID analysis strategy, with only seven 11-nucleotide primers employed. The utilization of the CID of these 67 sea buckthorn cultivars was verified by identifying 2 randomly chosen groups of cultivars among the 67 cultivars. The main advantages of this identification strategy include fewer primers used and separation of all cultivars using the corresponding primers. This sea buckthorn CID was able to separate any sea buckthorn cultivars among the 67 studied, which is useful for sea buckthorn cultivar identification, cultivar-right-protection, and for the sea buckthorn nursery industry in China.

  9. Boldness predicts an individual's position along an exploration-exploitation foraging trade-off.

    PubMed

    Patrick, Samantha C; Pinaud, David; Weimerskirch, Henri

    2017-09-01

    Individuals do not have complete information about the environment and therefore they face a trade-off between gathering information (exploration) and gathering resources (exploitation). Studies have shown individual differences in components of this trade-off but how stable these strategies are in a population and the intrinsic drivers of these differences is not well understood. Top marine predators are expected to experience a particularly strong trade-off as many species have large foraging ranges and their prey often have a patchy distribution. This environment leads these species to exhibit pronounced exploration and exploitation phases but differences between individuals are poorly resolved. Personality differences are known to be important in foraging behaviour but also in the trade-off between exploration and exploitation. Here we test whether personality predicts an individual exploration-exploitation strategy using wide ranging wandering albatrosses (Diomedea exulans) as a model system. Using GPS tracking data from 276 wandering albatrosses, we extract foraging parameters indicative of exploration (searching) and exploitation (foraging) and show that foraging effort, time in patch and size of patch are strongly correlated, demonstrating these are indicative of an exploration-exploitation (EE) strategy. Furthermore, we show these are consistent within individuals and appear stable in the population, with no reproductive advantage. The searching and foraging behaviour of bolder birds placed them towards the exploration end of the trade-off, whereas shy birds showed greater exploitation. This result provides a mechanism through which individual foraging strategies may emerge. Age and sex affected components of the trade-off, but not the trade-off itself, suggesting these factors may drive behavioural compensation to maintain resource acquisition and this was supported by the evidence that there were no fitness consequence of any EE trait nor the trade

  10. Plant stress signalling: understanding and exploiting plant-plant interactions.

    PubMed

    Pickett, J A; Rasmussen, H B; Woodcock, C M; Matthes, M; Napier, J A

    2003-02-01

    When plants are attacked by insects, volatile chemical signals can be released, not only from the damaged parts, but also systemically from other parts of the plant and this continues after cessation of feeding by the insect. These signals are perceived by olfactory sensory mechanisms in both the herbivorous insects and their parasites. Molecular structures involved can be characterized by means of electrophysiological assays, using the insect sensory system linked to chemical analysis. Evidence is mounting that such signals can also affect neighbouring intact plants, which initiate defence by the induction of further signalling systems, such as those that increase parasitoid foraging. Furthermore, insect electrophysiology can be used in the identification of plant compounds having effects on the plants themselves. It has been found recently that certain plants can release stress signals even when undamaged, and that these can cause defence responses in intact plants. These discoveries provide the basis for new crop protection strategies, that are either delivered by genetic modification of plants or by conventionally produced plants to which the signal is externally applied. Delivery can also be made by means of mixed seed strategies in which the provoking and recipient plants are grown together. Related signalling discoveries within the rhizosphere seem set to extend these approaches into new ways of controlling weeds, by exploiting the elusive potential of allelopathy, but through signalling rather than by direct physiological effects.

  11. Bifocal Stereo for Multipath Person Re-Identification

    NASA Astrophysics Data System (ADS)

    Blott, G.; Heipke, C.

    2017-11-01

    This work presents an approach for the task of person re-identification by exploiting bifocal stereo cameras. Present monocular person re-identification approaches show a decreasing working distance, when increasing the image resolution to obtain a higher reidentification performance. We propose a novel 3D multipath bifocal approach, containing a rectilinear lens with larger focal length for long range distances and a fish eye lens of a smaller focal length for the near range. The person re-identification performance is at least on par with 2D re-identification approaches but the working distance of the approach is increased and on average 10% more re-identification performance can be achieved in the overlapping field of view compared to a single camera. In addition, the 3D information is exploited from the overlapping field of view to solve potential 2D ambiguities.

  12. Identification of animal behavioral strategies by inverse reinforcement learning.

    PubMed

    Yamaguchi, Shoichiro; Naoki, Honda; Ikeda, Muneki; Tsukada, Yuki; Nakano, Shunji; Mori, Ikue; Ishii, Shin

    2018-05-01

    Animals are able to reach a desired state in an environment by controlling various behavioral patterns. Identification of the behavioral strategy used for this control is important for understanding animals' decision-making and is fundamental to dissect information processing done by the nervous system. However, methods for quantifying such behavioral strategies have not been fully established. In this study, we developed an inverse reinforcement-learning (IRL) framework to identify an animal's behavioral strategy from behavioral time-series data. We applied this framework to C. elegans thermotactic behavior; after cultivation at a constant temperature with or without food, fed worms prefer, while starved worms avoid the cultivation temperature on a thermal gradient. Our IRL approach revealed that the fed worms used both the absolute temperature and its temporal derivative and that their behavior involved two strategies: directed migration (DM) and isothermal migration (IM). With DM, worms efficiently reached specific temperatures, which explains their thermotactic behavior when fed. With IM, worms moved along a constant temperature, which reflects isothermal tracking, well-observed in previous studies. In contrast to fed animals, starved worms escaped the cultivation temperature using only the absolute, but not the temporal derivative of temperature. We also investigated the neural basis underlying these strategies, by applying our method to thermosensory neuron-deficient worms. Thus, our IRL-based approach is useful in identifying animal strategies from behavioral time-series data and could be applied to a wide range of behavioral studies, including decision-making, in other organisms.

  13. Identification of agents effective against multiple toxins and viruses by host-oriented cell targeting.

    PubMed

    Zilbermintz, Leeor; Leonardi, William; Jeong, Sun-Young; Sjodt, Megan; McComb, Ryan; Ho, Chi-Lee C; Retterer, Cary; Gharaibeh, Dima; Zamani, Rouzbeh; Soloveva, Veronica; Bavari, Sina; Levitin, Anastasia; West, Joel; Bradley, Kenneth A; Clubb, Robert T; Cohen, Stanley N; Gupta, Vivek; Martchenko, Mikhail

    2015-08-27

    A longstanding and still-increasing threat to the effective treatment of infectious diseases is resistance to antimicrobial countermeasures. Potentially, the targeting of host proteins and pathways essential for the detrimental effects of pathogens offers an approach that may discover broad-spectrum anti-pathogen countermeasures and circumvent the effects of pathogen mutations leading to resistance. Here we report implementation of a strategy for discovering broad-spectrum host-oriented therapies against multiple pathogenic agents by multiplex screening of drugs for protection against the detrimental effects of multiple pathogens, identification of host cell pathways inhibited by the drug, and screening for effects of the agent on other pathogens exploiting the same pathway. We show that a clinically used antimalarial drug, Amodiaquine, discovered by this strategy, protects host cells against infection by multiple toxins and viruses by inhibiting host cathepsin B. Our results reveal the practicality of discovering broadly acting anti-pathogen countermeasures that target host proteins exploited by pathogens.

  14. Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies.

    PubMed

    Kushida, Clete A; Nichols, Deborah A; Jadrnicek, Rik; Miller, Ric; Walsh, James K; Griffin, Kara

    2012-07-01

    De-identification and anonymization are strategies that are used to remove patient identifiers in electronic health record data. The use of these strategies in multicenter research studies is paramount in importance, given the need to share electronic health record data across multiple environments and institutions while safeguarding patient privacy. Systematic literature search using keywords of de-identify, deidentify, de-identification, deidentification, anonymize, anonymization, data scrubbing, and text scrubbing. Search was conducted up to June 30, 2011 and involved 6 different common literature databases. A total of 1798 prospective citations were identified, and 94 full-text articles met the criteria for review and the corresponding articles were obtained. Search results were supplemented by review of 26 additional full-text articles; a total of 120 full-text articles were reviewed. A final sample of 45 articles met inclusion criteria for review and discussion. Articles were grouped into text, images, and biological sample categories. For text-based strategies, the approaches were segregated into heuristic, lexical, and pattern-based systems versus statistical learning-based systems. For images, approaches that de-identified photographic facial images and magnetic resonance image data were described. For biological samples, approaches that managed the identifiers linked with these samples were discussed, particularly with respect to meeting the anonymization requirements needed for Institutional Review Board exemption under the Common Rule. Current de-identification strategies have their limitations, and statistical learning-based systems have distinct advantages over other approaches for the de-identification of free text. True anonymization is challenging, and further work is needed in the areas of de-identification of datasets and protection of genetic information.

  15. [Platelet allo-antibodies identification strategies for preventing and managing platelet refractoriness].

    PubMed

    Basire, A; Picard, C

    2014-11-01

    Platelet refractoriness is a serious complication for patients receiving recurrent platelet transfusions, which can be explained by non-immune and immune causes. Human Leukocyte Antigens (HLA) allo-immunization, especially against HLA class I, is the major cause for immune platelet refractoriness. To a lesser extent, allo-antibodies against specific Human Platelet Antigen (HPA) are also involved. Pregnancy, transplantation and previous transfusions can lead to allo-immune reaction against platelet antigens. After transfusion, platelet count is decreased by accelerated platelet destruction related to antibodies fixation on incompatible platelet antigens. New laboratory tests for allo-antibodies identification were developed to improve sensibility and specificity, especially with the LUMINEX(®) technology. The good use and interpretation of these antibodies assays can improve strategies for platelet refractoriness prevention and management with a patient adapted response. Compatible platelets units can be selected according to their identity with recipient typing or immune compatibility regarding HLA or HPA antibodies or HLA epitope compatibility. Prospective studies are needed to further confirm the clinical benefit of new allo-antibodies identification methods and consensus strategies for immune platelet refractoriness management. Copyright © 2014 Elsevier Masson SAS. All rights reserved.

  16. Rapid Identification of Candida Species by Using Nuclear Magnetic Resonance Spectroscopy and a Statistical Classification Strategy

    PubMed Central

    Himmelreich, Uwe; Somorjai, Ray L.; Dolenko, Brion; Lee, Ok Cha; Daniel, Heide-Marie; Murray, Ronan; Mountford, Carolyn E.; Sorrell, Tania C.

    2003-01-01

    Nuclear magnetic resonance (NMR) spectra were acquired from suspensions of clinically important yeast species of the genus Candida to characterize the relationship between metabolite profiles and species identification. Major metabolites were identified by using two-dimensional correlation NMR spectroscopy. One-dimensional proton NMR spectra were analyzed by using a staged statistical classification strategy. Analysis of NMR spectra from 442 isolates of Candida albicans, C. glabrata, C. krusei, C. parapsilosis, and C. tropicalis resulted in rapid, accurate identification when compared with conventional and DNA-based identification. Spectral regions used for the classification of the five yeast species revealed species-specific differences in relative amounts of lipids, trehalose, polyols, and other metabolites. Isolates of C. parapsilosis and C. glabrata with unusual PCR fingerprinting patterns also generated atypical NMR spectra, suggesting the possibility of intraspecies discontinuity. We conclude that NMR spectroscopy combined with a statistical classification strategy is a rapid, nondestructive, and potentially valuable method for identification and chemotaxonomic characterization that may be broadly applicable to fungi and other microorganisms. PMID:12902244

  17. Oncologists' identification of mental health distress in cancer patients: Strategies and barriers.

    PubMed

    Granek, L; Nakash, O; Ariad, S; Shapira, S; Ben-David, M

    2018-03-06

    The purpose of this research was to examine oncologists' perspectives on indicators of mental health distress in patients: what strategies they use to identify these indicators, and what barriers they face in this task. Twenty-three oncologists were interviewed, and the grounded theory method of data collection and analysis was used. Oncologists perceived distress to be a normative part of having cancer and looked for affective, physical, verbal and behavioural indicators using a number of strategies. Barriers to identification of mental health distress included difficulty in differentiating between mental health distress and symptoms of the disease, and lack of training. A systematic, time-efficient assessment of symptoms of emotional distress is critical for identification of psychiatric disorders among patients and differentiating normative emotional responses from psychopathology. Clinical bias and misdiagnosis can be a consequence of an ad hoc, intuitive approach to assessment, which can have consequences for patients and their families. Once elevated risk is identified for mental health distress, the patient can be referred to specialised care that can offer evidence-based treatments. © 2018 John Wiley & Sons Ltd.

  18. Piloting the older adult financial exploitation measure in adult safeguarding services.

    PubMed

    Phelan, A; Fealy, G; Downes, C

    Financial abuse is arguably the most complex form of elder abuse as it may occur remote to the older person and it is impacted by issues such as cultural values, perpetrator intent and family expectations. Financial abuse may not be recognised by either the older person or the perpetrator, thus, its prevention, early identification and amelioration are important. The (Irish) National Centre for the Protection of Older People undertook a study to determine the appropriateness of the Older Adult Financial Exploitation Measure for use by the national safeguarding older person services. Findings from a small pilot study involving 16 safeguarding staff's use of the Older Adult Financial Exploitation Measure with 52 community dwelling older people referred to their service demonstrate a higher suspicion of financial abuse as well as identifying multiple instances of possible financial exploitation in a single individual. Thus, the Older Adult Financial Exploitation Measure is considered appropriate to assist safeguarding personnel's assessment of older people related to a suspicion of financial abuse. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Exploitation of induced 2n-gametes for plant breeding.

    PubMed

    Younis, Adnan; Hwang, Yoon-Jung; Lim, Ki-Byung

    2014-02-01

    Unreduced gamete formation derived via abnormal meiotic cell division is an important approach to polyploidy breeding. This process is considered the main driving force in spontaneous polyploids formation in nature, but the potential application of these gametes to plant breeding has not been fully exploited. An effective mechanism for their artificial induction is needed to attain greater genetic variation and enable efficient use of unreduced gametes in breeding programs. Different approaches have been employed for 2n-pollen production including interspecific hybridization, manipulation of environmental factors and treatment with nitrous oxide, trifluralin, colchicine, oryzalin and other chemicals. These chemicals can act as a stimulus to produce viable 2n pollen; however, their exact mode of action, optimum concentration and developmental stages are still not known. Identification of efficient methods of inducing 2n-gamete formation will help increase pollen germination of sterile interspecific hybrids for inter-genomic recombination and introgression breeding to develop new polyploid cultivars and increase heterozygosity among plant populations. Additionally, the application of genomic tools and identification and isolation of genes and mechanisms involved in the induction of 2n-gamete will enable increased exploitation in different plant species, which will open new avenues for plant breeding.

  20. The ESA Geohazard Exploitation Platform

    NASA Astrophysics Data System (ADS)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  1. A peptide-retrieval strategy enables significant improvement of quantitative performance without compromising confidence of identification.

    PubMed

    Tu, Chengjian; Shen, Shichen; Sheng, Quanhu; Shyr, Yu; Qu, Jun

    2017-01-30

    Reliable quantification of low-abundance proteins in complex proteomes is challenging largely owing to the limited number of spectra/peptides identified. In this study we developed a straightforward method to improve the quantitative accuracy and precision of proteins by strategically retrieving the less confident peptides that were previously filtered out using the standard target-decoy search strategy. The filtered-out MS/MS spectra matched to confidently-identified proteins were recovered, and the peptide-spectrum-match FDR were re-calculated and controlled at a confident level of FDR≤1%, while protein FDR maintained at ~1%. We evaluated the performance of this strategy in both spectral count- and ion current-based methods. >60% increase of total quantified spectra/peptides was respectively achieved for analyzing a spike-in sample set and a public dataset from CPTAC. Incorporating the peptide retrieval strategy significantly improved the quantitative accuracy and precision, especially for low-abundance proteins (e.g. one-hit proteins). Moreover, the capacity of confidently discovering significantly-altered proteins was also enhanced substantially, as demonstrated with two spike-in datasets. In summary, improved quantitative performance was achieved by this peptide recovery strategy without compromising confidence of protein identification, which can be readily implemented in a broad range of quantitative proteomics techniques including label-free or labeling approaches. We hypothesize that more quantifiable spectra and peptides in a protein, even including less confident peptides, could help reduce variations and improve protein quantification. Hence the peptide retrieval strategy was developed and evaluated in two spike-in sample sets with different LC-MS/MS variations using both MS1- and MS2-based quantitative approach. The list of confidently identified proteins using the standard target-decoy search strategy was fixed and more spectra/peptides with less

  2. A Dynamically Focusing Cochlear Implant Strategy Can Improve Vowel Identification in Noise.

    PubMed

    Arenberg, Julie G; Parkinson, Wendy S; Litvak, Leonid; Chen, Chen; Kreft, Heather A; Oxenham, Andrew J

    2018-03-09

    The standard, monopolar (MP) electrode configuration used in commercially available cochlear implants (CI) creates a broad electrical field, which can lead to unwanted channel interactions. Use of more focused configurations, such as tripolar and phased array, has led to mixed results for improving speech understanding. The purpose of the present study was to assess the efficacy of a physiologically inspired configuration called dynamic focusing, using focused tripolar stimulation at low levels and less focused stimulation at high levels. Dynamic focusing may better mimic cochlear excitation patterns in normal acoustic hearing, while reducing the current levels necessary to achieve sufficient loudness at high levels. Twenty postlingually deafened adult CI users participated in the study. Speech perception was assessed in quiet and in a four-talker babble background noise. Speech stimuli were closed-set spondees in noise, and medial vowels at 50 and 60 dB SPL in quiet and in noise. The signal to noise ratio was adjusted individually such that performance was between 40 and 60% correct with the MP strategy. Subjects were fitted with three experimental strategies matched for pulse duration, pulse rate, filter settings, and loudness on a channel-by-channel basis. The strategies included 14 channels programmed in MP, fixed partial tripolar (σ = 0.8), and dynamic partial tripolar (σ at 0.8 at threshold and 0.5 at the most comfortable level). Fifteen minutes of listening experience was provided with each strategy before testing. Sound quality ratings were also obtained. Speech perception performance for vowel identification in quiet at 50 and 60 dB SPL and for spondees in noise was similar for the three tested strategies. However, performance on vowel identification in noise was significantly better for listeners using the dynamic focusing strategy. Sound quality ratings were similar for the three strategies. Some subjects obtained more benefit than others, with some

  3. New Technologies and Strategies to Exploit Near Earth Asteroids for Breakthrough Space Development

    NASA Astrophysics Data System (ADS)

    Rather, John; Powell, James; Maise, George

    2010-01-01

    The past two decades have brought a profound expansion of knowledge of near earth objects (NEO). If creatively exploited, NEOs can significantly increase human safety while reducing costs of exploration and development of the moon, Mars and the solar system. Synergistically, the ability to defend the Earth from devastating impacts will become very effective. A spherical volume having a radius equivalent to the moon's orbit, 400,000 km, is visited every day by approximately ten NEOs having diameters of ~10 meters, while ~30 meter diameter encounters occur about once per month. Because these objects are usually very faint and only within detectable range for a few days, they require specialized equipment to discover them with high probability of detection and to enable accurate determination of orbital parameters. Survey systems are now being implemented that are cataloging many thousands of objects larger than 30 meters, but numerous advantages will result from extending the complete NEO census down to 10 meter diameters. The typical compositions of such NEOs will range from ~80% that are low density dust & rock ``rubble piles'' to perhaps 2% containing heavy metals-properties well known from meteorite samples. It is quite possible that there will also be some fragments of short period comets that are rich in water ice and other volatile components. In this paper we will propose a set of new technologies and strategies for exploiting NEO resources that can yield important space development breakthroughs at much lower costs than existing concepts. Solar powered ``Tugboats'' deployed at the space station can rendezvous with carefully selected NEOs and steer them into captured orbits in the lunar L4 & L5 regions. Robotic equipment will then modify them for a plethora of benefits. Notably, the problem of radiation shielding against the Van Allen belts, solar flares and cosmic rays will be solved. Free transportation from low earth orbit to the moon and beyond will be

  4. Lead Discovery Strategies for Identification of Chlamydia pneumoniae Inhibitors.

    PubMed

    Hanski, Leena; Vuorela, Pia

    2016-11-28

    Throughout its known history, the gram-negative bacterium Chlamydia pneumoniae has remained a challenging target for antibacterial chemotherapy and drug discovery. Owing to its well-known propensity for persistence and recent reports on antimicrobial resistence within closely related species, new approaches for targeting this ubiquitous human pathogen are urgently needed. In this review, we describe the strategies that have been successfully applied for the identification of nonconventional antichlamydial agents, including target-based and ligand-based virtual screening, ethnopharmacological approach and pharmacophore-based design of antimicrobial peptide-mimicking compounds. Among the antichlamydial agents identified via these strategies, most translational work has been carried out with plant phenolics. Thus, currently available data on their properties as antichlamydial agents are described, highlighting their potential mechanisms of action. In this context, the role of mitogen-activated protein kinase activation in the intracellular growth and survival of C . pneumoniae is discussed. Owing to the complex and often complementary pathways applied by C. pneumoniae in the different stages of its life cycle, multitargeted therapy approaches are expected to provide better tools for antichlamydial therapy than agents with a single molecular target.

  5. Lead Discovery Strategies for Identification of Chlamydia pneumoniae Inhibitors

    PubMed Central

    Hanski, Leena; Vuorela, Pia

    2016-01-01

    Throughout its known history, the gram-negative bacterium Chlamydia pneumoniae has remained a challenging target for antibacterial chemotherapy and drug discovery. Owing to its well-known propensity for persistence and recent reports on antimicrobial resistence within closely related species, new approaches for targeting this ubiquitous human pathogen are urgently needed. In this review, we describe the strategies that have been successfully applied for the identification of nonconventional antichlamydial agents, including target-based and ligand-based virtual screening, ethnopharmacological approach and pharmacophore-based design of antimicrobial peptide-mimicking compounds. Among the antichlamydial agents identified via these strategies, most translational work has been carried out with plant phenolics. Thus, currently available data on their properties as antichlamydial agents are described, highlighting their potential mechanisms of action. In this context, the role of mitogen-activated protein kinase activation in the intracellular growth and survival of C. pneumoniae is discussed. Owing to the complex and often complementary pathways applied by C. pneumoniae in the different stages of its life cycle, multitargeted therapy approaches are expected to provide better tools for antichlamydial therapy than agents with a single molecular target. PMID:27916800

  6. [ELSA-Brasil strategies for outcome identification, investigation and ascertainment].

    PubMed

    Barreto, Sandhi Maria; Ladeira, Roberto Marini; Bastos, Maria do Socorro Castelo Branco de Oliveira; Diniz, Maria de Fátima Haueisen Sander; Jesus, Elcimara Amorim de; Kelles, Silvana Márcia Bruschi; Luft, Vivian Cristine; Melo, Enirtes Caetano Prates; Oliveira, Elizabete Regina Araújo de

    2013-06-01

    The article describes the strategies adopted by the Brazilian Longitudinal Study for Adult Health (ELSA-Brasil) for participation and retention of subjects. This is key to ensure internal validity of longitudinal studies, and to identify, investigate, and ascertain outcomes of interest. The follow-up strategies include annual telephone contacts with new assessments and interviews every three to four years this approach aims to identify transient outcomes (reversible or not), permanent outcomes as well as complications related to the progression of major diseases--cardiovascular diseases and diabetes--to be studied. Telephone interviews are designed to monitor subjects' health status and to identify potential health-related events such as hospital admissions, medical visits or pre-selected medical procedures. Subjects are also encouraged to report to the ELSA-Brasil team any new health-related events. When a potential event is identified, a thorough investigation is carried out to collect relevant information about that event from medical records. All data are blinded and reviewed and analyzed by a medical expert committee. Incident outcome ascertainment follows well-established international criteria to ensure data comparability and avoid misclassification. In addition to these strategies, the occurrence of health-related events is also investigated through linkage of secondary databases, such as national mortality and hospital admission databases. Accurate identification of outcomes will allow to estimating their incidence in the study cohort and to investigate the effect of the exposures studied in the ELSA-Brasil at baseline and at its subsequent waves.

  7. Molecular strategy for identification in Aspergillus section Flavi.

    PubMed

    Godet, Marie; Munaut, Françoise

    2010-03-01

    Aspergillus flavus is one of the most common contaminants that produces aflatoxins in foodstuffs. It is also a human allergen and a pathogen of animals and plants. Aspergillus flavus is included in the Aspergillus section Flavi that comprises 11 closely related species producing different profiles of secondary metabolites. A six-step strategy has been developed that allows identification of nine of the 11 species. First, three real-time PCR reactions allowed us to discriminate four groups within the section: (1) A. flavus/Aspergillus oryzae/Aspergillus minisclerotigenes/Aspergillus parvisclerotigenus; (2) Aspergillus parasiticus/Aspergillus sojae/Aspergillus arachidicola; (3) Aspergillus tamarii/Aspergillus bombycis/Aspergillus pseudotamarii; and (4) Aspergillus nomius. Secondly, random amplification of polymorphic DNA (RAPD) amplifications or SmaI digestion allowed us to differentiate (1) A. flavus, A. oryzae and A. minisclerotigenes; (2) A. parasiticus, A. sojae and A. arachidicola; (3) A. tamarii, A. bombycis and A. pseudotamarii. Among the 11 species, only A. parvisclerotigenus cannot be differentiated from A. flavus. Using the results of real-time PCR, RAPD and SmaI digestion, a decision-making tree was drawn up to identify nine of the 11 species of section Flavi. In contrast to conventional morphological methods, which are often time-consuming, the molecular strategy proposed here is based mainly on real-time PCR, which is rapid and requires minimal handling.

  8. Assisting victims of human trafficking: strategies to facilitate identification, exit from trafficking, and the restoration of wellness.

    PubMed

    Hodge, David R

    2014-04-01

    Human trafficking is a pressing social justice concern. Social work is uniquely situated to address this problem. However, despite the profession's commitment to social justice, the scholarship to equip social workers to address this issue has been largely absent from professional discourse. To address this gap, this article helps social work practitioners to assist victims of human trafficking. After orienting readers to the scope and process of human trafficking, the topics of victim identification, exit from trafficking, and the restoration of psychological wellness are discussed. By equipping themselves in these three areas, practitioners can advance social justice on behalf of some of the most exploited people in the world.

  9. Comparison between traditional strategies and classification technique (SIMCA) in the identification of old proteinaceous binders.

    PubMed

    Checa-Moreno, R; Manzano, E; Mirón, G; Capitan-Vallvey, L F

    2008-05-15

    In this paper, we performed a comparison between commonly used strategies amino acid ratios (Aa ratios), two-dimensional ratio plots (2D-Plot) and statistical correlation factor (SCF) and a classification technique, soft independent modelling of class analogy (SIMCA), to identify protein binders present in old artwork samples. To do this, we used a natural standard collection of proteinaceous binders prepared in our laboratory using old recipes and eleven samples coming from Cultural Heritage, such as mural and easel paintings, manuscripts and polychrome sculptures from the 15-18th centuries. Protein binder samples were hydrolyzed and their constitutive amino acids were determined as PITC-derivatives using HPLC-DAD. Amino acid profile data were used to perform the comparison between the four different strategies mentioned above. Traditional strategies can lead to ambiguous or non-conclusive results. With SIMCA, it is possible to provide a more robust and less subjective identification knowing the confidence level of identification. As a standard, we used proteinaceous albumin (whole egg, yolk and glair); casein (goat, cow and sheep) and collagen (mammalian and fish). The process results in a more robust understanding of proteinaceous binding media in old artworks that makes it possible to distinguish them according to their origin.

  10. A Comprehensive Strategy to Construct In-house Database for Accurate and Batch Identification of Small Molecular Metabolites.

    PubMed

    Zhao, Xinjie; Zeng, Zhongda; Chen, Aiming; Lu, Xin; Zhao, Chunxia; Hu, Chunxiu; Zhou, Lina; Liu, Xinyu; Wang, Xiaolin; Hou, Xiaoli; Ye, Yaorui; Xu, Guowang

    2018-05-29

    Identification of the metabolites is an essential step in metabolomics study to interpret regulatory mechanism of pathological and physiological processes. However, it is still a big headache in LC-MSn-based studies because of the complexity of mass spectrometry, chemical diversity of metabolites, and deficiency of standards database. In this work, a comprehensive strategy is developed for accurate and batch metabolite identification in non-targeted metabolomics studies. First, a well defined procedure was applied to generate reliable and standard LC-MS2 data including tR, MS1 and MS2 information at a standard operational procedure (SOP). An in-house database including about 2000 metabolites was constructed and used to identify the metabolites in non-targeted metabolic profiling by retention time calibration using internal standards, precursor ion alignment and ion fusion, auto-MS2 information extraction and selection, and database batch searching and scoring. As an application example, a pooled serum sample was analyzed to deliver the strategy, 202 metabolites were identified in the positive ion mode. It shows our strategy is useful for LC-MSn-based non-targeted metabolomics study.

  11. Current approaches to exploit actinomycetes as a source of novel natural products.

    PubMed

    Genilloud, Olga; González, Ignacio; Salazar, Oscar; Martín, Jesus; Tormo, José Rubén; Vicente, Francisca

    2011-03-01

    For decades, microbial natural products have been one of the major sources of novel drugs for pharmaceutical companies, and today all evidence suggests that novel molecules with potential therapeutic applications are still waiting to be discovered from these natural sources, especially from actinomycetes. Any appropriate exploitation of the chemical diversity of these microbial sources relies on proper understanding of their biological diversity and other related key factors that maximize the possibility of successful identification of novel molecules. Without doubt, the discovery of platensimycin has shown that microbial natural products can continue to deliver novel scaffolds if appropriate tools are put in place to reveal them in a cost-effective manner. Whereas today innovative technologies involving exploitation of uncultivated environmental diversity, together with chemical biology and in silico approaches, are seeing rapid development in natural products research, maximization of the chances of exploiting chemical diversity from microbial collections is still essential for novel drug discovery. This work provides an overview of the integrated approaches developed at the former Basic Research Center of Merck Sharp and Dohme in Spain to exploit the diversity and biosynthetic potential of actinomycetes, and includes some examples of those that were successfully applied to the discovery of novel antibiotics.

  12. Exploiting water versus tolerating drought: water-use strategies of trees in a secondary successional tropical dry forest

    Treesearch

    Fernando Pineda-García; Horacio Paz; Frederick C. Meinzer; Guillermo Angeles; Guillermo Goldstein

    2015-01-01

    In seasonal plant communities where water availability changes dramatically both between and within seasons, understanding the mechanisms that enable plants to exploit water pulses and to survive drought periods is crucial. By measuring rates of physiological processes, we examined the trade-off between water exploitation and drought tolerance among seedlings of trees...

  13. Metabolomic mapping of cancer stem cells for reducing and exploiting tumor heterogeneity.

    PubMed

    Cuyàs, Elisabet; Verdura, Sara; Fernández-Arroyo, Salvador; Bosch-Barrera, Joaquim; Martin-Castillo, Begoña; Joven, Jorge; Menendez, Javier A

    2017-11-21

    Personalized cancer medicine based on the analysis of tumors en masse is limited by tumor heterogeneity, which has become a major obstacle to effective cancer treatment. Cancer stem cells (CSC) are emerging as key drivers of inter- and intratumoral heterogeneity. CSC have unique metabolic dependencies that are required not only for specific bioenergetic/biosynthetic demands but also for sustaining their operational epigenetic traits, i.e. self-renewal, tumor-initiation, and plasticity. Given that the metabolome is the final downstream product of all the -omic layers and, therefore, most representative of the biological phenotype, we here propose that a novel approach to better understand the complexity of tumor heterogeneity is by mapping and cataloging small numbers of CSC metabolomic phenotypes. The narrower metabolomic diversity of CSC states could be employed to reduce multidimensional tumor heterogeneity into dynamic models of fewer actionable sub-phenotypes. The identification of the driver nodes that are used differentially by CSC states to metabolically regulate self-renewal and tumor initation and escape chemotherapy might open new preventive and therapeutic avenues. The mapping of CSC metabolomic states could become a pioneering strategy to reduce the dimensionality of tumor heterogeneity and improve our ability to examine changes in tumor cell populations for cancer detection, prognosis, prediction/monitoring of therapy response, and detection of therapy resistance and recurrent disease. The identification of driver metabolites and metabolic nodes accounting for a large amount of variance within the CSC metabolomic sub-phenotypes might offer new unforeseen opportunities for reducing and exploiting tumor heterogeneity via metabolic targeting of CSC.

  14. New strategies in glioblastoma: exploiting the new biology.

    PubMed

    Fine, Howard A

    2015-05-01

    Glioblastoma is one of the deadliest human cancers. There have been few significant therapeutic advances in the field over the past two decades, with median survival of only about 15 months despite aggressive neurosurgery, radiotherapy, and chemotherapy. Nevertheless, the past 5 years has seen an explosion in our understanding of the genetic and molecular underpinnings of these tumors, leading to renewed optimism about potential new therapeutic approaches. Several of the most promising new approaches include oncogenic signal transduction inhibition, angiogenesis inhibition, targeting canonical stem cell pathways in glioblastoma stem cells, and immunotherapy. As promising as many of these approaches appear, they have not had an impact yet on the natural history of the disease or on patient long-term outcomes. Nevertheless, it is hoped that with time such approaches will lead to more effective treatments, but issues such as the unique biology and anatomy of the central nervous system, impaired drug delivery, poor preclinical models with resultant nonpredictive preclinical screening, and poor clinical trial design potentially impede the rapid development of such new therapies. In this article, we review the excitement and challenges that face the development of effective new treatments that exploit this new biology. ©2015 American Association for Cancer Research.

  15. Quantitative Index and Abnormal Alarm Strategy Using Sensor-Dependent Vibration Data for Blade Crack Identification in Centrifugal Booster Fans

    PubMed Central

    Chen, Jinglong; Sun, Hailiang; Wang, Shuai; He, Zhengjia

    2016-01-01

    Centrifugal booster fans are important equipment used to recover blast furnace gas (BFG) for generating electricity, but blade crack faults (BCFs) in centrifugal booster fans can lead to unscheduled breakdowns and potentially serious accidents, so in this work quantitative fault identification and an abnormal alarm strategy based on acquired historical sensor-dependent vibration data is proposed for implementing condition-based maintenance for this type of equipment. Firstly, three group dependent sensors are installed to acquire running condition data. Then a discrete spectrum interpolation method and short time Fourier transform (STFT) are applied to preliminarily identify the running data in the sensor-dependent vibration data. As a result a quantitative identification and abnormal alarm strategy based on compound indexes including the largest Lyapunov exponent and relative energy ratio at the second harmonic frequency component is proposed. Then for validation the proposed blade crack quantitative identification and abnormality alarm strategy is applied to analyze acquired experimental data for centrifugal booster fans and it has successfully identified incipient blade crack faults. In addition, the related mathematical modelling work is also introduced to investigate the effects of mistuning and cracks on the vibration features of centrifugal impellers and to explore effective techniques for crack detection. PMID:27171083

  16. The Exploration-Exploitation Dilemma: A Multidisciplinary Framework

    PubMed Central

    Berger-Tal, Oded; Meron, Ehud; Saltz, David

    2014-01-01

    The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans. PMID:24756026

  17. An Interactive Computer-Aided Instructional Strategy and Assessment Methods for System Identification and Adaptive Control Laboratory

    ERIC Educational Resources Information Center

    Özbek, Necdet Sinan; Eker, Ilyas

    2015-01-01

    This study describes a set of real-time interactive experiments that address system identification and model reference adaptive control (MRAC) techniques. In constructing laboratory experiments that contribute to efficient teaching, experimental design and instructional strategy are crucial, but a process for doing this has yet to be defined. This…

  18. Radiofrequency identification: exploiting an old technology for measuring nurse time and motion.

    PubMed

    Jones, Terry L

    2012-09-01

    A national campaign is underway to increase the amount of time staff nurses spend at the bedside of hospitalized patients through redesign of the work environment. This kind of work redesign requires robust data depicting what nurses do and how they spend their time. Historically, these kinds of data have been difficult, costly, and time consuming to collect. Wireless capture of data on the movement of humans within the work environment (ie, time and motion) is now possible through radiofrequency identification technology. When small tracking devices the size of a quarter are affixed to their clothing, the movement of nurses throughout a patient care unit can be monitored. The duration and frequency of patient interaction are captured along with the duration of time spent in other locations of interest to include nurses' station, supply room, medication room, doctors' station, electronic documentation stations, family waiting rooms, and the hallway. Patterns of nurse movement and time allocation can be efficiently identified, and the effects of staffing practices, workflows, and unit layout evaluated. Integration of radiofrequency identification time and motion data with other databases enables nurse leaders to link nursing time to important cost and quality outcomes. Nurse leaders should explore the usefulness of radiofrequency identification technology in addressing data needs for nurse time and motion.

  19. Sexual slavery without borders: trafficking for commercial sexual exploitation in India.

    PubMed

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-09-25

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues.

  20. Sexual slavery without borders: trafficking for commercial sexual exploitation in India

    PubMed Central

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-01-01

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues. PMID:18817576

  1. Exploiting a Corpus of Business Letters from a Phraseological, Functional Perspective

    ERIC Educational Resources Information Center

    Flowerdew, Lynne

    2012-01-01

    This paper illustrates how a freely available online corpus has been exploited in a module on teaching business letters covering the following four speech acts (functions) commonly found in business letters: invitations, requests, complaints and refusals. It is proposed that different strategies are required for teaching potentially…

  2. Chromosomal Anomalies in Individuals with Autism: A Strategy Towards the Identification of Genes Involved in Autism

    ERIC Educational Resources Information Center

    Castermans, Dries; Wilquet, Valerie; Steyaert, Jean; van de Ven, Wim; Fryns, Jean-Pierre; Devriendt, Koen

    2004-01-01

    We review the different strategies currently used to try to identify susceptibility genes for idiopathic autism. Although identification of genes is usually straightforward in Mendelian disorders, it has proved to be much more difficult to establish in polygenic disorders like autism. Neither genome screens of affected siblings nor the large…

  3. Exploiting Bacterial Whole-Genome Sequencing Data for Evaluation of Diagnostic Assays: Campylobacter Species Identification as a Case Study

    PubMed Central

    Jansen van Rensburg, Melissa J.; Swift, Craig; Cody, Alison J.; Jenkins, Claire

    2016-01-01

    The application of whole-genome sequencing (WGS) to problems in clinical microbiology has had a major impact on the field. Clinical laboratories are now using WGS for pathogen identification, antimicrobial susceptibility testing, and epidemiological typing. WGS data also represent a valuable resource for the development and evaluation of molecular diagnostic assays, which continue to play an important role in clinical microbiology. To demonstrate this application of WGS, this study used publicly available genomic data to evaluate a duplex real-time PCR (RT-PCR) assay that targets mapA and ceuE for the detection of Campylobacter jejuni and Campylobacter coli, leading global causes of bacterial gastroenteritis. In silico analyses of mapA and ceuE primer and probe sequences from 1,713 genetically diverse C. jejuni and C. coli genomes, supported by RT-PCR testing, indicated that the assay was robust, with 1,707 (99.7%) isolates correctly identified. The high specificity of the mapA-ceuE assay was the result of interspecies diversity and intraspecies conservation of the target genes in C. jejuni and C. coli. Rare instances of a lack of specificity among C. coli isolates were due to introgression in mapA or sequence diversity in ceuE. The results of this study illustrate how WGS can be exploited to evaluate molecular diagnostic assays by using publicly available data, online databases, and open-source software. PMID:27733632

  4. Hybrid parameter identification of a multi-modal underwater soft robot.

    PubMed

    Giorgio-Serchi, F; Arienti, A; Corucci, F; Giorelli, M; Laschi, C

    2017-02-28

    We introduce an octopus-inspired, underwater, soft-bodied robot capable of performing waterborne pulsed-jet propulsion and benthic legged-locomotion. This vehicle consists for as much as 80% of its volume of rubber-like materials so that structural flexibility is exploited as a key element during both modes of locomotion. The high bodily softness, the unconventional morphology and the non-stationary nature of its propulsion mechanisms require dynamic characterization of this robot to be dealt with by ad hoc techniques. We perform parameter identification by resorting to a hybrid optimization approach where the characterization of the dual ambulatory strategies of the robot is performed in a segregated fashion. A least squares-based method coupled with a genetic algorithm-based method is employed for the swimming and the crawling phases, respectively. The outcomes bring evidence that compartmentalized parameter identification represents a viable protocol for multi-modal vehicles characterization. However, the use of static thrust recordings as the input signal in the dynamic determination of shape-changing self-propelled vehicles is responsible for the critical underestimation of the quadratic drag coefficient.

  5. Clonal foraging in perennial wheatgrasses: A strategy for exploiting patchy soil nutrients

    USGS Publications Warehouse

    Humphrey, L. David; Pyke, David A.

    1997-01-01

    1. Foraging by means of plasticity in placement of tillers in response to low- and high-nutrient patches was examined in the rhizomatous wheatgrass Elymus lanceolatus ssp. lanceolatus. Its ability to exploit soil nutrient patches was compared to that of the closely related but caespitose E. lanceolatus ssp. wawawaiensis.2. Clones of 14 genets of each taxon were planted in boxes consisting of two 30 × 30 cm cells: the `origin cell' where clones were planted, and the adjacent `destination cell', with each cell containing soil with either low or high levels of nutrients.3. The rhizomatous taxon, which can produce intravaginal, short-rhizome and long-rhizome tillers, preferentially produced short-rhizome and intravaginal tillers in high-nutrient destination cells. Effects of nutrient status of the origin cell as well as of the destination cell on total tiller numbers indicated clonal integration, yet tiller placement responded to local conditions.4. Roots of both taxa accessed nutrients in destination cells (the caespitose subspecies by root growth only), and above-ground biomass of both taxa increased to a similar extent with high-nutrient destination cells. With the patch sizes used in this experiment, root growth was as important as ramet placement in exploiting nutrients in destination cells. 5 There was no relationship between degree of plasticity in ramet placement and biomass of the clone when high-nutrient destination cells were present.

  6. Do Young Learners Exploit the Same Learning Strategies as Adults?

    ERIC Educational Resources Information Center

    Hrozková, Ivana

    2015-01-01

    Learning strategies are considered to be one of the key factors affecting the learning process, its effectiveness and study results. They are important for lifelong learning of foreign languages and as a learning skill they represent a priority in the process of European globalization and integration. Moreover, learning strategies as a foreign…

  7. Mass spectrometry and animal science: protein identification strategies and particularities of farm animal species.

    PubMed

    Soares, Renata; Franco, Catarina; Pires, Elisabete; Ventosa, Miguel; Palhinhas, Rui; Koci, Kamila; Martinho de Almeida, André; Varela Coelho, Ana

    2012-07-19

    Proteomic approaches are gaining increasing importance in the context of all fields of animal and veterinary sciences, including physiology, productive characterization, and disease/parasite tolerance, among others. Proteomic studies mainly aim the proteome characterization of a certain organ, tissue, cell type or organism, either in a specific condition or comparing protein differential expression within two or more selected situations. Due to the high complexity of samples, usually total protein extracts, proteomics relies heavily on separation procedures, being 2D-electrophoresis and HPLC the most common, as well as on protein identification using mass spectrometry (MS) based methodologies. Despite the increasing importance of MS in the context of animal and veterinary science studies, the usefulness of such tools is still poorly perceived by the animal science community. This is primarily due to the limited knowledge on mass spectrometry by animal scientists. Additionally, confidence and success in protein identification is hindered by the lack of information in public databases for most of farm animal species and their pathogens, with the exception of cattle (Bos taurus), pig (Sus scrofa) and chicken (Gallus gallus). In this article, we will briefly summarize the main methodologies available for protein identification using mass spectrometry providing a case study of specific applications in the field of animal science. We will also address the difficulties inherent to protein identification using MS, with particular reference to experiments using animal species poorly described in public databases. Additionally, we will suggest strategies to increase the rate of successful identifications when working with farm animal species. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. Rare lung disease research: strategies for improving identification and recruitment of research participants.

    PubMed

    Gupta, Samir; Bayoumi, Ahmed M; Faughnan, Marie E

    2011-11-01

    Research in rare lung diseases faces methodologic limitations by virtue of the small number of participants available to be studied. We explored several strategies that may improve researchers' ability to identify and recruit research participants with rare lung diseases. We provide an overview of strategies based on available evidence, previously used approaches, and reasoning. First, disease detection is generally poor and may be improved through strategies targeted at primary care practitioners or directly at patients, thus increasing the pool of patients available for research studies. Next, standardization of case definitions in rare lung diseases is often lacking, hindering research recruitment efforts because of confusion over appropriate recruitment criteria. Expert consensus statements can enhance both clinical care and research recruitment by standardizing definitions. Finally, recruitment strategies using rare lung disease registries, clinical research networks, novel Internet-based direct patient recruitment approaches, and patient organizations may facilitate recruitment of patients with rare lung diseases. In summary, although several strategies for improving the identification and recruitment of research participants with rare lung diseases have been proposed, published examples are few. Objective measurement and reporting of novel recruitment methods and collaboration among researchers facing the same limitations across various rare lung diseases are required. Advancements in this area are vital to the design and performance of much-needed robust clinical studies across the spectrum of rare lung diseases.

  9. The exploitation argument against commercial surrogacy.

    PubMed

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  10. Harsh childhood environmental characteristics predict exploitation and retaliation in humans

    PubMed Central

    McCullough, Michael E.; Pedersen, Eric J.; Schroder, Jaclyn M.; Tabak, Benjamin A.; Carver, Charles S.

    2013-01-01

    Across and within societies, people vary in their propensities towards exploitative and retaliatory defection in potentially cooperative interaction. We hypothesized that this variation reflects adaptive responses to variation in cues during childhood that life will be harsh, unstable and short—cues that probabilistically indicate that it is in one's fitness interests to exploit co-operators and to retaliate quickly against defectors. Here, we show that childhood exposure to family neglect, conflict and violence, and to neighbourhood crime, were positively associated for men (but not women) with exploitation of an interaction partner and retaliatory defection after that partner began to defect. The associations between childhood environment and both forms of defection for men appeared to be mediated by participants' endorsement of a ‘code of honour’. These results suggest that individual differences in mutual benefit cooperation are not merely due to genetic noise, random developmental variation or the operation of domain-general cultural learning mechanisms, but rather, might reflect the adaptive calibration of social strategies to local social–ecological conditions. PMID:23118435

  11. Exploiting endogenous fibrocartilage stem cells to regenerate cartilage and repair joint injury

    PubMed Central

    Embree, Mildred C.; Chen, Mo; Pylawka, Serhiy; Kong, Danielle; Iwaoka, George M.; Kalajzic, Ivo; Yao, Hai; Shi, Chancheng; Sun, Dongming; Sheu, Tzong-Jen; Koslovsky, David A.; Koch, Alia; Mao, Jeremy J.

    2016-01-01

    Tissue regeneration using stem cell-based transplantation faces many hurdles. Alternatively, therapeutically exploiting endogenous stem cells to regenerate injured or diseased tissue may circumvent these challenges. Here we show resident fibrocartilage stem cells (FCSCs) can be used to regenerate and repair cartilage. We identify FCSCs residing within the superficial zone niche in the temporomandibular joint (TMJ) condyle. A single FCSC spontaneously generates a cartilage anlage, remodels into bone and organizes a haematopoietic microenvironment. Wnt signals deplete the reservoir of FCSCs and cause cartilage degeneration. We also show that intra-articular treatment with the Wnt inhibitor sclerostin sustains the FCSC pool and regenerates cartilage in a TMJ injury model. We demonstrate the promise of exploiting resident FCSCs as a regenerative therapeutic strategy to substitute cell transplantation that could be beneficial for patients suffering from fibrocartilage injury and disease. These data prompt the examination of utilizing this strategy for other musculoskeletal tissues. PMID:27721375

  12. The role of environmental biotechnology in exploring, exploiting, monitoring, preserving, protecting and decontaminating the marine environment.

    PubMed

    Kalogerakis, Nicolas; Arff, Johanne; Banat, Ibrahim M; Broch, Ole Jacob; Daffonchio, Daniele; Edvardsen, Torgeir; Eguiraun, Harkaitz; Giuliano, Laura; Handå, Aleksander; López-de-Ipiña, Karmele; Marigomez, Ionan; Martinez, Iciar; Øie, Gunvor; Rojo, Fernando; Skjermo, Jorunn; Zanaroli, Giulio; Fava, Fabio

    2015-01-25

    In light of the Marine Strategy Framework Directive (MSFD) and the EU Thematic Strategy on the Sustainable Use of Natural Resources, environmental biotechnology could make significant contributions in the exploitation of marine resources and addressing key marine environmental problems. In this paper 14 propositions are presented focusing on (i) the contamination of the marine environment, and more particularly how to optimize the use of biotechnology-related tools and strategies for predicting and monitoring contamination and developing mitigation measures; (ii) the exploitation of the marine biological and genetic resources to progress with the sustainable, eco-compatible use of the maritime space (issues are very diversified and include, for example, waste treatment and recycling, anti-biofouling agents; bio-plastics); (iii) environmental/marine biotechnology as a driver for a sustainable economic growth. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Two questions about surrogacy and exploitation.

    PubMed

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  14. Teaching the basics of cancer metabolism: Developing antitumor strategies by exploiting the differences between normal and cancer cell metabolism.

    PubMed

    Kalyanaraman, Balaraman

    2017-08-01

    This review of the basics of cancer metabolism focuses on exploiting the metabolic differences between normal and cancer cells. The first part of the review covers the different metabolic pathways utilized in normal cells to generate cellular energy, or ATP, and the glycolytic intermediates required to build the cellular machinery. The second part of the review discusses aerobic glycolysis, or the Warburg effect, and the metabolic reprogramming involving glycolysis, tricarboxylic acid cycle, and glutaminolysis in the context of developing targeted inhibitors in cancer cells. Finally, the selective targeting of cancer mitochondrial metabolism using positively charged lipophilic compounds as potential therapeutics and their ability to mitigate the toxic side effects of conventional chemotherapeutics in normal cells are discussed. I hope this graphical review will be useful in helping undergraduate, graduate, and medical students understand how investigating the basics of cancer cell metabolism could provide new insight in developing potentially new anticancer treatment strategies. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  15. Fungal secondary metabolites - strategies to activate silent gene clusters.

    PubMed

    Brakhage, Axel A; Schroeckh, Volker

    2011-01-01

    Filamentous fungi produce a multitude of low molecular weight bioactive compounds. The increasing number of fungal genome sequences impressively demonstrated that their biosynthetic potential is far from being exploited. In fungi, the genes required for the biosynthesis of a secondary metabolite are clustered. Many of these bioinformatically newly discovered secondary metabolism gene clusters are silent under standard laboratory conditions. Consequently, no product can be found. This review summarizes the current strategies that have been successfully applied during the last years to activate these silent gene clusters in filamentous fungi, especially in the genus Aspergillus. The techniques take advantage of genome mining, vary from the simple search for compounds with bioinformatically predicted physicochemical properties up to methods that exploit a probable interaction of microorganisms. Until now, the majority of successful approaches have been based on molecular biology like the generation of gene "knock outs", promoter exchange, overexpression of transcription factors or other pleiotropic regulators. Moreover, strategies based on epigenetics opened a new avenue for the elucidation of the regulation of secondary metabolite formation and will certainly continue to play a significant role for the elucidation of cryptic natural products. The conditions under which a given gene cluster is naturally expressed are largely unknown. One technique is to attempt to simulate the natural habitat by co-cultivation of microorganisms from the same ecosystem. This has already led to the activation of silent gene clusters and the identification of novel compounds in Aspergillus nidulans. These simulation strategies will help discover new natural products in the future, and may also provide fundamental new insights into microbial communication. Copyright © 2010 Elsevier Inc. All rights reserved.

  16. Exploiting Bacterial Whole-Genome Sequencing Data for Evaluation of Diagnostic Assays: Campylobacter Species Identification as a Case Study.

    PubMed

    Jansen van Rensburg, Melissa J; Swift, Craig; Cody, Alison J; Jenkins, Claire; Maiden, Martin C J

    2016-12-01

    The application of whole-genome sequencing (WGS) to problems in clinical microbiology has had a major impact on the field. Clinical laboratories are now using WGS for pathogen identification, antimicrobial susceptibility testing, and epidemiological typing. WGS data also represent a valuable resource for the development and evaluation of molecular diagnostic assays, which continue to play an important role in clinical microbiology. To demonstrate this application of WGS, this study used publicly available genomic data to evaluate a duplex real-time PCR (RT-PCR) assay that targets mapA and ceuE for the detection of Campylobacter jejuni and Campylobacter coli, leading global causes of bacterial gastroenteritis. In silico analyses of mapA and ceuE primer and probe sequences from 1,713 genetically diverse C. jejuni and C. coli genomes, supported by RT-PCR testing, indicated that the assay was robust, with 1,707 (99.7%) isolates correctly identified. The high specificity of the mapA-ceuE assay was the result of interspecies diversity and intraspecies conservation of the target genes in C. jejuni and C. coli Rare instances of a lack of specificity among C. coli isolates were due to introgression in mapA or sequence diversity in ceuE The results of this study illustrate how WGS can be exploited to evaluate molecular diagnostic assays by using publicly available data, online databases, and open-source software. Copyright © 2016 Jansen van Rensburg et al.

  17. Identification of control targets in Boolean molecular network models via computational algebra.

    PubMed

    Murrugarra, David; Veliz-Cuba, Alan; Aguilar, Boris; Laubenbacher, Reinhard

    2016-09-23

    Many problems in biomedicine and other areas of the life sciences can be characterized as control problems, with the goal of finding strategies to change a disease or otherwise undesirable state of a biological system into another, more desirable, state through an intervention, such as a drug or other therapeutic treatment. The identification of such strategies is typically based on a mathematical model of the process to be altered through targeted control inputs. This paper focuses on processes at the molecular level that determine the state of an individual cell, involving signaling or gene regulation. The mathematical model type considered is that of Boolean networks. The potential control targets can be represented by a set of nodes and edges that can be manipulated to produce a desired effect on the system. This paper presents a method for the identification of potential intervention targets in Boolean molecular network models using algebraic techniques. The approach exploits an algebraic representation of Boolean networks to encode the control candidates in the network wiring diagram as the solutions of a system of polynomials equations, and then uses computational algebra techniques to find such controllers. The control methods in this paper are validated through the identification of combinatorial interventions in the signaling pathways of previously reported control targets in two well studied systems, a p53-mdm2 network and a blood T cell lymphocyte granular leukemia survival signaling network. Supplementary data is available online and our code in Macaulay2 and Matlab are available via http://www.ms.uky.edu/~dmu228/ControlAlg . This paper presents a novel method for the identification of intervention targets in Boolean network models. The results in this paper show that the proposed methods are useful and efficient for moderately large networks.

  18. Temporal Structure in Cooperative Interactions: What Does the Timing of Exploitation Tell Us about Its Cost?

    PubMed Central

    Barker, Jessica L.; Bronstein, Judith L.

    2016-01-01

    Exploitation in cooperative interactions both within and between species is widespread. Although it is assumed to be costly to be exploited, mechanisms to control exploitation are surprisingly rare, making the persistence of cooperation a fundamental paradox in evolutionary biology and ecology. Focusing on between-species cooperation (mutualism), we hypothesize that the temporal sequence in which exploitation occurs relative to cooperation affects its net costs and argue that this can help explain when and where control mechanisms are observed in nature. Our principal prediction is that when exploitation occurs late relative to cooperation, there should be little selection to limit its effects (analogous to “tolerated theft” in human cooperative groups). Although we focus on cases in which mutualists and exploiters are different individuals (of the same or different species), our inferences can readily be extended to cases in which individuals exhibit mixed cooperative-exploitative strategies. We demonstrate that temporal structure should be considered alongside spatial structure as an important process affecting the evolution of cooperation. We also provide testable predictions to guide future empirical research on interspecific as well as intraspecific cooperation. PMID:26841169

  19. New Strategies in Radiation Therapy: Exploiting the Full Potential of Protons

    PubMed Central

    Mohan, Radhe; Mahajan, Anita; Minsky, Bruce D.

    2013-01-01

    Protons provide significant dosimetric advantages compared with photons due to their unique depth-dose distribution characteristics. However, they are more sensitive to the effects of intra- and inter-treatment fraction anatomic variations and uncertainties in treatment setup. Furthermore, in the current practice of proton therapy, the biological effectiveness of protons relative to photons is assumed to have a generic fixed value of 1.1. However, this is a simplification, and it is likely higher in different portions of the proton beam. Current clinical practice and trials have not fully exploited the unique physical and biological properties of protons. Intensity-modulated proton therapy, with its ability to manipulate energies (in addition to intensities), provides an entirely new dimension, which, with ongoing research, has considerable potential to increase the therapeutic ratio. PMID:24077353

  20. New strategies in radiation therapy: exploiting the full potential of protons.

    PubMed

    Mohan, Radhe; Mahajan, Anita; Minsky, Bruce D

    2013-12-01

    Protons provide significant dosimetric advantages compared with photons because of their unique depth-dose distribution characteristics. However, they are more sensitive to the effects of intra- and intertreatment fraction anatomic variations and uncertainties in treatment setup. Furthermore, in the current practice of proton therapy, the biologic effectiveness of protons relative to photons is assumed to have a generic fixed value of 1.1. However, this is a simplification, and it is likely higher in different portions of the proton beam. Current clinical practice and trials have not fully exploited the unique physical and biologic properties of protons. Intensity-modulated proton therapy, with its ability to manipulate energies (in addition to intensities), provides an entirely new dimension, which, with ongoing research, has considerable potential to increase the therapeutic ratio. ©2013 AACR.

  1. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    PubMed

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  2. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A

    PubMed Central

    King, Cason R.; Zhang, Ali; Tessier, Tanner M.; Gameiro, Steven F.

    2018-01-01

    ABSTRACT As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected “hub” proteins to “hack” the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. PMID:29717008

  3. Immaterial Boys? A Large-Scale Exploration of Gender-Based Differences in Child Sexual Exploitation Service Users.

    PubMed

    Cockbain, Ella; Ashby, Matthew; Brayley, Helen

    2017-10-01

    Child sexual exploitation is increasingly recognized nationally and internationally as a pressing child protection, crime prevention, and public health issue. In the United Kingdom, for example, a recent series of high-profile cases has fueled pressure on policy makers and practitioners to improve responses. Yet, prevailing discourse, research, and interventions around child sexual exploitation have focused overwhelmingly on female victims. This study was designed to help redress fundamental knowledge gaps around boys affected by sexual exploitation. This was achieved through rigorous quantitative analysis of individual-level data for 9,042 users of child sexual exploitation services in the United Kingdom. One third of the sample were boys, and gender was associated with statistically significant differences on many variables. The results of this exploratory study highlight the need for further targeted research and more nuanced and inclusive counter-strategies.

  4. Exploiting the Complementarity between Dereplication and Computer-Assisted Structure Elucidation for the Chemical Profiling of Natural Cosmetic Ingredients: Tephrosia purpurea as a Case Study.

    PubMed

    Hubert, Jane; Chollet, Sébastien; Purson, Sylvain; Reynaud, Romain; Harakat, Dominique; Martinez, Agathe; Nuzillard, Jean-Marc; Renault, Jean-Hugues

    2015-07-24

    The aqueous-ethanolic extract of Tephrosia purpurea seeds is currently exploited in the cosmetic industry as a natural ingredient of skin lotions. The aim of this study was to chemically characterize this ingredient by combining centrifugal partition extraction (CPE) as a fractionation tool with two complementary identification approaches involving dereplication and computer-assisted structure elucidation. Following two rapid fractionations of the crude extract (2 g), seven major compounds namely, caffeic acid, quercetin-3-O-rutinoside, ethyl galactoside, ciceritol, stachyose, saccharose, and citric acid, were unambiguously identified within the CPE-generated simplified mixtures by a recently developed (13)C NMR-based dereplication method. The structures of four additional compounds, patuletin-3-O-rutinoside, kaempferol-3-O-rutinoside, guaiacylglycerol 8-vanillic acid ether, and 2-methyl-2-glucopyranosyloxypropanoic acid, were automatically elucidated by using the Logic for Structure Determination program based on the interpretation of 2D NMR (HSQC, HMBC, and COSY) connectivity data. As more than 80% of the crude extract mass was characterized without need for tedious and labor-intensive multistep purification procedures, the identification tools involved in this work constitute a promising strategy for an efficient and time-saving chemical profiling of natural extracts.

  5. Efficient cooperative compressive spectrum sensing by identifying multi-candidate and exploiting deterministic matrix

    NASA Astrophysics Data System (ADS)

    Li, Jia; Wang, Qiang; Yan, Wenjie; Shen, Yi

    2015-12-01

    Cooperative spectrum sensing exploits the spatial diversity to improve the detection of occupied channels in cognitive radio networks (CRNs). Cooperative compressive spectrum sensing (CCSS) utilizing the sparsity of channel occupancy further improves the efficiency by reducing the number of reports without degrading detection performance. In this paper, we firstly and mainly propose the referred multi-candidate orthogonal matrix matching pursuit (MOMMP) algorithms to efficiently and effectively detect occupied channels at fusion center (FC), where multi-candidate identification and orthogonal projection are utilized to respectively reduce the number of required iterations and improve the probability of exact identification. Secondly, two common but different approaches based on threshold and Gaussian distribution are introduced to realize the multi-candidate identification. Moreover, to improve the detection accuracy and energy efficiency, we propose the matrix construction based on shrinkage and gradient descent (MCSGD) algorithm to provide a deterministic filter coefficient matrix of low t-average coherence. Finally, several numerical simulations validate that our proposals provide satisfactory performance with higher probability of detection, lower probability of false alarm and less detection time.

  6. Explosives Detection: Exploitation of the Physical Signatures

    NASA Astrophysics Data System (ADS)

    Atkinson, David

    2010-10-01

    Explosives based terrorism is an ongoing threat that is evolving with respect to implementation, configuration and materials used. There are a variety of devices designed to detect explosive devices, however, each technology has limitations and operational constraints. A full understanding of the signatures available for detection coupled with the array of detection choices can be used to develop a conceptual model of an explosives screening operation. Physics based sensors provide a robust approach to explosives detection, typically through the identification of anomalies, and are currently used for screening in airports around the world. The next generation of detectors for explosives detection will need to be more sensitive and selective, as well as integrate seamlessly with devices focused on chemical signatures. An appreciation for the details of the physical signature exploitation in cluttered environments with time, space, and privacy constraints is necessary for effective explosives screening of people, luggage, cargo, and vehicles.

  7. Exploiting PI3K/mTOR signaling to accelerate epithelial wound healing.

    PubMed

    Castilho, R M; Squarize, C H; Gutkind, J S

    2013-09-01

    The molecular circuitries controlling the process of skin wound healing have gained new significant insights in recent years. This knowledge is built on landmark studies on skin embryogenesis, maturation, and differentiation. Furthermore, the identification, characterization, and elucidation of the biological roles of adult skin epithelial stem cells and their influence in tissue homeostasis have provided the foundation for the overall understanding of the process of skin wound healing and tissue repair. Among numerous signaling pathways associated with epithelial functions, the PI3K/Akt/mTOR signaling route has gained substantial attention with the generation of animal models capable of dissecting individual components of the pathway, thereby providing a novel insight into the molecular framework underlying skin homeostasis and tissue regeneration. In this review, we focus on recent findings regarding the mechanisms involved in wound healing associated with the upregulation of the activity of the PI3K/Akt/mTOR circuitry. This review highlights critical findings on the molecular mechanisms controlling the activation of mTOR, a downstream component of the PI3K-PTEN pathway, which is directly involved in epithelial migration and proliferation. We discuss how this emerging information can be exploited for the development of novel pharmacological intervention strategies to accelerate the healing of critical size wounds. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. Rapid Identification of Chemoresistance Mechanisms Using Yeast DNA Mismatch Repair Mutants

    PubMed Central

    Ojini, Irene; Gammie, Alison

    2015-01-01

    Resistance to cancer therapy is a major obstacle in the long-term treatment of cancer. A greater understanding of drug resistance mechanisms will ultimately lead to the development of effective therapeutic strategies to prevent resistance from occurring. Here, we exploit the mutator phenotype of mismatch repair defective yeast cells combined with whole genome sequencing to identify drug resistance mutations in key pathways involved in the development of chemoresistance. The utility of this approach was demonstrated via the identification of the known CAN1 and TOP1 resistance targets for two compounds, canavanine and camptothecin, respectively. We have also experimentally validated the plasma membrane transporter HNM1 as the primary drug resistance target of mechlorethamine. Furthermore, the sequencing of mitoxantrone-resistant strains identified inactivating mutations within IPT1, a gene encoding inositolphosphotransferase, an enzyme involved in sphingolipid biosynthesis. In the case of bactobolin, a promising anticancer drug, the endocytosis pathway was identified as the drug resistance target responsible for conferring resistance. Finally, we show that that rapamycin, an mTOR inhibitor previously shown to alter the fitness of the ipt1 mutant, can effectively prevent the formation of mitoxantrone resistance. The rapid and robust nature of these techniques, using Saccharomyces cerevisiae as a model organism, should accelerate the identification of drug resistance targets and guide the development of novel therapeutic combination strategies to prevent the development of chemoresistance in various cancers. PMID:26199284

  9. Misreporting behaviour in iterated prisoner's dilemma game with combined trust strategy

    NASA Astrophysics Data System (ADS)

    Chen, Bo; Zhang, Bin; Wu, Hua-qing

    2015-01-01

    Effects of agents' misreporting behaviour on system cooperation are studied in a multi-agent iterated prisoner's dilemma game. Agents, adopting combined trust strategy (denoted by CTS) are classified into three groups, i.e., honest CTS, positive-reporting CTS and negative-reporting CTS. The differences of cooperation frequency and pay-off under three different systems, i.e., system only with honest CTS, system with honest CTS and positive-reporting CTS and system with honest CTS and negative-reporting CTS, are compared. Furthermore, we also investigate the effects of misreporting behaviour on an exploiter who adopts an exploiting strategy (denoted by EXPL) in a system with two CTSs and one EXPL. At last, numerical simulations are performed for understanding the effects of misreporting behaviour on CTS. The results reveal that positive-reporting behaviour can strengthen system cooperation, while negative-reporting behaviour cannot. When EXPL exists in a system, positive-reporting behaviour helps the exploiter in reducing its exploiting cost and encourages agents to adopt exploiting strategy, but hurts other agents' interests.

  10. Local knowledge and exploitation of the avian fauna by a rural community in the semi-arid zone of northeastern Brazil.

    PubMed

    Teixeira, Pedro Hudson Rodrigues; Thel, Thiago do Nascimento; Ferreira, Jullio Marques Rocha; de Azevedo, Severino Mendes; Junior, Wallace Rodrigues Telino; Lyra-Neves, Rachel Maria

    2014-12-24

    The present study examined the exploitation of bird species by the residents of a rural community in the Brazilian semi-arid zone, and their preferences for species with different characteristics. The 24 informants were identified using the "snowball" approach, and were interviewed using semi-structured questionnaires and check-sheets for the collection of data on their relationship with the bird species that occur in the region. The characteristics that most attract the attention of the interviewees were the song and the coloration of the plumage of a bird, as well as its body size, which determines its potential as a game species, given that hunting is an important activity in the region. A total of 98 species representing 32 families (50.7% of the species known to occur in the region) were reported during interviews, being used for meat, pets, and medicinal purposes. Three species were used as zootherapeutics - White-naped Jay was eaten whole as a cure for speech problems, the feathers of Yellow-legged Tinamou were used for snakebite, Smooth-billed Ani was eaten for "chronic cough" and Small-billed Tinamou and Tataupa Tinamou used for locomotion problems. The preference of the informants for characteristics such as birdsong and colorful plumage was a significant determinant of their preference for the species exploited. Birds with cynegetic potential and high use values were also among the most preferred species. Despite the highly significant preferences for certain species, some birds, such as those of the families Trochilidae, Thamnophilidae, and Tyrannidae are hunted randomly, independently of their attributes. The evidence collected on the criteria applied by local specialists for the exploitation of the bird fauna permitted the identification of the species that suffer hunting pressure, providing guidelines for the development of conservation and management strategies that will guarantee the long-term survival of the populations of these bird species in

  11. Emerging New Strategies for Successful Metabolite Identification in Metabolomics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bingol, Ahmet K.; Bruschweiler-Li, Lei; Li, Dawei

    2016-02-26

    NMR is a very powerful tool for the identification of known and unknown (or unnamed) metabolites in complex mixtures as encountered in metabolomics. Known compounds can be reliably identified using 2D NMR methods, such as 13C-1H HSQC, for which powerful web servers with databases are available for semi-automated analysis. For the identification of unknown compounds, new combinations of NMR with MS have been developed recently that make synergistic use of the mutual strengths of the two techniques. The use of chemical additives to the NMR tube, such as reactive agents, paramagnetic ions, or charged silica nanoparticles, permit the identification ofmore » metabolites with specific physical chemical properties. In the following sections, we give an overview of some of the recent advances in metabolite identification and discuss remaining challenges.« less

  12. Routine identification of medical fungi by the new Vitek MS matrix-assisted laser desorption ionization-time of flight system with a new time-effective strategy.

    PubMed

    Iriart, Xavier; Lavergne, Rose-Anne; Fillaux, Judith; Valentin, Alexis; Magnaval, Jean-François; Berry, Antoine; Cassaing, Sophie

    2012-06-01

    We report here a clinical evaluation of the Vitek MS system for rapid fungal identification. A strategy that uses a single deposit without prior protein extraction was utilized to save time and money. Clinical isolates from the Toulouse University hospital were used to evaluate the performance of the Vitek MS compared to that of both routine laboratory techniques and Vitek2. The Vitek MS performed well in the identification of yeasts and Aspergillus fungi (93.2% of correct identifications).

  13. Patterns of resource exploitation in four coexisting globeflower fly species ( Chiastocheta sp.)

    NASA Astrophysics Data System (ADS)

    Pompanon, François; Pettex, Emeline; Després, Laurence

    2006-03-01

    Life history and spatio-temporal patterns of resource utilisation were characterised in four Chiastocheta (Diptera: Anthomyiidae) species, whose larvae compete as seed predators on Trollius europaeus fruits. Interspecific co-occurrence was observed in 80% of the resource patches (= Trollius fruits) in the two communities studied. Isolated larvae from all species had a similar food intake, but differed in development time and size at emergence. Different species exhibit contrasting resource exploitation strategies with specific mining patterns and a partial temporal shift. Two species exhibited particularly singular strategies. C. rotundiventris escaped from strong interactions with other species because it was the first species to develop and the only one to exploit the central pith of Trollius fruits. The key role of this species as the main pollinator of the host-plant appears to be a by-product of constraints imposed by occupying a restricted niche. Although the resource is ephemeral due to seed dispersal, C. dentifera, the last species to oviposit, is not disadvantaged because it has a short development time and rapid food intake. The different patterns can partly explain the stability of Chiastocheta communities, but do not prevent competition to occur at high larval densities.

  14. Widespread exploitation of the honeybee by early Neolithic farmers.

    PubMed

    Roffet-Salque, Mélanie; Regert, Martine; Evershed, Richard P; Outram, Alan K; Cramp, Lucy J E; Decavallas, Orestes; Dunne, Julie; Gerbault, Pascale; Mileto, Simona; Mirabaud, Sigrid; Pääkkönen, Mirva; Smyth, Jessica; Šoberl, Lucija; Whelton, Helen L; Alday-Ruiz, Alfonso; Asplund, Henrik; Bartkowiak, Marta; Bayer-Niemeier, Eva; Belhouchet, Lotfi; Bernardini, Federico; Budja, Mihael; Cooney, Gabriel; Cubas, Miriam; Danaher, Ed M; Diniz, Mariana; Domboróczki, László; Fabbri, Cristina; González-Urquijo, Jesus E; Guilaine, Jean; Hachi, Slimane; Hartwell, Barrie N; Hofmann, Daniela; Hohle, Isabel; Ibáñez, Juan J; Karul, Necmi; Kherbouche, Farid; Kiely, Jacinta; Kotsakis, Kostas; Lueth, Friedrich; Mallory, James P; Manen, Claire; Marciniak, Arkadiusz; Maurice-Chabard, Brigitte; Mc Gonigle, Martin A; Mulazzani, Simone; Özdoğan, Mehmet; Perić, Olga S; Perić, Slaviša R; Petrasch, Jörg; Pétrequin, Anne-Marie; Pétrequin, Pierre; Poensgen, Ulrike; Pollard, C Joshua; Poplin, François; Radi, Giovanna; Stadler, Peter; Stäuble, Harald; Tasić, Nenad; Urem-Kotsou, Dushka; Vuković, Jasna B; Walsh, Fintan; Whittle, Alasdair; Wolfram, Sabine; Zapata-Peña, Lydia; Zoughlami, Jamel

    2015-11-12

    The pressures on honeybee (Apis mellifera) populations, resulting from threats by modern pesticides, parasites, predators and diseases, have raised awareness of the economic importance and critical role this insect plays in agricultural societies across the globe. However, the association of humans with A. mellifera predates post-industrial-revolution agriculture, as evidenced by the widespread presence of ancient Egyptian bee iconography dating to the Old Kingdom (approximately 2400 BC). There are also indications of Stone Age people harvesting bee products; for example, honey hunting is interpreted from rock art in a prehistoric Holocene context and a beeswax find in a pre-agriculturalist site. However, when and where the regular association of A. mellifera with agriculturalists emerged is unknown. One of the major products of A. mellifera is beeswax, which is composed of a complex suite of lipids including n-alkanes, n-alkanoic acids and fatty acyl wax esters. The composition is highly constant as it is determined genetically through the insect's biochemistry. Thus, the chemical 'fingerprint' of beeswax provides a reliable basis for detecting this commodity in organic residues preserved at archaeological sites, which we now use to trace the exploitation by humans of A. mellifera temporally and spatially. Here we present secure identifications of beeswax in lipid residues preserved in pottery vessels of Neolithic Old World farmers. The geographical range of bee product exploitation is traced in Neolithic Europe, the Near East and North Africa, providing the palaeoecological range of honeybees during prehistory. Temporally, we demonstrate that bee products were exploited continuously, and probably extensively in some regions, at least from the seventh millennium cal BC, likely fulfilling a variety of technological and cultural functions. The close association of A. mellifera with Neolithic farming communities dates to the early onset of agriculture and may provide

  15. Identification Strategies of a Texas Rebel: Frances (Sissy) Farenthold.

    ERIC Educational Resources Information Center

    McMahan, Eva M.

    The identification techniques in Herbert C. Kelman's schema of identification were used to analyze the near, and perhaps surprising, success of Rep. Frances (Sissy) Farenthold's bid for the Democratic Texas gubernatorial nomination in 1972. Opposing government corruption, Farenthold overcame the potential obstacles of being a politically liberal…

  16. CON4EI: Development of testing strategies for hazard identification and labelling for serious eye damage and eye irritation of chemicals.

    PubMed

    Adriaens, E; Verstraelen, S; Alépée, N; Kandarova, H; Drzewiecka, A; Gruszka, K; Guest, R; Willoughby, J A; Van Rompay, A R

    2018-06-01

    Assessment of acute eye irritation potential is part of the international regulatory requirements for safety testing of chemicals. In the last decades, many efforts have been made in the search for alternative methods to replace the regulatory in vivo Draize rabbit eye test (OECD TG 405). Success in terms of complete replacement of the regulatory in vivo Draize rabbit eye test has not yet been achieved. The main objective of the CEFIC-LRI-AIMT6-VITO CON4EI (CONsortium for in vitro Eye Irritation testing strategy) project was to develop tiered testing strategies for serious eye damage and eye irritation assessment that can lead to complete replacement of OECD TG 405. A set of 80 reference chemicals (e.g. balanced by important driver of classification and physical state), was tested with seven test methods. Based on the results of this project, three different strategies were suggested. We have provided a standalone (EpiOcular ET-50), a two-tiered and three-tiered strategy, that can be used to distinguish between Cat 1 and Cat 2 chemicals and chemicals that do not require classification (No Cat). The two-tiered and three-tiered strategies use an RhCE test method (EpiOcular EIT or SkinEthic™ EIT) at the bottom (identification No Cat) in combination with the BCOP LLBO (two-tiered strategy) or BCOP OP-KIT and SMI (three-tiered strategy) at the top (identification Cat 1). For our proposed strategies, 71.1% - 82.9% Cat 1, 64.2% - 68.5% Cat 2 and ≥80% No Cat chemicals were correctly identified. Also, similar results were obtained for the Top-Down and Bottom-Up approach. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Strategies for the Identification and Tracking of Cronobacter Species: An Opportunistic Pathogen of Concern to Neonatal Health

    PubMed Central

    Yan, Qiongqiong; Fanning, Séamus

    2015-01-01

    Cronobacter species are emerging opportunistic food-borne pathogens, which consists of seven species, including C. sakazakii, C. malonaticus, C. muytjensii, C. turicensis, C. dublinensis, C. universalis, and C. condimenti. The organism can cause severe clinical infections, including necrotizing enterocolitis, septicemia, and meningitis, predominately among neonates <4 weeks of age. Cronobacter species can be isolated from various foods and their surrounding environments; however, powdered infant formula (PIF) is the most frequently implicated food source linked with Cronobacter infection. This review aims to provide a summary of laboratory-based strategies that can be used to identify and trace Cronobacter species. The identification of Cronobacter species using conventional culture method and immuno-based detection protocols were first presented. The molecular detection and identification at genus-, and species-level along with molecular-based serogroup approaches are also described, followed by the molecular sub-typing methods, in particular pulsed-field gel electrophoresis and multi-locus sequence typing. Next generation sequence approaches, including whole genome sequencing, DNA microarray, and high-throughput whole-transcriptome sequencing, are also highlighted. Appropriate application of these strategies would contribute to reduce the risk of Cronobacter contamination in PIF and production environments, thereby improving food safety and protecting public health. PMID:26000266

  18. MALDI-TOF MS Andromas strategy for the routine identification of bacteria, mycobacteria, yeasts, Aspergillus spp. and positive blood cultures.

    PubMed

    Bille, E; Dauphin, B; Leto, J; Bougnoux, M-E; Beretti, J-L; Lotz, A; Suarez, S; Meyer, J; Join-Lambert, O; Descamps, P; Grall, N; Mory, F; Dubreuil, L; Berche, P; Nassif, X; Ferroni, A

    2012-11-01

    All organisms usually isolated in our laboratory are now routinely identified by matrix-assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF MS) using the Andromas software. The aim of this study was to describe the use of this strategy in a routine clinical microbiology laboratory. The microorganisms identified included bacteria, mycobacteria, yeasts and Aspergillus spp. isolated on solid media or extracted directly from blood cultures. MALDI-TOF MS was performed on 2665 bacteria isolated on solid media, corresponding to all bacteria isolated during this period except Escherichia coli grown on chromogenic media. All acquisitions were performed without extraction. After a single acquisition, 93.1% of bacteria grown on solid media were correctly identified. When the first acquisition was not contributory, a second acquisition was performed either the same day or the next day. After two acquisitions, the rate of bacteria identified increased to 99.2%. The failures reported on 21 strains were due to an unknown profile attributed to new species (9) or an insufficient quality of the spectrum (12). MALDI-TOF MS has been applied to 162 positive blood cultures. The identification rate was 91.4%. All mycobacteria isolated during this period (22) were correctly identified by MALDI-TOF MS without any extraction. For 96.3% and 92.2% of yeasts and Aspergillus spp., respectively, the identification was obtained with a single acquisition. After a second acquisition, the overall identification rate was 98.8% for yeasts (160/162) and 98.4% (63/64) for Aspergillus spp. In conclusion, the MALDI-TOF MS strategy used in this work allows a rapid and efficient identification of all microorganisms isolated routinely. © 2011 The Authors. Clinical Microbiology and Infection © 2011 European Society of Clinical Microbiology and Infectious Diseases.

  19. Sensory exploitation and sexual conflict

    PubMed Central

    Arnqvist, Göran

    2006-01-01

    Much of the literature on male–female coevolution concerns the processes by which male traits and female preferences for these can coevolve and be maintained by selection. There has been less explicit focus on the origin of male traits and female preferences. Here, I argue that it is important to distinguish origin from subsequent coevolution and that insights into the origin can help us appreciate the relative roles of various coevolutionary processes for the evolution of diversity in sexual dimorphism. I delineate four distinct scenarios for the origin of male traits and female preferences that build on past contributions, two of which are based on pre-existing variation in quality indicators among males and two on exploitation of pre-existing sensory biases among females. Recent empirical research, and theoretical models, suggest that origin by sensory exploitation has been widespread. I argue that this points to a key, but perhaps transient, role for sexually antagonistic coevolution (SAC) in the subsequent evolutionary elaboration of sexual traits, because (i) sensory exploitation is often likely to be initially costly for individuals of the exploited sex and (ii) the subsequent evolution of resistance to sensory exploitation should often be associated with costs due to selective constraints. A review of a few case studies is used to illustrate these points. Empirical data directly relevant to the costs of being sensory exploited and the costs of evolving resistance is largely lacking, and I stress that such data would help determining the general importance of sexual conflict and SAC for the evolution of sexual dimorphism. PMID:16612895

  20. Optimizing Search and Ranking in Folksonomy Systems by Exploiting Context Information

    NASA Astrophysics Data System (ADS)

    Abel, Fabian; Henze, Nicola; Krause, Daniel

    Tagging systems enable users to annotate resources with freely chosen keywords. The evolving bunch of tag assignments is called folksonomy and there exist already some approaches that exploit folksonomies to improve resource retrieval. In this paper, we analyze and compare graph-based ranking algorithms: FolkRank and SocialPageRank. We enhance these algorithms by exploiting the context of tags, and evaluate the results on the GroupMe! dataset. In GroupMe!, users can organize and maintain arbitrary Web resources in self-defined groups. When users annotate resources in GroupMe!, this can be interpreted in context of a certain group. The grouping activity itself is easy for users to perform. However, it delivers valuable semantic information about resources and their context. We present GRank that uses the context information to improve and optimize the detection of relevant search results, and compare different strategies for ranking result lists in folksonomy systems.

  1. Redesigning the exploitation of wheat genetic resources.

    PubMed

    Longin, C Friedrich H; Reif, Jochen C

    2014-10-01

    More than half a million wheat genetic resources are resting in gene banks worldwide. Unlocking their hidden favorable genetic diversity for breeding is pivotal for enhancing grain yield potential, and averting future food shortages. Here, we propose exploiting recent advances in hybrid wheat technology to uncover the masked breeding values of wheat genetic resources. The gathered phenotypic information will enable a targeted choice of accessions with high value for pre-breeding among this plethora of genetic resources. We intend to provoke a paradigm shift in pre-breeding strategies for grain yield, moving away from allele mining toward genome-wide selection to bridge the yield gap between genetic resources and elite breeding pools. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Strategy as simple rules.

    PubMed

    Eisenhardt, K M; Sull, D N

    2001-01-01

    The success of Yahoo!, eBay, Enron, and other companies that have become adept at morphing to meet the demands of changing markets can't be explained using traditional thinking about competitive strategy. These companies have succeeded by pursuing constantly evolving strategies in market spaces that were considered unattractive according to traditional measures. In this article--the third in an HBR series by Kathleen Eisenhardt and Donald Sull on strategy in the new economy--the authors ask, what are the sources of competitive advantage in high-velocity markets? The secret, they say, is strategy as simple rules. The companies know that the greatest opportunities for competitive advantage lie in market confusion, but they recognize the need for a few crucial strategic processes and a few simple rules. In traditional strategy, advantage comes from exploiting resources or stable market positions. In strategy as simple rules, advantage comes from successfully seizing fleeting opportunities. Key strategic processes, such as product innovation, partnering, or spinout creation, place the company where the flow of opportunities is greatest. Simple rules then provide the guidelines within which managers can pursue such opportunities. Simple rules, which grow out of experience, fall into five broad categories: how- to rules, boundary conditions, priority rules, timing rules, and exit rules. Companies with simple-rules strategies must follow the rules religiously and avoid the temptation to change them too frequently. A consistent strategy helps managers sort through opportunities and gain short-term advantage by exploiting the attractive ones. In stable markets, managers rely on complicated strategies built on detailed predictions of the future. But when business is complicated, strategy should be simple.

  3. Knowledge translation for nephrologists: strategies for improving the identification of patients with proteinuria.

    PubMed

    Hemmelgarn, Brenda R; Manns, Braden J; Straus, Sharon; Naugler, Christopher; Holroyd-Leduc, Jayna; Braun, Ted C; Levin, Adeera; Klarenbach, Scott; Lee, Patrick F; Hafez, Kevin; Schwartz, Daniel; Jindal, Kailash; Ervin, Kathy; Bello, Aminu; Turin, Tanvir Chowdhury; McBrien, Kerry; Elliott, Meghan; Tonelli, Marcello

    2012-01-01

    For health scientists, knowledge translation refers to the process of facilitating uptake of knowledge into clinical practice or decision making. Since high-quality clinical research that is not applied cannot improve outcomes, knowledge translation is critical for realizing the value and potential for all types of health research. Knowledge translation is particularly relevant for areas within health care where gaps in care are known to exist, which is the case for some areas of management for people with chronic kidney disease (CKD), including assessment of proteinuria. Given that proteinuria is a key marker of cardiovascular and renal risk, forthcoming international practice guidelines will recommend including proteinuria within staging systems for CKD. While this revised staging system will facilitate identification of patients at higher risk for progression of CKD and mortality who benefit from intervention, strategies to ensure its appropriate uptake will be particularly important. This article describes key elements of effective knowledge translation strategies based on the knowledge-to-action cycle framework and describes options for effective knowledge translation interventions related to the new CKD guidelines, focusing on recommendations related to assessment for proteinuria specifically. The article also presents findings from a multidisciplinary meeting aimed at developing knowledge translation intervention strategies, with input from key stakeholders (researchers, knowledge users, decision makers and collaborators), to facilitate implementation of this guideline. These considerations are relevant for dissemination and implementation of guidelines on other topics and in other clinical settings.

  4. Exploiting range imagery: techniques and applications

    NASA Astrophysics Data System (ADS)

    Armbruster, Walter

    2009-07-01

    Practically no applications exist for which automatic processing of 2D intensity imagery can equal human visual perception. This is not the case for range imagery. The paper gives examples of 3D laser radar applications, for which automatic data processing can exceed human visual cognition capabilities and describes basic processing techniques for attaining these results. The examples are drawn from the fields of helicopter obstacle avoidance, object detection in surveillance applications, object recognition at high range, multi-object-tracking, and object re-identification in range image sequences. Processing times and recognition performances are summarized. The techniques used exploit the bijective continuity of the imaging process as well as its independence of object reflectivity, emissivity and illumination. This allows precise formulations of the probability distributions involved in figure-ground segmentation, feature-based object classification and model based object recognition. The probabilistic approach guarantees optimal solutions for single images and enables Bayesian learning in range image sequences. Finally, due to recent results in 3D-surface completion, no prior model libraries are required for recognizing and re-identifying objects of quite general object categories, opening the way to unsupervised learning and fully autonomous cognitive systems.

  5. Exploiting heterogeneous publicly available data sources for drug safety surveillance: computational framework and case studies.

    PubMed

    Koutkias, Vassilis G; Lillo-Le Louët, Agnès; Jaulent, Marie-Christine

    2017-02-01

    Driven by the need of pharmacovigilance centres and companies to routinely collect and review all available data about adverse drug reactions (ADRs) and adverse events of interest, we introduce and validate a computational framework exploiting dominant as well as emerging publicly available data sources for drug safety surveillance. Our approach relies on appropriate query formulation for data acquisition and subsequent filtering, transformation and joint visualization of the obtained data. We acquired data from the FDA Adverse Event Reporting System (FAERS), PubMed and Twitter. In order to assess the validity and the robustness of the approach, we elaborated on two important case studies, namely, clozapine-induced cardiomyopathy/myocarditis versus haloperidol-induced cardiomyopathy/myocarditis, and apixaban-induced cerebral hemorrhage. The analysis of the obtained data provided interesting insights (identification of potential patient and health-care professional experiences regarding ADRs in Twitter, information/arguments against an ADR existence across all sources), while illustrating the benefits (complementing data from multiple sources to strengthen/confirm evidence) and the underlying challenges (selecting search terms, data presentation) of exploiting heterogeneous information sources, thereby advocating the need for the proposed framework. This work contributes in establishing a continuous learning system for drug safety surveillance by exploiting heterogeneous publicly available data sources via appropriate support tools.

  6. Organ sales: exploitative at any price?

    PubMed

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  7. Optimizing annotation resources for natural language de-identification via a game theoretic framework.

    PubMed

    Li, Muqun; Carrell, David; Aberdeen, John; Hirschman, Lynette; Kirby, Jacqueline; Li, Bo; Vorobeychik, Yevgeniy; Malin, Bradley A

    2016-06-01

    Electronic medical records (EMRs) are increasingly repurposed for activities beyond clinical care, such as to support translational research and public policy analysis. To mitigate privacy risks, healthcare organizations (HCOs) aim to remove potentially identifying patient information. A substantial quantity of EMR data is in natural language form and there are concerns that automated tools for detecting identifiers are imperfect and leak information that can be exploited by ill-intentioned data recipients. Thus, HCOs have been encouraged to invest as much effort as possible to find and detect potential identifiers, but such a strategy assumes the recipients are sufficiently incentivized and capable of exploiting leaked identifiers. In practice, such an assumption may not hold true and HCOs may overinvest in de-identification technology. The goal of this study is to design a natural language de-identification framework, rooted in game theory, which enables an HCO to optimize their investments given the expected capabilities of an adversarial recipient. We introduce a Stackelberg game to balance risk and utility in natural language de-identification. This game represents a cost-benefit model that enables an HCO with a fixed budget to minimize their investment in the de-identification process. We evaluate this model by assessing the overall payoff to the HCO and the adversary using 2100 clinical notes from Vanderbilt University Medical Center. We simulate several policy alternatives using a range of parameters, including the cost of training a de-identification model and the loss in data utility due to the removal of terms that are not identifiers. In addition, we compare policy options where, when an attacker is fined for misuse, a monetary penalty is paid to the publishing HCO as opposed to a third party (e.g., a federal regulator). Our results show that when an HCO is forced to exhaust a limited budget (set to $2000 in the study), the precision and recall of the

  8. Identification of a Novel and Selective Series of Itk Inhibitors via a Template-Hopping Strategy

    PubMed Central

    2013-01-01

    Inhibition of Itk potentially constitutes a novel, nonsteroidal treatment for asthma and other T-cell mediated diseases. In-house kinase cross-screening resulted in the identification of an aminopyrazole-based series of Itk inhibitors. Initial work on this series highlighted selectivity issues with several other kinases, particularly AurA and AurB. A template-hopping strategy was used to identify a series of aminobenzothiazole Itk inhibitors, which utilized an inherently more selective hinge binding motif. Crystallography and modeling were used to rationalize the observed selectivity. Initial exploration of the SAR around this series identified potent Itk inhibitors in both enzyme and cellular assays. PMID:24900590

  9. A novel strategy for global mapping of O-GlcNAc proteins and peptides using selective enzymatic deglycosylation, HILIC enrichment and mass spectrometry identification.

    PubMed

    Shen, Bingquan; Zhang, Wanjun; Shi, Zhaomei; Tian, Fang; Deng, Yulin; Sun, Changqing; Wang, Guangshun; Qin, Weijie; Qian, Xiaohong

    2017-07-01

    O-GlcNAcylation is a kind of dynamic O-linked glycosylation of nucleocytoplasmic and mitochondrial proteins. It serves as a major nutrient sensor to regulate numerous biological processes including transcriptional regulation, cell metabolism, cellular signaling, and protein degradation. Dysregulation of cellular O-GlcNAcylated levels contributes to the etiologies of many diseases such as diabetes, neurodegenerative disease and cancer. However, deeper insight into the biological mechanism of O-GlcNAcylation is hampered by its extremely low stoichiometry and the lack of efficient enrichment approaches for large-scale identification by mass spectrometry. Herein, we developed a novel strategy for the global identification of O-GlcNAc proteins and peptides using selective enzymatic deglycosylation, HILIC enrichment and mass spectrometry analysis. Standard O-GlcNAc peptides can be efficiently enriched even in the presence of 500-fold more abundant non-O-GlcNAc peptides and identified by mass spectrometry with a low nanogram detection sensitivity. This strategy successfully achieved the first large-scale enrichment and characterization of O-GlcNAc proteins and peptides in human urine. A total of 474 O-GlcNAc peptides corresponding to 457 O-GlcNAc proteins were identified by mass spectrometry analysis, which is at least three times more than that obtained by commonly used enrichment methods. A large number of unreported O-GlcNAc proteins related to cell cycle, biological regulation, metabolic and developmental process were found in our data. The above results demonstrated that this novel strategy is highly efficient in the global enrichment and identification of O-GlcNAc peptides. These data provide new insights into the biological function of O-GlcNAcylation in human urine, which is correlated with the physiological states and pathological changes of human body and therefore indicate the potential of this strategy for biomarker discovery from human urine. Copyright

  10. Assumption Trade-Offs When Choosing Identification Strategies for Pre-Post Treatment Effect Estimation: An Illustration of a Community-Based Intervention in Madagascar.

    PubMed

    Weber, Ann M; van der Laan, Mark J; Petersen, Maya L

    2015-03-01

    Failure (or success) in finding a statistically significant effect of a large-scale intervention may be due to choices made in the evaluation. To highlight the potential limitations and pitfalls of some common identification strategies used for estimating causal effects of community-level interventions, we apply a roadmap for causal inference to a pre-post evaluation of a national nutrition program in Madagascar. Selection into the program was non-random and strongly associated with the pre-treatment (lagged) outcome. Using structural causal models (SCM), directed acyclic graphs (DAGs) and simulated data, we illustrate that an estimand with the outcome defined as the post-treatment outcome controls for confounding by the lagged outcome but not by possible unmeasured confounders. Two separate differencing estimands (of the pre- and post-treatment outcome) have the potential to adjust for a certain type of unmeasured confounding, but introduce bias if the additional identification assumptions they rely on are not met. In order to illustrate the practical impact of choice between three common identification strategies and their corresponding estimands, we used observational data from the community nutrition program in Madagascar to estimate each of these three estimands. Specifically, we estimated the average treatment effect of the program on the community mean nutritional status of children 5 years and under and found that the estimate based on the post-treatment estimand was about a quarter of the magnitude of either of the differencing estimands (0.066 SD vs. 0.26-0.27 SD increase in mean weight-for-age z-score). Choice of estimand clearly has important implications for the interpretation of the success of the program to improve nutritional status of young children. A careful appraisal of the assumptions underlying the causal model is imperative before committing to a statistical model and progressing to estimation. However, knowledge about the data

  11. Asymmetry identification in rigid rotating bodies—Theory and experiment

    NASA Astrophysics Data System (ADS)

    Bucher, Izhak; Shomer, Ofer

    2013-12-01

    Asymmetry and anisotropy are important parameters in rotating devices that can cause instability; indicate a manufacturing defect or a developing fault. The present paper discusses an identification method capable of detecting minute levels of asymmetry by exploiting the unique dynamics of parametric excitation caused by asymmetry and rotation. The detection relies on rigid body dynamics without resorting to nonlinear vibration analysis, and the natural dynamics of elastically supported systems is exploited in order to increase the sensitivity to asymmetry. It is possible to isolate asymmetry from other rotation-induced phenomena like unbalance. An asymmetry detection machine which was built in the laboratory demonstrates the method alongside theoretical analysis.

  12. The influence of simulated exploitation on Patella vulgata populations: protandric sex change is size-dependent.

    PubMed

    Borges, Carla D G; Hawkins, Stephen J; Crowe, Tasman P; Doncaster, C Patrick

    2016-01-01

    Grazing mollusks are used as a food resource worldwide, and limpets are harvested commercially for both local consumption and export in several countries. This study describes a field experiment to assess the effects of simulated human exploitation of limpets Patella vulgata on their population ecology in terms of protandry (age-related sex change from male to female), growth, recruitment, migration, and density regulation. Limpet populations at two locations in southwest England were artificially exploited by systematic removal of the largest individuals for 18 months in plots assigned to three treatments at each site: no (control), low, and high exploitation. The shell size at sex change (L 50: the size at which there is a 50:50 sex ratio) decreased in response to the exploitation treatments, as did the mean shell size of sexual stages. Size-dependent sex change was indicated by L 50 occurring at smaller sizes in treatments than controls, suggesting an earlier switch to females. Mean shell size of P. vulgata neuters changed little under different levels of exploitation, while males and females both decreased markedly in size with exploitation. No differences were detected in the relative abundances of sexual stages, indicating some compensation for the removal of the bigger individuals via recruitment and sex change as no migratory patterns were detected between treatments. At the end of the experiment, 0-15 mm recruits were more abundant at one of the locations but no differences were detected between treatments. We conclude that sex change in P. vulgata can be induced at smaller sizes by reductions in density of the largest individuals reducing interage class competition. Knowledge of sex-change adaptation in exploited limpet populations should underpin strategies to counteract population decline and improve rocky shore conservation and resource management.

  13. Identification of osmoadaptive strategies in the halophile, heterotrophic ciliate Schmidingerothrix salinarum

    PubMed Central

    Weinisch, Lea; Kühner, Steffen; Roth, Robin; Grimm, Maria; Roth, Tamara; Netz, Daili J. A.; Pierik, Antonio J.

    2018-01-01

    Hypersaline environments pose major challenges to their microbial residents. Microorganisms have to cope with increased osmotic pressure and low water activity and therefore require specific adaptation mechanisms. Although mechanisms have already been thoroughly investigated in the green alga Dunaliella salina and some halophilic yeasts, strategies for osmoadaptation in other protistan groups (especially heterotrophs) are neither as well known nor as deeply investigated as for their prokaryotic counterpart. This is not only due to the recent awareness of the high protistan diversity and ecological relevance in hypersaline systems, but also due to methodological shortcomings. We provide the first experimental study on haloadaptation in heterotrophic microeukaryotes, using the halophilic ciliate Schmidingerothrix salinarum as a model organism. We established three approaches to investigate fundamental adaptation strategies known from prokaryotes. First, proton nuclear magnetic resonance (1H-NMR) spectroscopy was used for the detection, identification, and quantification of intracellular compatible solutes. Second, ion-imaging with cation-specific fluorescent dyes was employed to analyze changes in the relative ion concentrations in intact cells. Third, the effect of salt concentrations on the catalytic performance of S. salinarum malate dehydrogenase (MDH) and isocitrate dehydrogenase (ICDH) was determined. 1H-NMR spectroscopy identified glycine betaine (GB) and ectoine (Ect) as the main compatible solutes in S. salinarum. Moreover, a significant positive correlation of intracellular GB and Ect concentrations and external salinity was observed. The addition of exogenous GB, Ect, and choline (Ch) stimulated the cell growth notably, indicating that S. salinarum accumulates the solutes from the external medium. Addition of external 13C2-Ch resulted in conversion to 13C2-GB, indicating biosynthesis of GB from Ch. An increase of external salinity up to 21% did not result

  14. Proteomic strategy for the identification of critical actors in reorganization of the post-meiotic male genome.

    PubMed

    Govin, Jerome; Gaucher, Jonathan; Ferro, Myriam; Debernardi, Alexandra; Garin, Jerome; Khochbin, Saadi; Rousseaux, Sophie

    2012-01-01

    After meiosis, during the final stages of spermatogenesis, the haploid male genome undergoes major structural changes, resulting in a shift from a nucleosome-based genome organization to the sperm-specific, highly compacted nucleoprotamine structure. Recent data support the idea that region-specific programming of the haploid male genome is of high importance for the post-fertilization events and for successful embryo development. Although these events constitute a unique and essential step in reproduction, the mechanisms by which they occur have remained completely obscure and the factors involved have mostly remained uncharacterized. Here, we sought a strategy to significantly increase our understanding of proteins controlling the haploid male genome reprogramming, based on the identification of proteins in two specific pools: those with the potential to bind nucleic acids (basic proteins) and proteins capable of binding basic proteins (acidic proteins). For the identification of acidic proteins, we developed an approach involving a transition-protein (TP)-based chromatography, which has the advantage of retaining not only acidic proteins due to the charge interactions, but also potential TP-interacting factors. A second strategy, based on an in-depth bioinformatic analysis of the identified proteins, was then applied to pinpoint within the lists obtained, male germ cells expressed factors relevant to the post-meiotic genome organization. This approach reveals a functional network of DNA-packaging proteins and their putative chaperones and sheds a new light on the way the critical transitions in genome organizations could take place. This work also points to a new area of research in male infertility and sperm quality assessments.

  15. CBRNE Detection: Technology is not a Strategy

    DTIC Science & Technology

    2008-05-25

    boundaries to the US national laboratories for definitive identification. Currently in Iraq, chemists are performing forensic analysis of explosive...force health protection, forensics and WMD elimination with one theater asset, especially where instrumentation and scientific disciplines converge...substances in the area of operations; supporting forensic requirements during sensitive site exploitation; and issues relating to the impact of

  16. Soft and Robust Identification of Body Fluid Using Fourier Transform Infrared Spectroscopy and Chemometric Strategies for Forensic Analysis.

    PubMed

    Takamura, Ayari; Watanabe, Ken; Akutsu, Tomoko; Ozawa, Takeaki

    2018-05-31

    Body fluid (BF) identification is a critical part of a criminal investigation because of its ability to suggest how the crime was committed and to provide reliable origins of DNA. In contrast to current methods using serological and biochemical techniques, vibrational spectroscopic approaches provide alternative advantages for forensic BF identification, such as non-destructivity and versatility for various BF types and analytical interests. However, unexplored issues remain for its practical application to forensics; for example, a specific BF needs to be discriminated from all other suspicious materials as well as other BFs, and the method should be applicable even to aged BF samples. Herein, we describe an innovative modeling method for discriminating the ATR FT-IR spectra of various BFs, including peripheral blood, saliva, semen, urine and sweat, to meet the practical demands described above. Spectra from unexpected non-BF samples were efficiently excluded as outliers by adopting the Q-statistics technique. The robustness of the models against aged BFs was significantly improved by using the discrimination scheme of a dichotomous classification tree with hierarchical clustering. The present study advances the use of vibrational spectroscopy and a chemometric strategy for forensic BF identification.

  17. Uncertainty of exploitation estimates made from tag returns

    USGS Publications Warehouse

    Miranda, L.E.; Brock, R.E.; Dorr, B.S.

    2002-01-01

    Over 6,000 crappies Pomoxis spp. were tagged in five water bodies to estimate exploitation rates by anglers. Exploitation rates were computed as the percentage of tags returned after adjustment for three sources of uncertainty: postrelease mortality due to the tagging process, tag loss, and the reporting rate of tagged fish. Confidence intervals around exploitation rates were estimated by resampling from the probability distributions of tagging mortality, tag loss, and reporting rate. Estimates of exploitation rates ranged from 17% to 54% among the five study systems. Uncertainty around estimates of tagging mortality, tag loss, and reporting resulted in 90% confidence intervals around the median exploitation rate as narrow as 15 percentage points and as broad as 46 percentage points. The greatest source of estimation error was uncertainty about tag reporting. Because the large investments required by tagging and reward operations produce imprecise estimates of the exploitation rate, it may be worth considering other approaches to estimating it or simply circumventing the exploitation question altogether.

  18. Wide-range screening of psychoactive substances by FIA-HRMS: identification strategies.

    PubMed

    Alechaga, Élida; Moyano, Encarnación; Galceran, Maria Teresa

    2015-06-01

    Recreational drugs (illicit drugs, human and veterinary medicines, legal highs, etc.) often contain lacing agents and adulterants which are not related to the main active ingredient. Serious side effects and even the death of the consumer have been related to the consumption of mixtures of psychoactive substances and/or adulterants, so it is important to know the actual composition of recreational drugs. In this work, a method based on flow injection analysis (FIA) coupled with high-resolution mass spectrometry (HRMS) is proposed for the fast identification of psychoactive substances in recreational drugs and legal highs. The FIA and HRMS working conditions were optimized in order to detect a wide range of psychoactive compounds. As most of the psychoactive substances are acid-base compounds, methanol-0.1 % aqueous formic acid (1:1 v/v) as a carrier solvent and electrospray in both positive ion mode and negative ion mode were used. Two data acquisition modes, full scan at high mass resolution (HRMS) and data-dependent tandem mass spectrometry (ddMS/HRMS) with a quadrupole-Orbitrap mass analyzer were used, resulting in sufficient selectivity for identification of the components of the samples. A custom-made database containing over 450 substances, including psychoactive compounds and common adulterants, was built to perform a high-throughput target and suspect screening. Moreover, online accurate mass databases and mass fragmenter software were used to identify unknowns. Some examples, selected among the analyzed samples of recreational drugs and legal highs using the FIA-HRMS(ddMS/HRMS) method developed, are discussed to illustrate the screening strategy used in this study. The results showed that many of the analyzed samples were adulterated, and in some cases the sample composition did not match that of the supposed marketed substance.

  19. Social evolution in micro-organisms and a Trojan horse approach to medical intervention strategies.

    PubMed

    Brown, Sam P; West, Stuart A; Diggle, Stephen P; Griffin, Ashleigh S

    2009-11-12

    Medical science is typically pitted against the evolutionary forces acting upon infective populations of bacteria. As an alternative strategy, we could exploit our growing understanding of population dynamics of social traits in bacteria to help treat bacterial disease. In particular, population dynamics of social traits could be exploited to introduce less virulent strains of bacteria, or medically beneficial alleles into infective populations. We discuss how bacterial strains adopting different social strategies can invade a population of cooperative wild-type, considering public good cheats, cheats carrying medically beneficial alleles (Trojan horses) and cheats carrying allelopathic traits (anti-competitor chemical bacteriocins or temperate bacteriophage viruses). We suggest that exploitation of the ability of cheats to invade cooperative, wild-type populations is a potential new strategy for treating bacterial disease.

  20. Exploitation in International Paid Surrogacy Arrangements.

    PubMed

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  1. Exploitation in International Paid Surrogacy Arrangements

    PubMed Central

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  2. A systematic strategy for the identification and determination of pharmaceuticals in environment using advanced LC-MS tools: application to ground water samples.

    PubMed

    Jindal, Kriti; Narayanam, Mallikarjun; Singh, Saranjit

    2015-04-10

    In the present study, a novel analytical strategy was employed to study the occurrence of 40 drug residues belonging to different medicinal classes, e.g., antibiotics, β blockers, NSAIDs, antidiabetics, proton pump inhibitors, H2 receptor antagonists, antihypertensives, antihyperlipidemics, etc. in ground water samples collected from villages adjoining to S.A.S. Nagar, Punjab, India. The drug residues were extracted from the samples using solid-phase extraction, and LC-ESI-HRMS and LC-ESI-MS/MS were used for identification and quantitation of the analytes. Initially, qualifier and quantifier MRM transitions were classified for 40 targeted drugs, followed by development of LC-MS methods for the separation of all the drugs, which were divided into three categories to curtail overlapping of peaks. Overall identification was done through matching of retention times and MRM transitions; matching of intensity ratio of qualifier to quantifier transitions; comparison of base peak MS/MS profiles; and evaluation of isotopic abundances (wherever applicable). Final confirmation was carried out through comparison of accurate masses obtained from HRMS studies for both standard and targeted analytes in the samples. The application of the strategy allowed removal of false positives and helped in identification and quantitation of diclofenac in the ground water samples of four villages, and pitavastatin in a sample of one village. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Exploration and exploitation of Victorian science in Darwin's reading notebooks.

    PubMed

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2017-02-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his local (text-to-text) and global (text-to-past) reading decisions using Kullback-Liebler Divergence, a cognitively-validated, information-theoretic measure of relative surprise. Rather than a pattern of surprise-minimization, corresponding to a pure exploitation strategy, Darwin's behavior shifts from early exploitation to later exploration, seeking unusually high levels of cognitive surprise relative to previous eras. These shifts, detected by an unsupervised Bayesian model, correlate with major intellectual epochs of his career as identified both by qualitative scholarship and Darwin's own self-commentary. Our methods allow us to compare his consumption of texts with their publication order. We find Darwin's consumption more exploratory than the culture's production, suggesting that underneath gradual societal changes are the explorations of individual synthesis and discovery. Our quantitative methods advance the study of cognitive search through a framework for testing interactions between individual and collective behavior and between short- and long-term consumption choices. This novel application of topic modeling to characterize individual reading complements widespread studies of collective scientific behavior. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Mortar and artillery variants classification by exploiting characteristics of the acoustic signature

    NASA Astrophysics Data System (ADS)

    Hohil, Myron E.; Grasing, David; Desai, Sachi; Morcos, Amir

    2007-10-01

    Feature extraction methods based on the discrete wavelet transform and multiresolution analysis facilitate the development of a robust classification algorithm that reliably discriminates mortar and artillery variants via acoustic signals produced during the launch/impact events. Utilizing acoustic sensors to exploit the sound waveform generated from the blast for the identification of mortar and artillery variants. Distinct characteristics arise within the different mortar variants because varying HE mortar payloads and related charges emphasize concussive and shrapnel effects upon impact employing varying magnitude explosions. The different mortar variants are characterized by variations in the resulting waveform of the event. The waveform holds various harmonic properties distinct to a given mortar/artillery variant that through advanced signal processing techniques can employed to classify a given set. The DWT and other readily available signal processing techniques will be used to extract the predominant components of these characteristics from the acoustic signatures at ranges exceeding 2km. Exploiting these techniques will help develop a feature set highly independent of range, providing discrimination based on acoustic elements of the blast wave. Highly reliable discrimination will be achieved with a feed-forward neural network classifier trained on a feature space derived from the distribution of wavelet coefficients, frequency spectrum, and higher frequency details found within different levels of the multiresolution decomposition. The process that will be described herein extends current technologies, which emphasis multi modal sensor fusion suites to provide such situational awareness. A two fold problem of energy consumption and line of sight arise with the multi modal sensor suites. The process described within will exploit the acoustic properties of the event to provide variant classification as added situational awareness to the solider.

  5. Poverty-Exploitation-Alienation.

    ERIC Educational Resources Information Center

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  6. The Intersection of Financial Exploitation and Financial Capacity

    PubMed Central

    Lichtenberg, P.A.

    2016-01-01

    Research in the past decade has documented that financial exploitation of older adults has become a major problem and Psychology is only recently increasing its presence in efforts to reduce exploitation. During the same time period, Psychology has been a leader in setting best practices for the assessment of diminished capacity in older adults culminating in the 2008 ABA/APA joint publication on a handbook for psychologists. Assessment of financial decision making capacity is often the cornerstone assessment needed in cases of financial exploitation. This paper will examine the intersection of financial exploitation and decision making capacity; introduce a new conceptual model and new tools for both the investigation and prevention of financial exploitation. PMID:27159438

  7. Augmented reality enabling intelligence exploitation at the edge

    NASA Astrophysics Data System (ADS)

    Kase, Sue E.; Roy, Heather; Bowman, Elizabeth K.; Patton, Debra

    2015-05-01

    Today's Warfighters need to make quick decisions while interacting in densely populated environments comprised of friendly, hostile, and neutral host nation locals. However, there is a gap in the real-time processing of big data streams for edge intelligence. We introduce a big data processing pipeline called ARTEA that ingests, monitors, and performs a variety of analytics including noise reduction, pattern identification, and trend and event detection in the context of an area of operations (AOR). Results of the analytics are presented to the Soldier via an augmented reality (AR) device Google Glass (Glass). Non-intrusive AR devices such as Glass can visually communicate contextually relevant alerts to the Soldier based on the current mission objectives, time, location, and observed or sensed activities. This real-time processing and AR presentation approach to knowledge discovery flattens the intelligence hierarchy enabling the edge Soldier to act as a vital and active participant in the analysis process. We report preliminary observations testing ARTEA and Glass in a document exploitation and person of interest scenario simulating edge Soldier participation in the intelligence process in disconnected deployment conditions.

  8. Future potential for anti-infectives from bacteria - how to exploit biodiversity and genomic potential.

    PubMed

    Müller, Rolf; Wink, Joachim

    2014-01-01

    The early stages of antibiotic development include the identification of novel hit compounds. Since actinomycetes and myxobacteria are still the most important natural sources of active metabolites, we provide an overview on these producers and discuss three of the most promising approaches toward finding novel anti-infectives from microorganisms. These are defined as the use of biodiversity to find novel producers, the variation of culture conditions and induction of silent genes, and the exploitation of the genomic potential of producers via "genome mining". Challenges that exist beyond compound discovery are outlined in the last section. Copyright © 2013 Elsevier GmbH. All rights reserved.

  9. Social evolution in micro-organisms and a Trojan horse approach to medical intervention strategies

    PubMed Central

    Brown, Sam P.; West, Stuart A.; Diggle, Stephen P.; Griffin, Ashleigh S.

    2009-01-01

    Medical science is typically pitted against the evolutionary forces acting upon infective populations of bacteria. As an alternative strategy, we could exploit our growing understanding of population dynamics of social traits in bacteria to help treat bacterial disease. In particular, population dynamics of social traits could be exploited to introduce less virulent strains of bacteria, or medically beneficial alleles into infective populations. We discuss how bacterial strains adopting different social strategies can invade a population of cooperative wild-type, considering public good cheats, cheats carrying medically beneficial alleles (Trojan horses) and cheats carrying allelopathic traits (anti-competitor chemical bacteriocins or temperate bacteriophage viruses). We suggest that exploitation of the ability of cheats to invade cooperative, wild-type populations is a potential new strategy for treating bacterial disease. PMID:19805424

  10. Surrogate Model Application to the Identification of Optimal Groundwater Exploitation Scheme Based on Regression Kriging Method—A Case Study of Western Jilin Province

    PubMed Central

    An, Yongkai; Lu, Wenxi; Cheng, Weiguo

    2015-01-01

    This paper introduces a surrogate model to identify an optimal exploitation scheme, while the western Jilin province was selected as the study area. A numerical simulation model of groundwater flow was established first, and four exploitation wells were set in the Tongyu county and Qian Gorlos county respectively so as to supply water to Daan county. Second, the Latin Hypercube Sampling (LHS) method was used to collect data in the feasible region for input variables. A surrogate model of the numerical simulation model of groundwater flow was developed using the regression kriging method. An optimization model was established to search an optimal groundwater exploitation scheme using the minimum average drawdown of groundwater table and the minimum cost of groundwater exploitation as multi-objective functions. Finally, the surrogate model was invoked by the optimization model in the process of solving the optimization problem. Results show that the relative error and root mean square error of the groundwater table drawdown between the simulation model and the surrogate model for 10 validation samples are both lower than 5%, which is a high approximation accuracy. The contrast between the surrogate-based simulation optimization model and the conventional simulation optimization model for solving the same optimization problem, shows the former only needs 5.5 hours, and the latter needs 25 days. The above results indicate that the surrogate model developed in this study could not only considerably reduce the computational burden of the simulation optimization process, but also maintain high computational accuracy. This can thus provide an effective method for identifying an optimal groundwater exploitation scheme quickly and accurately. PMID:26264008

  11. Behavioural system identification of visual flight speed control in Drosophila melanogaster

    PubMed Central

    Rohrseitz, Nicola; Fry, Steven N.

    2011-01-01

    Behavioural control in many animals involves complex mechanisms with intricate sensory-motor feedback loops. Modelling allows functional aspects to be captured without relying on a description of the underlying complex, and often unknown, mechanisms. A wide range of engineering techniques are available for modelling, but their ability to describe time-continuous processes is rarely exploited to describe sensory-motor control mechanisms in biological systems. We performed a system identification of visual flight speed control in the fruitfly Drosophila, based on an extensive dataset of open-loop responses previously measured under free flight conditions. We identified a second-order under-damped control model with just six free parameters that well describes both the transient and steady-state characteristics of the open-loop data. We then used the identified control model to predict flight speed responses after a visual perturbation under closed-loop conditions and validated the model with behavioural measurements performed in free-flying flies under the same closed-loop conditions. Our system identification of the fruitfly's flight speed response uncovers the high-level control strategy of a fundamental flight control reflex without depending on assumptions about the underlying physiological mechanisms. The results are relevant for future investigations of the underlying neuromotor processing mechanisms, as well as for the design of biomimetic robots, such as micro-air vehicles. PMID:20525744

  12. Behavioural system identification of visual flight speed control in Drosophila melanogaster.

    PubMed

    Rohrseitz, Nicola; Fry, Steven N

    2011-02-06

    Behavioural control in many animals involves complex mechanisms with intricate sensory-motor feedback loops. Modelling allows functional aspects to be captured without relying on a description of the underlying complex, and often unknown, mechanisms. A wide range of engineering techniques are available for modelling, but their ability to describe time-continuous processes is rarely exploited to describe sensory-motor control mechanisms in biological systems. We performed a system identification of visual flight speed control in the fruitfly Drosophila, based on an extensive dataset of open-loop responses previously measured under free flight conditions. We identified a second-order under-damped control model with just six free parameters that well describes both the transient and steady-state characteristics of the open-loop data. We then used the identified control model to predict flight speed responses after a visual perturbation under closed-loop conditions and validated the model with behavioural measurements performed in free-flying flies under the same closed-loop conditions. Our system identification of the fruitfly's flight speed response uncovers the high-level control strategy of a fundamental flight control reflex without depending on assumptions about the underlying physiological mechanisms. The results are relevant for future investigations of the underlying neuromotor processing mechanisms, as well as for the design of biomimetic robots, such as micro-air vehicles.

  13. Organic Pollutants in Shale Gas Flowback and Produced Waters: Identification, Potential Ecological Impact, and Implications for Treatment Strategies.

    PubMed

    Butkovskyi, Andrii; Bruning, Harry; Kools, Stefan A E; Rijnaarts, Huub H M; Van Wezel, Annemarie P

    2017-05-02

    Organic contaminants in shale gas flowback and produced water (FPW) are traditionally expressed as total organic carbon (TOC) or chemical oxygen demand (COD), though these parameters do not provide information on the toxicity and environmental fate of individual components. This review addresses identification of individual organic contaminants in FPW, and stresses the gaps in the knowledge on FPW composition that exist so far. Furthermore, the risk quotient approach was applied to predict the toxicity of the quantified organic compounds for fresh water organisms in recipient surface waters. This resulted in an identification of a number of FPW related organic compounds that are potentially harmful namely those compounds originating from shale formations (e.g., polycyclic aromatic hydrocarbons, phthalates), fracturing fluids (e.g., quaternary ammonium biocides, 2-butoxyethanol) and downhole transformations of organic compounds (e.g., carbon disulfide, halogenated organic compounds). Removal of these compounds by FPW treatment processes is reviewed and potential and efficient abatement strategies are defined.

  14. Organic Pollutants in Shale Gas Flowback and Produced Waters: Identification, Potential Ecological Impact, and Implications for Treatment Strategies

    PubMed Central

    2017-01-01

    Organic contaminants in shale gas flowback and produced water (FPW) are traditionally expressed as total organic carbon (TOC) or chemical oxygen demand (COD), though these parameters do not provide information on the toxicity and environmental fate of individual components. This review addresses identification of individual organic contaminants in FPW, and stresses the gaps in the knowledge on FPW composition that exist so far. Furthermore, the risk quotient approach was applied to predict the toxicity of the quantified organic compounds for fresh water organisms in recipient surface waters. This resulted in an identification of a number of FPW related organic compounds that are potentially harmful namely those compounds originating from shale formations (e.g., polycyclic aromatic hydrocarbons, phthalates), fracturing fluids (e.g., quaternary ammonium biocides, 2-butoxyethanol) and downhole transformations of organic compounds (e.g., carbon disulfide, halogenated organic compounds). Removal of these compounds by FPW treatment processes is reviewed and potential and efficient abatement strategies are defined. PMID:28376616

  15. Space Station end effector strategy study

    NASA Technical Reports Server (NTRS)

    Katzberg, Stephen J.; Jensen, Robert L.; Willshire, Kelli F.; Satterthwaite, Robert E.

    1987-01-01

    The results of a study are presented for terminology definition, identification of functional requirements, technolgy assessment, and proposed end effector development strategies for the Space Station Program. The study is composed of a survey of available or under-developed end effector technology, identification of requirements from baselined Space Station documents, a comparative assessment of the match between technology and requirements, and recommended strategies for end effector development for the Space Station Program.

  16. Countermeasure Study on Deep-sea Oil Exploitation in the South China Sea——A Comparison between Deep-sea Oil Exploitation in the South China Sea and the Gulf of Mexico

    NASA Astrophysics Data System (ADS)

    Zhao, Hui; Qiu, Weiting; Qu, Weilu

    2018-02-01

    The unpromising situation of terrestrial oil resources makes the deep-sea oil industry become an important development strategy. The South China Sea has a vast sea area with a wide distribution of oil and gas resources, but there is a phenomenon that exploration and census rates and oil exploitation are low. In order to solve the above problems, this article analyzes the geology, oil and gas exploration and exploration equipment in the South China Sea and the Gulf of Mexico. Comparing the political environment of China and the United States energy industry and the economic environment of oil companies, this article points out China’s deep-sea oil exploration and mining problems that may exist. Finally, the feasibility of oil exploration and exploitation in the South China Sea is put forward, which will provide reference to improve the conditions of oil exploration in the South China Sea and promoting the stable development of China’s oil industry.

  17. Reframing measurement for structural health monitoring: a full-field strategy for structural identification

    NASA Astrophysics Data System (ADS)

    Dizaji, Mehrdad S.; Harris, Devin K.; Alipour, Mohamad; Ozbulut, Osman E.

    2018-03-01

    Structural health monitoring (SHM) describes a decision-making framework that is fundamentally guided by state change detection of structural systems. This framework typically relies on the use of continuous or semi-continuous monitoring of measured response to quantify this state change in structural system behavior, which is often related to the initiation of some form of damage. Measurement approaches used for traditional SHM are numerous, but most are limited to either describing localized or global phenomena, making it challenging to characterize operational structural systems which exhibit both. In addition to these limitations in sensing, SHM has also suffered from the inherent robustness inherent to most full-scale structural systems, making it challenging to identify local damage. These challenges highlight the opportunity for alternative strategies for SHM, strategies that are able to provide data suitable to translate into rich information. This paper describes preliminary results from a refined structural identification (St-ID) approach using fullfield measurements derived from high-speed 3D Digital Image Correlation (HSDIC) to characterize uncertain parameters (i.e. boundary and constitutive properties) of a laboratory scale structural component. The St-ID approach builds from prior work by supplementing full-field deflection and strain response with vibration response derived from HSDIC. Inclusion of the modal characteristics within a hybrid-genetic algorithm optimization scheme allowed for simultaneous integration of mechanical and modal response, thus enabling a more robust St-ID strategy than could be achieved with traditional sensing techniques. The use of full-field data is shown to provide a more comprehensive representation of the global and local behavior, which in turn increases the robustness of the St-Id framework. This work serves as the foundation for a new paradigm in SHM that emphasizes characterizing structural performance using a

  18. Competing Discourses about Youth Sexual Exploitation in Canadian News Media

    PubMed Central

    Saewyc, Elizabeth M.; Miller, Bonnie B.; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2015-01-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989–2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called ‘customers’ or ‘consumers,’ and occasionally ‘predators’; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a ‘victimless crime,’ maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade. PMID:26793015

  19. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    PubMed

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  20. Targeting LKB1 in cancer – exposing and exploiting vulnerabilities

    PubMed Central

    Momcilovic, M; Shackelford, D B

    2015-01-01

    The LKB1 tumour suppressor is a serine/threonine kinase that functions as master regulator of cell growth, metabolism, survival and polarity. LKB1 is frequently mutated in human cancers and research spanning the last two decades have begun decoding the cellular pathways deregulated following LKB1 inactivation. This work has led to the identification of vulnerabilities present in LKB1-deficient tumour cells. Pre-clinical studies have now identified therapeutic strategies targeting this subset of tumours that promise to benefit this large patient population harbouring LKB1 mutations. Here, we review the current efforts that are underway to translate pre-clinical discovery of therapeutic strategies targeting LKB1 mutant cancers into clinical practice. PMID:26196184

  1. A strategy with novel evolutionary features for the iterated prisoner's dilemma.

    PubMed

    Li, Jiawei; Kendall, Graham

    2009-01-01

    In recent iterated prisoner's dilemma tournaments, the most successful strategies were those that had identification mechanisms. By playing a predetermined sequence of moves and learning from their opponents' responses, these strategies managed to identify their opponents. We believe that these identification mechanisms may be very useful in evolutionary games. In this paper one such strategy, which we call collective strategy, is analyzed. Collective strategies apply a simple but efficient identification mechanism (that just distinguishes themselves from other strategies), and this mechanism allows them to only cooperate with their group members and defect against any others. In this way, collective strategies are able to maintain a stable population in evolutionary iterated prisoner's dilemma. By means of an invasion barrier, this strategy is compared with other strategies in evolutionary dynamics in order to demonstrate its evolutionary features. We also find that this collective behavior assists the evolution of cooperation in specific evolutionary environments.

  2. Simulated population responses of common carp to commercial exploitation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present),more » fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population

  3. Parameter identification of piezoelectric hysteresis model based on improved artificial bee colony algorithm

    NASA Astrophysics Data System (ADS)

    Wang, Geng; Zhou, Kexin; Zhang, Yeming

    2018-04-01

    The widely used Bouc-Wen hysteresis model can be utilized to accurately simulate the voltage-displacement curves of piezoelectric actuators. In order to identify the unknown parameters of the Bouc-Wen model, an improved artificial bee colony (IABC) algorithm is proposed in this paper. A guiding strategy for searching the current optimal position of the food source is proposed in the method, which can help balance the local search ability and global exploitation capability. And the formula for the scout bees to search for the food source is modified to increase the convergence speed. Some experiments were conducted to verify the effectiveness of the IABC algorithm. The results show that the identified hysteresis model agreed well with the actual actuator response. Moreover, the identification results were compared with the standard particle swarm optimization (PSO) method, and it can be seen that the search performance in convergence rate of the IABC algorithm is better than that of the standard PSO method.

  4. Identification of individualised empirical models of carbohydrate and insulin effects on T1DM blood glucose dynamics

    NASA Astrophysics Data System (ADS)

    Cescon, Marzia; Johansson, Rolf; Renard, Eric; Maran, Alberto

    2014-07-01

    One of the main limiting factors in improving glucose control for type 1 diabetes mellitus (T1DM) subjects is the lack of a precise description of meal and insulin intake effects on blood glucose. Knowing the magnitude and duration of such effects would be useful not only for patients and physicians, but also for the development of a controller targeting glycaemia regulation. Therefore, in this paper we focus on estimating low-complexity yet physiologically sound and individualised multi-input single-output (MISO) models of the glucose metabolism in T1DM able to reflect the basic dynamical features of the glucose-insulin metabolic system in response to a meal intake or an insulin injection. The models are continuous-time second-order transfer functions relating the amount of carbohydrate of a meal and the insulin units of the accordingly administered dose (inputs) to plasma glucose evolution (output) and consist of few parameters clinically relevant to be estimated. The estimation strategy is continuous-time data-driven system identification and exploits a database in which meals and insulin boluses are separated in time, allowing the unique identification of the model parameters.

  5. Transnational gestational surrogacy: does it have to be exploitative?

    PubMed

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  6. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  7. Exploiting multicore compute resources in the CMS experiment

    NASA Astrophysics Data System (ADS)

    Ramírez, J. E.; Pérez-Calero Yzquierdo, A.; Hernández, J. M.; CMS Collaboration

    2016-10-01

    CMS has developed a strategy to efficiently exploit the multicore architecture of the compute resources accessible to the experiment. A coherent use of the multiple cores available in a compute node yields substantial gains in terms of resource utilization. The implemented approach makes use of the multithreading support of the event processing framework and the multicore scheduling capabilities of the resource provisioning system. Multicore slots are acquired and provisioned by means of multicore pilot agents which internally schedule and execute single and multicore payloads. Multicore scheduling and multithreaded processing are currently used in production for online event selection and prompt data reconstruction. More workflows are being adapted to run in multicore mode. This paper presents a review of the experience gained in the deployment and operation of the multicore scheduling and processing system, the current status and future plans.

  8. The expression of virulence during double infections by different parasites with conflicting host exploitation and transmission strategies.

    PubMed

    Ben-Ami, F; Rigaud, T; Ebert, D

    2011-06-01

    In many natural populations, hosts are found to be infected by more than one parasite species. When these parasites have different host exploitation strategies and transmission modes, a conflict among them may arise. Such a conflict may reduce the success of both parasites, but could work to the benefit of the host. For example, the less-virulent parasite may protect the host against the more-virulent competitor. We examine this conflict using the waterflea Daphnia magna and two of its sympatric parasites: the blood-infecting bacterium Pasteuria ramosa that transmits horizontally and the intracellular microsporidium Octosporea bayeri that can concurrently transmit horizontally and vertically after infecting ovaries and fat tissues of the host. We quantified host and parasite fitness after exposing Daphnia to one or both parasites, both simultaneously and sequentially. Under conditions of strict horizontal transmission, Pasteuria competitively excluded Octosporea in both simultaneous and sequential double infections, regardless of the order of exposure. Host lifespan, host reproduction and parasite spore production in double infections resembled those of single infection by Pasteuria. When hosts became first vertically (transovarilly) infected with O. bayeri, Octosporea was able to withstand competition with P. ramosa to some degree, but both parasites produced less transmission stages than they did in single infections. At the same time, the host suffered from reduced fecundity and longevity. Our study demonstrates that even when competing parasite species utilize different host tissues to proliferate, double infections lead to the expression of higher virulence and ultimately may select for higher virulence. Furthermore, we found no evidence that the less-virulent and vertically transmitting O. bayeri protects its host against the highly virulent P. ramosa. © 2011 The Authors. Journal of Evolutionary Biology © 2011 European Society For Evolutionary Biology.

  9. Medicinal uses of mushrooms in Nigeria: towards full and sustainable exploitation.

    PubMed

    Oyetayo, Olusegun V

    2011-01-01

    For centuries, mushrooms have been appreciated as sources of food nutrients and pharmacologically important compounds useful in medicine. Yet not all the medicinal properties of mushrooms have been exploited. The above statement is more pertinent to mushrooms that are indigenous to Nigeria. There are inadequate data on the identity and medicinal properties of these wild mushrooms. Information on the ethnomedicinal uses of some mushrooms such as Pleurotus tuber-regium used for headache, stomach pain fever, cold, constipation; Lentinus squarullosus for mumps, heart diseases; Termitomyces microcarpus for gonorrhea; Calvatia cyathiformis for leucorrhea, barreness; Ganoderma lucidum for treating arthritis, neoplasia; G. resinaceum used for hyperglycemia, liver diseases (hepatoprotector); G. applanatum used as antioxidant and for diabetes had been gathered through survey. The above information is mostly obtained from traditional herbalists who in most cases will not disclose their preparation compositions. A lot of these mushrooms are obtained only in the wild. Scientific documents of the identities and medicinal properties are still scanty. Preliminary studies on some species of Temitomyces, Lenzites and Lentinus species showed that they possess appreciable antimicrobial and antioxidant properties. Moreover, molecular characterization also reveals that they are not 100% homologous with existing sequences under the same name in GenBank. It is therefore pertinent that well structured studies on their ecology, identification and medicinal uses be carried out. This will make the full exploitation of the medicinal potentials of mushrooms indigenous to Nigeria realizable.

  10. Main principles of developing exploitation models of semiconductor devices

    NASA Astrophysics Data System (ADS)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  11. Yeast Inner-Subunit PA-NZ-1 Labeling Strategy for Accurate Subunit Identification in a Macromolecular Complex through Cryo-EM Analysis.

    PubMed

    Wang, Huping; Han, Wenyu; Takagi, Junichi; Cong, Yao

    2018-05-11

    Cryo-electron microscopy (cryo-EM) has been established as one of the central tools in the structural study of macromolecular complexes. Although intermediate- or low-resolution structural information through negative staining or cryo-EM analysis remains highly valuable, we lack general and efficient ways to achieve unambiguous subunit identification in these applications. Here, we took advantage of the extremely high affinity between a dodecapeptide "PA" tag and the NZ-1 antibody Fab fragment to develop an efficient "yeast inner-subunit PA-NZ-1 labeling" strategy that when combined with cryo-EM could precisely identify subunits in macromolecular complexes. Using this strategy combined with cryo-EM 3D reconstruction, we were able to visualize the characteristic NZ-1 Fab density attached to the PA tag inserted into a surface-exposed loop in the middle of the sequence of CCT6 subunit present in the Saccharomyces cerevisiae group II chaperonin TRiC/CCT. This procedure facilitated the unambiguous localization of CCT6 in the TRiC complex. The PA tag was designed to contain only 12 amino acids and a tight turn configuration; when inserted into a loop, it usually has a high chance of maintaining the epitope structure and low likelihood of perturbing the native structure and function of the target protein compared to other tagging systems. We also found that the association between PA and NZ-1 can sustain the cryo freezing conditions, resulting in very high occupancy of the Fab in the final cryo-EM images. Our study demonstrated the robustness of this strategy combined with cryo-EM in efficient and accurate subunit identification in challenging multi-component complexes. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. The business of exploiting induced pluripotent stem cells.

    PubMed

    Prescott, Catherine

    2011-08-12

    Induced pluripotent stem cells (iPS cells) can be exploited for both research and clinical applications. The first part of this review seeks to provide an understanding of the financial drivers and key elements of a successful business strategy that underpin a company focused on developing iPS-related products and services targeted at the research market. The latter part of the review highlights some of the reasons as to why the reprogramming of somatic cells is currently being used to develop cell-based models to screen for small molecules with drug-like properties rather than to develop cell-based regenerative medicines per se. The latter may be used to repair or replace a patient's damaged cells and thereby have the potential to 'cure' a disease and, in doing so, prevent or delay the onset of associated medical conditions. However, the cost of an expensive regenerative medicine and time to accrue any benefit linked to a decrease in co-morbidity expenditure may not outweigh the benefit for a healthcare community that has finite resources. The implications of this are discussed together with evidence that the UK National Institute for Health and Clinical Excellence (NICE) and the National Health Service (NHS) have established a precedent for a cost-sharing strategy with the pharmaceutical industry.

  13. Accelerating Sequences in the Presence of Metal by Exploiting the Spatial Distribution of Off-Resonance

    PubMed Central

    Smith, Matthew R.; Artz, Nathan S.; Koch, Kevin M.; Samsonov, Alexey; Reeder, Scott B.

    2014-01-01

    Purpose To demonstrate feasibility of exploiting the spatial distribution of off-resonance surrounding metallic implants for accelerating multispectral imaging techniques. Theory Multispectral imaging (MSI) techniques perform time-consuming independent 3D acquisitions with varying RF frequency offsets to address the extreme off-resonance from metallic implants. Each off-resonance bin provides a unique spatial sensitivity that is analogous to the sensitivity of a receiver coil, and therefore provides a unique opportunity for acceleration. Methods Fully sampled MSI was performed to demonstrate retrospective acceleration. A uniform sampling pattern across off-resonance bins was compared to several adaptive sampling strategies using a total hip replacement phantom. Monte Carlo simulations were performed to compare noise propagation of two of these strategies. With a total knee replacement phantom, positive and negative off-resonance bins were strategically sampled with respect to the B0 field to minimize aliasing. Reconstructions were performed with a parallel imaging framework to demonstrate retrospective acceleration. Results An adaptive sampling scheme dramatically improved reconstruction quality, which was supported by the noise propagation analysis. Independent acceleration of negative and positive off-resonance bins demonstrated reduced overlapping of aliased signal to improve the reconstruction. Conclusion This work presents the feasibility of acceleration in the presence of metal by exploiting the spatial sensitivities of off-resonance bins. PMID:24431210

  14. From genomics to metabolomics, moving toward an integrated strategy for the discovery of fungal secondary metabolites.

    PubMed

    Hautbergue, T; Jamin, E L; Debrauwer, L; Puel, O; Oswald, I P

    2018-02-21

    Fungal secondary metabolites are defined by bioactive properties that ensure adaptation of the fungus to its environment. Although some of these natural products are promising sources of new lead compounds especially for the pharmaceutical industry, others pose risks to human and animal health. The identification of secondary metabolites is critical to assessing both the utility and risks of these compounds. Since fungi present biological specificities different from other microorganisms, this review covers the different strategies specifically used in fungal studies to perform this critical identification. Strategies focused on the direct detection of the secondary metabolites are firstly reported. Particularly, advances in high-throughput untargeted metabolomics have led to the generation of large datasets whose exploitation and interpretation generally require bioinformatics tools. Then, the genome-based methods used to study the entire fungal metabolic potential are reported. Transcriptomic and proteomic tools used in the discovery of fungal secondary metabolites are presented as links between genomic methods and metabolomic experiments. Finally, the influence of the culture environment on the synthesis of secondary metabolites by fungi is highlighted as a major factor to consider in research on fungal secondary metabolites. Through this review, we seek to emphasize that the discovery of natural products should integrate all of these valuable tools. Attention is also drawn to emerging technologies that will certainly revolutionize fungal research and to the use of computational tools that are necessary but whose results should be interpreted carefully.

  15. Development of a biochip-based assay integrated in a global strategy for identification of fusion transcripts in acute myeloid leukemia: a work flow for acute myeloid leukemia diagnosis.

    PubMed

    Giusiano, S; Formisano-Tréziny, C; Benziane, A; Maroc, N; Picard, C; Hermitte, F; Taranger-Charpin, C; Gabert, J

    2010-08-01

    Three major types of rearrangements are involved in acute myeloid leukemias (AML): t(8;21)(q22;q22), inv(16)(p13q22), and 11q23/MLL abnormalities. Their precise identification becomes essential for diagnosis, prognosis, and therapeutic choices. Resulting fusion transcripts (FT) are also powerful markers for monitoring the efficacy of treatment, the minimal residual disease (MRD) and could become therapeutic targets. Today, the challenge is to propose an individual follow-up for each patient even for those with a rare fusion event. In this study, we propose a biochip-based assay integrated in a global strategy for identification of rare FT in AML, after fluorescence in situ hybridization detection, as described by the World Health Organization classification. Using cell lines, we developed and validated a biochip-based assay called the AMLFusionChip that identifies every FT of AML1-ETO, CBFbeta-MYH11 as well as MLL-AF9, MLL-ENL, MLL-AF6, and MLL-AF10. The original design of our AMLFusionChip.v01 enables the identification of these FT wherever the breakpoint on the partner gene may be. In case of biochip negative result, our 3'RACE amplification strategy enables to clone and then sequence the new translocation partner. This AMLFusionChip strategy fits into the concept of personalized medicine for the largest number of patients.

  16. Exploitation of high resolution beam spectroscopy diagnostics on MAST

    NASA Astrophysics Data System (ADS)

    Michael, Clive; Debock, Maarten; Conway, Neil; Akers, Rob; Appel, Lynton; Field, Anthony; Walsh, Mike; Wisse, Marco

    2009-11-01

    Recent developments in beam spectroscopy on MAST, including CXRS, MSE and a pilot FIDA system have revealed new information about phenomena such as ITBs, MHD instabilities, transport and fast particle physics. For example, ITBs in the ion temperature and toroidal rotation have been observed with the 64ch CXRS system, while reverse-shear q profiles have been observed with the recently commissioned 35ch MSE system. Thus, the synergy of these diagnostics helps us to understand, among other things, the role of magnetic and rotational shear on ITBs. MSE measurements have also helped to understand MHD phenomena such as locked modes (characterized by changes in toroidal momentum, revealed by CXRS), sawteeth, and internal reconnection events. Finally, the temporal/spatial resolution and SNR of the MSE system have been exploited. Interesting results include the detection of low frequency (˜2kHz) magnetic field fluctuations, characterization of the radial structure of higher frequency (<100kHz) broadband and coherent density (BES) fluctuations, and the identification of short scale length features (˜1.8cm) in the current profile near the edge pedestal.

  17. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less

  18. Improving industrial yeast strains: exploiting natural and artificial diversity

    PubMed Central

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Nicolino, Martina Picca; Voordeckers, Karin; Verstrepen, Kevin J

    2014-01-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as ‘global transcription machinery engineering’ (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. PMID:24724938

  19. The ESA scientific exploitation element results and outlook

    NASA Astrophysics Data System (ADS)

    Desnos, Yves-louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Donlon, Craig; Mathieu, Pierre-Philippe; Fernandez, Diego; Gascon, Ferran; Zehner, Claus; Davidson, Malcolm; Goryl, Philippe; Koetz, Benjamin; Pinnock, Simon

    2017-04-01

    The Scientific Exploitation of Operational Missions (SEOM) element of ESA's fourth Earth Observation Envelope Programme (EOEP4) prime objective is to federate, support and expand the international research community built up over the last 25 years exploiting ESA's EO missions. SEOM enables the science community to address new scientific research areas that are opened by the free and open access to data from operational EO missions. Based on community-wide recommendations, gathered through a series of international thematic workshops and scientific user consultation meetings, key research studies have been launched over the last years to further exploit data from the Sentinels (http://seom.esa.int/). During 2016 several Science users consultation workshops have been organized, new results from scientific studies have been published and open-source multi-mission scientific toolboxes have been distributed (SNAP 80000 users from 190 countries). In addition the first ESA Massive Open Online Courses on Climate from space have been deployed (20000 participants) and the second EO Open Science conference was organized at ESA in September 2016 bringing together young EO scientists and data scientists. The new EOEP5 Exploitation element approved in 2016 and starting in 2017 is taking stock of all precursor activities in EO Open Science and Innovation and in particular a workplan for ESA scientific exploitation activities has been presented to Member States taking full benefit of the latest information and communication technology. The results and highlights from current scientific exploitation activities will be presented and an outlook on the upcoming activities under the new EOEP5 exploitation element will be given.

  20. The exploitation of Gestalt principles by magicians.

    PubMed

    Barnhart, Anthony S

    2010-01-01

    Magicians exploit a host of psychological principles in deceiving their audiences. Psychologists have recently attempted to pinpoint the most common psychological tendencies exploited by magicians. This paper highlights two co-occurring principles that appear to be the basis for many popular magic tricks: accidental alignment and good continuation.

  1. Multi-look fusion identification: a paradigm shift from quality to quantity in data samples

    NASA Astrophysics Data System (ADS)

    Wong, S.

    2009-05-01

    A multi-look identification method known as score-level fusion is found to be capable of achieving very high identification accuracy, even when low quality target signatures are used. Analysis using measured ground vehicle radar signatures has shown that a 97% correct identification rate can be achieved using this multi-look fusion method; in contrast, only a 37% accuracy rate is obtained when single target signature input is used. The results suggest that quantity can be used to replace quality of the target data in improving identification accuracy. With the advent of sensor technology, a large amount of target signatures of marginal quality can be captured routinely. This quantity over quality approach allows maximum exploitation of the available data to improve the target identification performance and this could have the potential of being developed into a disruptive technology.

  2. Exploitation: One View of Industry and Business.

    ERIC Educational Resources Information Center

    Swanson, Richard A.; And Others

    1986-01-01

    This article examines the meaning of exploitation with specific reference to industry and business. The authors contend that the concept of exploitation--"the unjust or improper use of another person for one's own profit or advantage"--should be studied to improve understanding of the dynamics of the workplace. (Author/CT)

  3. Transitioning from AOP to IATA - Exploiting mechanistic ...

    EPA Pesticide Factsheets

    Slide presentation at satellite meeting of the QSAR2016 Meeting on How to Transition from AOP to IATA-Exploiting mechanistic insight for practical decision making. . Slide presentation at satellite meeting of the QSAR2016 Meeting on How to Transition from AOP to IATA-Exploiting mechanistic insight for practical decision making. .

  4. Paleolithic human exploitation of plant foods during the last glacial maximum in North China

    PubMed Central

    Liu, Li; Bestel, Sheahan; Shi, Jinming; Song, Yanhua; Chen, Xingcan

    2013-01-01

    Three grinding stones from Shizitan Locality 14 (ca. 23,000–19,500 calendar years before present) in the middle Yellow River region were subjected to usewear and residue analyses to investigate human adaptation during the last glacial maximum (LGM) period, when resources were generally scarce and plant foods may have become increasingly important in the human diet. The results show that these tools were used to process various plants, including Triticeae and Paniceae grasses, Vigna beans, Dioscorea opposita yam, and Trichosanthes kirilowii snakegourd roots. Tubers were important food resources for Paleolithic hunter–gatherers, and Paniceae grasses were exploited about 12,000 y before their domestication. The long tradition of intensive exploitation of certain types of flora helped Paleolithic people understand the properties of these plants, including their medicinal uses, and eventually led to the plants' domestication. This study sheds light on the deep history of the broad spectrum subsistence strategy characteristic of late Pleistocene north China before the origins of agriculture in this region. PMID:23509257

  5. Paleolithic human exploitation of plant foods during the last glacial maximum in North China.

    PubMed

    Liu, Li; Bestel, Sheahan; Shi, Jinming; Song, Yanhua; Chen, Xingcan

    2013-04-02

    Three grinding stones from Shizitan Locality 14 (ca. 23,000-19,500 calendar years before present) in the middle Yellow River region were subjected to usewear and residue analyses to investigate human adaptation during the last glacial maximum (LGM) period, when resources were generally scarce and plant foods may have become increasingly important in the human diet. The results show that these tools were used to process various plants, including Triticeae and Paniceae grasses, Vigna beans, Dioscorea opposita yam, and Trichosanthes kirilowii snakegourd roots. Tubers were important food resources for Paleolithic hunter-gatherers, and Paniceae grasses were exploited about 12,000 y before their domestication. The long tradition of intensive exploitation of certain types of flora helped Paleolithic people understand the properties of these plants, including their medicinal uses, and eventually led to the plants' domestication. This study sheds light on the deep history of the broad spectrum subsistence strategy characteristic of late Pleistocene north China before the origins of agriculture in this region.

  6. Semi-supervised word polarity identification in resource-lean languages.

    PubMed

    Dehdarbehbahani, Iman; Shakery, Azadeh; Faili, Heshaam

    2014-10-01

    Sentiment words, as fundamental constitutive parts of subjective sentences, have a substantial effect on analysis of opinions, emotions and beliefs. Most of the proposed methods for identifying the semantic orientations of words exploit rich linguistic resources such as WordNet, subjectivity corpora, or polarity tagged words. Shortage of such linguistic resources in resource-lean languages affects the performance of word polarity identification in these languages. In this paper, we present a method which exploits a language with rich subjectivity analysis resources (English) to identify the polarity of words in a resource-lean foreign language. The English WordNet and a sparse foreign WordNet infrastructure are used to create a heterogeneous, multilingual and weighted semantic network. To identify the semantic orientation of foreign words, a random walk based method is applied to the semantic network along with a set of automatically weighted English positive and negative seeds. In a post-processing phase, synonym and antonym relations in the foreign WordNet are used to filter the random walk results. Our experiments on English and Persian languages show that the proposed method can outperform state-of-the-art word polarity identification methods in both languages. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Rationalising predictors of child sexual exploitation and sex-trading.

    PubMed

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  8. Identification of pilot-vehicle dynamics from simulation and flight test

    NASA Technical Reports Server (NTRS)

    Hess, Ronald A.

    1990-01-01

    The paper discusses an identification problem in which a basic feedback control structure, or pilot control strategy, is hypothesized. Identification algorithms are employed to determine the particular form of pilot equalization in each feedback loop. It was found that both frequency- and time-domain identification techniques provide useful information.

  9. Deception in plants: mimicry or perceptual exploitation?

    PubMed

    Schaefer, H Martin; Ruxton, Graeme D

    2009-12-01

    Mimicry involves adaptive resemblance between a mimic and a model. However, despite much recent research, it remains contentious in plants. Here, we review recent progress on studying deception by flowers, distinguishing between plants relying on mimicry to achieve pollination and those relying on the exploitation of the perceptual biases of animals. We disclose fundamental differences between both mechanisms and explain why the evolution of exploitation is less constrained than that of mimicry. Exploitation of perceptual biases might thus be a precursor for the gradual evolution of mimicry. Increasing knowledge on the sensory and cognitive filters in animals, and on the selective pressures that maintain them, should aid researchers in tracing the evolutionary dynamics of deception in plants.

  10. Fluency heuristic: a model of how the mind exploits a by-product of information retrieval.

    PubMed

    Hertwig, Ralph; Herzog, Stefan M; Schooler, Lael J; Reimer, Torsten

    2008-09-01

    Boundedly rational heuristics for inference can be surprisingly accurate and frugal for several reasons. They can exploit environmental structures, co-opt complex capacities, and elude effortful search by exploiting information that automatically arrives on the mental stage. The fluency heuristic is a prime example of a heuristic that makes the most of an automatic by-product of retrieval from memory, namely, retrieval fluency. In 4 experiments, the authors show that retrieval fluency can be a proxy for real-world quantities, that people can discriminate between two objects' retrieval fluencies, and that people's inferences are in line with the fluency heuristic (in particular fast inferences) and with experimentally manipulated fluency. The authors conclude that the fluency heuristic may be one tool in the mind's repertoire of strategies that artfully probes memory for encapsulated frequency information that can veridically reflect statistical regularities in the world. (c) 2008 APA, all rights reserved.

  11. Balancing exploration and exploitation in transferring research into practice: a comparison of five knowledge translation entity archetypes

    PubMed Central

    2013-01-01

    insights on strategies in structuring collaboration to facilitate an effective balance of exploration and exploitation learning in the KT process. PMID:24007259

  12. Balancing exploration and exploitation in transferring research into practice: a comparison of five knowledge translation entity archetypes.

    PubMed

    Oborn, Eivor; Barrett, Michael; Prince, Karl; Racko, Girts

    2013-09-05

    Translating knowledge from research into clinical practice has emerged as a practice of increasing importance. This has led to the creation of new organizational entities designed to bridge knowledge between research and practice. Within the UK, the Collaborations for Leadership in Applied Health Research and Care (CLAHRC) have been introduced to ensure that emphasis is placed in ensuring research is more effectively translated and implemented in clinical practice. Knowledge translation (KT) can be accomplished in various ways and is affected by the structures, activities, and coordination practices of organizations. We draw on concepts in the innovation literature--namely exploration, exploitation, and ambidexterity--to examine these structures and activities as well as the ensuing tensions between research and implementation. Using a qualitative research approach, the study was based on 106 semi-structured, in-depth interviews with the directors, theme leads and managers, key professionals involved in research and implementation in nine CLAHRCs. Data was also collected from intensive focus group workshops. In this article we develop five archetypes for organizing KT. The results show how the various CLAHRC entities work through partnerships to create explorative research and deliver exploitative implementation. The different archetypes highlight a range of structures that can achieve ambidextrous balance as they organize activity and coordinate practice on a continuum of exploration and exploitation. This work suggests that KT entities aim to reach their goals through a balance between exploration and exploitation in the support of generating new research and ensuring knowledge implementation. We highlight different organizational archetypes that support various ways to maintain ambidexterity, where both exploration and exploitation are supported in an attempt to narrow the knowledge gaps. The KT entity archetypes offer insights on strategies in structuring

  13. The Effect of a Course Management System (CMS)-Supported Strategy Instruction on EFL Reading Comprehension and Strategy Use

    ERIC Educational Resources Information Center

    Tsai, Yea-Ru; Talley, Paul C.

    2014-01-01

    This paper reports on the effect of a Moodle-supported strategy instruction on both reading comprehension and strategy use among EFL (English as a Foreign Language) students. Specific reading strategy training was first integrated into a Moodle system, which included reading exercises on problem identification, monitoring comprehension,…

  14. Exploiting position effects and the gypsy retrovirus insulator to engineer precisely expressed transgenes.

    PubMed

    Markstein, Michele; Pitsouli, Chrysoula; Villalta, Christians; Celniker, Susan E; Perrimon, Norbert

    2008-04-01

    A major obstacle to creating precisely expressed transgenes lies in the epigenetic effects of the host chromatin that surrounds them. Here we present a strategy to overcome this problem, employing a Gal4-inducible luciferase assay to systematically quantify position effects of host chromatin and the ability of insulators to counteract these effects at phiC31 integration loci randomly distributed throughout the Drosophila genome. We identify loci that can be exploited to deliver precise doses of transgene expression to specific tissues. Moreover, we uncover a previously unrecognized property of the gypsy retrovirus insulator to boost gene expression to levels severalfold greater than at most or possibly all un-insulated loci, in every tissue tested. These findings provide the first opportunity to create a battery of transgenes that can be reliably expressed at high levels in virtually any tissue by integration at a single locus, and conversely, to engineer a controlled phenotypic allelic series by exploiting several loci. The generality of our approach makes it adaptable to other model systems to identify and modify loci for optimal transgene expression.

  15. Exploiting Genome Structure in Association Analysis

    PubMed Central

    Kim, Seyoung

    2014-01-01

    Abstract A genome-wide association study involves examining a large number of single-nucleotide polymorphisms (SNPs) to identify SNPs that are significantly associated with the given phenotype, while trying to reduce the false positive rate. Although haplotype-based association methods have been proposed to accommodate correlation information across nearby SNPs that are in linkage disequilibrium, none of these methods directly incorporated the structural information such as recombination events along chromosome. In this paper, we propose a new approach called stochastic block lasso for association mapping that exploits prior knowledge on linkage disequilibrium structure in the genome such as recombination rates and distances between adjacent SNPs in order to increase the power of detecting true associations while reducing false positives. Following a typical linear regression framework with the genotypes as inputs and the phenotype as output, our proposed method employs a sparsity-enforcing Laplacian prior for the regression coefficients, augmented by a first-order Markov process along the sequence of SNPs that incorporates the prior information on the linkage disequilibrium structure. The Markov-chain prior models the structural dependencies between a pair of adjacent SNPs, and allows us to look for association SNPs in a coupled manner, combining strength from multiple nearby SNPs. Our results on HapMap-simulated datasets and mouse datasets show that there is a significant advantage in incorporating the prior knowledge on linkage disequilibrium structure for marker identification under whole-genome association. PMID:21548809

  16. Common IED exploitation target set ontology

    NASA Astrophysics Data System (ADS)

    Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William

    2010-04-01

    The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.

  17. Rethinking exploitation: a process-centered account.

    PubMed

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  18. Exploiting opportunistic resources for ATLAS with ARC CE and the Event Service

    NASA Astrophysics Data System (ADS)

    Cameron, D.; Filipčič, A.; Guan, W.; Tsulaia, V.; Walker, R.; Wenaus, T.; ATLAS Collaboration

    2017-10-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from those that comprise the Grid computing of most experiments, therefore exploiting them requires a change in strategy for the experiment. They may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The Advanced Resource Connector Computing Element (ARC CE) with its nonintrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the ATLAS Event Service (AES) primarily to address the issue of jobs that can be terminated at any point when opportunistic computing capacity is needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in a restrictive environment. In addition to the technical details, results from deployment of this solution in the SuperMUC HPC centre in Munich are shown.

  19. Exploiting rRNA operon copy number to investigate bacterial reproductive strategies.

    PubMed

    Roller, Benjamin R K; Stoddard, Steven F; Schmidt, Thomas M

    2016-09-12

    The potential for rapid reproduction is a hallmark of microbial life, but microbes in nature must also survive and compete when growth is constrained by resource availability. Successful reproduction requires different strategies when resources are scarce and when they are abundant 1,2 , but a systematic framework for predicting these reproductive strategies in bacteria has not been available. Here, we show that the number of ribosomal RNA operons (rrn) in bacterial genomes predicts two important components of reproduction-growth rate and growth efficiency-which are favoured under contrasting regimes of resource availability 3,4 . We find that the maximum reproductive rate of bacteria doubles with a doubling of rrn copy number, and the efficiency of carbon use is inversely related to maximal growth rate and rrn copy number. We also identify a feasible explanation for these patterns: the rate and yield of protein synthesis mirror the overall pattern in maximum growth rate and growth efficiency. Furthermore, comparative analysis of genomes from 1,167 bacterial species reveals that rrn copy number predicts traits associated with resource availability, including chemotaxis and genome streamlining. Genome-wide patterns of orthologous gene content covary with rrn copy number, suggesting convergent evolution in response to resource availability. Our findings imply that basic cellular processes adapt in contrasting ways to long-term differences in resource availability. They also establish a basis for predicting changes in bacterial community composition in response to resource perturbations using rrn copy number measurements 5 or inferences 6,7 .

  20. A Strategy of Assumed Incumbency: A Case Study.

    ERIC Educational Resources Information Center

    Powell, Larry; Shelby, Annette

    1981-01-01

    Outlines a political campaign strategy employed by incumbents using three stages of development: legitimacy, identification, and reinforcement. A case study demonstrates the effectiveness of the strategy. (JMF)

  1. The business of exploiting induced pluripotent stem cells

    PubMed Central

    Prescott, Catherine

    2011-01-01

    Induced pluripotent stem cells (iPS cells) can be exploited for both research and clinical applications. The first part of this review seeks to provide an understanding of the financial drivers and key elements of a successful business strategy that underpin a company focused on developing iPS-related products and services targeted at the research market. The latter part of the review highlights some of the reasons as to why the reprogramming of somatic cells is currently being used to develop cell-based models to screen for small molecules with drug-like properties rather than to develop cell-based regenerative medicines per se. The latter may be used to repair or replace a patient's damaged cells and thereby have the potential to ‘cure’ a disease and, in doing so, prevent or delay the onset of associated medical conditions. However, the cost of an expensive regenerative medicine and time to accrue any benefit linked to a decrease in co-morbidity expenditure may not outweigh the benefit for a healthcare community that has finite resources. The implications of this are discussed together with evidence that the UK National Institute for Health and Clinical Excellence (NICE) and the National Health Service (NHS) have established a precedent for a cost-sharing strategy with the pharmaceutical industry. PMID:21727138

  2. Identification of problems in search strategies in Cochrane Reviews.

    PubMed

    Franco, Juan Víctor Ariel; Garrote, Virginia Laura; Escobar Liquitay, Camila Micaela; Vietto, Valeria

    2018-05-15

    Search strategies are essential for the adequate retrieval of studies in a systematic review (SR). Our objective was to identify problems in the design and reporting of search strategies in a sample of new Cochrane SRs first published in The Cochrane Library in 2015. We took a random sample of 70 new Cochrane SRs of interventions published in 2015. We evaluated their design and reporting of search strategies using the recommendations from the Cochrane Handbook for Systematic Reviews of Interventions, the Methodological Expectations of Cochrane Intervention Reviews, and the Peer Review of Electronic Search Strategies evidence-based guideline. Most reviews complied with the reporting standards in the Cochrane Handbook and the Methodological Expectations of Cochrane Intervention Reviews; however, 8 SRs did not search trials registers, 3 SRs included language restrictions, and there was inconsistent reporting of contact with individuals and searches of the gray literature. We found problems in the design of the search strategies in 73% of reviews (95% CI, 60-84%) and 53% of these contained problems (95% CI, 38-69%) that could limit both the sensitivity and precision of the search strategies. We found limitations in the design and reporting of search strategies. We consider that a greater adherence to the guidelines could improve their quality. Copyright © 2018 John Wiley & Sons, Ltd.

  3. Exploiting temporal collateral sensitivity in tumor clonal evolution

    PubMed Central

    Zhao, Boyang; Sedlak, Joseph C.; Srinivas, Raja; Creixell, Pau; Pritchard, Justin R.; Tidor, Bruce; Lauffenburger, Douglas A.; Hemann, Michael T.

    2016-01-01

    SUMMARY The prevailing approach to addressing secondary drug resistance in cancer focuses on treating the resistance mechanisms at relapse. However, the dynamic nature of clonal evolution, along with potential fitness costs and cost compensations, may present exploitable vulnerabilities; a notion that we term ‘temporal collateral sensitivity’. Using a combined pharmacological screen and drug resistance selection approach in a murine model of Ph+ acute lymphoblastic leukemia, we indeed find that temporal and/or persistent collateral sensitivity to non-classical BCR-ABL1 drugs arises in emergent tumor subpopulations during the evolution of resistance toward initial treatment with BCR-ABL1 targeted inhibitors. We determined the sensitization mechanism via genotypic, phenotypic, signaling, and binding measurements in combination with computational models, and demonstrated significant overall survival extension in mice. Additional stochastic mathematical models and small molecule screens extended our insights, indicating the value of focusing on evolutionary trajectories and pharmacological profiles to identify new strategies to treat dynamic tumor vulnerabilities. PMID:26924578

  4. Exploiting Temporal Collateral Sensitivity in Tumor Clonal Evolution.

    PubMed

    Zhao, Boyang; Sedlak, Joseph C; Srinivas, Raja; Creixell, Pau; Pritchard, Justin R; Tidor, Bruce; Lauffenburger, Douglas A; Hemann, Michael T

    2016-03-24

    The prevailing approach to addressing secondary drug resistance in cancer focuses on treating the resistance mechanisms at relapse. However, the dynamic nature of clonal evolution, along with potential fitness costs and cost compensations, may present exploitable vulnerabilities-a notion that we term "temporal collateral sensitivity." Using a combined pharmacological screen and drug resistance selection approach in a murine model of Ph(+) acute lymphoblastic leukemia, we indeed find that temporal and/or persistent collateral sensitivity to non-classical BCR-ABL1 drugs arises in emergent tumor subpopulations during the evolution of resistance toward initial treatment with BCR-ABL1-targeted inhibitors. We determined the sensitization mechanism via genotypic, phenotypic, signaling, and binding measurements in combination with computational models and demonstrated significant overall survival extension in mice. Additional stochastic mathematical models and small-molecule screens extended our insights, indicating the value of focusing on evolutionary trajectories and pharmacological profiles to identify new strategies to treat dynamic tumor vulnerabilities. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    PubMed

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  6. Use of the Theory of Planned Behaviour to assess factors influencing the identification of students at clinical high-risk for psychosis in 16+ Education.

    PubMed

    Russo, Debra A; Stochl, Jan; Painter, Michelle; Shelley, Gillian F; Jones, Peter B; Perez, Jesus

    2015-09-23

    The longer psychotic disorders are untreated the worse their prognosis. Increasing the awareness of early psychosis by professionals who come into regular contact with young people is one strategy that could reduce treatment delay. As teachers engage with students on a daily basis, their role could be exploited to increase awareness of the early signs of psychosis. This study employed the Theory of Planned Behaviour (TPB) to identify and measure factors that influence identification of students at high-risk (HR) of developing psychosis in 16+ educational institutions. An elicitation phase revealed beliefs underlying teachers' motivations to detect HR students and informed the construction of a preliminary 114-item questionnaire incorporating all constructs outlined in the TPB. To define the determinants of teachers' intention to identify HR students, 75 teachers from secondary and further education institutions in 12 counties surrounding Cambridgeshire completed the questionnaire. A psychometric model of item response theory was used to identify redundant items and produce a reduced questionnaire that would be acceptable to teachers. The final instrument comprised 73 items and showed acceptable reliability (α  = 0.69-0.81) for all direct measures. Teacher's confidence and control over identification of HR students was low. Although identification of HR students was considered worthwhile, teachers believed that their peers, students and particularly their managers might not approve. Path analysis revealed that direct measures of attitude and PBC significantly predicted intention, but subjective norm did not. PBC was the strongest predictor of intention. Collectively, the direct measures explained 37 % of the variance of intention to identify HR for psychosis. This research demonstrated how the TPB can be used to identify and measure factors that influence identification of students at HR of developing psychosis in 16+ educational institutions and confirmed the

  7. Improving industrial yeast strains: exploiting natural and artificial diversity.

    PubMed

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Picca Nicolino, Martina; Voordeckers, Karin; Verstrepen, Kevin J

    2014-09-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as 'global transcription machinery engineering' (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. © 2014 The Authors. FEMS Microbiology Reviews published by John Wiley & Sons Ltd on behalf of Federation of European Microbiological Societies.

  8. The art of war: beyond memory-one strategies in population games.

    PubMed

    Lee, Christopher; Harper, Marc; Fryer, Dashiell

    2015-01-01

    We show that the history of play in a population game contains exploitable information that can be successfully used by sophisticated strategies to defeat memory-one opponents, including zero determinant strategies. The history allows a player to label opponents by their strategies, enabling a player to determine the population distribution and to act differentially based on the opponent's strategy in each pairwise interaction. For the Prisoner's Dilemma, these advantages lead to the natural formation of cooperative coalitions among similarly behaving players and eventually to unilateral defection against opposing player types. We show analytically and empirically that optimal play in population games depends strongly on the population distribution. For example, the optimal strategy for a minority player type against a resident TFT population is ALLC, while for a majority player type the optimal strategy versus TFT players is ALLD. Such behaviors are not accessible to memory-one strategies. Drawing inspiration from Sun Tzu's the Art of War, we implemented a non-memory-one strategy for population games based on techniques from machine learning and statistical inference that can exploit the history of play in this manner. Via simulation we find that this strategy is essentially uninvadable and can successfully invade (significantly more likely than a neutral mutant) essentially all known memory-one strategies for the Prisoner's Dilemma, including ALLC (always cooperate), ALLD (always defect), tit-for-tat (TFT), win-stay-lose-shift (WSLS), and zero determinant (ZD) strategies, including extortionate and generous strategies.

  9. Abbreviation definition identification based on automatic precision estimates.

    PubMed

    Sohn, Sunghwan; Comeau, Donald C; Kim, Won; Wilbur, W John

    2008-09-25

    The rapid growth of biomedical literature presents challenges for automatic text processing, and one of the challenges is abbreviation identification. The presence of unrecognized abbreviations in text hinders indexing algorithms and adversely affects information retrieval and extraction. Automatic abbreviation definition identification can help resolve these issues. However, abbreviations and their definitions identified by an automatic process are of uncertain validity. Due to the size of databases such as MEDLINE only a small fraction of abbreviation-definition pairs can be examined manually. An automatic way to estimate the accuracy of abbreviation-definition pairs extracted from text is needed. In this paper we propose an abbreviation definition identification algorithm that employs a variety of strategies to identify the most probable abbreviation definition. In addition our algorithm produces an accuracy estimate, pseudo-precision, for each strategy without using a human-judged gold standard. The pseudo-precisions determine the order in which the algorithm applies the strategies in seeking to identify the definition of an abbreviation. On the Medstract corpus our algorithm produced 97% precision and 85% recall which is higher than previously reported results. We also annotated 1250 randomly selected MEDLINE records as a gold standard. On this set we achieved 96.5% precision and 83.2% recall. This compares favourably with the well known Schwartz and Hearst algorithm. We developed an algorithm for abbreviation identification that uses a variety of strategies to identify the most probable definition for an abbreviation and also produces an estimated accuracy of the result. This process is purely automatic.

  10. On-line identification of fermentation processes for ethanol production.

    PubMed

    Câmara, M M; Soares, R M; Feital, T; Naomi, P; Oki, S; Thevelein, J M; Amaral, M; Pinto, J C

    2017-07-01

    A strategy for monitoring fermentation processes, specifically, simultaneous saccharification and fermentation (SSF) of corn mash, was developed. The strategy covered the development and use of first principles, semimechanistic and unstructured process model based on major kinetic phenomena, along with mass and energy balances. The model was then used as a reference model within an identification procedure capable of running on-line. The on-line identification procedure consists on updating the reference model through the estimation of corrective parameters for certain reaction rates using the most recent process measurements. The strategy makes use of standard laboratory measurements for sugars quantification and in situ temperature and liquid level data. The model, along with the on-line identification procedure, has been tested against real industrial data and have been able to accurately predict the main variables of operational interest, i.e., state variables and its dynamics, and key process indicators. The results demonstrate that the strategy is capable of monitoring, in real time, this complex industrial biomass fermentation. This new tool provides a great support for decision-making and opens a new range of opportunities for industrial optimization.

  11. How ecology shapes exploitation: a framework to predict the behavioural response of human and animal foragers along exploration-exploitation trade-offs.

    PubMed

    Monk, Christopher T; Barbier, Matthieu; Romanczuk, Pawel; Watson, James R; Alós, Josep; Nakayama, Shinnosuke; Rubenstein, Daniel I; Levin, Simon A; Arlinghaus, Robert

    2018-06-01

    Understanding how humans and other animals behave in response to changes in their environments is vital for predicting population dynamics and the trajectory of coupled social-ecological systems. Here, we present a novel framework for identifying emergent social behaviours in foragers (including humans engaged in fishing or hunting) in predator-prey contexts based on the exploration difficulty and exploitation potential of a renewable natural resource. A qualitative framework is introduced that predicts when foragers should behave territorially, search collectively, act independently or switch among these states. To validate it, we derived quantitative predictions from two models of different structure: a generic mathematical model, and a lattice-based evolutionary model emphasising exploitation and exclusion costs. These models independently identified that the exploration difficulty and exploitation potential of the natural resource controls the social behaviour of resource exploiters. Our theoretical predictions were finally compared to a diverse set of empirical cases focusing on fisheries and aquatic organisms across a range of taxa, substantiating the framework's predictions. Understanding social behaviour for given social-ecological characteristics has important implications, particularly for the design of governance structures and regulations to move exploited systems, such as fisheries, towards sustainability. Our framework provides concrete steps in this direction. © 2018 John Wiley & Sons Ltd/CNRS.

  12. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    PubMed Central

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  13. Early Sexual Exploitation as an Influence in Prostitution.

    ERIC Educational Resources Information Center

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  14. Real time groove characterization combining partial least squares and SVR strategies: application to eddy current testing

    NASA Astrophysics Data System (ADS)

    Ahmed, S.; Salucci, M.; Miorelli, R.; Anselmi, N.; Oliveri, G.; Calmon, P.; Reboud, C.; Massa, A.

    2017-10-01

    A quasi real-time inversion strategy is presented for groove characterization of a conductive non-ferromagnetic tube structure by exploiting eddy current testing (ECT) signal. Inversion problem has been formulated by non-iterative Learning-by-Examples (LBE) strategy. Within the framework of LBE, an efficient training strategy has been adopted with the combination of feature extraction and a customized version of output space filling (OSF) adaptive sampling in order to get optimal training set during offline phase. Partial Least Squares (PLS) and Support Vector Regression (SVR) have been exploited for feature extraction and prediction technique respectively to have robust and accurate real time inversion during online phase.

  15. Micro-UAV tracking framework for EO exploitation

    NASA Astrophysics Data System (ADS)

    Browning, David; Wilhelm, Joe; Van Hook, Richard; Gallagher, John

    2012-06-01

    Historically, the Air Force's research into aerial platforms for sensing systems has focused on low-, mid-, and highaltitude platforms. Though these systems are likely to comprise the majority of the Air Force's assets for the foreseeable future, they have limitations. Specifically, these platforms, their sensor packages, and their data exploitation software are unsuited for close-quarter surveillance, such as in alleys and inside of buildings. Micro-UAVs have been gaining in popularity, especially non-fixed-wing platforms such as quad-rotors. These platforms are much more appropriate for confined spaces. However, the types of video exploitation techniques that can effectively be used are different from the typical nadir-looking aerial platform. This paper discusses the creation of a framework for testing existing and new video exploitation algorithms, as well as describes a sample micro-UAV-based tracker.

  16. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    PubMed

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  17. A kinase-focused compound collection: compilation and screening strategy.

    PubMed

    Sun, Dongyu; Chuaqui, Claudio; Deng, Zhan; Bowes, Scott; Chin, Donovan; Singh, Juswinder; Cullen, Patrick; Hankins, Gretchen; Lee, Wen-Cherng; Donnelly, Jason; Friedman, Jessica; Josiah, Serene

    2006-06-01

    Lead identification by high-throughput screening of large compound libraries has been supplemented with virtual screening and focused compound libraries. To complement existing approaches for lead identification at Biogen Idec, a kinase-focused compound collection was designed, developed and validated. Two strategies were adopted to populate the compound collection: a ligand shape-based virtual screening and a receptor-based approach (structural interaction fingerprint). Compounds selected with the two approaches were cherry-picked from an existing high-throughput screening compound library, ordered from suppliers and supplemented with specific medicinal compounds from internal programs. Promising hits and leads have been generated from the kinase-focused compound collection against multiple kinase targets. The principle of the collection design and screening strategy was validated and the use of the kinase-focused compound collection for lead identification has been added to existing strategies.

  18. Exploitability Assessment with TEASER

    DTIC Science & Technology

    2017-05-01

    dear friends Leo St. Amour, Ricky T, Andreas Kellas, and Paul Deardorff for taking time out of their busy schedules to proofread this thesis. Last, I...in glibc mal- loc function. Marked as severe on Chromium, but no known exploit Table 5.1: Summary of results of TEASER compared with other tools and

  19. Frogs Exploit Statistical Regularities in Noisy Acoustic Scenes to Solve Cocktail-Party-like Problems.

    PubMed

    Lee, Norman; Ward, Jessica L; Vélez, Alejandro; Micheyl, Christophe; Bee, Mark A

    2017-03-06

    Noise is a ubiquitous source of errors in all forms of communication [1]. Noise-induced errors in speech communication, for example, make it difficult for humans to converse in noisy social settings, a challenge aptly named the "cocktail party problem" [2]. Many nonhuman animals also communicate acoustically in noisy social groups and thus face biologically analogous problems [3]. However, we know little about how the perceptual systems of receivers are evolutionarily adapted to avoid the costs of noise-induced errors in communication. In this study of Cope's gray treefrog (Hyla chrysoscelis; Hylidae), we investigated whether receivers exploit a potential statistical regularity present in noisy acoustic scenes to reduce errors in signal recognition and discrimination. We developed an anatomical/physiological model of the peripheral auditory system to show that temporal correlation in amplitude fluctuations across the frequency spectrum ("comodulation") [4-6] is a feature of the noise generated by large breeding choruses of sexually advertising males. In four psychophysical experiments, we investigated whether females exploit comodulation in background noise to mitigate noise-induced errors in evolutionarily critical mate-choice decisions. Subjects experienced fewer errors in recognizing conspecific calls and in selecting the calls of high-quality mates in the presence of simulated chorus noise that was comodulated. These data show unequivocally, and for the first time, that exploiting statistical regularities present in noisy acoustic scenes is an important biological strategy for solving cocktail-party-like problems in nonhuman animal communication. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Identification of a Lacosamide Binding Protein Using an Affinity Bait and Chemical Reporter Strategy: 14-3-3 ζ

    PubMed Central

    Park, Ki Duk; Kim, Dong Wook; Reamtong, Onrapak; Eyers, Claire; Gaskell, Simon J.; Liu, Rihe; Kohn, Harold

    2011-01-01

    We have advanced a useful strategy to elucidate binding partners of ligands (drugs) with modest binding affinity. Key to this strategy is attaching to the ligand an affinity bait (AB) and a chemical reporter (CR) group, where the AB irreversibly attaches the ligand to the receptor upon binding and the CR group is employed for receptor detection and isolation. We have tested this AB&CR strategy using lacosamide ((R)-1), a low-molecular-weight antiepileptic drug. We demonstrate that using a (R)-lacosamide AB&CR agent ((R)-2) 14-3-3 ζ in rodent brain soluble lysates is preferentially adducted, adduction is stereospecific with respect to the AB&CR agent, and adduction depends upon the presence of endogenous levels of the small molecule metabolite xanthine. Substitution of lacosamide AB agent ((R)- 5) for (R)-2 led to the identification of the 14-3-3 ζ adduction site (K120) by mass spectrometry. Competition experiments using increasing amounts of (R)-1 in the presence of (R)-2 demonstrated that (R)-1 binds at or near the (R)-2 modification site on 14-3-3 ζ. Structure-activity studies of xanthine derivatives provided information concerning the likely binding interaction between this metabolite and recombinant 14-3-3 ζ. Documentation of the 14-3-3 ζ-xanthine interaction was obtained with isothermal calorimetry using xanthine and the xanthine analogue 1,7-dimethylxanthine. PMID:21692503

  1. An enhanced targeted identification strategy for the selective identification of flavonoid O-glycosides from Carthamus tinctorius by integrating offline two-dimensional liquid chromatography/linear ion-trap-Orbitrap mass spectrometry, high-resolution diagnostic product ions/neutral loss filtering and liquid chromatography-solid phase extraction-nuclear magnetic resonance.

    PubMed

    Yao, Chang-Liang; Yang, Wen-Zhi; Si, Wei; Shen, Yao; Zhang, Nai-Xia; Chen, Hua-Li; Pan, Hui-Qin; Yang, Min; Wu, Wan-Ying; Guo, De-An

    2017-03-31

    Targeted identification of potentially bioactive molecules from herbal medicines is often stymied by the insufficient chromatographic separation, ubiquitous matrix interference, and pervasive isomerism. An enhanced targeted identification strategy is presented and validated by the selective identification of flavonoid O-glycosides (FOGs) from Carthamus tinctorius. It consists of four steps: (i) enhanced separation and detection by offline two-dimensional liquid chromatography/LTQ-Orbitrap MS (offline 2D-LC/LTQ-Orbitrap MS) using collision-induced dissociation (CID) and high-energy C-trap dissociation (HCD); (ii) improved identification of the major aglycones by acid hydrolysis and LC-SPE-NMR; (iii) simplified spectral elucidation by high-resolution diagnostic product ions/neutral loss filtering; and (iv) more convincing structural identification by matching an in-house library. An offline 2D-LC system configuring an Acchrom XAmide column and a BEH Shield RP-18 UPLC ® column enabled much better separation of the easily co-eluting components. Combined use of CID and HCD could produce complementary fragmentation information. The intensity ratios of the aglycone ion species ([Y 0 -H] - /Y 0 - and [Y 0 -2H] - /Y 0 - ) in the HCD-MS 2 spectra were found diagnostic for discriminating the aglycone subtypes and characterizing the glycosylation patterns. Five aglycone structures (kaempferol, 6-hydroxykaempferol, 6-methoxykaempferol, carthamidin, and isocarthamidin) were identified based on the 1 H-NMR data recorded by LC-SPE-NMR. Of the 107 characterized flavonoids, 80 FOGs were first reported from C. tinctorius. Unknown aglycones, pentose, and novel acyl substituents were discovered. A new compound thereof was isolated and fully identified, which could partially validate the MS-oriented identification. This integral strategy can improve the potency, efficiency, and accuracy in the detection of new compounds from medicinal herbs and other natural sources. Copyright © 2017

  2. Effects of social identity salience on motivational orientation and conflict strategies in intergenerational conflict.

    PubMed

    Ho, Henry C Y; Yeung, Dannii Y

    2017-06-01

    With the upsurge of older adults still working, the labour force is becoming increasingly diverse in age. Age diversity in an organisation can increase the likelihood of intergenerational conflict. The present study aims to integrate the dual concern model and social identity theory to explain the underlying mechanisms of intergenerational conflict by examining the effects of social identity salience on motivational orientation and conflict strategies. A 2 (subgroup identity salience: low vs. high younger/older group membership) × 2 (superordinate identity salience: low vs. high organisational group membership) factorial design with a structured questionnaire on motivational orientation and conflict strategies in relation to a hypothetical work conflict scenario was implemented among 220 postgraduate university students in Hong Kong. Results revealed that subgroup and superordinate identities had a combined influence on conflict strategies but not in motivational orientation. Subgroup and superordinate identification promoted integrating and compromising strategies, superordinate identification promoted obliging strategy, subgroup identification promoted dominating strategy and no identification promoted avoiding strategy. Age did not moderate these relationships. This study contributes to the development of the integrated model of conflict. © 2017 International Union of Psychological Science.

  3. Function-oriented synthesis: biological evaluation of laulimalide analogues derived from a last step cross metathesis diversification strategy.

    PubMed

    Mooberry, Susan L; Hilinski, Michael K; Clark, Erin A; Wender, Paul A

    2008-01-01

    Laulimalide is a potent microtubule stabilizing agent and a promising anticancer therapeutic lead. The identification of stable, efficacious and accessible analogues is critical to clinically exploiting this novel lead. To determine which structural features of laulimalide are required for beneficial function and thus for accessing superior clinical candidates, a series of side chain analogues were prepared through a last step cross metathesis diversification strategy and their biological activities were evaluated. Five analogues, differing in potency from 233 nM to 7.9 muM, effectively inhibit cancer cell proliferation. Like laulimalide, they retain activity against multidrug resistant cells, stabilize microtubules and cause the formation of aberrant mitotic spindles, mitotic accumulation, Bcl-2 phosphorylation and initiation of apoptosis. Structural modifications in the C 23-C 27 dihydropyran side chain can be made without changing the overall mechanism of action, but it is clear that this subunit has more than a bystander role.

  4. False discovery rates in spectral identification.

    PubMed

    Jeong, Kyowon; Kim, Sangtae; Bandeira, Nuno

    2012-01-01

    Automated database search engines are one of the fundamental engines of high-throughput proteomics enabling daily identifications of hundreds of thousands of peptides and proteins from tandem mass (MS/MS) spectrometry data. Nevertheless, this automation also makes it humanly impossible to manually validate the vast lists of resulting identifications from such high-throughput searches. This challenge is usually addressed by using a Target-Decoy Approach (TDA) to impose an empirical False Discovery Rate (FDR) at a pre-determined threshold x% with the expectation that at most x% of the returned identifications would be false positives. But despite the fundamental importance of FDR estimates in ensuring the utility of large lists of identifications, there is surprisingly little consensus on exactly how TDA should be applied to minimize the chances of biased FDR estimates. In fact, since less rigorous TDA/FDR estimates tend to result in more identifications (at higher 'true' FDR), there is often little incentive to enforce strict TDA/FDR procedures in studies where the major metric of success is the size of the list of identifications and there are no follow up studies imposing hard cost constraints on the number of reported false positives. Here we address the problem of the accuracy of TDA estimates of empirical FDR. Using MS/MS spectra from samples where we were able to define a factual FDR estimator of 'true' FDR we evaluate several popular variants of the TDA procedure in a variety of database search contexts. We show that the fraction of false identifications can sometimes be over 10× higher than reported and may be unavoidably high for certain types of searches. In addition, we further report that the two-pass search strategy seems the most promising database search strategy. While unavoidably constrained by the particulars of any specific evaluation dataset, our observations support a series of recommendations towards maximizing the number of resulting

  5. Learning Visualization Strategies: A Qualitative Investigation

    ERIC Educational Resources Information Center

    Halpern, Daniel; Oh, Kyong Eun; Tremaine, Marilyn; Chiang, James; Bemis, Karen; Silver, Deborah

    2015-01-01

    The following study investigates the range of strategies individuals develop to infer and interpret cross-sections of three-dimensional objects. We focus on the identification of mental representations and problem-solving processes made by 11 individuals with the goal of building training applications that integrate the strategies developed by the…

  6. Identification and risk estimation of movement strategies during cutting maneuvers.

    PubMed

    David, Sina; Komnik, Igor; Peters, Markus; Funken, Johannes; Potthast, Wolfgang

    2017-12-01

    Approximately 70% of anterior cruciate ligament (ACL) injuries occur in non-contact situations during cutting and landing maneuvers. Parameters such as footstrike patterns and trunk orientation were found to influence ACL relevant knee loading, however, the relationship between the whole body movement and injury risk is debated. This study identifies whole body movement strategies that increase injury risk, and provides training recommendations to reduce this risk or enable a save return to sports after injury. Experimental cross-sectional study design. Three dimensional movement analysis was carried out to investigate 50 participants performing anticipated 90° cutting maneuvers. To identify and characterize movement strategies, footstrike pattern, knee valgus moment, knee internal rotation moment, angle of attack, shoulder and pelvis axis were analyzed using statistical parametric mapping. Three different movement strategies were identified. One strategy included rearfoot striking in combination with a relatively upright body position which generated higher knee joint loads than the second strategy, forefoot striking in combination with more backwards leaning and pre-rotation of the trunk towards the new movement direction. A third strategy combined forefoot striking with less preorientation which increased the ACL relevant knee joint load compared to the second strategy. The identified movement strategies clearly pre-determine the injury risk during non-contact situations with the third strategy as the most unfavorable one. Compared to the study of isolated parameters, the analysis of the whole body movement allowed for detailed separation of more risky from less risky cutting strategies. These results give practical recommendations for the prevention of ACL injury. Copyright © 2017 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  7. Target-decoy Based False Discovery Rate Estimation for Large-scale Metabolite Identification.

    PubMed

    Wang, Xusheng; Jones, Drew R; Shaw, Timothy I; Cho, Ji-Hoon; Wang, Yuanyuan; Tan, Haiyan; Xie, Boer; Zhou, Suiping; Li, Yuxin; Peng, Junmin

    2018-05-23

    Metabolite identification is a crucial step in mass spectrometry (MS)-based metabolomics. However, it is still challenging to assess the confidence of assigned metabolites. In this study, we report a novel method for estimating false discovery rate (FDR) of metabolite assignment with a target-decoy strategy, in which the decoys are generated through violating the octet rule of chemistry by adding small odd numbers of hydrogen atoms. The target-decoy strategy was integrated into JUMPm, an automated metabolite identification pipeline for large-scale MS analysis, and was also evaluated with two other metabolomics tools, mzMatch and mzMine 2. The reliability of FDR calculation was examined by false datasets, which were simulated by altering MS1 or MS2 spectra. Finally, we used the JUMPm pipeline coupled with the target-decoy strategy to process unlabeled and stable-isotope labeled metabolomic datasets. The results demonstrate that the target-decoy strategy is a simple and effective method for evaluating the confidence of high-throughput metabolite identification.

  8. A pre-classification strategy based on UPLC-Triple-TOF/MS for metabolic screening and identification of Radix glehniae in rats.

    PubMed

    Wang, Shuang; Qi, Pengcheng; Zhou, Na; Zhao, Minmin; Ding, Weijing; Li, Song; Liu, Minyan; Wang, Qiao; Jin, Shumin

    2016-10-01

    Traditional Chinese Medicines (TCMs) have gained increasing popularity in modern society. However, the profiles of TCMs in vivo are still unclear owing to their complexity and low level in vivo. In this study, UPLC-Triple-TOF techniques were employed for data acquiring, and a novel pre-classification strategy was developed to rapidly and systematically screen and identify the absorbed constituents and metabolites of TCMs in vivo using Radix glehniae as the research object. In this strategy, pre-classification for absorbed constituents was first performed according to the similarity of their structures. Then representative constituents were elected from every class and analyzed separately to screen non-target absorbed constituents and metabolites in biosamples. This pre-classification strategy is basing on target (known) constituents to screen non-target (unknown) constituents from the massive data acquired by mass spectrometry. Finally, the screened candidate compounds were interpreted and identified based on a predicted metabolic pathway, well - studied fragmentation rules, a predicted metabolic pathway, polarity and retention time of the compounds, and some related literature. With this method, a total of 111 absorbed constituents and metabolites of Radix glehniae in rats' urine, plasma, and bile samples were screened and identified or tentatively characterized successfully. This strategy provides an idea for the screening and identification of the metabolites of other TCMs.

  9. Source Identification of PM2.5 in Steubenville, Ohio Using a Hybrid Method for Highly Time-resolved Data

    EPA Science Inventory

    A new source-type identification method, Reduction and Species Clustering Using Episodes (ReSCUE), was developed to exploit the temporal synchronicity between species to form clusters of species that vary together. High time-resolution (30 min) PM2.5 sampling was condu...

  10. Teotihuacan, tepeapulco, and obsidian exploitation.

    PubMed

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  11. Teaching Spelling: Which Strategies Work Best.

    ERIC Educational Resources Information Center

    Angelisi, Mary Ann

    In a third-grade classroom, a 3-week-long study was conducted on the pros, cons, and effects of three particular spelling strategies and activities. By focusing on two specific spelling strategies--phonemic awareness and word identification--the study hoped to indicate that conventional rote learning, drilling, and memorization do not help…

  12. Journaling: identification of challenges and reflection on strategies.

    PubMed

    Hayman, Brenda; Wilkes, Lesley; Jackson, Debra

    2012-01-01

    To identify the challenges associated with using journaling as a method of data collection and to offer strategies for effectively managing those challenges. While journaling can be used for a variety of reasons, in the context of this paper, journaling refers to the process of participants sharing thoughts, ideas, feelings and experiences through writing and/or other media. Journaling is used in phenomenological research studies to record participant experiences in their natural contexts. The findings are based on the experiences of the researchers during a qualitative study that explored the experiences of lesbian mothers and used journaling as one method of data collection. This is a methodological paper. Three main challenges affect journaling as a method of data collection: poor participation, feeling exposed and staying on track. Six strategies to promote participation in journaling are: coaching participants, limiting the journaling period, providing follow-up contact, promoting comfort, ensuring safety and providing clear content expectations. Each strategy is discussed and methods of implementing the strategies are offered. Journaling as a method of data collection has long been accepted as a valid method of accessing rich qualitative data. By acknowledging the common challenges associated with the process of journaling that are experienced by the participants, researchers employing this data collection method can promote constructive and valuable participation. Further research examining participants' experiences of journaling as a method of qualitative data collection would be useful in determining challenges, barriers and benefits of the method.

  13. Multivariable frequency domain identification via 2-norm minimization

    NASA Technical Reports Server (NTRS)

    Bayard, David S.

    1992-01-01

    The author develops a computational approach to multivariable frequency domain identification, based on 2-norm minimization. In particular, a Gauss-Newton (GN) iteration is developed to minimize the 2-norm of the error between frequency domain data and a matrix fraction transfer function estimate. To improve the global performance of the optimization algorithm, the GN iteration is initialized using the solution to a particular sequentially reweighted least squares problem, denoted as the SK iteration. The least squares problems which arise from both the SK and GN iterations are shown to involve sparse matrices with identical block structure. A sparse matrix QR factorization method is developed to exploit the special block structure, and to efficiently compute the least squares solution. A numerical example involving the identification of a multiple-input multiple-output (MIMO) plant having 286 unknown parameters is given to illustrate the effectiveness of the algorithm.

  14. A new inertia weight control strategy for particle swarm optimization

    NASA Astrophysics Data System (ADS)

    Zhu, Xianming; Wang, Hongbo

    2018-04-01

    Particle Swarm Optimization is a member of swarm intelligence algorithms, which is inspired by the behavior of bird flocks. The inertia weight, one of the most important parameters of PSO, is crucial for PSO, for it balances the performance of exploration and exploitation of the algorithm. This paper proposes a new inertia weight control strategy and PSO with this new strategy is tested by four benchmark functions. The results shows that the new strategy provides the PSO with better performance.

  15. A geometric approach to failure detection and identification in linear systems

    NASA Technical Reports Server (NTRS)

    Massoumnia, M. A.

    1986-01-01

    Using concepts of (C,A)-invariant and unobservability (complementary observability) subspaces, a geometric formulation of the failure detection and identification filter problem is stated. Using these geometric concepts, it is shown that it is possible to design a causal linear time-invariant processor that can be used to detect and uniquely identify a component failure in a linear time-invariant system, assuming: (1) The components can fail simultaneously, and (2) The components can fail only one at a time. In addition, a geometric formulation of Beard's failure detection filter problem is stated. This new formulation completely clarifies of output separability and mutual detectability introduced by Beard and also exploits the dual relationship between a restricted version of the failure detection and identification problem and the control decoupling problem. Moreover, the frequency domain interpretation of the results is used to relate the concepts of failure sensitive observers with the generalized parity relations introduced by Chow. This interpretation unifies the various failure detection and identification concepts and design procedures.

  16. Effectiveness of GNSS disposal strategies

    NASA Astrophysics Data System (ADS)

    Alessi, E. M.; Rossi, A.; Valsecchi, G. B.; Anselmo, L.; Pardini, C.; Colombo, C.; Lewis, H. G.; Daquin, J.; Deleflie, F.; Vasile, M.; Zuiani, F.; Merz, K.

    2014-06-01

    The management of the Global Navigation Satellite Systems (GNSS) and of the Medium Earth Orbit (MEO) region as a whole is a subject that cannot be deferred, due to the growing exploitation and launch rate in that orbital regime. The advent of the European Galileo and the Chinese Beidou constellations significantly added complexity to the system and calls for an adequate global view on the four constellations present in operation. The operation procedures, including maintenance and disposal practices, of the constellations currently deployed were analyzed in order to asses a proper reference simulation scenario. The complex dynamics of the MEO region with all the geopotential and lunisolar resonances was studied to better identify the proper end-of-life orbit for every proposed strategy, taking into account and, whenever possible, exploiting the orbital dynamics in this peculiar region of space. The possibility to exploit low thrust propulsion or non gravitational perturbations with passive de-orbiting devices (and a combination of the two) was analyzed, in view of possible applications in the design of the future generations of the constellations satellites. Several upgrades in the long-term evolution software SDM and DAMAGE were undertaken to properly handle the constellation simulations in every aspect from constellation maintenance to orbital dynamics. A thorough approach considering the full time evolving covariance matrix associated with every object was implemented in SDM to compute the collision risk and associated maneuver rate for the constellation satellites. Once the software upgrades will be completed, the effectiveness of the different disposal strategies will be analyzed in terms of residual collision risk and avoidance maneuvers rate. This work was performed under the ESA/GSP Contract no. 4000107201/12/F/MOS.

  17. Cosmic bandits: Exploration versus exploitation in CMB B-mode experiments

    NASA Astrophysics Data System (ADS)

    Kovetz, Ely D.; Kamionkowski, Marc

    2016-02-01

    A preferred method to detect the curl-component, or B-mode, signature of inflationary gravitational waves (IGWs) in the cosmic microwave background (CMB) polarization, in the absence of foregrounds and lensing, is a prolonged integration over a single patch of sky of a few square degrees. In practice, however, foregrounds abound and the sensitivity to B modes can be improved considerably by finding the region of sky cleanest of foregrounds. The best strategy to detect B modes thus involves a tradeoff between exploration (to find lower-foreground patches) and exploitation (through prolonged integration). This problem is akin to the multi-armed bandit (MAB) problem in probability theory, wherein a gambler faces a series of slot machines with unknown winning odds and must develop a strategy to maximize his/her winnings with some finite number of pulls. While the optimal MAB strategy remains to be determined, a number of algorithms have been developed in an effort to maximize the winnings. Here, based on this resemblance, we tackle the search for IGW B modes with single frequency experiments in the presence of spatially varying foregrounds by developing adaptive survey strategies to optimize the sensitivity to IGW B modes. We demonstrate, using realistic foreground models and taking lensing-induced B modes into account, that adaptive experiments can substantially improve the upper bound on the tensor-to-scalar ratio (by factors of 2 and 3 in single frequency experiments, and possibly even more). Similar techniques can be applied to other surveys, including 21-cm measurements of signatures of the epoch of reionization, searches for a stochastic primordial gravitational wave background, deep-field imaging by the James Webb Space Telescope or various radio interferometers, and transient follow-up searches.

  18. Children's Identification of Stress Related Factors and Coping Strategies.

    ERIC Educational Resources Information Center

    Paterno, JoAnna; And Others

    Although many educators believe that children are under stress, formally testing children for stress and coping is very difficult. This study compiled and analyzed the significant mean differences of the frequency of identified stressors and coping strategy responses between school groups to identify stressors and coping strategies as perceived by…

  19. Network exploitation using WAMI tracks

    NASA Astrophysics Data System (ADS)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  20. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    NASA Astrophysics Data System (ADS)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  1. Instruments Used in the Identification of Gifted and Talented Students.

    ERIC Educational Resources Information Center

    Callahan, Carolyn M.; Hunsaker, Scott L.; Adams, Cheryll M.; Moore, Sara D.; Bland, Lori C.

    This report presents findings of a study of instruments used in the identification of gifted and talented students. The study first examined the published literature, both standardized and locally developed identification instruments and procedures, and strategies used to identify underserved populations. These data were catalogued in the National…

  2. Trolling may intensify exploitation in crappie fisheries

    USGS Publications Warehouse

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  3. Anti-Immune Strategies of Pathogenic Fungi

    PubMed Central

    Marcos, Caroline M.; de Oliveira, Haroldo C.; de Melo, Wanessa de Cássia M. Antunes; da Silva, Julhiany de Fátima; Assato, Patrícia A.; Scorzoni, Liliana; Rossi, Suélen A.; de Paula e Silva, Ana C. A.; Mendes-Giannini, Maria J. S.; Fusco-Almeida, Ana M.

    2016-01-01

    Pathogenic fungi have developed many strategies to evade the host immune system. Multiple escape mechanisms appear to function together to inhibit attack by the various stages of both the adaptive and the innate immune response. Thus, after entering the host, such pathogens fight to overcome the immune system to allow their survival, colonization and spread to different sites of infection. Consequently, the establishment of a successful infectious process is closely related to the ability of the pathogen to modulate attack by the immune system. Most strategies employed to subvert or exploit the immune system are shared among different species of fungi. In this review, we summarize the main strategies employed for immune evasion by some of the major pathogenic fungi. PMID:27896220

  4. Maximising Benefit from Defence Research: A Review of Defence Research and Technology for Alignment, Quality and Exploitation

    DTIC Science & Technology

    2006-09-01

    exploited and that we get best value for money from our investment. We announced in the Strategy that we had set in place an evidence-based peer review of...currently meets the Department’s needs. The study was also to set a benchmark for future regular reviews of the programme to ensure quality, value for...The level of resources devoted to such research should be seen in the context of the overall value of expenditure flowing from such decisions. The

  5. ESL Learners' Online Research and Comprehension Strategies

    ERIC Educational Resources Information Center

    Sain, Noridah; Bown, Andy; Fluck, Andrew; Kebble, Paul

    2017-01-01

    In order to enhance second language (L2) acquisition, English as a Second Language (ESL) students are encouraged to exploit the abundant information and opportunities for authentic language use afforded by the Internet. This study investigated the online research and comprehension strategies employed by ESL learners in a public university in…

  6. Identification of Number Sense Strategies Used by Pre-Service Elementary Teachers

    ERIC Educational Resources Information Center

    Sengul, Sare

    2013-01-01

    The purpose of this study was to identify the use of number sense strategies by pre-service teachers studying at the department of elementary education. Compared to the previous one; new mathematics curriculum places more emphasis on various strategies such as estimation strategies, computational estimation strategies, rounding and mental…

  7. Exploitation of prisoners in clinical research: perceptions of study participants

    PubMed Central

    Christopher, Paul P.; Stein, Michael D.; Johnson, Jennifer E.; Rich, Josiah D.; Friedmann, Peter D.; Clarke, Jennifer G.; Lidz, Charles W.

    2015-01-01

    This paper discusses findings of a study examining whether prisoners view their participation in clinical research studies as exploitative. Perspectives of seventy prisoners who were enrolled in one of six different clinical studies were analyzed. A minority of participants agreed with statements suggestive of potential exploitation. All but one participant believed that prisoners should have greater access to research. On balance, these data provide reassurance that prisoners in this sample do not view their involvement in clinical research as inappropriately exploitative. PMID:26964404

  8. The Interaction of Motivation, Self-Regulatory Strategies, and Autonomous Learning Behavior in Different Learner Groups

    ERIC Educational Resources Information Center

    Kormos, Judit; Csizér, Kata

    2014-01-01

    Autonomous learning and effective self-regulatory strategies are increasingly important in foreign language learning; without these, students might not be able to exploit learning opportunities outside language classrooms. This study investigated the influence of motivational factors and self-regulatory strategies on autonomous learning behavior.…

  9. Multivariate approach in popcorn genotypes using the Ward-MLM strategy: morpho-agronomic analysis and incidence of Fusarium spp.

    PubMed

    Kurosawa, R N F; do Amaral Junior, A T; Silva, F H L; Dos Santos, A; Vivas, M; Kamphorst, S H; Pena, G F

    2017-02-08

    The multivariate analyses are useful tools to estimate the genetic variability between accessions. In the breeding programs, the Ward-Modified Location Model (MLM) multivariate method has been a powerful strategy to quantify variability using quantitative and qualitative variables simultaneously. The present study was proposed in view of the dearth of information about popcorn breeding programs under a multivariate approach using the Ward-MLM methodology. The objective of this study was thus to estimate the genetic diversity among 37 genotypes of popcorn aiming to identify divergent groups associated with morpho-agronomic traits and traits related to resistance to Fusarium spp. To this end, 7 qualitative and 17 quantitative variables were analyzed. The experiment was conducted in 2014, at Universidade Estadual do Norte Fluminense, located in Campos dos Goytacazes, RJ, Brazil. The Ward-MLM strategy allowed the identification of four groups as follows: Group I with 10 genotypes, Group II with 11 genotypes, Group III with 9 genotypes, and Group IV with 7 genotypes. Group IV was distant in relation to the other groups, while groups I, II, and III were near. The crosses between genotypes from the other groups with those of group IV allow an exploitation of heterosis. The Ward-MLM strategy provided an appropriate grouping of genotypes; ear weight, ear diameter, and grain yield were the traits that most contributed to the analysis of genetic diversity.

  10. Debugging classification and anti-debugging strategies

    NASA Astrophysics Data System (ADS)

    Gao, Shang; Lin, Qian; Xia, Mingyuan; Yu, Miao; Qi, Zhengwei; Guan, Haibing

    2011-12-01

    Debugging, albeit useful for software development, is also a double-edge sword since it could also be exploited by malicious attackers. This paper analyzes the prevailing debuggers and classifies them into 4 categories based on the debugging mechanism. Furthermore, as an opposite, we list 13 typical anti-debugging strategies adopted in Windows. These methods intercept specific execution points which expose the diagnostic behavior of debuggers.

  11. Managing differences: the central challenge of global strategy.

    PubMed

    Ghemawat, Pankaj

    2007-03-01

    The main goal of any international strategy should be to manage the large differences that arise at the borders of markets. Yet executives often fail to exploit market and production discrepancies, focusing instead on the tensions between standardization and localization. In this article, Pankaj Ghemawat presents a new framework that encompasses all three effective responses to the challenges of globalization. He calls it the AAA Triangle. The A's stand for the three distinct types of international strategy. Through adaptation, companies seek to boost revenues and market share by maximizing their local relevance. Through aggregation, they attempt to deliver economies of scale by creating regional, or sometimes global, operations. And through arbitrage, they exploit disparities between national or regional markets, often by locating different parts of the supply chain in different places--for instance, call centers in India, factories in China, and retail shops in Western Europe. Ghemawat draws on several examples that illustrate how organizations use and balance these strategies and describes the trade-offs they make as they do so. Because most enterprises should draw from all three A's to some extent, the framework can be used to develop a summary scorecard indicating how well the company is globalizing. However, given the tensions among the strategies, it's not enough simply to tick off the corresponding boxes. Strategic choice requires some degree of prioritization--and the framework can help with that as well. While it is possible to make progress on all three strategies, companies usually must focus on one or two when trying to build competitive advantage.

  12. An attract-and-kill strategy for Asian citrus psyllid

    USDA-ARS?s Scientific Manuscript database

    Asian citrus psyllids (ACP) transmit the pathogen responsible for citrus greening disease. Psyllids use color, smell, taste and vibrational cues to identify their host plants and conspecifics. The main goal of this project is to develop an attract-and-kill device strategy that will exploit the psyll...

  13. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    NASA Astrophysics Data System (ADS)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  14. Effects of various electrode configurations on music perception, intonation and speaker gender identification.

    PubMed

    Landwehr, Markus; Fürstenberg, Dirk; Walger, Martin; von Wedel, Hasso; Meister, Hartmut

    2014-01-01

    Advances in speech coding strategies and electrode array designs for cochlear implants (CIs) predominantly aim at improving speech perception. Current efforts are also directed at transmitting appropriate cues of the fundamental frequency (F0) to the auditory nerve with respect to speech quality, prosody, and music perception. The aim of this study was to examine the effects of various electrode configurations and coding strategies on speech intonation identification, speaker gender identification, and music quality rating. In six MED-EL CI users electrodes were selectively deactivated in order to simulate different insertion depths and inter-electrode distances when using the high definition continuous interleaved sampling (HDCIS) and fine structure processing (FSP) speech coding strategies. Identification of intonation and speaker gender was determined and music quality rating was assessed. For intonation identification HDCIS was robust against the different electrode configurations, whereas fine structure processing showed significantly worse results when a short electrode depth was simulated. In contrast, speaker gender recognition was not affected by electrode configuration or speech coding strategy. Music quality rating was sensitive to electrode configuration. In conclusion, the three experiments revealed different outcomes, even though they all addressed the reception of F0 cues. Rapid changes in F0, as seen with intonation, were the most sensitive to electrode configurations and coding strategies. In contrast, electrode configurations and coding strategies did not show large effects when F0 information was available over a longer time period, as seen with speaker gender. Music quality relies on additional spectral cues other than F0, and was poorest when a shallow insertion was simulated.

  15. Analysis of pilot control strategy

    NASA Technical Reports Server (NTRS)

    Heffley, R. K.; Hanson, G. D.; Jewell, W. F.; Clement, W. F.

    1983-01-01

    Methods for nonintrusive identification of pilot control strategy and task execution dynamics are presented along with examples based on flight data. The specific analysis technique is Nonintrusive Parameter Identification Procedure (NIPIP), which is described in a companion user's guide (NASA CR-170398). Quantification of pilot control strategy and task execution dynamics is discussed in general terms followed by a more detailed description of how NIPIP can be applied. The examples are based on flight data obtained from the NASA F-8 digital fly by wire airplane. These examples involve various piloting tasks and control axes as well as a demonstration of how the dynamics of the aircraft itself are identified using NIPIP. Application of NIPIP to the AFTI/F-16 flight test program is discussed. Recommendations are made for flight test applications in general and refinement of NIPIP to include interactive computer graphics.

  16. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    NASA Astrophysics Data System (ADS)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  17. Rare earth elements exploitation, geopolitical implications and raw materials trading

    NASA Astrophysics Data System (ADS)

    Chemin, Marie-Charlotte

    2015-04-01

    Rare earth elements (REE) correspond to seventeen elements of the periodic table. They are used in high technology, cracking, electric cars' magnet, metal alloy for batteries, and also in phone construction or ceramics for electronic card. REEs are an important resource for high technology. This project targets 16 years old students in the subject "personalized aid" and will last six weeks. The purpose of this project is to develop autonomy and research in groups for a transdisciplinary work. This project gathers knowledge in geology, geography and economics. During the first session students analyze the geology applications of the REE. They begin the analysis with learning the composition in different rocks such as basalt and diorite to make the link with crystallization. Then they compare it with adakite to understand the formation of these rocks. In the second session, they study REE exploitation. We can find them as oxides in many deposits. The principal concentrations of rare earth elements are associated with uncommon varieties of igneous rocks, such as carbonatites. They can use Qgis, to localize this high concentration. In the third session, they study the environmental costs of REE exploitation. Indeed, the exploitation produces thorium and carcinogenic toxins: sulphates, ammonia and hydrochloric acid. Processing one ton of rare earths produces 2,000 tons of toxic waste. This session focuses, first, on Baotou's region, and then on an example they are free to choose. In the fourth session, they study the geopolitical issues of REE with a focus on China. In fact this country is the largest producer of REE, and is providing 95% of the overall production. REE in China are at the center of a geopolitical strategy. In fact, China implements a sort of protectionism. Indeed, the export tax on REE is very high so, as a foreign company, it is financially attractive to establish a manufacturing subsidiary in China in order to use REE. As a matter of fact

  18. Neuropathic pain and SCI: Identification and treatment strategies in the 21st century.

    PubMed

    Hatch, Maya N; Cushing, Timothy R; Carlson, Gregory D; Chang, Eric Y

    2018-01-15

    Pain is a common complication in patients following spinal cord injury (SCI), with studies citing up to 80% of patients reporting some form of pain. Neuropathic pain (NP) makes up a substantial percentage of all pain symptoms in patients with SCI and is often complex. Given the high prevalence of NP in patients with SCI, proper identification and treatment is imperative. Indeed, identification of pain subtypes is a vital step toward determining appropriate treatment. A variety of pharmacological and non-pharmacological treatments can be undertaken including antiepileptics, tricyclic antidepressants, opioids, transcranial direct current stimulation, and invasive surgical procedures. Despite all the available treatment options and advances in the field of SCI medicine, providing adequate treatment of NP after SCI continues to be challenging. It is therefore extremely important for clinicians to have a strong foundation in the identification of SCI NP, as well as an understanding of appropriate treatment options. Here, we highlight the definitions and classification tools available for NP identification, and discuss current treatment options. We hope that this will not only provide a better understanding of NP for physicians in various subspecialties, but that it will also help guide future research on this subject. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Village Building Identification Based on Ensemble Convolutional Neural Networks

    PubMed Central

    Guo, Zhiling; Chen, Qi; Xu, Yongwei; Shibasaki, Ryosuke; Shao, Xiaowei

    2017-01-01

    In this study, we present the Ensemble Convolutional Neural Network (ECNN), an elaborate CNN frame formulated based on ensembling state-of-the-art CNN models, to identify village buildings from open high-resolution remote sensing (HRRS) images. First, to optimize and mine the capability of CNN for village mapping and to ensure compatibility with our classification targets, a few state-of-the-art models were carefully optimized and enhanced based on a series of rigorous analyses and evaluations. Second, rather than directly implementing building identification by using these models, we exploited most of their advantages by ensembling their feature extractor parts into a stronger model called ECNN based on the multiscale feature learning method. Finally, the generated ECNN was applied to a pixel-level classification frame to implement object identification. The proposed method can serve as a viable tool for village building identification with high accuracy and efficiency. The experimental results obtained from the test area in Savannakhet province, Laos, prove that the proposed ECNN model significantly outperforms existing methods, improving overall accuracy from 96.64% to 99.26%, and kappa from 0.57 to 0.86. PMID:29084154

  20. A Rapid CRISPR/Cas-based Mutagenesis Assay in Zebrafish for Identification of Genes Involved in Thyroid Morphogenesis and Function.

    PubMed

    Trubiroha, A; Gillotay, P; Giusti, N; Gacquer, D; Libert, F; Lefort, A; Haerlingen, B; De Deken, X; Opitz, R; Costagliola, S

    2018-04-04

    The foregut endoderm gives rise to several organs including liver, pancreas, lung and thyroid with important roles in human physiology. Understanding which genes and signalling pathways regulate their development is crucial for understanding developmental disorders as well as diseases in adulthood. We exploited unique advantages of the zebrafish model to develop a rapid and scalable CRISPR/Cas-based mutagenesis strategy aiming at the identification of genes involved in morphogenesis and function of the thyroid. Core elements of the mutagenesis assay comprise bi-allelic gene invalidation in somatic mutants, a non-invasive monitoring of thyroid development in live transgenic fish, complementary analyses of thyroid function in fixed specimens and quantitative analyses of mutagenesis efficiency by Illumina sequencing of individual fish. We successfully validated our mutagenesis-phenotyping strategy in experiments targeting genes with known functions in early thyroid morphogenesis (pax2a, nkx2.4b) and thyroid functional differentiation (duox, duoxa, tshr). We also demonstrate that duox and duoxa crispants phenocopy thyroid phenotypes previously observed in human patients with bi-allelic DUOX2 and DUOXA2 mutations. The proposed combination of efficient mutagenesis protocols, rapid non-invasive phenotyping and sensitive genotyping holds great potential to systematically characterize the function of larger candidate gene panels during thyroid development and is applicable to other organs and tissues.

  1. 77 FR 36491 - Request for Information Regarding Senior Financial Exploitation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-19

    ... Senior Financial Exploitation AGENCY: Bureau of Consumer Financial Protection. ACTION: Request for...'') to facilitate the financial literacy of individuals aged 62 or older (``seniors''), on protection... Monica Jackson at 202-435-7275. For specific questions on senior financial exploitation, please call...

  2. Identification of poor households for premium exemptions in Ghana's National Health Insurance Scheme: empirical analysis of three strategies.

    PubMed

    Aryeetey, Genevieve Cecilia; Jehu-Appiah, Caroline; Spaan, Ernst; D'Exelle, Ben; Agyepong, Irene; Baltussen, Rob

    2010-12-01

    To evaluate the effectiveness of three alternative strategies to identify poor households: means testing (MT), proxy means testing (PMT) and participatory wealth ranking (PWR) in urban, rural and semi-urban settings in Ghana. The primary motivation was to inform implementation of the National Health Insurance policy of premium exemptions for the poorest households. Survey of 145-147 households per setting to collect data on consumption expenditure to estimate MT measures and of household assets to estimate PMT measures. We organized focus group discussions to derive PWR measures. We compared errors of inclusion and exclusion of PMT and PWR relative to MT, the latter being considered the gold standard measure to identify poor households. Compared to MT, the errors of exclusion and inclusion of PMT ranged between 0.46-0.63 and 0.21-0.36, respectively, and of PWR between 0.03-0.73 and 0.17-0.60, respectively, depending on the setting. Proxy means testing and PWR have considerable errors of exclusion and inclusion in comparison with MT. PWR is a subjective measure of poverty and has appeal because it reflects community's perceptions on poverty. However, as its definition of the poor varies across settings, its acceptability as a uniform strategy to identify the poor in Ghana may be questionable. PMT and MT are potential strategies to identify the poor, and their relative societal attractiveness should be judged in a broader economic analysis. This study also holds relevance to other programmes that require identification of the poor in low-income countries. © 2010 Blackwell Publishing Ltd.

  3. Exploitation of commercial remote sensing images: reality ignored?

    NASA Astrophysics Data System (ADS)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  4. Tandem carrying, a new foraging strategy in ants: description, function, and adaptive significance relative to other described foraging strategies

    NASA Astrophysics Data System (ADS)

    Guénard, Benoit; Silverman, Jules

    2011-08-01

    An important aspect of social insect biology lies in the expression of collective foraging strategies developed to exploit food. In ants, four main types of foraging strategies are typically recognized based on the intensity of recruitment and the importance of chemical communication. Here, we describe a new type of foraging strategy, "tandem carrying", which is also one of the most simple recruitment strategies, observed in the Ponerinae species Pachycondyla chinensis. Within this strategy, workers are directly carried individually and then released on the food resource by a successful scout. We demonstrate that this recruitment is context dependent and based on the type of food discovered and can be quickly adjusted as food quality changes. We did not detect trail marking by tandem-carrying workers. We conclude by discussing the importance of tandem carrying in an evolutionary context relative to other modes of recruitment in foraging and nest emigration.

  5. A litmus test for exploitation: James Stacey Taylor's stakes and kidneys.

    PubMed

    Kuntz, J R

    2009-12-01

    James Stacy Taylor advances a thorough argument for the legalization of markets in current (live) human kidneys. The market is seemly the most abhorrent type of market, a market where the least well-off sell part of their body to the most well off. Though rigorously defended overall, his arguments concerning exploitation are thin. I examine a number of prominent bioethicists' account of exploitation: most importantly, Ruth Sample's exploitation as degradation. I do so in the context of Taylor's argument, with the aim of buttressing Taylor's position that a regulated kidney market is morally allowable. I argue that Sample fails to provide normative grounds consistent with her claim that exploitation is wrong. I then reformulate her account for consistency and plausibility. Still, this seemingly more plausible view does not show that Taylor's regulated kidney market is prohibitively exploitative of impoverished persons. I tack into place one more piece of support for Taylor's conclusion. (wc. 148).

  6. Do Language Proficiency Levels Correspond to Language Learning Strategy Adoption?

    ERIC Educational Resources Information Center

    Gharbavi, Abdullah; Mousavi, Seyyed Ahmad

    2012-01-01

    The primary focus of research on employment of language learning strategies has been on identification of adoption of different learning strategies. However, the relationship between language learning strategies and proficiency levels was ignored in previous research. The present study was undertaken to find out whether there are any relationship…

  7. Nuclear Magnetic Resonance Spectroscopy-Based Identification of Yeast.

    PubMed

    Himmelreich, Uwe; Sorrell, Tania C; Daniel, Heide-Marie

    2017-01-01

    Rapid and robust high-throughput identification of environmental, industrial, or clinical yeast isolates is important whenever relatively large numbers of samples need to be processed in a cost-efficient way. Nuclear magnetic resonance (NMR) spectroscopy generates complex data based on metabolite profiles, chemical composition and possibly on medium consumption, which can not only be used for the assessment of metabolic pathways but also for accurate identification of yeast down to the subspecies level. Initial results on NMR based yeast identification where comparable with conventional and DNA-based identification. Potential advantages of NMR spectroscopy in mycological laboratories include not only accurate identification but also the potential of automated sample delivery, automated analysis using computer-based methods, rapid turnaround time, high throughput, and low running costs.We describe here the sample preparation, data acquisition and analysis for NMR-based yeast identification. In addition, a roadmap for the development of classification strategies is given that will result in the acquisition of a database and analysis algorithms for yeast identification in different environments.

  8. Multi-Disciplinary Antimicrobial Strategies for Improving Orthopaedic Implants to Prevent Prosthetic Joint Infections in Hip and Knee

    PubMed Central

    Getzlaf, Matthew A.; Lewallen, Eric A.; Kremers, Hilal M.; Jones, Dakota L.; Bonin, Carolina A.; Dudakovic, Amel; Thaler, Roman; Cohen, Robert C.; Lewallen, David G.; van Wijnen, Andre J.

    2016-01-01

    Like any foreign object, orthopaedic implants are susceptible to infection when introduced into the human body. Without additional preventative measures, the absolute number of annual prosthetic joint infections will continue to rise, and may exceed the capacity of health care systems in the near future. Bacteria are difficult to eradicate from synovial joints due to their exceptionally diverse taxonomy, complex mechanistic attachment capabilities, and tendency to evolve antibiotic resistance. When a primary orthopaedic implant fails from prosthetic joint infection, surgeons are generally challenged by limited options for intervention. In this review, we highlight the etiology and taxonomic groupings of bacteria known to cause prosthetic joint infections, and examine their key mechanisms of attachment. We propose that antimicrobial strategies should focus on the most harmful bacteria taxa within the context of occurrence, taxonomic diversity, adhesion mechanisms, and implant design. Patient-specific identification of organisms that cause prosthetic joint infections will permit assessment of their biological vulnerabilities. The latter can be targeted using a range of antimicrobial techniques that exploit different colonization mechanisms including implant surface attachment, biofilm formation, and/or hematogenous recruitment. We anticipate that customized strategies for each patient, joint, and prosthetic component will be most effective at reducing prosthetic joint infections, including those caused by antibiotic-resistant and polymicrobial bacteria. PMID:26449208

  9. Hazard identification of cis/trans-zearalenone through the looking-glass.

    PubMed

    Dellafiora, Luca; Galaverna, Gianni; Dall'Asta, Chiara; Cozzini, Pietro

    2015-12-01

    Among the food-related health issues, the presence of contaminants has a prominent role, due to the wide range of exogenous compounds that can occur in food commodities and to their large differences in structure and biological activity. A comprehensive assessment of the related risk is thus actually demanding in terms of time and facilities involved. In this context, the use of computational strategies can be an effective choice for supporting the hazard identification procedure at the early stage. In this work, we focused on the food contaminant zearalenone by comparing the trans and cis isomers, respectively the well-known mycoestrogen and its still largely understudied isomer. We estimated the possible effects exerted by human metabolism on the xenoestrogenicity of cis-ZEN by using a validated in silico strategy based on docking simulations and rescoring procedures. Similarly, the exploitation of the most promising enzymatic detoxifying routes designed for trans-ZEN - which relies on the enzyme lactono hydrolase from Clonostachys rosea - has been assessed for the cis-isomer as well. Our results showed that both isomers can act as functional analogues with respect to xenoestrogenic activity, and several cis-ZEN metabolites with high biological potential have been identified. On the contrary, in spite of the high degree of structural analogy, the cis isomer showed a pattern of interaction with the degrading enzyme in stark contrast with that observed for trans-ZEN. For these reasons, the outcomes presented herein strongly support the inclusion of cis-ZEN in further studies of occurrence, metabolism and bioactivity assessment, and suggest the need for a dedicated handling for the cis isomer in risk assessment studies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Conceptual model and map of financial exploitation of older adults.

    PubMed

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Fairman, Kimberly P; Rosen, Abby; Wilber, Kathleen H

    2011-10-01

    This article describes the processes and outcomes of three-dimensional concept mapping to conceptualize financial exploitation of older adults. Statements were generated from a literature review and by local and national panels consisting of 16 experts in the field of financial exploitation. These statements were sorted and rated using Concept Systems software, which grouped the statements into clusters and depicted them as a map. Statements were grouped into six clusters, and ranked by the experts as follows in descending severity: (a) theft and scams, (b) financial victimization, (c) financial entitlement, (d) coercion, (e) signs of possible financial exploitation, and (f) money management difficulties. The hierarchical model can be used to identify elder financial exploitation and differentiate it from related but distinct areas of victimization. The severity hierarchy may be used to develop measures that will enable more precise screening for triage of clients into appropriate interventions.

  11. Demographic threats to the sustainability of Brazil nut exploitation.

    PubMed

    Peres, Carlos A; Baider, Claudia; Zuidema, Pieter A; Wadt, Lúcia H O; Kainer, Karen A; Gomes-Silva, Daisy A P; Salomão, Rafael P; Simões, Luciana L; Franciosi, Eduardo R N; Cornejo Valverde, Fernando; Gribel, Rogério; Shepard, Glenn H; Kanashiro, Milton; Coventry, Peter; Yu, Douglas W; Watkinson, Andrew R; Freckleton, Robert P

    2003-12-19

    A comparative analysis of 23 populations of the Brazil nut tree (Bertholletia excelsa) across the Brazilian, Peruvian, and Bolivian Amazon shows that the history and intensity of Brazil nut exploitation are major determinants of population size structure. Populations subjected to persistent levels of harvest lack juvenile trees less than 60 centimeters in diameter at breast height; only populations with a history of either light or recent exploitation contain large numbers of juvenile trees. A harvesting model confirms that intensive exploitation levels over the past century are such that juvenile recruitment is insufficient to maintain populations over the long term. Without management, intensively harvested populations will succumb to a process of senescence and demographic collapse, threatening this cornerstone of the Amazonian extractive economy.

  12. Chitosan-based nanosystems and their exploited antimicrobial activity.

    PubMed

    Perinelli, Diego Romano; Fagioli, Laura; Campana, Raffaella; Lam, Jenny K W; Baffone, Wally; Palmieri, Giovanni Filippo; Casettari, Luca; Bonacucina, Giulia

    2018-05-30

    Chitosan is a biodegradable and biocompatible natural polysaccharide that has a wide range of applications in the field of pharmaceutics, biomedical, chemical, cosmetics, textile and food industry. One of the most interesting characteristics of chitosan is its antibacterial and antifungal activity, and together with its excellent safety profile in human, it has attracted considerable attention in various research disciplines. The antimicrobial activity of chitosan is dependent on a number of factors, including its molecular weight, degree of deacetylation, degree of substitution, physical form, as well as structural properties of the cell wall of the target microorganisms. While the sole use of chitosan may not be sufficient to produce an adequate antimicrobial effect to fulfil different purposes, the incorporation of this biopolymer with other active substances such as drugs, metals and natural compounds in nanosystems is a commonly employed strategy to enhance its antimicrobial potential. In this review, we aim to provide an overview on the different approaches that exploit the antimicrobial activity of chitosan-based nanosystems and their applications, and highlight the latest advances in this field. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Automated UAV-based video exploitation using service oriented architecture framework

    NASA Astrophysics Data System (ADS)

    Se, Stephen; Nadeau, Christian; Wood, Scott

    2011-05-01

    Airborne surveillance and reconnaissance are essential for successful military missions. Such capabilities are critical for troop protection, situational awareness, mission planning, damage assessment, and others. Unmanned Aerial Vehicles (UAVs) gather huge amounts of video data but it is extremely labour-intensive for operators to analyze hours and hours of received data. At MDA, we have developed a suite of tools that can process the UAV video data automatically, including mosaicking, change detection and 3D reconstruction, which have been integrated within a standard GIS framework. In addition, the mosaicking and 3D reconstruction tools have also been integrated in a Service Oriented Architecture (SOA) framework. The Visualization and Exploitation Workstation (VIEW) integrates 2D and 3D visualization, processing, and analysis capabilities developed for UAV video exploitation. Visualization capabilities are supported through a thick-client Graphical User Interface (GUI), which allows visualization of 2D imagery, video, and 3D models. The GUI interacts with the VIEW server, which provides video mosaicking and 3D reconstruction exploitation services through the SOA framework. The SOA framework allows multiple users to perform video exploitation by running a GUI client on the operator's computer and invoking the video exploitation functionalities residing on the server. This allows the exploitation services to be upgraded easily and allows the intensive video processing to run on powerful workstations. MDA provides UAV services to the Canadian and Australian forces in Afghanistan with the Heron, a Medium Altitude Long Endurance (MALE) UAV system. On-going flight operations service provides important intelligence, surveillance, and reconnaissance information to commanders and front-line soldiers.

  14. Evolutionary instability of zero-determinant strategies demonstrates that winning is not everything.

    PubMed

    Adami, Christoph; Hintze, Arend

    2013-01-01

    Zero-determinant strategies are a new class of probabilistic and conditional strategies that are able to unilaterally set the expected payoff of an opponent in iterated plays of the Prisoner's Dilemma irrespective of the opponent's strategy (coercive strategies), or else to set the ratio between the player's and their opponent's expected payoff (extortionate strategies). Here we show that zero-determinant strategies are at most weakly dominant, are not evolutionarily stable, and will instead evolve into less coercive strategies. We show that zero-determinant strategies with an informational advantage over other players that allows them to recognize each other can be evolutionarily stable (and able to exploit other players). However, such an advantage is bound to be short-lived as opposing strategies evolve to counteract the recognition.

  15. Final Report, “Exploiting Global View for Resilience”

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chien, Andrew

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  16. Pensions and Household Wealth Accumulation

    ERIC Educational Resources Information Center

    Engelhardt, Gary V.; Kumar, Anil

    2011-01-01

    Economists have long suggested that higher private pension benefits "crowd out" other sources of household wealth accumulation. We exploit detailed information on pensions and lifetime earnings for older workers in the 1992 wave of the Health and Retirement Study and employ an instrumental-variable (IV) identification strategy to estimate…

  17. Are Parental Welfare Work Requirements Good for Disadvantaged Children? Evidence from Age-of-Youngest-Child Exemptions

    ERIC Educational Resources Information Center

    Herbst, Chris M.

    2017-01-01

    This paper assesses the impact of welfare reform's parental work requirements on low-income children's cognitive and social-emotional development. The identification strategy exploits an important feature of the work requirement rules--namely, age-of-youngest-child exemptions--as a source of quasi-experimental variation in first-year maternal…

  18. The Effect of Providing Breakfast in Class on Student Performance

    ERIC Educational Resources Information Center

    Imberman, Scott A.; Kugler, Adriana D.

    2014-01-01

    Many schools have recently experimented with moving breakfast from the cafeteria to the classroom. We examine whether such a program increases achievement, grades, and attendance rates. We exploit quasi-random timing of program implementation that allows for a difference-in-differences identification strategy. We find that providing breakfast in…

  19. Lessons learned from gene identification studies in Mendelian epilepsy disorders

    PubMed Central

    Hardies, Katia; Weckhuysen, Sarah; De Jonghe, Peter; Suls, Arvid

    2016-01-01

    Next-generation sequencing (NGS) technologies are now routinely used for gene identification in Mendelian disorders. Setting up cost-efficient NGS projects and managing the large amount of variants remains, however, a challenging job. Here we provide insights in the decision-making processes before and after the use of NGS in gene identification studies. Genetic factors are thought to have a role in ~70% of all epilepsies, and a variety of inheritance patterns have been described for seizure-associated gene defects. We therefore chose epilepsy as disease model and selected 35 NGS studies that focused on patients with a Mendelian epilepsy disorder. The strategies used for gene identification and their respective outcomes were reviewed. High-throughput NGS strategies have led to the identification of several new epilepsy-causing genes, enlarging our knowledge on both known and novel pathomechanisms. NGS findings have furthermore extended the awareness of phenotypical and genetic heterogeneity. By discussing recent studies we illustrate: (I) the power of NGS for gene identification in Mendelian disorders, (II) the accelerating pace in which this field evolves, and (III) the considerations that have to be made when performing NGS studies. Nonetheless, the enormous rise in gene discovery over the last decade, many patients and families included in gene identification studies still remain without a molecular diagnosis; hence, further genetic research is warranted. On the basis of successful NGS studies in epilepsy, we discuss general approaches to guide human geneticists and clinicians in setting up cost-efficient gene identification NGS studies. PMID:26603999

  20. Decision-feedback detection strategy for nonlinear frequency-division multiplexing

    NASA Astrophysics Data System (ADS)

    Civelli, Stella; Forestieri, Enrico; Secondini, Marco

    2018-04-01

    By exploiting a causality property of the nonlinear Fourier transform, a novel decision-feedback detection strategy for nonlinear frequency-division multiplexing (NFDM) systems is introduced. The performance of the proposed strategy is investigated both by simulations and by theoretical bounds and approximations, showing that it achieves a considerable performance improvement compared to previously adopted techniques in terms of Q-factor. The obtained improvement demonstrates that, by tailoring the detection strategy to the peculiar properties of the nonlinear Fourier transform, it is possible to boost the performance of NFDM systems and overcome current limitations imposed by the use of more conventional detection techniques suitable for the linear regime.

  1. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    ERIC Educational Resources Information Center

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  2. Exploiting the metabolism of PYC expressing HEK293 cells in fed-batch cultures.

    PubMed

    Vallée, Cédric; Durocher, Yves; Henry, Olivier

    2014-01-01

    The expression of recombinant yeast pyruvate carboxylase (PYC) in animal cell lines was shown in previous studies to reduce significantly the formation of waste metabolites, although it has translated into mixed results in terms of improved cellular growth and productivity. In this work, we demonstrate that the unique phenotype of PYC expressing cells can be exploited through the application of a dynamic fed-batch strategy and lead to significant process enhancements. Metabolically engineered HEK293 cells stably producing human recombinant IFNα2b and expressing the PYC enzyme were cultured in batch and fed-batch modes. Compared to parental cells, the maximum cell density in batch was increased 1.5-fold and the culture duration was extended by 2.5 days, but the product yield was only marginally increased. Further improvements were achieved by developing and implementing a dynamic fed-batch strategy using a concentrated feed solution. The feeding was based on an automatic control-loop to maintain a constant glucose concentration. This strategy led to a further 2-fold increase in maximum cell density (up to 10.7×10(6)cells/ml) and a final product titer of 160mg/l, representing nearly a 3-fold yield increase compared to the batch process with the parental cell clone. Copyright © 2013 Elsevier B.V. All rights reserved.

  3. Complex networks repair strategies: Dynamic models

    NASA Astrophysics Data System (ADS)

    Fu, Chaoqi; Wang, Ying; Gao, Yangjun; Wang, Xiaoyang

    2017-09-01

    Network repair strategies are tactical methods that restore the efficiency of damaged networks; however, unreasonable repair strategies not only waste resources, they are also ineffective for network recovery. Most extant research on network repair focuses on static networks, but results and findings on static networks cannot be applied to evolutionary dynamic networks because, in dynamic models, complex network repair has completely different characteristics. For instance, repaired nodes face more severe challenges, and require strategic repair methods in order to have a significant effect. In this study, we propose the Shell Repair Strategy (SRS) to minimize the risk of secondary node failures due to the cascading effect. Our proposed method includes the identification of a set of vital nodes that have a significant impact on network repair and defense. Our identification of these vital nodes reduces the number of switching nodes that face the risk of secondary failures during the dynamic repair process. This is positively correlated with the size of the average degree 〈 k 〉 and enhances network invulnerability.

  4. ALF: a strategy for identification of unauthorized GMOs in complex mixtures by a GW-NGS method and dedicated bioinformatics analysis.

    PubMed

    Košir, Alexandra Bogožalec; Arulandhu, Alfred J; Voorhuijzen, Marleen M; Xiao, Hongmei; Hagelaar, Rico; Staats, Martijn; Costessi, Adalberto; Žel, Jana; Kok, Esther J; Dijk, Jeroen P van

    2017-10-26

    The majority of feed products in industrialised countries contains materials derived from genetically modified organisms (GMOs). In parallel, the number of reports of unauthorised GMOs (UGMOs) is gradually increasing. There is a lack of specific detection methods for UGMOs, due to the absence of detailed sequence information and reference materials. In this research, an adapted genome walking approach was developed, called ALF: Amplification of Linearly-enriched Fragments. Coupling of ALF to NGS aims for simultaneous detection and identification of all GMOs, including UGMOs, in one sample, in a single analysis. The ALF approach was assessed on a mixture made of DNA extracts from four reference materials, in an uneven distribution, mimicking a real life situation. The complete insert and genomic flanking regions were known for three of the included GMO events, while for MON15985 only partial sequence information was available. Combined with a known organisation of elements, this GMO served as a model for a UGMO. We successfully identified sequences matching with this organisation of elements serving as proof of principle for ALF as new UGMO detection strategy. Additionally, this study provides a first outline of an automated, web-based analysis pipeline for identification of UGMOs containing known GM elements.

  5. Acute asthma severity identification of expert system flow in emergency department

    NASA Astrophysics Data System (ADS)

    Sharif, Nurul Atikah Mohd; Ahmad, Norazura; Ahmad, Nazihah; Desa, Wan Laailatul Hanim Mat

    2017-11-01

    Integration of computerized system in healthcare management help in smoothening the documentation of patient records, highly accesses of knowledge and clinical practices guideline, and advice on decision making. Exploit the advancement of artificial intelligent such as fuzzy logic and rule-based reasoning may improve the management of emergency department in terms of uncertainty condition and medical practices adherence towards clinical guideline. This paper presenting details of the emergency department flow for acute asthma severity identification with the embedding of acute asthma severity identification expert system (AASIES). Currently, AASIES is still in preliminary stage of system validation. However, the implementation of AASIES in asthma bay management is hope can reduce the usage of paper for manual documentation and be a pioneer for the development of a more complex decision support system to smoothen the ED management and more systematic.

  6. Organ sales needn't be exploitative (but it matters if they are).

    PubMed

    Lawlor, Rob

    2011-06-01

    This paper considers two arguments that are common in the literature on organ sales. First, organ sales are exploitative and therefore should not be permitted. Second, it doesn't matter whether organ sales are exploitative or not; the only thing that matters is that we do what is in the interests of those who need to be protected. In this paper, I argue that both of these arguments are too simplistic. My intention, however, is not to argue for or against organ sales. My conclusion, rather, is simply that we cannot hope to address the issue of organ sales if we lack a good understanding of exploitation. We should not attempt to answer the question of whether or not organ sales should be banned on the grounds that they are exploitative without acknowledging and addressing the nuances involved in understanding exploitation.

  7. National Center for Missing and Exploited Children

    MedlinePlus

    ... Professional Organizations & Networks National & International Collaboration EN SP Report Child Sexual Exploitation Make a CYBERTIPLINE Report Number of reports NCMEC responded to in 2017 regarding possible child ...

  8. Implementation Strategy

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Meeting the identified needs of Earth science requires approaching EOS as an information system and not simply as one or more satellites with instruments. Six elements of strategy are outlined as follows: implementation of the individual discipline missions as currently planned; use of sustained observational capabilities offered by operational satellites without waiting for the launch of new mission; put first priority on the data system; deploy an Advanced Data Collection and Location System; put a substantial new observing capability in a low Earth orbit in such a way as to provide for sustained measurements; and group instruments to exploit their capabilities for synergism; maximize the scientific utility of the mission; and minimize the costs of implementation where possible.

  9. Identification of a Herbal Powder by Deoxyribonucleic Acid Barcoding and Structural Analyses.

    PubMed

    Sheth, Bhavisha P; Thaker, Vrinda S

    2015-10-01

    Authentic identification of plants is essential for exploiting their medicinal properties as well as to stop the adulteration and malpractices with the trade of the same. To identify a herbal powder obtained from a herbalist in the local vicinity of Rajkot, Gujarat, using deoxyribonucleic acid (DNA) barcoding and molecular tools. The DNA was extracted from a herbal powder and selected Cassia species, followed by the polymerase chain reaction (PCR) and sequencing of the rbcL barcode locus. Thereafter the sequences were subjected to National Center for Biotechnology Information (NCBI) basic local alignment search tool (BLAST) analysis, followed by the protein three-dimension structure determination of the rbcL protein from the herbal powder and Cassia species namely Cassia fistula, Cassia tora and Cassia javanica (sequences obtained in the present study), Cassia Roxburghii, and Cassia abbreviata (sequences retrieved from Genbank). Further, the multiple and pairwise structural alignment were carried out in order to identify the herbal powder. The nucleotide sequences obtained from the selected species of Cassia were submitted to Genbank (Accession No. JX141397, JX141405, JX141420). The NCBI BLAST analysis of the rbcL protein from the herbal powder showed an equal sequence similarity (with reference to different parameters like E value, maximum identity, total score, query coverage) to C. javanica and C. roxburghii. In order to solve the ambiguities of the BLAST result, a protein structural approach was implemented. The protein homology models obtained in the present study were submitted to the protein model database (PM0079748-PM0079753). The pairwise structural alignment of the herbal powder (as template) and C. javanica and C. roxburghii (as targets individually) revealed a close similarity of the herbal powder with C. javanica. A strategy as used here, incorporating the integrated use of DNA barcoding and protein structural analyses could be adopted, as a novel

  10. Exploration and Exploitation During Sequential Search

    PubMed Central

    Dam, Gregory; Körding, Konrad

    2012-01-01

    When we learn how to throw darts we adjust how we throw based on where the darts stick. Much of skill learning is computationally similar in that we learn using feedback obtained after the completion of individual actions. We can formalize such tasks as a search problem; among the set of all possible actions, find the action that leads to the highest reward. In such cases our actions have two objectives: we want to best utilize what we already know (exploitation), but we also want to learn to be more successful in the future (exploration). Here we tested how participants learn movement trajectories where feedback is provided as a monetary reward that depends on the chosen trajectory. We mathematically derived the optimal search policy for our experiment using decision theory. The search behavior of participants is well predicted by an ideal searcher model that optimally combines exploration and exploitation. PMID:21585479

  11. The Geohazards Exploitation Platform

    NASA Astrophysics Data System (ADS)

    Laur, Henri; Casu, Francesco; Bally, Philippe; Caumont, Hervé; Pinto, Salvatore

    2016-04-01

    The Geohazards Exploitation Platform, or Geohazards TEP (GEP), is an ESA originated R&D activity of the EO ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. This encompasses on-demand processing for specific user needs, systematic processing to address common information needs of the geohazards community, and integration of newly developed processors for scientists and other expert users. The platform supports the geohazards community's objectives as defined in the context of the International Forum on Satellite EO and Geohazards organised by ESA and GEO in Santorini in 2012. The GEP is a follow on to the Supersites Exploitation Platform (SSEP) an ESA initiative to support the Geohazards Supersites & Natural Laboratories initiative (GSNL). Today the GEP allows to exploit 70+ Terabyte of ERS and ENVISAT archive and the Copernicus Sentinel-1 data available on line. The platform has already engaged 22 European early adopters in a validation activity initiated in March 2015. Since September, this validation has reached 29 single user projects. Each project is concerned with either integrating an application, running on demand processing or systematically generating a product collection using an application available in the platform. The users primarily include 15 geoscience centres and universities based in Europe: British Geological Survey (UK), University of Leeds (UK), University College London (UK), ETH University of Zurich (CH), INGV (IT), CNR-IREA and CNR-IRPI (IT), University of L'Aquila (IT), NOA (GR), Univ. Blaise Pascal & CNRS (FR), Ecole Normale Supérieure (FR), ISTERRE / University of Grenoble-Alpes (FR). In addition, there are users from Africa and North America with the University of Rabat (MA) and the University of Miami (US). Furthermore two space agencies and four private companies are involved: the German Space Research Centre DLR (DE), the European Space Agency (ESA), Altamira Information (ES

  12. Identification of commonly encountered Pratylenchus in Oregon

    USDA-ARS?s Scientific Manuscript database

    Pratylenchus species are commonly encountered in soil samples collected from a diversity of economically important crops in Oregon, including potato and small fruits. Proper identification is critical to the selection of an appropriate management strategy since, in many cases, populations are an as...

  13. Surgical instrument similarity metrics and tray analysis for multi-sensor instrument identification

    NASA Astrophysics Data System (ADS)

    Glaser, Bernhard; Schellenberg, Tobias; Franke, Stefan; Dänzer, Stefan; Neumuth, Thomas

    2015-03-01

    A robust identification of the instrument currently used by the surgeon is crucial for the automatic modeling and analysis of surgical procedures. Various approaches for intra-operative surgical instrument identification have been presented, mostly based on radio-frequency identification (RFID) or endoscopic video analysis. A novel approach is to identify the instruments on the instrument table of the scrub nurse with a combination of video and weight information. In a previous article, we successfully followed this approach and applied it to multiple instances of an ear, nose and throat (ENT) procedure and the surgical tray used therein. In this article, we present a metric for the suitability of the instruments of a surgical tray for identification by video and weight analysis and apply it to twelve trays of four different surgical domains (abdominal surgery, neurosurgery, orthopedics and urology). The used trays were digitized at the central sterile services department of the hospital. The results illustrate that surgical trays differ in their suitability for the approach. In general, additional weight information can significantly contribute to the successful identification of surgical instruments. Additionally, for ten different surgical instruments, ten exemplars of each instrument were tested for their weight differences. The samples indicate high weight variability in instruments with identical brand and model number. The results present a new metric for approaches aiming towards intra-operative surgical instrument detection and imply consequences for algorithms exploiting video and weight information for identification purposes.

  14. Off-shoring clinical research: exploitation and the reciprocity constraint.

    PubMed

    Mitra, Agomoni Ganguli

    2013-12-01

    The last 20 years have seen a staggering growth in the practice of off-shoring clinical research to low-and middle-income countries (LICs and MICs), a growth that has been matched by the neoliberal policies adopted by host countries towards attracting trials to their shores. A recurring concern in this context is the charge of exploitation, linked to various aspects of off-shoring. In this paper, I examine Alan Wertheimer's approach and offer an alternative view of understanding exploitation in this context. I will suggest that the justification for the enterprise of research is largely dependent on its integration within a health system from which participants regularly benefit and I argue that an attention to a principle of reciprocity will enable us to better recognize and address exploitation in international research. © 2012 John Wiley & Sons Ltd.

  15. [Impacts of hydroelectric cascade exploitation on river ecosystem and landscape: a review].

    PubMed

    Yang, Kun; Deng, Xi; Li, Xue-Ling; Wen, Ping

    2011-05-01

    Hydroelectric cascade exploitation, one of the major ways for exploiting water resources and developing hydropower, not only satisfies the needs of various national economic sectors, but also promotes the socio-economic sustainable development of river basin. unavoidable anthropogenic impacts on the entire basin ecosystem. Based on the process of hydroelectric cascade exploitation and the ecological characteristics of river basins, this paper reviewed the major impacts of hydroelectric cascade exploitation on dam-area ecosystems, river reservoirs micro-climate, riparian ecosystems, river aquatic ecosystems, wetlands, and river landscapes. Some prospects for future research were offered, e.g., strengthening the research of chain reactions and cumulative effects of ecological factors affected by hydroelectric cascade exploitation, intensifying the study of positive and negative ecological effects under the dam networks and their joint operations, and improving the research of successional development and stability of basin ecosystems at different temporal and spatial scales.

  16. Transactional sex as a form of child sexual exploitation and abuse in Rwanda: implications for child security and protection.

    PubMed

    Williams, Timothy P; Binagwaho, Agnes; Betancourt, Theresa S

    2012-04-01

    To illuminate the different manifestations of transactional sexual exploitation and abuse among Rwanda's children in order to inform effective responses by policies, programs, and communities. Qualitative data was collected during April and May 2010. One-hundred and thirty-nine adults (56% female) and 52 children (60% female) participated in focus groups across three geographic locations in Rwanda. Eleven interviews were held with child protection stakeholders. Interview and focus group participants reported how children, primarily girls, engaged in transactional sex as a survival strategy in response to situations of adversity including economic deprivation, difficulty accessing school, and social pressure. Policy and programs should work to address the underlying social and economic determinants of transactional sexual exploitation through structural interventions that reduce gender inequalities to accessing school and securing basic needs. Further quantitative and qualitative research to better understand the complexities of this issue is warranted. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. Exploiting the biomolecular corona: pre-coating of nanoparticles enables controlled cellular interactions.

    PubMed

    Simon, Johanna; Müller, Laura K; Kokkinopoulou, Maria; Lieberwirth, Ingo; Morsbach, Svenja; Landfester, Katharina; Mailänder, Volker

    2018-06-14

    Formation of the biomolecular corona ultimately determines the successful application of nanoparticles in vivo. Adsorption of biomolecules such as proteins is an inevitable process that takes place instantaneously upon contact with physiological fluid (e.g. blood). Therefore, strategies are needed to control this process in order to improve the properties of the nanoparticles and to allow targeted drug delivery. Here, we show that the design of the protein corona by a pre-formed protein corona with tailored properties enables targeted cellular interactions. Nanoparticles were pre-coated with immunoglobulin depleted plasma to create and design a protein corona that reduces cellular uptake by immune cells. It was proven that a pre-formed protein corona remains stable even after nanoparticles were re-introduced to plasma. This opens up the great potential to exploit protein corona formation, which will significantly influence the development of novel nanomaterials.

  18. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  19. Application of an Optimal Search Strategy for the DNAPL Source Identification to a Field Site in Nanjing, China

    NASA Astrophysics Data System (ADS)

    Longting, M.; Ye, S.; Wu, J.

    2014-12-01

    Identification and removing the DNAPL source in aquifer system is vital in rendering remediation successful and lowering the remediation time and cost. Our work is to apply an optimal search strategy introduced by Zoi and Pinder[1], with some modifications, to a field site in Nanjing City, China to define the strength, and location of DNAPL sources using the least samples. The overall strategy uses Monte Carlo stochastic groundwater flow and transport modeling, incorporates existing sampling data into the search strategy, and determines optimal sampling locations that are selected according to the reduction in overall uncertainty of the field and the proximity to the source locations. After a sample is taken, the plume is updated using a Kalman filter. The updated plume is then compared to the concentration fields that emanate from each individual potential source using fuzzy set technique. The comparison followed provides weights that reflect the degree of truth regarding the location of the source. The above steps are repeated until the optimal source characteristics are determined. Considering our site case, some specific modifications and work have been done as follows. K random fields are generated after fitting the measurement K data to the variogram model. The locations of potential sources that are given initial weights are targeted based on the field survey, with multiple potential source locations around the workshops and wastewater basin. Considering the short history (1999-2010) of manufacturing optical brightener PF at the site, and the existing sampling data, a preliminary source strength is then estimated, which will be optimized by simplex method or GA later. The whole algorithm then will guide us for optimal sampling and update as the investigation proceeds, until the weights finally stabilized. Reference [1] Dokou Zoi, and George F. Pinder. "Optimal search strategy for the definition of a DNAPL source." Journal of Hydrology 376.3 (2009): 542

  20. Exploiting the Use of Social Networking to Facilitate Collaboration in the Scientific Community

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coppock, Edrick G.

    The goal of this project was to exploit social networking to facilitate scientific collaboration. The project objective was to research and identify scientific collaboration styles that are best served by social networking applications and to model the most effective social networking applications to substantiate how social networking can support scientific collaboration. To achieve this goal and objective, the project was to develop an understanding of the types of collaborations conducted by scientific researchers, through classification, data analysis and identification of unique collaboration requirements. Another technical objective in support of this goal was to understand the current state of technology inmore » collaboration tools. In order to test hypotheses about which social networking applications effectively support scientific collaboration the project was to create a prototype scientific collaboration system. The ultimate goal for testing the hypotheses and research of the project was to refine the prototype into a functional application that could effectively facilitate and grow collaboration within the U.S. Department of Energy (DOE) research community.« less

  1. An Astronomical Pattern-Matching Algorithm for Automated Identification of Whale Sharks

    NASA Technical Reports Server (NTRS)

    Arzoumanian, Z.; Holmberg, J.; Norman, B.

    2005-01-01

    The largest shark species alive today, whale sharks (Rhincodon typus) are rare and poorly studied. Directed fisheries, high value in international trade, a highly migratory nature, and generally low abundance make this species vulnerable to exploitation. Mark- and-recapture studies have provided our current understanding of whale shark demographics and life history, but conventional tagging has met with limited success. To aid in conservation and management efforts, and to further our knowledge of whale shark biology, an identification technology that maximizes the scientific value of individual sighting is needed.

  2. Exploiting genotypic variation in plant nutrient accumulation to alleviate micronutrient deficiency in populations.

    PubMed

    Genc, Yusuf; Humphries, Julia M; Lyons, Graham H; Graham, Robin D

    2005-01-01

    More than 2 billion people consume diets that are less diverse than 30 years ago, leading to deficiencies in micronutrients, especially iron (Fe), zinc (Zn), selenium (Se), iodine (I), and also vitamin A. A strategy that exploits genetic variability to breed staple crops with enhanced ability to fortify themselves with micronutrients (genetic biofortification) offers a sustainable, cost-effective alternative to conventional supplementation and fortification programs. This is more likely to reach those most in need, has the added advantages of requiring no change in current consumer behaviour to be effective, and is transportable to a range of countries. Research by our group, along with studies elsewhere, has demonstrated conclusively that substantial genotypic variation exists in nutrient (e.g. Fe, Zn) and nutrient promotor (e.g. inulin) concentrations in wheat and other staple foods. A rapid screening technique has been developed for lutein content of wheat and triticale, and also for pro-vitamin A carotenoids in bread wheat. This will allow cost-effective screening of a wider range of genotypes that may reveal greater genotypic variation in these traits. Moreover, deeper understanding of genetic control mechanisms and development of molecular markers will facilitate breeding programs. We suggest that a combined strategy utilising plant breeding for higher micronutrient density; maximising the effects of nutritional promoters (e.g. inulin, vitamin C) by promoting favourable dietary combinations, as well as by plant breeding; and agronomic biofortification (e.g. adding iodide or iodate as fertiliser; applying selenate to cereal crops by spraying or adding to fertiliser) is likely to be the most effective way to improve the nutrition of populations. Furthermore, the importance of detecting and exploiting beneficial interactions is illustrated by our discovery that in Fe-deficient chickens, circulating Fe concentrations can be restored to normal levels by lutein

  3. Mitochondrial DNA identification of game and harvested freshwater fish species.

    PubMed

    Kyle, C J; Wilson, C C

    2007-02-14

    The use of DNA in forensics has grown rapidly for human applications along with the concomitant development of bioinformatics and demographic databases to help fully realize the potential of this molecular information. Similar techniques are also used routinely in many wildlife cases, such as species identification in food products, poaching and the illegal trade of endangered species. The use of molecular techniques in forensic cases related to wildlife and the development of associated databases has, however, mainly focused on large mammals with the exception of a few high-profile species. There is a need to develop similar databases for aquatic species for fisheries enforcement, given the large number of exploited and endangered fish species, the intensity of exploitation, and challenges in identifying species and their derived products. We sequenced a 500bp fragment of the mitochondrial cytochrome b gene from representative individuals from 26 harvested fish taxa from Ontario, Canada, focusing on species that support major commercial and recreational fisheries. Ontario provides a unique model system for the development of a fish species database, as the province contains an evolutionarily diverse array of freshwater fish families representing more than one third of all freshwater fish in Canada. Inter- and intraspecific sequence comparisons using phylogenetic analysis and a BLAST search algorithm provided rigorous statistical metrics for species identification. This methodology and these data will aid in fisheries enforcement, providing a tool to easily and accurately identify fish species in enforcement investigations that would have otherwise been difficult or impossible to pursue.

  4. Evaluation of continuing education of family health strategy teams for the early identification of suspected cases of cancer in children.

    PubMed

    Costa, Ana Maria Aranha Magalhaes; Magluta, Cynthia; Gomes Junior, Saint Clair

    2017-09-07

    This study evaluated the influence of continuing education of family health strategy teams by the Ronald McDonald Institute program on the early diagnosis of cancer in children and adolescents. The study applied Habicht's model to evaluate the adequacy and plausibility of continuing education by using as outcome the number of children with suspected cancer who were referred to the hospital of references in the 1 year before and 1 year after intervention and the number of patients referred by intervention group and control group family health strategy teams. Medical records from each hospital of reference were used to collect information of suspect cases of cancer. Descriptive analyses were performed using frequencies and mean values. Chi-square tests were used to assess statistically significant differences between the groups and periods by using p-values < 0.05. The results showed a 30.6% increase in the number of children referred to the hospital of reference for suspected cancer in the post-intervention period; in addition, the family health strategy teams that underwent the intervention referred 3.6 times more number of children to hospital of references than did the control group. Only the intervention group showed an increase in the number of confirmed cases. This evaluation of a continuing education program for early identification of pediatric cancer showed that the program was adequate in achieving the established goals and that the results could be attributed to the program.

  5. Compression of contour data through exploiting curve-to-curve dependence

    NASA Technical Reports Server (NTRS)

    Yalabik, N.; Cooper, D. B.

    1975-01-01

    An approach to exploiting curve-to-curve dependencies in order to achieve high data compression is presented. One of the approaches to date of along curve compression through use of cubic spline approximation is taken and extended by investigating the additional compressibility achievable through curve-to-curve structure exploitation. One of the models under investigation is reported on.

  6. Exploiting Non-Markovianity for Quantum Control.

    PubMed

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  7. Microbial Community Dynamics during Rearing of Black Soldier Fly Larvae (Hermetia illucens) and Impact on Exploitation Potential.

    PubMed

    De Smet, Jeroen; Wynants, Enya; Cos, Paul; Van Campenhout, Leen

    2018-05-01

    The need to increase sustainability in agriculture, to ensure food security for the future generations, is leading to the emergence of industrial rearing facilities for insects. One promising species being industrially reared as an alternative protein source for animal feed and as a raw material for the chemical industry is the black soldier fly ( Hermetia illucens ). However, scientific knowledge toward the optimization of the productivity for this insect is scarce. One knowledge gap concerns the impact of the microbial community associated with H. illucens on the performance and health of this insect. In this review, the first steps in the characterization of the microbiota in H. illucens and the analysis of substrate-dependent dynamics in its composition are summarized and discussed. Furthermore, this review zooms in on the interactions between microorganisms and the insect during H. illucens development. Finally, attention is paid to how the microbiome research can lead to alternative valorization strategies for H. illucens , such as (i) the manipulation of the microbiota to optimize insect biomass production and (ii) the exploitation of the H. illucens -microbiota interplay for the discovery of new enzymes and novel antimicrobial strategies based on H. illucens immunity using either the whole organism or its molecules. The next decade promises to be extremely interesting for this research field and will see an emergence of the microbiological optimization of H. illucens as a sustainable insect for industrial rearing and the exploitation of its microbiome for novel biotechnological applications. Copyright © 2018 American Society for Microbiology.

  8. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation

    PubMed Central

    Gore, Meredith L.; Lute, Michelle L.; Ratsimbazafy, Jonah H.; Rajaonson, Andry

    2016-01-01

    Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88) with residents of Madagascar’s Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people’s perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall) may not reflect perceptions of policy-makers (considered to be high). Discord is a key entry point for attention. PMID:27082106

  9. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation.

    PubMed

    Gore, Meredith L; Lute, Michelle L; Ratsimbazafy, Jonah H; Rajaonson, Andry

    2016-01-01

    Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88) with residents of Madagascar's Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people's perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall) may not reflect perceptions of policy-makers (considered to be high). Discord is a key entry point for attention.

  10. The Influence of Patient Identification and Narrative Transportation on Intentions to Participate in Cancer Research.

    PubMed

    Neil, Jordan M; Gough, Aisling; Kee, Frank; George, Thomas J; Pufahl, Jeffrey; Krieger, Janice L

    2018-05-03

    Cancer decision-making interventions commonly utilize narratives as a persuasive strategy to increase identification with the message source, promote involvement with the topic, and elicit greater willingness to adopt recommended behaviors. However, there is little empirical research examining the mechanisms underlying the effectiveness of this strategy in the context of cancer research participation. Data for the current manuscript were collected as part of a larger study conducted with cancer patients (N = 413) from the USA, UK, and the Republic of Ireland. Participants viewed and evaluated video-recorded vignettes, illustrating different strategies for discussing clinical trials participation with family members. Results showed nationality was a significant predictor of identification with the main character (i.e., patient) in the vignette. Unexpectedly, these cross-national differences in identification disappeared when patients currently undergoing treatment had higher perceived susceptibility of their cancer. Identification with the main character in the vignettes was a significant predictor of intentions to participate in cancer research, but only when the mediating role of narrative transportation was considered. The findings demonstrate the importance of considering how individual and social identities influence identification with characters in cancer narratives and yield practical guidance for developing arts-based interventions to increase cancer research participation.

  11. Active thermography and post-processing image enhancement for recovering of abraded and paint-covered alphanumeric identification marks

    NASA Astrophysics Data System (ADS)

    Montanini, R.; Quattrocchi, A.; Piccolo, S. A.

    2016-09-01

    Alphanumeric marking is a common technique employed in industrial applications for identification of products. However, the realised mark can undergo deterioration, either by extensive use or voluntary deletion (e.g. removal of identification numbers of weapons or vehicles). For recovery of the lost data many destructive or non-destructive techniques have been endeavoured so far, which however present several restrictions. In this paper, active infrared thermography has been exploited for the first time in order to assess its effectiveness in restoring paint covered and abraded labels made by means of different manufacturing processes (laser, dot peen, impact, cold press and scribe). Optical excitation of the target surface has been achieved using pulse (PT), lock-in (LT) and step heating (SHT) thermography. Raw infrared images were analysed with a dedicated image processing software originally developed in Matlab™, exploiting several methods, which include thermographic signal reconstruction (TSR), guided filtering (GF), block guided filtering (BGF) and logarithmic transformation (LN). Proper image processing of the raw infrared images resulted in superior contrast and enhanced readability. In particular, for deeply abraded marks, good outcomes have been obtained by application of logarithmic transformation to raw PT images and block guided filtering to raw phase LT images. With PT and LT it was relatively easy to recover labels covered by paint, with the latter one providing better thermal contrast for all the examined targets. Step heating thermography never led to adequate label identification instead.

  12. Information Withholding as a Manipulative and Collusive Strategy in Nukulaelae Gossip.

    ERIC Educational Resources Information Center

    Besnier, Niko

    1989-01-01

    Examines the organization and function of information-withholding sequences, a conversational strategy used by participants in gossip interaction on Nukulaelae, a Polynesian Central Pacific atoll. Withholding sequences illustrate how ambiguity and repairs can be exploited to meet the communicative demands of particular interactional contexts. (62…

  13. In Silico Identification of Candidate Genes for Fertility Restoration in Cytoplasmic Male Sterile Perennial Ryegrass (Lolium perenne L.)

    PubMed Central

    Sykes, Timothy; Yates, Steven; Nagy, Istvan; Asp, Torben; Small, Ian

    2017-01-01

    Perennial ryegrass (Lolium perenne L.) is widely used for forage production in both permanent and temporary grassland systems. To increase yields in perennial ryegrass, recent breeding efforts have been focused on strategies to more efficiently exploit heterosis by hybrid breeding. Cytoplasmic male sterility (CMS) is a widely applied mechanism to control pollination for commercial hybrid seed production and although CMS systems have been identified in perennial ryegrass, they are yet to be fully characterized. Here, we present a bioinformatics pipeline for efficient identification of candidate restorer of fertility (Rf) genes for CMS. From a high-quality draft of the perennial ryegrass genome, 373 pentatricopeptide repeat (PPR) genes were identified and classified, further identifying 25 restorer of fertility-like PPR (RFL) genes through a combination of DNA sequence clustering and comparison to known Rf genes. This extensive gene family was targeted as the majority of Rf genes in higher plants are RFL genes. These RFL genes were further investigated by phylogenetic analyses, identifying three groups of perennial ryegrass RFLs. These three groups likely represent genomic regions of active RFL generation and identify the probable location of perennial ryegrass PPR-Rf genes. This pipeline allows for the identification of candidate PPR-Rf genes from genomic sequence data and can be used in any plant species. Functional markers for PPR-Rf genes will facilitate map-based cloning of Rf genes and enable the use of CMS as an efficient tool to control pollination for hybrid crop production. PMID:26951780

  14. A Training Strategy for Personnel Working in Developing Countries.

    ERIC Educational Resources Information Center

    McConkey, Roy; O'Toole, Brian

    1998-01-01

    Describes the training strategy developed by the Community Based Rehabilitation Programme in Guyana. The strategy has three components: the identification of training needs of families and support workers, the production of video-based training packages on specific topics, and the utilization of available personnel to act as local tutors.…

  15. IDENTIFICATION OF SEDIMENT SOURCE AREAS WITHIN A WATERSHED

    EPA Science Inventory

    Identification of sediment source areas is crucial for designing proper abatement strategies that reduce sediment and associated contaminant loading to receiving water downstream. In this study, two methodologies were developed to identify the source areas and their relative stre...

  16. Redox Strategies for Crop Improvement.

    PubMed

    Kerchev, Pavel; De Smet, Barbara; Waszczak, Cezary; Messens, Joris; Van Breusegem, Frank

    2015-11-10

    Recently, the agro-biotech industry has been driven by overcoming the limitations imposed by fluctuating environmental stress conditions on crop productivity. A common theme among (a)biotic stresses is the perturbation of the redox homeostasis. As a strategy to engineer stress-tolerant crops, many approaches have been centered on restricting the negative impact of reactive oxygen species (ROS) accumulation. In this study, we discuss the scientific background of the existing redox-based strategies to improve crop performance and quality. In this respect, a special focus goes to summarizing the current patent landscape because this aspect is very often ignored, despite constituting the forefront of applied research. The current increased understanding of ROS acting as signaling molecules has opened new avenues to exploit redox biology for crop improvement required for sustainable food security.

  17. A strategy for identification and structural characterization of compounds from Gardenia jasminoides by integrating macroporous resin column chromatography and liquid chromatography-tandem mass spectrometry combined with ion-mobility spectrometry.

    PubMed

    Wang, Lu; Liu, Shu; Zhang, Xueju; Xing, Junpeng; Liu, Zhiqiang; Song, Fengrui

    2016-06-24

    In this paper, an analysis strategy integrating macroporous resin (AB-8) column chromatography and high performance liquid chromatography-electrospray ionization-tandem mass spectrometry (HPLC-ESI-MS/MS) combined with ion mobility spectrometry (IMS) was proposed and applied for identification and structural characterization of compounds from the fruits of Gardenia jasminoides. The extracts of G. jasminoides were separated by AB-8 resin column chromatography combined with reversed phase liquid chromatography (C18 column) and detected by electrospray ionization tandem mass spectrometry. Additionally, ion mobility spectrometry (IMS) was employed as a supplementary separation technique to discover previously undetected isomers from the fruits of G. jasminoides. A total of 71 compounds, including iridoids, flavonoids, triterpenes, monoterpenoids, carotenoids and phenolic acids were identified by the characteristic high resolution mass spectrometry and the ESI-MS/MS fragmentations. In conclusion, the IMS-MS technique achieved the separation of isomers in crocin-3 and crocin-4 according to their acquired mobility drift times differing from classical analysis by mass spectrometry. The proposed strategy can be used as a highly sensitive and efficient procedure for identification and separation isomeric components in extracts of herbal medicines. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. Cloud Based Earth Observation Data Exploitation Platforms

    NASA Astrophysics Data System (ADS)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  19. Noise Reduction with Microphone Arrays for Speaker Identification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cohen, Z

    Reducing acoustic noise in audio recordings is an ongoing problem that plagues many applications. This noise is hard to reduce because of interfering sources and non-stationary behavior of the overall background noise. Many single channel noise reduction algorithms exist but are limited in that the more the noise is reduced; the more the signal of interest is distorted due to the fact that the signal and noise overlap in frequency. Specifically acoustic background noise causes problems in the area of speaker identification. Recording a speaker in the presence of acoustic noise ultimately limits the performance and confidence of speaker identificationmore » algorithms. In situations where it is impossible to control the environment where the speech sample is taken, noise reduction filtering algorithms need to be developed to clean the recorded speech of background noise. Because single channel noise reduction algorithms would distort the speech signal, the overall challenge of this project was to see if spatial information provided by microphone arrays could be exploited to aid in speaker identification. The goals are: (1) Test the feasibility of using microphone arrays to reduce background noise in speech recordings; (2) Characterize and compare different multichannel noise reduction algorithms; (3) Provide recommendations for using these multichannel algorithms; and (4) Ultimately answer the question - Can the use of microphone arrays aid in speaker identification?« less

  20. Generation and exploitation of acyclic azomethine imines in chiral Brønsted acid catalysis

    NASA Astrophysics Data System (ADS)

    Hashimoto, Takuya; Kimura, Hidenori; Kawamata, Yu; Maruoka, Keiji

    2011-08-01

    Successful implementation of a catalytic asymmetric synthesis strategy to produce enantiomerically enriched compounds requires the adoption of suitable prochiral substrates. The combination of an azomethine imine electrophile with various nucleophiles could give straightforward access to a number of synthetically useful chiral hydrazines, but is used rarely. Here we report the exploitation of acyclic azomethine imines as a new type of prochiral electrophile. They can be generated in situ by the condensation of N‧-benzylbenzoylhydrazide with a variety of aldehydes in the presence of a catalytic amount of an axially chiral dicarboxylic acid. By trapping these electrophiles with alkyl diazoacetate or (diazomethyl)phosphonate nucleophiles, we produced a diverse array of chiral α-diazo-β-hydrazino esters and phosphonates with excellent enantioselectivities.

  1. Bacteriophage Amplification-Coupled Detection and Identification of Bacterial Pathogens

    NASA Astrophysics Data System (ADS)

    Cox, Christopher R.; Voorhees, Kent J.

    Current methods of species-specific bacterial detection and identification are complex, time-consuming, and often require expensive specialized equipment and highly trained personnel. Numerous biochemical and genotypic identification methods have been applied to bacterial characterization, but all rely on tedious microbiological culturing practices and/or costly sequencing protocols which render them impractical for deployment as rapid, cost-effective point-of-care or field detection and identification methods. With a view towards addressing these shortcomings, we have exploited the evolutionarily conserved interactions between a bacteriophage (phage) and its bacterial host to develop species-specific detection methods. Phage amplification-coupled matrix assisted laser desorption time-of-flight mass spectrometry (MALDI-TOF-MS) was utilized to rapidly detect phage propagation resulting from species-specific in vitro bacterial infection. This novel signal amplification method allowed for bacterial detection and identification in as little as 2 h, and when combined with disulfide bond reduction methods developed in our laboratory to enhance MALDI-TOF-MS resolution, was observed to lower the limit of detection by several orders of magnitude over conventional spectroscopy and phage typing methods. Phage amplification has been combined with lateral flow immunochromatography (LFI) to develop rapid, easy-to-operate, portable, species-specific point-of-care (POC) detection devices. Prototype LFI detectors have been developed and characterized for Yersinia pestis and Bacillus anthracis, the etiologic agents of plague and anthrax, respectively. Comparable sensitivity and rapidity was observed when phage amplification was adapted to a species-specific handheld LFI detector, thus allowing for rapid, simple, POC bacterial detection and identification while eliminating the need for bacterial culturing or DNA isolation and amplification techniques.

  2. Microbial culture collections as pillars for promoting fungal diversity, conservation and exploitation.

    PubMed

    Sette, Lara Durães; Pagnocca, Fernando Carlos; Rodrigues, André

    2013-11-01

    Fungi are a diverse group of organisms with an overall global number of 1.5M up to 3.3M species on Earth. Besides their ecological roles as decomposers, fungi are important in several aspects of applied research. Here, we review how culture collections may promote the knowledge on diversity, conservation and biotechnological exploitation of fungi. The impact of fungi diversity on biotechnological studies is discussed. We point out the major roles of microbial repositories, including fungal preservation, prospecting, identification, authentication and supply. A survey on the World Data Center for Microorganisms (WDCM) powered by the World Federation for Culture Collections and on the Genetic Heritage Management Council (CGEN) database revealed that 46 Brazilian culture collections registered in these databases are dedicate to preserving fungi. Most of these culture collections are located in the Southeast of Brazil. This scenario also demonstrates that Brazil has many collections focused on fungal strains, but the lack of up-to-date information in WDCM as well as of a solid national platform for culture collections registration do not allow accurate assessment of fungal preservation. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Defense Logistics: DOD Has Addressed Most Reporting Requirements and Continues to Refine Its Asset Visibility Strategy

    DTIC Science & Technology

    2015-12-01

    Development, Test, and Evaluation RFID Radio Frequency Identification SEP Supporting Execution Plan Strategy Strategy to Improve Asset...migration of active Radio Frequency Identification ( RFID )19 from a proprietary communication standard protocol to an international standard to...technologies enabling hands-off processing of materiel deploying through the Defense Transportation System. Materiel marked with RFID tags may be remotely

  4. Health and Civil War in Rural Burundi

    ERIC Educational Resources Information Center

    Bundervoet, Tom; Verwimp, Philip; Akresh, Richard

    2009-01-01

    We combine household survey data with event data on the timing and location of armed conflicts to examine the impact of Burundi's civil war on children's health status. The identification strategy exploits exogenous variation in the war's timing across provinces and the exposure of children's birth cohorts to the fighting. After controlling for…

  5. Simultaneous versus sequential optimal experiment design for the identification of multi-parameter microbial growth kinetics as a function of temperature.

    PubMed

    Van Derlinden, E; Bernaerts, K; Van Impe, J F

    2010-05-21

    Optimal experiment design for parameter estimation (OED/PE) has become a popular tool for efficient and accurate estimation of kinetic model parameters. When the kinetic model under study encloses multiple parameters, different optimization strategies can be constructed. The most straightforward approach is to estimate all parameters simultaneously from one optimal experiment (single OED/PE strategy). However, due to the complexity of the optimization problem or the stringent limitations on the system's dynamics, the experimental information can be limited and parameter estimation convergence problems can arise. As an alternative, we propose to reduce the optimization problem to a series of two-parameter estimation problems, i.e., an optimal experiment is designed for a combination of two parameters while presuming the other parameters known. Two different approaches can be followed: (i) all two-parameter optimal experiments are designed based on identical initial parameter estimates and parameters are estimated simultaneously from all resulting experimental data (global OED/PE strategy), and (ii) optimal experiments are calculated and implemented sequentially whereby the parameter values are updated intermediately (sequential OED/PE strategy). This work exploits OED/PE for the identification of the Cardinal Temperature Model with Inflection (CTMI) (Rosso et al., 1993). This kinetic model describes the effect of temperature on the microbial growth rate and encloses four parameters. The three OED/PE strategies are considered and the impact of the OED/PE design strategy on the accuracy of the CTMI parameter estimation is evaluated. Based on a simulation study, it is observed that the parameter values derived from the sequential approach deviate more from the true parameters than the single and global strategy estimates. The single and global OED/PE strategies are further compared based on experimental data obtained from design implementation in a bioreactor

  6. A Primer on Foraging and the Explore/Exploit Trade-Off for Psychiatry Research.

    PubMed

    Addicott, M A; Pearson, J M; Sweitzer, M M; Barack, D L; Platt, M L

    2017-09-01

    Foraging is a fundamental behavior, and many types of animals appear to have solved foraging problems using a shared set of mechanisms. Perhaps the most common foraging problem is the choice between exploiting a familiar option for a known reward and exploring unfamiliar options for unknown rewards-the so-called explore/exploit trade-off. This trade-off has been studied extensively in behavioral ecology and computational neuroscience, but is relatively new to the field of psychiatry. Explore/exploit paradigms can offer psychiatry research a new approach to studying motivation, outcome valuation, and effort-related processes, which are disrupted in many mental and emotional disorders. In addition, the explore/exploit trade-off encompasses elements of risk-taking and impulsivity-common behaviors in psychiatric disorders-and provides a novel framework for understanding these behaviors within an ecological context. Here we explain relevant concepts and some common paradigms used to measure explore/exploit decisions in the laboratory, review clinically relevant research on the neurobiology and neuroanatomy of explore/exploit decision making, and discuss how computational psychiatry can benefit from foraging theory.

  7. Commercial sexual exploitation and sex trafficking of adolescents.

    PubMed

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  8. Towards large-scale FAME-based bacterial species identification using machine learning techniques.

    PubMed

    Slabbinck, Bram; De Baets, Bernard; Dawyndt, Peter; De Vos, Paul

    2009-05-01

    In the last decade, bacterial taxonomy witnessed a huge expansion. The swift pace of bacterial species (re-)definitions has a serious impact on the accuracy and completeness of first-line identification methods. Consequently, back-end identification libraries need to be synchronized with the List of Prokaryotic names with Standing in Nomenclature. In this study, we focus on bacterial fatty acid methyl ester (FAME) profiling as a broadly used first-line identification method. From the BAME@LMG database, we have selected FAME profiles of individual strains belonging to the genera Bacillus, Paenibacillus and Pseudomonas. Only those profiles resulting from standard growth conditions have been retained. The corresponding data set covers 74, 44 and 95 validly published bacterial species, respectively, represented by 961, 378 and 1673 standard FAME profiles. Through the application of machine learning techniques in a supervised strategy, different computational models have been built for genus and species identification. Three techniques have been considered: artificial neural networks, random forests and support vector machines. Nearly perfect identification has been achieved at genus level. Notwithstanding the known limited discriminative power of FAME analysis for species identification, the computational models have resulted in good species identification results for the three genera. For Bacillus, Paenibacillus and Pseudomonas, random forests have resulted in sensitivity values, respectively, 0.847, 0.901 and 0.708. The random forests models outperform those of the other machine learning techniques. Moreover, our machine learning approach also outperformed the Sherlock MIS (MIDI Inc., Newark, DE, USA). These results show that machine learning proves very useful for FAME-based bacterial species identification. Besides good bacterial identification at species level, speed and ease of taxonomic synchronization are major advantages of this computational species

  9. Experimental strategies for the identification and characterization of adhesive proteins in animals: a review

    PubMed Central

    Hennebert, Elise; Maldonado, Barbara; Ladurner, Peter; Flammang, Patrick; Santos, Romana

    2015-01-01

    Adhesive secretions occur in both aquatic and terrestrial animals, in which they perform diverse functions. Biological adhesives can therefore be remarkably complex and involve a large range of components with different functions and interactions. However, being mainly protein based, biological adhesives can be characterized by classical molecular methods. This review compiles experimental strategies that were successfully used to identify, characterize and obtain the full-length sequence of adhesive proteins from nine biological models: echinoderms, barnacles, tubeworms, mussels, sticklebacks, slugs, velvet worms, spiders and ticks. A brief description and practical examples are given for a variety of tools used to study adhesive molecules at different levels from genes to secreted proteins. In most studies, proteins, extracted from secreted materials or from adhesive organs, are analysed for the presence of post-translational modifications and submitted to peptide sequencing. The peptide sequences are then used directly for a BLAST search in genomic or transcriptomic databases, or to design degenerate primers to perform RT-PCR, both allowing the recovery of the sequence of the cDNA coding for the investigated protein. These sequences can then be used for functional validation and recombinant production. In recent years, the dual proteomic and transcriptomic approach has emerged as the best way leading to the identification of novel adhesive proteins and retrieval of their complete sequences. PMID:25657842

  10. Financial Exploitation Is Associated With Structural and Functional Brain Differences in Healthy Older Adults

    PubMed Central

    Spreng, R. Nathan; Cassidy, Benjamin N; Darboh, Bri S; DuPre, Elizabeth; Lockrow, Amber W; Setton, Roni; Turner, Gary R

    2017-01-01

    Abstract Background Age-related brain changes leading to altered socioemotional functioning may increase vulnerability to financial exploitation. If confirmed, this would suggest a novel mechanism leading to heightened financial exploitation risk in older adults. Development of predictive neural markers could facilitate increased vigilance and prevention. In this preliminary study, we sought to identify structural and functional brain differences associated with financial exploitation in older adults. Methods Financially exploited older adults (n = 13, 7 female) and a matched cohort of older adults who had been exposed to, but avoided, a potentially exploitative situation (n = 13, 7 female) were evaluated. Using magnetic resonance imaging, we examined cortical thickness and resting state functional connectivity. Behavioral data were collected using standardized cognitive assessments, self-report measures of mood and social functioning. Results The exploited group showed cortical thinning in anterior insula and posterior superior temporal cortices, regions associated with processing affective and social information, respectively. Functional connectivity encompassing these regions, within default and salience networks, was reduced, while between network connectivity was increased. Self-reported anger and hostility was higher for the exploited group. Conclusions We observed financial exploitation associated with brain differences in regions involved in socioemotional functioning. These exploratory and preliminary findings suggest that alterations in brain regions implicated in socioemotional functioning may be a marker of financial exploitation risk. Large-scale, prospective studies are necessary to validate this neural mechanism, and develop predictive markers for use in clinical practice. PMID:28369260

  11. GMOtrack: generator of cost-effective GMO testing strategies.

    PubMed

    Novak, Petra Krau; Gruden, Kristina; Morisset, Dany; Lavrac, Nada; Stebih, Dejan; Rotter, Ana; Zel, Jana

    2009-01-01

    Commercialization of numerous genetically modified organisms (GMOs) has already been approved worldwide, and several additional GMOs are in the approval process. Many countries have adopted legislation to deal with GMO-related issues such as food safety, environmental concerns, and consumers' right of choice, making GMO traceability a necessity. The growing extent of GMO testing makes it important to study optimal GMO detection and identification strategies. This paper formally defines the problem of routine laboratory-level GMO tracking as a cost optimization problem, thus proposing a shift from "the same strategy for all samples" to "sample-centered GMO testing strategies." An algorithm (GMOtrack) for finding optimal two-phase (screening-identification) testing strategies is proposed. The advantages of cost optimization with increasing GMO presence on the market are demonstrated, showing that optimization approaches to analytic GMO traceability can result in major cost reductions. The optimal testing strategies are laboratory-dependent, as the costs depend on prior probabilities of local GMO presence, which are exemplified on food and feed samples. The proposed GMOtrack approach, publicly available under the terms of the General Public License, can be extended to other domains where complex testing is involved, such as safety and quality assurance in the food supply chain.

  12. Operational Decision Aids for Exploiting or Mitigating Electromagnetic Propagation Effects

    DTIC Science & Technology

    1989-09-01

    Exploitation or mitigation of environmental effects rank equal in importance with weapons systems. The rapidly changing propagation environment ...global in nature . It not only involves the ocean environment from the tropics to the poles, but also the coastal and land environments . Some of the...tactics must take environ - mental conditions into account and either mitigate or exploit their effects. There are many environmental factors that influence

  13. Impact Evaluation of Reactive Assessment Strategies to Address Social Loafing by Promoting Student Cooperation and Encouraging Mutual Support

    ERIC Educational Resources Information Center

    Arevalillo-Herráez, Miguel

    2014-01-01

    Cooperative work is an effective strategy when team members are kept motivated and collaborate towards the achievement of a common goal. However, social loafing may significantly reduce educational gains. In this article, we analyse whether assessment-based reactive strategies that exploit existing emotional relationships between the team members…

  14. Identification of (antioxidative) plants in herbal pharmaceutical preparations and dietary supplements.

    PubMed

    Deconinck, Eric; Custers, Deborah; De Beer, Jacques Omer

    2015-01-01

    The standard procedures for the identification, authentication, and quality control of medicinal plants and herbs are nowadays limited to pure herbal products. No guidelines or procedures, describing the detection or identification of a targeted plant or herb in pharmaceutical preparations or dietary supplements, can be found. In these products the targeted plant is often present together with other components of herbal or synthetic origin. This chapter describes a strategy for the fast development of a chromatographic fingerprint approach that allows the identification of a targeted plant in herbal preparations and dietary supplements. The strategy consists of a standard chromatographic gradient that is tested for the targeted plant with different extraction solvents and different mobile phases. From the results obtained, the optimal fingerprint is selected. Subsequently the samples are analyzed according to the selected methodological parameters, and the obtained fingerprints can be compared with the one obtained for the pure herbal product or a standard preparation. Calculation of the dissimilarity between these fingerprints will result in a probability of presence of the targeted plant. Optionally mass spectrometry can be used to improve specificity, to confirm identification, or to identify molecules with a potential medicinal or antioxidant activity.

  15. Route Sanitizer: Connected Vehicle Trajectory De-Identification Tool

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, Jason M; Ferber, Aaron E

    Route Sanitizer is ORNL's connected vehicle moving object database de-identification tool and a graphical user interface to ORNL's connected vehicle de-identification algorithm. It uses the Google Chrome (soon to be Electron) platform so it will run on different computing platforms. The basic de-identification strategy is record redaction: portions of a vehicle trajectory (e.g. sequences of precise temporal spatial records) are removed. It does not alter retained records. The algorithm uses custom techniques to find areas within trajectories that may be considered private, then it suppresses those in addition to enough of the trajectory surrounding those locations to protect against "inferencemore » attacks" in a mathematically sound way. Map data is integrated into the process to make this possible.« less

  16. Financial Exploitation Is Associated With Structural and Functional Brain Differences in Healthy Older Adults.

    PubMed

    Spreng, R Nathan; Cassidy, Benjamin N; Darboh, Bri S; DuPre, Elizabeth; Lockrow, Amber W; Setton, Roni; Turner, Gary R

    2017-10-01

    Age-related brain changes leading to altered socioemotional functioning may increase vulnerability to financial exploitation. If confirmed, this would suggest a novel mechanism leading to heightened financial exploitation risk in older adults. Development of predictive neural markers could facilitate increased vigilance and prevention. In this preliminary study, we sought to identify structural and functional brain differences associated with financial exploitation in older adults. Financially exploited older adults (n = 13, 7 female) and a matched cohort of older adults who had been exposed to, but avoided, a potentially exploitative situation (n = 13, 7 female) were evaluated. Using magnetic resonance imaging, we examined cortical thickness and resting state functional connectivity. Behavioral data were collected using standardized cognitive assessments, self-report measures of mood and social functioning. The exploited group showed cortical thinning in anterior insula and posterior superior temporal cortices, regions associated with processing affective and social information, respectively. Functional connectivity encompassing these regions, within default and salience networks, was reduced, while between network connectivity was increased. Self-reported anger and hostility was higher for the exploited group. We observed financial exploitation associated with brain differences in regions involved in socioemotional functioning. These exploratory and preliminary findings suggest that alterations in brain regions implicated in socioemotional functioning may be a marker of financial exploitation risk. Large-scale, prospective studies are necessary to validate this neural mechanism, and develop predictive markers for use in clinical practice. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America.

  17. Sentinel-1 mission scientific exploitation activities

    NASA Astrophysics Data System (ADS)

    Desnos, Yves louis; Foumelis, Michael; Engdahl, Marcus

    2017-04-01

    The Sentinel-1 mission is the European Imaging Radar Observatory for the Copernicus joint initiative of the European Commission (EC) and the European Space Agency (ESA). Sentinel-1 mission is composed of a constellation of two satellites, Sentinel-1A and Sentinel-1B (launched in April 2014 and April 2016, respectively), sharing the same orbital plane and featuring a short repeat cycle of 6 days optimised for Synthetic Aperture Radar (SAR) interferometry science and applications. The full operation capacity was achieved after the completion of the Sentinel-1B in-orbit commissioning on 14 September 2016. Sentinel-1 data are freely available via the ESA's Sentinels Scientific Data Hub since October 2014. The data uptake by the science community has been unprecedented and numerous results have been published to date. The objective of the current paper is to provide a brief overview of the latest ESA activities, in the frame of the Scientific Exploitation of Operational Missions (SEOM) programme, aimed to facilitate the scientific exploitation of Sentinel-1 mission as well as discuss future opportunities for research.

  18. Experimental Evidence on the Effect of Grading Incentives on Student Learning in Spain

    ERIC Educational Resources Information Center

    Artes, Joaquin; Rahona, Marta

    2013-01-01

    In this article, the authors aim to identify the causal effect of the use of graded problem sets on academic performance of Spanish students. The identification strategy relies on an experiment in which the authors exploit variation arising from observing the performance of nearly 300 students taking the same class during the same semester and…

  19. Mediation, identification, and plausibility: an illustration using children's mental health services.

    PubMed

    Foster, E Michael

    2014-10-01

    Analyses of mediation are important for understanding the effects of mental health services and treatments. The most common approach is to add potential mediators as regressors and to estimate the direct and indirect effects of the treatment of interest. This practice makes the strong assumption that the mediator itself does not suffer from unobserved confounding--that it is as if randomly assigned. In many instances, this assumption seems rather implausible. The objective of this article is to describe the identification problem that represents the fundamental challenge of causal inference. It outlines how mediation complicates identification and considers several identification strategies. The goal of this article is not to propose a new method for handling mediation or to identify a best method for doing so. The latter, in fact, is impossible. The contribution of the article is to illustrate how one can think about possible approaches to mediation in the context of a specific empirical study. Using data from a large evaluation of a demonstration project in children's mental health services (n = 763), the article illustrates identification strategies. That demonstration improved service delivery in several ways but primarily by offering services "intermediate" between inpatient and outpatient. These analyses focus on the impact of these intermediate services on 6-month improvement in a behavior checklist commonly used to measure psychopathology and competence among children and youths. The results highlight how different identification strategies produce different answers to key questions. These alternative findings have to be assessed in light of substantive knowledge of the program involved. The analyses generally support the notion that children and youths treated at the demonstration site who received intermediate services benefited from them. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  20. Nuclear DNA markers for identification of Beluga and Sterlet sturgeons and their interspecific Bester hybrid.

    PubMed

    Havelka, Miloš; Fujimoto, Takafumi; Hagihara, Seishi; Adachi, Shinji; Arai, Katsutoshi

    2017-05-10

    Sturgeons (Acipenseriformes) are among the most endangered species in the world due to fragmentation and destruction of their natural habitats and to overexploitation, mainly for highly priced caviar. This has led to the development of sturgeon culture, originally for reintroduction, but more recently for caviar production. In both cases, accurate species identification is essential. We report a new tool for accurate identification of Huso huso and Acipenser ruthenus based on nuclear DNA markers. We employed ddRAD sequencing to identify species-specific nucleotide variants, which served as specific binding sites for diagnostic primers. The primers allowed identification of Huso huso and Acipenser ruthenus as well as their discrimination from A. baerii, A. schrenckii, A. gueldenstaedtii, A. stellatus, A. persicus, A. mikadoi, A. transmontanus, and H. dauricus and identification of A. ruthenus and H. huso hybrids with these species, except hybrid between A. ruthenus and A. stellatus. The species-specific primers also allowed identification of bester (H. huso × A. ruthenus), the most commercially exploited sturgeon hybrid. The tool, based on simple PCR and gel electrophoresis, is rapid, inexpensive, and reproducible. It will contribute to conservation of remaining wild populations of A. ruthenus and H. huso, as well as to traceability of their products.

  1. Identification of potent orally active factor Xa inhibitors based on conjugation strategy and application of predictable fragment recommender system.

    PubMed

    Ishihara, Tsukasa; Koga, Yuji; Iwatsuki, Yoshiyuki; Hirayama, Fukushi

    2015-01-15

    Anticoagulant agents have emerged as a promising class of therapeutic drugs for the treatment and prevention of arterial and venous thrombosis. We investigated a series of novel orally active factor Xa inhibitors designed using our previously reported conjugation strategy to boost oral anticoagulant effect. Structural optimization of anthranilamide derivative 3 as a lead compound with installation of phenolic hydroxyl group and extensive exploration of the P1 binding element led to the identification of 5-chloro-N-(5-chloro-2-pyridyl)-3-hydroxy-2-{[4-(4-methyl-1,4-diazepan-1-yl)benzoyl]amino}benzamide (33, AS1468240) as a potent factor Xa inhibitor with significant oral anticoagulant activity. We also reported a newly developed Free-Wilson-like fragment recommender system based on the integration of R-group decomposition with collaborative filtering for the structural optimization process. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Elder Fraud and Financial Exploitation: Application of Routine Activity Theory.

    PubMed

    DeLiema, Marguerite

    2017-03-10

    Elder financial exploitation, committed by individuals in positions of trust, and elder fraud, committed by predatory strangers, are two forms of financial victimization that target vulnerable older adults. This study analyzes differences between fraud and financial exploitation victims and tests routine activity theory as a contextual model for victimization. Routine activity theory predicts that criminal opportunities arise when a motivated offender and suitable target meet in the absence of capable guardians. Fifty-three financial exploitation and fraud cases were sampled from an elder abuse forensic center. Data include law enforcement and caseworker investigation reports, victim medical records, perpetrator demographic information, and forensic assessments of victim health and cognitive functioning. Fraud and financial exploitation victims performed poorly on tests of cognitive functioning and financial decision making administered by a forensic neuropsychologist following the allegations. Based on retrospective record review, there were few significant differences in physical health and cognitive functioning at the time victims' assets were taken, although their social contexts were different. Significantly more fraud victims were childless compared with financial exploitation victims. Fraud perpetrators took advantage of elders when they had no trustworthy friends or relatives to safeguard their assets. Findings support an adapted routine activity theory as a contextual model for financial victimization. Fraud most often occurred when a vulnerable elder was solicited by a financial predator in the absence of capable guardians. Prevention efforts should focus on reducing social isolation to enhance protection. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  3. Multi-level damage identification with response reconstruction

    NASA Astrophysics Data System (ADS)

    Zhang, Chao-Dong; Xu, You-Lin

    2017-10-01

    Damage identification through finite element (FE) model updating usually forms an inverse problem. Solving the inverse identification problem for complex civil structures is very challenging since the dimension of potential damage parameters in a complex civil structure is often very large. Aside from enormous computation efforts needed in iterative updating, the ill-condition and non-global identifiability features of the inverse problem probably hinder the realization of model updating based damage identification for large civil structures. Following a divide-and-conquer strategy, a multi-level damage identification method is proposed in this paper. The entire structure is decomposed into several manageable substructures and each substructure is further condensed as a macro element using the component mode synthesis (CMS) technique. The damage identification is performed at two levels: the first is at macro element level to locate the potentially damaged region and the second is over the suspicious substructures to further locate as well as quantify the damage severity. In each level's identification, the damage searching space over which model updating is performed is notably narrowed down, not only reducing the computation amount but also increasing the damage identifiability. Besides, the Kalman filter-based response reconstruction is performed at the second level to reconstruct the response of the suspicious substructure for exact damage quantification. Numerical studies and laboratory tests are both conducted on a simply supported overhanging steel beam for conceptual verification. The results demonstrate that the proposed multi-level damage identification via response reconstruction does improve the identification accuracy of damage localization and quantization considerably.

  4. Local Learning Strategies for Wake Identification

    NASA Astrophysics Data System (ADS)

    Colvert, Brendan; Alsalman, Mohamad; Kanso, Eva

    2017-11-01

    Swimming agents, biological and engineered alike, must navigate the underwater environment to survive. Tasks such as autonomous navigation, foraging, mating, and predation require the ability to extract critical cues from the hydrodynamic environment. A substantial body of evidence supports the hypothesis that biological systems leverage local sensing modalities, including flow sensing, to gain knowledge of their global surroundings. The nonlinear nature and high degree of complexity of fluid dynamics makes the development of algorithms for implementing localized sensing in bioinspired engineering systems essentially intractable for many systems of practical interest. In this work, we use techniques from machine learning for training a bioinspired swimmer to learn from its environment. We demonstrate the efficacy of this strategy by learning how to sense global characteristics of the wakes of other swimmers measured only from local sensory information. We conclude by commenting on the advantages and limitations of this data-driven, machine learning approach and its potential impact on broader applications in underwater sensing and navigation.

  5. Calmodulin Polymerase Chain Reaction–Restriction Fragment Length Polymorphism for Leishmania Identification and Typing

    PubMed Central

    Miranda, Aracelis; Samudio, Franklyn; González, Kadir; Saldaña, Azael; Brandão, Adeilton; Calzada, Jose E.

    2016-01-01

    A precise identification of Leishmania species involved in human infections has epidemiological and clinical importance. Herein, we describe a preliminary validation of a restriction fragment length polymorphism assay, based on the calmodulin intergenic spacer region, as a tool for detecting and typing Leishmania species. After calmodulin amplification, the enzyme HaeIII yielded a clear distinction between reference strains of Leishmania mexicana, Leishmania amazonensis, Leishmania infantum, Leishmania lainsoni, and the rest of the Viannia reference species analyzed. The closely related Viannia species: Leishmania braziliensis, Leishmania panamensis, and Leishmania guyanensis, are separated in a subsequent digestion step with different restriction enzymes. We have developed a more accessible molecular protocol for Leishmania identification/typing based on the exploitation of part of the calmodulin gene. This methodology has the potential to become an additional tool for Leishmania species characterization and taxonomy. PMID:27352873

  6. Ultrasonic imaging of material flaws exploiting multipath information

    NASA Astrophysics Data System (ADS)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  7. A Strategy for Teaching Students Interpersonal Skills

    ERIC Educational Resources Information Center

    Sanchez-Craig, Martha

    1977-01-01

    Using the Lazarus model, the author presents a reappraisal strategy to help students cope with inadequate, stressful social interactions. Identification of the unsatisfactory situation, generation of alternative interpretations and behaviors, cognitive rehearsal, and new response implementation are described. (Author/HLM)

  8. Early identification and interventions for students with mathematics difficulties.

    PubMed

    Gersten, Russell; Jordan, Nancy C; Flojo, Jonathan R

    2005-01-01

    This article highlights key findings from the small body of research on mathematics difficulties (MD) relevant to early identification and early intervention. The research demonstrates that (a) for many children, mathematics difficulties are not stable over time; (b) the presence of reading difficulties seems related to slower progress in many aspects of mathematics; (c) almost all students with MD demonstrate problems with accurate and automatic retrieval of basic arithmetic combinations, such as 6 + 3. The following measures appear to be valid and reliable indicators of potential MD in kindergartners: (a) magnitude comparison (i.e., knowing which digit in a pair is larger), (b) sophistication of counting strategies, (c) fluent identification of numbers, and (d) working memory (as evidenced by reverse digit span). These are discussed in terms of the components of number sense. Implications for early intervention strategies are explored.

  9. Identification of retention strategies for neurosurgeons in Iran: Results from expert panels.

    PubMed

    Rafiei, Sima; Abdollahzadeh, Sina; Hashemi, Fariba; Ranjbar, Mohammad

    2017-04-04

    Background: The key challenge is how to encourage and retain health professionals in their work location. There is a list of policy options for this purpose but applying an appropriate and effective set of strategies requires a country level research. Our study aimed to identify retention strategies for neurosurgeons and examine both the importance and feasibility of the identified strategies using expert panels' point of view. Methods: First of all, a literature review was conducted to identify retention strategies for physicians. Then to gain consensus on the strategies and determine their importance and feasibility an expert panel was organized and a modified Delphi process was used. Results: A total of 40 strategies were identified by the panel classified in seven categories of income and economic factors, professional/job factors, clinical infrastructure, personal/family factors, living condition and welfare, educational factors and career development, governmental regulations and management policies. Conclusion: Based on the study results, three areas of economic incentives, personal and professional factors got the greatest priority in health professional planning for retention purposes.

  10. Sensor-Only System Identification for Structural Health Monitoring of Advanced Aircraft

    NASA Technical Reports Server (NTRS)

    Kukreja, Sunil L.; Bernstein, Dennis S.

    2012-01-01

    Environmental conditions, cyclic loading, and aging contribute to structural wear and degradation, and thus potentially catastrophic events. The challenge of health monitoring technology is to determine incipient changes accurately and efficiently. This project addresses this challenge by developing health monitoring techniques that depend only on sensor measurements. Since actively controlled excitation is not needed, sensor-to-sensor identification (S2SID) provides an in-flight diagnostic tool that exploits ambient excitation to provide advance warning of significant changes. S2SID can subsequently be followed up by ground testing to localize and quantify structural changes. The conceptual foundation of S2SID is the notion of a pseudo-transfer function, where one sensor is viewed as the pseudo-input and another is viewed as the pseudo-output, is approach is less restrictive than transmissibility identification and operational modal analysis since no assumption is made about the locations of the sensors relative to the excitation.

  11. Algorithms exploiting ultrasonic sensors for subject classification

    NASA Astrophysics Data System (ADS)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  12. Inertial parameter identification using contact force information for an unknown object captured by a space manipulator

    NASA Astrophysics Data System (ADS)

    Chu, Zhongyi; Ma, Ye; Hou, Yueyang; Wang, Fengwen

    2017-02-01

    This paper presents a novel identification method for the intact inertial parameters of an unknown object in space captured by a manipulator in a space robotic system. With strong dynamic and kinematic coupling existing in the robotic system, the inertial parameter identification of the unknown object is essential for the ideal control strategy based on changes in the attitude and trajectory of the space robot via capturing operations. Conventional studies merely refer to the principle and theory of identification, and an error analysis process of identification is deficient for a practical scenario. To solve this issue, an analysis of the effect of errors on identification is illustrated first, and the accumulation of measurement or estimation errors causing poor identification precision is demonstrated. Meanwhile, a modified identification equation incorporating the contact force, as well as the force/torque of the end-effector, is proposed to weaken the accumulation of errors and improve the identification accuracy. Furthermore, considering a severe disturbance condition caused by various measured noises, the hybrid immune algorithm, Recursive Least Squares and Affine Projection Sign Algorithm (RLS-APSA), is employed to decode the modified identification equation to ensure a stable identification property. Finally, to verify the validity of the proposed identification method, the co-simulation of ADAMS-MATLAB is implemented by multi-degree of freedom models of a space robotic system, and the numerical results show a precise and stable identification performance, which is able to guarantee the execution of aerospace operations and prevent failed control strategies.

  13. FVID: Fishing Vessel Type Identification Based on VMS Trajectories

    NASA Astrophysics Data System (ADS)

    Huang, Haiguang; Hong, Feng; Liu, Jing; Liu, Chao; Feng, Yuan; Guo, Zhongwen

    2018-05-01

    Vessel Monitoring System (VMS) provides a new opportunity for quantified fishing research. Many approaches have been proposed to recognize fishing activities with VMS trajectories based on the types of fishing vessels. However, one research problem is still calling for solutions, how to identify the fishing vessel type based on only VMS trajectories. This problem is important because it requires the fishing vessel type as a preliminary to recognize fishing activities from VMS trajectories. This paper proposes fishing vessel type identification scheme (FVID) based only on VMS trajectories. FVID exploits feature engineering and machine learning schemes of XGBoost as its two key blocks and classifies fishing vessels into nine types. The dataset contains all the fishing vessel trajectories in the East China Sea in March 2017, including 10031 pre-registered fishing vessels and 1350 unregistered vessels of unknown types. In order to verify type identification accuracy, we first conduct a 4-fold cross-validation on the trajectories of registered fishing vessels. The classification accuracy is 95.42%. We then apply FVID to the unregistered fishing vessels to identify their types. After classifying the unregistered fishing vessel types, their fishing activities are further recognized based upon their types. At last, we calculate and compare the fishing density distribution in the East China Sea before and after applying the unregistered fishing vessels, confirming the importance of type identification of unregistered fishing vessels.

  14. Oligonucleotide microarray for the identification of potential mycotoxigenic fungi

    PubMed Central

    2010-01-01

    Background Mycotoxins are secondary metabolites which are produced by numerous fungi and pose a continuous challenge to the safety and quality of food commodities in South Africa. These toxins have toxicologically relevant effects on humans and animals that eat contaminated foods. In this study, a diagnostic DNA microarray was developed for the identification of the most common food-borne fungi, as well as the genes leading to toxin production. Results A total of 40 potentially mycotoxigenic fungi isolated from different food commodities, as well as the genes that are involved in the mycotoxin synthetic pathways, were analyzed. For fungal identification, oligonucleotide probes were designed by exploiting the sequence variations of the elongation factor 1-alpha (EF-1 α) coding regions and the internal transcribed spacer (ITS) regions of the rRNA gene cassette. For the detection of fungi able to produce mycotoxins, oligonucleotide probes directed towards genes leading to toxin production from different fungal strains were identified in data available in the public domain. The probes selected for fungal identification and the probes specific for toxin producing genes were spotted onto microarray slides. Conclusions The diagnostic microarray developed can be used to identify single pure strains or cultures of potentially mycotoxigenic fungi as well as genes leading to toxin production in both laboratory samples and maize-derived foods offering an interesting potential for microbiological laboratories. PMID:20307326

  15. Sub-word based Arabic handwriting analysis for writer identification

    NASA Astrophysics Data System (ADS)

    Maliki, Makki; Al-Jawad, Naseer; Jassim, Sabah

    2013-05-01

    Analysing a text or part of it is key to handwriting identification. Generally, handwriting is learnt over time and people develop habits in the style of writing. These habits are embedded in special parts of handwritten text. In Arabic each word consists of one or more sub-word(s). The end of each sub-word is considered to be a connect stroke. The main hypothesis in this paper is that sub-words are essential reflection of Arabic writer's habits that could be exploited for writer identification. Testing this hypothesis will be based on experiments that evaluate writer's identification, mainly using K nearest neighbor from group of sub-words extracted from longer text. The experimental results show that using a group of sub-words could be used to identify the writer with a successful rate between 52.94 % to 82.35% when top1 is used, and it can go up to 100% when top5 is used based on K nearest neighbor. The results show that majority of writers are identified using 7 sub-words with a reliability confident of about 90% (i.e. 90% of the rejected templates have significantly larger distances to the tested example than the distance from the correctly identified template). However previous work, using a complete word, shows successful rate of at most 90% in top 10.

  16. Understanding and responding to anti-choice women-centred strategies.

    PubMed

    Cannold, Leslie

    2002-05-01

    This paper discusses the rise and use of a "woman-centred" anti-choice strategy to oppose abortion in Australia and the USA. It argues that this strategy seeks to imitate and exploit aspects of the pro-choice, women-centred position on abortion. The strategy contends that women do not really choose abortion but are pressured into it by others and then experience a range of negative effects afterwards, including an increased risk of breast cancer, infertility and post-abortion grief. Rather than evaluate the truth of such claims, this paper seeks to explicate from a feminist perspective the design, intent and implications of this strategy and how it is being used in legislative tactics, counselling, law suits and anti-choice activism. Such an analysis is necessary for pro-choice efforts to respond effectively to this new strategy, not only through literal rebuttals based on evidence, but also through responses that counter its ideological power.

  17. Exploiting Quorum Sensing To Confuse Bacterial Pathogens

    PubMed Central

    LaSarre, Breah

    2013-01-01

    SUMMARY Cell-cell communication, or quorum sensing, is a widespread phenomenon in bacteria that is used to coordinate gene expression among local populations. Its use by bacterial pathogens to regulate genes that promote invasion, defense, and spread has been particularly well documented. With the ongoing emergence of antibiotic-resistant pathogens, there is a current need for development of alternative therapeutic strategies. An antivirulence approach by which quorum sensing is impeded has caught on as a viable means to manipulate bacterial processes, especially pathogenic traits that are harmful to human and animal health and agricultural productivity. The identification and development of chemical compounds and enzymes that facilitate quorum-sensing inhibition (QSI) by targeting signaling molecules, signal biogenesis, or signal detection are reviewed here. Overall, the evidence suggests that QSI therapy may be efficacious against some, but not necessarily all, bacterial pathogens, and several failures and ongoing concerns that may steer future studies in productive directions are discussed. Nevertheless, various QSI successes have rightfully perpetuated excitement surrounding new potential therapies, and this review highlights promising QSI leads in disrupting pathogenesis in both plants and animals. PMID:23471618

  18. Revealing the physical insight of a length-scale parameter in metamaterials by exploiting the variational formulation

    NASA Astrophysics Data System (ADS)

    Abali, B. Emek

    2018-04-01

    For micro-architectured materials with a substructure, called metamaterials, we can realize a direct numerical simulation in the microscale by using classical mechanics. This method is accurate, however, computationally costly. Instead, a solution of the same problem in the macroscale is possible by means of the generalized mechanics. In this case, no detailed modeling of the substructure is necessary; however, new parameters emerge. A physical interpretation of these metamaterial parameters is challenging leading to a lack of experimental strategies for their determination. In this work, we exploit the variational formulation based on action principles and obtain a direct relation between a parameter used in the kinetic energy and a metamaterial parameter in the case of a viscoelastic model.

  19. Hitch-hiking parasitic wasp learns to exploit butterfly antiaphrodisiac

    PubMed Central

    Huigens, Martinus E.; Pashalidou, Foteini G.; Qian, Ming-Hui; Bukovinszky, Tibor; Smid, Hans M.; van Loon, Joop J. A.; Dicke, Marcel; Fatouros, Nina E.

    2009-01-01

    Many insects possess a sexual communication system that is vulnerable to chemical espionage by parasitic wasps. We recently discovered that a hitch-hiking (H) egg parasitoid exploits the antiaphrodisiac pheromone benzyl cyanide (BC) of the Large Cabbage White butterfly Pieris brassicae. This pheromone is passed from male butterflies to females during mating to render them less attractive to conspecific males. When the tiny parasitic wasp Trichogramma brassicae detects the antiaphrodisiac, it rides on a mated female butterfly to a host plant and then parasitizes her freshly laid eggs. The present study demonstrates that a closely related generalist wasp, Trichogramma evanescens, exploits BC in a similar way, but only after learning. Interestingly, the wasp learns to associate an H response to the odors of a mated female P. brassicae butterfly with reinforcement by parasitizing freshly laid butterfly eggs. Behavioral assays, before which we specifically inhibited long-term memory (LTM) formation with a translation inhibitor, reveal that the wasp has formed protein synthesis-dependent LTM at 24 h after learning. To our knowledge, the combination of associatively learning to exploit the sexual communication system of a host and the formation of protein synthesis-dependent LTM after a single learning event has not been documented before. We expect it to be widespread in nature, because it is highly adaptive in many species of egg parasitoids. Our finding of the exploitation of an antiaphrodisiac by multiple species of parasitic wasps suggests its use by Pieris butterflies to be under strong selective pressure. PMID:19139416

  20. Hitch-hiking parasitic wasp learns to exploit butterfly antiaphrodisiac.

    PubMed

    Huigens, Martinus E; Pashalidou, Foteini G; Qian, Ming-Hui; Bukovinszky, Tibor; Smid, Hans M; van Loon, Joop J A; Dicke, Marcel; Fatouros, Nina E

    2009-01-20

    Many insects possess a sexual communication system that is vulnerable to chemical espionage by parasitic wasps. We recently discovered that a hitch-hiking (H) egg parasitoid exploits the antiaphrodisiac pheromone benzyl cyanide (BC) of the Large Cabbage White butterfly Pieris brassicae. This pheromone is passed from male butterflies to females during mating to render them less attractive to conspecific males. When the tiny parasitic wasp Trichogramma brassicae detects the antiaphrodisiac, it rides on a mated female butterfly to a host plant and then parasitizes her freshly laid eggs. The present study demonstrates that a closely related generalist wasp, Trichogramma evanescens, exploits BC in a similar way, but only after learning. Interestingly, the wasp learns to associate an H response to the odors of a mated female P. brassicae butterfly with reinforcement by parasitizing freshly laid butterfly eggs. Behavioral assays, before which we specifically inhibited long-term memory (LTM) formation with a translation inhibitor, reveal that the wasp has formed protein synthesis-dependent LTM at 24 h after learning. To our knowledge, the combination of associatively learning to exploit the sexual communication system of a host and the formation of protein synthesis-dependent LTM after a single learning event has not been documented before. We expect it to be widespread in nature, because it is highly adaptive in many species of egg parasitoids. Our finding of the exploitation of an antiaphrodisiac by multiple species of parasitic wasps suggests its use by Pieris butterflies to be under strong selective pressure.

  1. Combined CRISPRi/a-Based Chemical Genetic Screens Reveal that Rigosertib Is a Microtubule-Destabilizing Agent. | Office of Cancer Genomics

    Cancer.gov

    Chemical libraries paired with phenotypic screens can now readily identify compounds with therapeutic potential. A central limitation to exploiting these compounds, however, has been in identifying their relevant cellular targets. Here, we present a two-tiered CRISPR-mediated chemical-genetic strategy for target identification: combined genome-wide knockdown and overexpression screening as well as focused, comparative chemical-genetic profiling.

  2. Can Ethnic Diversity Have a Positive Effect on School Achievement?

    ERIC Educational Resources Information Center

    Maestri, Virginia

    2017-01-01

    This study investigates the impact of ethnic diversity on test scores, on top of the effect of the share of non-native pupils. We use a rich survey of Dutch primary school students and exploit variations between subsequent cohorts within the same school as our identification strategy. We find that ethnic diversity has a positive impact on the test…

  3. Identification of Arabidopsis mutants with altered freezing tolerance.

    PubMed

    Perea-Resa, Carlos; Salinas, Julio

    2014-01-01

    Low temperature is an important determinant in the configuration of natural plant communities and defines the range of distribution and growth of important crops. Some plants, including Arabidopsis, have evolved sophisticated adaptive mechanisms to tolerate low and freezing temperatures. Central to this adaptation is the process of cold acclimation. By means of this process, many plants from temperate regions are able to develop or increase their freezing tolerance in response to low, nonfreezing temperatures. The identification and characterization of factors involved in freezing tolerance are crucial to understand the molecular mechanisms underlying the cold acclimation response and have a potential interest to improve crop tolerance to freezing temperatures. Many genes implicated in cold acclimation have been identified in numerous plant species by using molecular approaches followed by reverse genetic analysis. Remarkably, however, direct genetic analyses have not been conveniently exploited in their capacity for identifying genes with pivotal roles in that adaptive response. In this chapter, we describe a protocol for evaluating the freezing tolerance of both non-acclimated and cold-acclimated Arabidopsis plants. This protocol allows the accurate and simple screening of mutant collections for the identification of novel factors involved in freezing tolerance and cold acclimation.

  4. Normative Beliefs about Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying

    ERIC Educational Resources Information Center

    Ang, Rebecca P.; Tan, Kit-Aun; Mansor, Abu Talib

    2011-01-01

    The current study examined normative beliefs about aggression as a mediator between narcissistic exploitativeness and cyberbullying using two Asian adolescent samples from Singapore and Malaysia. Narcissistic exploitativeness was significantly and positively associated with cyberbullying and normative beliefs about aggression and normative beliefs…

  5. The Exploitation of the Electric Contributions in Infrared Power Generation

    DTIC Science & Technology

    2016-02-02

    Technical Report for year one 3. DATES COVERED (From - To) 3/10/2015-2/2/16 4. TITLE AND SUBTITLE The exploitation of the electric contributions in...establishes a method to harvest infrared radiation and transform it into usable energy. We have identified an electrical contribution to the energy...area code) (540) 568-8857 ^olko^ögüöo Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18 The exploitation of the electric contributions

  6. The need for non- or minimally-invasive biomonitoring strategies and the development of pharmacokinetic/pharmacodynamic models for quantification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timchalk, Charles; Weber, Thomas J.; Smith, Jordan N.

    Advancements in Exposure Science involving the development and deployment of biomarkers of exposure and biological response are anticipated to significantly (and positively) influence health outcomes associated with occupational, environmental and clinical exposure to chemicals/drugs. To achieve this vision, innovative strategies are needed to develop multiplex sensor platforms capable of quantifying individual and mixed exposures (i.e. systemic dose) by measuring biomarkers of dose and biological response in readily obtainable (non-invasive) biofluids. Secondly, the use of saliva (alternative to blood) for biomonitoring coupled with the ability to rapidly analyze multiple samples in real-time offers an innovative opportunity to revolutionize biomonitoring assessments. Inmore » this regard, the timing and number of samples taken for biomonitoring will not be limited as is currently the case. In addition, real-time analysis will facilitate identification of work practices or conditions that are contributing to increased exposures and will make possible a more rapid and successful intervention strategy. The initial development and application of computational models for evaluation of saliva/blood analyte concentration at anticipated exposure levels represents an important opportunity to establish the limits of quantification and robustness of multiplex sensor systems by exploiting a unique computational modeling framework. The use of these pharmacokinetic models will also enable prediction of an exposure dose based on the saliva/blood measurement. This novel strategy will result in a more accurate prediction of exposures and, once validated, can be employed to assess dosimetry to a broad range of chemicals in support of biomonitoring and epidemiology studies.« less

  7. Use of Direct LAMP Screening of Broiler Fecal Samples for Campylobacter jejuni and Campylobacter coli in the Positive Flock Identification Strategy.

    PubMed

    Sabike, Islam I; Uemura, Ryoko; Kirino, Yumi; Mekata, Hirohisa; Sekiguchi, Satoshi; Okabayashi, Tamaki; Goto, Yoshitaka; Yamazaki, Wataru

    2016-01-01

    Rapid identification of Campylobacter -positive flocks before slaughter, following freezing and heat treatment for the Campylobacter -positive carcasses at the slaughterhouses is an effective control strategy against foodborne campylobacteriosis. We evaluated a loop-mediated isothermal amplification (LAMP) assay for the direct screening of naturally contaminated chicken cloacal swabs for C. jejuni / C. coli to compare this assay with conventional quantitative culture methods. In a comparison study of 165 broilers, the LAMP assay showed 82.8% (48/58 by conventional culture) sensitivity, 100% (107/107) specificity, 100% (48/48) positive predictive value (PPV), and 91.5% (107/117) negative predictive value (NPV). In a comparison of 55 flocks, LAMP showed 90.5% (19/21) sensitivity, 100% (34/34) specificity, 100% (19/19) PPV, and 94.4% (34/36) NPV. In the cumulative total of 28 farm-level comparisons, LAMP showed 100% (12/12) sensitivity, 100% (16/16) specificity, 100% (12/12) PPV, and 100% (16/16) NPV. The LAMP assay required less than 90 min from the arrival of the fecal samples to final results in the laboratory. This suggests that the LAMP assay will facilitate the identification of C. jejuni / C. coli -positive broiler flocks at the farm level or in slaughterhouses before slaughtering, which would make it an effective tool in preventing the spread of Campylobacter contamination.

  8. Training Strategies to Mitigate Expectancy-Induced Response Bias in Combat Identification: A Research Agenda

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Andrews, Dee H.

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, continuous operations or sleep deprivation, poor situational awareness, emotions, and lack of training. This paper discusses what and how improvements in combat identification (CID) may be achieved through training. In addition to skill-based training, CID training must focus on countering the negative effects of expectancy in the face of heightened anxiety and stressors of continuous operations that lead to combat errors or fratricide. The paper examines possible approaches to training for overcoming erroneous expectancies and emotional factors that may distort or limit accurate "blue force" identification.

  9. Training Strategies to Mitigate Expectancy-Induced Response Bias in Combat Identification: A Research Agenda

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Andrews, Dee H.

    2008-04-15

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, continuous operations or sleep deprivation, poor situational awareness, emotions, and lack of training. This paper discusses what and how improvements in combat identification (CID) may be achieved through training. In addition to skill-based training, CID training must focus on countering the negative effects of expectancy in the face of heightened anxiety and stressors of continuous operations that lead to combat errors or fratricide. The paper examines possible approaches to training for overcoming erroneous expectancies and emotional factors that may distort or limit accurate "blue force" identification.

  10. A novel strategy for the identification of antigens that are recognised by bovine MHC class I restricted cytotoxic T cells in a protozoan infection using reverse vaccinology.

    PubMed

    Graham, Simon P; Honda, Yoshikazu; Pellé, Roger; Mwangi, Duncan M; Glew, E Jane; de Villiers, Etienne P; Shah, Trushar; Bishop, Richard; van der Bruggen, Pierre; Nene, Vishvanath; Taracha, Evans L N

    2007-02-09

    Immunity against the bovine protozoan parasite Theileria parva has previously been shown to be mediated through lysis of parasite-infected cells by MHC class I restricted CD8+ cytotoxic T lymphocytes. It is hypothesized that identification of CTL target schizont antigens will aid the development of a sub-unit vaccine. We exploited the availability of the complete genome sequence data and bioinformatics tools to identify genes encoding secreted or membrane anchored proteins that may be processed and presented by the MHC class I molecules of infected cells to CTL. Of the 986 predicted open reading frames (ORFs) encoded by chromosome 1 of the T. parva genome, 55 were selected based on the presence of a signal peptide and/or a transmembrane helix domain. Thirty six selected ORFs were successfully cloned into a eukaryotic expression vector, transiently transfected into immortalized bovine skin fibroblasts and screened in vitro using T. parva-specific CTL. Recognition of gene products by CTL was assessed using an IFN-gamma ELISpot assay. A 525 base pair ORF encoding a 174 amino acid protein, designated Tp2, was identified by T. parva-specific CTL from 4 animals. These CTL recognized and lysed Tp2 transfected skin fibroblasts and recognized 4 distinct epitopes. Significantly, Tp2 specific CD8+ T cell responses were observed during the protective immune response against sporozoite challenge. The identification of an antigen containing multiple CTL epitopes and its apparent immunodominance during a protective anti-parasite response makes Tp2 an attractive candidate for evaluation of its vaccine potential.

  11. Advances in DNA metabarcoding for food and wildlife forensic species identification.

    PubMed

    Staats, Martijn; Arulandhu, Alfred J; Gravendeel, Barbara; Holst-Jensen, Arne; Scholtens, Ingrid; Peelen, Tamara; Prins, Theo W; Kok, Esther

    2016-07-01

    Species identification using DNA barcodes has been widely adopted by forensic scientists as an effective molecular tool for tracking adulterations in food and for analysing samples from alleged wildlife crime incidents. DNA barcoding is an approach that involves sequencing of short DNA sequences from standardized regions and comparison to a reference database as a molecular diagnostic tool in species identification. In recent years, remarkable progress has been made towards developing DNA metabarcoding strategies, which involves next-generation sequencing of DNA barcodes for the simultaneous detection of multiple species in complex samples. Metabarcoding strategies can be used in processed materials containing highly degraded DNA e.g. for the identification of endangered and hazardous species in traditional medicine. This review aims to provide insight into advances of plant and animal DNA barcoding and highlights current practices and recent developments for DNA metabarcoding of food and wildlife forensic samples from a practical point of view. Special emphasis is placed on new developments for identifying species listed in the Convention on International Trade of Endangered Species (CITES) appendices for which reliable methods for species identification may signal and/or prevent illegal trade. Current technological developments and challenges of DNA metabarcoding for forensic scientists will be assessed in the light of stakeholders' needs.

  12. The exploitation of "Exploitation" in the tenofovir prep trial in Cameroon: Lessons learned from media coverage of an HIV prevention trial.

    PubMed

    Mack, Natasha; Robinson, Elizabeth T; MacQueen, Kathleen M; Moffett, Jill; Johnson, Laura M

    2010-06-01

    media coverage influences how clinical trials are perceived internationally and in communities where trials occur, affecting recruitment, retention, and political support for research. We conducted a discourse analysis of news coverage from 2004-2005 of a trial in Cameroon on oral PrEP for HIV prevention, to identify messages, communication techniques, and sources of messages that were amplified via media. We identified two parallel discourses: one on ethical concerns about the Cameroon trial, and a second, more general "science exploitation" discourse concerned with the potential for trials with vulnerable participant populations to be conducted unethically, benefiting only wealthy populations. Researchers should overtly address exploitation as an integral, ongoing component of research, particularly where historical or cultural conditions set the stage for controversy to emerge.

  13. Learning Visualization Strategies: A qualitative investigation

    NASA Astrophysics Data System (ADS)

    Halpern, Daniel; Oh, Kyong Eun; Tremaine, Marilyn; Chiang, James; Bemis, Karen; Silver, Deborah

    2015-12-01

    The following study investigates the range of strategies individuals develop to infer and interpret cross-sections of three-dimensional objects. We focus on the identification of mental representations and problem-solving processes made by 11 individuals with the goal of building training applications that integrate the strategies developed by the participants in our study. Our results suggest that although spatial transformation and perspective-taking techniques are useful for visualizing cross-section problems, these visual processes are augmented by analytical thinking. Further, our study shows that participants employ general analytic strategies for extended periods which evolve through practice into a set of progressively more expert strategies. Theoretical implications are discussed and five main findings are recommended for integration into the design of education software that facilitates visual learning and comprehension.

  14. Exploiting Quantum Resonance to Solve Combinatorial Problems

    NASA Technical Reports Server (NTRS)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  15. The Potential Exploitation of the Mediterranean Invasive Alga Caulerpa cylindracea: Can the Invasion Be Transformed into a Gain?

    PubMed Central

    Stabili, Loredana; Fraschetti, Simonetta; Acquaviva, Maria Immacolata; Cavallo, Rosa Anna; De Pascali, Sandra Angelica; Fanizzi, Francesco Paolo; Gerardi, Carmela; Narracci, Marcella; Rizzo, Lucia

    2016-01-01

    Recently, there is a growing interest towards the development of strategies for invasive seaweed control and exploitation as source of secondary metabolites. Here, we investigated the potential of exploitation in biotechnology and recycling options in eradication programs of the lipidic extract of the Mediterranean invasive seaweed Caulerpa cylindracea (Chlorophyta). The chemical characterization was carried out by means of multinuclear and multidimensional NMR spectroscopy. The fatty acid profile of C. cylindracea assessed the presence of several types of molecules known for antioxidant activity such as carotenoids, chlorophylls, pheophytins, and sterols. The NMR spectroscopy showed also the characteristic signals of saturated, unsaturated, and free fatty acids as well as other metabolites including the biopolymer polyhydroxybutyrate. The lipidic extract exerted an antioxidant activity corresponding to 552.14 ± 69.13 mmol Trolox equivalent/g (ORAC) and to 70.3 ± 2.67 mmol Trolox equivalent/g (TEAC). The extract showed an antibacterial activity against several Vibrio species, suggesting its potential use in the control of diseases in mariculture. Our results show that C. cylindracea, representing a critical hazard in coastal areas, could be transformed into a gain supporting specific management actions to reduce the effects of human pressures. PMID:27854274

  16. Improving automatic peptide mass fingerprint protein identification by combining many peak sets.

    PubMed

    Rögnvaldsson, Thorsteinn; Häkkinen, Jari; Lindberg, Claes; Marko-Varga, György; Potthast, Frank; Samuelsson, Jim

    2004-08-05

    An automated peak picking strategy is presented where several peak sets with different signal-to-noise levels are combined to form a more reliable statement on the protein identity. The strategy is compared against both manual peak picking and industry standard automated peak picking on a set of mass spectra obtained after tryptic in gel digestion of 2D-gel samples from human fetal fibroblasts. The set of spectra contain samples ranging from strong to weak spectra, and the proposed multiple-scale method is shown to be much better on weak spectra than the industry standard method and a human operator, and equal in performance to these on strong and medium strong spectra. It is also demonstrated that peak sets selected by a human operator display a considerable variability and that it is impossible to speak of a single "true" peak set for a given spectrum. The described multiple-scale strategy both avoids time-consuming parameter tuning and exceeds the human operator in protein identification efficiency. The strategy therefore promises reliable automated user-independent protein identification using peptide mass fingerprints.

  17. Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks

    PubMed Central

    Zhao, Yongan; Carey, Knox; Lloyd, David; Sofia, Heidi; Baker, Dixie; Flicek, Paul; Shringarpure, Suyash; Bustamante, Carlos; Wang, Shuang; Jiang, Xiaoqian; Ohno-Machado, Lucila; Tang, Haixu; Wang, XiaoFeng; Hubaux, Jean-Pierre

    2018-01-01

    The Global Alliance for Genomics and Health (GA4GH) created the Beacon Project as a means of testing the willingness of data holders to share genetic data in the simplest technical context—a query for the presence of a specified nucleotide at a given position within a chromosome. Each participating site (or “beacon”) is responsible for assuring that genomic data are exposed through the Beacon service only with the permission of the individual to whom the data pertains and in accordance with the GA4GH policy and standards. While recognizing the inference risks associated with large-scale data aggregation, and the fact that some beacons contain sensitive phenotypic associations that increase privacy risk, the GA4GH adjudged the risk of re-identification based on the binary yes/no allele-presence query responses as acceptable. However, recent work demonstrated that, given a beacon with specific characteristics (including relatively small sample size and an adversary who possesses an individual’s whole genome sequence), the individual’s membership in a beacon can be inferred through repeated queries for variants present in the individual’s genome. In this paper, we propose three practical strategies for reducing re-identification risks in beacons. The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome. Using a beacon containing data from the 1000 Genomes Project, we demonstrate that the proposed strategies can effectively reduce re-identification risk in beacon-like datasets. PMID:28339683

  18. Commercial Sexual Exploitation and Sex Trafficking of Children and Adolescents: A Narrative Review.

    PubMed

    Barnert, Elizabeth; Iqbal, Zarah; Bruce, Janine; Anoshiravani, Arash; Kolhatkar, Gauri; Greenbaum, Jordan

    Commercial sexual exploitation and sex trafficking of children and adolescents represent a severe form of child abuse and an important pediatric health concern. Youth who are commercially sexually exploited have a constellation of clinical risk factors and high rates of unmet physical and mental health needs, including conditions that directly result from their victimization. Common physical health needs among commercially sexually exploited children and adolescents include violence-related injuries, pregnancy, sexually transmitted infections, and other acute infections. Common mental health conditions include substance use disorders, post-traumatic stress disorder, depression and suicidality, and anxiety. The existing literature indicates that trauma-informed approaches to the care of commercially sexually exploited youth are recommended in all aspects of their health care delivery. Additionally, medical education that attunes providers to identify and appropriately respond to the unique needs of this highly vulnerable group of children and adolescents is needed. The available research on commercial sexual exploitation and sex trafficking of children and adolescents remains fairly limited, yet is expanding rapidly. Especially relevant to the field of pediatrics, future research to guide health professionals in how best to identify and care for commercially sexually exploited children and adolescents in the clinical setting signifies a key gap in the extant literature and an important opportunity for future study. Copyright © 2017 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  19. Virtual Screening as a Strategy for the Identification of Xenobiotics Disrupting Corticosteroid Action

    PubMed Central

    Praxmarer, Lukas; Chantong, Boonrat; Cereghetti, Diego; Winiger, Rahel; Schuster, Daniela; Odermatt, Alex

    2012-01-01

    Background Impaired corticosteroid action caused by genetic and environmental influence, including exposure to hazardous xenobiotics, contributes to the development and progression of metabolic diseases, cardiovascular complications and immune disorders. Novel strategies are thus needed for identifying xenobiotics that interfere with corticosteroid homeostasis. 11β-hydroxysteroid dehydrogenase 2 (11β-HSD2) and mineralocorticoid receptors (MR) are major regulators of corticosteroid action. 11β-HSD2 converts the active glucocorticoid cortisol to the inactive cortisone and protects MR from activation by glucocorticoids. 11β-HSD2 has also an essential role in the placenta to protect the fetus from high maternal cortisol concentrations. Methods and Principal Findings We employed a previously constructed 3D-structural library of chemicals with proven and suspected endocrine disrupting effects for virtual screening using a chemical feature-based 11β-HSD pharmacophore. We tested several in silico predicted chemicals in a 11β-HSD2 bioassay. The identified antibiotic lasalocid and the silane-coupling agent AB110873 were found to concentration-dependently inhibit 11β-HSD2. Moreover, the silane AB110873 was shown to activate MR and stimulate mitochondrial ROS generation and the production of the proinflammatory cytokine interleukin-6 (IL-6). Finally, we constructed a MR pharmacophore, which successfully identified the silane AB110873. Conclusions Screening of virtual chemical structure libraries can facilitate the identification of xenobiotics inhibiting 11β-HSD2 and/or activating MR. Lasalocid and AB110873 belong to new classes of 11β-HSD2 inhibitors. The silane AB110873 represents to the best of our knowledge the first industrial chemical shown to activate MR. Furthermore, the MR pharmacophore can now be used for future screening purposes. PMID:23056542

  20. Child Exploitation: Some Pieces of the Puzzle.

    ERIC Educational Resources Information Center

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  1. IRAS: High-Throughput Identification of Novel Alternative Splicing Regulators.

    PubMed

    Zheng, S

    2016-01-01

    Alternative splicing is a fundamental regulatory process of gene expression. Defects in alternative splicing can lead to various diseases, and modification of disease-causing splicing events presents great therapeutic promise. Splicing outcome is commonly affected by extracellular stimuli and signaling cascades that converge on RNA-binding splicing regulators. These trans-acting factors recognize cis-elements in pre-mRNA transcripts to affect spliceosome assembly and splice site choices. Identification of these splicing regulators and/or upstream modulators has been difficult and traditionally done by piecemeal. High-throughput screening strategies to find multiple regulators of exon splicing have great potential to accelerate the discovery process, but typically confront low sensitivity and low specificity of screening assays. Here we describe a unique screening strategy, IRAS (identifying regulators of alternative splicing), using a pair of dual-output minigene reporters to allow for sensitive detection of exon splicing changes. Each dual-output reporter produces green fluorescent protein (GFP) and red fluorescent protein (RFP) fluorescent signals to assay the two spliced isoforms exclusively. The two complementary minigene reporters alter GFP/RFP output ratios in the opposite direction in response to splicing change. Applying IRAS in cell-based high-throughput screens allows sensitive and specific identification of splicing regulators and modulators for any alternative exons of interest. In comparison to previous high-throughput screening methods, IRAS substantially enhances the specificity of the screening assay. This strategy significantly eliminates false positives without sacrificing sensitive identification of true regulators of splicing. © 2016 Elsevier Inc. All rights reserved.

  2. Learning from Errors in Dual Vocational Education: Video-Enhanced Instructional Strategies

    ERIC Educational Resources Information Center

    Cattaneo, Alberto A. P.; Boldrini, Elena

    2017-01-01

    Purpose: Starting from the identification of some theoretically driven instructional principles, this paper presents a set of empirical cases based on strategies to learn from errors. The purpose of this paper is to provide first evidence about the feasibility and the effectiveness for learning of video-enhanced error-based strategies in…

  3. Erythrocytes-based synthetic delivery systems: transition from conventional to novel engineering strategies.

    PubMed

    Bhateria, Manisha; Rachumallu, Ramakrishna; Singh, Rajbir; Bhatta, Rabi Sankar

    2014-08-01

    Erythrocytes (red blood cells [RBCs]) and artificial or synthetic delivery systems such as liposomes, nanoparticles (NPs) are the most investigated carrier systems. Herein, progress made from conventional approach of using RBC as delivery systems to novel approach of using synthetic delivery systems based on RBC properties will be reviewed. We aim to highlight both conventional and novel approaches of using RBCs as potential carrier system. Conventional approaches which include two main strategies are: i) directly loading therapeutic moieties in RBCs; and ii) coupling them with RBCs whereas novel approaches exploit structural, mechanical and biological properties of RBCs to design synthetic delivery systems through various engineering strategies. Initial attempts included coupling of antibodies to liposomes to specifically target RBCs. Knowledge obtained from several studies led to the development of RBC membrane derived liposomes (nanoerythrosomes), inspiring future application of RBC or its structural features in other attractive delivery systems (hydrogels, filomicelles, microcapsules, micro- and NPs) for even greater potential. In conclusion, this review dwells upon comparative analysis of various conventional and novel engineering strategies in developing RBC based drug delivery systems, diversifying their applications in arena of drug delivery. Regardless of the challenges in front of us, RBC based delivery systems offer an exciting approach of exploiting biological entities in a multitude of medical applications.

  4. Near-optimal strategies for sub-decimeter satellite tracking with GPS

    NASA Technical Reports Server (NTRS)

    Yunck, Thomas P.; Wu, Sien-Chong; Wu, Jiun-Tsong

    1986-01-01

    Decimeter tracking of low Earth orbiters using differential Global Positioning System (GPS) techniques is discussed. A precisely known global network of GPS ground receivers and a receiver aboard the user satellite are needed, and all techniques simultaneously estimate the user and GPS satellite orbits. Strategies include a purely geometric, a fully dynamic, and a hybrid strategy. The last combines dynamic GPS solutions with a geometric user solution. Two powerful extensions of the hybrid strategy show the most promise. The first uses an optimized synthesis of dynamics and geometry in the user solution, while the second uses a gravity adjustment method to exploit data from repeat ground tracks. These techniques promise to deliver subdecimeter accuracy down to the lowest satellite altitudes.

  5. Nonparametric Identification of Causal Effects under Temporal Dependence

    ERIC Educational Resources Information Center

    Dafoe, Allan

    2018-01-01

    Social scientists routinely address temporal dependence by adopting a simple technical fix. However, the correct identification strategy for a causal effect depends on causal assumptions. These need to be explicated and justified; almost no studies do so. This article addresses this shortcoming by offering a precise general statement of the…

  6. Strategies for the enrichment and identification of basic proteins in proteome projects.

    PubMed

    Bae, Soo-Han; Harris, Andrew G; Hains, Peter G; Chen, Hong; Garfin, David E; Hazell, Stuart L; Paik, Young-Ki; Walsh, Bradley J; Cordwell, Stuart J

    2003-05-01

    Two-dimensional gel electrophoresis (2-DE) is currently the method of choice for separating complex mixtures of proteins for visual comparison in proteome analysis. This technology, however, is biased against certain classes of proteins including low abundance and hydrophobic proteins. Proteins with extremely alkaline isoelectric points (pI) are often very poorly represented using 2-DE technology, even when complex mixtures are separated using commercially available pH 6-11 or pH 7-10 immobilized pH gradients. The genome of the human gut pathogen, Helicobacter pylori, is dominated by genes encoding basic proteins, and is therefore a useful model for examining methodology suitable for separating such proteins. H. pylori proteins were separated on pH 6-11 and novel pH 9-12 immobilized pH gradients and 65 protein spots were subjected to matrix-assisted laser desorption/ionization-time of flight mass spectrometry, leading to the identification of 49 unique proteins. No proteins were characterized with a theoretical pI of greater than 10.23. A second approach to examine extremely alkaline proteins (pI > 9.0) utilized a prefractionation isoelectric focusing. Proteins were separated into two fractions using Gradiflow technology, and the extremely basic fraction subjected to both sodium dodecyl sulphate-polyacrylamide gel electrophoresis and liquid chromatography (LC) - tandem mass spectrometry post-tryptic digest, allowing the identification of 17 and 13 proteins, respectively. Gradiflow separations were highly specific for proteins with pI > 9.0, however, a single LC separation only allowed the identification of peptides from highly abundant proteins. These methods and those encompassing multiple LC 'dimensions' may be a useful complement to 2-DE for 'near-to-total' proteome coverage in the alkaline pH range.

  7. The strategy of sustainable soybean development to increase soybean needs in North Sumatera

    NASA Astrophysics Data System (ADS)

    Handayani, L.; Rauf, A.; Rahmawaty; Supriana, T.

    2018-02-01

    The objective of the research was to analyze both internal and external factors influencing the strategy of sustainable soybean development to increase soybean needs in North Sumatera. SWOT analysis was used as the method of the research through identifying internal factors in the development of sustainable soybean the strategy to increase soybean production in research area is aggressive strategy or strategy of SO (Strengths - Oppurtunities) that is using force to exploit existing opportunity with activities as follows: (1). Use certified seeds in accordance with government regulations and policies. (2). Utilizing the level of soil fertility and cropping patterns to be able to meet the demand for soybeans. (3). Utilizing human resources by becoming a member of farmer groups.

  8. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarje, Abhinav; Jacobsen, Douglas W.; Williams, Samuel W.

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  9. Natural selection of memory-one strategies for the iterated prisoner's dilemma.

    PubMed

    Kraines, D P; Kraines, V Y

    2000-04-21

    In the iterated Prisoner's Dilemma, mutually cooperative behavior can become established through Darwinian natural selection. In simulated interactions of stochastic memory-one strategies for the Iterated Prisoner's Dilemma, Nowak and Sigmund discovered that cooperative agents using a Pavlov (Win-Stay Lose-Switch) type strategy eventually dominate a random population. This emergence follows more directly from a deterministic dynamical system based on differential reproductive success or natural selection. When restricted to an environment of memory-one agents interacting in iterated Prisoner's Dilemma games with a 1% noise level, the Pavlov agent is the only cooperative strategy and one of very few others that cannot be invaded by a similar strategy. Pavlov agents are trusting but no suckers. They will exploit weakness but repent if punished for cheating. Copyright 2000 Academic Press.

  10. Enacting Principal Leadership: Exploiting Situated Possibilities to Build School Capacity for Change

    ERIC Educational Resources Information Center

    Lai, Edith

    2015-01-01

    This paper attempts to identify leadership practices of school principals as they engaged in exploring and exploiting possibilities in and around the school contexts to develop school capacity for change. Based on interview data of school principals, this paper shows that the capabilities of school leaders to perceive and exploit situated…

  11. Identification and characterization of parasitism genes from the pinewood nematode Bursaphelenchus xylophilus reveals a multilayered detoxification strategy.

    PubMed

    Espada, Margarida; Silva, Ana Cláudia; Eves van den Akker, Sebastian; Cock, Peter J A; Mota, Manuel; Jones, John T

    2016-02-01

    The migratory endoparasitic nematode Bursaphelenchus xylophilus, which is the causal agent of pine wilt disease, has phytophagous and mycetophagous phases during its life cycle. This highly unusual feature distinguishes it from other plant-parasitic nematodes and requires profound changes in biology between modes. During the phytophagous stage, the nematode migrates within pine trees, feeding on the contents of parenchymal cells. Like other plant pathogens, B. xylophilus secretes effectors from pharyngeal gland cells into the host during infection. We provide the first description of changes in the morphology of these gland cells between juvenile and adult life stages. Using a comparative transcriptomics approach and an effector identification pipeline, we identify numerous novel parasitism genes which may be important for the mediation of interactions of B. xylophilus with its host. In-depth characterization of all parasitism genes using in situ hybridization reveals two major categories of detoxification proteins, those specifically expressed in either the pharyngeal gland cells or the digestive system. These data suggest that B. xylophilus incorporates effectors in a multilayer detoxification strategy in order to protect itself from host defence responses during phytophagy. © 2015 BSPP AND JOHN WILEY & SONS LTD.

  12. Re-Ranking Sequencing Variants in the Post-GWAS Era for Accurate Causal Variant Identification

    PubMed Central

    Faye, Laura L.; Machiela, Mitchell J.; Kraft, Peter; Bull, Shelley B.; Sun, Lei

    2013-01-01

    Next generation sequencing has dramatically increased our ability to localize disease-causing variants by providing base-pair level information at costs increasingly feasible for the large sample sizes required to detect complex-trait associations. Yet, identification of causal variants within an established region of association remains a challenge. Counter-intuitively, certain factors that increase power to detect an associated region can decrease power to localize the causal variant. First, combining GWAS with imputation or low coverage sequencing to achieve the large sample sizes required for high power can have the unintended effect of producing differential genotyping error among SNPs. This tends to bias the relative evidence for association toward better genotyped SNPs. Second, re-use of GWAS data for fine-mapping exploits previous findings to ensure genome-wide significance in GWAS-associated regions. However, using GWAS findings to inform fine-mapping analysis can bias evidence away from the causal SNP toward the tag SNP and SNPs in high LD with the tag. Together these factors can reduce power to localize the causal SNP by more than half. Other strategies commonly employed to increase power to detect association, namely increasing sample size and using higher density genotyping arrays, can, in certain common scenarios, actually exacerbate these effects and further decrease power to localize causal variants. We develop a re-ranking procedure that accounts for these adverse effects and substantially improves the accuracy of causal SNP identification, often doubling the probability that the causal SNP is top-ranked. Application to the NCI BPC3 aggressive prostate cancer GWAS with imputation meta-analysis identified a new top SNP at 2 of 3 associated loci and several additional possible causal SNPs at these loci that may have otherwise been overlooked. This method is simple to implement using R scripts provided on the author's website. PMID:23950724

  13. Producing patient-avatar identification in animation video information on spinal anesthesia by different narrative strategies.

    PubMed

    Høybye, Mette Terp; Vesterby, Martin; Jørgensen, Lene Bastrup

    2016-06-01

    Visual approaches to health information reduce complexity and may bridge challenges in health literacy. But the mechanisms and meanings of using animated video in communication with patients undergoing surgery are not well described. By comparing two versions of a two-dimensional animated video on spinal anesthesia, this study tested the patient-avatar identification within two different narrative models. To explore the perspectives of total hip arthroplasty, we employed qualitative methods of interviews and ethnographic observation. The animated presentation of the spinal anesthesia procedure was immediately recognized by all participants as reflecting their experience of the procedure independent of the narrative form. The avatar gender did not affect this identification. We found no preference for either narrative form. This study supports the potential of animation video in health informatics as a didactic model for qualifying patient behavior. Animation video creates a high degree of identification that may work to reduce pre-surgical anxiety. © The Author(s) 2014.

  14. Markov-random-field-based super-resolution mapping for identification of urban trees in VHR images

    NASA Astrophysics Data System (ADS)

    Ardila, Juan P.; Tolpekin, Valentyn A.; Bijker, Wietske; Stein, Alfred

    2011-11-01

    Identification of tree crowns from remote sensing requires detailed spectral information and submeter spatial resolution imagery. Traditional pixel-based classification techniques do not fully exploit the spatial and spectral characteristics of remote sensing datasets. We propose a contextual and probabilistic method for detection of tree crowns in urban areas using a Markov random field based super resolution mapping (SRM) approach in very high resolution images. Our method defines an objective energy function in terms of the conditional probabilities of panchromatic and multispectral images and it locally optimizes the labeling of tree crown pixels. Energy and model parameter values are estimated from multiple implementations of SRM in tuning areas and the method is applied in QuickBird images to produce a 0.6 m tree crown map in a city of The Netherlands. The SRM output shows an identification rate of 66% and commission and omission errors in small trees and shrub areas. The method outperforms tree crown identification results obtained with maximum likelihood, support vector machines and SRM at nominal resolution (2.4 m) approaches.

  15. An Effect Analysis of Comprehensive Treatment of Groundwater Over-Exploitation in Cheng’an County, Hebei Province, China

    PubMed Central

    Shao, Weiwei; Zhou, Jinjun; Liu, Jiahong; Zhang, Haixing; Wang, Jianhua; Xiang, Chenyao; Yang, Guiyu; Tang, Yun

    2017-01-01

    The comprehensive treatment project of groundwater over-exploitation in Hebei Province has been implemented for more than a year, and the effect of exploitation restriction is in urgent need of evaluation. This paper deals with Cheng’an County of Hebei Province as the research subject. Based on collected hydro-meteorological, socioeconomic, groundwater, and other related data, together with typical regional experimental research, this study generates the effective precipitation–groundwater exploitation (P-W) curve and accompanying research methods, and calculates the quantity of groundwater exploitation restriction. It analyzes the target completion status of groundwater exploitation restriction through water conservancy measures and agricultural practices of the groundwater over-exploitation comprehensive treatment project that was implemented in Cheng’an County in 2014. The paper evaluates the treatment effect of groundwater over-exploitation, as well as provides technical support for the effect evaluation of groundwater exploitation restriction of agricultural irrigation in Cheng’an County and relevant areas. PMID:28054979

  16. An Effect Analysis of Comprehensive Treatment of Groundwater Over-Exploitation in Cheng'an County, Hebei Province, China.

    PubMed

    Shao, Weiwei; Zhou, Jinjun; Liu, Jiahong; Zhang, Haixing; Wang, Jianhua; Xiang, Chenyao; Yang, Guiyu; Tang, Yun

    2017-01-04

    The comprehensive treatment project of groundwater over-exploitation in Hebei Province has been implemented for more than a year, and the effect of exploitation restriction is in urgent need of evaluation. This paper deals with Cheng'an County of Hebei Province as the research subject. Based on collected hydro-meteorological, socioeconomic, groundwater, and other related data, together with typical regional experimental research, this study generates the effective precipitation-groundwater exploitation (P-W) curve and accompanying research methods, and calculates the quantity of groundwater exploitation restriction. It analyzes the target completion status of groundwater exploitation restriction through water conservancy measures and agricultural practices of the groundwater over-exploitation comprehensive treatment project that was implemented in Cheng'an County in 2014. The paper evaluates the treatment effect of groundwater over-exploitation, as well as provides technical support for the effect evaluation of groundwater exploitation restriction of agricultural irrigation in Cheng'an County and relevant areas.

  17. Identification of water-deficit responsive genes in maritime pine (Pinus pinaster Ait.) roots.

    PubMed

    Dubos, Christian; Plomion, Christophe

    2003-01-01

    Root adaptation to soil environmental factors is very important to maritime pine, the main conifer species used for reforestation in France. The range of climates in the sites where this species is established varies from flooded in winter to drought-prone in summer. No studies have yet focused on the morphological, physiological or molecular variability of the root system to adapt its growth to such an environment. We developed a strategy to isolate drought-responsive genes in the root tissue in order to identify the molecular mechanisms that trees have evolved to cope with drought (the main problem affecting wood productivity), and to exploit this information to improve drought stress tolerance. In order to provide easy access to the root system, seedlings were raised in hydroponic solution. Polyethylene glycol was used as an osmoticum to induce water deficit. Using the cDNA-AFLP technique, we screened more than 2500 transcript derived fragments, of which 33 (1.2%) showed clear variation in presence/absence between non stressed and stressed medium. The relative abundance of these transcripts was then analysed by reverse northern. Only two out of these 33 genes showed significant opposite behaviour between both techniques. The identification and characterization of water-deficit responsive genes in roots provide the emergence of physiological understanding of the patterns of gene expression and regulation involved in the drought stress response of maritime pine.

  18. Strategies for the Identification of T Cell–Recognized Tumor Antigens in Hematological Malignancies for Improved Graft-versus-Tumor Responses after Allogeneic Blood and Marrow Transplantation

    PubMed Central

    Zilberberg, Jenny; Feinman, Rena; Korngold, Robert

    2015-01-01

    Allogeneic blood and marrow transplantation (allo-BMT) is an effective immunotherapeutic treatment that can provide partial or complete remission for patients with hematological malignancies. Mature donor T cells in the donor inoculum play a central role in mediating graft-versus-tumor (GVT) responses by destroying residual tumor cells that persist after conditioning regimens. Alloreactivity towards minor histocompatibility antigens (miHA), which are varied tissue-related self-peptides presented in the context of major histocompatibility complex (MHC) molecules on recipient cells, some of which may be shared on tumor cells, is a dominant factor for the development of GVT. Potentially, GVT can also be directed to tumor-associated antigens or tumor-specific antigens that are more specific to the tumor cells themselves. The full exploitation of allo-BMT, however, is greatly limited by the development of graft-versus-host disease (GVHD), which is mediated by the donor T cell response against the miHA expressed in the recipient’s cells of the intestine, skin, and liver. Because of the significance of GVT and GVHD responses in determining the clinical outcome of patients, miHA and tumor antigens have been intensively studied, and one active immunotherapeutic approach to separate these two responses has been cancer vaccination after allo-BMT. The combination of these two strategies has an advantage over vaccination of the patient without allo-BMT because his or her immune system has already been exposed and rendered unresponsive to the tumor antigens. The conditioning for allo-BMT eliminates the patient’s existing immune system, including regulatory elements, and provides a more permissive environment for the newly developing donor immune compartment to selectively target the malignant cells. Utilizing recent technological advances, the identities of many human miHA and tumor antigenic peptides have been defined and are currently being evaluated in clinical and basic

  19. Strategies for the identification of T cell-recognized tumor antigens in hematological malignancies for improved graft-versus-tumor responses after allogeneic blood and marrow transplantation.

    PubMed

    Zilberberg, Jenny; Feinman, Rena; Korngold, Robert

    2015-06-01

    Allogeneic blood and marrow transplantation (allo-BMT) is an effective immunotherapeutic treatment that can provide partial or complete remission for patients with hematological malignancies. Mature donor T cells in the donor inoculum play a central role in mediating graft-versus-tumor (GVT) responses by destroying residual tumor cells that persist after conditioning regimens. Alloreactivity towards minor histocompatibility antigens (miHA), which are varied tissue-related self-peptides presented in the context of major histocompatibility complex (MHC) molecules on recipient cells, some of which may be shared on tumor cells, is a dominant factor for the development of GVT. Potentially, GVT can also be directed to tumor-associated antigens or tumor-specific antigens that are more specific to the tumor cells themselves. The full exploitation of allo-BMT, however, is greatly limited by the development of graft-versus-host disease (GVHD), which is mediated by the donor T cell response against the miHA expressed in the recipient's cells of the intestine, skin, and liver. Because of the significance of GVT and GVHD responses in determining the clinical outcome of patients, miHA and tumor antigens have been intensively studied, and one active immunotherapeutic approach to separate these two responses has been cancer vaccination after allo-BMT. The combination of these two strategies has an advantage over vaccination of the patient without allo-BMT because his or her immune system has already been exposed and rendered unresponsive to the tumor antigens. The conditioning for allo-BMT eliminates the patient's existing immune system, including regulatory elements, and provides a more permissive environment for the newly developing donor immune compartment to selectively target the malignant cells. Utilizing recent technological advances, the identities of many human miHA and tumor antigenic peptides have been defined and are currently being evaluated in clinical and basic

  20. The World's Exploited Children: Growing Up Sadly.

    ERIC Educational Resources Information Center

    Knight, William James

    This monograph, fourth in a series on labor development, focuses on child exploitation in the context of child labor. The collection of papers briefly discusses (1) the relation between conditions of poverty and the prevalence of child labor in developing countries; (2) the lack of effectiveness of labor legislation in preventing child…

  1. Developing Students' Listening Metacognitive Strategies Using Online Videotext Self-Dictation-Generation Learning Activity

    ERIC Educational Resources Information Center

    Chang, Ching; Chang, Chih-Kai

    2014-01-01

    The study is based on the use of a flexible learning framework to help students improve information processes underlying strategy instruction in EFL listening. By exploiting the online videotext self-dictation-generation (video-SDG) learning activity implemented on the YouTube caption manager platform, the learning cycle was emphasized to promote…

  2. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  3. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  4. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  5. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  6. Commercial sexual exploitation and sex trafficking of children in the United States.

    PubMed

    Greenbaum, V Jordan

    2014-10-01

    Child commercial sexual exploitation and sex trafficking are global health problems requiring a multidisciplinary approach by individuals, organizations, communities, and national governments. The adverse emotional, physical, and social consequences for victims are legion and in many areas of the United States and the rest of the world, victim resources are scarce. Since violence, deprivation, abuse, and infection are so integral to the exploitation experience, victims may present for care to community and academic pediatric and adolescent health care providers. It is essential that medical professionals have the knowledge, skills, and resources to recognize victims, assess their needs, and treat them appropriately, including making key referrals for community services. However, to date medical information and resources regarding commercial sexual exploitation and sex trafficking has been sparse. There are no clinically validated screening tools specifically designed to identify victims in the health care setting and since victims seldom self-identify, it is likely that the majority of victims are unrecognized. The opportunity for comprehensive assessment and intervention is lost. Further, professionals receive little training on appropriate interview techniques for this special population, and many are ill equipped to ensure safety and optimal medical evaluation during the visit. This article provides a general overview of child sex trafficking and commercial sexual exploitation (CSEC), describing the epidemiology of international and domestic exploitation, and reviewing the challenges of conducting research on this population. The five stages of trafficking are explained, as are typical physical and emotional consequences of exploitation. The medical evaluation is described, including potential indicators of CSEC and sex trafficking, common medical presentations by victims, approaches to the comprehensive medical interview, and the appropriate medical exam with

  7. Large scale, synchronous variability of marine fish populations driven by commercial exploitation.

    PubMed

    Frank, Kenneth T; Petrie, Brian; Leggett, William C; Boyce, Daniel G

    2016-07-19

    Synchronous variations in the abundance of geographically distinct marine fish populations are known to occur across spatial scales on the order of 1,000 km and greater. The prevailing assumption is that this large-scale coherent variability is a response to coupled atmosphere-ocean dynamics, commonly represented by climate indexes, such as the Atlantic Multidecadal Oscillation and North Atlantic Oscillation. On the other hand, it has been suggested that exploitation might contribute to this coherent variability. This possibility has been generally ignored or dismissed on the grounds that exploitation is unlikely to operate synchronously at such large spatial scales. Our analysis of adult fishing mortality and spawning stock biomass of 22 North Atlantic cod (Gadus morhua) stocks revealed that both the temporal and spatial scales in fishing mortality and spawning stock biomass were equivalent to those of the climate drivers. From these results, we conclude that greater consideration must be given to the potential of exploitation as a driving force behind broad, coherent variability of heavily exploited fish species.

  8. Exploitation: One View of Industry and Business. Training and Development Research Center: Project Number Ten.

    ERIC Educational Resources Information Center

    Swanson, Richard A.; And Others

    A reasonable definition of exploitation is an unjust or improper use of another person for one's own profit or advantage. Exploitation predates the age of industry; it is not the sole province of industry and business. Worker responses to exploitation in the evolving industrial democracy have taken the form of labor unions, political clubs, credit…

  9. Strategies in treatment of suicidality: identification of common and treatment-specific interventions in empirically supported treatment manuals.

    PubMed

    Weinberg, Igor; Ronningstam, Elsa; Goldblatt, Mark J; Schechter, Mark; Wheelis, Joan; Maltsberger, John T

    2010-06-01

    Many reports of treatments for suicidal patients claim effectiveness in reducing suicidal behavior but fail to demonstrate which treatment interventions, or combinations thereof, diminish suicidality. In this study, treatment manuals for empirically supported psychological treatments for suicidal patients were examined to identify which interventions they had in common and which interventions were treatment-specific. Empirically supported treatments for suicidality were identified through a literature search of PsychLit and MEDLINE for the years 1970-2007, employing the following search strategy: [suicide OR parasuicide] AND [therapy OR psychotherapy OR treatment] AND [random OR randomized]. After identifying the reports on randomized controlled studies that tested effectiveness of different treatments, the reference list of each report was searched for further studies. Only reports published in English were included. To ensure that rated manuals actually correspond to the delivered and tested treatments, we included only treatment interventions with explicit adherence rating and scoring and with adequate adherence ratings in the published studies. Five manualized treatments demonstrating efficacy in reducing suicide risk were identified and were independently evaluated by raters using a list of treatment interventions. The common interventions included a clear treatment framework; a defined strategy for managing suicide crises; close attention to affect; an active, participatory therapist style; and use of exploratory and change-oriented interventions. Some treatments encouraged a multimodal approach and identification of suicidality as an explicit target behavior, and some concentrated on the patient-therapist relationship. Emphasis on interpretation and supportive interventions varied. Not all methods encouraged systematic support for therapists. This study identified candidate interventions for possible effectiveness in reducing suicidality. These interventions

  10. State-dependent alterations in inhibitory control and emotional face identification in seasonal affective disorder.

    PubMed

    Hjordt, Liv V; Stenbæk, Dea S; Madsen, Kathrine Skak; Mc Mahon, Brenda; Jensen, Christian G; Vestergaard, Martin; Hageman, Ida; Meder, David; Hasselbalch, Steen G; Knudsen, Gitte M

    2017-04-01

    Depressed individuals often exhibit impaired inhibition to negative input and identification of positive stimuli, but it is unclear whether this is a state or trait feature. We here exploited a naturalistic model, namely individuals with seasonal affective disorder (SAD), to study this feature longitudinally. The goal of this study was to examine seasonal changes in inhibitory control and identification of emotional faces in individuals with SAD. Twenty-nine individuals diagnosed with winter-SAD and 30 demographically matched controls with no seasonality symptoms completed an emotional Go/NoGo task, requiring inhibition of prepotent responses to emotional facial expressions and an emotional face identification task twice, in winter and summer. In winter, individuals with SAD showed impaired ability to inhibit responses to angry (p = .0006) and sad faces (p = .011), and decreased identification of happy faces (p = .032) compared with controls. In summer, individuals with SAD and controls performed similarly on these tasks (ps > .24). We provide novel evidence that inhibition of angry and sad faces and identification of happy faces are impaired in SAD in the symptomatic phase, but not in the remitted phase. The affective biases in cognitive processing constitute state-dependent features of SAD. Our data show that reinstatement of a normal affective cognition should be possible and would constitute a major goal in psychiatric treatment to improve the quality of life for these patients. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  11. On the optimal identification of tag sets in time-constrained RFID configurations.

    PubMed

    Vales-Alonso, Javier; Bueno-Delgado, María Victoria; Egea-López, Esteban; Alcaraz, Juan José; Pérez-Mañogil, Juan Manuel

    2011-01-01

    In Radio Frequency Identification facilities the identification delay of a set of tags is mainly caused by the random access nature of the reading protocol, yielding a random identification time of the set of tags. In this paper, the cumulative distribution function of the identification time is evaluated using a discrete time Markov chain for single-set time-constrained passive RFID systems, namely those ones where a single group of tags is assumed to be in the reading area and only for a bounded time (sojourn time) before leaving. In these scenarios some tags in a set may leave the reader coverage area unidentified. The probability of this event is obtained from the cumulative distribution function of the identification time as a function of the sojourn time. This result provides a suitable criterion to minimize the probability of losing tags. Besides, an identification strategy based on splitting the set of tags in smaller subsets is also considered. Results demonstrate that there are optimal splitting configurations that reduce the overall identification time while keeping the same probability of losing tags.

  12. Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.

    PubMed

    Raisaro, Jean Louis; Tramèr, Florian; Ji, Zhanglong; Bu, Diyue; Zhao, Yongan; Carey, Knox; Lloyd, David; Sofia, Heidi; Baker, Dixie; Flicek, Paul; Shringarpure, Suyash; Bustamante, Carlos; Wang, Shuang; Jiang, Xiaoqian; Ohno-Machado, Lucila; Tang, Haixu; Wang, XiaoFeng; Hubaux, Jean-Pierre

    2017-07-01

    The Global Alliance for Genomics and Health (GA4GH) created the Beacon Project as a means of testing the willingness of data holders to share genetic data in the simplest technical context-a query for the presence of a specified nucleotide at a given position within a chromosome. Each participating site (or "beacon") is responsible for assuring that genomic data are exposed through the Beacon service only with the permission of the individual to whom the data pertains and in accordance with the GA4GH policy and standards.While recognizing the inference risks associated with large-scale data aggregation, and the fact that some beacons contain sensitive phenotypic associations that increase privacy risk, the GA4GH adjudged the risk of re-identification based on the binary yes/no allele-presence query responses as acceptable. However, recent work demonstrated that, given a beacon with specific characteristics (including relatively small sample size and an adversary who possesses an individual's whole genome sequence), the individual's membership in a beacon can be inferred through repeated queries for variants present in the individual's genome.In this paper, we propose three practical strategies for reducing re-identification risks in beacons. The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome. Using a beacon containing data from the 1000 Genomes Project, we demonstrate that the proposed strategies can effectively reduce re-identification risk in beacon-like datasets. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  13. Strategy for Comprehensive Profiling and Identification of Acidic Glycosphingolipids Using Ultra-High-Performance Liquid Chromatography Coupled with Quadrupole Time-of-Flight Mass Spectrometry.

    PubMed

    Hu, Ting; Jia, Zhixin; Zhang, Jin-Lan

    2017-07-18

    Acidic glycosphingolipids (AGSLs), which mainly consist of ganglioside and sulfatide moieties, are highly concentrated in the central nervous system. Comprehensive profiling of AGSLs has historically been challenging because of their high complexity and the lack of standards. In this study, a novel strategy was developed to comprehensively profile AGSLs using ultra-high-performance liquid chromatography-quadrupole time-of-flight mass spectrometry. Ganglioside isomers with different glycan chains such as GD1a/GD1b were completely separated on a C18 column for the first time to our knowledge, facilitated by the addition of formic acid in the mobile phase. A mathematical model was established to predict the retention times (RTs) of all theoretically possible AGSLs on the basis of the good logarithmic relationship between the ceramide carbon numbers of the AGSLs in the reference material and their RTs. A data set was created of 571 theoretically possible AGSLs, including the ceramide carbon numbers, RTs, and high-resolution quasi-molecular ions. A novel fast identification strategy was established for global AGSL profiling by comparing the high-resolution quasi-molecular ions and RTs of the tested peaks to those in the data set of 571 AGSLs. Using this strategy, 199 AGSL candidates were identified in rat brain tissue. MS/MS fragments were further collected for these 199 candidates to confirm their identity as AGSLs. This novel strategy was employed to profile AGSLs in brain tissue samples from control rats and model rats with bilateral common carotid artery (2-VO) cerebral ischemia. Forty AGSLs were significantly different between the control and model groups, and these differences were further interpreted.

  14. Comparison of two matrix-assisted laser desorption ionization-time of flight mass spectrometry methods with conventional phenotypic identification for routine identification of bacteria to the species level.

    PubMed

    Cherkaoui, Abdessalam; Hibbs, Jonathan; Emonet, Stéphane; Tangomo, Manuela; Girard, Myriam; Francois, Patrice; Schrenzel, Jacques

    2010-04-01

    Bacterial identification relies primarily on culture-based methodologies requiring 24 h for isolation and an additional 24 to 48 h for species identification. Matrix-assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF MS) is an emerging technology newly applied to the problem of bacterial species identification. We evaluated two MALDI-TOF MS systems with 720 consecutively isolated bacterial colonies under routine clinical laboratory conditions. Isolates were analyzed in parallel on both devices, using the manufacturers' default recommendations. We compared MS with conventional biochemical test system identifications. Discordant results were resolved with "gold standard" 16S rRNA gene sequencing. The first MS system (Bruker) gave high-confidence identifications for 680 isolates, of which 674 (99.1%) were correct; the second MS system (Shimadzu) gave high-confidence identifications for 639 isolates, of which 635 (99.4%) were correct. Had MS been used for initial testing and biochemical identification used only in the absence of high-confidence MS identifications, the laboratory would have saved approximately US$5 per isolate in marginal costs and reduced average turnaround time by more than an 8-h shift, with no loss in accuracy. Our data suggest that implementation of MS as a first test strategy for one-step species identification would improve timeliness and reduce isolate identification costs in clinical bacteriology laboratories now.

  15. Human trafficking and exploitation: A global health concern.

    PubMed

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  16. A strategy for comprehensive identification of sequential constituents using ultra-high-performance liquid chromatography coupled with linear ion trap-Orbitrap mass spectrometer, application study on chlorogenic acids in Flos Lonicerae Japonicae.

    PubMed

    Zhang, Jia-yu; Wang, Zi-jian; Li, Yun; Liu, Ying; Cai, Wei; Li, Chen; Lu, Jian-qiu; Qiao, Yan-jiang

    2016-01-15

    The analytical methodologies for evaluation of multi-component system in traditional Chinese medicines (TCMs) have been inadequate or unacceptable. As a result, the unclarity of multi-component hinders the sufficient interpretation of their bioactivities. In this paper, an ultra-high-performance liquid chromatography coupled with linear ion trap-Orbitrap (UPLC-LTQ-Orbitrap)-based strategy focused on the comprehensive identification of TCM sequential constituents was developed. The strategy was characterized by molecular design, multiple ion monitoring (MIM), targeted database hits and mass spectral trees similarity filter (MTSF), and even more isomerism discrimination. It was successfully applied in the HRMS data-acquisition and processing of chlorogenic acids (CGAs) in Flos Lonicerae Japonicae (FLJ), and a total of 115 chromatographic peaks attributed to 18 categories were characterized, allowing a comprehensive revelation of CGAs in FLJ for the first time. This demonstrated that MIM based on molecular design could improve the efficiency to trigger MS/MS fragmentation reactions. Targeted database hits and MTSF searching greatly facilitated the processing of extremely large information data. Besides, the introduction of diagnostic product ions (DPIs) discrimination, ClogP analysis, and molecular simulation, raised the efficiency and accuracy to characterize sequential constituents especially position and geometric isomers. In conclusion, the results expanded our understanding on CGAs in FLJ, and the strategy could be exemplary for future research on the comprehensive identification of sequential constituents in TCMs. Meanwhile, it may propose a novel idea for analyzing sequential constituents, and is promising for quality control and evaluation of TCMs. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Energy for lunar resource exploitation

    NASA Astrophysics Data System (ADS)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  18. Energy for lunar resource exploitation

    NASA Technical Reports Server (NTRS)

    Glaser, Peter E.

    1992-01-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  19. Reduced SNP Panels for Genetic Identification and Introgression Analysis in the Dark Honey Bee (Apis mellifera mellifera)

    PubMed Central

    Muñoz, Irene; Henriques, Dora; Johnston, J. Spencer; Chávez-Galarza, Julio; Kryger, Per; Pinto, M. Alice

    2015-01-01

    Beekeeping activities, especially queen trading, have shaped the distribution of honey bee (Apis mellifera) subspecies in Europe, and have resulted in extensive introductions of two eastern European C-lineage subspecies (A. m. ligustica and A. m. carnica) into the native range of the M-lineage A. m. mellifera subspecies in Western Europe. As a consequence, replacement and gene flow between native and commercial populations have occurred at varying levels across western European populations. Genetic identification and introgression analysis using molecular markers is an important tool for management and conservation of honey bee subspecies. Previous studies have monitored introgression by using microsatellite, PCR-RFLP markers and most recently, high density assays using single nucleotide polymorphism (SNP) markers. While the latter are almost prohibitively expensive, the information gained to date can be exploited to create a reduced panel containing the most ancestry-informative markers (AIMs) for those purposes with very little loss of information. The objective of this study was to design reduced panels of AIMs to verify the origin of A. m. mellifera individuals and to provide accurate estimates of the level of C-lineage introgression into their genome. The discriminant power of the SNPs using a variety of metrics and approaches including the Weir & Cockerham’s FST, an FST-based outlier test, Delta, informativeness (In), and PCA was evaluated. This study shows that reduced AIMs panels assign individuals to the correct origin and calculates the admixture level with a high degree of accuracy. These panels provide an essential tool in Europe for genetic stock identification and estimation of admixture levels which can assist management strategies and monitor honey bee conservation programs. PMID:25875986

  20. Model to Determine the Optimal Dietary Elimination Strategy for Treatment of Eosinophilic Esophagitis.

    PubMed

    Zhan, Tiannan; Ali, Ayman; Choi, Jin G; Lee, Minyi; Leung, John; Dellon, Evan S; Garber, John J; Hur, Chin

    2018-05-03

    Elimination diets are effective treatments for eosinophilic esophagitis (EoE), but foods that activate esophagitis are identified empirically, via a process that involves multiple esophagogastroduodenoscopies (EGDs). No optimized approach has been developed to identify foods that activate EoE. We aimed to compare clinical strategies to provide data to guide treatment. We developed a computer-based simulation model to determine the optimal empiric elimination strategy based on reported prevalence values for foods that activate EoE. These were identified in a systematic review, searching PubMed through October 1, 2017 for prospective and retrospective studies of EoE and diet. Each patient in our virtual cohort was assigned profile comprising as many as 12 foods known to induce EoE, including dairy, wheat, eggs, soy, nuts, seafood, beef, corn, chicken, potato, pork, and/or rice. To balance the strategy success rate with the number of EGDs required for food identification, we applied an efficiency frontier approach. Strategies on the frontier were the most efficient, requiring fewer EGDs for higher or equivalent success rates relative to their comparable, neighboring strategies. In all simulations, we found the 1,4,8-food and 1,3-food strategies to be the most efficient in identifying foods that induce EoE, resulting in the highest rate of the correct identification of food triggers balanced by the number of EGDs required to complete the food elimination strategy. Both strategies begin with elimination of dairy; if EoE remission is not achieved, the 1,3 diet proceeds to eliminate wheat and eggs in addition to dairy, and the 1,4,8 strategy removes wheat, eggs, dairy, and soy. In the case of persistent EoE after the second round of food elimination, the 1,3-food strategy terminates, whereas the 1,4,8-food diet eliminates corn, chicken, beef, and pork. The 1,4,8-food resulted in correct identification of foods that activated esophagitis in 76.68% of patients, with a mean

  1. The integrated rangeland fire management strategy actionable science plan

    USGS Publications Warehouse

    Aldridge, Cameron L.; Berg, Ken; Boyd, Chad S.; Boyte, Stephen P.; Bradford, John B.; Brunson, Ed; Cissel, John H.; Conway, Courtney J.; Chalfoun, Anna D.; Chambers, Jeanne C.; Clark, Patrick; Coates, Peter S.; Crist, Michele R.; Davis, Dawn M.; DeCrappeo, Nicole; Deibert, Patricia A.; Doherty, Kevin E.; Evers, Louisa B.; Finch, Deborah M.; Finn, Sean P.; Germino, Matthew J.; Glenn, Nancy F.; Gucker, Corey; Hall, John A.; Hanser, Steven E.; Havlina, Douglas W.; Heinrichs, Julie; Heller, Matt; Homer, Collin G.; Hunter, Molly E.; Jacobs, Ruth W.; Karl, Jason W.; Kearney, Richard; Kemp, Susan K; Kilkenny, Francis F.; Knick, Steven T.; Launchbaugh, Karen; Manier, Daniel J.; Mayer, Kenneth E.; Meyer, Susan E.; Monroe, Adrian; MontBlanc, Eugénie; Newingham, Beth A.; Pellant, Michael L.; Phillips, Susan L.; Pilliod, David S.; Ricca, Mark A.; Richardson, Bryce A.; Rose, Jeffrey A.; Shaw, Nancy; Sheley, Roger L.; Shinneman, Douglas J.; Wiechman , Lief A.; Wylie, Bruce K.

    2016-01-01

    The Integrated Rangeland Fire Management Strategy (hereafter Strategy, DOI 2015) outlined the need for coordinated, science-based adaptive management to achieve long-term protection, conservation, and restoration of the sagebrush (Artemisia spp.) ecosystem. A key component of this management approach is the identification of knowledge gaps that limit implementation of effective strategies to meet current management challenges. The tasks and actions identified in the Strategy address several broad topics related to management of the sagebrush ecosystem. This science plan is organized around these topics and specifically focuses on fire, invasive plant species and their effects on altering fire regimes, restoration, sagebrush and greater sage-grouse (Centrocercus urophasianus), and climate and weather.

  2. A reliable DNA barcode reference library for the identification of the North European shelf fish fauna.

    PubMed

    Knebelsberger, Thomas; Landi, Monica; Neumann, Hermann; Kloppmann, Matthias; Sell, Anne F; Campbell, Patrick D; Laakmann, Silke; Raupach, Michael J; Carvalho, Gary R; Costa, Filipe O

    2014-09-01

    Valid fish species identification is an essential step both for fundamental science and fisheries management. The traditional identification is mainly based on external morphological diagnostic characters, leading to inconsistent results in many cases. Here, we provide a sequence reference library based on mitochondrial cytochrome c oxidase subunit I (COI) for a valid identification of 93 North Atlantic fish species originating from the North Sea and adjacent waters, including many commercially exploited species. Neighbour-joining analysis based on K2P genetic distances formed nonoverlapping clusters for all species with a ≥99% bootstrap support each. Identification was successful for 100% of the species as the minimum genetic distance to the nearest neighbour always exceeded the maximum intraspecific distance. A barcoding gap was apparent for the whole data set. Within-species distances ranged from 0 to 2.35%, while interspecific distances varied between 3.15 and 28.09%. Distances between congeners were on average 51-fold higher than those within species. The validation of the sequence library by applying BOLDs barcode index number (BIN) analysis tool and a ranking system demonstrated high taxonomic reliability of the DNA barcodes for 85% of the investigated fish species. Thus, the sequence library presented here can be confidently used as a benchmark for identification of at least two-thirds of the typical fish species recorded for the North Sea. © 2014 John Wiley & Sons Ltd.

  3. An ecology-oriented exploitation mode of groundwater resources in the northern Tianshan Mountains, China

    NASA Astrophysics Data System (ADS)

    Shang, Haimin; Wang, Wenke; Dai, Zhenxue; Duan, Lei; Zhao, Yaqian; Zhang, Jing

    2016-12-01

    In recent years, ecological degradation caused by irrational groundwater exploitation has been of growing concern in arid and semiarid regions. To address the groundwater-ecological issues, this paper proposes a groundwater-resource exploitation mode to evaluate the tradeoff between groundwater development and ecological environment in the northern Tianshan Mountains, northwest China's Xinjiang Uygur Autonomous Region. Field surveys and remote sensing studies were conducted to analyze the relation between the distribution of hydrological conditions and the occurrence of ecological types. The results show that there is a good correlation between groundwater depth and the supergene ecological type. Numerical simulations and ecological assessment models were applied to develop an ecology-oriented exploitation mode of groundwater resources. The mode allows the groundwater levels in different zones to be regulated by optimizing groundwater exploitation modes. The prediction results show that the supergene ecological quality will be better in 2020 and even more groundwater can be exploited in this mode. This study provides guidance for regional groundwater management, especially in regions with an obvious water scarcity.

  4. Making the Case for Early Identification and Intervention for Young Children at Risk for Learning Disabilities

    ERIC Educational Resources Information Center

    Steele, Marcee M.

    2004-01-01

    The early identification of children with learning disabilities (LD) is difficult but can be accomplished. Observation of key behaviors which are indicators of LD by preschool and kindergarten teachers can assist in this process. This early identification facilitates the use of intervention strategies to provide a positive early experience for…

  5. Human-Assisted Machine Information Exploitation: a crowdsourced investigation of information-based problem solving

    NASA Astrophysics Data System (ADS)

    Kase, Sue E.; Vanni, Michelle; Caylor, Justine; Hoye, Jeff

    2017-05-01

    The Human-Assisted Machine Information Exploitation (HAMIE) investigation utilizes large-scale online data collection for developing models of information-based problem solving (IBPS) behavior in a simulated time-critical operational environment. These types of environments are characteristic of intelligence workflow processes conducted during human-geo-political unrest situations when the ability to make the best decision at the right time ensures strategic overmatch. The project takes a systems approach to Human Information Interaction (HII) by harnessing the expertise of crowds to model the interaction of the information consumer and the information required to solve a problem at different levels of system restrictiveness and decisional guidance. The design variables derived from Decision Support Systems (DSS) research represent the experimental conditions in this online single-player against-the-clock game where the player, acting in the role of an intelligence analyst, is tasked with a Commander's Critical Information Requirement (CCIR) in an information overload scenario. The player performs a sequence of three information processing tasks (annotation, relation identification, and link diagram formation) with the assistance of `HAMIE the robot' who offers varying levels of information understanding dependent on question complexity. We provide preliminary results from a pilot study conducted with Amazon Mechanical Turk (AMT) participants on the Volunteer Science scientific research platform.

  6. Strategies for a permanent lunar base

    NASA Technical Reports Server (NTRS)

    Duke, M. B.; Mendell, W. W.; Roberts, B. B.

    1985-01-01

    One or more of three possible objectives, encompassing scientific research, lunar resource exploitation for space infrastructure construction, and lunar environment self-sufficiency refinement with a view to future planetary habitation, may be the purpose of manned lunar base activities. Attention is presently given to the possibility that the early phases of all three lunar base orientations may be developed in such a way as to share the greatest number of common elements. An evaluation is made of the cost and complexity of the lunar base, and the Space Transportation System used in conjunction with it, as functions of long term base use strategy.

  7. Some Problems of Exploitation of Jet Turbine Aircraft Engines of Lot Polish Air Lines,

    DTIC Science & Technology

    1977-04-26

    CI ‘AD~AOII6 221 FOREIGN TECHNOLOGY DIV WR IGHT—PATTERSON AFB OHIO F/I 21/5SOME PROBLEMS OF EXPLOITATION OF JET TURBINE AIRCRAFT ENGINES O—CTC(U...EXPLOITATION OF JET TURBINE AIRCRAFT ENGINES OF LOT POLISH AIR LINE S By: Andrzej Slodownik English pages: 1~ Source: Technika Lotnicza I Astronautyczna...SOME PROBLEMS OF EXPLOITATION OF JET TURBINE AIRCRAFT ENGINES OF LOT POLISH AIR LINES Andrzej Slodownik , M. Eng . FTD— ID ( RS) I— 0 1475 — 77 I

  8. Biosonar navigation above water II: exploiting mirror images.

    PubMed

    Genzel, Daria; Hoffmann, Susanne; Prosch, Selina; Firzlaff, Uwe; Wiegrebe, Lutz

    2015-02-15

    As in vision, acoustic signals can be reflected by a smooth surface creating an acoustic mirror image. Water bodies represent the only naturally occurring horizontal and acoustically smooth surfaces. Echolocating bats flying over smooth water bodies encounter echo-acoustic mirror images of objects above the surface. Here, we combined an electrophysiological approach with a behavioral experimental paradigm to investigate whether bats can exploit echo-acoustic mirror images for navigation and how these mirrorlike echo-acoustic cues are encoded in their auditory cortex. In an obstacle-avoidance task where the obstacles could only be detected via their echo-acoustic mirror images, most bats spontaneously exploited these cues for navigation. Sonar ensonifications along the bats' flight path revealed conspicuous changes of the reflection patterns with slightly increased target strengths at relatively long echo delays corresponding to the longer acoustic paths from the mirrored obstacles. Recordings of cortical spatiotemporal response maps (STRMs) describe the tuning of a unit across the dimensions of elevation and time. The majority of cortical single and multiunits showed a special spatiotemporal pattern of excitatory areas in their STRM indicating a preference for echoes with (relative to the setup dimensions) long delays and, interestingly, from low elevations. This neural preference could effectively encode a reflection pattern as it would be perceived by an echolocating bat detecting an object mirrored from below. The current study provides both behavioral and neurophysiological evidence that echo-acoustic mirror images can be exploited by bats for obstacle avoidance. This capability effectively supports echo-acoustic navigation in highly cluttered natural habitats. Copyright © 2015 the American Physiological Society.

  9. Novel optical strategies for biodetection

    NASA Astrophysics Data System (ADS)

    Sakamuri, Rama M.; Wolfenden, Mark S.; Anderson, Aaron S.; Swanson, Basil I.; Schmidt, Jurgen S.; Mukundan, Harshini

    2013-09-01

    Although bio-detection strategies have significantly evolved in the past decade, they still suffer from many disadvantages. For one, current approaches still require confirmation of pathogen viability by culture, which is the `gold-standard' method, and can take several days to result. Second, current methods typically target protein and nucleic acid signatures and cannot be applied to other biochemical categories of biomarkers (e.g.; lipidated sugars). Lipidated sugars (e.g.; lipopolysaccharide, lipoarabinomannan) are bacterial virulence factors that are significant to pathogenicity. Herein, we present two different optical strategies for biodetection to address these two limitations. We have exploited bacterial iron sequestration mechanisms to develop a simple, specific assay for the selective detection of viable bacteria, without the need for culture. We are currently working on the use of this technology for the differential detection of two different bacteria, using siderophores. Second, we have developed a novel strategy termed `membrane insertion' for the detection of amphiphilic biomarkers (e.g. lipidated glycans) that cannot be detected by conventional approaches. We have extended this technology to the detection of small molecule amphiphilic virulence factors, such as phenolic glycolipid-1 from leprosy, which could not be directly detected before. Together, these strategies address two critical limitations in current biodetection approaches. We are currently working on the optimization of these methods, and their extension to real-world clinical samples.

  10. Identification and rejection of pile-up jets at high pseudorapidity with the ATLAS detector

    NASA Astrophysics Data System (ADS)

    Aaboud, M.; Aad, G.; Abbott, B.; Abdallah, J.; Abdinov, O.; Abeloos, B.; Abidi, S. H.; AbouZeid, O. S.; Abraham, N. L.; Abramowicz, H.; Abreu, H.; Abreu, R.; Abulaiti, Y.; Acharya, B. S.; Adachi, S.; Adamczyk, L.; Adelman, J.; Adersberger, M.; Adye, T.; Affolder, A. A.; Agatonovic-Jovin, T.; Agheorghiesei, C.; Aguilar-Saavedra, J. A.; Ahlen, S. P.; Ahmadov, F.; Aielli, G.; Akatsuka, S.; Akerstedt, H.; Åkesson, T. P. A.; Akilli, E.; Akimov, A. V.; Alberghi, G. L.; Albert, J.; Albicocco, P.; Verzini, M. J. Alconada; Aleksa, M.; Aleksandrov, I. N.; Alexa, C.; Alexander, G.; Alexopoulos, T.; Alhroob, M.; Ali, B.; Aliev, M.; Alimonti, G.; Alison, J.; Alkire, S. P.; Allbrooke, B. M. M.; Allen, B. W.; Allport, P. P.; Aloisio, A.; Alonso, A.; Alonso, F.; Alpigiani, C.; Alshehri, A. A.; Alstaty, M.; Gonzalez, B. Alvarez; Piqueras, D. Álvarez; Alviggi, M. G.; Amadio, B. T.; Coutinho, Y. Amaral; Amelung, C.; Amidei, D.; Santos, S. P. Amor Dos; Amorim, A.; Amoroso, S.; Amundsen, G.; Anastopoulos, C.; Ancu, L. S.; Andari, N.; Andeen, T.; Anders, C. F.; Anders, J. K.; Anderson, K. J.; Andreazza, A.; Andrei, V.; Angelidakis, S.; Angelozzi, I.; Angerami, A.; Anisenkov, A. V.; Anjos, N.; Annovi, A.; Antel, C.; Antonelli, M.; Antonov, A.; Antrim, D. J.; Anulli, F.; Aoki, M.; Bella, L. Aperio; Arabidze, G.; Arai, Y.; Araque, J. P.; Ferraz, V. Araujo; Arce, A. T. H.; Ardell, R. E.; Arduh, F. A.; Arguin, J.-F.; Argyropoulos, S.; Arik, M.; Armbruster, A. J.; Armitage, L. J.; Arnaez, O.; Arnold, H.; Arratia, M.; Arslan, O.; Artamonov, A.; Artoni, G.; Artz, S.; Asai, S.; Asbah, N.; Ashkenazi, A.; Asquith, L.; Assamagan, K.; Astalos, R.; Atkinson, M.; Atlay, N. B.; Augsten, K.; Avolio, G.; Axen, B.; Ayoub, M. K.; Azuelos, G.; Baas, A. E.; Baca, M. J.; Bachacou, H.; Bachas, K.; Backes, M.; Backhaus, M.; Bagnaia, P.; Bahrasemani, H.; Baines, J. T.; Bajic, M.; Baker, O. K.; Baldin, E. M.; Balek, P.; Balli, F.; Balunas, W. K.; Banas, E.; Banerjee, Sw.; Bannoura, A. A. E.; Barak, L.; Barberio, E. L.; Barberis, D.; Barbero, M.; Barillari, T.; Barisits, M.-S.; Barklow, T.; Barlow, N.; Barnes, S. L.; Barnett, B. M.; Barnett, R. M.; Barnovska-Blenessy, Z.; Baroncelli, A.; Barone, G.; Barr, A. J.; Navarro, L. Barranco; Barreiro, F.; da Costa, J. Barreiro Guimarães; Bartoldus, R.; Barton, A. E.; Bartos, P.; Basalaev, A.; Bassalat, A.; Bates, R. L.; Batista, S. J.; Batley, J. R.; Battaglia, M.; Bauce, M.; Bauer, F.; Bawa, H. S.; Beacham, J. B.; Beattie, M. D.; Beau, T.; Beauchemin, P. H.; Bechtle, P.; Beck, H. P.; Becker, K.; Becker, M.; Beckingham, M.; Becot, C.; Beddall, A. J.; Beddall, A.; Bednyakov, V. A.; Bedognetti, M.; Bee, C. P.; Beermann, T. A.; Begalli, M.; Begel, M.; Behr, J. K.; Bell, A. S.; Bella, G.; Bellagamba, L.; Bellerive, A.; Bellomo, M.; Belotskiy, K.; Beltramello, O.; Belyaev, N. L.; Benary, O.; Benchekroun, D.; Bender, M.; Bendtz, K.; Benekos, N.; Benhammou, Y.; Noccioli, E. Benhar; Benitez, J.; Benjamin, D. P.; Benoit, M.; Bensinger, J. R.; Bentvelsen, S.; Beresford, L.; Beretta, M.; Berge, D.; Kuutmann, E. Bergeaas; Berger, N.; Beringer, J.; Berlendis, S.; Bernard, N. R.; Bernardi, G.; Bernius, C.; Bernlochner, F. U.; Berry, T.; Berta, P.; Bertella, C.; Bertoli, G.; Bertolucci, F.; Bertram, I. A.; Bertsche, C.; Bertsche, D.; Besjes, G. J.; Bylund, O. Bessidskaia; Bessner, M.; Besson, N.; Betancourt, C.; Bethani, A.; Bethke, S.; Bevan, A. J.; Beyer, J.; Bianchi, R. M.; Biebel, O.; Biedermann, D.; Bielski, R.; Biesuz, N. V.; Biglietti, M.; De Mendizabal, J. Bilbao; Billoud, T. R. V.; Bilokon, H.; Bindi, M.; Bingul, A.; Bini, C.; Biondi, S.; Bisanz, T.; Bittrich, C.; Bjergaard, D. M.; Black, C. W.; Black, J. E.; Black, K. M.; Blair, R. E.; Blazek, T.; Bloch, I.; Blocker, C.; Blue, A.; Blum, W.; Blumenschein, U.; Blunier, S.; Bobbink, G. J.; Bobrovnikov, V. S.; Bocchetta, S. S.; Bocci, A.; Bock, C.; Boehler, M.; Boerner, D.; Bogavac, D.; Bogdanchikov, A. G.; Bohm, C.; Boisvert, V.; Bokan, P.; Bold, T.; Boldyrev, A. S.; Bolz, A. E.; Bomben, M.; Bona, M.; Boonekamp, M.; Borisov, A.; Borissov, G.; Bortfeldt, J.; Bortoletto, D.; Bortolotto, V.; Boscherini, D.; Bosman, M.; Sola, J. D. Bossio; Boudreau, J.; Bouffard, J.; Bouhova-Thacker, E. V.; Boumediene, D.; Bourdarios, C.; Boutle, S. K.; Boveia, A.; Boyd, J.; Boyko, I. R.; Bracinik, J.; Brandt, A.; Brandt, G.; Brandt, O.; Bratzler, U.; Brau, B.; Brau, J. E.; Madden, W. D. Breaden; Brendlinger, K.; Brennan, A. J.; Brenner, L.; Brenner, R.; Bressler, S.; Briglin, D. L.; Bristow, T. M.; Britton, D.; Britzger, D.; Brochu, F. M.; Brock, I.; Brock, R.; Brooijmans, G.; Brooks, T.; Brooks, W. K.; Brosamer, J.; Brost, E.; Broughton, J. H.; de Renstrom, P. A. Bruckman; Bruncko, D.; Bruni, A.; Bruni, G.; Bruni, L. S.; Brunt, BH; Bruschi, M.; Bruscino, N.; Bryant, P.; Bryngemark, L.; Buanes, T.; Buat, Q.; Buchholz, P.; Buckley, A. G.; Budagov, I. A.; Buehrer, F.; Bugge, M. K.; Bulekov, O.; Bullock, D.; Burch, T. J.; Burckhart, H.; Burdin, S.; Burgard, C. D.; Burger, A. M.; Burghgrave, B.; Burka, K.; Burke, S.; Burmeister, I.; Burr, J. T. P.; Busato, E.; Büscher, D.; Büscher, V.; Bussey, P.; Butler, J. M.; Buttar, C. M.; Butterworth, J. M.; Butti, P.; Buttinger, W.; Buzatu, A.; Buzykaev, A. R.; Urbán, S. Cabrera; Caforio, D.; Cairo, V. M.; Cakir, O.; Calace, N.; Calafiura, P.; Calandri, A.; Calderini, G.; Calfayan, P.; Callea, G.; Caloba, L. P.; Lopez, S. Calvente; Calvet, D.; Calvet, S.; Calvet, T. P.; Toro, R. Camacho; Camarda, S.; Camarri, P.; Cameron, D.; Armadans, R. Caminal; Camincher, C.; Campana, S.; Campanelli, M.; Camplani, A.; Campoverde, A.; Canale, V.; Bret, M. Cano; Cantero, J.; Cao, T.; Garrido, M. D. M. Capeans; Caprini, I.; Caprini, M.; Capua, M.; Carbone, R. M.; Cardarelli, R.; Cardillo, F.; Carli, I.; Carli, T.; Carlino, G.; Carlson, B. T.; Carminati, L.; Carney, R. M. D.; Caron, S.; Carquin, E.; Carrá, S.; Carrillo-Montoya, G. D.; Carvalho, J.; Casadei, D.; Casado, M. P.; Casolino, M.; Casper, D. W.; Castelijn, R.; Gimenez, V. Castillo; Castro, N. F.; Catinaccio, A.; Catmore, J. R.; Cattai, A.; Caudron, J.; Cavaliere, V.; Cavallaro, E.; Cavalli, D.; Cavalli-Sforza, M.; Cavasinni, V.; Celebi, E.; Ceradini, F.; Alberich, L. Cerda; Cerqueira, A. S.; Cerri, A.; Cerrito, L.; Cerutti, F.; Cervelli, A.; Cetin, S. A.; Chafaq, A.; Chakraborty, D.; Chan, S. K.; Chan, W. S.; Chan, Y. L.; Chang, P.; Chapman, J. D.; Charlton, D. G.; Chau, C. C.; Barajas, C. A. Chavez; Che, S.; Cheatham, S.; Chegwidden, A.; Chekanov, S.; Chekulaev, S. V.; Chelkov, G. A.; Chelstowska, M. A.; Chen, C.; Chen, H.; Chen, S.; Chen, S.; Chen, X.; Chen, Y.; Cheng, H. C.; Cheng, H. J.; Cheplakov, A.; Cheremushkina, E.; Moursli, R. Cherkaoui El; Chernyatin, V.; Cheu, E.; Chevalier, L.; Chiarella, V.; Chiarelli, G.; Chiodini, G.; Chisholm, A. S.; Chitan, A.; Chiu, Y. H.; Chizhov, M. V.; Choi, K.; Chomont, A. R.; Chouridou, S.; Christodoulou, V.; Chromek-Burckhart, D.; Chu, M. C.; Chudoba, J.; Chuinard, A. J.; Chwastowski, J. J.; Chytka, L.; Ciftci, A. K.; Cinca, D.; Cindro, V.; Cioara, I. A.; Ciocca, C.; Ciocio, A.; Cirotto, F.; Citron, Z. H.; Citterio, M.; Ciubancan, M.; Clark, A.; Clark, B. L.; Clark, M. R.; Clark, P. J.; Clarke, R. N.; Clement, C.; Coadou, Y.; Cobal, M.; Coccaro, A.; Cochran, J.; Colasurdo, L.; Cole, B.; Colijn, A. P.; Collot, J.; Colombo, T.; Muiño, P. Conde; Coniavitis, E.; Connell, S. H.; Connelly, I. A.; Constantinescu, S.; Conti, G.; Conventi, F.; Cooke, M.; Cooper-Sarkar, A. M.; Cormier, F.; Cormier, K. J. R.; Corradi, M.; Corriveau, F.; Cortes-Gonzalez, A.; Cortiana, G.; Costa, G.; Costa, M. J.; Costanzo, D.; Cottin, G.; Cowan, G.; Cox, B. E.; Cranmer, K.; Crawley, S. J.; Creager, R. A.; Cree, G.; Crépé-Renaudin, S.; Crescioli, F.; Cribbs, W. A.; Cristinziani, M.; Croft, V.; Crosetti, G.; Cueto, A.; Donszelmann, T. Cuhadar; Cukierman, A. R.; Cummings, J.; Curatolo, M.; Cúth, J.; Czirr, H.; Czodrowski, P.; D'amen, G.; D'Auria, S.; D'eramo, L.; D'Onofrio, M.; De Sousa, M. J. Da Cunha Sargedas; Via, C. Da; Dabrowski, W.; Dado, T.; Dai, T.; Dale, O.; Dallaire, F.; Dallapiccola, C.; Dam, M.; Dandoy, J. R.; Daneri, M. F.; Dang, N. P.; Daniells, A. C.; Dann, N. S.; Danninger, M.; Hoffmann, M. Dano; Dao, V.; Darbo, G.; Darmora, S.; Dassoulas, J.; Dattagupta, A.; Daubney, T.; Davey, W.; David, C.; Davidek, T.; Davies, M.; Davis, D. R.; Davison, P.; Dawe, E.; Dawson, I.; De, K.; de Asmundis, R.; De Benedetti, A.; De Castro, S.; De Cecco, S.; De Groot, N.; de Jong, P.; De la Torre, H.; De Lorenzi, F.; De Maria, A.; De Pedis, D.; De Salvo, A.; De Sanctis, U.; De Santo, A.; Corga, K. De Vasconcelos; De Regie, J. B. De Vivie; Dearnaley, W. J.; Debbe, R.; Debenedetti, C.; Dedovich, D. V.; Dehghanian, N.; Deigaard, I.; Del Gaudio, M.; Del Peso, J.; Del Prete, T.; Delgove, D.; Deliot, F.; Delitzsch, C. M.; Dell'Acqua, A.; Dell'Asta, L.; Dell'Orso, M.; Della Pietra, M.; della Volpe, D.; Delmastro, M.; Delporte, C.; Delsart, P. A.; DeMarco, D. A.; Demers, S.; Demichev, M.; Demilly, A.; Denisov, S. P.; Denysiuk, D.; Derendarz, D.; Derkaoui, J. E.; Derue, F.; Dervan, P.; Desch, K.; Deterre, C.; Dette, K.; Devesa, M. R.; Deviveiros, P. O.; Dewhurst, A.; Dhaliwal, S.; Di Bello, F. A.; Di Ciaccio, A.; Di Ciaccio, L.; Di Clemente, W. K.; Di Donato, C.; Di Girolamo, A.; Di Girolamo, B.; Di Micco, B.; Di Nardo, R.; Di Petrillo, K. F.; Di Simone, A.; Di Sipio, R.; Di Valentino, D.; Diaconu, C.; Diamond, M.; Dias, F. A.; Diaz, M. A.; Diehl, E. B.; Dietrich, J.; Cornell, S. Díez; Dimitrievska, A.; Dingfelder, J.; Dita, P.; Dita, S.; Dittus, F.; Djama, F.; Djobava, T.; Djuvsland, J. I.; do Vale, M. A. B.; Dobos, D.; Dobre, M.; Doglioni, C.; Dolejsi, J.; Dolezal, Z.; Donadelli, M.; Donati, S.; Dondero, P.; Donini, J.; Dopke, J.; Doria, A.; Dova, M. T.; Doyle, A. T.; Drechsler, E.; Dris, M.; Du, Y.; Duarte-Campderros, J.; Dubreuil, A.; Duchovni, E.; Duckeck, G.; Ducourthial, A.; Ducu, O. A.; Duda, D.; Dudarev, A.; Dudder, A. Chr.; Duffield, E. M.; Duflot, L.; Dührssen, M.; Dumancic, M.; Dumitriu, A. E.; Duncan, A. K.; Dunford, M.; Yildiz, H. Duran; Düren, M.; Durglishvili, A.; Duschinger, D.; Dutta, B.; Dyndal, M.; Eckardt, C.; Ecker, K. M.; Edgar, R. C.; Eifert, T.; Eigen, G.; Einsweiler, K.; Ekelof, T.; Kacimi, M. El; Kosseifi, R. El; Ellajosyula, V.; Ellert, M.; Elles, S.; Ellinghaus, F.; Elliot, A. A.; Ellis, N.; Elmsheuser, J.; Elsing, M.; Emeliyanov, D.; Enari, Y.; Endner, O. C.; Ennis, J. S.; Erdmann, J.; Ereditato, A.; Ernis, G.; Ernst, M.; Errede, S.; Escalier, M.; Escobar, C.; Esposito, B.; Pastor, O. Estrada; Etienvre, A. I.; Etzion, E.; Evans, H.; Ezhilov, A.; Ezzi, M.; Fabbri, F.; Fabbri, L.; Facini, G.; Fakhrutdinov, R. M.; Falciano, S.; Falla, R. J.; Faltova, J.; Fang, Y.; Fanti, M.; Farbin, A.; Farilla, A.; Farina, C.; Farina, E. M.; Farooque, T.; Farrell, S.; Farrington, S. M.; Farthouat, P.; Fassi, F.; Fassnacht, P.; Fassouliotis, D.; Giannelli, M. Faucci; Favareto, A.; Fawcett, W. J.; Fayard, L.; Fedin, O. L.; Fedorko, W.; Feigl, S.; Feligioni, L.; Feng, C.; Feng, E. J.; Feng, H.; Fenton, M. J.; Fenyuk, A. B.; Feremenga, L.; Martinez, P. Fernandez; Perez, S. Fernandez; Ferrando, J.; Ferrari, A.; Ferrari, P.; Ferrari, R.; de Lima, D. E. Ferreira; Ferrer, A.; Ferrere, D.; Ferretti, C.; Fiedler, F.; Filipčič, A.; Filipuzzi, M.; Filthaut, F.; Fincke-Keeler, M.; Finelli, K. D.; Fiolhais, M. C. N.; Fiorini, L.; Fischer, A.; Fischer, C.; Fischer, J.; Fisher, W. C.; Flaschel, N.; Fleck, I.; Fleischmann, P.; Fletcher, R. R. M.; Flick, T.; Flierl, B. M.; Castillo, L. R. Flores; Flowerdew, M. J.; Forcolin, G. T.; Formica, A.; Förster, F. A.; Forti, A.; Foster, A. G.; Fournier, D.; Fox, H.; Fracchia, S.; Francavilla, P.; Franchini, M.; Franchino, S.; Francis, D.; Franconi, L.; Franklin, M.; Frate, M.; Fraternali, M.; Freeborn, D.; Fressard-Batraneanu, S. M.; Freund, B.; Froidevaux, D.; Frost, J. A.; Fukunaga, C.; Fusayasu, T.; Fuster, J.; Gabaldon, C.; Gabizon, O.; Gabrielli, A.; Gabrielli, A.; Gach, G. P.; Gadatsch, S.; Gadomski, S.; Gagliardi, G.; Gagnon, L. G.; Galea, C.; Galhardo, B.; Gallas, E. J.; Gallop, B. J.; Gallus, P.; Galster, G.; Gan, K. K.; Ganguly, S.; Gao, Y.; Gao, Y. S.; Walls, F. M. Garay; García, C.; Navarro, J. E. García; Garcia-Sciveres, M.; Gardner, R. W.; Garelli, N.; Garonne, V.; Bravo, A. Gascon; Gasnikova, K.; Gatti, C.; Gaudiello, A.; Gaudio, G.; Gavrilenko, I. L.; Gay, C.; Gaycken, G.; Gazis, E. N.; Gee, C. N. P.; Geisen, J.; Geisen, M.; Geisler, M. P.; Gellerstedt, K.; Gemme, C.; Genest, M. H.; Geng, C.; Gentile, S.; Gentsos, C.; George, S.; Gerbaudo, D.; Gershon, A.; Geßner, G.; Ghasemi, S.; Ghneimat, M.; Giacobbe, B.; Giagu, S.; Giannetti, P.; Gibson, S. M.; Gignac, M.; Gilchriese, M.; Gillberg, D.; Gilles, G.; Gingrich, D. M.; Giokaris, N.; Giordani, M. P.; Giorgi, F. M.; Giraud, P. F.; Giromini, P.; Giugni, D.; Giuli, F.; Giuliani, C.; Giulini, M.; Gjelsten, B. K.; Gkaitatzis, S.; Gkialas, I.; Gkougkousis, E. L.; Gkountoumis, P.; Gladilin, L. K.; Glasman, C.; Glatzer, J.; Glaysher, P. C. F.; Glazov, A.; Goblirsch-Kolb, M.; Godlewski, J.; Goldfarb, S.; Golling, T.; Golubkov, D.; Gomes, A.; Gonçalo, R.; Gama, R. Goncalves; Costa, J. Goncalves Pinto Firmino Da; Gonella, G.; Gonella, L.; Gongadze, A.; de la Hoz, S. González; Gonzalez-Sevilla, S.; Goossens, L.; Gorbounov, P. A.; Gordon, H. A.; Gorelov, I.; Gorini, B.; Gorini, E.; Gorišek, A.; Goshaw, A. T.; Gössling, C.; Gostkin, M. I.; Gottardo, C. A.; Goudet, C. R.; Goujdami, D.; Goussiou, A. G.; Govender, N.; Gozani, E.; Graber, L.; Grabowska-Bold, I.; Gradin, P. O. J.; Gramling, J.; Gramstad, E.; Grancagnolo, S.; Gratchev, V.; Gravila, P. M.; Gray, C.; Gray, H. M.; Greenwood, Z. D.; Grefe, C.; Gregersen, K.; Gregor, I. M.; Grenier, P.; Grevtsov, K.; Griffiths, J.; Grillo, A. A.; Grimm, K.; Grinstein, S.; Gris, Ph.; Grivaz, J.-F.; Groh, S.; Gross, E.; Grosse-Knetter, J.; Grossi, G. C.; Grout, Z. J.; Grummer, A.; Guan, L.; Guan, W.; Guenther, J.; Guescini, F.; Guest, D.; Gueta, O.; Gui, B.; Guido, E.; Guillemin, T.; Guindon, S.; Gul, U.; Gumpert, C.; Guo, J.; Guo, W.; Guo, Y.; Gupta, R.; Gupta, S.; Gustavino, G.; Gutierrez, P.; Ortiz, N. G. Gutierrez; Gutschow, C.; Guyot, C.; Guzik, M. P.; Gwenlan, C.; Gwilliam, C. B.; Haas, A.; Haber, C.; Hadavand, H. K.; Haddad, N.; Hadef, A.; Hageböck, S.; Hagihara, M.; Hakobyan, H.; Haleem, M.; Haley, J.; Halladjian, G.; Hallewell, G. D.; Hamacher, K.; Hamal, P.; Hamano, K.; Hamilton, A.; Hamity, G. N.; Hamnett, P. G.; Han, L.; Han, S.; Hanagaki, K.; Hanawa, K.; Hance, M.; Haney, B.; Hanke, P.; Hansen, J. B.; Hansen, J. D.; Hansen, M. C.; Hansen, P. H.; Hara, K.; Hard, A. S.; Harenberg, T.; Hariri, F.; Harkusha, S.; Harrington, R. D.; Harrison, P. F.; Hartmann, N. M.; Hasegawa, M.; Hasegawa, Y.; Hasib, A.; Hassani, S.; Haug, S.; Hauser, R.; Hauswald, L.; Havener, L. B.; Havranek, M.; Hawkes, C. M.; Hawkings, R. J.; Hayakawa, D.; Hayden, D.; Hays, C. P.; Hays, J. M.; Hayward, H. S.; Haywood, S. J.; Head, S. J.; Heck, T.; Hedberg, V.; Heelan, L.; Heidegger, K. K.; Heim, S.; Heim, T.; Heinemann, B.; Heinrich, J. J.; Heinrich, L.; Heinz, C.; Hejbal, J.; Helary, L.; Held, A.; Hellman, S.; Helsens, C.; Henderson, R. C. W.; Heng, Y.; Henkelmann, S.; Correia, A. M. Henriques; Henrot-Versille, S.; Herbert, G. H.; Herde, H.; Herget, V.; Jiménez, Y. Hernández; Herr, H.; Herten, G.; Hertenberger, R.; Hervas, L.; Herwig, T. C.; Hesketh, G. G.; Hessey, N. P.; Hetherly, J. W.; Higashino, S.; Higón-Rodriguez, E.; Hill, E.; Hill, J. C.; Hiller, K. H.; Hillier, S. J.; Hils, M.; Hinchliffe, I.; Hirose, M.; Hirschbuehl, D.; Hiti, B.; Hladik, O.; Hoad, X.; Hobbs, J.; Hod, N.; Hodgkinson, M. C.; Hodgson, P.; Hoecker, A.; Hoeferkamp, M. R.; Hoenig, F.; Hohn, D.; Holmes, T. R.; Homann, M.; Honda, S.; Honda, T.; Hong, T. M.; Hooberman, B. H.; Hopkins, W. H.; Horii, Y.; Horton, A. J.; Hostachy, J.-Y.; Hou, S.; Hoummada, A.; Howarth, J.; Hoya, J.; Hrabovsky, M.; Hrdinka, J.; Hristova, I.; Hrivnac, J.; Hryn'ova, T.; Hrynevich, A.; Hsu, P. J.; Hsu, S.-C.; Hu, Q.; Hu, S.; Huang, Y.; Hubacek, Z.; Hubaut, F.; Huegging, F.; Huffman, T. B.; Hughes, E. W.; Hughes, G.; Huhtinen, M.; Huo, P.; Huseynov, N.; Huston, J.; Huth, J.; Iacobucci, G.; Iakovidis, G.; Ibragimov, I.; Iconomidou-Fayard, L.; Idrissi, Z.; Iengo, P.; Igonkina, O.; Iizawa, T.; Ikegami, Y.; Ikeno, M.; Ilchenko, Y.; Iliadis, D.; Ilic, N.; Introzzi, G.; Ioannou, P.; Iodice, M.; Iordanidou, K.; Ippolito, V.; Isacson, M. F.; Ishijima, N.; Ishino, M.; Ishitsuka, M.; Issever, C.; Istin, S.; Ito, F.; Ponce, J. M. Iturbe; Iuppa, R.; Iwasaki, H.; Izen, J. M.; Izzo, V.; Jabbar, S.; Jackson, P.; Jacobs, R. M.; Jain, V.; Jakobi, K. B.; Jakobs, K.; Jakobsen, S.; Jakoubek, T.; Jamin, D. O.; Jana, D. K.; Jansky, R.; Janssen, J.; Janus, M.; Janus, P. A.; Jarlskog, G.; Javadov, N.; Javůrek, T.; Javurkova, M.; Jeanneau, F.; Jeanty, L.; Jejelava, J.; Jelinskas, A.; Jenni, P.; Jeske, C.; Jézéquel, S.; Ji, H.; Jia, J.; Jiang, H.; Jiang, Y.; Jiang, Z.; Jiggins, S.; Pena, J. Jimenez; Jin, S.; Jinaru, A.; Jinnouchi, O.; Jivan, H.; Johansson, P.; Johns, K. A.; Johnson, C. A.; Johnson, W. J.; Jon-And, K.; Jones, R. W. L.; Jones, S. D.; Jones, S.; Jones, T. J.; Jongmanns, J.; Jorge, P. M.; Jovicevic, J.; Ju, X.; Rozas, A. Juste; Köhler, M. K.; Kaczmarska, A.; Kado, M.; Kagan, H.; Kagan, M.; Kahn, S. J.; Kaji, T.; Kajomovitz, E.; Kalderon, C. W.; Kaluza, A.; Kama, S.; Kamenshchikov, A.; Kanaya, N.; Kanjir, L.; Kantserov, V. A.; Kanzaki, J.; Kaplan, B.; Kaplan, L. S.; Kar, D.; Karakostas, K.; Karastathis, N.; Kareem, M. J.; Karentzos, E.; Karpov, S. N.; Karpova, Z. M.; Karthik, K.; Kartvelishvili, V.; Karyukhin, A. N.; Kasahara, K.; Kashif, L.; Kass, R. D.; Kastanas, A.; Kataoka, Y.; Kato, C.; Katre, A.; Katzy, J.; Kawade, K.; Kawagoe, K.; Kawamoto, T.; Kawamura, G.; Kay, E. F.; Kazanin, V. F.; Keeler, R.; Kehoe, R.; Keller, J. S.; Kempster, J. J.; Kendrick, J.; Keoshkerian, H.; Kepka, O.; Kerševan, B. P.; Kersten, S.; Keyes, R. A.; Khader, M.; Khalil-zada, F.; Khanov, A.; Kharlamov, A. G.; Kharlamova, T.; Khodinov, A.; Khoo, T. J.; Khovanskiy, V.; Khramov, E.; Khubua, J.; Kido, S.; Kilby, C. R.; Kim, H. Y.; Kim, S. H.; Kim, Y. K.; Kimura, N.; Kind, O. M.; King, B. T.; Kirchmeier, D.; Kirk, J.; Kiryunin, A. E.; Kishimoto, T.; Kisielewska, D.; Kitali, V.; Kiuchi, K.; Kivernyk, O.; Kladiva, E.; Klapdor-Kleingrothaus, T.; Klein, M. H.; Klein, M.; Klein, U.; Kleinknecht, K.; Klimek, P.; Klimentov, A.; Klingenberg, R.; Klingl, T.; Klioutchnikova, T.; Kluge, E.-E.; Kluit, P.; Kluth, S.; Kneringer, E.; Knoops, E. B. F. G.; Knue, A.; Kobayashi, A.; Kobayashi, D.; Kobayashi, T.; Kobel, M.; Kocian, M.; Kodys, P.; Koffas, T.; Koffeman, E.; Köhler, N. M.; Koi, T.; Kolb, M.; Koletsou, I.; Komar, A. A.; Komori, Y.; Kondo, T.; Kondrashova, N.; Köneke, K.; König, A. C.; Kono, T.; Konoplich, R.; Konstantinidis, N.; Kopeliansky, R.; Koperny, S.; Kopp, A. K.; Korcyl, K.; Kordas, K.; Korn, A.; Korol, A. A.; Korolkov, I.; Korolkova, E. V.; Kortner, O.; Kortner, S.; Kosek, T.; Kostyukhin, V. V.; Kotwal, A.; Koulouris, A.; Kourkoumeli-Charalampidi, A.; Kourkoumelis, C.; Kourlitis, E.; Kouskoura, V.; Kowalewska, A. B.; Kowalewski, R.; Kowalski, T. Z.; Kozakai, C.; Kozanecki, W.; Kozhin, A. S.; Kramarenko, V. A.; Kramberger, G.; Krasnopevtsev, D.; Krasny, M. W.; Krasznahorkay, A.; Krauss, D.; Kremer, J. A.; Kretzschmar, J.; Kreutzfeldt, K.; Krieger, P.; Krizka, K.; Kroeninger, K.; Kroha, H.; Kroll, J.; Kroll, J.; Kroseberg, J.; Krstic, J.; Kruchonak, U.; Krüger, H.; Krumnack, N.; Kruse, M. C.; Kubota, T.; Kucuk, H.; Kuday, S.; Kuechler, J. T.; Kuehn, S.; Kugel, A.; Kuger, F.; Kuhl, T.; Kukhtin, V.; Kukla, R.; Kulchitsky, Y.; Kuleshov, S.; Kulinich, Y. P.; Kuna, M.; Kunigo, T.; Kupco, A.; Kupfer, T.; Kuprash, O.; Kurashige, H.; Kurchaninov, L. L.; Kurochkin, Y. A.; Kurth, M. G.; Kus, V.; Kuwertz, E. S.; Kuze, M.; Kvita, J.; Kwan, T.; Kyriazopoulos, D.; Rosa, A. La; Navarro, J. L. La Rosa; Rotonda, L. La; Lacasta, C.; Lacava, F.; Lacey, J.; Lacker, H.; Lacour, D.; Ladygin, E.; Lafaye, R.; Laforge, B.; Lagouri, T.; Lai, S.; Lammers, S.; Lampl, W.; Lançon, E.; Landgraf, U.; Landon, M. P. J.; Lanfermann, M. C.; Lang, V. S.; Lange, J. C.; Langenberg, R. J.; Lankford, A. J.; Lanni, F.; Lantzsch, K.; Lanza, A.; Lapertosa, A.; Laplace, S.; Laporte, J. F.; Lari, T.; Manghi, F. Lasagni; Lassnig, M.; Laurelli, P.; Lavrijsen, W.; Law, A. T.; Laycock, P.; Lazovich, T.; Lazzaroni, M.; Le, B.; Dortz, O. Le; Guirriec, E. Le; Quilleuc, E. P. Le; LeBlanc, M.; LeCompte, T.; Ledroit-Guillon, F.; Lee, C. A.; Lee, G. R.; Lee, S. C.; Lee, L.; Lefebvre, B.; Lefebvre, G.; Lefebvre, M.; Legger, F.; Leggett, C.; Lehan, A.; Miotto, G. Lehmann; Lei, X.; Leight, W. A.; Leite, M. A. L.; Leitner, R.; Lellouch, D.; Lemmer, B.; Leney, K. J. C.; Lenz, T.; Lenzi, B.; Leone, R.; Leone, S.; Leonidopoulos, C.; Lerner, G.; Leroy, C.; Lesage, A. A. J.; Lester, C. G.; Levchenko, M.; Levêque, J.; Levin, D.; Levinson, L. J.; Levy, M.; Lewis, D.; Li, B.; Li, Changqiao; Li, H.; Li, L.; Li, Q.; Li, S.; Li, X.; Li, Y.; Liang, Z.; Liberti, B.; Liblong, A.; Lie, K.; Liebal, J.; Liebig, W.; Limosani, A.; Lin, S. C.; Lin, T. H.; Lindquist, B. E.; Lionti, A. E.; Lipeles, E.; Lipniacka, A.; Lisovyi, M.; Liss, T. M.; Lister, A.; Litke, A. M.; Liu, B.; Liu, H.; Liu, H.; Liu, J. K. K.; Liu, J.; Liu, J. B.; Liu, K.; Liu, L.; Liu, M.; Liu, Y. L.; Liu, Y.; Livan, M.; Lleres, A.; Merino, J. Llorente; Lloyd, S. L.; Lo, C. Y.; Sterzo, F. Lo; Lobodzinska, E. M.; Loch, P.; Loebinger, F. K.; Loesle, A.; Loew, K. M.; Loginov, A.; Lohse, T.; Lohwasser, K.; Lokajicek, M.; Long, B. A.; Long, J. D.; Long, R. E.; Longo, L.; Looper, K. A.; Lopez, J. A.; Mateos, D. Lopez; Paz, I. Lopez; Solis, A. Lopez; Lorenz, J.; Martinez, N. Lorenzo; Losada, M.; Lösel, P. J.; Lou, X.; Lounis, A.; Love, J.; Love, P. A.; Lu, H.; Lu, N.; Lu, Y. J.; Lubatti, H. J.; Luci, C.; Lucotte, A.; Luedtke, C.; Luehring, F.; Lukas, W.; Luminari, L.; Lundberg, O.; Lund-Jensen, B.; Luzi, P. M.; Lynn, D.; Lysak, R.; Lytken, E.; Lyubushkin, V.; Ma, H.; Ma, L. L.; Ma, Y.; Maccarrone, G.; Macchiolo, A.; Macdonald, C. M.; Maček, B.; Miguens, J. Machado; Madaffari, D.; Madar, R.; Mader, W. F.; Madsen, A.; Maeda, J.; Maeland, S.; Maeno, T.; Maevskiy, A. S.; Magradze, E.; Mahlstedt, J.; Maiani, C.; Maidantchik, C.; Maier, A. A.; Maier, T.; Maio, A.; Majersky, O.; Majewski, S.; Makida, Y.; Makovec, N.; Malaescu, B.; Malecki, Pa.; Maleev, V. P.; Malek, F.; Mallik, U.; Malon, D.; Malone, C.; Maltezos, S.; Malyukov, S.; Mamuzic, J.; Mancini, G.; Mandelli, L.; Mandić, I.; Maneira, J.; Filho, L. Manhaes de Andrade; Ramos, J. Manjarres; Mann, A.; Manousos, A.; Mansoulie, B.; Mansour, J. D.; Mantifel, R.; Mantoani, M.; Manzoni, S.; Mapelli, L.; Marceca, G.; March, L.; Marchese, L.; Marchiori, G.; Marcisovsky, M.; Marjanovic, M.; Marley, D. E.; Marroquim, F.; Marsden, S. P.; Marshall, Z.; Martensson, M. U. F.; Marti-Garcia, S.; Martin, C. B.; Martin, T. A.; Martin, V. J.; Latour, B. Martin dit; Martinez, M.; Outschoorn, V. I. Martinez; Martin-Haugh, S.; Martoiu, V. S.; Martyniuk, A. C.; Marzin, A.; Masetti, L.; Mashimo, T.; Mashinistov, R.; Masik, J.; Maslennikov, A. L.; Massa, L.; Mastrandrea, P.; Mastroberardino, A.; Masubuchi, T.; Mättig, P.; Maurer, J.; Maxfield, S. J.; Maximov, D. A.; Mazini, R.; Maznas, I.; Mazza, S. M.; Fadden, N. C. Mc; Goldrick, G. Mc; Kee, S. P. Mc; McCarn, A.; McCarthy, R. L.; McCarthy, T. G.; McClymont, L. I.; McDonald, E. F.; Mcfayden, J. A.; Mchedlidze, G.; McMahon, S. J.; McNamara, P. C.; McPherson, R. A.; Meehan, S.; Megy, T. J.; Mehlhase, S.; Mehta, A.; Meideck, T.; Meier, K.; Meirose, B.; Melini, D.; Garcia, B. R. Mellado; Mellenthin, J. D.; Melo, M.; Meloni, F.; Menary, S. B.; Meng, L.; Meng, X. T.; Mengarelli, A.; Menke, S.; Meoni, E.; Mergelmeyer, S.; Mermod, P.; Merola, L.; Meroni, C.; Merritt, F. S.; Messina, A.; Metcalfe, J.; Mete, A. S.; Meyer, C.; Meyer, J.-P.; Meyer, J.; Theenhausen, H. Meyer Zu; Miano, F.; Middleton, R. P.; Miglioranzi, S.; Mijović, L.; Mikenberg, G.; Mikestikova, M.; Mikuž, M.; Milesi, M.; Milic, A.; Miller, D. W.; Mills, C.; Milov, A.; Milstead, D. A.; Minaenko, A. A.; Minami, Y.; Minashvili, I. A.; Mincer, A. I.; Mindur, B.; Mineev, M.; Minegishi, Y.; Ming, Y.; Mir, L. M.; Mistry, K. P.; Mitani, T.; Mitrevski, J.; Mitsou, V. A.; Miucci, A.; Miyagawa, P. S.; Mizukami, A.; Mjörnmark, J. U.; Mkrtchyan, T.; Mlynarikova, M.; Moa, T.; Mochizuki, K.; Mogg, P.; Mohapatra, S.; Molander, S.; Moles-Valls, R.; Monden, R.; Mondragon, M. C.; Mönig, K.; Monk, J.; Monnier, E.; Montalbano, A.; Berlingen, J. Montejo; Monticelli, F.; Monzani, S.; Moore, R. W.; Morange, N.; Moreno, D.; Llácer, M. Moreno; Morettini, P.; Morgenstern, S.; Mori, D.; Mori, T.; Morii, M.; Morinaga, M.; Morisbak, V.; Morley, A. K.; Mornacchi, G.; Morris, J. D.; Morvaj, L.; Moschovakos, P.; Mosidze, M.; Moss, H. J.; Moss, J.; Motohashi, K.; Mount, R.; Mountricha, E.; Moyse, E. J. W.; Muanza, S.; Mudd, R. D.; Mueller, F.; Mueller, J.; Mueller, R. S. P.; Muenstermann, D.; Mullen, P.; Mullier, G. A.; Sanchez, F. J. Munoz; Murray, W. J.; Musheghyan, H.; Muškinja, M.; Myagkov, A. G.; Myska, M.; Nachman, B. P.; Nackenhorst, O.; Nagai, K.; Nagai, R.; Nagano, K.; Nagasaka, Y.; Nagata, K.; Nagel, M.; Nagy, E.; Nairz, A. M.; Nakahama, Y.; Nakamura, K.; Nakamura, T.; Nakano, I.; Garcia, R. F. Naranjo; Narayan, R.; Villar, D. I. Narrias; Naryshkin, I.; Naumann, T.; Navarro, G.; Nayyar, R.; Neal, H. A.; Nechaeva, P. Yu.; Neep, T. J.; Negri, A.; Negrini, M.; Nektarijevic, S.; Nellist, C.; Nelson, A.; Nelson, M. E.; Nemecek, S.; Nemethy, P.; Nessi, M.; Neubauer, M. S.; Neumann, M.; Newman, P. R.; Ng, T. Y.; Manh, T. Nguyen; Nickerson, R. B.; Nicolaidou, R.; Nielsen, J.; Nikolaenko, V.; Nikolic-Audit, I.; Nikolopoulos, K.; Nilsen, J. K.; Nilsson, P.; Ninomiya, Y.; Nisati, A.; Nishu, N.; Nisius, R.; Nitsche, I.; Nobe, T.; Noguchi, Y.; Nomachi, M.; Nomidis, I.; Nomura, M. A.; Nooney, T.; Nordberg, M.; Norjoharuddeen, N.; Novgorodova, O.; Nowak, S.; Nozaki, M.; Nozka, L.; Ntekas, K.; Nurse, E.; Nuti, F.; O'connor, K.; O'Neil, D. C.; O'Rourke, A. A.; O'Shea, V.; Oakham, F. G.; Oberlack, H.; Obermann, T.; Ocariz, J.; Ochi, A.; Ochoa, I.; Ochoa-Ricoux, J. P.; Oda, S.; Odaka, S.; Ogren, H.; Oh, A.; Oh, S. H.; Ohm, C. C.; Ohman, H.; Oide, H.; Okawa, H.; Okumura, Y.; Okuyama, T.; Olariu, A.; Seabra, L. F. Oleiro; Pino, S. A. Olivares; Damazio, D. Oliveira; Olszewski, A.; Olszowska, J.; Onofre, A.; Onogi, K.; Onyisi, P. U. E.; Oreglia, M. J.; Oren, Y.; Orestano, D.; Orlando, N.; Orr, R. S.; Osculati, B.; Ospanov, R.; Garzon, G. Otero y.; Otono, H.; Ouchrif, M.; Ould-Saada, F.; Ouraou, A.; Oussoren, K. P.; Ouyang, Q.; Owen, M.; Owen, R. E.; Ozcan, V. E.; Ozturk, N.; Pachal, K.; Pages, A. Pacheco; Rodriguez, L. Pacheco; Aranda, C. Padilla; Griso, S. Pagan; Paganini, M.; Paige, F.; Palacino, G.; Palazzo, S.; Palestini, S.; Palka, M.; Pallin, D.; Panagiotopoulou, E. St.; Panagoulias, I.; Pandini, C. E.; Vazquez, J. G. Panduro; Pani, P.; Panitkin, S.; Pantea, D.; Paolozzi, L.; Papadopoulou, Th. D.; Papageorgiou, K.; Paramonov, A.; Hernandez, D. Paredes; Parker, A. J.; Parker, M. A.; Parker, K. A.; Parodi, F.; Parsons, J. A.; Parzefall, U.; Pascuzzi, V. R.; Pasner, J. M.; Pasqualucci, E.; Passaggio, S.; Pastore, Fr.; Pataraia, S.; Pater, J. R.; Pauly, T.; Pearson, B.; Lopez, S. Pedraza; Pedro, R.; Peleganchuk, S. V.; Penc, O.; Peng, C.; Peng, H.; Penwell, J.; Peralva, B. S.; Perego, M. M.; Perepelitsa, D. V.; Perini, L.; Pernegger, H.; Perrella, S.; Peschke, R.; Peshekhonov, V. D.; Peters, K.; Peters, R. F. Y.; Petersen, B. A.; Petersen, T. C.; Petit, E.; Petridis, A.; Petridou, C.; Petroff, P.; Petrolo, E.; Petrov, M.; Petrucci, F.; Pettersson, N. E.; Peyaud, A.; Pezoa, R.; Phillips, F. H.; Phillips, P. W.; Piacquadio, G.; Pianori, E.; Picazio, A.; Piccaro, E.; Pickering, M. A.; Piegaia, R.; Pilcher, J. E.; Pilkington, A. D.; Pin, A. W. J.; Pinamonti, M.; Pinfold, J. L.; Pirumov, H.; Pitt, M.; Plazak, L.; Pleier, M.-A.; Pleskot, V.; Plotnikova, E.; Pluth, D.; Podberezko, P.; Poettgen, R.; Poggi, R.; Poggioli, L.; Pohl, D.; Polesello, G.; Poley, A.; Policicchio, A.; Polifka, R.; Polini, A.; Pollard, C. S.; Polychronakos, V.; Pommès, K.; Ponomarenko, D.; Pontecorvo, L.; Pope, B. G.; Popeneciu, G. A.; Poppleton, A.; Pospisil, S.; Potamianos, K.; Potrap, I. N.; Potter, C. J.; Poulard, G.; Poulsen, T.; Poveda, J.; Astigarraga, M. E. Pozo; Pralavorio, P.; Pranko, A.; Prell, S.; Price, D.; Price, L. E.; Primavera, M.; Prince, S.; Proklova, N.; Prokofiev, K.; Prokoshin, F.; Protopopescu, S.; Proudfoot, J.; Przybycien, M.; Puri, A.; Puzo, P.; Qian, J.; Qin, G.; Qin, Y.; Quadt, A.; Queitsch-Maitland, M.; Quilty, D.; Raddum, S.; Radeka, V.; Radescu, V.; Radhakrishnan, S. K.; Radloff, P.; Rados, P.; Ragusa, F.; Rahal, G.; Raine, J. A.; Rajagopalan, S.; Rangel-Smith, C.; Rashid, T.; Raspopov, S.; Ratti, M. G.; Rauch, D. M.; Rauscher, F.; Rave, S.; Ravinovich, I.; Rawling, J. H.; Raymond, M.; Read, A. L.; Readioff, N. P.; Reale, M.; Rebuzzi, D. M.; Redelbach, A.; Redlinger, G.; Reece, R.; Reed, R. G.; Reeves, K.; Rehnisch, L.; Reichert, J.; Reiss, A.; Rembser, C.; Ren, H.; Rescigno, M.; Resconi, S.; Resseguie, E. D.; Rettie, S.; Reynolds, E.; Rezanova, O. L.; Reznicek, P.; Rezvani, R.; Richter, R.; Richter, S.; Richter-Was, E.; Ricken, O.; Ridel, M.; Rieck, P.; Riegel, C. J.; Rieger, J.; Rifki, O.; Rijssenbeek, M.; Rimoldi, A.; Rimoldi, M.; Rinaldi, L.; Ripellino, G.; Ristić, B.; Ritsch, E.; Riu, I.; Rizatdinova, F.; Rizvi, E.; Rizzi, C.; Roberts, R. T.; Robertson, S. H.; Robichaud-Veronneau, A.; Robinson, D.; Robinson, J. E. M.; Robson, A.; Rocco, E.; Roda, C.; Rodina, Y.; Bosca, S. Rodriguez; Perez, A. Rodriguez; Rodriguez, D. Rodriguez; Roe, S.; Rogan, C. S.; Røhne, O.; Roloff, J.; Romaniouk, A.; Romano, M.; Saez, S. M. Romano; Adam, E. Romero; Rompotis, N.; Ronzani, M.; Roos, L.; Rosati, S.; Rosbach, K.; Rose, P.; Rosien, N.-A.; Rossi, E.; Rossi, L. P.; Rosten, J. H. N.; Rosten, R.; Rotaru, M.; Roth, I.; Rothberg, J.; Rousseau, D.; Rozanov, A.; Rozen, Y.; Ruan, X.; Rubbo, F.; Rühr, F.; Ruiz-Martinez, A.; Rurikova, Z.; Rusakovich, N. A.; Russell, H. L.; Rutherfoord, J. P.; Ruthmann, N.; Ryabov, Y. F.; Rybar, M.; Rybkin, G.; Ryu, S.; Ryzhov, A.; Rzehorz, G. F.; Saavedra, A. F.; Sabato, G.; Sacerdoti, S.; Sadrozinski, H. F.-W.; Sadykov, R.; Tehrani, F. Safai; Saha, P.; Sahinsoy, M.; Saimpert, M.; Saito, M.; Saito, T.; Sakamoto, H.; Sakurai, Y.; Salamanna, G.; Loyola, J. E. Salazar; Salek, D.; De Bruin, P. H. Sales; Salihagic, D.; Salnikov, A.; Salt, J.; Salvatore, D.; Salvatore, F.; Salvucci, A.; Salzburger, A.; Sammel, D.; Sampsonidis, D.; Sampsonidou, D.; Sánchez, J.; Martinez, V. Sanchez; Pineda, A. Sanchez; Sandaker, H.; Sandbach, R. L.; Sander, C. O.; Sandhoff, M.; Sandoval, C.; Sankey, D. P. C.; Sannino, M.; Sansoni, A.; Santoni, C.; Santonico, R.; Santos, H.; Castillo, I. Santoyo; Sapronov, A.; Saraiva, J. G.; Sarrazin, B.; Sasaki, O.; Sato, K.; Sauvan, E.; Savage, G.; Savard, P.; Savic, N.; Sawyer, C.; Sawyer, L.; Saxon, J.; Sbarra, C.; Sbrizzi, A.; Scanlon, T.; Scannicchio, D. A.; Scarcella, M.; Scarfone, V.; Schaarschmidt, J.; Schacht, P.; Schachtner, B. M.; Schaefer, D.; Schaefer, L.; Schaefer, R.; Schaeffer, J.; Schaepe, S.; Schaetzel, S.; Schäfer, U.; Schaffer, A. C.; Schaile, D.; Schamberger, R. D.; Scharf, V.; Schegelsky, V. A.; Scheirich, D.; Schernau, M.; Schiavi, C.; Schier, S.; Schildgen, L. K.; Schillo, C.; Schioppa, M.; Schlenker, S.; Schmidt-Sommerfeld, K. R.; Schmieden, K.; Schmitt, C.; Schmitt, S.; Schmitz, S.; Schnoor, U.; Schoeffel, L.; Schoening, A.; Schoenrock, B. D.; Schopf, E.; Schott, M.; Schouwenberg, J. F. P.; Schovancova, J.; Schramm, S.; Schuh, N.; Schulte, A.; Schultens, M. J.; Schultz-Coulon, H.-C.; Schulz, H.; Schumacher, M.; Schumm, B. A.; Schune, Ph.; Schwartzman, A.; Schwarz, T. A.; Schweiger, H.; Schwemling, Ph.; Schwienhorst, R.; Schwindling, J.; Sciandra, A.; Sciolla, G.; Scuri, F.; Scutti, F.; Searcy, J.; Seema, P.; Seidel, S. C.; Seiden, A.; Seixas, J. M.; Sekhniaidze, G.; Sekhon, K.; Sekula, S. J.; Semprini-Cesari, N.; Senkin, S.; Serfon, C.; Serin, L.; Serkin, L.; Sessa, M.; Seuster, R.; Severini, H.; Sfiligoj, T.; Sforza, F.; Sfyrla, A.; Shabalina, E.; Shaikh, N. W.; Shan, L. Y.; Shang, R.; Shank, J. T.; Shapiro, M.; Shatalov, P. B.; Shaw, K.; Shaw, S. M.; Shcherbakova, A.; Shehu, C. Y.; Shen, Y.; Sherafati, N.; Sherwood, P.; Shi, L.; Shimizu, S.; Shimmin, C. O.; Shimojima, M.; Shipsey, I. P. J.; Shirabe, S.; Shiyakova, M.; Shlomi, J.; Shmeleva, A.; Saadi, D. Shoaleh; Shochet, M. J.; Shojaii, S.; Shope, D. R.; Shrestha, S.; Shulga, E.; Shupe, M. A.; Sicho, P.; Sickles, A. M.; Sidebo, P. E.; Haddad, E. Sideras; Sidiropoulou, O.; Sidoti, A.; Siegert, F.; Sijacki, Dj.; Silva, J.; Silverstein, S. B.; Simak, V.; Simic, Lj.; Simion, S.; Simioni, E.; Simmons, B.; Simon, M.; Sinervo, P.; Sinev, N. B.; Sioli, M.; Siragusa, G.; Siral, I.; Sivoklokov, S. Yu.; Sjölin, J.; Skinner, M. B.; Skubic, P.; Slater, M.; Slavicek, T.; Slawinska, M.; Sliwa, K.; Slovak, R.; Smakhtin, V.; Smart, B. H.; Smiesko, J.; Smirnov, N.; Smirnov, S. Yu.; Smirnov, Y.; Smirnova, L. N.; Smirnova, O.; Smith, J. W.; Smith, M. N. K.; Smith, R. W.; Smizanska, M.; Smolek, K.; Snesarev, A. A.; Snyder, I. M.; Snyder, S.; Sobie, R.; Socher, F.; Soffer, A.; Soh, D. A.; Sokhrannyi, G.; Sanchez, C. A. Solans; Solar, M.; Soldatov, E. Yu.; Soldevila, U.; Solodkov, A. A.; Soloshenko, A.; Solovyanov, O. V.; Solovyev, V.; Sommer, P.; Son, H.; Sopczak, A.; Sosa, D.; Sotiropoulou, C. L.; Soualah, R.; Soukharev, A. M.; South, D.; Sowden, B. C.; Spagnolo, S.; Spalla, M.; Spangenberg, M.; Spanò, F.; Sperlich, D.; Spettel, F.; Spieker, T. M.; Spighi, R.; Spigo, G.; Spiller, L. A.; Spousta, M.; Denis, R. D. St.; Stabile, A.; Stamen, R.; Stamm, S.; Stanecka, E.; Stanek, R. W.; Stanescu, C.; Stanitzki, M. M.; Stapf, B. S.; Stapnes, S.; Starchenko, E. A.; Stark, G. H.; Stark, J.; Stark, S. H.; Staroba, P.; Starovoitov, P.; Stärz, S.; Staszewski, R.; Steinberg, P.; Stelzer, B.; Stelzer, H. J.; Stelzer-Chilton, O.; Stenzel, H.; Stewart, G. A.; Stockton, M. C.; Stoebe, M.; Stoicea, G.; Stolte, P.; Stonjek, S.; Stradling, A. R.; Straessner, A.; Stramaglia, M. E.; Strandberg, J.; Strandberg, S.; Strauss, M.; Strizenec, P.; Ströhmer, R.; Strom, D. M.; Stroynowski, R.; Strubig, A.; Stucci, S. A.; Stugu, B.; Styles, N. A.; Su, D.; Su, J.; Suchek, S.; Sugaya, Y.; Suk, M.; Sulin, V. V.; Sultan, DMS; Sultansoy, S.; Sumida, T.; Sun, S.; Sun, X.; Suruliz, K.; Suster, C. J. E.; Sutton, M. R.; Suzuki, S.; Svatos, M.; Swiatlowski, M.; Swift, S. P.; Sykora, I.; Sykora, T.; Ta, D.; Tackmann, K.; Taenzer, J.; Taffard, A.; Tafirout, R.; Taiblum, N.; Takai, H.; Takashima, R.; Takasugi, E. H.; Takeshita, T.; Takubo, Y.; Talby, M.; Talyshev, A. A.; Tanaka, J.; Tanaka, M.; Tanaka, R.; Tanaka, S.; Tanioka, R.; Tannenwald, B. B.; Araya, S. Tapia; Tapprogge, S.; Tarem, S.; Tartarelli, G. F.; Tas, P.; Tasevsky, M.; Tashiro, T.; Tassi, E.; Delgado, A. Tavares; Tayalati, Y.; Taylor, A. C.; Taylor, G. N.; Taylor, P. T. E.; Taylor, W.; Teixeira-Dias, P.; Temple, D.; Kate, H. Ten; Teng, P. K.; Teoh, J. J.; Tepel, F.; Terada, S.; Terashi, K.; Terron, J.; Terzo, S.; Testa, M.; Teuscher, R. J.; Theveneaux-Pelzer, T.; Thomas, J. P.; Thomas-Wilsker, J.; Thompson, P. D.; Thompson, A. S.; Thomsen, L. A.; Thomson, E.; Tibbetts, M. J.; Torres, R. E. Ticse; Tikhomirov, V. O.; Tikhonov, Yu. A.; Timoshenko, S.; Tipton, P.; Tisserant, S.; Todome, K.; Todorova-Nova, S.; Tojo, J.; Tokár, S.; Tokushuku, K.; Tolley, E.; Tomlinson, L.; Tomoto, M.; Tompkins, L.; Toms, K.; Tong, B.; Tornambe, P.; Torrence, E.; Torres, H.; Pastor, E. Torró; Toth, J.; Touchard, F.; Tovey, D. R.; Treado, C. J.; Trefzger, T.; Tresoldi, F.; Tricoli, A.; Trigger, I. M.; Trincaz-Duvoid, S.; Tripiana, M. F.; Trischuk, W.; Trocmé, B.; Trofymov, A.; Troncon, C.; Trottier-McDonald, M.; Trovatelli, M.; Truong, L.; Trzebinski, M.; Trzupek, A.; Tsang, K. W.; Tseng, J. C.-L.; Tsiareshka, P. V.; Tsipolitis, G.; Tsirintanis, N.; Tsiskaridze, S.; Tsiskaridze, V.; Tskhadadze, E. G.; Tsui, K. M.; Tsukerman, I. I.; Tsulaia, V.; Tsuno, S.; Tsybychev, D.; Tu, Y.; Tudorache, A.; Tudorache, V.; Tulbure, T. T.; Tuna, A. N.; Tupputi, S. A.; Turchikhin, S.; Turgeman, D.; Cakir, I. Turk; Turra, R.; Tuts, P. M.; Ucchielli, G.; Ueda, I.; Ughetto, M.; Ukegawa, F.; Unal, G.; Undrus, A.; Unel, G.; Ungaro, F. C.; Unno, Y.; Unverdorben, C.; Urban, J.; Urquijo, P.; Urrejola, P.; Usai, G.; Usui, J.; Vacavant, L.; Vacek, V.; Vachon, B.; Vaidya, A.; Valderanis, C.; Santurio, E. Valdes; Valentinetti, S.; Valero, A.; Valéry, L.; Valkar, S.; Vallier, A.; Ferrer, J. A. Valls; Van Den Wollenberg, W.; van der Graaf, H.; van Gemmeren, P.; Van Nieuwkoop, J.; van Vulpen, I.; van Woerden, M. C.; Vanadia, M.; Vandelli, W.; Vaniachine, A.; Vankov, P.; Vardanyan, G.; Vari, R.; Varnes, E. W.; Varni, C.; Varol, T.; Varouchas, D.; Vartapetian, A.; Varvell, K. E.; Vasquez, J. G.; Vasquez, G. A.; Vazeille, F.; Schroeder, T. Vazquez; Veatch, J.; Veeraraghavan, V.; Veloce, L. M.; Veloso, F.; Veneziano, S.; Ventura, A.; Venturi, M.; Venturi, N.; Venturini, A.; Vercesi, V.; Verducci, M.; Verkerke, W.; Vermeulen, A. T.; Vermeulen, J. C.; Vetterli, M. C.; Maira, N. Viaux; Viazlo, O.; Vichou, I.; Vickey, T.; Boeriu, O. E. Vickey; Viehhauser, G. H. A.; Viel, S.; Vigani, L.; Villa, M.; Perez, M. Villaplana; Vilucchi, E.; Vincter, M. G.; Vinogradov, V. B.; Vishwakarma, A.; Vittori, C.; Vivarelli, I.; Vlachos, S.; Vlasak, M.; Vogel, M.; Vokac, P.; Volpi, G.; von der Schmitt, H.; von Toerne, E.; Vorobel, V.; Vorobev, K.; Vos, M.; Voss, R.; Vossebeld, J. H.; Vranjes, N.; Milosavljevic, M. Vranjes; Vrba, V.; Vreeswijk, M.; Vuillermet, R.; Vukotic, I.; Wagner, P.; Wagner, W.; Wagner-Kuhr, J.; Wahlberg, H.; Wahrmund, S.; Wakabayashi, J.; Walder, J.; Walker, R.; Walkowiak, W.; Wallangen, V.; Wang, C.; Wang, C.; Wang, F.; Wang, H.; Wang, H.; Wang, J.; Wang, J.; Wang, Q.; Wang, R.; Wang, S. M.; Wang, T.; Wang, W.; Wang, W.; Wang, Z.; Wanotayaroj, C.; Warburton, A.; Ward, C. P.; Wardrope, D. R.; Washbrook, A.; Watkins, P. M.; Watson, A. T.; Watson, M. F.; Watts, G.; Watts, S.; Waugh, B. M.; Webb, A. F.; Webb, S.; Weber, M. S.; Weber, S. W.; Weber, S. A.; Webster, J. S.; Weidberg, A. R.; Weinert, B.; Weingarten, J.; Weirich, M.; Weiser, C.; Weits, H.; Wells, P. S.; Wenaus, T.; Wengler, T.; Wenig, S.; Wermes, N.; Werner, M. D.; Werner, P.; Wessels, M.; Whalen, K.; Whallon, N. L.; Wharton, A. M.; White, A. S.; White, A.; White, M. J.; White, R.; Whiteson, D.; Whitmore, B. W.; Wickens, F. J.; Wiedenmann, W.; Wielers, M.; Wiglesworth, C.; Wiik-Fuchs, L. A. M.; Wildauer, A.; Wilk, F.; Wilkens, H. G.; Williams, H. H.; Williams, S.; Willis, C.; Willocq, S.; Wilson, J. A.; Wingerter-Seez, I.; Winkels, E.; Winklmeier, F.; Winston, O. J.; Winter, B. T.; Wittgen, M.; Wobisch, M.; Wolf, T. M. H.; Wolff, R.; Wolter, M. W.; Wolters, H.; Wong, V. W. S.; Worm, S. D.; Wosiek, B. K.; Wotschack, J.; Wozniak, K. W.; Wu, M.; Wu, S. L.; Wu, X.; Wu, Y.; Wyatt, T. R.; Wynne, B. M.; Xella, S.; Xi, Z.; Xia, L.; Xu, D.; Xu, L.; Xu, T.; Yabsley, B.; Yacoob, S.; Yamaguchi, D.; Yamaguchi, Y.; Yamamoto, A.; Yamamoto, S.; Yamanaka, T.; Yamatani, M.; Yamauchi, K.; Yamazaki, Y.; Yan, Z.; Yang, H.; Yang, H.; Yang, Y.; Yang, Z.; Yao, W.-M.; Yap, Y. C.; Yasu, Y.; Yatsenko, E.; Wong, K. H. Yau; Ye, J.; Ye, S.; Yeletskikh, I.; Yigitbasi, E.; Yildirim, E.; Yorita, K.; Yoshihara, K.; Young, C.; Young, C. J. S.; Yu, J.; Yu, J.; Yuen, S. P. Y.; Yusuff, I.; Zabinski, B.; Zacharis, G.; Zaidan, R.; Zaitsev, A. M.; Zakharchuk, N.; Zalieckas, J.; Zaman, A.; Zambito, S.; Zanzi, D.; Zeitnitz, C.; Zemaityte, G.; Zemla, A.; Zeng, J. C.; Zeng, Q.; Zenin, O.; Ženiš, T.; Zerwas, D.; Zhang, D.; Zhang, F.; Zhang, G.; Zhang, H.; Zhang, J.; Zhang, L.; Zhang, L.; Zhang, M.; Zhang, P.; Zhang, R.; Zhang, R.; Zhang, X.; Zhang, Y.; Zhang, Z.; Zhao, X.; Zhao, Y.; Zhao, Z.; Zhemchugov, A.; Zhou, B.; Zhou, C.; Zhou, L.; Zhou, M.; Zhou, M.; Zhou, N.; Zhu, C. G.; Zhu, H.; Zhu, J.; Zhu, Y.; Zhuang, X.; Zhukov, K.; Zibell, A.; Zieminska, D.; Zimine, N. I.; Zimmermann, C.; Zimmermann, S.; Zinonos, Z.; Zinser, M.; Ziolkowski, M.; Živković, L.; Zobernig, G.; Zoccoli, A.; Zou, R.; Nedden, M. zur; Zwalinski, L.

    2017-09-01

    The rejection of forward jets originating from additional proton-proton interactions (pile-up) is crucial for a variety of physics analyses at the LHC, including Standard Model measurements and searches for physics beyond the Standard Model. The identification of such jets is challenging due to the lack of track and vertex information in the pseudorapidity range |η |>2.5. This paper presents a novel strategy for forward pile-up jet tagging that exploits jet shapes and topological jet correlations in pile-up interactions. Measurements of the per-jet tagging efficiency are presented using a data set of 3.2 fb^{-1} of proton-proton collisions at a centre-of-mass energy of 13 {TeV} collected with the ATLAS detector. The fraction of pile-up jets rejected in the range 2.5<|η |<4.5 is estimated in simulated events with an average of 22 interactions per bunch-crossing. It increases with jet transverse momentum and, for jets with transverse momentum between 20 and 50 GeV, it ranges between 49% and 67% with an efficiency of 85% for selecting hard-scatter jets. A case study is performed in Higgs boson production via the vector-boson fusion process, showing that these techniques mitigate the background growth due to additional proton-proton interactions, thus enhancing the reach for such signatures.

  11. Identification and rejection of pile-up jets at high pseudorapidity with the ATLAS detector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aaboud, M.; Aad, G.; Abbott, B.

    The rejection of forward jets originating from additional proton–proton interactions (pile-up) is crucial for a variety of physics analyses at the LHC, including Standard Model measurements and searches for physics beyond the Standard Model. The identification of such jets is challenging due to the lack of track and vertex information in the pseudorapidity range | η| > 2.5. This article presents a novel strategy for forward pile-up jet tagging that exploits jet shapes and topological jet correlations in pile-up interactions. Measurements of the per-jet tagging efficiency are presented using a data set of 3.2 fb -1 of proton–proton collisions at amore » centre-of-mass energy of 13 TeV collected with the ATLAS detector. The fraction of pile-up jets rejected in the range 2.5 < | η| < 4.5 is estimated in simulated events with an average of 22 interactions per bunch-crossing. It increases with jet transverse momentum and, for jets with transverse momentum between 20 and 50 GeV, it ranges between 49% and 67% with an efficiency of 85% for selecting hard-scatter jets. Here, a case study is performed in Higgs boson production via the vector-boson fusion process, showing that these techniques mitigate the background growth due to additional proton–proton interactions, thus enhancing the reach for such signatures.« less

  12. Identification and rejection of pile-up jets at high pseudorapidity with the ATLAS detector

    DOE PAGES

    Aaboud, M.; Aad, G.; Abbott, B.; ...

    2017-09-02

    The rejection of forward jets originating from additional proton–proton interactions (pile-up) is crucial for a variety of physics analyses at the LHC, including Standard Model measurements and searches for physics beyond the Standard Model. The identification of such jets is challenging due to the lack of track and vertex information in the pseudorapidity range | η| > 2.5. This article presents a novel strategy for forward pile-up jet tagging that exploits jet shapes and topological jet correlations in pile-up interactions. Measurements of the per-jet tagging efficiency are presented using a data set of 3.2 fb -1 of proton–proton collisions at amore » centre-of-mass energy of 13 TeV collected with the ATLAS detector. The fraction of pile-up jets rejected in the range 2.5 < | η| < 4.5 is estimated in simulated events with an average of 22 interactions per bunch-crossing. It increases with jet transverse momentum and, for jets with transverse momentum between 20 and 50 GeV, it ranges between 49% and 67% with an efficiency of 85% for selecting hard-scatter jets. Here, a case study is performed in Higgs boson production via the vector-boson fusion process, showing that these techniques mitigate the background growth due to additional proton–proton interactions, thus enhancing the reach for such signatures.« less

  13. Fishing and temperature effects on the size structure of exploited fish stocks.

    PubMed

    Tu, Chen-Yi; Chen, Kuan-Ting; Hsieh, Chih-Hao

    2018-05-08

    Size structure of fish stock plays an important role in maintaining sustainability of the population. Size distribution of an exploited stock is predicted to shift toward small individuals caused by size-selective fishing and/or warming; however, their relative contribution remains relatively unexplored. In addition, existing analyses on size structure have focused on univariate size-based indicators (SBIs), such as mean length, evenness of size classes, or the upper 95-percentile of the length frequency distribution; these approaches may not capture full information of size structure. To bridge the gap, we used the variation partitioning approach to examine how the size structure (composition of size classes) responded to fishing, warming and the interaction. We analyzed 28 exploited stocks in the West US, Alaska and North Sea. Our result shows fishing has the most prominent effect on the size structure of the exploited stocks. In addition, the fish stocks experienced higher variability in fishing is more responsive to the temperature effect in their size structure, suggesting that fishing may elevate the sensitivity of exploited stocks in responding to environmental effects. The variation partitioning approach provides complementary information to univariate SBIs in analyzing size structure.

  14. Identification of Strategies for Penetrating the 19-to-23-Year-Old Recruiting Market.

    DTIC Science & Technology

    1982-04-01

    which the program might form the basis of an experimental marketing strategy . Information was also gathered on the Recruiting Resource Allocation Study...further examination of the potential relationship between these programs and Navy recruiting indicated that a marketing strategy built on this...as a marketing strategy for further development for the same reasons that CETA and Employment Service programs were not considered promising. 10 . .1w

  15. A Heated Debate: Theoretical Perspectives of Sexual Exploitation and Sex Work

    PubMed Central

    Gerassi, Lara

    2015-01-01

    The theoretical and often political framework of sexual exploitation and sex work among women is widely and enthusiastically debated among academic and legal scholars alike. The majority of theoretical literature in this area focuses on the macro perspective, while the micro-level perspective as to theory and causation remains sparse. This article provides a comprehensive overview of the philosophical, legal, and political perspectives pertaining to sexual exploitation of women and girls while addressing the subsequent controversies in the field. PMID:26834302

  16. A Robust Symmetry-Based Approach to Exploit Terra-SAR-X Dual-Pol Data for Targets at Sea Observation

    NASA Astrophysics Data System (ADS)

    Velotto, D.; Nunziata, F.; Migliaccio, M.; Lehner, S.

    2013-08-01

    In this study a simple physical property, known as reflection symmetry, is exploited to differentiate the objects in marine scenes, i.e. sea surface and metallic targets. First the reflection property is verified and demonstrated against actual SAR images, by measuring the magnitude of the correlation between cross- polarized channels (i.e. HH/HV or VH/VV). Then, a sensitivity study is performed to show the potential of the proposed method in observing man-made metallic target at sea. The robustness of the proposed technique is demonstrated using coherent dual-polarimetric X- band SAR data acquired by the satellite TerraSAR-X in both cross-polarization combinations, with different incidence angle and weather conditions. Co-located ground truth information provided by Automatic Identification System (AIS) reports and harbor charts are used to locate ships, navigation aids and buoys. The proposed method outperforms standard single polarization SAR targets at sea observation independently of the radar geometry and oceanic phenomena.

  17. Identification of Poly(ethylene glycol) and Poly(ethylene glycol)-Based Detergents Using Peptide Search Engines.

    PubMed

    Ahmadi, Shiva; Winter, Dominic

    2018-06-05

    Poly(ethylene glycol) (PEG) is one of the most common polymer contaminations in mass spectrometry (MS) samples. At present, the detection of PEG and other polymers relies largely on manual inspection of raw data, which is laborious and frequently difficult due to sample complexity and retention characteristics of polymer species in reversed-phase chromatography. We developed a new strategy for the automated identification of PEG molecules from tandem mass spectrometry (MS/MS) data using protein identification algorithms in combination with a database containing "PEG-proteins". Through definition of variable modifications, we extend the approach for the identification of commonly used PEG-based detergents. We exemplify the identification of different types of polymers by static nanoelectrospray tandem mass spectrometry (nanoESI-MS/MS) analysis of pure detergent solutions and data analysis using Mascot. Analysis of liquid chromatography-tandem mass spectrometry (LC-MS/MS) runs of a PEG-contaminated sample by Mascot identified 806 PEG spectra originating from four PEG species using a defined set of modifications covering PEG and common PEG-based detergents. Further characterization of the sample for unidentified PEG species using error-tolerant and mass-tolerant searches resulted in identification of 3409 and 3187 PEG-related MS/MS spectra, respectively. We further demonstrate the applicability of the strategy for Protein Pilot and MaxQuant.

  18. Postural Hand Synergies during Environmental Constraint Exploitation

    PubMed Central

    Della Santina, Cosimo; Bianchi, Matteo; Averta, Giuseppe; Ciotti, Simone; Arapi, Visar; Fani, Simone; Battaglia, Edoardo; Catalano, Manuel Giuseppe; Santello, Marco; Bicchi, Antonio

    2017-01-01

    Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings. PMID:28900393

  19. Enhancement of Chemical Entity Identification in Text Using Semantic Similarity Validation

    PubMed Central

    Grego, Tiago; Couto, Francisco M.

    2013-01-01

    With the amount of chemical data being produced and reported in the literature growing at a fast pace, it is increasingly important to efficiently retrieve this information. To tackle this issue text mining tools have been applied, but despite their good performance they still provide many errors that we believe can be filtered by using semantic similarity. Thus, this paper proposes a novel method that receives the results of chemical entity identification systems, such as Whatizit, and exploits the semantic relationships in ChEBI to measure the similarity between the entities found in the text. The method assigns a single validation score to each entity based on its similarities with the other entities also identified in the text. Then, by using a given threshold, the method selects a set of validated entities and a set of outlier entities. We evaluated our method using the results of two state-of-the-art chemical entity identification tools, three semantic similarity measures and two text window sizes. The method was able to increase precision without filtering a significant number of correctly identified entities. This means that the method can effectively discriminate the correctly identified chemical entities, while discarding a significant number of identification errors. For example, selecting a validation set with 75% of all identified entities, we were able to increase the precision by 28% for one of the chemical entity identification tools (Whatizit), maintaining in that subset 97% the correctly identified entities. Our method can be directly used as an add-on by any state-of-the-art entity identification tool that provides mappings to a database, in order to improve their results. The proposed method is included in a freely accessible web tool at www.lasige.di.fc.ul.pt/webtools/ice/. PMID:23658791

  20. Exceptional Information: Recognizing Threats and Exploiting Opportunities

    DTIC Science & Technology

    2017-06-09

    EXCEPTIONAL INFORMATION : RECOGNIZING THREATS AND EXPLOITING OPPORTUNITIES A thesis presented to the Faculty of the U.S. Army...No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for... information . Send comments regarding this burden estimate or any other aspect of this collection of information , including suggestions for reducing this

  1. Salmonella enterica Serovar Typhimurium Exploits Inflammation to Modify Swine Intestinal Microbiota.

    PubMed

    Drumo, Rosanna; Pesciaroli, Michele; Ruggeri, Jessica; Tarantino, Michela; Chirullo, Barbara; Pistoia, Claudia; Petrucci, Paola; Martinelli, Nicola; Moscati, Livia; Manuali, Elisabetta; Pavone, Silvia; Picciolini, Matteo; Ammendola, Serena; Gabai, Gianfranco; Battistoni, Andrea; Pezzotti, Giovanni; Alborali, Giovanni L; Napolioni, Valerio; Pasquali, Paolo; Magistrali, Chiara F

    2015-01-01

    Salmonella enterica serovar Typhimurium is an important zoonotic gastrointestinal pathogen responsible for foodborne disease worldwide. It is a successful enteric pathogen because it has developed virulence strategies allowing it to survive in a highly inflamed intestinal environment exploiting inflammation to overcome colonization resistance provided by intestinal microbiota. In this study, we used piglets featuring an intact microbiota, which naturally develop gastroenteritis, as model for salmonellosis. We compared the effects on the intestinal microbiota induced by a wild type and an attenuated S. Typhimurium in order to evaluate whether the modifications are correlated with the virulence of the strain. This study showed that Salmonella alters microbiota in a virulence-dependent manner. We found that the wild type S. Typhimurium induced inflammation and a reduction of specific protecting microbiota species (SCFA-producing bacteria) normally involved in providing a barrier against pathogens. Both these effects could contribute to impair colonization resistance, increasing the host susceptibility to wild type S. Typhimurium colonization. In contrast, the attenuated S. Typhimurium, which is characterized by a reduced ability to colonize the intestine, and by a very mild inflammatory response, was unable to successfully sustain competition with the microbiota.

  2. Salmonella enterica Serovar Typhimurium Exploits Inflammation to Modify Swine Intestinal Microbiota

    PubMed Central

    Drumo, Rosanna; Pesciaroli, Michele; Ruggeri, Jessica; Tarantino, Michela; Chirullo, Barbara; Pistoia, Claudia; Petrucci, Paola; Martinelli, Nicola; Moscati, Livia; Manuali, Elisabetta; Pavone, Silvia; Picciolini, Matteo; Ammendola, Serena; Gabai, Gianfranco; Battistoni, Andrea; Pezzotti, Giovanni; Alborali, Giovanni L.; Napolioni, Valerio; Pasquali, Paolo; Magistrali, Chiara F.

    2016-01-01

    Salmonella enterica serovar Typhimurium is an important zoonotic gastrointestinal pathogen responsible for foodborne disease worldwide. It is a successful enteric pathogen because it has developed virulence strategies allowing it to survive in a highly inflamed intestinal environment exploiting inflammation to overcome colonization resistance provided by intestinal microbiota. In this study, we used piglets featuring an intact microbiota, which naturally develop gastroenteritis, as model for salmonellosis. We compared the effects on the intestinal microbiota induced by a wild type and an attenuated S. Typhimurium in order to evaluate whether the modifications are correlated with the virulence of the strain. This study showed that Salmonella alters microbiota in a virulence-dependent manner. We found that the wild type S. Typhimurium induced inflammation and a reduction of specific protecting microbiota species (SCFA-producing bacteria) normally involved in providing a barrier against pathogens. Both these effects could contribute to impair colonization resistance, increasing the host susceptibility to wild type S. Typhimurium colonization. In contrast, the attenuated S. Typhimurium, which is characterized by a reduced ability to colonize the intestine, and by a very mild inflammatory response, was unable to successfully sustain competition with the microbiota. PMID:26835435

  3. Environmental Factors and Zoonotic Pathogen Ecology in Urban Exploiter Species.

    PubMed

    Rothenburger, Jamie L; Himsworth, Chelsea H; Nemeth, Nicole M; Pearl, David L; Jardine, Claire M

    2017-09-01

    Knowledge of pathogen ecology, including the impacts of environmental factors on pathogen and host dynamics, is essential for determining the risk that zoonotic pathogens pose to people. This review synthesizes the scientific literature on environmental factors that influence the ecology and epidemiology of zoonotic microparasites (bacteria, viruses and protozoa) in globally invasive urban exploiter wildlife species (i.e., rock doves [Columba livia domestica], European starlings [Sturnus vulgaris], house sparrows [Passer domesticus], Norway rats [Rattus norvegicus], black rats [R. rattus] and house mice [Mus musculus]). Pathogen ecology, including prevalence and pathogen characteristics, is influenced by geographical location, habitat, season and weather. The prevalence of zoonotic pathogens in mice and rats varies markedly over short geographical distances, but tends to be highest in ports, disadvantaged (e.g., low income) and residential areas. Future research should use epidemiological approaches, including random sampling and robust statistical analyses, to evaluate a range of biotic and abiotic environmental factors at spatial scales suitable for host home range sizes. Moving beyond descriptive studies to uncover the causal factors contributing to uneven pathogen distribution among wildlife hosts in urban environments may lead to targeted surveillance and intervention strategies. Application of this knowledge to urban maintenance and planning may reduce the potential impacts of urban wildlife-associated zoonotic diseases on people.

  4. Identification - obstacle to individuation, or: on how to become 'me'.

    PubMed

    Cavalli, Alessandra

    2017-04-01

    This paper will explore the use of identification with aspects of a lost object as a defensive strategy to cope with traumatic loss, and will show how in the depth of the analytic work this identification can be accessed and made conscious. Descriptions of work with a three-year-old boy illustrate how the sudden loss of his mother's breasts had made weaning un-accessible to him, and how, in the absence of a good experience of separation, the process of mourning had not been able to take place. Instead, identification with aspects of the lost breast was used as a defence against pain, and this state of affairs was proving a hindrance to individuation. In the discussion of the case material, the use of identification as a defence will be highlighted, and a differentiation made between abandonment and separation as this illuminates the link between mourning and individuation. © 2017, The Society of Analytical Psychology.

  5. Free-decay time-domain modal identification for large space structures

    NASA Technical Reports Server (NTRS)

    Kim, Hyoung M.; Vanhorn, David A.; Doiron, Harold H.

    1992-01-01

    Concept definition studies for the Modal Identification Experiment (MIE), a proposed space flight experiment for the Space Station Freedom (SSF), have demonstrated advantages and compatibility of free-decay time-domain modal identification techniques with the on-orbit operational constraints of large space structures. Since practical experience with modal identification using actual free-decay responses of large space structures is very limited, several numerical and test data reduction studies were conducted. Major issues and solutions were addressed, including closely-spaced modes, wide frequency range of interest, data acquisition errors, sampling delay, excitation limitations, nonlinearities, and unknown disturbances during free-decay data acquisition. The data processing strategies developed in these studies were applied to numerical simulations of the MIE, test data from a deployable truss, and launch vehicle flight data. Results of these studies indicate free-decay time-domain modal identification methods can provide accurate modal parameters necessary to characterize the structural dynamics of large space structures.

  6. Towards Spectral Library-free MALDI-TOF MS Bacterial Identification.

    PubMed

    Cheng, Ding; Qiao, Liang; Horvatovich, Péter

    2018-05-11

    Bacterial identification is of great importance in clinical diagnosis, environmental monitoring and food safety control. Among various strategies, matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) has drawn significant interests, and has been clinically used. Nevertheless, current bioinformatics solutions use spectral libraries for the identification of bacterial strains. Spectral library generation requires acquisition of MALDI-TOF spectra from monoculture bacterial colonies, which is time-consuming and not possible for many species and strains. We propose a strategy for bacterial typing by MALDI-TOF using protein sequences from public database, i.e. UniProt. Ten genes were identified to encode proteins most often observed by MALD-TOF from bacteria through 500 times repeated a 10-fold double cross-validation procedure, using 403 MALDI-TOF spectra corresponding to 14 genera, 81 species and 403 strains, and the protein sequences of 1276 species in UniProt. The 10 genes were then used to annotate peaks on MALDI-TOF spectra of bacteria for bacterial identification. With the approach, bacteria can be identified at the genus level by searching against a database containing the protein sequences of 42 genera of bacteria from UniProt. Our approach identified 84.1% of the 403 spectra correctly at the genus level. Source code of the algorithm is available at https://github.com/dipcarbon/BacteriaMSLF.

  7. High-value bioproducts from microalgae: strategies and progress.

    PubMed

    Liang, Ming-Hua; Zhu, Jianhua; Jiang, Jian-Guo

    2018-04-20

    Microalgae have been considered as alternative sustainable resources for high-value bioproducts such as lipids (especially triacylglycerides [TAGs]), polyunsaturated fatty acids (PUFAs), and carotenoids, due to their relatively high photosynthetic efficiency, no arable land requirement, and ease of scale-up. It is of great significance to exploit microalgae for the production of high-value bioproducts. How to improve the content or productivity of specific bioproducts has become one of the most urgent challenges. In this review, we will describe high-value bioproducts from microalgae and their biosynthetic pathways (mainly for lipids, PUFAs, and carotenoids). Recent progress and strategies for the enhanced production of bioproducts from microalgae are also described in detail, and these strategies take advantages of optimized cultivation conditions with abiotic stress, chemical stress (addition of metabolic precursors, phytohormones, chemical inhibitors, and chemicals inducing oxidative stress response), and molecular approaches such as metabolic engineering, transcriptional engineering, and gene disruption strategies (mainly RNAi, antisense RNA, miRNA-based knockdown, and CRISPR/Cas9).

  8. Internal states drive nutrient homeostasis by modulating exploration-exploitation trade-off

    PubMed Central

    Corrales-Carvajal, Verónica María; Faisal, Aldo A; Ribeiro, Carlos

    2016-01-01

    Internal states can profoundly alter the behavior of animals. A quantitative understanding of the behavioral changes upon metabolic challenges is key to a mechanistic dissection of how animals maintain nutritional homeostasis. We used an automated video tracking setup to characterize how amino acid and reproductive states interact to shape exploitation and exploration decisions taken by adult Drosophila melanogaster. We find that these two states have specific effects on the decisions to stop at and leave proteinaceous food patches. Furthermore, the internal nutrient state defines the exploration-exploitation trade-off: nutrient-deprived flies focus on specific patches while satiated flies explore more globally. Finally, we show that olfaction mediates the efficient recognition of yeast as an appropriate protein source in mated females and that octopamine is specifically required to mediate homeostatic postmating responses without affecting internal nutrient sensing. Internal states therefore modulate specific aspects of exploitation and exploration to change nutrient selection. DOI: http://dx.doi.org/10.7554/eLife.19920.001 PMID:27770569

  9. A strategy to improve the identification reliability of the chemical constituents by high-resolution mass spectrometry-based isomer structure prediction combined with a quantitative structure retention relationship analysis: Phthalide compounds in Chuanxiong as a test case.

    PubMed

    Zhang, Qingqing; Huo, Mengqi; Zhang, Yanling; Qiao, Yanjiang; Gao, Xiaoyan

    2018-06-01

    High-resolution mass spectrometry (HRMS) provides a powerful tool for the rapid analysis and identification of compounds in herbs. However, the diversity and large differences in the content of the chemical constituents in herbal medicines, especially isomerisms, are a great challenge for mass spectrometry-based structural identification. In the current study, a new strategy for the structural characterization of potential new phthalide compounds was proposed by isomer structure predictions combined with a quantitative structure-retention relationship (QSRR) analysis using phthalide compounds in Chuanxiong as an example. This strategy consists of three steps. First, the structures of phthalide compounds were reasonably predicted on the basis of the structure features and MS/MS fragmentation patterns: (1) the collected raw HRMS data were preliminarily screened by an in-house database; (2) the MS/MS fragmentation patterns of the analogous compounds were summarized; (3) the reported phthalide compounds were identified, and the structures of the isomers were reasonably predicted. Second, the QSRR model was established and verified using representative phthalide compound standards. Finally, the retention times of the predicted isomers were calculated by the QSRR model, and the structures of these peaks were rationally characterized by matching retention times of the detected chromatographic peaks and the predicted isomers. A multiple linear regression QSRR model in which 6 physicochemical variables were screened was built using 23 phthalide standards. The retention times of the phthalide isomers in Chuanxiong were well predicted by the QSRR model combined with reasonable structure predictions (R 2 =0.955). A total of 81 peaks were detected from Chuanxiong and assigned to reasonable structures, and 26 potential new phthalide compounds were structurally characterized. This strategy can improve the identification efficiency and reliability of homologues in complex

  10. MC64-ClustalWP2: A Highly-Parallel Hybrid Strategy to Align Multiple Sequences in Many-Core Architectures

    PubMed Central

    Díaz, David; Esteban, Francisco J.; Hernández, Pilar; Caballero, Juan Antonio; Guevara, Antonio

    2014-01-01

    We have developed the MC64-ClustalWP2 as a new implementation of the Clustal W algorithm, integrating a novel parallelization strategy and significantly increasing the performance when aligning long sequences in architectures with many cores. It must be stressed that in such a process, the detailed analysis of both the software and hardware features and peculiarities is of paramount importance to reveal key points to exploit and optimize the full potential of parallelism in many-core CPU systems. The new parallelization approach has focused into the most time-consuming stages of this algorithm. In particular, the so-called progressive alignment has drastically improved the performance, due to a fine-grained approach where the forward and backward loops were unrolled and parallelized. Another key approach has been the implementation of the new algorithm in a hybrid-computing system, integrating both an Intel Xeon multi-core CPU and a Tilera Tile64 many-core card. A comparison with other Clustal W implementations reveals the high-performance of the new algorithm and strategy in many-core CPU architectures, in a scenario where the sequences to align are relatively long (more than 10 kb) and, hence, a many-core GPU hardware cannot be used. Thus, the MC64-ClustalWP2 runs multiple alignments more than 18x than the original Clustal W algorithm, and more than 7x than the best x86 parallel implementation to date, being publicly available through a web service. Besides, these developments have been deployed in cost-effective personal computers and should be useful for life-science researchers, including the identification of identities and differences for mutation/polymorphism analyses, biodiversity and evolutionary studies and for the development of molecular markers for paternity testing, germplasm management and protection, to assist breeding, illegal traffic control, fraud prevention and for the protection of the intellectual property (identification

  11. A hybrid system identification methodology for wireless structural health monitoring systems based on dynamic substructuring

    NASA Astrophysics Data System (ADS)

    Dragos, Kosmas; Smarsly, Kay

    2016-04-01

    System identification has been employed in numerous structural health monitoring (SHM) applications. Traditional system identification methods usually rely on centralized processing of structural response data to extract information on structural parameters. However, in wireless SHM systems the centralized processing of structural response data introduces a significant communication bottleneck. Exploiting the merits of decentralization and on-board processing power of wireless SHM systems, many system identification methods have been successfully implemented in wireless sensor networks. While several system identification approaches for wireless SHM systems have been proposed, little attention has been paid to obtaining information on the physical parameters (e.g. stiffness, damping) of the monitored structure. This paper presents a hybrid system identification methodology suitable for wireless sensor networks based on the principles of component mode synthesis (dynamic substructuring). A numerical model of the monitored structure is embedded into the wireless sensor nodes in a distributed manner, i.e. the entire model is segmented into sub-models, each embedded into one sensor node corresponding to the substructure the sensor node is assigned to. The parameters of each sub-model are estimated by extracting local mode shapes and by applying the equations of the Craig-Bampton method on dynamic substructuring. The proposed methodology is validated in a laboratory test conducted on a four-story frame structure to demonstrate the ability of the methodology to yield accurate estimates of stiffness parameters. Finally, the test results are discussed and an outlook on future research directions is provided.

  12. Multivariate curve resolution based chromatographic peak alignment combined with parallel factor analysis to exploit second-order advantage in complex chromatographic measurements.

    PubMed

    Parastar, Hadi; Akvan, Nadia

    2014-03-13

    In the present contribution, a new combination of multivariate curve resolution-correlation optimized warping (MCR-COW) with trilinear parallel factor analysis (PARAFAC) is developed to exploit second-order advantage in complex chromatographic measurements. In MCR-COW, the complexity of the chromatographic data is reduced by arranging the data in a column-wise augmented matrix, analyzing using MCR bilinear model and aligning the resolved elution profiles using COW in a component-wise manner. The aligned chromatographic data is then decomposed using trilinear model of PARAFAC in order to exploit pure chromatographic and spectroscopic information. The performance of this strategy is evaluated using simulated and real high-performance liquid chromatography-diode array detection (HPLC-DAD) datasets. The obtained results showed that the MCR-COW can efficiently correct elution time shifts of target compounds that are completely overlapped by coeluted interferences in complex chromatographic data. In addition, the PARAFAC analysis of aligned chromatographic data has the advantage of unique decomposition of overlapped chromatographic peaks to identify and quantify the target compounds in the presence of interferences. Finally, to confirm the reliability of the proposed strategy, the performance of the MCR-COW-PARAFAC is compared with the frequently used methods of PARAFAC, COW-PARAFAC, multivariate curve resolution-alternating least squares (MCR-ALS), and MCR-COW-MCR. In general, in most of the cases the MCR-COW-PARAFAC showed an improvement in terms of lack of fit (LOF), relative error (RE) and spectral correlation coefficients in comparison to the PARAFAC, COW-PARAFAC, MCR-ALS and MCR-COW-MCR results. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Potentially exploitable supercritical geothermal resources in the ductile crust

    USGS Publications Warehouse

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  14. Normative beliefs about aggression as a mediator of narcissistic exploitativeness and cyberbullying.

    PubMed

    Ang, Rebecca P; Tan, Kit-Aun; Talib Mansor, Abu

    2011-09-01

    The current study examined normative beliefs about aggression as a mediator between narcissistic exploitativeness and cyberbullying using two Asian adolescent samples from Singapore and Malaysia. Narcissistic exploitativeness was significantly and positively associated with cyberbullying and normative beliefs about aggression and normative beliefs about aggression were significantly and positively associated with cyberbullying. Normative beliefs about aggression were a significant partial mediator in both samples; these beliefs about aggression served as one possible mechanism of action by which narcissistic exploitativeness could exert its influence on cyberbullying. Findings extended previous empirical research by showing that such beliefs can be the mechanism of action not only in offline but also in online contexts and across cultures. Cyberbullying prevention and intervention efforts should include modification of norms and beliefs supportive of the legitimacy and acceptability of cyberbullying.

  15. Criminal Prohibition of Wrongful Re‑identification: Legal Solution or Minefield for Big Data?

    PubMed

    Phillips, Mark; Dove, Edward S; Knoppers, Bartha M

    2017-12-01

    The collapse of confidence in anonymization (sometimes also known as de-identification) as a robust approach for preserving the privacy of personal data has incited an outpouring of new approaches that aim to fill the resulting trifecta of technical, organizational, and regulatory privacy gaps left in its wake. In the latter category, and in large part due to the growth of Big Data-driven biomedical research, falls a growing chorus of calls for criminal and penal offences to sanction wrongful re-identification of "anonymized" data. This chorus cuts across the fault lines of polarized privacy law scholarship that at times seems to advocate privacy protection at the expense of Big Data research or vice versa. Focusing on Big Data in the context of biomedicine, this article surveys the approaches that criminal or penal law might take toward wrongful re-identification of health data. It contextualizes the strategies within their respective legal regimes as well as in relation to emerging privacy debates focusing on personal data use and data linkage and assesses the relative merit of criminalization. We conclude that this approach suffers from several flaws and that alternative social and legal strategies to deter wrongful re-identification may be preferable.

  16. Protein-Level Integration Strategy of Multiengine MS Spectra Search Results for Higher Confidence and Sequence Coverage.

    PubMed

    Zhao, Panpan; Zhong, Jiayong; Liu, Wanting; Zhao, Jing; Zhang, Gong

    2017-12-01

    Multiple search engines based on various models have been developed to search MS/MS spectra against a reference database, providing different results for the same data set. How to integrate these results efficiently with minimal compromise on false discoveries is an open question due to the lack of an independent, reliable, and highly sensitive standard. We took the advantage of the translating mRNA sequencing (RNC-seq) result as a standard to evaluate the integration strategies of the protein identifications from various search engines. We used seven mainstream search engines (Andromeda, Mascot, OMSSA, X!Tandem, pFind, InsPecT, and ProVerB) to search the same label-free MS data sets of human cell lines Hep3B, MHCCLM3, and MHCC97H from the Chinese C-HPP Consortium for Chromosomes 1, 8, and 20. As expected, the union of seven engines resulted in a boosted false identification, whereas the intersection of seven engines remarkably decreased the identification power. We found that identifications of at least two out of seven engines resulted in maximizing the protein identification power while minimizing the ratio of suspicious/translation-supported identifications (STR), as monitored by our STR index, based on RNC-Seq. Furthermore, this strategy also significantly improves the peptides coverage of the protein amino acid sequence. In summary, we demonstrated a simple strategy to significantly improve the performance for shotgun mass spectrometry by protein-level integrating multiple search engines, maximizing the utilization of the current MS spectra without additional experimental work.

  17. Distinct Urban Mines: Exploiting secondary resources in unique anthropogenic spaces.

    PubMed

    Ongondo, F O; Williams, I D; Whitlock, G

    2015-11-01

    Fear of scarcity of resources highlight the need to exploit secondary materials from urban mines in the anthroposphere. Analogous to primary mines rich in one type of material (e.g. copper, gold, etc.), some urban mines are unique/distinct. We introduce, illustrate and discuss the concept of Distinct Urban Mines (DUM). Using the example of a university DUM in the UK, analogous to a primary mine, we illustrate potential product/material yields in respect of size, concentration and spatial location of the mine. Product ownership and replacement cycles for 17 high-value electrical and electronic equipment (EEE) among students showed that 20 tonnes of valuable e-waste were in stockpile in this DUM and a further 87 tonnes would 'soon' be available for exploitation. We address the opportunities and challenges of exploiting DUMs and conclude that they are readily available reservoirs for resource recovery. Two original contributions arise from this work: (i) a novel approach to urban mining with a potential for maximising resource recovery within the anthroposphere is conceptualised; and (ii) previously unavailable data for high-value products for a typical university DUM are presented and analysed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    PubMed

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  19. Rapid identification of herbal compounds derived metabolites using zebrafish larvae as the biotransformation system.

    PubMed

    Wang, Chen; Yin, Ying-Hao; Wei, Ying-Jie; Shi, Zi-Qi; Liu, Jian-Qun; Liu, Li-Fang; Xin, Gui-Zhong

    2017-09-15

    Metabolites derived from herbal compounds are becoming promising sources for discovering new drugs. However, the rapid identification of metabolites from biological matrixes is limited by massive endogenous interference and low abundance of metabolites. Thus, by using zebrafish larvae as the biotransformation system, we herein proposed and validated an integrated strategy for rapid identification of metabolites derived from herbal compounds. Two pivotal steps involved in this strategy are to differentiate metabolites from herbal compounds and match metabolites with their parent compounds. The differentiation step was achieved by cross orthogonal partial least-squares discriminant analysis. Automatic matching analysis was performed on R Project based on a self-developed program, of which the number of matched ionic clusters and its corresponding percentage between metabolite and parent compound were taken into account to assess their similarity. Using this strategy, 46 metabolites screened from incubation water samples of zebrafish treated with total Epimedium flavonoids (EFs) could be matched with their corresponding parent compounds, 37 of them were identified and validated by the known metabolic pathways and fragmentation patterns. Finally, 75% of the identified EFs metabolites were successfully detected in urine samples of rats treated with EFs. These experimental results indicate that the proposed strategy using zebrafish larvae as the biotransformation system will facilitate the rapid identification of metabolites derived from herbal compounds, which shows promising perspectives in providing additional resources for pharmaceutical developments from natural products. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Patient and Sample Identification. Out of the Maze?

    PubMed

    Lippi, Giuseppe; Chiozza, Laura; Mattiuzzi, Camilla; Plebani, Mario

    2017-04-01

    Patient and sample misidentification may cause significant harm or discomfort to the patients, especially when incorrect data is used for performing specific healthcare activities. It is hence obvious that efficient and quality care can only start from accurate patient identification. There are many opportunities for misidentification in healthcare and laboratory medicine, including homonymy, incorrect patient registration, reliance on wrong patient data, mistakes in order entry, collection of biological specimens from wrong patients, inappropriate sample labeling and inaccurate entry or erroneous transmission of test results through the laboratory information system. Many ongoing efforts are made to prevent this important healthcare problem, entailing streamlined strategies for identifying patients throughout the healthcare industry by means of traditional and innovative identifiers, as well as using technologic tools that may enhance both the quality and efficiency of blood tubes labeling. The aim of this article is to provide an overview about the liability of identification errors in healthcare, thus providing a pragmatic approach for diverging the so-called patient identification crisis.

  1. Comparison of Depletion Strategies for the Enrichment of Low-Abundance Proteins in Urine.

    PubMed

    Filip, Szymon; Vougas, Konstantinos; Zoidakis, Jerome; Latosinska, Agnieszka; Mullen, William; Spasovski, Goce; Mischak, Harald; Vlahou, Antonia; Jankowski, Joachim

    2015-01-01

    Proteome analysis of complex biological samples for biomarker identification remains challenging, among others due to the extended range of protein concentrations. High-abundance proteins like albumin or IgG of plasma and urine, may interfere with the detection of potential disease biomarkers. Currently, several options are available for the depletion of abundant proteins in plasma. However, the applicability of these methods in urine has not been thoroughly investigated. In this study, we compared different, commercially available immunodepletion and ion-exchange based approaches on urine samples from both healthy subjects and CKD patients, for their reproducibility and efficiency in protein depletion. A starting urine volume of 500 μL was used to simulate conditions of a multi-institutional biomarker discovery study. All depletion approaches showed satisfactory reproducibility (n=5) in protein identification as well as protein abundance. Comparison of the depletion efficiency between the unfractionated and fractionated samples and the different depletion strategies, showed efficient depletion in all cases, with the exception of the ion-exchange kit. The depletion efficiency was found slightly higher in normal than in CKD samples and normal samples yielded more protein identifications than CKD samples when using both initial as well as corresponding depleted fractions. Along these lines, decrease in the amount of albumin and other targets as applicable, following depletion, was observed. Nevertheless, these depletion strategies did not yield a higher number of identifications in neither the urine from normal nor CKD patients. Collectively, when analyzing urine in the context of CKD biomarker identification, no added value of depletion strategies can be observed and analysis of unfractionated starting urine appears to be preferable.

  2. Comparison of Depletion Strategies for the Enrichment of Low-Abundance Proteins in Urine

    PubMed Central

    Filip, Szymon; Vougas, Konstantinos; Zoidakis, Jerome; Latosinska, Agnieszka; Mullen, William; Spasovski, Goce; Mischak, Harald; Vlahou, Antonia; Jankowski, Joachim

    2015-01-01

    Proteome analysis of complex biological samples for biomarker identification remains challenging, among others due to the extended range of protein concentrations. High-abundance proteins like albumin or IgG of plasma and urine, may interfere with the detection of potential disease biomarkers. Currently, several options are available for the depletion of abundant proteins in plasma. However, the applicability of these methods in urine has not been thoroughly investigated. In this study, we compared different, commercially available immunodepletion and ion-exchange based approaches on urine samples from both healthy subjects and CKD patients, for their reproducibility and efficiency in protein depletion. A starting urine volume of 500 μL was used to simulate conditions of a multi-institutional biomarker discovery study. All depletion approaches showed satisfactory reproducibility (n=5) in protein identification as well as protein abundance. Comparison of the depletion efficiency between the unfractionated and fractionated samples and the different depletion strategies, showed efficient depletion in all cases, with the exception of the ion-exchange kit. The depletion efficiency was found slightly higher in normal than in CKD samples and normal samples yielded more protein identifications than CKD samples when using both initial as well as corresponding depleted fractions. Along these lines, decrease in the amount of albumin and other targets as applicable, following depletion, was observed. Nevertheless, these depletion strategies did not yield a higher number of identifications in neither the urine from normal nor CKD patients. Collectively, when analyzing urine in the context of CKD biomarker identification, no added value of depletion strategies can be observed and analysis of unfractionated starting urine appears to be preferable. PMID:26208298

  3. Intrasexual competition facilitates the evolution of alternative mating strategies in a colour polymorphic fish.

    PubMed

    Hurtado-Gonzales, Jorge L; Uy, J Albert C

    2010-12-23

    Intense competition for access to females can lead to males exploiting different components of sexual selection, and result in the evolution of alternative mating strategies (AMSs). Males of Poecilia parae, a colour polymorphic fish, exhibit five distinct phenotypes: drab-coloured (immaculata), striped (parae), structural-coloured (blue) and carotenoid-based red and yellow morphs. Previous work indicates that immaculata males employ a sneaker strategy, whereas the red and yellow morphs exploit female preferences for carotenoid-based colours. Mating strategies favouring the maintenance of the other morphs remain to be determined. Here, we report the role of agonistic male-male interactions in influencing female mating preferences and male mating success, and in facilitating the evolution of AMSs. Our study reveals variation in aggressiveness among P. parae morphs during indirect and direct interactions with sexually receptive females. Two morphs, parae and yellow, use aggression to enhance their mating success (i.e., number of copulations) by 1) directly monopolizing access to females, and 2) modifying female preferences after winning agonistic encounters. Conversely, we found that the success of the drab-coloured immaculata morph, which specializes in a sneak copulation strategy, relies in its ability to circumvent both male aggression and female choice when facing all but yellow males. Strong directional selection is expected to deplete genetic variation, yet many species show striking genetically-based polymorphisms. Most studies evoke frequency dependent selection to explain the persistence of such variation. Consistent with a growing body of evidence, our findings suggest that a complex form of balancing selection may alternatively explain the evolution and maintenance of AMSs in a colour polymorphic fish. In particular, this study demonstrates that intrasexual competition results in phenotypically distinct males exhibiting clear differences in their levels of

  4. The Endospore-Forming Pathogen Bacillus cereus Exploits a Small Colony Variant-Based Diversification Strategy in Response to Aminoglycoside Exposure.

    PubMed

    Frenzel, Elrike; Kranzler, Markus; Stark, Timo D; Hofmann, Thomas; Ehling-Schulz, Monika

    2015-12-08

    Bacillus cereus is among the microorganisms most often isolated from cases of food spoilage and causes gastrointestinal diseases as well as nongastrointestinal infections elicited by the emetic toxin cereulide, enterotoxins, and a panel of tissue-destructive virulence factors. This opportunistic pathogen is increasingly associated with rapidly fatal clinical infections especially linked to neonates and immunocompromised individuals. Fatality results from either the misdiagnosis of B. cereus as a contaminant of the clinical specimen or from failure of antibiotic therapy. Here we report for the first time that exposure to aminoglycoside antibiotics induces a phenotype switching of emetic B. cereus subpopulations to a slow-growing small colony variant (SCV) state. Along with altered antibiotic resistance, SCVs showed distinct phenotypic and metabolic properties, bearing the risk of antibiotic treatment failure and of clinical misdiagnosis by standard identification tests used in routine diagnostic. The SCV subpopulation is characterized by enhanced production of the toxin cereulide, but it does not secrete tissue-destructive and immune system-affecting enzymes such as sphingomyelinase and phospholipase. SCVs showed significantly prolonged persistence and decreased virulence in the Galleria mellonella model for bacterial infections, indicating diversification concerning their ecological lifestyle. Importantly, diversification into coexisting wild-type and SCV subpopulations also emerged during amikacin pressure during in vivo infection experiments. This study shows for the first time that pathogenic spore-forming B. cereus strains are able to switch to a so far unreported slow-growing lifestyle, which differs substantially in terms of developmental, phenotypic, metabolic, and virulence traits from the wild-type populations. This underpins the necessity of molecular-based differential diagnostics and a well-chosen therapeutic treatment strategy in clinical

  5. Looking Ahead Toward Community-Level Strategies to Prevent Sexual Violence

    PubMed Central

    DeGue, Sarah; Holt, Melissa K.; Massetti, Greta M.; Matjasko, Jennifer L.; Tharp, Andra Teten; Valle, Linda Anne

    2018-01-01

    The Division of Violence Prevention within CDC’s National Center for Injury Prevention and Control recently undertook a systematic review of primary prevention strategies for sexual violence (SV) perpetration. This review identified the lack of community-level strategies to prevent SV as a critical gap in the literature. Community-level strategies function by modifying the characteristics of settings (e.g., schools, workplaces, neighborhoods) that increase the risk for violence victimization and perpetration. Identification of evidence-based strategies at the community level would allow implementation of ecologic approaches to SV prevention with a greater potential for reducing the prevalence of SV perpetration. The field will face several challenges in identifying and evaluating the effectiveness of promising community-level strategies to prevent SV. These challenges include limited knowledge of community-level and societal-level risk factors for SV, a lack of theoretical or empirical guidance in the SV literature for identification of promising community-level approaches, and challenges in evaluating SV outcomes at the community level. Recognition of these challenges should guide future research and foster dialogue within the SV prevention field. The development and evaluation of community-level approaches to SV prevention represent a vital and logical next step toward the implementation of effective, multilevel prevention efforts and a population-level reduction in the prevalence of SV. PMID:22185587

  6. Application of the analytic hierarchy process to a sustainability assessment of coastal beach exploitation: a case study of the wind power projects on the coastal beaches of Yancheng, China.

    PubMed

    Tian, Weijun; Bai, Jie; Sun, Huimei; Zhao, Yangguo

    2013-01-30

    Sustainability assessments of coastal beach exploitation are difficult because the identification of appropriate monitoring methodologies and evaluation procedures is still ongoing. In particular, the most suitable procedure for the application of sustainability assessment to coastal beaches remains uncertain. This paper presents a complete sustainability assessment process for coastal beach exploitation based on the analytic hierarchy process (AHP). We developed an assessment framework consisting of 14 indicators derived from the three dimensions of suitability, economic and social value, and ecosystem. We chose a wind power project on a coastal beach of Yancheng as a case study. The results indicated that the wind power farms on the coastal beach were not completely in keeping with sustainable development theory. The construction of the wind power farms had some negative impacts. Therefore, in the design stage, wind turbines should be designed and planned carefully to minimize these negative impacts. In addition, the case study demonstrated that the AHP was capable of addressing the complexities associated with the sustainability of coastal beaches. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Baby Boomers and Generation X: strategies to bridge the gap.

    PubMed

    Bertholf, L; Loveless, S

    2001-09-01

    Health care staffing challenges for the next few years necessitate the need to develop strategies to integrate the Generation Xer into a predominantly Baby Boomer work force. Strategies to assist Baby Boomers and Generation Xers to engage one another in constructive relationships are discussed. Misunderstanding and stereotyping create barriers that focus on differences and perceived limitations rather than identification of common thinking and focusing on strengths of each generation.

  8. Strategy for the Identification of an INL Comprehensive Utility Corridor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Reisenauer

    2011-05-01

    This report documents the strategy developed to identify a comprehensive utility corridor (CUC) on the Idaho National Laboratory (INL) Site. The strategy established the process for which the Campus Development Office will evaluate land management issues. It is a process that uses geographical information system geospatial technology to layer critical INL mission information in a way that thorough evaluations can be conducted and strategies developed. The objective of the CUC Project was to develop a process that could be implemented to identify potential utility corridor options for consideration. The process had to take into account all the missions occurring onmore » the INL and other land-related issues. The process for developing a CUC strategy consists of the following four basic elements using geographical information system capabilities: 1. Development of an INL base layer map; this base layer map geospatially references all stationary geographical features on INL and sitewide information. 2. Development of current and future mission land-use need maps; this involved working with each directorate to identify current mission land use needs and future land use needs that project 30 years into the future. 3. Development of restricted and potential constraint maps; this included geospatially mapping areas such as wells, contaminated areas, firing ranges, cultural areas, ecological areas, hunting areas, easement, and grazing areas. 4. Development of state highway and power line rights of way map; this included geospatially mapping rights-of-way along existing state highways and power lines running through the INL that support INL operations. It was determined after completing and evaluating the geospatial information that the area with the least impact to INL missions was around the perimeter of the INL Site. Option 1, in this document, identifies this perimeter; however, it does not mean the entire perimeter is viable. Many places along the perimeter corridor

  9. Preventing Exploits Against Software of Uncertain Provenance (PEASOUP)

    DTIC Science & Technology

    2015-05-01

    Together with Strata’s fine-grained confinement, they build up a robust sandbox environment for SOUP that can resist most kind of exploits...Guide to the World’s Most Popular Disassembler. 2008: No Starch Press. 60. Christey, S., 2011 CWE/SANS top 25 most dangerous software errors

  10. The High Momentum Particle IDentification (HMPID) detector PID performance and its contribution to the ALICE physics program

    NASA Astrophysics Data System (ADS)

    Volpe, Giacomo; ALICE Collaboration

    2017-12-01

    The ALICE apparatus is dedicated to study the properties of strongly interacting matter under extremely high temperature and energy density conditions. For this, enhanced particle identification (PID) capabilities are required. Among the PID ALICE detectors, the ALICE-HMPID (High Momentum Particle IDentification) detector is devoted to the identification of charged hadrons, exploiting the Cherenkov effect. It consists of seven identical RICH modules, with liquid C6F14 as Cherenkov radiator (n ≈1.298 at λ=175 nm). Photon and charged particle detection is performed by a MWPC, coupled with a pad segmented CsI coated photo-cathode. The total CsI active area is 10.3 m2. The HMPID provides 3 sigma separation for pions and kaons up to pT = 3 GeV / c and for kaons and (anti-)protons up to pT = 5 GeV / c . A review of the HMPID PID performance, in particular in the challenging central Pb-Pb collisions, and its contribution to the ALICE physics program, using the LHC RUN1 (2010-2013) and RUN2 (2015) data, are presented.

  11. Regime Shift in an Exploited Fish Community Related to Natural Climate Oscillations.

    PubMed

    Auber, Arnaud; Travers-Trolet, Morgane; Villanueva, Maria Ching; Ernande, Bruno

    2015-01-01

    Identifying the various drivers of marine ecosystem regime shifts and disentangling their respective influence are critical tasks for understanding biodiversity dynamics and properly managing exploited living resources such as marine fish communities. Unfortunately, the mechanisms and forcing factors underlying regime shifts in marine fish communities are still largely unknown although climate forcing and anthropogenic pressures such as fishing have been suggested as key determinants. Based on a 24-year-long time-series of scientific surveys monitoring 55 fish and cephalopods species, we report here a rapid and persistent structural change in the exploited fish community of the eastern English Channel from strong to moderate dominance of small-bodied forage fish species with low temperature preferendum that occurred in the mid-1990s. This shift was related to a concomitant warming of the North Atlantic Ocean as attested by a switch of the Atlantic Multidecadal Oscillation from a cold to a warm phase. Interestingly, observed changes in the fish community structure were opposite to those classically induced by exploitation as larger fish species of higher trophic level increased in abundance. Despite not playing a direct role in the regime shift, fishing still appeared as a forcing factor affecting community structure. Moreover, although related to climate, the regime shift may have been facilitated by strong historic exploitation that certainly primed the system by favoring the large dominance of small-bodied fish species that are particularly sensitive to climatic variations. These results emphasize that particular attention should be paid to multidecadal natural climate variability and its interactions with both fishing and climate warming when aiming at sustainable exploitation and ecosystem conservation.

  12. The LTDP ALTS Project: Contributing to the Continued Understanding and Exploitation of the ATSR Time Series

    NASA Astrophysics Data System (ADS)

    Clarke, Hannah; Done, Fay; Casadio, Stefano; Mackin, Stephen; Dinelli, Bianca Maria; Castelli, Elisa

    2016-08-01

    The long time-series of observations made by the Along Track Scanning Radiometers (ATSR) missions represents a valuable resource for a wide range of research and EO applications.With the advent of ESA's Long-TermData Preservation (LTDP) programme, thought has turned to the preservation and improved understanding of such long time-series, to support their continued exploitation in both existing and new areas of research, bringing the possibility of improving the existing data set and to inform and contribute towards future missions. For this reason, the 'Long Term Stability of the ATSR Instrument Series: SWIR Calibration, Cloud Masking and SAA' project, commonly known as the ATSR Long Term Stability (or ALTS) project, is designed to explore the key characteristics of the data set and new and innovative ways of enhancing and exploiting it.Work has focussed on: A new approach to the assessment of Short Wave Infra-Red (SWIR) channel calibration.; Developmentof a new method for Total Column Water Vapour (TCWV) retrieval.; Study of the South Atlantic Anomaly (SAA).; Radiative Transfer (RT) modelling for ATSR.; Providing AATSR observations with their location in the original instrument grid.; Strategies for the retrieval and archiving of historical ATSR documentation.; Study of TCWV retrieval over land; Development of new methods for cloud masking This paper provides an overview of these activities and illustrates the importance of preserving and understanding 'old' data for continued use in the future.

  13. Eggs, ethics and exploitation? Investigating women's experiences of an egg sharing scheme

    PubMed Central

    Haimes, Erica; Taylor, Ken; Turkmendag, Ilke

    2012-01-01

    Abstract There is a growing global demand for human eggs for the treatment of sub-fertile women and for stem cell-related research. This demand provokes concerns for the women providing the eggs, including their possible exploitation, whether they should be paid, whether they can give properly informed consent and whether their eggs and bodies are becoming commodified. However, few of the debates have benefitted from insights from the women themselves. We address this gap in knowledge by reporting on a study investigating women’s views and experiences of a scheme in which they can volunteer, in their capacity as fertility patients, to ‘share’ their eggs with researchers and receive a reduction in in vitro fertilisation fees. We focus our discussion on the question of exploitation, a concept central to many sociological and ethical interests. In brief, our analysis suggests that while interviewees acknowledge the potential of this scheme to be exploitative, they argue that this is not the case, emphasising their ability to act autonomously in deciding to volunteer. Nonetheless, these freely made decisions do not necessarily take place under circumstances of their choosing. We discuss the implications of this for egg provision in general and for understandings of exploitation. PMID:22443419

  14. Cognitive niches: an ecological model of strategy selection.

    PubMed

    Marewski, Julian N; Schooler, Lael J

    2011-07-01

    How do people select among different strategies to accomplish a given task? Across disciplines, the strategy selection problem represents a major challenge. We propose a quantitative model that predicts how selection emerges through the interplay among strategies, cognitive capacities, and the environment. This interplay carves out for each strategy a cognitive niche, that is, a limited number of situations in which the strategy can be applied, simplifying strategy selection. To illustrate our proposal, we consider selection in the context of 2 theories: the simple heuristics framework and the ACT-R (adaptive control of thought-rational) architecture of cognition. From the heuristics framework, we adopt the thesis that people make decisions by selecting from a repertoire of simple decision strategies that exploit regularities in the environment and draw on cognitive capacities, such as memory and time perception. ACT-R provides a quantitative theory of how these capacities adapt to the environment. In 14 simulations and 10 experiments, we consider the choice between strategies that operate on the accessibility of memories and those that depend on elaborate knowledge about the world. Based on Internet statistics, our model quantitatively predicts people's familiarity with and knowledge of real-world objects, the distributional characteristics of the associated speed of memory retrieval, and the cognitive niches of classic decision strategies, including those of the fluency, recognition, integration, lexicographic, and sequential-sampling heuristics. In doing so, the model specifies when people will be able to apply different strategies and how accurate, fast, and effortless people's decisions will be.

  15. Exploring Young Children's Understanding of Risks Associated with Internet Usage and Their Concepts of Management Strategies

    ERIC Educational Resources Information Center

    Ey, Lesley-Anne; Cupit, C. Glenn

    2011-01-01

    The Internet provides remarkable opportunities for children's learning and development. Nevertheless, it is unregulated and hard to control, which potentially places children at risk of exploitation. This study examined five-eight-year-old children's understanding of dangers associated with the Internet, management strategies and sources of their…

  16. System identification for modeling for control of flexible structures

    NASA Technical Reports Server (NTRS)

    Mettler, Edward; Milman, Mark

    1986-01-01

    The major components of a design and operational flight strategy for flexible structure control systems are presented. In this strategy an initial distributed parameter control design is developed and implemented from available ground test data and on-orbit identification using sophisticated modeling and synthesis techniques. The reliability of this high performance controller is directly linked to the accuracy of the parameters on which the design is based. Because uncertainties inevitably grow without system monitoring, maintaining the control system requires an active on-line system identification function to supply parameter updates and covariance information. Control laws can then be modified to improve performance when the error envelopes are decreased. In terms of system safety and stability the covariance information is of equal importance as the parameter values themselves. If the on-line system ID function detects an increase in parameter error covariances, then corresponding adjustments must be made in the control laws to increase robustness. If the error covariances exceed some threshold, an autonomous calibration sequence could be initiated to restore the error enveloped to an acceptable level.

  17. Balancing the Budget through Social Exploitation: Why Hard Times Are Even Harder for Some.

    PubMed

    Tropman, John; Nicklett, Emily

    2012-01-01

    In all societies needs and wants regularly exceed resources. Thus societies are always in deficit; demand always exceeds supply and "balancing the budget" is a constant social problem. To make matters somewhat worse, research suggests that need- and want-fulfillment tends to further stimulate the cycle of wantseeking rather than satiating desire. Societies use various resource-allocation mechanisms, including price, to cope with gaps between wants and resources. Social exploitation is a second mechanism, securing labor from population segments that can be coerced or convinced to perform necessary work for free or at below-market compensation. Using practical examples, this article develops a theoretical framework for understanding social exploitation. It then offers case examples of how different segments of the population emerge as exploited groups in the United States, due to changes in social policies. These exploitative processes have been exacerbated and accelerated by the economic downturn that began in 2007.

  18. Hunger and Satiety Mechanisms and Their Potential Exploitation in the Regulation of Food Intake.

    PubMed

    Amin, Tehmina; Mercer, Julian G

    2016-03-01

    Effective strategies to combat recent rises in obesity levels are limited. The accumulation of excess body fat results when energy intake exceeds that expended. Energy balance is controlled by hypothalamic responses, but these can be overridden by hedonic/reward brain systems. This override, combined with unprecedented availability of cheap, energy-dense, palatable foods, may partly explain the increase in overweight and obesity. The complexity of the processes that regulate feeding behaviour has driven the need for further fundamental research. Full4Health is an EU-funded project conceived to advance our understanding of hunger and satiety mechanisms. Food intake has an impact on and is also affected by the gut-brain signalling which controls hunger and appetite. This review describes selected recent research from Full4Health and how new mechanistic findings could be exploited to adapt and control our physiological responses to food, potentially providing an alternative solution to addressing the global problems related to positive energy balance.

  19. Exploitation of Ubiquitous Wi-Fi Devices as Building Blocks for Improvised Motion Detection Systems.

    PubMed

    Soldovieri, Francesco; Gennarelli, Gianluca

    2016-02-27

    This article deals with a feasibility study on the detection of human movements in indoor scenarios based on radio signal strength variations. The sensing principle exploits the fact that the human body interacts with wireless signals, introducing variations of the radiowave fields due to shadowing and multipath phenomena. As a result, human motion can be inferred from fluctuations of radiowave power collected by a receiving terminal. In this paper, we investigate the potentialities of widely available wireless communication devices in order to develop an improvised motion detection system (IMDS). Experimental tests are performed in an indoor environment by using a smartphone as a Wi-Fi access point and a laptop with dedicated software as a receiver. Simple detection strategies tailored for real-time operation are implemented to process the received signal strength measurements. The achieved results confirm the potentialities of the simple system here proposed to reliably detect human motion in operational conditions.

  20. ROC curve analyses of eyewitness identification decisions: An analysis of the recent debate.

    PubMed

    Rotello, Caren M; Chen, Tina

    2016-01-01

    How should the accuracy of eyewitness identification decisions be measured, so that best practices for identification can be determined? This fundamental question is under intense debate. One side advocates for continued use of a traditional measure of identification accuracy, known as the diagnosticity ratio , whereas the other side argues that receiver operating characteristic curves (ROCs) should be used instead because diagnosticity is confounded with response bias. Diagnosticity proponents have offered several criticisms of ROCs, which we show are either false or irrelevant to the assessment of eyewitness accuracy. We also show that, like diagnosticity, Bayesian measures of identification accuracy confound response bias with witnesses' ability to discriminate guilty from innocent suspects. ROCs are an essential tool for distinguishing memory-based processes from decisional aspects of a response; simulations of different possible identification tasks and response strategies show that they offer important constraints on theory development.

  1. Biased and unbiased strategies to identify biologically active small molecules.

    PubMed

    Abet, Valentina; Mariani, Angelica; Truscott, Fiona R; Britton, Sébastien; Rodriguez, Raphaël

    2014-08-15

    Small molecules are central players in chemical biology studies. They promote the perturbation of cellular processes underlying diseases and enable the identification of biological targets that can be validated for therapeutic intervention. Small molecules have been shown to accurately tune a single function of pluripotent proteins in a reversible manner with exceptional temporal resolution. The identification of molecular probes and drugs remains a worthy challenge that can be addressed by the use of biased and unbiased strategies. Hypothesis-driven methodologies employs a known biological target to synthesize complementary hits while discovery-driven strategies offer the additional means of identifying previously unanticipated biological targets. This review article provides a general overview of recent synthetic frameworks that gave rise to an impressive arsenal of biologically active small molecules with unprecedented cellular mechanisms. Copyright © 2014. Published by Elsevier Ltd.

  2. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

    PubMed

    Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar

    2018-05-04

    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

  3. Assessing exploitation experiences of girls and boys seen at a Child Advocacy Center

    PubMed Central

    Edinburgh, Laurel; Pape-Blabolil, Julie; Harpin, Scott B.; Saewyc, Elizabeth

    2015-01-01

    The primary aim of this study was to describe the abuse experiences of sexually exploited runaway adolescents seen at a Child Advocacy Center (N = 62). We also sought to identify risk behaviors, attributes of resiliency, laboratory results for sexually transmitted infection (STI) screens, and genital injuries from colposcopic exams. We used retrospective mixed-methods with in-depth forensic interviews, together with self-report survey responses, physical exams and chart data. Forensic interviews were analyzed using interpretive description analytical methods along domains of experience and meaning of sexual exploitation events. Univariate descriptive statistics characterized trauma responses and health risks. The first sexual exploitation events for many victims occurred as part of seemingly random encounters with procurers. Older adolescent or adult women recruited some youth working for a pimp. However, half the youth did not report a trafficker involved in setting up their exchange of sex for money, substances, or other types of consideration. 78% scored positive on the UCLA PTSD tool; 57% reported DSM IV criteria for problem substance use; 71% reported cutting behaviors, 75% suicidal ideation, and 50% had attempted suicide. Contrary to common depictions, youth may be solicited relatively quickly as runaways, yet exploitation is not always linked to having a pimp. Avoidant coping does not appear effective, as most patients exhibited significant symptoms of trauma. Awareness of variations in youth’s sexual exploitation experiences may help researchers and clinicians understand potential differences in sequelae, design effective treatment plans, and develop community prevention programs. PMID:25982287

  4. Learning Efficient Spatial-Temporal Gait Features with Deep Learning for Human Identification.

    PubMed

    Liu, Wu; Zhang, Cheng; Ma, Huadong; Li, Shuangqun

    2018-02-06

    The integration of the latest breakthroughs in bioinformatics technology from one side and artificial intelligence from another side, enables remarkable advances in the fields of intelligent security guard computational biology, healthcare, and so on. Among them, biometrics based automatic human identification is one of the most fundamental and significant research topic. Human gait, which is a biometric features with the unique capability, has gained significant attentions as the remarkable characteristics of remote accessed, robust and security in the biometrics based human identification. However, the existed methods cannot well handle the indistinctive inter-class differences and large intra-class variations of human gait in real-world situation. In this paper, we have developed an efficient spatial-temporal gait features with deep learning for human identification. First of all, we proposed a gait energy image (GEI) based Siamese neural network to automatically extract robust and discriminative spatial gait features for human identification. Furthermore, we exploit the deep 3-dimensional convolutional networks to learn the human gait convolutional 3D (C3D) as the temporal gait features. Finally, the GEI and C3D gait features are embedded into the null space by the Null Foley-Sammon Transform (NFST). In the new space, the spatial-temporal features are sufficiently combined with distance metric learning to drive the similarity metric to be small for pairs of gait from the same person, and large for pairs from different persons. Consequently, the experiments on the world's largest gait database show our framework impressively outperforms state-of-the-art methods.

  5. Exploiting solitons in all-optical networks

    NASA Astrophysics Data System (ADS)

    Atieh, Ahmad K.

    Two key components, the pulse generator and optical signal demultiplexer, needed for the implementation of all-optical soliton-based local area and wide area networks are investigated. The technology of generating a bright soliton pulse train from a sinusoidal pulse train produced as the beat signal of two distributed feedback laser diodes passed through a so-called comblike fiber structure is developed. A design methodology for this structure is discussed, and using this approach a soliton pulse source is constructed generating 1553 nm pulses at a repetition rate of 50 GHz, with pulses of full width at half maximum of 2.0 ps. The fiber structure used to generate the bright soliton pulse train employs the lowest average power for the beat signal ever reported in the literature, and the shortest length of fiber. The same structure (with a different design) is also used to produce a 47.6 GHz dark soliton pulse train with a full width at half maximum of 3.8 ps. This is the first reported use of this structure to generate dark solitons. It is shown that the comblike dispersion profile fiber structures may also be exploited for soliton pulse compression producing widths as short as 200 fs. Two approaches to implementation of optical signal demultiplexing are discussed. These are the nonlinear optical loop mirror (NOLM) and the separation of multilevel time division multiplexed signal pulses in the frequency domain by exploiting the relationship between the pulse's energy (i.e. pulse amplitude and width) and the Raman self-frequency shift. A modification of the NOLM scheme is investigated where feedback that adjusts the power of the control signal (by controlling the gain of an erbium-doped fiber amplifier introduced into the control signal input path) is employed to make the structure insensitive to the state of polarization of the signal and control pulses. In order to better understand the physical phenomena exploited in optical fiber soliton transmission and the

  6. Sentinel-1 data exploitation for geohazard activity map generation

    NASA Astrophysics Data System (ADS)

    Barra, Anna; Solari, Lorenzo; Béjar-Pizarro, Marta; Monserrat, Oriol; Herrera, Gerardo; Bianchini, Silvia; Crosetto, Michele; María Mateos, Rosa; Sarro, Roberto; Moretti, Sandro

    2017-04-01

    This work is focused on geohazard mapping and monitoring by exploiting Sentinel-1 (A and B) data and the DInSAR (Differential interferometric SAR (Synthetic Aperture Radar)) techniques. Sometimes the interpretation of the DInSAR derived product (like the velocity map) can be complex, mostly for a final user who do not usually works with radar. The aim of this work is to generate, in a rapid way, a clear product to be easily exploited by the authorities in the geohazard management: intervention planning and prevention activities. Specifically, the presented methodology has been developed in the framework of the European project SAFETY, which is aimed at providing Civil Protection Authorities (CPA) with the capability of periodically evaluating and assessing the potential impact of geohazards (volcanic activity, earthquakes, landslides and subsidence) on urban areas. The methodology has three phases, the interferograms generation, the activity map generation, in terms of velocity and accumulated deformation (with time-series), and the Active Deformation Area (ADA) map generation. The last one is the final product, derived from the original activity map by analyzing the data in a Geographic Information System (GIS) environment, which isolate only the true deformation areas over the noise. This product can be more easily read by the authorities than the original activity map, i.e. can be better exploited to integrate other information and analysis. This product also permit an easy monitoring of the active areas.

  7. Identification of Spiroplasmainsolitum symbionts in Anopheles gambiae.

    PubMed

    Chepkemoi, Sharon T; Mararo, Enock; Butungi, Hellen; Paredes, Juan; Masiga, Daniel; Sinkins, Steven P; Herren, Jeremy K

    2017-01-01

    Background : Insect symbionts have the potential to block the transmission of vector-borne diseases by their hosts. The advancement of a symbiont-based transmission blocking strategy for malaria requires the identification and study of Anopheles symbionts. Methods : High throughput 16S amplicon sequencing was used to profile the bacteria associated with Anopheles gambiae sensu lato and identify potential symbionts. The polymerase chain reaction (PCR) with specific primers were subsequently used to monitor symbiont prevalence in field populations, as well as symbiont transmission patterns. Results : We report the discovery of the bacterial symbiont, Spiroplasma , in Anopheles gambiae in Kenya. We determine that geographically dispersed Anopheles gambiae populations in Kenya are infected with Spiroplasma at low prevalence levels. Molecular phylogenetics indicates that this Anopheles gambiae associated Spiroplasma is a member of the insolitum clade. We demonstrate that this symbiont is stably maternally transmitted across at least two generations and does not significantly affect the fecundity or egg to adult survival of its host. Conclusions : In diverse insect species, Spiroplasma has been found to render their host resistant to infection by pathogens. The identification of a maternally transmitted strain of Spiroplasma in Anopheles gambiae may therefore open new lines of investigation for the development of symbiont-based strategies for blocking malaria transmission.

  8. Ethics position towards the exploitation of manganese material in Oenbit Village, East Nusa Tenggara, Indonesia

    NASA Astrophysics Data System (ADS)

    Fios, Frederikus

    2017-04-01

    Oenbit village is an area that is located in the district of Timor Tengah Utara (TTU), Timor Island, East Nusa Tenggara Province, Indonesia. In Oenbit ongoing a conflict between the economic interests of some parties namely the government, corporation and the local indigenous community. Government of Timor Tengah Utara give legal permission to the Elgari Resources Indonesia (ERI) Company to exploit the mining of Manganese in Oenbit Village which informally is the ancestral land of indigenous peoples Oenbit hereditary called pusuf kelef and Kot-tau niap-tau (king land). Oenbit society has an ethical belief that the ancestral land Oenbit should not be produced by outside parties besides the local community on the orders of the king. Manganese exploitation in Oenbit Village cause problems contradictorily interesting to reflect on the ethical-philosophical. This paper aims to reflect the ethical position against cases of exploitation of manganese in the Oenbit Village with focuses on the local government’s decision to issue a permit exploitation and ERI Company exploit Mangan assumed unethical traditional indigenous tribe Oenbit. The study found that the district government and ERI Company has violated the public ethics and society traditional law, especially the rights of local indigenous communities by exploiting manganese material. The method used is the reflection of philosophy with ethical approaches and relevant ethical theories.

  9. DANDRUFF: THE MOST COMMERCIALLY EXPLOITED SKIN DISEASE

    PubMed Central

    Ranganathan, S; Mukhopadhyay, T

    2010-01-01

    The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious – a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries. PMID:20606879

  10. Genetic surgery - a right strategy to attack cancer.

    PubMed

    Sverdlov, Eugene D

    2011-12-01

    The approaches now united under the term "gene therapy" can be divided into two broad strategies: (1) strategy using the ideology of molecular targeted therapy, but with genes in the role of agents targeted at certain molecular component(s) or pathways presumably crucial for cancer maintenance; (ii) strategy aimed at the destruction of tumors as a whole exploiting the features shared by all cancers, for example relatively fast mitotic cell division. While the first strategy is "true" gene therapy, the second one, as e.g. suicide gene therapy, is more like genetic surgery, when a surgeon just cuts off a tumor being not interested in subtle genetic mechanisms of cancer emergence and progression. This approach inherits the ideology of chemotherapy but escapes its severe toxic effects due to intracellular formation of toxic agents. Genetic surgery seems to be the most appropriate approach to combat cancer, and its simplicity is paradoxically adequate to the super-complexity of tumors. The review consists of three parts: (i) analysis of the reasons of tumor supercomplexity and fatally inevitable failure of molecular targeted therapy, (ii) general principles of the genetic surgery strategy, and (iii) examples of genetic surgery approaches with analysis of their drawbacks and the ways for their improvement.

  11. Relativistic Quantum Metrology: Exploiting relativity to improve quantum measurement technologies

    PubMed Central

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-01-01

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects. PMID:24851858

  12. DNA barcoding and morphological identification of neotropical ichthyoplankton from the Upper Paraná and São Francisco.

    PubMed

    Becker, R A; Sales, N G; Santos, G M; Santos, G B; Carvalho, D C

    2015-07-01

    The identification of fish larvae from two neotropical hydrographic basins using traditional morphological taxonomy and DNA barcoding revealed no conflicting results between the morphological and barcode identification of larvae. A lower rate (25%) of correct morphological identification of eggs as belonging to migratory or non-migratory species was achieved. Accurate identification of ichthyoplankton by DNA barcoding is an important tool for fish reproductive behaviour studies, correct estimation of biodiversity by detecting eggs from rare species, as well as defining environmental and management strategies for fish conservation in the neotropics. © 2015 The Fisheries Society of the British Isles.

  13. Balancing the Budget through Social Exploitation: Why Hard Times Are Even Harder for Some

    PubMed Central

    Tropman, John; Nicklett, Emily

    2013-01-01

    In all societies needs and wants regularly exceed resources. Thus societies are always in deficit; demand always exceeds supply and “balancing the budget” is a constant social problem. To make matters somewhat worse, research suggests that need- and want-fulfillment tends to further stimulate the cycle of wantseeking rather than satiating desire. Societies use various resource-allocation mechanisms, including price, to cope with gaps between wants and resources. Social exploitation is a second mechanism, securing labor from population segments that can be coerced or convinced to perform necessary work for free or at below-market compensation. Using practical examples, this article develops a theoretical framework for understanding social exploitation. It then offers case examples of how different segments of the population emerge as exploited groups in the United States, due to changes in social policies. These exploitative processes have been exacerbated and accelerated by the economic downturn that began in 2007. PMID:23936753

  14. Exploitation of pocket gophers and their food caches by grizzly bears

    USGS Publications Warehouse

    Mattson, D.J.

    2004-01-01

    I investigated the exploitation of pocket gophers (Thomomys talpoides) by grizzly bears (Ursus arctos horribilis) in the Yellowstone region of the United States with the use of data collected during a study of radiomarked bears in 1977-1992. My analysis focused on the importance of pocket gophers as a source of energy and nutrients, effects of weather and site features, and importance of pocket gophers to grizzly bears in the western contiguous United States prior to historical extirpations. Pocket gophers and their food caches were infrequent in grizzly bear feces, although foraging for pocket gophers accounted for about 20-25% of all grizzly bear feeding activity during April and May. Compared with roots individually excavated by bears, pocket gopher food caches were less digestible but more easily dug out. Exploitation of gopher food caches by grizzly bears was highly sensitive to site and weather conditions and peaked during and shortly after snowmelt. This peak coincided with maximum success by bears in finding pocket gopher food caches. Exploitation was most frequent and extensive on gently sloping nonforested sites with abundant spring beauty (Claytonia lanceolata) and yampah (Perdieridia gairdneri). Pocket gophers are rare in forests, and spring beauty and yampah roots are known to be important foods of both grizzly bears and burrowing rodents. Although grizzly bears commonly exploit pocket gophers only in the Yellowstone region, this behavior was probably widespread in mountainous areas of the western contiguous United States prior to extirpations of grizzly bears within the last 150 years.

  15. MULTI-DIMENSIONAL MASS SPECTROMETRY-BASED SHOTGUN LIPIDOMICS AND NOVEL STRATEGIES FOR LIPIDOMIC ANALYSES

    PubMed Central

    Han, Xianlin; Yang, Kui; Gross, Richard W.

    2011-01-01

    Since our last comprehensive review on multi-dimensional mass spectrometry-based shotgun lipidomics (Mass Spectrom. Rev. 24 (2005), 367), many new developments in the field of lipidomics have occurred. These developments include new strategies and refinements for shotgun lipidomic approaches that use direct infusion, including novel fragmentation strategies, identification of multiple new informative dimensions for mass spectrometric interrogation, and the development of new bioinformatic approaches for enhanced identification and quantitation of the individual molecular constituents that comprise each cell’s lipidome. Concurrently, advances in liquid chromatography-based platforms and novel strategies for quantitative matrix-assisted laser desorption/ionization mass spectrometry for lipidomic analyses have been developed. Through the synergistic use of this repertoire of new mass spectrometric approaches, the power and scope of lipidomics has been greatly expanded to accelerate progress toward the comprehensive understanding of the pleiotropic roles of lipids in biological systems. PMID:21755525

  16. Implementation strategies: recommendations for specifying and reporting

    PubMed Central

    2013-01-01

    Implementation strategies have unparalleled importance in implementation science, as they constitute the ‘how to’ component of changing healthcare practice. Yet, implementation researchers and other stakeholders are not able to fully utilize the findings of studies focusing on implementation strategies because they are often inconsistently labelled and poorly described, are rarely justified theoretically, lack operational definitions or manuals to guide their use, and are part of ‘packaged’ approaches whose specific elements are poorly understood. We address the challenges of specifying and reporting implementation strategies encountered by researchers who design, conduct, and report research on implementation strategies. Specifically, we propose guidelines for naming, defining, and operationalizing implementation strategies in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes addressed, and theoretical justification. Ultimately, implementation strategies cannot be used in practice or tested in research without a full description of their components and how they should be used. As with all intervention research, their descriptions must be precise enough to enable measurement and ‘reproducibility.’ We propose these recommendations to improve the reporting of implementation strategies in research studies and to stimulate further identification of elements pertinent to implementation strategies that should be included in reporting guidelines for implementation strategies. PMID:24289295

  17. Implementation strategies: recommendations for specifying and reporting.

    PubMed

    Proctor, Enola K; Powell, Byron J; McMillen, J Curtis

    2013-12-01

    Implementation strategies have unparalleled importance in implementation science, as they constitute the 'how to' component of changing healthcare practice. Yet, implementation researchers and other stakeholders are not able to fully utilize the findings of studies focusing on implementation strategies because they are often inconsistently labelled and poorly described, are rarely justified theoretically, lack operational definitions or manuals to guide their use, and are part of 'packaged' approaches whose specific elements are poorly understood. We address the challenges of specifying and reporting implementation strategies encountered by researchers who design, conduct, and report research on implementation strategies. Specifically, we propose guidelines for naming, defining, and operationalizing implementation strategies in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes addressed, and theoretical justification. Ultimately, implementation strategies cannot be used in practice or tested in research without a full description of their components and how they should be used. As with all intervention research, their descriptions must be precise enough to enable measurement and 'reproducibility.' We propose these recommendations to improve the reporting of implementation strategies in research studies and to stimulate further identification of elements pertinent to implementation strategies that should be included in reporting guidelines for implementation strategies.

  18. [Multiplex PCR strategy for the simultaneous identification of Staphylococcus aureus and detection of staphylococcal enterotoxins in isolates from food poisoning outbreaks].

    PubMed

    Brizzio, Aníbal A; Tedeschi, Fabián A; Zalazar, Fabián E

    2013-01-01

    Staphylococcal food poisoning is the most frequent type of food poisoning around the world. Staphylococcus aureus enterotoxins cause significant loss of water in the intestinal lumen, followed by vomiting and diarrhea. To report a fast, reliable and inexpensive strategy based on multiplex PCR for the simultaneous identification of S. aureus and detection of five classical S. aureus enterotoxin genes ( sea, seb, sec, sed, see ) in Staphylococcus spp. strains isolated from food poisoning outbreaks. We analyzed isolates from 12 food poisoning outbreaks occurred in Santa Fe province (Argentina). Isolation and phenotypic characterization were carried out by standard procedures. Genotypic analysis was performed by multiplex PCR, using primers for nuc , sea-see and 16S rRNA genes simultaneously. Of all the strains tested, 58% were found to carry toxigenic genes. Sea and seb toxins were found at the same percentage (29%) while sec, sed and see genes were found in a lower and identical proportion (14%). We did not find more than one different type of S. aureus enterotoxin in the isolates analyzed. The multiplex PCR strategy designed in this work has enabled us to identify strains of S. aureus and detect -at the same time- their enterotoxigenic ability. At present, our efforts are devoted to the detection of genes encoding enterotoxins other than the classical ones, in order to know their impact on staphylococcal food poisoning, as well as to investigate their relevance to our country's public health.

  19. Opportunism or aquatic specialization? Evidence of freshwater fish exploitation at Ohalo II- A waterlogged Upper Paleolithic site

    PubMed Central

    Dayan, Tamar; Goren, Menachem; Nadel, Dani; Hershkovitz, Israel

    2018-01-01

    Analysis of ca. 17,000 fish remains recovered from the late Upper Paleolithic/early Epi-Paleolithic (LGM; 23,000 BP) waterlogged site of Ohalo II (Rift Valley, Israel) provides new insights into the role of wetland habitats and the fish inhabiting them during the evolution of economic strategies prior to the agricultural evolution. Of the current 19 native fish species in Lake Kinneret (Sea of Galilee), eight species were identified at Ohalo II, belonging to two freshwater families: Cyprinidae (carps) and Cichlidae (St. Peter fish). Employing a large set of quantitative and qualitative criteria (NISP, species richness, diversity, skeletal element representation, fragmentation, color, spatial distribution, etc.), we demonstrate that the inhabitants of Ohalo II used their knowledge of the breeding behavior of different species of fish, for year-round intensive exploitation. PMID:29912923

  20. Opportunism or aquatic specialization? Evidence of freshwater fish exploitation at Ohalo II- A waterlogged Upper Paleolithic site.

    PubMed

    Zohar, Irit; Dayan, Tamar; Goren, Menachem; Nadel, Dani; Hershkovitz, Israel

    2018-01-01

    Analysis of ca. 17,000 fish remains recovered from the late Upper Paleolithic/early Epi-Paleolithic (LGM; 23,000 BP) waterlogged site of Ohalo II (Rift Valley, Israel) provides new insights into the role of wetland habitats and the fish inhabiting them during the evolution of economic strategies prior to the agricultural evolution. Of the current 19 native fish species in Lake Kinneret (Sea of Galilee), eight species were identified at Ohalo II, belonging to two freshwater families: Cyprinidae (carps) and Cichlidae (St. Peter fish). Employing a large set of quantitative and qualitative criteria (NISP, species richness, diversity, skeletal element representation, fragmentation, color, spatial distribution, etc.), we demonstrate that the inhabitants of Ohalo II used their knowledge of the breeding behavior of different species of fish, for year-round intensive exploitation.