Sample records for identifying ipv6 network

  1. IPv6 Tactical Network Management

    DTIC Science & Technology

    2009-09-01

    is transitioning to IPv6 networks. While the benefits provided by IPv6 are numerous, its challenges lie in managing a network on the scale...operability, and usability in a tactical network is under way. New challenges are also presented by the need to integrate into the IPv6 segment new...Accessing this information also presents challenges . Feasibility studies are conducted to show that, for these devices, the IPv6 domain is at least

  2. IPv6 Security

    NASA Astrophysics Data System (ADS)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  3. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    PubMed Central

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  4. Advanced mobility handover for mobile IPv6 based wireless networks.

    PubMed

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  5. Dynamics of Abusive IPv6 Networks

    DTIC Science & Technology

    2014-09-01

    analysis tools to detect, classify, and associate IPv6 spamming behavior , both at the victim mail exchanger and among IPv6 wide-area routes. Furthermore...popular mail transfer agents were tested in an effort to profile their IPv6 behavior and correlate with spam obtained from the real world production...domain. Results show that while IPv6 spamming behavior is growing, it is still in its infancy and no outstanding characteristics emerged that allow

  6. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  7. WLCG and IPv6 - the HEPiX IPv6 working group

    NASA Astrophysics Data System (ADS)

    Campana, S.; Chadwick, K.; Chen, G.; Chudoba, J.; Clarke, P.; Eliáš, M.; Elwell, A.; Fayer, S.; Finnern, T.; Goossens, L.; Grigoras, C.; Hoeft, B.; Kelsey, D. P.; Kouba, T.; López Muñoz, F.; Martelli, E.; Mitchell, M.; Nairz, A.; Ohrenberg, K.; Pfeiffer, A.; Prelz, F.; Qi, F.; Rand, D.; Reale, M.; Rozsa, S.; Sciaba, A.; Voicu, R.; Walker, C. J.; Wildish, T.

    2014-06-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  8. WLCG and IPv6 - The HEPiX IPv6 working group

    DOE PAGES

    Campana, S.; K. Chadwick; Chen, G.; ...

    2014-06-11

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applyingmore » for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). Furthermore, this paper describes the work done by the working group and its future plans.« less

  9. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eli Dart; Helen Chen; Jerry Friesen

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM ismore » connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.« less

  10. An IPv6 Multihomed Host for Outbound Traffic

    NASA Astrophysics Data System (ADS)

    Chen, Chin-Ling; Cao, Sheng-Lung

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host architecture to connect both IPv6 network and 6to4 network. This paper describes a load balance mechanism that allows applications on multihomed devices to utilize the individual networks efficiently to transmit streams that could be part of a session. We experiment the relevant parameters in the IPv6 testbed environment to demonstrate its effectiveness.

  11. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  12. IPv6 Test Bed for Testing Aeronautical Applications

    NASA Technical Reports Server (NTRS)

    Wilkins, Ryan; Zernic, Michael; Dhas, Chris

    2004-01-01

    Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.

  13. Evaluating IPv6 Adoption in the Internet

    NASA Astrophysics Data System (ADS)

    Colitti, Lorenzo; Gunderson, Steinar H.; Kline, Erik; Refice, Tiziana

    As IPv4 address space approaches exhaustion, large networks are deploying IPv6 or preparing for deployment. However, there is little data available about the quantity and quality of IPv6 connectivity. We describe a methodology to measure IPv6 adoption from the perspective of a Web site operator and to evaluate the impact that adding IPv6 to a Web site will have on its users. We apply our methodology to the Google Web site and present results collected over the last year. Our data show that IPv6 adoption, while growing significantly, is still low, varies considerably by country, and is heavily influenced by a small number of large deployments. We find that native IPv6 latency is comparable to IPv4 and provide statistics on IPv6 transition mechanisms used.

  14. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    PubMed Central

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  15. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    PubMed

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  16. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    NASA Astrophysics Data System (ADS)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  17. The design of IPv6's transitional scheme in university

    NASA Astrophysics Data System (ADS)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  18. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    NASA Astrophysics Data System (ADS)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  19. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    PubMed

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  20. Security analysis and enhanced user authentication in proxy mobile IPv6 networks

    PubMed Central

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621

  1. Deployment of IPv6-only CPU resources at WLCG sites

    NASA Astrophysics Data System (ADS)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.

    2017-10-01

    The fraction of Internet traffic carried over IPv6 continues to grow rapidly. IPv6 support from network hardware vendors and carriers is pervasive and becoming mature. A network infrastructure upgrade often offers sites an excellent window of opportunity to configure and enable IPv6. There is a significant overhead when setting up and maintaining dual-stack machines, so where possible sites would like to upgrade their services directly to IPv6 only. In doing so, they are also expediting the transition process towards its desired completion. While the LHC experiments accept there is a need to move to IPv6, it is currently not directly affecting their work. Sites are unwilling to upgrade if they will be unable to run LHC experiment workflows. This has resulted in a very slow uptake of IPv6 from WLCG sites. For several years the HEPiX IPv6 Working Group has been testing a range of WLCG services to ensure they are IPv6 compliant. Several sites are now running many of their services as dual-stack. The working group, driven by the requirements of the LHC VOs to be able to use IPv6-only opportunistic resources, continues to encourage wider deployment of dual-stack services to make the use of such IPv6-only clients viable. This paper presents the working group’s plan and progress so far to allow sites to deploy IPv6-only CPU resources. This includes making experiment central services dual-stack as well as a number of storage services. The monitoring, accounting and information services that are used by jobs also need to be upgraded. Finally the VO testing that has taken place on hosts connected via IPv6-only is reported.

  2. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    ERIC Educational Resources Information Center

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  3. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    NASA Astrophysics Data System (ADS)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-06-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  4. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  5. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deploymentmore » begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.« less

  6. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in governmentmore » network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.« less

  7. IPv6 testing and deployment at Prague Tier 2

    NASA Astrophysics Data System (ADS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  8. IPV6 Network Infrastructure and Stability Inference

    DTIC Science & Technology

    2014-09-01

    study focused on determining restart behavior for addresses with incremental fragmen- tation identification numbers. However, the initial evaluation ...the Too Big Trick (TBT) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of...to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of the IPv6 addresses can be inferred. v THIS PAGE

  9. The production deployment of IPv6 on WLCG

    NASA Astrophysics Data System (ADS)

    Bernier, J.; Campana, S.; Chadwick, K.; Chudoba, J.; Dewhurst, A.; Eliáš, M.; Fayer, S.; Finnern, T.; Grigoras, C.; Hartmann, T.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Macmahon, E.; Martelli, E.; Millar, A. P.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Voicu, R.; Walker, C. J.; Wildish, T.

    2015-12-01

    The world is rapidly running out of IPv4 addresses; the number of IPv6 end systems connected to the internet is increasing; WLCG and the LHC experiments may soon have access to worker nodes and/or virtual machines (VMs) possessing only an IPv6 routable address. The HEPiX IPv6 Working Group has been investigating, testing and planning for dual-stack services on WLCG for several years. Following feedback from our working group, many of the storage technologies in use on WLCG have recently been made IPv6-capable. This paper presents the IPv6 requirements, tests and plans of the LHC experiments together with the tests performed on the group's IPv6 test-bed. This is primarily aimed at IPv6-only worker nodes or VMs accessing several different implementations of a global dual-stack federated storage service. Finally the plans for deployment of production dual-stack WLCG services are presented.

  10. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  11. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    NASA Astrophysics Data System (ADS)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  12. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  13. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  14. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION... Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the following...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  15. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    NASA Astrophysics Data System (ADS)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  16. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    PubMed Central

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  17. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    PubMed

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  18. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    NASA Astrophysics Data System (ADS)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  19. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    PubMed Central

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863

  20. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  1. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    NASA Technical Reports Server (NTRS)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  2. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  3. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    PubMed

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  4. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    PubMed Central

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  5. High-Frequency Mapping of the IPV6 Internet Using YARRP

    DTIC Science & Technology

    2017-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA APPLIED CYBER OPERATIONS CAPSTONE PROJECT REPORT HIGH -FREQUENCY MAPPING OF THE IPV6 INTERNET USING...03-30-2017 4. TITLE AND SUBTITLE HIGH -FREQUENCY MAPPING OF THE IPV6 INTERNET USING YARRP 5. FUNDING NUMBERS RCKHX 6. AUTHOR(S) Eric W. Gaston 7...the U.S. Government. IRB Protocol Number: N/A. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release. Distribution is unlimited. 12b

  6. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    NASA Astrophysics Data System (ADS)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  7. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-17

    ...The National Telecommunications and Information Administration (NTIA), on behalf of the U.S. Department of Commerce (Department), will hold a workshop on September 28, 2010, on the importance of the adoption and deployment of Internet Protocol version six (IPv6) addresses for industry, the U.S. Government, and the Internet economy.

  8. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    DTIC Science & Technology

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  9. Deployment of 464XLAT (RFC6877) alongside IPv6-only CPU resources at WLCG sites

    NASA Astrophysics Data System (ADS)

    Froy, T. S.; Traynor, D. P.; Walker, C. J.

    2017-10-01

    IPv4 is now officially deprecated by the IETF. A significant amount of effort has already been expended by the HEPiX IPv6 Working Group on testing dual-stacked hosts and IPv6-only CPU resources. Dual-stack adds complexity and administrative overhead to sites that may already be starved of resource. This has resulted in a very slow uptake of IPv6 from WLCG sites. 464XLAT (RFC6877) is intended for IPv6 single-stack environments that require the ability to communicate with IPv4-only endpoints. This paper will present a deployment strategy for 464XLAT, operational experiences of using 464XLAT in production at a WLCG site and important information to consider prior to deploying 464XLAT.

  10. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets

    PubMed Central

    Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently. PMID:28968450

  11. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    PubMed

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  12. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    PubMed

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  13. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    PubMed

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  14. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    PubMed Central

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  15. Shifting Perceptions of Consequences of IPV Among Beneficiaries of Indashyikirwa: An IPV Prevention Program in Rwanda.

    PubMed

    Stern, Erin; Niyibizi, Lea Liliane

    2018-06-01

    Indashyikirwa is a Rwandan program that seeks to prevent intimate partner violence (IPV) and support healthy, equitable relationships. A fundamental program aspect is a 5-month curriculum among heterosexual couples designed to identify the causes and consequences of economic, emotional, physical, and sexual IPV, and build skills to manage triggers of IPV. The program also trained opinion leaders to more effectively prevent and respond to IPV, and established women's safe spaces to educate women about their rights, refer or accompany women who wish to report abuse or seek services. Drawing on 30 interviews with couples and 9 interviews with opinion leaders before and after completing the Indashyikirwa trainings, this article highlights beneficiaries' perceived consequences of IPV, and how such perceptions were influenced through the Indashyikirwa program. Interviews were conducted in Kinyarwanda, recorded, translated, and transcribed into English and analyzed thematically. The data reveal a depth of understanding of consequences of various forms of IPV. Although several participants justified more minor forms of men's physical IPV, such as slapping, severe consequences of physical IPV were most readily identified and sanctioned. Various harms of emotional and economic IPV were reported, yet these forms of IPV were typically less socially sanctioned or identified as IPV. Conceptions of sexual IPV were influenced by inequitable gender norms, and not typically recognized as a violation under the law. Although the data do not yet demonstrate the long-term impact, collectively identifying the overlapping consequences and underlying power inequalities for all forms of IPV, the legal rights protecting against various forms of IPV, and the benefits of nonviolent, equitable relationships, appeared to be helpful to shift perceptions of consequences of IPV. Implications of the findings for the program and broader IPV prevention are identified.

  16. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    NASA Astrophysics Data System (ADS)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  17. Evolution of IPv6 Internet topology with unusual sudden changes

    NASA Astrophysics Data System (ADS)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  18. Hybrid model for wireless mobility management using IPv6

    NASA Astrophysics Data System (ADS)

    Howie, Douglas P.; Sun, Junzhao; Koivisto, Antti T.

    2001-07-01

    Within the coming decade, there will be a dramatic increase in the availability of inexpensive, computationally powerful mobile devices running applications which use the Internet Protocol (IP) to access multimedia services over broad-band wireless connections. To this end, there has been extensive research and standardization in the areas of Mobile IP and IPv6. The purpose of this paper is to apply this work to the issues involved in designing a mobility model able to adapt to different wireless mobile IP scenarios. We describe the usefulness of this model in the 4th generation mobile multimedia systems to come. This new model has been synthesized through a comparative analysis of current mobile IP models where particular attention has been given to the problems of mobile IP handoff and mobility management and their impact on QoS. By applying a unique perspective to these problems, our model is used to set a roadmap for future mobile IPv6 testbed construction.

  19. Intimate partner violence (IPV): The validity of an IPV screening instrument utilized among pregnant women in Tanzania and Vietnam

    PubMed Central

    Rasch, Vibeke; Van, Toan Ngo; Nguyen, Hanh Thi Thuy; Manongi, Rachel; Mushi, Declare; Meyrowitsch, Dan W.; Gammeltoft, Tine; Wu, Chun Sen

    2018-01-01

    Background Intimate partner violence (IPV) is a global problem that affects one-third of all women. The present study aims to develop and determine the validity of a screening instrument for the detection of IPV in pregnant women in Tanzania and Vietnam and to determine the minimum number of questions needed to identify IPV. Method An IPV screening instrument based on eight questions was tested on 1,116 Tanzanian and 1,309 Vietnamese women who attended antenatal care before 24 gestational weeks. The women were re-interviewed during their 30th-34th gestational week where the World Health Organization (WHO) IPV questionnaire was used as the gold standard. In all, 255 combinations of eight different questions were first tested on the Tanzanian study population where sensitivity, specificity, positive predictive value, negative predictive value and accuracy were calculated. In the evaluation of the performance of the question combinations, different IPV types and the frequency of abusive acts were considered. The question combinations that performed best in Tanzania were subsequently evaluated in the Vietnamese study population. Results In Tanzania, a combination of three selected questions including one question on emotional IPV, one on physical IPV and one on sexual IPV was found to be most effective in identifying women who are exposed to at least one type of IPV during pregnancy (sensitivity = .80; specificity = .74). The performance of the identified combination was slightly less effective in Vietnam (sensitivity = .74; specificity = .68). Focusing on different IPV types, the best performance was found for exposure to physical IPV in both Tanzania (sensitivity = .93; specificity = .70) and Vietnam (sensitivity = .96; specificity = .55). In both countries, the sensitivity increased with the frequency of abuse whereas the specificity decreased. Conclusion By asking pregnant women three simple questions we were able to identify women who were exposed to IPV during

  20. Inter-Domain Roaming Mechanism Transparent to Mobile Nodes among PMIPv6 Networks

    NASA Astrophysics Data System (ADS)

    Park, Soochang; Lee, Euisin; Jin, Min-Sook; Kim, Sang-Ha

    In Proxy Mobile IPv6 (PMIPv6), when a Mobile Node (MN) enters a PMIPv6 domain and attaches to an access link, the router on the access link detects attachment of the MN by the link-layer access. All elements of PMIPv6 including the router then provide network-based mobility management service for the MN. If the MN moves to another router in this PMIPv6 domain, the new router emulates attachment to the previous router by providing same network prefix to the MN. In other words, PMIPv6 provides rapid mobility management based on layer-2 attachment and transparent mobility support to the MN by emulating layer-3 attachment with respect to intra-domain roaming. However, when the MN moves to other PMIPv6 domains, although the domains also provide the network-based mobility management service, the MN should exploit the host-based mobility management protocol, i.e. Mobile IPv6 (MIPv6), for the inter-domain roaming. Hence, this letter proposes the rapid and transparent inter-domain roaming mechanism controlled by the networks adopting PMIPv6.

  1. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    DTIC Science & Technology

    2012-03-01

    of cross-NIDS, standardized, rule sets such as SNORT’s VRT [23]. • Continuously monitor vulnerability or exploit development sites. For example, the...and BRO polices should be written to enhance detection. The bolstering of built-in databases and repositories such as VRT [23] for specific IPv6 issues

  2. FLOWER IPv4/IPv6 Network Flow Summarization software

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nickless, Bill; Curtis, Darren; Christy, Jason

    FLOWER was written as a refactoring/reimplementation of the existing Flo software used by the Cooperative Protection Program (CPP) to provide network flow summaries for analysis by the Operational Analysis Center (OAC) and other US Department of Energy cyber security elements. FLOWER is designed and tested to operate at 10 gigabits/second, nearly 10 times faster than competing solutions. FLOWER output is optimized for importation into SQL databases for categorization and analysis. FLOWER is written in C++ using current best software engineering practices.

  3. Forwarding techniques for IP fragmented packets in a real 6LoWPAN network.

    PubMed

    Ludovici, Alessandro; Calveras, Anna; Casademont, Jordi

    2011-01-01

    Wireless Sensor Networks (WSNs) are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over) focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  4. Forwarding Techniques for IP Fragmented Packets in a Real 6LoWPAN Network

    PubMed Central

    Ludovici, Alessandro; Calveras, Anna; Casademont, Jordi

    2011-01-01

    Wireless Sensor Networks (WSNs) are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over) focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under. PMID:22346615

  5. How Secure is the Next-Generation Internet? An Examination of IPv6

    DTIC Science & Technology

    2013-10-01

    pp. 329 – 336. 87. World IPv6 Launch (2012) http://www.worldipv6launch.org. 88. Feilner, M. (2006) OpenVPN : Building and Integrating Virtual Private...traditionally based on IPsec, OpenVPN is actually a TLS-based VPN solution [88]. A.3 Conclusions This case study has demonstrated the ease with which an

  6. The association between child exposure to intimate partner violence (IPV) and perpetration of IPV in adulthood-A systematic review.

    PubMed

    Kimber, Melissa; Adham, Sami; Gill, Sana; McTavish, Jill; MacMillan, Harriet L

    2018-02-01

    Increasingly recognized as a distinct form of childhood maltreatment, children's exposure to intimate partner violence (IPV) has been shown to be associated with an array of negative psychosocial outcomes, including elevated risk for additional violence over the life course. Although studies have identified child exposure to IPV as a predictor of IPV perpetration in adulthood, no review has critically evaluated the methodology of this quantitative work. The present study examines the association between childhood exposure to IPV and the perpetration of IPV in adulthood based on a systematic review of the literature from inception to January 4, 2016. Databases searched included Medline, Embase, PsycINFO, CINAHL, Cochrane Database of Systematic Reviews, Sociological Abstracts and ERIC. Database searches were complemented with backward and forward citation chaining. Studies were critically appraised using the Quality Assessment Tool for Observational Cohort and Cross-Sectional Studies. Of 5601 articles identified by the search, 19 studies were included for data extraction. Sixteen of these studies found that child exposure to IPV was significantly and positively associated with adult IPV perpetration; three studies reported null findings. The methodological quality of the studies was low. Work thus far has tended to focus on child exposure to physical IPV and the perpetration of physical IPV within heterosexual contexts. In addition, measures of child exposure to IPV vary in their classification of what exposure entails. We critically discuss the strengths and limitations of the existing evidence and the theoretical frameworks informing this work. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... utilizing system packets that are formatted in accordance with commercial standards of Internet protocol (IP... of IPv4 products. (b) Specifically, any new IP product or system developed, acquired, or produced...

  8. Advanced Networks in Motion Mobile Sensorweb

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  9. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    PubMed Central

    Jebaseeli Samuelraj, Ananthi; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point. PMID:26366431

  10. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    PubMed

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  11. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    NASA Astrophysics Data System (ADS)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  12. Methods for Intelligent Mapping of the IPV6 Address Space

    DTIC Science & Technology

    2015-03-01

    the " Internet of Things " ( IoT ). (2013, Jan. 7). Forbes. [Online]. Available: http://www.forbes.com/sites/quora/2013/01/07/ how-many- things -are...currently-connected-to-the- internet -of- things - iot / 57 [13] G. Huston, “IPv4 address report,” Mar 2015. [Online]. Available: http://www.potaroo.net/tools/ipv4...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Due to the rapid growth of the Internet , the available pool of unique

  13. Performance analysis for wireless networks: an analytical approach by multifarious Sym Teredo.

    PubMed

    Punithavathani, D Shalini; Radley, Sheryl

    2014-01-01

    IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks behindhand network address translation (NAT). However, the proposed tunneling protocol works with the symmetric and asymmetric NATs. In order to make a Teredo support several symmetric NATs along with several asymmetric NATs, we propose multifarious Sym Teredo (MTS), which is an extension of Teredo with a capability of navigating through several symmetric NATs. The work preserves the Teredo architecture and also offers a backward compatibility with the original Teredo protocol.

  14. DoD Needs to Reinitiate Migration to Internet Protocol Version 6 (REDACTED)

    DTIC Science & Technology

    2014-12-01

    whether DoD was effectively migrating to Internet Protocol Version 6 ( IPv6 ). Finding Although DoD satisfied the requirement to demonstrate IPv6 on the...enterprise network to IPv6 . This occurred because: • DoD Chief Information Officer (CIO) and U.S. Cyber Command (USCYBERCOM) did not make IPv6 a...resources to further DoD-wide transition toward IPv6 ; and • DoD CIO did not have a current plan of action and milestones to advance DoD IPv6 migration

  15. Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo

    PubMed Central

    Punithavathani, D. Shalini; Radley, Sheryl

    2014-01-01

    IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks behindhand network address translation (NAT). However, the proposed tunneling protocol works with the symmetric and asymmetric NATs. In order to make a Teredo support several symmetric NATs along with several asymmetric NATs, we propose multifarious Sym Teredo (MTS), which is an extension of Teredo with a capability of navigating through several symmetric NATs. The work preserves the Teredo architecture and also offers a backward compatibility with the original Teredo protocol. PMID:25506611

  16. Japanese women's perceptions of intimate partner violence (IPV).

    PubMed

    Nagae, Miyoko; Dancy, Barbara L

    2010-04-01

    Intimate partner violence (IPV) is a problem in Japan. The purpose is to describe IPV as perceived by a purposive sample of 11 Japanese adult females who were in a heterosexual marriage at the time of IPV. We used a cross-sectional, retroactive, qualitative description research design with individual, fact-to-face in depth interviews. At the time of the interview, the women had a mean age of 38 years and at the time of the IPV, a mean age of 28 years. Data were analyzed using the directed qualitative content analysis method. The results revealed that all women experienced physical and emotional abuse and 82% experienced sexual abuse. Communication between spouses was characterized as unilateral, with husbands initiating and dominating the conversation. The women identified the culture of the Japanese patriarchal system as directly influencing IPV. The implication is health professionals should actively advocate for effective legislation and policies to address IPV.

  17. Immunogenicity and safety of a combined DTaP-IPV vaccine compared with separate DTaP and IPV vaccines when administered as pre-school booster doses with a second dose of MMR vaccine to healthy children aged 4-6 years.

    PubMed

    Black, Steven; Friedland, Leonard R; Schuind, Anne; Howe, Barbara

    2006-08-28

    Combination vaccines represent one solution to the problem of increased numbers of injections during single clinic visits. A combined DTaP-IPV (Infanrix-IPV) vaccine has been developed for use as a pre-school booster. Four hundred healthy children aged 4-6 years previously primed with 4 doses of DTaP vaccine (Infanrix), 3 doses of poliovirus vaccine and 1 dose of MMR vaccine were randomized to receive single doses of either the combined DTaP-IPV vaccine or separate DTaP and IPV vaccines in a Phase II trial (DTaP-IPV-047). All children also received a second dose of MMR vaccine. Immunogenicity was assessed in serum samples taken before and 1 month after booster administration. Safety was actively assessed for 42 days post-vaccination. Non-inferiority of the DTaP-IPV vaccine to separate DTaP and IPV vaccines was demonstrated for all DTaP antigen booster response rates and poliovirus geometric mean titers of antibody ratios. Post-vaccination, > or =99.4% of children in both groups had seroprotective levels of anti-diphtheria and anti-tetanus antibodies (> or =0.1IU/mL) and seroprotective anti-poliovirus antibody titers (> or =1:8). All children in both groups were seropositive for measles, mumps and rubella antibodies, with similar post-vaccination geometric mean concentrations/titers. No significant differences were observed in the incidence of solicited local or general symptoms, unsolicited symptoms and serious adverse events between the two groups. This combined DTaP-IPV appeared safe and immunogenic when given as a booster dose at 4-6 years of age. The DTaP-IPV vaccine had no negative effect on the response to co-administered MMR vaccine, making it well-suited for use as a pre-school booster.

  18. First-in-human safety and immunogenicity investigations of three adjuvanted reduced dose inactivated poliovirus vaccines (IPV-Al SSI) compared to full dose IPV Vaccine SSI when given as a booster vaccination to adolescents with a history of IPV vaccination at 3, 5, 12months and 5years of age.

    PubMed

    Lindgren, Line M; Tingskov, Pernille N; Justesen, Annette H; Nedergaard, Bettina S; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Sørensen, Charlotte; Dietrich, Jes; Thierry-Carstensen, Birgit

    2017-01-23

    There is a demand of affordable IPV in the World. Statens Serum Institut (SSI) has developed three reduced dose IPV formulations adsorbed to aluminium hydroxide; 1/3 IPV-Al, 1/5 IPV-Al and 1/10 IPV-Al SSI, and now report the results of the first investigations in humans. 240 Danish adolescents, aged 10-15years, and childhood vaccinated with IPV were booster vaccinated with 1/3 IPV-Al, 1/5 IPV-Al, 1/10 IPV-Al or IPV Vaccine SSI. The booster effects (GMTRs) of the three IPV-Al SSI were compared to IPV Vaccine SSI, and evaluated for non-inferiority. The pre-vaccination GMTs were similar across the groups; 926 (type 1), 969 (type 2) and 846 (type 3) in the total trial population. The GMTRs by poliovirus type and IPV formulation were: Type 1: 17.0 (1/3 IPV-Al), 13.0 (1/5 IPV-Al), 7.1 (1/10 IPV-Al) and 42.2 (IPV Vaccine SSI). Type 2: 12.5 (1/3 IPV-Al), 13.1 (1/5 IPV-Al), 7.6 (1/10 IPV-Al) and 47.8 (IPV Vaccine SSI). Type 3: 14.5 (1/3 IPV-Al), 16.2 (1/5 IPV-Al), 8.9 (1/10 IPV-Al) and 62.4 (IPV Vaccine SSI) Thus, the three IPV-Al formulations were highly immunogenic, but inferior to IPV Vaccine SSI, in this booster vaccination trial. No SAE and no AE of severe intensity occurred. 59.2% of the subjects reported at least one AE. Injection site pain was the most frequent AE in all groups; from 24.6% to 43.3%. Injection site redness and swelling frequencies were<5% in most and<10% in all groups. The most frequent systemic AEs were fatigue (from 8.2% to 15.0%) and headache (from 15.0% to 28.3%). Most AEs were of mild intensity. In conclusion, the three IPV-Al SSI were safe in adolescents and the booster effects were satisfactory. ClinicalTrials.gov registration number: NCT02280447. Copyright © 2016. Published by Elsevier Ltd.

  19. Safety of DTaP-IPV/Hib vaccine administered routinely to infants and toddlers.

    PubMed

    Hansen, John; Timbol, Julius; Lewis, Ned; Pool, Vitali; Decker, Michael D; Greenberg, David P; Klein, Nicola P

    2016-07-29

    The combination DTaP-IPV/Hib vaccine was licensed in the United States in 2008 for children ages 6weeks through 4years with doses administered at 2, 4, 6, and 15-18months of age. The aim of this study was to assess the safety of DTaP-IPV/Hib vaccine routinely administered as part of clinical care to infants at Kaiser Permanente Northern California. This was an observational, retrospective study that included all 2-month-old infants vaccinated with either DTaP-IPV/Hib or another DTaP-containing vaccine. We monitored all subjects for non-elective hospitalizations, emergency department visits and selected outpatient outcomes (seizures, Guillain-Barré Syndrome, encephalopathy, encephalitis, alteration of consciousness, meningitis, hypersensitivity reactions, immune thrombocytopenic purpura, hemolytic anemia, type 1 diabetes, and Kawasaki disease) beginning with their first dose through 6months after a 4th dose or until 24months of age. We calculated incidence rate ratios (IRRs) in the primary analysis by comparing rates of outcomes during the post-vaccination risk interval with rates during a comparison interval more remote from vaccination. Secondary analyses compared outcomes after DTaP-IPV/Hib with those after other DTaP-containing vaccines. We reviewed the medical records of selected outcomes. From October 1, 2008 through July 31, 2010, 14,042 subjects received a first dose of DTaP-IPV/Hib, 13,194 received 2 doses, 12,548 received 3 doses and 6702 received 4 doses. Overall, there were 166 comparisons with significantly elevated IRRs and 165 comparisons with significantly reduced IRRs. Medical record review of outcomes with significantly elevated IRRs in both the primary and secondary analyses did not suggest any relationship with DTaP-IPV/Hib. This study did not detect any safety concerns following DTaP-IPV/Hib and provides reassurance that DTaP-IPV/Hib administered as part of routine care was not associated with unexpected safety risks. Clinical

  20. Diphtheria, tetanus and poliovirus antibody persistence 5 years after vaccination of pre-schoolers with two different diphtheria, tetanus and inactivated poliomyelitis vaccines (Td-IPV or DT-IPV) and immune responses to a booster dose of DTaP-IPV.

    PubMed

    Gajdos, Vincent; Vidor, Emmanuel; Richard, Patrick; Tran, Clément; Sadorge, Christine

    2015-07-31

    This follow-up study assessed the 5-year persistence of vaccine-induced antibodies (Td-IPV or DT-IPV) and the immune response to a booster dose of DTaP-IPV. This was an open-label, parallel-group (two arms), multicentre trial performed at 44 study sites in France. Children aged 11-13 years, of either sex, who received Td-IPV (Revaxis(®)) and DT-IPV (DT Polio(®)) vaccines at 6 years of age in one previous open-label trial with no further vaccination against diphtheria, tetanus, pertussis or poliomyelitis, were enrolled. All participants received a single intramuscular booster dose (0.5mL) of DTaP-IPV vaccine (Tetravac-Acellulaire(®)). Study endpoints were based on antibody persistence and post-booster immune responses. Safety was monitored throughout the study. Descriptive statistics were used for all analyses. Of the 758 children included in the previous study, 274 were included in this follow-up study; 129 had previously been vaccinated with Td-IPV, and 145 had previously received DT-IPV. At least 96.5% of participants in both groups presented an anti-diphtheria and anti-tetanus concentration ≥0.01IU/mL, and anti-poliovirus types 1-3 titres≥8 (1/dilution). Following vaccination with DTaP-IPV, anti-diphtheria and anti-tetanus antibody concentrations ≥0.1IU/mL and anti-poliovirus types 1-3 antibody titres ≥8 (1/dilution) were achieved in all participants. DTaP-IPV was well tolerated in this study. There were no serious adverse events during the study, and no participant withdrew because of adverse events. The present study confirmed the long-term immunity conferred by Td-IPV when given as a booster dose, and supports the use of Td-IPV as a second booster at 6 years of age in children previously vaccinated against diphtheria, tetanus and poliomyelitis types 1-3. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. The Age-IPV Curve: Changes in Intimate Partner Violence Perpetration during Adolescence and Young Adulthood

    PubMed Central

    Johnson, Wendi L.; Giordano, Peggy C.; Manning, Wendy D.; Longmore, Monica A.

    2014-01-01

    Research on intimate partner violence (IPV) has evolved over the last decade with increasing interest in how IPV develops over adolescence and young adulthood. Studies examining patterns of IPV over time have generally focused on victimization with less attention to temporal shifts in perpetration. While it is generally assumed that IPV peaks during young adulthood, this has not been empirically verified and documented. Additionally, prior longitudinal analyses of IPV have focused on identifying trajectories and their accompanying risk factors, with less attention given to within-individual change in IPV experiences across and within relationships. Drawing on five waves of data from the Toledo Adolescent Relationships Study (TARS), we examined patterns of the perpetration of IPV among a diverse sample of adolescents and young adults (51.1% female, 63.9% non-Hispanic White, 24.6% non-Hispanic Black, 11.5% Hispanic) spanning the ages of 13–28 years (N = 1,164). Analyses demonstrated that IPV patterns deviate from the age-crime curve, with women’s involvement in IPV increasing, while their involvement in other antisocial behaviors is decreasing. Traditional behavioral and psychological risk factors (delinquency, alcohol and drug use, depressive symptoms) accounted for some of the age variation in IPV for men, but these factors did not account for age variation in IPV among women. Relationship risk factors including frequency of disagreements, trust, jealousy, validation and self-disclosure, however, accounted for substantial portions of the age-IPV perpetration relationship for male and female youth. These findings reinforce recent calls for prevention efforts that focus on the development and maintenance of healthy relationships. PMID:25081024

  2. A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6

    NASA Astrophysics Data System (ADS)

    You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki

    Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, Kempf-Koodli's scheme is formally analyzed through BAN-logic and its weaknesses are demonstrated.

  3. S-curve networks and an approximate method for estimating degree distributions of complex networks

    NASA Astrophysics Data System (ADS)

    Guo, Jin-Li

    2010-12-01

    In the study of complex networks almost all theoretical models have the property of infinite growth, but the size of actual networks is finite. According to statistics from the China Internet IPv4 (Internet Protocol version 4) addresses, this paper proposes a forecasting model by using S curve (logistic curve). The growing trend of IPv4 addresses in China is forecasted. There are some reference values for optimizing the distribution of IPv4 address resource and the development of IPv6. Based on the laws of IPv4 growth, that is, the bulk growth and the finitely growing limit, it proposes a finite network model with a bulk growth. The model is said to be an S-curve network. Analysis demonstrates that the analytic method based on uniform distributions (i.e., Barabási-Albert method) is not suitable for the network. It develops an approximate method to predict the growth dynamics of the individual nodes, and uses this to calculate analytically the degree distribution and the scaling exponents. The analytical result agrees with the simulation well, obeying an approximately power-law form. This method can overcome a shortcoming of Barabási-Albert method commonly used in current network research.

  4. m6A-Driver: Identifying Context-Specific mRNA m6A Methylation-Driven Gene Interaction Networks

    PubMed Central

    Zhang, Song-Yao; Zhang, Shao-Wu; Liu, Lian; Huang, Yufei

    2016-01-01

    As the most prevalent mammalian mRNA epigenetic modification, N6-methyladenosine (m6A) has been shown to possess important post-transcriptional regulatory functions. However, the regulatory mechanisms and functional circuits of m6A are still largely elusive. To help unveil the regulatory circuitry mediated by mRNA m6A methylation, we develop here m6A-Driver, an algorithm for predicting m6A-driven genes and associated networks, whose functional interactions are likely to be actively modulated by m6A methylation under a specific condition. Specifically, m6A-Driver integrates the PPI network and the predicted differential m6A methylation sites from methylated RNA immunoprecipitation sequencing (MeRIP-Seq) data using a Random Walk with Restart (RWR) algorithm and then builds a consensus m6A-driven network of m6A-driven genes. To evaluate the performance, we applied m6A-Driver to build the context-specific m6A-driven networks for 4 known m6A (de)methylases, i.e., FTO, METTL3, METTL14 and WTAP. Our results suggest that m6A-Driver can robustly and efficiently identify m6A-driven genes that are functionally more enriched and associated with higher degree of differential expression than differential m6A methylated genes. Pathway analysis of the constructed context-specific m6A-driven gene networks further revealed the regulatory circuitry underlying the dynamic interplays between the methyltransferases and demethylase at the epitranscriptomic layer of gene regulation. PMID:28027310

  5. Intimate partner violence: office screening for victims and perpetrators of IPV.

    PubMed

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Intimate partner violence (IPV) affects more than 12 million individuals annually. Power and control are central concepts underlying abusive relationships. Physicians may see IPV victims, perpetrators, and their children for annual examinations, as well as for injuries and health conditions associated with abuse. In 2013, the US Preventive Services Task Force recommended that women of childbearing age (ie, 14 to 46 years) be screened for IPV. Brief, validated screening tools, such as the 4-item Hurt, Insult, Threaten, and Scream (HITS), can be used to facilitate screening. Physicians should always assess patients whose medical histories or presenting symptoms or injuries are consistent with abuse. Risk factors for IPV and consequences of abuse include general health conditions (eg, asthma, irritable bowel syndrome), reproductive issues (eg, gynecologic disorders, unintended pregnancies), psychological conditions (eg, depression, sleep disturbances), and risky health behaviors (eg, substance use, poor health care adherence). Tools for identifying perpetrators are under investigation. To prepare the practice to address IPV, physicians should educate themselves and staff and learn about community and national resources. By identifying and responding to IPV, clinicians may be able to reduce IPV and interrupt the intergenerational cycle of violence. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  6. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  7. Production of high titer attenuated poliovirus strains on the serum-free PER.C6(®) cell culture platform for the generation of safe and affordable next generation IPV.

    PubMed

    Sanders, Barbara P; Oakes, Isabel de los Rios; van Hoek, Vladimir; Liu, Ying; Marissen, Wilfred; Minor, Philip D; Wimmer, Eckard; Schuitemaker, Hanneke; Custers, Jerome H H V; Macadam, Andrew; Cello, Jeronimo; Edo-Matas, Diana

    2015-11-27

    As poliovirus eradication draws closer, alternative Inactivated Poliovirus Vaccines (IPV) are needed to overcome the risks associated with continued use of the Oral Poliovirus Vaccine and of neurovirulent strains used during manufacture of conventional (c) IPV. We have previously demonstrated the susceptibility of the PER.C6(®) cell line to cIPV strains; here we investigated the suspension cell culture platform for growth of attenuated poliovirus strains. We examined attenuated Sabin strain productivity on the PER.C6(®) cell platform compared to the conventional Vero cell platform. The suitability of the suspension cell platform for propagation of rationally-attenuated poliovirus strains (stabilized Sabin type 3 S19 derivatives and genetically attenuated and stabilized MonoCre(X) strains), was also assessed. Yields were quantified by infectious titer determination and D-antigen ELISA using either serotype-specific polyclonal rabbit sera for Sabin strains or monoclonal cIPV-strain-specific antibodies for cIPV, S19 and MonoCre(X) strains. PER.C6(®) cells supported the replication of Sabin strains to yields of infectious titers that were in the range of cIPV strains at 32.5°C. Sabin strains achieved 30-fold higher yields (p<0.0001) on the PER.C6(®) cell platform as compared to the Vero cell platform in infectious titer and D-antigen content. Furthermore, Sabin strain productivity on the PER.C6(®) cell platform was maintained at 10l scale. Yields of infectious titers of S19 and MonoCre(X) strains were 0.5-1 log10 lower than seen for cIPV strains, whereas D-antigen yield and productivities in doses/ml using rationally-attenuated strains were in line with yields reported for cIPV strains. Sabin and rationally-attenuated polioviruses can be grown to high infectious titers and D-antigen yields. Sabin strain infection shows increased productivity on the PER.C6(®) cell platform as compared to the conventional Vero cell platform. Novel cell platforms with the potential

  8. Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance

    NASA Astrophysics Data System (ADS)

    Patil, Dipali P.; Patil, G. A.

    2010-11-01

    Mobile users move frequently between networks, as they stay connected to the Internet. Thus, as mobility increases across networks, handovers will significantly impact the quality of the connection and user application. Handover performance is very important when evaluating IP mobility protocols. Since handover request are driven by several needs such as cost reduction criteria, network resource optimization and service related requirements. Current works to support seamless mobility in IPv6 network are classified into HMIPv6 and FMIPv6. These two approaches have pros and cons respectively and are being standardized independently in IETF. If one can integrate properly these two approaches, it is expected that the one can get more effective protocols that can provide better handover performance. This paper integrates FHMIPv6 in HMIPv6 (F-HMIPv6) so as to provide effectively fast handover on the hierarchical Mobile IPv6. The simulation performed using Ns-2 extensions to show that a performance of proposed system is better in terms of packet loss and hand-over delay.

  9. Prevalence of intimate partner violence (IPV) during pregnancy in China: A systematic review and meta-analysis

    PubMed Central

    Wang, Tingting; Liu, Yuan; Li, Zhanzhan; Liu, Kaihua; Xu, Yang; Shi, Wenpei; Chen, Lizhang

    2017-01-01

    Background Intimate partner violence (IPV) is the most common form of violence against women worldwide. IPV during pregnancy is an important risk factor for adverse health outcomes for women and their offspring. However, the prevalence of IPV during pregnancy is not well understood in China. The objective of this study was to estimate the pooled prevalence of IPV during pregnancy in China using a systematic review and meta-analysis. Methods Systematic literature searches were conducted in PubMed, Web of Science, CNKI, Wanfang, Weipu and CBM databases to identify relevant articles published from the inception of each database to January 31, 2016 that reported data on the prevalence of IPV during pregnancy in China. The Risk of Bias Tool for prevalence studies was used to assess the risk of bias in individual studies. Owing to significant between-study heterogeneity, a random-effects model was used to calculate the pooled prevalence and corresponding 95% confidence interval, and then univariate meta-regression analyses were performed to investigate the sources of heterogeneity. Subgroup analysis was conducted to explore the risk factors associated with IPV during pregnancy. Results Thirteen studies with a total of 30,665 individuals were included in this study. The overall pooled prevalence of IPV during pregnancy was 7.7% (95% CI: 5.6–10.1%) with significant heterogeneity (I2 = 97.8%, p < 0.001). The results of the univariate meta-regression analyses showed that only the variable “sample source” explained part of the heterogeneity in this study (p < 0.05). The characteristics “number of children” and “unplanned pregnancy” were determined as risk factors for experiencing violence during pregnancy. Conclusions The prevalence of IPV during pregnancy in China is considerable and one of the highest reported in Asia, which suggests that issues of violence against women during pregnancy should be included in efforts to improve the health of pregnant women and

  10. Prevalence of intimate partner violence (IPV) during pregnancy in China: A systematic review and meta-analysis.

    PubMed

    Wang, Tingting; Liu, Yuan; Li, Zhanzhan; Liu, Kaihua; Xu, Yang; Shi, Wenpei; Chen, Lizhang

    2017-01-01

    Intimate partner violence (IPV) is the most common form of violence against women worldwide. IPV during pregnancy is an important risk factor for adverse health outcomes for women and their offspring. However, the prevalence of IPV during pregnancy is not well understood in China. The objective of this study was to estimate the pooled prevalence of IPV during pregnancy in China using a systematic review and meta-analysis. Systematic literature searches were conducted in PubMed, Web of Science, CNKI, Wanfang, Weipu and CBM databases to identify relevant articles published from the inception of each database to January 31, 2016 that reported data on the prevalence of IPV during pregnancy in China. The Risk of Bias Tool for prevalence studies was used to assess the risk of bias in individual studies. Owing to significant between-study heterogeneity, a random-effects model was used to calculate the pooled prevalence and corresponding 95% confidence interval, and then univariate meta-regression analyses were performed to investigate the sources of heterogeneity. Subgroup analysis was conducted to explore the risk factors associated with IPV during pregnancy. Thirteen studies with a total of 30,665 individuals were included in this study. The overall pooled prevalence of IPV during pregnancy was 7.7% (95% CI: 5.6-10.1%) with significant heterogeneity (I2 = 97.8%, p < 0.001). The results of the univariate meta-regression analyses showed that only the variable "sample source" explained part of the heterogeneity in this study (p < 0.05). The characteristics "number of children" and "unplanned pregnancy" were determined as risk factors for experiencing violence during pregnancy. The prevalence of IPV during pregnancy in China is considerable and one of the highest reported in Asia, which suggests that issues of violence against women during pregnancy should be included in efforts to improve the health of pregnant women and their offspring. In addition, a nationwide

  11. Japanese Women’s Perceptions of Intimate Partner Violence (IPV)

    PubMed Central

    Nagae, Miyoko; Dancy, Barbara L.

    2013-01-01

    Intimate partner violence (IPV) is a serious problem in Japan. The purpose of this study was to describe IPV as perceived by Japanese adult females who were in a heterosexual marriage and lived with their spouses at the time of IPV. Using a cross-sectional retroactive qualitative description research design with individual face-to-face in-depth interviews, a purposive sample of 11 Japanese adult females from three urban areas in Japan was interviewed. All women reported that they and their husbands were born in Japan. At the time of the interview, the women had a mean age of 38 years whereas at the time of the IPV, their mean age was 28 years. Data was analyzed using the directed qualitative content analysis method. The results revealed that IPV occurred at the women’s homes primarily at night. All the women reported that they experienced physical and emotional abuse and 82% reported experiencing sexual abuse. Additionally, 64% reported that their parents-in-law emotionally abused them. Communication between these women and their husbands were characterized as unilateral with the husbands initiating and dominating the conversations with orders, lectures, and reprimands. The women identified that the cultural influences of the Japanese patriarchal system that reinforces male superiority and dominance and women inferiority were directly related to IPV. The implication is that health professionals need to actively advocate for effective legislation and policies to address IPV in Japan. PMID:19465572

  12. HIV Positive Diagnosis During Pregnancy Increases Risk of IPV Postpartum Among Women with No History of IPV in Their Relationship.

    PubMed

    Groves, Allison K; Reyes, H Luz McNaughton; Moodley, Dhayendre; Maman, Suzanne

    2018-06-01

    There has been limited study of whether and for whom physical intimate partner violence (IPV) is a consequence of an HIV-positive diagnosis. Per the diathesis stress model, the consequences of HIV infection may be worse for women with a history of IPV. We hypothesize that the positive association between HIV diagnosis in pregnancy and postpartum IPV will be exacerbated for women with a history of IPV. Data come from a prospective cohort study with 1015 participants who completed a baseline antenatal and 9-month postpartum visit. Using logistic regression analyses, we found a statistically significant interaction between HIV diagnosis, history of IPV and postpartum IPV (AOR: 0.40, 95% CI 0.17-0.96). The findings were in the opposite direction as expected: HIV-diagnosis was not associated with IPV for women with a history of IPV (AOR: 2.17, 95% CI 1.06, 4.42). However, HIV-positive women without a history of IPV faced more than two times the risk of incident postpartum IPV than HIV-negative women (AOR: 2.17, 95% CI 1.06, 4.42). Interventions to reduce incident and ongoing IPV during the perinatal period are needed.

  13. Immunogenicity and safety results from a randomized multicenter trial comparing a Tdap-IPV vaccine (REPEVAX®) and a tetanus monovalent vaccine in healthy adults

    PubMed Central

    Laurichesse, Henri; Zimmermann, Ulrich; Galtier, Florence; Launay, Odile; Duval, Xavier; Richard, Patrick; Sadorge, Christine; Soubeyrand, Benoit

    2012-01-01

    In adults with a tetanus-prone injury, combined vaccines such as Tdap-IPV (REPEVAX®) can boost immunity against several diseases simultaneously. This Phase IIIb, parallel-group, open-label trial compared antibody responses to Tdap-IPV and tetanus monovalent vaccine (TMV; Vaccin Tétanique Pasteur® or Tetavax®) against tetanus toxoid 10 and 28 d post-vaccination. Between July and December 2009, four centers in France and five in Germany recruited healthy adults who had received a tetanus-containing vaccine 5−10 y previously. Participants were randomized 1:1 to receive at the first visit a single dose (0.5 mL) of Tdap-IPV or TMV, with follow-up visits at Day 10 and Day 28. Outcomes: per protocol (PP) population immunogenicity at Day 10 (primary) and at Day 28 (secondary); safety throughout the study. Of 456 adults randomized, 223 received Tdap-IPV and 233 received TMV (PP population: 183 and 199 participants, respectively). All participants receiving Tdap-IPV and 99.0% receiving TMV had an anti-tetanus antibody concentration ≥ 0.1 IU/mL, confirming non-inferiority of Tdap-IPV to TMV (95% confidence interval of the difference: –1.2, 3.6). Number of adverse events reported was comparable in each group. Injection-site reactions were reported by 76.6% participants receiving Tdap-IPV and 74.6% receiving TMV. Systemic events (e.g., malaise, myalgia and headache) were reported in 47.7% and 39.7% of the Tdap-IPV and the TMV groups, respectively. Tdap-IPV is effective and well-tolerated for use in the management of tetanus-prone injuries in emergency settings in persons for whom a booster against diphtheria, pertussis and poliomyelitis is also needed. ClinicalTrials.gov identifier: NCT00928785. Research sponsored by Sanofi Pasteur MSD. PMID:23032160

  14. Safety and immunogenicity of a primary series of Sabin-IPV with and without aluminum hydroxide in infants.

    PubMed

    Verdijk, Pauline; Rots, Nynke Y; van Oijen, Monique G C T; Weldon, William C; Oberste, M Steven; Okayasu, Hiromasa; Sutter, Roland W; Bakker, Wilfried A M

    2014-09-03

    An inactivated poliovirus vaccine (IPV) based on attenuated poliovirus strains (Sabin-1, -2 and -3) was developed for technology transfer to manufacturers in low- and middle-income countries in the context of the global polio eradication initiative. Safety and immunogenicity of Sabin-IPV (sIPV) was evaluated in a double-blind, randomized, controlled, dose-escalation trial in the target population. Healthy infants (n=20/group) aged 56-63 days, received a primary series of three intramuscular injections with low-, middle- or high-dose sIPV with or without aluminum hydroxide or with the conventional IPV based on wild poliovirus strains (wIPV). Virus-neutralizing titers against both Sabin and wild poliovirus strains were determined before and 28 days after three vaccinations. The incidence of local and systemic reactions was comparable with the wIPV. Seroconversion rates after three vaccinations were 100% for type 2 and type 3 polioviruses (both Sabin and wild strains) and 95-100% for type 1 polioviruses. Median titers were high in all groups. Titers were well above the log2(titer) correlated with protection (=3) for all groups. Median titers for Sabin-2 were 9.3 (range 6.8-11.5) in the low-dose sIPV group, 9.2 (range 6.8-10.2) in the low-dose adjuvanted sIPV group and 9.8 (range 5.5-15.0) in the wIPV group, Median titers against MEF-1 (wild poliovirus type 2) were 8.2 (range 4.8-10.8) in the low-dose sIPV group, 7.3 (range 4.5-10.2) in the low-dose adjuvanted Sabin-IPV group and 10.3 (range 8.5-17.0) in the wIPV group. For all poliovirus types the median titers increased with increasing dose levels. sIPV and sIPV adjuvanted with aluminum hydroxide were immunogenic and safe at all dose levels, and comparable with the wIPV. EudraCTnr: 2011-003792-11, NCT01709071. Copyright © 2014. Published by Elsevier Ltd.

  15. The Immunogenicity and Safety of a Combined DTaP-IPV//Hib Vaccine Compared with Individual DTaP-IPV and Hib (PRP~T) Vaccines: a Randomized Clinical Trial in South Korean Infants.

    PubMed

    Kang, Jin Han; Lee, Hoan Jong; Kim, Kyung Hyo; Oh, Sung Hee; Cha, Sung Ho; Lee, Jin; Kim, Nam Hee; Eun, Byung Wook; Kim, Chang Hwi; Hong, Young Jin; Kim, Hyun Hee; Lee, Kyung Yil; Kim, Yae Jean; Cho, Eun Young; Kim, Hee Soo; Guitton, Fabrice; Ortiz, Esteban

    2016-09-01

    Recommended infant vaccination in Korea includes DTaP-IPV and Hib vaccines administered as separate injections. In this randomized, open, controlled study we assessed the non-inferiority of immunogenicity of DTaP-IPV//Hib pentavalent combination vaccine (Pentaxim™) compared with licensed DTaP-IPV and Hib (PRP~T) vaccines. We enrolled 418 healthy Korean infants to receive either separate DTaP-IPV and Hib vaccines (n = 206) or the pentavalent DTaP-IPV//Hib (n = 208) vaccine at 2, 4, 6 months of age. Antibodies to all components were measured before the first vaccination and one month after the third, and safety was assessed after each vaccination including recording of reactions by parents. We confirmed the non-inferiority of DTaP-IPV//Hib compared with DTaP-IPV and Hib vaccines; 100% of both groups achieved seroprotection against D, T, IPV and PRP~T, and 97.5%-99.0% demonstrated seroresponses to pertussis antigens. Antibody levels were similar in both groups, except for those to the Hib component, PRP~T. In separate and combined groups geometric mean concentrations of anti-PRP~T antibodies were 23.9 and 11.0 μg/mL, respectively, but 98.3% and 97.4% had titers ≥ 1 μg/mL, indicative of long-term protection. All vaccines were well tolerated, with no vaccine-related serious adverse event. Both groups had similar safety profiles, but the combined vaccine group had fewer injection site reactions. The immunological non-inferiority and similar safety profile of DTaP-IPV//Hib vaccine to separate DTaP-IPV and Hib vaccines, with the advantage of fewer injections and injection site reactions, supports the licensure and incorporation of DTaP-IPV//Hib into the Korean national vaccination schedule (Clinical trial registry, NCT01214889).

  16. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    ERIC Educational Resources Information Center

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  17. Connecting the snowpack to the internet of things: an IPv6 architecture for providing real-time measurements of hydrologic systems

    NASA Astrophysics Data System (ADS)

    Kerkez, B.; Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.

    2012-12-01

    We describe our improved, robust, and scalable architecture by which to rapidly instrument large-scale watersheds, while providing the resulting data in real-time. Our system consists of more than twenty wireless sensor networks and thousands of sensors, which will be deployed in the American River basin (5000 sq. km) of California. The core component of our system is known as a mote, a tiny, ultra-low-power, embedded wireless computer that can be used for any number of sensing applications. Our new generation of motes is equipped with IPv6 functionality, effectively giving each sensor in the field its own unique IP address, thus permitting users to remotely interact with the devices without going through intermediary services. Thirty to fifty motes will be deployed across 1-2 square kilometer regions to form a mesh-based wireless sensor network. Redundancy of local wireless links will ensure that data will always be able to traverse the network, even if hash wintertime conditions adversely affect some network nodes. These networks will be used to develop spatial estimates of a number of hydrologic parameters, focusing especially on snowpack. Each wireless sensor network has one main network controller, which is responsible with interacting with an embedded Linux computer to relay information across higher-powered, long-range wireless links (cell modems, satellite, WiFi) to neighboring networks and remote, offsite servers. The network manager is also responsible for providing an Internet connection to each mote. Data collected by the sensors can either be read directly by remote hosts, or stored on centralized servers for future access. With 20 such networks deployed in the American River, our system will comprise an unprecedented cyber-physical architecture for measuring hydrologic parameters in large-scale basins. The spatiotemporal density and real-time nature of the data is also expected to significantly improve operational hydrology and water resource

  18. The mediating role of avoidance coping between intimate partner violence (IPV) victimization, mental health, and substance abuse among women experiencing bidirectional IPV.

    PubMed

    Flanagan, Julianne C; Jaquier, Véronique; Overstreet, Nicole; Swan, Suzanne C; Sullivan, Tami P

    2014-12-15

    Avoidance coping is consistently linked with negative mental health outcomes among women experiencing intimate partner violence (IPV). This study extended the literature examining the potentially mediating role of avoidance coping strategies on both mental health and substance use problems to a highly generalizable, yet previously unexamined population (i.e., women experiencing bidirectional IPV) and examined multiple forms of IPV (i.e., psychological, physical, and sexual) simultaneously. Among a sample of 362 women experiencing bidirectional IPV, four separate path models were examined, one for each outcome variable. Avoidance coping mediated the relationships between psychological and sexual IPV victimization and the outcomes of PTSD symptom severity, depression severity, and drug use problems. Findings indicate nuanced associations among IPV victimization, avoidance coping, and mental health and substance use outcomes. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  19. The IPV-GBM scale: a new scale to measure intimate partner violence among gay and bisexual men.

    PubMed

    Stephenson, Rob; Finneran, Catherine

    2013-01-01

    The paper describes the creation of a new scale to measure intimate partner violence (IPV) among gay and bisexual men. Seven focus group discussions were held with gay and bisexual men, focusing on defining intimate partner violence: 30 forms of IPV were identified. A venue-recruited sample of 912 gay and bisexual men was surveyed, examining definitional understanding and recent experiences of each of the 30 forms of IPV. Participants were also asked questions from the CDC definition of intimate partner violence and the short-form of the Conflicts Tactics Scale (CTS2S). Factor analysis of responses to the definitional questions was used to create the IPV-GBM scale, and the prevalence of intimate partner violence was compared with that identified by the CDC and CTS2S measures of intimate partner violence. A 23-item scale, with 5 unique domains, was created, with strong internal reliability (Cronbach Alpha >.90). The IPV-GBM scale mirrored both the CDC and CTS2S definitions of intimate partner violence, but contained additional domains such as controlling violence, monitoring behaviors, emotional violence, and HIV-related violence. The new scale identified a significantly higher prevalence of IPV than either of the more commonly used measures. The results presented here provide encouraging evidence for a new, more accurate measure of intimate partner violence among gay and bisexual men in the U.S.

  20. Antibody responses of Macaca fascicularis against a new inactivated polio vaccine derived from Sabin strains (sIPV) in DTaP-sIPV vaccine.

    PubMed

    Sato, Y; Shiosaki, K; Goto, Y; Sonoda, K; Kino, Y

    2013-05-01

    Antibody responses of Macaca fascicularis against a new tetravalent vaccine composed of diphtheria toxoid, tetanus toxoid, acellular pertussis antigens, and inactivated poliovirus derived from Sabin strains (sIPV) was investigated to predict an optimal dose of sIPV in a new tetravalent vaccine (DTaP-sIPV) prior to conducting a dose-defined clinical study. Monkeys were inoculated with DTaP-sIPVs containing three different antigen units of sIPVs: Vaccine A (types 1:2:3 = 3:100:100 DU), Vaccine B (types 1:2:3 = 1.5:50:50 DU), and Vaccine C (types 1:2:3 = 0.75:25:25 DU). There was no difference in the average titers of neutralizing antibody against the attenuated or virulent polioviruses between Vaccines A and B. The average neutralizing antibody titers of Vaccine C tended to be lower than those of Vaccines A and B. The sIPV antigens did not affect the anti-diphtheria or anti-tetanus antibody titers of DTaP-sIPV. Furthermore, the average neutralizing antibody titers of Vaccine A against the attenuated and virulent polioviruses were comparable between M. fascicularis and humans. These results suggest that M. fascicularis may be a useful animal model for predicting the antibody responses to sIPVs in humans, and that it may be likely to reduce the amount of sIPVs contained in DTaP-sIPVs, even for humans. Copyright © 2013 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  1. Immunogenicity and safety of three aluminium hydroxide adjuvanted vaccines with reduced doses of inactivated polio vaccine (IPV-Al) compared with standard IPV in young infants in the Dominican Republic: a phase 2, non-inferiority, observer-blinded, randomised, and controlled dose investigation trial.

    PubMed

    Rivera, Luis; Pedersen, Rasmus S; Peña, Lourdes; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Nielsen, Pernille I; Sørensen, Charlotte; Dietrich, Jes; Bandyopadhyay, Ananda S; Thierry-Carstensen, Birgit

    2017-07-01

    Cost and supply constraints are key challenges in the use of inactivated polio vaccine (IPV). Dose reduction through adsorption to aluminium hydroxide (Al) is a promising option, and establishing its effectiveness in the target population is a crucial milestone in developing IPV-Al. The aim of this clinical trial was to show the non-inferiority of three IPV-Al vaccines to standard IPV. In this phase 2, non-inferiority, observer-blinded, randomised, controlled, single-centre trial in the Dominican Republic, healthy infants aged 6 weeks, not previously polio vaccinated, were allocated after computer-generated randomisation by block-size of four, to receive one of four IPV formulations (three-times reduced dose [1/3 IPV-Al], five-times reduced dose [1/5 IPV-Al], ten-times reduced dose [1/10 IPV-Al], or IPV) intramuscularly in the thigh at 6, 10, and 14 weeks of age. The primary outcome was seroconversion for poliovirus types 1, 2, and 3 with titres more than or equal to four-fold higher than the estimated maternal antibody titre and more than or equal to 8 after three vaccinations. Non-inferiority was concluded if the lower two-sided 90% CI of the seroconversion rate difference between IPV-Al and IPV was greater than -10%. The safety analyses were based on the safety analysis set (randomly assigned participants who received at least one trial vaccination) and the immunogenicity analyses were based on the per-protocol population. This study is registered with ClinicalTrials.gov registration, number NCT02347423. Between Feb 2, 2015, and Sept 26, 2015, we recruited 824 infants. The per-protocol population included 820 infants; 205 were randomly assigned to receive 1/3 IPV-Al, 205 to receive 1/5 IPV-Al, 204 to receive 1/10 IPV-Al, and 206 to receive IPV. The proportion of individuals meeting the primary endpoint of seroconversion for poliovirus types 1, 2, and 3 was already high for the three IPV-Al vaccines after two vaccinations, but was higher after three vaccinations

  2. Japanese Women's Perceptions of Intimate Partner Violence (IPV)

    ERIC Educational Resources Information Center

    Nagae, Miyoko; Dancy, Barbara L.

    2010-01-01

    Intimate partner violence (IPV) is a problem in Japan. The purpose is to describe IPV as perceived by a purposive sample of 11 Japanese adult females who were in a heterosexual marriage at the time of IPV. We used a cross-sectional, retroactive, qualitative description research design with individual, fact-to-face in depth interviews. At the time…

  3. Intimate partner violence: IPV in the LGBT community.

    PubMed

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Nationally, the rates of intimate partner violence (IPV) among lesbian, gay, bisexual, or transgender (LGBT) individuals are similar to or greater than rates for heterosexuals. Many have experienced psychological and physical abuse as sexual minorities, making it difficult for them to seek help for IPV. Physician behavior, such as not assuming that all patients are heterosexual, being nonjudgmental, and using inclusive language, can empower LGBT patients to disclose IPV. Also, physicians should ascertain the degree to which the patient is out. The threat of being outed can be an aspect of the power and control exerted by an abusive partner and a significant barrier to seeking help. Physicians should screen for IPV and intervene in a similar manner with LGBT and non-LGBT patients, but they should be aware of potential limitations in resources for LGBT patients, such as shelters. As sexual minorities experiencing IPV, LGBT individuals are at greater risk of depression and substance abuse than are non-LGBT individuals. Minority stress, resulting from stigmatization and discrimination, can be exacerbated by IPV. Physicians should learn about legal issues for LGBT individuals and the availability of community or advocacy programs for LGBT perpetrators or victims of IPV. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  4. Perpetration patterns and environmental contexts of IPV in Sweden: relationships with adult mental health.

    PubMed

    Miller, Laura E; Cater, Asa Källström; Howell, Kathryn H; Graham-Bermann, Sandra A

    2014-01-01

    Although excellent data exist on the overall prevalence of childhood exposure to intimate partner violence (IPV), there is less information available on the specific patterns of IPV exposure in childhood and how they influence adult mental health. The current study examines 703 Swedish adults who reported exposure to IPV in childhood. Participants were part of a large national study on violence exposure. They provided an extensive history of their exposure to IPV and maltreatment experiences during childhood via electronically administered questionnaires. Mean comparison and multivariate regression methods were employed to assess differences in violence severity by reported perpetration pattern (mother-only, father-only, bidirectional or other), the association between violence severity and environmental context, and the contribution of these characteristics to adult mental health outcomes. Overall, violence perpetrated in public and by fathers was more severe and was related to poorer mental health outcomes in adulthood for child witnesses. These findings provide important insight into possible clinical "flags" for identifying children at high risk for exposure to IPV and abuse in the home. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    NASA Astrophysics Data System (ADS)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  6. Problematic Drinking, Impulsivity, and Physical IPV Perpetration: A Dyadic Analysis

    PubMed Central

    Leone, Ruschelle M.; Crane, Cory A.; Parrott, Dominic J.; Eckhardt, Christopher I.

    2016-01-01

    Alcohol use and impulsivity are two known risk factors for intimate partner violence (IPV). The current study examined the independent and interactive effects of problematic drinking and five facets of impulsivity (i.e., negative urgency, positive urgency, sensation seeking, lack of premeditation, and lack of perseverance) on perpetration of physical IPV within a dyadic framework. Participants were 289 heavy drinking heterosexual couples (total N = 578) with a recent history of psychological and/or physical IPV recruited from two metropolitan U.S. cities. Parallel multilevel Actor Partner Interdependence Models were utilized and demonstrated Actor problematic drinking, negative urgency, and lack of perseverance were associated with physical IPV. Findings also revealed associations between Partner problematic drinking and physical IPV as well as significant Partner Problematic Drinking x Actor Impulsivity (Negative Urgency and Positive Urgency) interaction effects on physical IPV. Findings highlight the importance of examining IPV within a dyadic framework and are interpreted using the I3 meta-theoretical model. PMID:26828640

  7. Safety of diphtheria, tetanus, acellular pertussis and inactivated poliovirus (DTaP-IPV) vaccine.

    PubMed

    Daley, Matthew F; Yih, W Katherine; Glanz, Jason M; Hambidge, Simon J; Narwaney, Komal J; Yin, Ruihua; Li, Lingling; Nelson, Jennifer C; Nordin, James D; Klein, Nicola P; Jacobsen, Steven J; Weintraub, Eric

    2014-05-23

    In 2008, a diphtheria, tetanus, acellular pertussis, and inactivated poliovirus combined vaccine (DTaP-IPV) was licensed for use in children 4 through 6 years of age. While pre-licensure studies did not demonstrate significant safety concerns, the number vaccinated in these studies was not sufficient to examine the risk of uncommon but serious adverse events. To assess the risk of serious adverse events following DTaP-IPV vaccination. The study was conducted from January 2009 through September 2012 in the Vaccine Safety Datalink (VSD) project. In the VSD, electronic vaccination and encounter data are updated and aggregated weekly as part of ongoing surveillance activities. Based on previous reports and biologic plausibility, eight potential adverse events were monitored: meningitis/encephalitis; seizures; stroke; Guillain-Barré syndrome; Stevens-Johnson syndrome; anaphylaxis; serious allergic reactions other than anaphylaxis; and serious local reactions. Adverse event rates in DTaP-IPV recipients were compared to historical incidence rates in the VSD population prior to 2009. Sequential probability ratio testing was used to analyze the data on a weekly basis. During the study period, 201,116 children received DTaP-IPV vaccine. Ninety-seven percent of DTaP-IPV recipients also received other vaccines on the same day, typically measles-mumps-rubella and varicella vaccines. There was no statistically significant increased risk of any of the eight pre-specified adverse events among DTaP-IPV recipients when compared to historical incidence rates. In this safety surveillance study of more than 200,000 DTaP-IPV vaccine recipients, there was no evidence of increased risk for any of the pre-specified adverse events monitored. Continued surveillance of DTaP-IPV vaccine safety may be warranted to monitor for rare adverse events, such as Guillain-Barré syndrome. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. The Structure of Male Adolescent Peer Networks and Risk for Intimate Partner Violence Perpetration: Findings from a National Sample

    PubMed Central

    Casey, Erin A.; Beadnell, Blair

    2015-01-01

    Although peer networks have been implicated as influential in a range of adolescent behaviors, little is known about relationships between peer network structures and risk for intimate partner violence (IPV) among youth. This study is a descriptive analysis of how peer network “types” may be related to subsequent risk for IPV perpetration among adolescents using data from 3,030 male respondents to the National Longitudinal Study of Adolescent Health. Sampled youth were a mean of 16 years of age when surveyed about the nature of their peer networks, and 21.9 when asked to report about IPV perpetration in their adolescent and early adulthood relationships. A latent class analysis of the size, structure, gender composition and delinquency level of friendship groups identified four unique profiles of peer network structures. Men in the group type characterized by small, dense, mostly male peer networks with higher levels of delinquent behavior reported higher rates of subsequent IPV perpetration than men whose adolescent network type was characterized by large, loosely connected groups of less delinquent male and female friends. Other factors known to be antecedents and correlates of IPV perpetration varied in their distribution across the peer group types, suggesting that different configurations of risk for relationship aggression can be found across peer networks. Implications for prevention programming and future research are addressed. PMID:20422351

  9. Inactivated polio vaccine development for technology transfer using attenuated Sabin poliovirus strains to shift from Salk-IPV to Sabin-IPV.

    PubMed

    Bakker, Wilfried A M; Thomassen, Yvonne E; van't Oever, Aart G; Westdijk, Janny; van Oijen, Monique G C T; Sundermann, Lars C; van't Veld, Peter; Sleeman, Eelco; van Nimwegen, Fred W; Hamidi, Ahd; Kersten, Gideon F A; van den Heuvel, Nico; Hendriks, Jan T; van der Pol, Leo A

    2011-09-22

    Industrial-scale inactivated polio vaccine (IPV) production dates back to the 1960s when at the Rijks Instituut voor de Volksgezondheid (RIV) in Bilthoven a process was developed based on micro-carrier technology and primary monkey kidney cells. This technology was freely shared with several pharmaceutical companies and institutes worldwide. In this contribution, the history of one of the first cell-culture based large-scale biological production processes is summarized. Also, recent developments and the anticipated upcoming shift from regular IPV to Sabin-IPV are presented. Responding to a call by the World Health Organization (WHO) for new polio vaccines, the development of Sabin-IPV was continued, after demonstrating proof of principle in the 1990s, at the Netherlands Vaccine Institute (NVI). Development of Sabin-IPV plays an important role in the WHO polio eradication strategy as biocontainment will be critical in the post-OPV cessation period. The use of attenuated Sabin strains instead of wild-type Salk polio strains will provide additional safety during vaccine production. Initially, the Sabin-IPV production process will be based on the scale-down model of the current, and well-established, Salk-IPV process. In parallel to clinical trial material production, process development, optimization and formulation research is being carried out to further optimize the process and reduce cost per dose. Also, results will be shown from large-scale (to prepare for future technology transfer) generation of Master- and Working virus seedlots, and clinical trial material (for phase I studies) production. Finally, the planned technology transfer to vaccine manufacturers in low and middle-income countries is discussed. Copyright © 2011 Elsevier Ltd. All rights reserved.

  10. High capacity fiber optic sensor networks using hybrid multiplexing techniques and their applications

    NASA Astrophysics Data System (ADS)

    Sun, Qizhen; Li, Xiaolei; Zhang, Manliang; Liu, Qi; Liu, Hai; Liu, Deming

    2013-12-01

    Fiber optic sensor network is the development trend of fiber senor technologies and industries. In this paper, I will discuss recent research progress on high capacity fiber sensor networks with hybrid multiplexing techniques and their applications in the fields of security monitoring, environment monitoring, Smart eHome, etc. Firstly, I will present the architecture of hybrid multiplexing sensor passive optical network (HSPON), and the key technologies for integrated access and intelligent management of massive fiber sensor units. Two typical hybrid WDM/TDM fiber sensor networks for perimeter intrusion monitor and cultural relics security are introduced. Secondly, we propose the concept of "Microstructure-Optical X Domin Refecltor (M-OXDR)" for fiber sensor network expansion. By fabricating smart micro-structures with the ability of multidimensional encoded and low insertion loss along the fiber, the fiber sensor network of simple structure and huge capacity more than one thousand could be achieved. Assisted by the WDM/TDM and WDM/FDM decoding methods respectively, we built the verification systems for long-haul and real-time temperature sensing. Finally, I will show the high capacity and flexible fiber sensor network with IPv6 protocol based hybrid fiber/wireless access. By developing the fiber optic sensor with embedded IPv6 protocol conversion module and IPv6 router, huge amounts of fiber optic sensor nodes can be uniquely addressed. Meanwhile, various sensing information could be integrated and accessed to the Next Generation Internet.

  11. Decay of Sabin inactivated poliovirus vaccine (IPV)-boosted poliovirus antibodies.

    PubMed

    Resik, Sonia; Tejeda, Alina; Fonseca, Magile; Sein, Carolyn; Hung, Lai Heng; Martinez, Yenisleidys; Diaz, Manuel; Okayasu, Hiromasa; Sutter, Roland W

    We conducted a follow-on study to a phase I randomized, controlled trial conducted in Cuba, 2012, to assess the persistence of poliovirus antibodies at 21-22 months following booster dose of Sabin-IPV compared to Salk-IPV in adults who had received multiple doses of oral poliovirus vaccine (OPV) during childhood. In 2012, 60 healthy adult males aged 19-23 were randomized to receive one booster dose, of either Sabin-inactivated poliovirus vaccine (Sabin-IPV), adjuvanted Sabin-IPV (aSabin-IPV), or conventional Salk-IPV. In the original study, blood was collected at days 0 (before) and 28 (after vaccination), respectively. In this study, an additional blood sample was collected 21-22 months after vaccination, and tested for neutralizing antibodies to Sabin poliovirus types 1, 2 and 3. We collected sera from 59/60 (98.3%) subjects; 59/59 (100%) remained seropositive to all poliovirus types, 21-22 months after vaccination. The decay curves were very similar among the study groups. Between day 28 and 21-22 months, there was a reduction of ⩾87.4% in median antibody levels for all poliovirus types in all study groups, with no significant differences between the study groups. The decay of poliovirus antibodies over a 21-22-month period was similar regardless of the type of booster vaccine used, suggesting the scientific data of Salk IPV long-term persistence and decay may be broadly applicable to Sabin IPV.

  12. The Social Networks of Homeless Youth Experiencing Intimate Partner Violence

    PubMed Central

    Petering, Robin; Rice, Eric; Rhoades, Harmony; Winetrobe, Hailey

    2015-01-01

    While there is a growing body of research on intimate partner violence (IPV) experienced by the housed youth population, a limited amount is known about IPV experienced by homeless youth. To our knowledge, no previous studies have examined how homeless youths’ experience of IPV is related to their social network, even though the social networks of homeless youth have been shown to be significant indicators of health and mental health. The purpose of this study is to understand the relationship between IPV, gender, and social networks among a sample of 386 homeless youth in Los Angeles, California. Results revealed that one fifth of the sample experienced IPV in the past year. Stratified regression models revealed that IPV was not significantly related to any measure of male social networks; however, females who experienced IPV had more male friends (β = 2.03, SE = 0.89, p < .05) than females who did not experience IPV. Female homeless youth who witnessed family violence during childhood had more male friends (β = 2.75, SE = 1.08, p < .05), but those who experienced sexual abuse during childhood had fewer male friends (β = −2.04, SE = 0.93, p < .05). Although there was no significant difference in the rate of IPV victimization across genders, the context of this abuse appears to be drastically different. The results suggest that females with more male friendships are at greater risk for exposure to IPV. To date, there are few effective youth-targeted IPV prevention programs and none have been shown to be effective with homeless youth. These results provide insight into future program development. PMID:24421071

  13. The Social Networks of Homeless Youth Experiencing Intimate Partner Violence.

    PubMed

    Petering, Robin; Rice, Eric; Rhoades, Harmony; Winetrobe, Hailey

    2014-08-01

    While there is a growing body of research on intimate partner violence (IPV) experienced by the housed youth population, a limited amount is known about IPV experienced by homeless youth. To our knowledge, no previous studies have examined how homeless youths' experience of IPV is related to their social network, even though the social networks of homeless youth have been shown to be significant indicators of health and mental health. The purpose of this study is to understand the relationship between IPV, gender, and social networks among a sample of 386 homeless youth in Los Angeles, California. Results revealed that one fifth of the sample experienced IPV in the past year. Stratified regression models revealed that IPV was not significantly related to any measure of male social networks; however, females who experienced IPV had more male friends (β = 2.03, SE = 0.89, p < .05) than females who did not experience IPV. Female homeless youth who witnessed family violence during childhood had more male friends (β = 2.75, SE = 1.08, p < .05), but those who experienced sexual abuse during childhood had fewer male friends (β = -2.04, SE = 0.93, p < .05). Although there was no significant difference in the rate of IPV victimization across genders, the context of this abuse appears to be drastically different. The results suggest that females with more male friendships are at greater risk for exposure to IPV. To date, there are few effective youth-targeted IPV prevention programs and none have been shown to be effective with homeless youth. These results provide insight into future program development. © The Author(s) 2014.

  14. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    DTIC Science & Technology

    2010-08-01

    since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and

  15. Research of future network with multi-layer IP address

    NASA Astrophysics Data System (ADS)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  16. Associations Between Peer Network Gender Norms and the Perpetration of Intimate Partner Violence Among Urban Tanzanian Men: a Multilevel Analysis.

    PubMed

    Mulawa, Marta I; Reyes, H Luz McNaughton; Foshee, Vangie A; Halpern, Carolyn T; Martin, Sandra L; Kajula, Lusajo J; Maman, Suzanne

    2018-05-01

    Male perpetration of intimate partner violence (IPV) against women in sub-Saharan Africa is widespread. Theory and empirical evidence suggest peer networks may play an important role in shaping IPV perpetration, though research on this topic in the region is limited. We assessed the degree to which peer network gender norms are associated with Tanzanian men's perpetration of IPV and examined whether the social cohesion of peer networks moderates this relationship. Using baseline data from sexually active men (n = 1103) nested within 59 peer networks enrolled in an on-going cluster-randomized HIV and IPV prevention trial, we fit multilevel logistic regression models to examine peer network-level factors associated with past-year physical IPV perpetration. Peer network gender norms were significantly associated with men's risk of perpetrating IPV, even after adjusting for their own attitudes toward gender roles (OR = 1.53 , p =  . 04). Peer network social cohesion moderated this relationship (OR = 1.50 , p =  . 04); the positive relationship between increasingly inequitable (i.e., traditional) peer network gender norms and men's risk of perpetrating IPV became stronger, as peer network social cohesion increased. Characteristics of the peer network context are associated with men's IPV perpetration and should be targeted in future interventions. While many IPV prevention interventions focus on changing individual attitudes, our findings support a unique approach, focused on transforming the peer context.

  17. Measuring Intimate Partner Violence (IPV): You May Only Get What You Ask For

    ERIC Educational Resources Information Center

    Waltermaurer, Eve

    2005-01-01

    With the goal of understanding the true extent of intimate partner violence (IPV), researchers have put tremendous effort over the past 20 years developing, revising, and assessing IPV screening instruments. The enhancements made in IPV instrumentation reflect our improved understanding of the nature of IPV. Unfortunately, as is often the case…

  18. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV)

    PubMed Central

    Machisa, Mercilene T.; Christofides, Nicola; Jewkes, Rachel

    2016-01-01

    Background Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV). The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health. Methods We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM) to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms) mediates the relationship between child abuse and IPV perpetration. Results Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective

  19. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV).

    PubMed

    Machisa, Mercilene T; Christofides, Nicola; Jewkes, Rachel

    2016-01-01

    Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV). The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health. We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM) to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms) mediates the relationship between child abuse and IPV perpetration. Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective against single and repeat

  20. Peer network influence on intimate partner violence perpetration among urban Tanzanian men.

    PubMed

    Mulawa, Marta I; Kajula, Lusajo J; Maman, Suzanne

    2018-04-01

    Male perpetration of intimate partner violence (IPV) against women in Tanzania is widespread. Theory and empirical evidence suggest peer networks may play an important role in shaping IPV perpetration, although research on this topic in sub-Saharan Africa is limited. Grounded in social learning theory, social influence theory, and the theory of gender and power, the purpose of this study was to examine whether and how peer networks influence men's perpetration of IPV in Dar es Salaam, Tanzania. We conducted in-depth interviews (n = 40) with a sub-sample of 20 men enrolled in the control condition of an ongoing cluster-randomised controlled trial. We purposively sampled participants who previously reported perpetrating physical IPV. To analyse the data, we generated narrative summaries and conducted thematic and interpretative coding. We saw no evidence that men self-selected into peer networks with certain values or behaviours. Rather, men described several mechanisms through which their peers influenced the perpetration of IPV, including: (1) the internalisation of peer network norms, (2) pressure to conform to peer network norms and (3) the direct involvement of peers in shaping couple power dynamics. Our findings suggest that peer networks influence men's perpetration of IPV and should be targeted in future programmes and interventions.

  1. Conflict, Displacement, and IPV: Findings From Two Congolese Refugee Camps in Rwanda.

    PubMed

    Wako, Etobssie; Elliott, Leah; De Jesus, Stacy; Zotti, Marianne E; Swahn, Monica H; Beltrami, John

    2015-09-01

    This study describes the prevalence and correlates of past-year intimate partner violence (IPV) among displaced women. We used bivariate and multivariate analyses to assess the relationships between IPV and select variables of interest. Multivariate logistic regression modeling revealed that women who had experienced outsider violence were 11 times as likely (adjusted odds ratio [AOR] = 11.21; confidence interval, CI [5.25, 23.96]) to have reported IPV than women who had not experienced outsider violence. IPV in conflict-affected settings is a major public health concern that requires effective interventions; our results suggest that women who had experienced outsider violence are at greater risk of IPV. © The Author(s) 2015.

  2. Association of intimate partner violence and health-care provider-identified obesity.

    PubMed

    Davies, Rhian; Lehman, Erik; Perry, Amanda; McCall-Hosenfeld, Jennifer S

    2016-07-01

    The association of physical and nonphysical intimate partner violence (IPV) with obesity was examined. Women (N = 1,179) were surveyed regarding demographics, obesity, and IPV exposure using humiliate-afraid-rape-kick (HARK), an IPV screening tool. A three-level lifetime IPV exposure variable measured physical, nonphysical or no IPV. Health-care provider-identified obesity was defined if participants were told by a medical provider within the past 5 years that they were obese. Bivariate analyses examined obesity by IPV and demographics. Multivariable logistic regression assessed odds of obesity by IPV type, adjusting for age, race/ethnicity, education, and marital status. Among participants, 44% reported lifetime IPV (25% physical, 19% nonphysical), and 24% reported health-care provider-identified obesity. In unadjusted analyses, obesity was more prevalent among women exposed to physical IPV (30%) and nonphysical IPV (27%), compared to women without IPV (20%, p = .002). In multivariable models, women reporting physical IPV had 1.67 times greater odds of obesity (95% confidence interval [CI] 1.20, 2.33), and women reporting nonphysical IPV had 1.46 times greater odds of obesity (95% CI 1.01, 2.10), compared to women reporting no exposure. This study extends prior data by showing, not only an association between physical IPV and obesity, but also an association between obesity and nonphysical IPV.

  3. Prevalence and Impact of Intimate Partner Violence (IPV) Among an Ethnic Minority Population.

    PubMed

    Hellemans, Sabine; Loeys, Tom; Buysse, Ann; De Smet, Olivia

    2015-11-01

    The present study examined the prevalence of lifetime experiences of physical and psychological intimate partner violence (IPV) among members of the Turkish ethnic minority population in Flanders. In addition, this study explored how lifetime IPV victimization affects ethnic minority victims' current mental, relational, and sexual well-being. Using a population-based representative sample, data from 392 adult Turkish women and men were investigated. Lifetime experiences of physical violence were reported by 14.3% of the Turkish respondents, while 66.0% reported at least one incidence of psychological abuse. Women were much more likely than men to report physical IPV victimization, but no gender differences were found for psychological IPV. With regard to the impact of IPV, it was found that lifetime IPV experiences do not appear to affect victims' current mental health. However, higher levels of physical and/or psychological IPV victimization were related to increased levels of relationship dissatisfaction, anxious and avoidant attachment orientations, sexual dissatisfaction, sexual dysfunction (with distress), and to decreased levels of sexual communication. These adverse relational and sexual outcomes of IPV victimization were mainly present among women but were also, to a lesser degree, relevant for men. © The Author(s) 2014.

  4. Alcohol Use, Hostile Sexism, and Religious Self-Regulation: Investigating Risk and Protective Factors of IPV Perpetration.

    PubMed

    Lynch, Kellie R; Renzetti, Claire M

    2017-05-01

    Research suggests that the relationship between alcohol use and intimate partner violence (IPV) is moderated by a range of other factors. Therefore, we investigated the relationship between alcohol use, hostile sexism, and religious self-regulation with perpetration. Using a national sample of 255 men, we found that hostile sexism was associated with physical violence toward a partner and alcohol use was positively associated with psychological abuse toward a partner. With regard to religious self-regulation, we found that introjected religious self-regulation was positively associated with hostile sexism and positively associated with perpetrating physical IPV. Identified religious self-regulation was negatively associated with physical violence perpetration. We also found significant interactions among our independent measures on physical IPV perpetration. These analyses suggest that increased alcohol consumption elevates the risk for physical violence perpetration among men who are high in introjected religious self-regulation and low in hostile sexism, while reducing the risk for perpetration in men who are high in identified religious self-regulation and low in hostile sexism. Implications and limitations of the findings are discussed.

  5. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    NASA Astrophysics Data System (ADS)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  6. Probing next Generation Portuguese Academic Network

    ERIC Educational Resources Information Center

    Friacas, Carlos; Massano, Emanuel; Domingues, Monica; Veiga, Pedro

    2008-01-01

    Purpose: The purpose of this article is to provide several viewpoints about monitoring aspects related to recent deployments of a new technology (IPv6). Design/methodology/approach: Several views and domains were used, with a common point: the Portuguese research and education network (RCTS). Findings: A significant amount of work is yet to be…

  7. Analysis of the dose-sparing effect of adjuvanted Sabin-inactivated poliovirus vaccine (sIPV).

    PubMed

    Li, Zhuofan; Ding, Wenting; Guo, Qi; Liu, Ze; Zhu, Zhe; Song, Shaohui; Li, Weidong; Liao, Guoyang

    2018-03-30

    Sabin-based inactivated poliovirus vaccine(sIPV) is gradually replacing live-attenuated oral polio vaccine(OPV). Sabin-inactivated poliovirus vaccine(sIPV) has played a vital role in reducing economic burden of poliomyelitis and maintaining appropriate antibody levels in the population. However, due to its high cost and limited manufacturing capacity, sIPV cannot reach its full potential for global poliovirus eradication in developing countries. Therefore, to address this situation, we designed this study to evaluate the dose-sparing effects of AS03, CpG oligodeoxynucleotides (CpG-ODN) and polyinosinic:polycytidylic acid (PolyI:C) admixed with sIPV in rats. Our results showed that a combination of 1/4-dose sIPV adjuvanted with AS03 or AS03 with BW006 provides a seroconversion rate similar to that of full-dose sIPV without adjuvant and that, this rate is 5-fold higher than that of 1/4-dose sIPV without adjuvant after the first immunization. The combination of AS03 or AS03 with BW006 as an adjuvant effectively reduced sIPV dose by at least 4-fold and induced both humoral and cellular immune responses. Therefore, our study revealed that the combination of AS03 or AS03 with BW006 is a promising adjuvant for sIPV development.

  8. Innovative IPV from attenuated Sabin poliovirus or newly designed alternative seed strains.

    PubMed

    Hamidi, Ahd; Bakker, Wilfried A M

    2012-11-01

    This article gives an overview of the patent literature related to innovative inactivated polio vaccine (i-IPV) based on using Sabin poliovirus strains and newly developed alternative recombinant poliovirus strains. This innovative approach for IPV manufacturing is considered to attribute to the requirement for affordable IPV in the post-polio-eradication era, which is on the horizon. Although IPV is a well-established vaccine, the number of patent applications in this field was seen to have significantly increased in the past decade. Currently, regular IPV appears to be too expensive for universal use. Future affordability may be achieved by using alternative cell lines, alternative virus seed strains, improved and optimized processes, dose sparing, or the use of adjuvants. A relatively short-term option to achieve cost-price reduction is to work on regular IPV, using wild-type poliovirus strains, or on Sabin-IPV, based on using attenuated poliovirus strains. This price reduction can be achieved by introducing efficiency in processing. There are also multiple opportunities to work on dose sparing, for example, by using adjuvants or fractional doses. Renewed interest in this field was clearly reflected in the number and diversity of patent applications. In a later stage, several innovative approaches may become even more attractive, for example the use of recombinant virus strains or even a totally synthetic vaccine. Currently, such work is mainly carried out by research institutes and universities and therefore clinical data are not available.

  9. Accounting for Intimate Partner Violence: A Biographical Analysis of Narrative Strategies Used by Men Experiencing IPV From Their Female Partners.

    PubMed

    Corbally, Melissa

    2015-10-01

    Intimate partner violence (IPV) is a serious social issue which affects the medium- and long-term health outcomes of many individuals worldwide. The cost of IPV on the physical and psychological well-being of individuals, in addition to its wider economic costs in responding to abused persons, is significant. Presently, there is a lack of understanding about the nature of female-initiated IPV and how men account for their experiences of it. This study examined male victims' life stories of their IPV experiences from their intimate partners. Using the biographical narrative interpretive method, three cases were analyzed from a social constructionist perspective to examine what narrative strategies men used to account for their experiences of being abused by their female partners. Three dominant narrative strategies were used by respondents: the fatherhood narrative, the good husband narrative, and the abuse narrative. The abuse narrative had a unique narrative form, which reflected respondents' disassociation between their identities as men and also as abused persons. Dominant conflicting discourses of masculinity and intimate partner abuse disadvantaged men in identifying IPV and secondly in responding appropriately. This study found that men prefer to use dominant discursive identities as legitimate means from which to disclose IPV experiences. The findings from this study illustrate that broad questioning by professionals regarding fatherhood may be most helpful in promoting disclosures of IPV if this is suspected. © The Author(s) 2014.

  10. A quantitative proteomics approach identifies ETV6 and IKZF1 as new regulators of an ERG-driven transcriptional network

    PubMed Central

    Unnikrishnan, Ashwin; Guan, Yi F.; Huang, Yizhou; Beck, Dominik; Thoms, Julie A. I.; Peirs, Sofie; Knezevic, Kathy; Ma, Shiyong; de Walle, Inge V.; de Jong, Ineke; Ali, Zara; Zhong, Ling; Raftery, Mark J.; Taghon, Tom; Larsson, Jonas; MacKenzie, Karen L.; Van Vlierberghe, Pieter; Wong, Jason W. H.; Pimanda, John E.

    2016-01-01

    Aberrant stem cell-like gene regulatory networks are a feature of leukaemogenesis. The ETS-related gene (ERG), an important regulator of normal haematopoiesis, is also highly expressed in T-ALL and acute myeloid leukaemia (AML). However, the transcriptional regulation of ERG in leukaemic cells remains poorly understood. In order to discover transcriptional regulators of ERG, we employed a quantitative mass spectrometry-based method to identify factors binding the 321 bp ERG +85 stem cell enhancer region in MOLT-4 T-ALL and KG-1 AML cells. Using this approach, we identified a number of known binders of the +85 enhancer in leukaemic cells along with previously unknown binders, including ETV6 and IKZF1. We confirmed that ETV6 and IKZF1 were also bound at the +85 enhancer in both leukaemic cells and in healthy human CD34+ haematopoietic stem and progenitor cells. Knockdown experiments confirmed that ETV6 and IKZF1 are transcriptional regulators not just of ERG, but also of a number of genes regulated by a densely interconnected network of seven transcription factors. At last, we show that ETV6 and IKZF1 expression levels are positively correlated with expression of a number of heptad genes in AML and high expression of all nine genes confers poorer overall prognosis. PMID:27604872

  11. Concomitant administration of diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) with pentavalent rotavirus vaccine in Japanese infants.

    PubMed

    Tanaka, Yoshiyuki; Yokokawa, Ruriko; Rong, Han Shi; Kishino, Hiroyuki; Stek, Jon E; Nelson, Margaret; Lawrence, Jody

    2017-06-03

    Rotavirus is the leading cause of severe acute gastroenteritis in infants and young children. Most children are infected with rotavirus, and the health and economic burdens of rotavirus gastroenteritis on healthcare systems and families are considerable. In 2012 pentavalent rotavirus vaccine (RV5) and diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) were licensed in Japan. We examined the immunogenicity and safety of DTaP-sIPV when administrated concomitantly with RV5 in Japanese infants. A total of 192 infants 6 to 11 weeks of age randomized to Group 1 (N = 96) received DTaP-sIPV and RV5 concomitantly, and Group 2 (N = 96) received DTaP-sIPV and RV5 separately. Antibody titer to diphtheria toxin, pertussis antigens (PT and FHA), tetanus toxin, and poliovirus type 1, 2, and 3 were measured at 4 to 6 weeks following 3-doses of DTaP-sIPV. Seroprotection rates for all components of DTaP-sIPV were 100% in both groups, and the geometric mean titers for DTaP-sIPV in Group 1 were comparable to Group 2. Incidence of systemic AEs (including diarrhea, vomiting, fever, and nasopharyngitis) were lower in Group 1 than in Group 2. All vaccine-related AEs were mild or moderate in intensity. There were no vaccine-related serious AEs, no deaths, and no cases of intussusception during the study. Concomitant administration of DTaP-sIPV and RV5 induced satisfactory immune responses to DTaP-sIPV and acceptable safety profile. The administration of DTaP-sIPV given concomitantly with RV5 is expected to facilitate compliance with the vaccination schedule and improve vaccine coverage in Japanese infants.

  12. Identifying influencers from sampled social networks

    NASA Astrophysics Data System (ADS)

    Tsugawa, Sho; Kimura, Kazuma

    2018-10-01

    Identifying influencers who can spread information to many other individuals from a social network is a fundamental research task in the network science research field. Several measures for identifying influencers have been proposed, and the effectiveness of these influence measures has been evaluated for the case where the complete social network structure is known. However, it is difficult in practice to obtain the complete structure of a social network because of missing data, false data, or node/link sampling from the social network. In this paper, we investigate the effects of node sampling from a social network on the effectiveness of influence measures at identifying influencers. Our experimental results show that the negative effect of biased sampling, such as sample edge count, on the identification of influencers is generally small. For social media networks, we can identify influencers whose influence is comparable with that of those identified from the complete social networks by sampling only 10%-30% of the networks. Moreover, our results also suggest the possible benefit of network sampling in the identification of influencers. Our results show that, for some networks, nodes with higher influence can be discovered from sampled social networks than from complete social networks.

  13. Pathways and trajectories linking housing instability and poor health among low-income women experiencing intimate partner violence (IPV): Toward a conceptual framework.

    PubMed

    Daoud, Nihaya; Matheson, Flora I; Pedersen, Cheryl; Hamilton-Wright, Sarah; Minh, Anita; Zhang, Janice; O'Campo, Patricia

    2016-01-01

    We used grounded theory to understand pathways and trajectories to housing instability (HI) and poor health among low-income women with experiences of intimate partner violence (IPV). We conducted in-depth interviews during 2010-11 with forty-one women (ages 18-45 years) living in Ontario, Canada. All women reported depressive symptoms in combination with other health problems. In addition to the direct pathway of IPV to poor health, thematic analysis revealed an indirect multi-tiered pathway with complex trajectories among IPV, HI, and poor health. These trajectories included material HI (homelessness, high mobility, evictions, problems paying rent, hiding, and landlord discrimination), psychological HI (feeling unsafe, low self-esteem, and poor control), and social trajectories (financial problems, loss of employment, income, or social networks, and leaving school). These trajectories elevated stress and decreased self-care (unhealthy behaviors, substance abuse, and reduced medical compliance) and exacerbated poor health already compromised by IPV. Depending on her specific context, each woman experienced these pathways and trajectories differently. Moreover, the women's experiences differed across three time periods: before, immediately after, and long after leaving an abusive relationship. Finally, we found that for these women, achieving stable housing was crucial for stabilizing their health.

  14. Brain network connectivity in women exposed to intimate partner violence: a graph theory analysis study.

    PubMed

    Roos, Annerine; Fouche, Jean-Paul; Stein, Dan J

    2017-12-01

    Evidence suggests that women who suffer from intimate partner violence (IPV) and posttraumatic stress disorder (PTSD) have structural and functional alterations in specific brain regions. Yet, little is known about how brain connectivity may be altered in individuals with IPV, but without PTSD. Women exposed to IPV (n = 18) and healthy controls (n = 18) underwent structural brain imaging using a Siemens 3T MRI. Global and regional brain network connectivity measures were determined, using graph theory analyses. Structural covariance networks were created using volumetric and cortical thickness data after controlling for intracranial volume, age and alcohol use. Nonparametric permutation tests were used to investigate group differences. Findings revealed altered connectivity on a global and regional level in the IPV group of regions involved in cognitive-emotional control, with principal involvement of the caudal anterior cingulate, the middle temporal gyrus, left amygdala and ventral diencephalon that includes the thalamus. To our knowledge, this is the first evidence showing different brain network connectivity in global and regional networks in women exposed to IPV, and without PTSD. Altered cognitive-emotional control in IPV may underlie adaptive neural mechanisms in environments characterized by potentially dangerous cues.

  15. Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity

    DTIC Science & Technology

    2016-03-01

    22 Figure 3.6 Example Border Gateway Protocol (BGP) update message . . . . 23 Figure 3.7 Customer-provider relationship with border...government USN U.S. Navy VPN Virtual Private Network xiv Acknowledgments First, I would like to thank my family for their love , support, and...network outages when they restart . Network outages occur for many reasons: hardware failure, severe weather, misconfiguration, patching, upgrades

  16. Community Violence, Social Support Networks, Ethnic Group Differences, and Male Perpetration of Intimate Partner Violence

    ERIC Educational Resources Information Center

    Raghavan, Chitra; Rajah, Valli; Gentile, Katie; Collado, Lillian; Kavanagh, Ann Marie

    2009-01-01

    The authors examined how witnessing community violence influenced social support networks and how these networks were associated with male-to-female intimate partner violence (IPV) in ethnically diverse male college students. The authors assessed whether male social support members themselves had perpetrated IPV (male network violence) and whether…

  17. Immunogenicity and safety of 3-dose primary vaccination with combined DTPa-HBV-IPV/Hib in Indian infants

    PubMed Central

    Lalwani, Sanjay K.; Agarkhedkar, Sharad; Sundaram, Balasubramanian; Mahantashetti, Niranjana S.; Malshe, Nandini; Agarkhedkar, Shalaka; Van Der Meeren, Olivier; Mehta, Shailesh; Karkada, Naveen; Han, Htay Htay; Mesaros, Narcisa

    2017-01-01

    ABSTRACT Multivalent combination vaccines have reduced the number of injections and therefore improved vaccine acceptance, timeliness of administration and global coverage. The hexavalent diphtheria-tetanus-acellular pertussis-hepatitis B-inactivated poliovirus/Haemophilus influenzae type b (DTPa-HBV-IPV/Hib; Infanrix hexa™) vaccine, administered according to various schedules, is widely used for the primary vaccination of infants worldwide. In the current publication, we are presenting the immunogenicity and safety of 3 doses of DTPa-HBV-IPV/Hib vaccine when administered to Indian infants. 224 healthy infants (mean age 6.8 weeks) were vaccinated at 6–10–14 weeks (W) of age (n = 112) or 2–4–6 months (M) of age (n = 112). One month after the third vaccine dose, the seroprotection/seropositivity status against diphtheria, pertussis, tetanus, polio, hepatitis B and Hib antigens ranged from 98.6% to 100% in both groups. The vaccine response rate to the pertussis antigens ranged from 97% to 100%. Pain (6–10–14W group: 25.2%; 2–4–6M group: 13.4%) and fever (15.3% and; 15.2%, respectively) were the most frequently reported solicited local and general symptoms. Unsolicited adverse events were reported for 35.7% (6–10–14W group) and 22.3% (2–4–6M group) of subjects. No vaccine related serious adverse events were reported. In conclusion, the hexavalent DTPa-HBV-IPV/Hib vaccine was immunogenic and well tolerated, irrespective of the dosing schedule. PMID:27629913

  18. Peer Influence on IPV by Young Adult Males: Investigating the Case for a Social Norms Approach.

    PubMed

    McKool, Marissa; Stephenson, Rob; Winskell, Kate; Teten Tharp, Andra; Parrott, Dominic

    2017-08-01

    Nearly 32% of women report experiencing physical violence from an intimate partner and more than 8% report being raped by a significant other in their lifetime. Young people's perceptions that their peers perpetrate relationship violence have been shown to increase the odds of self-reported perpetration. Yet, limited research has been conducted on this relationship as individuals begin to age out of adolescence. The present study sought to examine the link between the perception of peer perpetration of intimate partner violence (IPV) and self-reported IPV perpetration among a sample of predominately young adult (21-35 years) males. This study also explored the discordance between the perception of peer IPV behavior and self-reported perpetration. Data from 101 male peer dyads ( n = 202) were taken from a study on the effects of alcohol and bystander intervention in Atlanta, Georgia. Thirty-six percent ( n = 73) of men reported perpetrating physical IPV and 67% ( n = 135) reported perpetrating sexual IPV in the past 12 months. Nearly 35% ( n = 55) of the sample reported that none of their peers had perpetrated physical IPV, which contradicted their friend's self-report of physical IPV perpetration. Similarly, 68% ( n = 115) of the men perceived none of their peers to have perpetrated sexual IPV, which contradicted their friend's self-report of sexual IPV perpetration. Discordance variables were significantly associated with self-reported perpetration for both physical (χ 2 = 152.7, p < .01) and sexual (χ 2 = 164.4, p < .01) IPV. These results point to an underestimation of peer IPV perpetration among young adult males. Findings suggest a traditional social norms approach to IPV prevention, which seeks to persuade individuals that negative behaviors are less common than perceived, may not be the best approach given a significant number of men believed their friends were nonviolent when they had perpetrated violence.

  19. The Relationship Between Family, Parent, and Child Characteristics and Intimate-Partner Violence (IPV) Among Ukrainian Mothers.

    PubMed

    Burlaka, Viktor; Grogan-Kaylor, Andrew; Savchuk, Olena; Graham-Bermann, Sandra A

    2017-07-01

    To assess the prevalence of intimate partner violence (IPV) in a sample of Ukrainian mothers of schoolchildren, and to examine the relationship between IPV and family, parent, and child characteristics utilizing multilevel models. Mothers of children aged 9-16 (n = 278, 93.5% Ukrainians) answered the Revised Conflict Tactics Scale (CTS2) assessing IPV. We also examined the relationship between IPV and maternal age, education, employment and marital status, family income, and rural or urban residence. Eighty-one percent of women reported psychological violence and 58% reported physical assault. On average, women reported 66 instances of IPV during the last year. Multilevel modeling revealed that lower maternal education, unemployment, not living with the husband or partner, and urban residency were associated with higher IPV victimization. Younger age and family income were not significantly related to IPV. IPV was a significant social problem in the present sample of Ukrainian mothers of school age children. Future policy and violence prevention programming should focus on supporting academic and employment opportunities for women, particularly for those living in urban areas.

  20. Effects of PREPARE, a Multi-component, School-Based HIV and Intimate Partner Violence (IPV) Prevention Programme on Adolescent Sexual Risk Behaviour and IPV: Cluster Randomised Controlled Trial.

    PubMed

    Mathews, Catherine; Eggers, Sander M; Townsend, Loraine; Aarø, Leif E; de Vries, Petrus J; Mason-Jones, Amanda J; De Koker, Petra; McClinton Appollis, Tracy; Mtshizana, Yolisa; Koech, Joy; Wubs, Annegreet; De Vries, Hein

    2016-09-01

    Young South Africans, especially women, are at high risk of HIV. We evaluated the effects of PREPARE, a multi-component, school-based HIV prevention intervention to delay sexual debut, increase condom use and decrease intimate partner violence (IPV) among young adolescents. We conducted a cluster RCT among Grade eights in 42 high schools. The intervention comprised education sessions, a school health service and a school sexual violence prevention programme. Participants completed questionnaires at baseline, 6 and 12 months. Regression was undertaken to provide ORs or coefficients adjusted for clustering. Of 6244 sampled adolescents, 55.3 % participated. At 12 months there were no differences between intervention and control arms in sexual risk behaviours. Participants in the intervention arm were less likely to report IPV victimisation (35.1 vs. 40.9 %; OR 0.77, 95 % CI 0.61-0.99; t(40) = 2.14) suggesting the intervention shaped intimate partnerships into safer ones, potentially lowering the risk for HIV.

  1. NASA Lewis advanced IPV nickel-hydrogen technology

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Britton, Doris L.

    1993-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts. Some of the advancements are as follows: to use 26 percent potassium hydroxide electrolyte to improve cycle life and performance, to modify the state of the art cell design to eliminate identified failure modes and further improve cycle life, and to develop a lightweight nickel electrode to reduce battery mass, hence reduce launch and/or increase satellite payload. A breakthrough in the LEO cycle life of individual pressure vessel nickel-hydrogen battery cells was reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 accelerated LEO cycles at 80 percent DOD compared to 3,500 cycles for cells containing 31 percent KOH. Results of the boiler plate cell tests have been validated at NWSC, Crane, Indiana. Forty-eight ampere-hour flight cells containing 26 and 31 percent KOH have undergone real time LEO cycle life testing at an 80 percent DOD, 10 C. The three cells containing 26 percent KOH failed on the average at cycle 19,500. The three cells containing 31 percent KOH failed on the average at cycle 6,400. Validation testing of NASA Lewis 125 Ah advanced design IPV nickel-hydrogen flight cells is also being conducted at NWSC, Crane, Indiana under a NASA Lewis contract. This consists of characterization, storage, and cycle life testing. There was no capacity degradation after 52 days of storage with the cells in the discharged state, on open circuit, 0 C, and a hydrogen pressure of 14.5 psia. The catalyzed wall wick cells have been cycled for over 22,694 cycles with no cell failures in the continuing test. All three of the non-catalyzed wall wick cells failed (cycles 9,588; 13,900; and 20,575). Cycle life test results of the Fibrex nickel electrode has demonstrated the feasibility of an improved nickel electrode giving a higher specific energy nickel-hydrogen cell. A nickel-hydrogen boiler plate cell using an 80

  2. Immunogenicity and safety of a combined diphtheria, tetanus, acellular pertussis, and inactivated poliovirus vaccine (DTaP-IPV) compared to separate administration of standalone DTaP and IPV vaccines: a randomized, controlled study in infants in the Republic of Korea.

    PubMed

    Lee, Soo Young; Hwang, Hui Sung; Kim, Jong Hyun; Kim, Hyun Hee; Lee, Hyun Seung; Chung, Eun Hee; Park, Su Eun; Ma, Sang Hyuk; Chang, Jin Keun; Guitton, Fabrice; Ortiz, Esteban; Kang, Jin Han

    2011-02-11

    This randomized trial enrolled 442 infants in the Republic of Korea to assess the immunogenicity and safety of a combined diphtheria, tetanus, acellular pertussis, and inactivated poliovirus vaccine (DTaP-IPV; Tetraxim™) for primary vaccination at 2, 4 and 6 months of age compared with DTaP and IPV vaccines given separately. Immunogenicity was high in both groups; seroprotection and seroconversion rates of the combined vaccine (Group A) were non-inferior to the control vaccines (Group B). All subjects were seroprotected against poliovirus types 1, 2 and 3 (≥ 81/dil) and anti-diphtheria (≥ 0.01 IU/mL); 99.0% were seroprotected against tetanus (≥ 0.1 IU/mL). At least 93.6% had anti-diphtheria antibody titers ≥ 0.1 IU/mL. Anti-pertussis toxoid (PT) and anti-filamentous haemagglutinin (FHA) seroconversion (≥ 4-fold increase in antibody titer) rates were 96.6% and 94.4% for Group A, 92.2% and 78.4% for Group B. Most solicited reactions occurred within 4 days of vaccination, resolved within 3 days and were mild. Severe solicited reactions occurred after ≤ 0.5% of doses in Group A and ≤ 0.9% in Group B. No withdrawals occurred because of adverse events. The DTaP-IPV combined vaccine given at 2, 4, and 6 months of age was well tolerated; immunogenicity was similar to the control vaccines. Copyright © 2011 Elsevier Ltd. All rights reserved.

  3. Testing the woman abuse screening tool to identify intimate partner violence in Indonesia.

    PubMed

    Iskandar, Livia; Braun, Kathryn L; Katz, Alan R

    2015-04-01

    Intimate Partner Violence (IPV) is a global public health problem. IPV prevalence in Indonesia has been estimated to be less than 1%, based on reported cases. It is likely that IPV prevalence is underreported in Indonesia, as it is in many other countries. Screening for IPV has been found to increase IPV identification, but no screening tools are in use in Indonesia. The aim of this study was to test the translated Woman Abuse Screening Tool (WAST) for detecting IPV in Indonesia. The WAST was tested against a diagnostic interview by a trained psychologist on 240 women attending two Primary Health Centers in Jakarta. IPV prevalence and the reliability, sensitivity, and specificity of the WAST were estimated. Prevalence of IPV by diagnostic interview was 36.3%, much higher than published estimates. The most common forms of IPV identified were psychological (85%) and physical abuse (24%). Internal reliability of the WAST was high (α = .801). A WAST score of 13 (out of 24) is the recommended cutoff for identifying IPV, but only 17% of the Indonesian sample scored 13 or higher. Test sensitivity of the WAST with a cutoff score of 13 was only 41.9%, with a specificity of 96.8%. With a cutoff score of 10, the sensitivity improved to 84.9%, while the specificity decreased to 61.0%. Use of the WAST with a cutoff score of 10 provides good sensitivity and reasonable specificity and would provide a much-needed screening tool for use in Indonesia. Although a lower cutoff would yield a greater proportion of false positives, most of the true cases would be identified, increasing the possibility that women experiencing abuse would receive needed assistance. © The Author(s) 2014.

  4. Immunogenicity and safety of 3-dose primary vaccination with combined DTPa-HBV-IPV/Hib vaccine in Canadian Aboriginal and non-Aboriginal infants.

    PubMed

    Scheifele, David W; Ferguson, Murdo; Predy, Gerald; Dawar, Meena; Assudani, Deepak; Kuriyakose, Sherine; Van Der Meeren, Olivier; Han, Htay-Htay

    2015-04-15

    This study compared immune responses of healthy Aboriginal and non-Aboriginal infants to Haemophilus influenzae type b (Hib) and hepatitis B virus (HBV) components of a DTaP-HBV-IPV/Hib combination vaccine, 1 month after completing dosing at 2, 4 and 6 months of age. Of 112 infants enrolled in each group, 94 Aboriginal and 107 non-Aboriginal infants qualified for the immunogenicity analysis. Anti-PRP concentrations exceeded the protective minimum (≥0.15 μg/ml) in ≥97% of infants in both groups but geometric mean concentrations (GMCs) were higher in Aboriginal infants (6.12 μg/ml versus 3.51 μg/ml). All subjects were seroprotected (anti-HBs ≥10 mIU/mL) against HBV, with groups having similar GMCs (1797.9 versus 1544.4 mIU/mL, Aboriginal versus non-Aboriginal, respectively). No safety concerns were identified. We conclude that 3-dose primary vaccination with DTaP-HBV-IPV/Hib combination vaccine elicited immune responses to Hib and HBV components that were at least as high in Aboriginal as in non-Aboriginal Canadian infants. Clinical Trial Registration NCT00753649. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  5. Impact of intrapatient variability (IPV) in tacrolimus trough levels on long-term renal transplant function: multicentre collaborative retrospective cohort study protocol

    PubMed Central

    Goldsmith, Petra M; Bottomley, Matthew J; Okechukwu, Okidi; Ross, Victoria C; Ghita, Ryan; Wandless, David; Falconer, Stuart J; Papachristos, Stavros; Nash, Philip; Androshchuk, Vitaliy; Clancy, Marc

    2017-01-01

    Introduction High intrapatient variability (IPV) in tacrolimus trough levels has been shown to be associated with higher rates of renal transplant failure. There is no consensus on what level of IPV constitutes a risk of graft loss. The establishment of such a threshold could help to guide clinicians in identifying at-risk patients to receive targeted interventions to improve IPV and thus outcomes. Methods and analysis A multicentre Transplant Audit Collaborative has been established to conduct a retrospective study examining tacrolimus IPV and renal transplant outcomes. Patients in receipt of a renal transplant at participating centres between 2009 and 2014 and fulfilling the inclusion criteria will be included in the study. The aim is to recruit a minimum of 1600 patients with follow-up spanning at least 2 years in order to determine a threshold IPV above which a renal transplant recipient would be considered at increased risk of graft loss. The study also aims to determine any national or regional trends in IPV and any demographic associations. Ethics and dissemination Consent will not be sought from patients whose data are used in this study as no additional procedures or information will be required from participants beyond that which would normally take place as part of clinical care. The study will be registered locally in each participating centre in line with local research and development protocols. It is anticipated that the results of this audit will be disseminated locally, in participating NHS Trusts, through national and international meetings and publications in peer-reviewed journals. PMID:28756385

  6. Provision of QoS for Multimedia Services in IEEE 802.11 Wireless Network

    DTIC Science & Technology

    2006-10-01

    Provision of QoS for Multimedia Services in IEEE 802.11 Wireless Network. In Dynamic Communications Management (pp. 10-1 – 10-16). Meeting Proceedings...mechanisms have been used for managing a limited bandwidth link within the IPv6 military narrowband network. The detailed description of these...confirms that implemented video rate adaptation mechanism enables improvement of qaulity of video transfer. Provision of QoS for Multimedia Services in

  7. A Randomized Controlled Study of a Fully Liquid DTaP-IPV-HB-PRP-T Hexavalent Vaccine for Primary and Booster Vaccinations of Healthy Infants and Toddlers in Latin America.

    PubMed

    López, Pío; Arguedas Mohs, Adriano; Abdelnour Vásquez, Arturo; Consuelo-Miranda, Maria; Feroldi, Emmanuel; Noriega, Fernando; Jordanov, Emilia; B Chir, Siham; Zambrano, Betzana

    2017-11-01

    Hexavalent diphtheria-tetanus-acellular pertussis-inactivated poliovirus-hepatitis B-Haemophilus influenzae type b (DTaP-IPV-HB-PRP-T)-containing vaccines are increasingly the standard of care. This study evaluated the primary series (NCT01177722) and booster (NCT01444781) of a fully liquid DTaP-IPV-HB-PRP-T vaccine in Latin America. Infants (N = 1375) received hepatitis B vaccine at birth and were randomized to one of 3 batches of the investigational DTaP-IPV-HB-PRP-T or licensed control vaccine (DTaP-HB-IPV//PRP-T) at 2-4 to 6 months of age, coadministered with 7-valent pneumococcal conjugate vaccine (PCV7) (2-4-6 months) and rotavirus vaccine (2-4 months). A booster of either DTaP-IPV-HB-PRP-T or control was given at 12-24 months, coadministered with PCV7. Immunogenicity was assessed by validated assays and safety from parental reports. Primary series seroprotection and vaccine response rates were equivalent for DTaP-IPV-HB-PRP-T batches. For pooled batches, noninferiority to the control vaccine was demonstrated for each antigen. There were no descriptive differences in antibody persistence or booster response between DTaP-IPV-HB-PRP-T and the control. The booster responses to either vaccine following DTaP-IPV-HB-PRP-T primary series or to DTaP-IPV-HB-PRP-T following a control vaccine primary series were similar. The anti-aP component (filamentous hemagglutinin [FHA] and pertussis toxin [PT]) vaccine response and anti-Haemophilus influenzae type b (PRP) series seroprotection (≥0.15 µg/mL) rates were ≥73.0% after 2 primary series doses. Antipyretics had no effect on the immune response, and an extra (oral) polio vaccination had no effect on the antipolio booster response. Responses to PCV7 and rotavirus vaccine were similar for each coadministration. There were no safety concerns observed with any vaccine. These results confirm the suitability of the fully liquid DTaP-IPV-HB-PRP-T vaccine for primary and booster vaccination of infants.

  8. Immunogenicity and reactogenicity of a decennial booster dose of a combined reduced-antigen-content diphtheria-tetanus-acellular pertussis and inactivated poliovirus booster vaccine (dTpa-IPV) in healthy adults.

    PubMed

    Kovac, Martina; Rathi, Niraj; Kuriyakose, Sherine; Hardt, Karin; Schwarz, Tino F

    2015-05-21

    Pertussis in adults and adolescents could be reduced by replacing traditional tetanus and diphtheria (Td) boosters with reduced-antigen-content diphtheria-tetanus-acellular pertussis (dTpa) vaccines. This study evaluated the administration of dTpa-IPV (dTpa-inactivated poliovirus) in adults ten years after they received a booster dose of either dTpa-IPV, dTpa+IPV or Td-IPV in trial NCT01277705. Open multicentre, phase IV study (www.clinicaltrials.govNCT01323959) in which healthy adults, who had received a previous dose of dTpa-IPV, dTpa+IPV or Td-IPV ten years earlier, received a single decennial booster dose of dTpa-IPV (Boostrix-polio, GlaxoSmithKline Vaccines). Blood samples were collected before and one month after booster vaccination. Antibody concentrations against all vaccine antigens were measured and reactogenicity and safety were assessed. A total of 211 subjects (mean age 50.3 years) received vaccination of whom 201 were included in the according-to-protocol cohort for immunogenicity. Before the decennial dTpa-IPV booster, ≥71.0% subjects were seroprotected/seropositive against all vaccine antigens. One month after the booster dose, all subjects were seroprotected against tetanus and poliovirus types 2 and 3; ≥95.7% subjects were seroprotected against diphtheria and ≥98.3% against poliovirus type 1. Anti-pertussis booster responses for the various antigens were observed in ≥76.5% (pertussis toxoid; PT), ≥85.1% (filamentous haemagglutinin; FHA) and ≥63.2% (pertactin; PRN) of subjects. During the 4-day follow-up, the overall incidence of local AEs was 71.6%, 75.0% and 72.2% in dTpa-IPV, dTpa+IPV and Td-IPV groups, respectively. Pain was the most frequent solicited local adverse event (AE; ≥62.7% subjects) and fatigue the most frequent solicited general AE (≥18.5%). No serious AEs were reported during the study. A booster dose of dTpa-IPV was immunogenic and well tolerated in adults who had received a booster dose of either dTpa-IPV, dTpa+IPV

  9. Factors associated with recent intimate partner violence experience amongst currently married women in Afghanistan and health impacts of IPV: a cross sectional study.

    PubMed

    Gibbs, Andrew; Corboz, Julienne; Jewkes, Rachel

    2018-05-03

    Intimate partner violence (IPV) is exceedingly common in conflict and post-conflict settings. We first seek to describe factors associated with past 12 month IPV amongst currently married women in Afghanistan, focused on the factors typically assumed to drive IPV. Second, to describe whether IPV is independently associated with a range of health outcomes. Cross-sectional analysis of currently married Afghan women, comprising the baseline study of a trial to prevent IPV. We use multinomial regression, reporting adjusted relative-risk ratios to model factors associated with the different forms of IPV, comparing no IPV, emotional IPV only, and physical IPV and emotional IPV. Second we assessed whether experience of emotional IPV, and physical IPV, were independently associated with health outcomes, reporting adjusted ß coefficients and adjusted odds ratios as appropriate. Nine hundred thirty five currently married women were recruited, 11.8% experienced only emotional IPV and 23.1% experienced physical and emotional IPV. Emotional IPV only was associated with attending a women's group, greater food insecurity, her husband having more than one wife, experiencing other forms of family violence, and more inequitable community gender norms. Experiencing both physical IPV and emotional IPV was associated with attending a women's group, more childhood trauma, husband cruelty, her husband having more than one wife, experiencing other forms of family violence, more inequitable community gender norms, and greater reported disability. Emotional IPV and physical IPV were independently associated with worse health outcomes. IPV remains common in Afghanistan. Economic interventions for women alone are unlikely to prevent IPV and potentially may increase IPV. Economic interventions need to also work with husbands and families, and work to transform community level gender norms. NCT03236948 . Registered 28 July 2017, retrospectively registered.

  10. An Environment IoT Sensor Network for Monitoring the Environment

    NASA Astrophysics Data System (ADS)

    Martinez, K.; Hart, J. K.; Bragg, O.; Black, A.; Bader, S.; Basford, P. J.; Bragg, G. M.; Fabre, A.

    2016-12-01

    The Internet of Things is a term which has emerged to describe the increase of Internet connectivity of everyday objects. While wireless sensor networks have developed highly energy efficient designs they need a step-change in their interoperability and usability to become more commonly used in Earth Science. IoT techniques can bring many of these advances while reusing some of the technologies developed for low power sensing. Here we concentrate on developing effective use of internet protocols throughout a low power sensor network. This includes 6LowPAN to provide a mesh IPv6 network, 40mW 868 MHz CC1120 radio transceivers to save power but provide kilometre range, a CC2538 ARM® Cortex®-M3 as main processor and CoAP to provide a binary HTTP-like interface to the nodes. We discuss in detail a system we deployed to monitor periglacial, peat and fluvial processes in the Scottish Highlands. The system linked initial nodes 3km away further up the mountain 2km away and used a CoAP GET sequence from a base station in the valley to gather the data. The IPv6 addressing and tunnelling allowed direct connectivity to desktops in Southampton. This provides insights into how the combination of low power techniques and emerging internet standards will bring advantages in interoperability, heterogeneity, usability and maintainability.

  11. Antibody persistence at 18-20 months of age and safety and immunogenicity of a booster dose of a combined DTaP-IPV//PRP∼T vaccine compared to separate vaccines (DTaP, PRP∼T and IPV) following primary vaccination of healthy infants in the People's Republic of China.

    PubMed

    Li, Rong Cheng; Li, Feng Xiang; Li, Yan Ping; Hou, Qi Ming; Li, Chang Gui; Li, Ya Nan; Chen, Fu Sheng; Hu, Xue Zhong; Su, Wen Bin; Zhang, Shu Min; Fang, Han Hua; Ye, Qiang; Zeng, Tian De; Liu, Tao Xuan; Li, Xiu Bi; Huang, Yun Neng; Deng, Man Ling; Zhang, Yan Ping; Ortiz, Esteban

    2011-11-21

    This study assessed the antibody persistence, and the immunogenicity and safety of a booster dose of a DTaP-IPV//PRP∼T (Pentaxim®, Sanofi Pasteur's AcXim family) combined vaccine and of standalone vaccines one year after primary vaccination in the People's Republic of China. Participants (N=719) previously primed with DTaP-IPV//PRP∼T at 2, 3, 4 months (Group A, N=255), 3, 4, 5 months (Group B, N=233), or DTaP (Wuhan Institute of Biological Products), PRP-T (Act-Hib®) and IPV (Imovax® Polio) at 3, 4, 5 months (Group C, N=231) received boosters of the same vaccines at 18-20 months of age. Seroprotection (SP) and seroconversion (SC) were determined before and 1 month after the booster. Safety was monitored from parental reports. In all groups 87.6-100% of participants had pre-booster protective anti-PRP, -diphtheria, -tetanus and -poliovirus antibody titers; post-booster, all SP rates were 100% and SC was ≥ 80.4% for anti-pertussis titers ≥ 4-fold increase. Reactogenicity was low for each group. These data support the use of the DTaP-IPV//PRP∼T vaccine in the People's Republic of China compared to separate DTaP, IPV, and PRP∼T administration in terms of both safety and immunogenicity. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Evaluation of QoS supported in Network Mobility NEMO environments

    NASA Astrophysics Data System (ADS)

    Hussien, L. F.; Abdalla, A. H.; Habaebi, M. H.; Khalifa, O. O.; Hassan, W. H.

    2013-12-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN).

  13. Economic empowerment of impoverished IPV survivors: a review of best practice literature and implications for policy.

    PubMed

    Hahn, Sur Ah; Postmus, Judy L

    2014-04-01

    Best practices in advocating for economic empowerment of impoverished intimate partner violence (IPV) survivors require the comprehensive and holistic organization of program and service delivery systems. This article outlines the best practices literature that addresses IPV in the lives of impoverished women, as well as the literature that specifically examines the interventions to economically empower IPV survivors--whether impoverished or not. This article concludes with suggestions for policy makers on how to incorporate these best practices into the Violence Against Women Act and for practitioners to ensure a comprehensive approach to interventions for impoverished IPV survivors.

  14. Efficient Buffering Scheme in the LMA for Seamless Handover in PMIPv6

    NASA Astrophysics Data System (ADS)

    Kim, Kwang-Ryoul; Lee, Hyo-Beom; Choi, Hyon-Young; Min, Sung-Gi; Han, Youn-Hee

    Proxy Mobile IPv6 (PMIPv6) is proposed as a new network-based local mobility protocol which does not involve the Mobile Node (MN) in mobility management. PMIPv6, which uses link-layer attachment information, reduces the movement detection time and eliminates duplicate address detection procedures in order to provide faster handover than Mobile IPv6 (MIPv6). To eliminate packet loss during the handover period, the Local Mobility Anchor (LMA) buffering scheme is proposed. In this scheme, the LMA buffers lost packets of the Mobile Access Gateway (MAG) and the MN during the handover and recovers them after handover. A new Automatic Repeat reQuest (ARQ) handler is defined which efficiently manages the LMA buffer. The ARQ handler relays ARQ result between the MAG and the MN to the LMA. The LMA removes any buffered packets which have been successfully delivered to the MN. The ARQ handler recovers the packet loss during the handover using buffered packets in the LMA. The ARQ information, between the MAG and LMA, is inserted in the outer header of IP-in-IP encapsulated packets of a standard PMIPv6 tunnel. Since the proposed scheme simply adds information to the standard operation of an IP-in-IP tunnel between the LMA and the MAG, it can be implemented seamlessly without modification to the original PMIPv6 messages and signaling sequence. Unlike other Fast Handovers for Mobile IPv6 (FMIPv6) based enhancement for PMIPv6, the proposed scheme does not require any handover related information before the actual handover.

  15. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN

    PubMed Central

    Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha

    2009-01-01

    Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio. PMID:22346730

  16. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN.

    PubMed

    Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha

    2009-01-01

    Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  17. Intimate partner violence norms cluster within households: an observational social network study in rural Honduras.

    PubMed

    Shakya, Holly B; Hughes, D Alex; Stafford, Derek; Christakis, Nicholas A; Fowler, James H; Silverman, Jay G

    2016-03-08

    Intimate partner violence (IPV) is a complex global problem, not only because it is a human rights issue, but also because it is associated with chronic mental and physical illnesses as well as acute health outcomes related to injuries for women and their children. Attitudes, beliefs, and norms regarding IPV are significantly associated with the likelihood of both IPV experience and perpetration. We investigated whether IPV acceptance is correlated across socially connected individuals, whether these correlations differ across types of relationships, and whether social position is associated with the likelihood of accepting IPV. We used sociocentric network data from 831 individuals in rural Honduras to assess the association of IPV acceptance between socially connected individuals across 15 different types of relationships, both within and between households. We also investigated the association between network position and IPV acceptance. We found that having a social contact that accepts IPV is strongly associated with IPV acceptance among individuals. For women the clustering of IPV acceptance was not significant in between-household relationships, but was concentrated within households. For men, however, while IPV acceptance was strongly clustered within households, men's acceptance of IPV was also correlated with people with whom they regularly converse, their mothers and their siblings, regardless of household. We also found that IPV was more likely to be accepted by less socially-central individuals, and that the correlation between a social contact's IPV acceptance was stronger on the periphery, suggesting that, as a norm, it is held on the periphery of the community. Our results show that differential targeting of individuals and relationships in order to reduce the acceptability and, subsequently, the prevalence of IPV may be most effective. Because IPV norms seem to be strongly held within households, the household is probably the most logical unit to

  18. Playing by the Rules: Agency Policy and Procedure in Service Experience of IPV Survivors.

    PubMed

    Wood, Leila; Cook Heffron, Laurie; Voyles, Molly; Kulkarni, Shanti

    2017-06-01

    More than 1,800 programs exist in the United States, providing not only shelter but also transitional housing, advocacy and support, transportation, legal aid, and group and individual counseling for women who have experienced intimate partner violence (IPV). Shelter and transitional housing provide critical support for survivors, but have also been critiqued for having too many restrictive rules and code of conduct. More information is needed about the impact of rules and agency policy on women seeking services in IPV residential settings. This qualitative study explored the central research question, "How do rules shape IPV residential environment and survivor experiences in services?" Twenty-five women in four programs in two states who were currently residing in IPV residential services were interviewed about their experiences. Data were analyzed using grounded theory methods. Findings indicated rules affect individual survivors' and families' experiences and responses in services and of healing from IPV (micro), the relationships among residents and between residents and staff (mezzo), and participants' relationships with the agency as an institution and the help-seeking community (macro). An intriguing paradox is noted in that at their best, rules provide stability and motivation for some survivors. At their worst, rules create isolation and force exit from shelter into unsafe circumstances, causing a ripple effect of impact. Implications include the need to restructure rules and policies collaboratively with residents, and reduce the amount of rules used in services. Addressing rules will better enable IPV services to be survivor-centered and trauma-informed, ultimately increasing safety and healing.

  19. Primary and booster vaccination with an inactivated poliovirus vaccine (IPV) is immunogenic and well-tolerated in infants and toddlers in China.

    PubMed

    Li, Rongcheng; Li, Chang Gui; Li, Yanping; Liu, Youping; Zhao, Hong; Chen, Xiaoling; Kuriyakose, Sherine; Van Der Meeren, Olivier; Hardt, Karin; Hezareh, Marjan; Roy-Ghanta, Sumita

    2016-03-14

    Replacing live-attenuated oral poliovirus vaccines (OPV) with inactivated poliovirus vaccines (IPV) is part of the global strategy to eradicate poliomyelitis. China was declared polio-free in 2000 but continues to record cases of vaccine-associated-poliomyelitis and vaccine-derived-poliovirus outbreaks. Two pilot safety studies and two larger immunogenicity trials evaluated the non-inferiority of IPV (Poliorix™, GSK Vaccines, Belgium) versus OPV in infants and booster vaccination in toddlers primed with either IPV or OPV in China. In pilot safety studies, 25 infants received 3-dose IPV primary vaccination (Study A, www.clinicaltrial.gov NCT00937404) and 25 received an IPV booster after priming with three OPV doses (Study B, NCT01021293). In the randomised, controlled immunogenicity and safety trial (Study C, NCT00920439), infants received 3-dose primary vaccination with IPV (N=541) or OPV (N=535) at 2,3,4 months of age, and a booster IPV dose at 18-24 months (N=470, Study D, NCT01323647: extension of study C). Blood samples were collected before and one month post-dose-3 and booster. Reactogenicity was assessed using diary cards. Serious adverse events (SAEs) were captured throughout each study. Study A and B showed that IPV priming and IPV boosting (after OPV) was safe. Study C: One month post-dose-3, all IPV and ≥ 98.3% OPV recipients had seroprotective antibody titres towards each poliovirus type. The immune response elicited by IPV was non-inferior to Chinese OPV. Seroprotective antibody titres persisted in ≥ 94.7% IPV and ≥ 96.1% OPV recipients at 18-24 months (Study D). IPV had a clinically acceptable safety profile in all studies. Grade 3 local and systemic reactions were uncommon. No SAEs were related to IPV administration. Trivalent IPV is non-inferior to OPV in terms of seroprotection (in the Chinese vaccination schedule) in infant and toddlers, with a clinically acceptable safety profile. Copyright © 2016 The Authors. Published by Elsevier Ltd

  20. Dynamic profiles of neutralizing antibody responses elicited in rhesus monkeys immunized with a combined tetravalent DTaP-Sabin IPV candidate vaccine.

    PubMed

    Sun, Mingbo; Ma, Yan; Xu, Yinhua; Yang, Huijuan; Shi, Li; Che, Yanchun; Liao, Guoyang; Jiang, Shude; Zhang, Shumin; Li, Qihan

    2014-02-19

    The World Health Organization has recommended that a Sabin inactivated polio vaccine (IPV) should gradually and synchronously replace oral polio vaccines for routine immunizations because its benefits in eliminating vaccine-associated paralytic poliomyelitis have been reported in different phases of clinical trials. It is also considered important to explore new tetravalent diphtheria, tetanus, and acellular pertussis-Sabin IPV (DTaP-sIPV) candidate vaccines for possible use in developing countries. In this study, the immunogenicity of a combined tetravalent DTaP-sIPV candidate vaccine was investigated in primates by evaluating the neutralizing antibody responses it induced. The dynamic profiles of the antibody responses to each of the separate antigenic components and serotypes of Sabin IPV were determined and their corresponding geometric mean titers were similar to those generated by the tetravalent diphtheria, tetanus, and acellular pertussis-conventional IPV (DTaP-cIPV), the tetravalent diphtheria, tetanus, and acellular pertussis (DTaP), and Sabin IPV vaccines in the control groups. This implies that protective immunogenic effects are conferred by this combined tetravalent formulation. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Concomitant administration of a fully liquid, ready-to-use DTaP-IPV-HB-PRP-T hexavalent vaccine with a meningococcal serogroup C conjugate vaccine in infants.

    PubMed

    Vesikari, Timo; Borrow, Ray; Da Costa, Xavier; Richard, Patrick; Eymin, Cécile; Boisnard, Florence; Lockhart, Stephen

    2017-01-11

    DTaP-IPV-HB-PRP-T or hexavalent vaccines are indicated for primary and booster vaccination of infants and toddlers against diphtheria, tetanus, pertussis, hepatitis B, poliomyelitis and invasive diseases caused by Haemophilus influenzae type b (Hib). The present study evaluates the safety and immunogenicity of a ready-to-use hexavalent vaccine when co-administered with a meningococcal serogroup C conjugate (MenC) vaccine in infants. This was a phase III, open-label, randomised, multicentre study conducted in Finland. Healthy infants, aged 46-74days (n=350), were randomised in a ratio of 1:1 to receive DTaP-IPV-HB-PRP-T vaccine at two, three and four months, either with a MenC vaccine co-administered at two and four months (Group 1; n=175) or without MenC vaccine (Group 2; n=175). All infants also received routine rotavirus and 13-valent pneumococcal conjugate vaccines. The proportion of participants with an anti-HBs concentration ⩾10mIU/mL assessed one month after the third dose of DTaP-IPV-HB-PRP-T vaccine was 97.5% [95%CI: 93.1-99.3] in the coadministration group and 96.1% [95%CI: 91.8-98.6] in the group without MenC vaccine. The proportion of participants with an anti-MenC SBA titre ⩾8 assessed one month after the second dose of MenC vaccine was 100% in the coadministration group. Both primary objectives were achieved. Secondary immunogenicity and safety analyses showed that co-administration of DTaP-IPV-HB-PRP-T and MenC vaccines did not impact the immune response to the antigens of each of the two vaccines. All vaccines were well tolerated and the safety profile of DTaP-IPV-HB-PRP-T vaccine was similar in both groups. ClinicalTrials.gov identifier: NCT01839175; EudraCT number: 2012-005547-24. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  2. AEGIS: A Lightweight Firewall for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hossain, Mohammad Sajjad; Raghunathan, Vijay

    Firewalls are an essential component in today's networked computing systems (desktops, laptops, and servers) and provide effective protection against a variety of over-the-network security attacks. With the development of technologies such as IPv6 and 6LoWPAN that pave the way for Internet-connected embedded systems and sensor networks, these devices will soon be subject to (and need to be defended against) similar security threats. As a first step, this paper presents Aegis, a lightweight, rule-based firewall for networked embedded systems such as wireless sensor networks. Aegis is based on a semantically rich, yet simple, rule definition language. In addition, Aegis is highly efficient during operation, runs in a transparent manner from running applications, and is easy to maintain. Experimental results obtained using real sensor nodes and cycle-accurate simulations demonstrate that Aegis successfully performs gatekeeping of a sensor node's communication traffic in a flexible manner with minimal overheads.

  3. Immunogenicity and safety of a new hexavalent vaccine (DTaP5-IPV-HB-Hib) administered in a mixed primary series schedule with a pentavalent vaccine (DTaP5-IPV-Hib).

    PubMed

    Martinón-Torres, Federico; Boisnard, Florence; Thomas, Stéphane; Sadorge, Christine; Borrow, Ray

    2017-06-27

    DTaP5-IPV-HB-Hib vaccine is a fully-liquid, combination hexavalent vaccine. This phase III, open-label, multicentre study conducted in Spain, evaluated the immune response to all DTaP5-IPV-HB-Hib antigens when the vaccine was used in a mixed hexa/penta/hexa primary series. Infants (who had received one dose of hepatitis B vaccine at birth) received a mixed schedule including DTaP5-IPV-HB-Hib (PRP-OMP conjugate) at 2 and 6months of age, DTaP5-IPV-Hib at 4months, meningococcal serogroup C conjugate (MCC) vaccine at 2 and 4months, and routine rotavirus and pneumococcal vaccination. One month post-dose 3 of the mixed schedule, response rates were considered acceptable if the lower bound of the two-sided 95% confidence interval around the post-vaccination response rate was >90% for hepatitis B and >80% for Haemophilus influenzae type b (Hib). Secondary immunogenicity objectives included description of the antibody response to all hexavalent antigens one month after completion of the mixed schedule, and to MCC antigen one month after the second MCC dose. The safety profile after each dose of study vaccine was described. Of 385 healthy infants enrolled, 384 completed the study. The primary objective was achieved for both hepatitis B and Hib; the lower bound of the 2-sided 95% CI of the response rates (97.2% and 99.0%, respectively) were greater than the pre-specified acceptability thresholds. One month post-dose 3 of the mixed schedule, all participants were seroprotected against diphtheria, tetanus and polio. The mixed schedule induced a robust immune response to all hexavalent antigens. The co-administration of the hexavalent vaccine in a mixed schedule with MCC vaccine did not reduce the immune response to vaccine antigens. Vaccines were well tolerated. In conclusion, the acceptability of response rates against Hib and hepatitis B were demonstrated one month post-dose 3 of the mixed schedule; robust immune responses against all other hexavalent antigens were observed

  4. THE ATTENUATING EFFECT OF EMPOWERMENT ON IPV-RELATED PTSD SYMPTOMS IN BATTERED WOMEN LIVING IN DOMESTIC VIOLENCE SHELTERS

    PubMed Central

    Perez, Sara; Johnson, Dawn M.; Wright, Caroline Vaile

    2010-01-01

    Intimate partner violence (IPV) is associated with significant psychological distress, including posttraumatic stress disorder (PTSD). However, factors that attenuate the impact of IPV on PTSD remain largely unknown. Using hierarchical regression, this investigation explored the impact of resource acquisition and empowerment on the relationship between IPV and PTSD. Empowerment demonstrated greater relative importance over resource acquisition. Specifically, empowerment was found to attenuate the impact of IPV severity on PTSD at low and moderate levels of violence. The importance of fostering empowerment and addressing PTSD in addition to provision of resources in battered women is discussed. PMID:22411301

  5. Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks

    DTIC Science & Technology

    2008-08-27

    Message Authentication Code-Message Digest 5-96). Due to the processing power consumption and slowness of public key authentication methods, RSA ...MODP) group with a 768 -bit modulus 2. a MODP group with a 1024-bit modulus 3. an Elliptic Curve Group over GF[ 2n ] (EC2N) group with a 155-bit...nonces, digital signatures using the Digital Signature Algorithm, and the Rivest-Shamir- Adelman ( RSA ) algorithm. For more information about the

  6. Hexavalent IPV-based combination vaccines for public-sector markets of low-resource countries

    PubMed Central

    Mahmood, Kutub; Pelkowski, Sonia; Atherly, Deborah; Sitrin, Robert; Donnelly, John J

    2013-01-01

    In anticipation of the successful eradication of wild polio virus, alternative vaccination strategies for public-sector markets of low-resource countries are extremely important, but are still under development. Following polio eradication, inactivated polio vaccine (IPV) would be the only polio vaccine available, and would be needed for early childhood immunization for several years, as maintenance of herd immunity will be important for sustaining polio eradication. Low-cost combination vaccines containing IPV could provide reliable and continuous immunization in the post-polio eradication period. Combination vaccines can potentially simplify complex pediatric routine immunization schedules, improve compliance, and reduce costs. Hexavalent vaccines containing Diphtheria (D), Tetanus (T), whole cell pertussis (wP), Hepatitis B (HBV), Haemophilus b (Hib) and the three IPV serotype antigens have been considered as the ultimate combination vaccine for routine immunization. This product review evaluates potential hexavalent vaccine candidates by composition, probable time to market, expected cost of goods, presentation, and technical feasibility and offers suggestions for development of low-cost hexavalent combination vaccines. Because there are significant technical challenges facing wP-based hexavalent vaccine development, this review also discusses other alternative approaches to hexavalent that could also ensure a timely and reliable supply of low-cost IPV based combination vaccines. PMID:23787559

  7. Hexavalent IPV-based combination vaccines for public-sector markets of low-resource countries.

    PubMed

    Mahmood, Kutub; Pelkowski, Sonia; Atherly, Deborah; Sitrin, Robert D; Donnelly, John J

    2013-09-01

    In anticipation of the successful eradication of wild polio virus, alternative vaccination strategies for public-sector markets of low-resource countries are extremely important, but are still under development. Following polio eradication, inactivated polio vaccine (IPV) would be the only polio vaccine available, and would be needed for early childhood immunization for several years, as maintenance of herd immunity will be important for sustaining polio eradication. Low-cost combination vaccines containing IPV could provide reliable and continuous immunization in the post-polio eradication period. Combination vaccines can potentially simplify complex pediatric routine immunization schedules, improve compliance, and reduce costs. Hexavalent vaccines containing Diphtheria (D), Tetanus (T), whole cell pertussis (wP), Hepatitis B (HBV), Haemophilus b (Hib) and the three IPV serotype antigens have been considered as the ultimate combination vaccine for routine immunization. This product review evaluates potential hexavalent vaccine candidates by composition, probable time to market, expected cost of goods, presentation, and technical feasibility and offers suggestions for development of low-cost hexavalent combination vaccines. Because there are significant technical challenges facing wP-based hexavalent vaccine development, this review also discusses other alternative approaches to hexavalent that could also ensure a timely and reliable supply of low-cost IPV based combination vaccines.

  8. Intelligent Middle-Ware Architecture for Mobile Networks

    NASA Astrophysics Data System (ADS)

    Rayana, Rayene Ben; Bonnin, Jean-Marie

    Recent advances in electronic and automotive industries as well as in wireless telecommunication technologies have drawn a new picture where each vehicle became “fully networked”. Multiple stake-holders (network operators, drivers, car manufacturers, service providers, etc.) will participate in this emerging market, which could grow following various models. To free the market from technical constraints, it is important to return to the basics of the Internet, i.e., providing embarked devices with a fully operational Internet connectivity (IPv6).

  9. Microfinance Participation, Control Over Resources, and Justification of IPV: Results From a Nationally Representative Sample of Women.

    PubMed

    Murshid, Nadine Shaanta

    2016-04-13

    A high percentage of men and women are purported to justify intimate partner violence (IPV) in countries that are steeped in patriarchy even in the presence of programs such as microfinance that aim to address gender equity. This article examines two assertions that emerge from the literature on microfinance and its potential for positive outcomes for women who participate in it: (a) Microfinance participation is associated with reduced justification of IPV, and (b) microfinance participants with control over their own resources are less likely to justify IPV when compared with microfinance participants who do not have control over their resources. Couples data from a nationally representative survey, the Bangladesh Demographic and Health Survey, were used in the present study. Propensity score matching and logistic regression analyses were conducted to reveal that (a) microfinance participation was not associated with justification of IPV and that (b) women who participated in microfinance were less likely to justify IPV when they had no control over their resources. Implications for practitioners and policymakers are discussed. © The Author(s) 2016.

  10. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    NASA Astrophysics Data System (ADS)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  11. Measuring Attitudes About Intimate Partner Violence Against Women: The ATT-IPV Scale

    PubMed Central

    Yount, Kathryn M.; VanderEnde, Kristin; Zureick-Brown, Sarah; Anh, Hoang Tu; Schuler, Sidney Ruth; Minh, Tran Hung

    2014-01-01

    In lower-income settings, women more often than men justify intimate partner violence (IPV). Yet, the role of measurement invariance across gender is unstudied. We developed the ATT-IPV scale to measure attitudes about physical violence against wives in 1,055 married men and women ages 18–50 in My Hao district, Vietnam. Across 10 items about transgressions of the wife, women more often than men agreed that a man had good reason to hit his wife (3 % to 92 %; 0 % to 67 %). In random split-half samples, one-factor exploratory factor analysis (EFA) (N1 = 527) and confirmatory factor analysis (CFA) (N2 = 528) models for nine items with sufficient variability had significant loadings (0.575–0.883; 0.502–0.897) and good fit (RMSEA = 0.068, 0.048; CFI = 0.951, 0.978, TLI = 0.935, 0.970). Three items had significant uniform differential item functioning (DIF) by gender, and adjustment for DIF revealed that measurement noninvariance was partially masking men’s lower propensity than women to justify IPV. A CFA model for the six items without DIF had excellent fit (RMSEA = 0.019, CFI = 0.994, TLI = 0.991) and an attitudinal gender gap similar to the DIF-adjusted nine-item model, suggesting that the six-item scale reliably measures attitudes about IPV across gender. Researchers should validate the scale in urban Vietnam and elsewhere and decompose DIF-adjusted gender attitudinal gaps. PMID:24846070

  12. CDC's DELTA FOCUS Program: Identifying Promising Primary Prevention Strategies for Intimate Partner Violence.

    PubMed

    Armstead, Theresa L; Rambo, Kirsten; Kearns, Megan; Jones, Kathryn M; Dills, Jenny; Brown, Pamela

    2017-01-01

    According to 2011 data, nearly one in four women and one in seven men in the United States experience severe physical violence by an intimate partner, creating a public health burden requiring population-level solutions. To prevent intimate partner violence (IPV) before it occurs, the CDC developed Domestic Violence Prevention Enhancements and Leadership Through Alliances, Focusing on Outcomes for Communities United with States to identify promising community- and societal-level prevention strategies to prevent IPV. The program funds 10 state domestic violence coalitions for 5 years to implement and evaluate programs and policies to prevent IPV by influencing the environments and conditions in which people live, work, and play. The program evaluation goals are to promote IPV prevention by identifying promising prevention strategies and describing those strategies using case studies, thereby creating a foundation for building practice-based evidence with a health equity approach.

  13. Identifying PHM market and network opportunities.

    PubMed

    Grube, Mark E; Krishnaswamy, Anand; Poziemski, John; York, Robert W

    2015-11-01

    Two key processes for healthcare organizations seeking to assume a financially sustainable role in population health management (PHM), after laying the groundwork for the effort, are to identify potential PHM market opportunities and determine the scope of the PHM network. Key variables organizations should consider with respect to market opportunities include the patient population, the overall insurance/employer market, and available types of insurance products. Regarding the network's scope, organizations should consider both traditional strategic criteria for a viable network and at least five additional criteria: network essentiality and PHM care continuum, network adequacy, service distribution right-sizing, network growth strategy, and organizational agility.

  14. Multivariate data analysis on historical IPV production data for better process understanding and future improvements.

    PubMed

    Thomassen, Yvonne E; van Sprang, Eric N M; van der Pol, Leo A; Bakker, Wilfried A M

    2010-09-01

    Historical manufacturing data can potentially harbor a wealth of information for process optimization and enhancement of efficiency and robustness. To extract useful data multivariate data analysis (MVDA) using projection methods is often applied. In this contribution, the results obtained from applying MVDA on data from inactivated polio vaccine (IPV) production runs are described. Data from over 50 batches at two different production scales (700-L and 1,500-L) were available. The explorative analysis performed on single unit operations indicated consistent manufacturing. Known outliers (e.g., rejected batches) were identified using principal component analysis (PCA). The source of operational variation was pinpointed to variation of input such as media. Other relevant process parameters were in control and, using this manufacturing data, could not be correlated to product quality attributes. The gained knowledge of the IPV production process, not only from the MVDA, but also from digitalizing the available historical data, has proven to be useful for troubleshooting, understanding limitations of available data and seeing the opportunity for improvements. 2010 Wiley Periodicals, Inc.

  15. How do primary health care teams learn to integrate intimate partner violence (IPV) management? A realist evaluation protocol.

    PubMed

    Goicolea, Isabel; Vives-Cases, Carmen; San Sebastian, Miguel; Marchal, Bruno; Kegels, Guy; Hurtig, Anna-Karin

    2013-03-23

    Despite the existence of ample literature dealing, on the one hand, with the integration of innovations within health systems and team learning, and, on the other hand, with different aspects of the detection and management of intimate partner violence (IPV) within healthcare facilities, research that explores how health innovations that go beyond biomedical issues-such as IPV management-get integrated into health systems, and that focuses on healthcare teams' learning processes is, to the best of our knowledge, very scarce if not absent. This realist evaluation protocol aims to ascertain: why, how, and under what circumstances primary healthcare teams engage (if at all) in a learning process to integrate IPV management in their practices; and why, how, and under what circumstances team learning processes lead to the development of organizational culture and values regarding IPV management, and the delivery of IPV management services. This study will be conducted in Spain using a multiple-case study design. Data will be collected from selected cases (primary healthcare teams) through different methods: individual and group interviews, routinely collected statistical data, documentary review, and observation. Cases will be purposively selected in order to enable testing the initial middle-range theory (MRT). After in-depth exploration of a limited number of cases, additional cases will be chosen for their ability to contribute to refining the emerging MRT to explain how primary healthcare learn to integrate intimate partner violence management. Evaluations of health sector responses to IPV are scarce, and even fewer focus on why, how, and when the healthcare services integrate IPV management. There is a consensus that healthcare professionals and healthcare teams play a key role in this integration, and that training is important in order to realize changes. However, little is known about team learning of IPV management, both in terms of how to trigger such learning

  16. The impact of perceived childhood victimization and patriarchal gender ideology on intimate partner violence (IPV) victimization among Korean immigrant women in the USA.

    PubMed

    Kim, Chunrye

    2017-08-01

    Childhood victimization experiences are common among intimate partner violence (IPV) victims. This study examines the link between childhood physical and sexual victimization experiences and adulthood IPV among Korean immigrant women in the USA. As Korean immigrants often use physical punishment to discipline their children, and reporting sexual abuse is discouraged due to stigmatization in this community, cultural factors (e.g. patriarchal values) related to childhood victimization and IPV were also examined. Survey data from Korean immigrant women in the USA were collected. Using a case-control design, we compared 64 Korean immigrant women who have experienced IPV in the past year with 63 Korean immigrant women who have never experienced IPV in their lifetime. The findings of this study reveal that IPV victims, compared with non-victims, experienced higher childhood victimization rates. Logistic regression analysis demonstrated that childhood victimization and patriarchal gender ideology strongly predict IPV victimization among Korean immigrants. However, patriarchal values did not moderate the relationship between childhood victimization and IPV. To prevent IPV among Korean immigrant population, we need to make special efforts to prevent childhood abuse and change ingrained cultural attitudes about child physical and sexual abuse among immigrant communities through culturally sensitive programs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Validation test of advanced technology for IPV nickel-hydrogen flight cells: Update

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts with the intention of improving cycle life and performance. One advancement was to use 26 percent potassium hydroxide (KOH) electrolyte to improve cycle life. Another advancement was to modify the state-of-the-art cell design to eliminate identified failure modes. The modified design is referred to as the advanced design. A breakthrough in the low-earth-orbit (LEO) cycle life of IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 LEO cycles compared to 3,500 cycles for cells containing 31 percent KOH. The boiler plate test results are in the process of being validated using flight hardware and real time LEO testing at the Naval Weapons Support Center (NWSC), Crane, Indiana under a NASA Lewis Contract. An advanced 125 Ah IPV nickel-hydrogen cell was designed. The primary function of the advanced cell is to store and deliver energy for long-term, LEO spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent KOH electrolyte; (2) use of a patented catalyzed wall wick; (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management; and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion due to charge/discharge cycling. The significant improvements resulting from these innovations are: extended cycle life; enhanced thermal, electrolyte, and oxygen management; and accommodation of nickel electrode expansion. The advanced cell design is in the process of being validated using real time LEO cycle life testing of NWSC, Crane, Indiana. An update of validation test results confirming this technology is presented.

  18. Intimate partner violence and its association with maternal depressive symptoms 6-8 months after childbirth in rural Bangladesh.

    PubMed

    Kabir, Zarina N; Nasreen, Hashima-E; Edhborg, Maigun

    2014-01-01

    The prevalence of intimate partner violence (IPV), a gross violation of human rights, ranges widely across the world with higher prevalence reported in low- and middle-income countries. Evidence related mainly to physical health shows that IPV has both direct and indirect impacts on women's health. Little is known about the impact of IPV on the mental health of women, particularly after childbirth. To describe the prevalence of IPV experienced by women 6-8 months after childbirth in rural Bangladesh and the factors associated with physical IPV. The study also aims to investigate the association between IPV and maternal depressive symptoms after childbirth. The study used cross-sectional data at 6-8 months postpartum. The sample included 660 mothers of newborn children. IPV was assessed by physical, emotional, and sexual violence. The Edinburgh Postnatal Depression Scale assessed maternal depressive symptoms. Prevalence of physical IPV was 52%, sexual 65%, and emotional 84%. The husband's education (OR: 0.41, CI: 0.23-0.73), a poor relationship with the husband (OR: 2.64, CI: 1.07-6.54), and emotional violence by spouse (OR: 1.58, CI: 1.35-1.83) were significantly associated with physical IPV experienced by women. The perception of a fussy and difficult child (OR: 1.05, CI: 1.02-1.08), a poor relationship with the husband (OR: 4.95, CI: 2.55-9.62), and the experience of physical IPV (OR: 2.83, CI: 1.72-4.64) were found to be significant predictors of maternal depressive symptoms among women 6-8 months after childbirth. Neither forced sex nor emotional violence by an intimate partner was found to be significantly associated with maternal depressive symptoms 6-8 months postpartum. It is important to screen for both IPV and depressive symptoms during pregnancy and postpartum. Since IPV and spousal relationships are the most important predictors of maternal depressive symptoms in this study, couple-focused interventions at the community level are suggested.

  19. Factors Discriminating among Profiles of Resilience and Psychopathology in Children Exposed to Intimate Partner Violence (IPV)

    ERIC Educational Resources Information Center

    Graham-Bermann, Sandra A.; Gruber, Gabrielle; Howell, Kathryn H.; Girz, Laura

    2009-01-01

    Objective: To evaluate the social and emotional adjustment of 219 children in families with varying levels of intimate partner violence (IPV) using a model of risk and protection. To explore factors that differentiate children with poor adjustment from those with resilience. Methodology: Mothers who experienced IPV in the past year and their…

  20. Associations between intimate partner violence (IPV) during pregnancy, mother-to-infant bonding failure, and postnatal depressive symptoms.

    PubMed

    Kita, Sachiko; Haruna, Megumi; Matsuzaki, Masayo; Kamibeppu, Kiyoko

    2016-08-01

    This study examined the associations between intimate partner violence (IPV) during pregnancy, mother-to-infant bonding failure, and postnatal depressive symptoms at 1 month postnatal. This study also examined if these relationships would be mediated by antenatal depressive symptoms. This study was a prospective cohort study that investigated effects between the third trimester of pregnancy and 1 month after childbirth. The Japanese version of the Index of Spouse Abuse (ISA), the Japanese version of the Mother-Infant Bonding Scale (MIBS), and the Japanese version of the Hospital Anxiety and Depression Scale (HADS) were used to measure IPV during pregnancy, bonding failure with infants, and depressive symptoms during pregnancy and the postnatal period respectively. Structural equation modeling (SEM) was used to find the associations between those four variables. The final path model of the SEM showed good fit with the data. IPV during pregnancy was associated with mother-to-infant bonding failure at 1 month postnatal, whereas IPV during pregnancy was not significantly associated with postnatal depressive symptoms at 1 month postnatal. In addition, this study demonstrated that the associations between IPV during pregnancy, mother-to-infant bonding failure, and postnatal depressive symptoms at 1 month postnatal were mediated by antenatal depressive symptoms. The results of this study indicated the need for interventions for IPV and psychological health care for abused pregnant women to prevent antenatal depressive symptoms in prenatal health settings. Those interventions by perinatal health professionals would help to prevent bonding failure with infants and postnatal depressive symptoms after childbirth.

  1. Corporations' Resistance to Innovation: The Adoption of the Internet Protocol Version 6

    ERIC Educational Resources Information Center

    Pazdrowski, Tomasz

    2013-01-01

    Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…

  2. On the Network Convergence Process in RPL over IEEE 802.15.4 Multihop Networks: Improvement and Trade-Offs

    PubMed Central

    Kermajani, Hamidreza; Gomez, Carles

    2014-01-01

    The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently developed by the Internet Engineering Task Force (IETF). Given its crucial role in enabling the Internet of Things, a significant amount of research effort has already been devoted to RPL. However, the RPL network convergence process has not yet been investigated in detail. In this paper we study the influence of the main RPL parameters and mechanisms on the network convergence process of this protocol in IEEE 802.15.4 multihop networks. We also propose and evaluate a mechanism that leverages an option available in RPL for accelerating the network convergence process. We carry out extensive simulations for a wide range of conditions, considering different network scenarios in terms of size and density. Results show that network convergence performance depends dramatically on the use and adequate configuration of key RPL parameters and mechanisms. The findings and contributions of this work provide a RPL configuration guideline for network convergence performance tuning, as well as a characterization of the related performance trade-offs. PMID:25004154

  3. On the network convergence process in RPL over IEEE 802.15.4 multihop networks: improvement and trade-offs.

    PubMed

    Kermajani, Hamidreza; Gomez, Carles

    2014-07-07

    The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently developed by the Internet Engineering Task Force (IETF). Given its crucial role in enabling the Internet of Things, a significant amount of research effort has already been devoted to RPL. However, the RPL network convergence process has not yet been investigated in detail. In this paper we study the influence of the main RPL parameters and mechanisms on the network convergence process of this protocol in IEEE 802.15.4 multihop networks. We also propose and evaluate a mechanism that leverages an option available in RPL for accelerating the network convergence process. We carry out extensive simulations for a wide range of conditions, considering different network scenarios in terms of size and density. Results show that network convergence performance depends dramatically on the use and adequate configuration of key RPL parameters and mechanisms. The findings and contributions of this work provide a RPL configuration guideline for network convergence performance tuning, as well as a characterization of the related performance trade-offs.

  4. Common Operating Picture: UAV Security Study

    NASA Technical Reports Server (NTRS)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  5. HNP renumbering support in PMIPv6

    NASA Astrophysics Data System (ADS)

    Yan, Zhiwei; Geng, Guanggang; Lee, Xiaodong

    2015-12-01

    In the basic PMIPv6 (Proxy Mobile IPv6), the MN (Mobile Node) is assigned with a 64-bit HNP (Home Network Prefix) during the initial attachment for the HoA (Home Address) configuration. During the movements of MN, this prefix is assumed to be unchanged and then the upper layer applications do not have to use the reconfigured HoA and then the handover is transparent at the IP and above layers. However, the current protocol does not specify the related operation to support the MN to timely receive the new HNP and configure the new HoA when its HNP is renumbered. In this paper, this problem is discussed and a possible solution is proposed based on some simple extensions of the basic PMIPv6. Our analysis demonstrates that the proposed scheme can effectively discover the HNP renumbering and keep lower signaling cost, compared with the basic PMIPv6.

  6. Rapid identifying high-influence nodes in complex networks

    NASA Astrophysics Data System (ADS)

    Song, Bo; Jiang, Guo-Ping; Song, Yu-Rong; Xia, Ling-Ling

    2015-10-01

    A tiny fraction of influential individuals play a critical role in the dynamics on complex systems. Identifying the influential nodes in complex networks has theoretical and practical significance. Considering the uncertainties of network scale and topology, and the timeliness of dynamic behaviors in real networks, we propose a rapid identifying method (RIM) to find the fraction of high-influential nodes. Instead of ranking all nodes, our method only aims at ranking a small number of nodes in network. We set the high-influential nodes as initial spreaders, and evaluate the performance of RIM by the susceptible-infected-recovered (SIR) model. The simulations show that in different networks, RIM performs well on rapid identifying high-influential nodes, which is verified by typical ranking methods, such as degree, closeness, betweenness, and eigenvector centrality methods. Project supported by the National Natural Science Foundation of China (Grant Nos. 61374180 and 61373136), the Ministry of Education Research in the Humanities and Social Sciences Planning Fund Project, China (Grant No. 12YJAZH120), and the Six Projects Sponsoring Talent Summits of Jiangsu Province, China (Grant No. RLD201212).

  7. Lasting immune memory against hepatitis B following challenge 10-11 years after primary vaccination with either three doses of hexavalent DTPa-HBV-IPV/Hib or monovalent hepatitis B vaccine at 3, 5 and 11-12 months of age.

    PubMed

    Avdicova, Mária; Crasta, Priya D; Hardt, Karin; Kovac, Martina

    2015-05-28

    The combined hexavalent diphtheria-tetanus-pertussis-hepatitis B-inactivated poliomyelitis - Haemophilus influenzae type b conjugate vaccine (Infanrix hexa™; DTPa-HBV-IPV/Hib: GlaxoSmithKline Vaccines) induces robust responses to the HBV component when administered at 3, 5 and 11-12 months of age. We assessed long term HBV antibody persistence 10-11 years after primary vaccination in infancy. Antibody persistence and immune memory were assessed post-primary vaccination at 3, 5, 11-12 months with DTPa-HBV-IPV/Hib, or monovalent HBV vaccine (Engerix™ B, GlaxoSmithKline Vaccines) co-administered with DTPa-IPV/Hib (Infanrix™-IPV/Hib, GlaxoSmithKline Vaccines) in 185 children aged 11-12 years. Blood samples were collected before and 1 month after a challenge dose of Engerix™ B (10μg dose). 10-11 years after primary vaccination the percentage of subjects with persisting anti-HBs antibody concentrations ≥10mIU/ml was 48.4% in the DTPa-HBV-IPV/Hib group and 58.4% in the DTPa-IPV/Hib+HBV group. After the HBV challenge dose, the percentage with anti-HBs ≥100mIU/ml increased from 14.7% to 93.6% in the DTPa-HBV-IPV/Hib group and 19.1% to 94.4% in the DTPa-IPV/Hib+HBV group. Anti-HBs GMCs increased by at least 187-fold in each group. An anamnestic response (≥4-fold increase in initially seropositive or anti-HBs concentration ≥10mIU/ml in initially seronegative subjects) was observed in 96.8% and 96.6% of subjects in the DTPa-HBV-IPV/Hib and DTPa-IPV/Hib+HBV groups, respectively. No serious adverse events occurred that were considered related to challenge vaccination. Administration of HBV as part of a combination vaccine or as a monovalent vaccine induced long lasting immune memory against HBV in children primed at 3, 5 and 11 months of age. Antibody persistence and immune memory were similar, suggesting that protection afforded by DTPa-HBV-IPV/Hib and monovalent HBV vaccines, is likely to be of similar duration. The administration of HBV challenge dose 10

  8. Intimate partner violence outcomes in women with PTSD and substance use: a secondary analysis of NIDA Clinical Trials Network "Women and Trauma" Multi-site Study.

    PubMed

    Cohen, Lisa R; Field, Craig; Campbell, Aimee N C; Hien, Denise A

    2013-07-01

    Studies have shown strong associations between intimate partner violence (IPV) and both posttraumatic stress disorder (PTSD) and substance use disorders (SUD). Despite these linkages, research on the dual diagnosis of PTSD-SUD and its relationship to IPV is in an early stage, and little is known about how PTSD-SUD treatment might influence IPV outcomes. The current study is a secondary analysis of a larger NIDA Clinical Trials Network study exploring the effectiveness of two behavioral interventions for women with comorbid PTSD-SUD. Participants (n=288) were randomly assigned to Seeking Safety (SS), a cognitive-behavioral treatment that focuses on trauma and substance abuse symptoms, or to Women's Health Education, a psychoeducational group. Logistic regressions were used to examine how treatment condition, identified risk factors and their interactions were related to IPV. Results showed that participants who were abstinent at baseline were significantly less likely to experience IPV over the 12-month follow-up period, whereas participants living with someone with an alcohol problem were significantly more likely to experience IPV over follow-up. Findings also showed that at a trend level participants with recent interpersonal trauma at baseline and higher total of lifetime trauma exposures were more likely to report IPV during follow-up. Although there was no main effect for treatment condition, a significant interaction between treatment condition and baseline abstinence was found. Participants who were abstinent at baseline and in the SS condition were significantly less likely to report IPV over follow-up. These findings indicate that an integrated treatment for PTSD and SUD was associated with significantly better IPV outcomes for a subset of individuals. The possibility that women with PTSD-SUD may differentially benefit from SS has important clinical implications. Further research examining the intersection of PTSD, SUD and IPV, and the impact of treatment

  9. Depression in Intimate Partner Violence Victims in Slovenia: A Crippling Pattern of Factors Identified in Family Practice Attendees.

    PubMed

    Guček, Nena Kopčavar; Selič, Polona

    2018-01-26

    This multi-centre cross-sectional study explored associations between prevalence of depression and exposure to intimate partner violence (IPV) at any time in patients' adult life in 471 participants of a previous IPV study. In 2016, 174 interviews were performed, using the Short Form Domestic Violence Exposure Questionnaire, the Zung Scale and questions about behavioural patterns of exposure to IPV. Family doctors reviewed patients' medical charts for period from 2012 to 2016, using the Domestic Violence Exposure Medical Chart Check List, for conditions which persisted for at least three years. Depression was found to be associated with any exposure to IPV in adult life and was more likely to affect women. In multivariable logistic regression modelling, factors associated with self-rated depression were identified (p < 0.05). Exposure to emotional and physical violence was identified as a risk factor in the first model, explaining 23% of the variance. The second model explained 66% of the variance; past divorce, dysfunctional family relationships and a history of incapacity to work increased the likelihood of depression in patients. Family doctors should consider IPV exposure when detecting depression, since lifetime IPV exposure was found to be 40.4% and 36.9% of depressed revealed it.

  10. A Study of Intimate Partner Violence, Substance Abuse, and Sexual Risk Behaviors Among Gay, Bisexual, and Other Men Who Have Sex With Men in a Sample of Geosocial-Networking Smartphone Application Users.

    PubMed

    Duncan, Dustin T; Goedel, William C; Stults, Christopher B; Brady, William J; Brooks, Forrest A; Blakely, Jermaine S; Hagen, Daniel

    2018-03-01

    Geosocial-networking smartphone applications ("apps") are widely used by gay, bisexual, and other men who have sex with men (MSM) and facilitate connections between users based on proximity and attraction. MSM have sexual encounters and relationships of varying degrees of emotional and physical intimacy with app-met individuals, potentially placing them at risk for intimate partner violence (IPV). The purpose of the current study was to utilize a geosocial-networking application to investigate relationships between experiences of IPV victimization as it relates to substance use and sexual risk behaviors in a sample of MSM. Participants ( n = 175) were recruited by means of broadcast advertisements on an application widely used by MSM (Grindr) to seek sexual partners. Multivariable regression models were fit to examine associations between IPV, substance abuse, and sexual risk behaviors. Lifetime experiences of IPV victimization were common, where 37.7% of respondents reported having experienced at least one form of IPV. While a marginally significant positive association between IPV and substance abuse was detected in multivariable models ( p = .095), individual forms of IPV were strongly associated with substance abuse. For example, sexual IPV victimization was associated with an increase in substance abuse in the preceding month ( p = .004). Experiences of IPV victimization were associated with higher numbers of partners for both condomless receptive and insertive anal intercourse ( p < .05). Given the relatively high prevalence of IPV victimization and its associations with substance abuse and sexual risk behaviors, these findings suggest that IPV screening and prevention programs may reduce substance abuse and sexual risk behaviors in this population.

  11. Collaboration Services: Enabling Chat in Disadvantaged Grids

    DTIC Science & Technology

    2014-06-01

    grids in the tactical domain" [2]. The main focus of this group is to identify what we call tactical SOA foundation services. By this we mean which...Here, only IPv4 is supported, as differences relating to IPv4 and IPv6 addressing meant that this functionality was not easily extended to use IPv6 ...multicast groups. Our IPv4 implementation is fully compliant with the specification, whereas the IPv6 implementation uses our own interpretation of

  12. Toward Large-Graph Comparison Measures to Understand Internet Topology Dynamics

    DTIC Science & Technology

    2013-09-01

    continuously from randomly selected vantage points in these monitors to destination IP addresses . From each IPv4 /24 prefix on the Internet, a destination is...expected to be more similar. This was verified when the esd and vsd measures applied to this dataset gave a low reading 5 An IPv4 address is a 32-bit...integer value. /24 is the prefix of the IPv4 network starting at a given address , having 24 bits allocated for the network prefix. 6 This utility

  13. Identifying emerging research collaborations and networks: method development.

    PubMed

    Dozier, Ann M; Martina, Camille A; O'Dell, Nicole L; Fogg, Thomas T; Lurie, Stephen J; Rubinstein, Eric P; Pearson, Thomas A

    2014-03-01

    Clinical and translational research is a multidisciplinary, collaborative team process. To evaluate this process, we developed a method to document emerging research networks and collaborations in our medical center to describe their productivity and viability over time. Using an e-mail survey, sent to 1,620 clinical and basic science full- and part-time faculty members, respondents identified their research collaborators. Initial analyses, using Pajek software, assessed the feasibility of using social network analysis (SNA) methods with these data. Nearly 400 respondents identified 1,594 collaborators across 28 medical center departments resulting in 309 networks with 5 or more collaborators. This low-burden approach yielded a rich data set useful for evaluation using SNA to: (a) assess networks at several levels of the organization, including intrapersonal (individuals), interpersonal (social), organizational/institutional leadership (tenure and promotion), and physical/environmental (spatial proximity) and (b) link with other data to assess the evolution of these networks.

  14. Validation test of advanced technology for IPV nickel-hydrogen flight cells - Update

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts with the intention of improving cycle life and performance. One advancement was to use 26 percent potassium hydroxide (KOH) electrolyte to improve cycle life. Another advancement was to modify the state-of-the-art cell design to eliminate identified failure modes. The modified design is referred to as the advanced design. A breakthrough in the LEO cycle life of IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 LEO cycles compared to 3,500 cycles for cells containing 31 percent KOH. The boiler plate test results are in the process of being validated using flight hardware and real time LEO testing. The primary function of the advanced cell is to store and deliver energy for long-term, LEO spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent KOH electrolyte; (2) use of a patented catalyzed wall wick; (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management; and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion due to charge/discharge cycling. The significant improvements resulting from these innovations are: extended cycle life; enhanced thermal, electrolyte, and oxygen management; and accommodation of nickel electrode expansion.

  15. Technologies for Achieving Field Ubiquitous Computing

    NASA Astrophysics Data System (ADS)

    Nagashima, Akira

    Although the term “ubiquitous” may sound like jargon used in information appliances, ubiquitous computing is an emerging concept in industrial automation. This paper presents the author's visions of field ubiquitous computing, which is based on the novel Internet Protocol IPv6. IPv6-based instrumentation will realize the next generation manufacturing excellence. This paper focuses on the following five key issues: 1. IPv6 standardization; 2. IPv6 interfaces embedded in field devices; 3. Compatibility with FOUNDATION fieldbus; 4. Network securities for field applications; and 5. Wireless technologies to complement IP instrumentation. Furthermore, the principles of digital plant operations and ubiquitous production to support the above key technologies to achieve field ubiquitous systems are discussed.

  16. Vijana Vijiweni II: a cluster-randomized trial to evaluate the efficacy of a microfinance and peer health leadership intervention for HIV and intimate partner violence prevention among social networks of young men in Dar es Salaam.

    PubMed

    Kajula, Lusajo; Balvanz, Peter; Kilonzo, Mrema Noel; Mwikoko, Gema; Yamanis, Thespina; Mulawa, Marta; Kajuna, Deus; Hill, Lauren; Conserve, Donaldson; Reyes, Heathe Luz McNaughton; Leatherman, Sheila; Singh, Basant; Maman, Suzanne

    2016-02-03

    Intimate partner violence (IPV) and sexually transmitted infections (STIs), including HIV, remain important public health problems with devastating health effects for men and women in sub-Saharan Africa. There have been calls to engage men in prevention efforts, however, we lack effective approaches to reach and engage them. Social network approaches have demonstrated effective and sustained outcomes on changing risk behaviors in the U.S. Our team has identified and engaged naturally occurring social networks comprised mostly of young men in Dar es Salaam in an intervention designed to jointly reduce STI incidence and the perpetration of IPV. These stable networks are locally referred to as "camps." In a pilot study we demonstrated the feasibility and acceptability of a combined microfinance and peer health leadership intervention within these camp-based peer networks. We are implementing a cluster-randomized trial to evaluate the efficacy of an intervention combining microfinance with health leadership training in 60 camps in Dar es Salaam, Tanzania. Half of the camps have been randomized to the intervention arm, and half to a control arm. The camps in the intervention arm will receive a combined microfinance and health leadership intervention for a period of two years. The camps in the control arm will receive a delayed intervention. We have enrolled 1,258 men across the 60 study camps. Behavioral surveys will be conducted at baseline, 12-months post intervention launch and 30-month post intervention launch and biological samples will be drawn to test for Neisseria gonorrhea (NG), Chlamydia trachomatis (CT), and Trichomonas vaginalis (TV) at baseline and 30-months. The primary endpoints for assessing intervention impact are IPV perpetration and STI incidence. This is the first cluster-randomized trial targeting social networks of men in sub-Saharan Africa that jointly addresses HIV and IPV perpetration and has both biological and behavioral endpoints. Effective

  17. Status and Trends in Networking at LHC Tier1 Facilities

    NASA Astrophysics Data System (ADS)

    Bobyshev, A.; DeMar, P.; Grigaliunas, V.; Bigrow, J.; Hoeft, B.; Reymund, A.

    2012-12-01

    The LHC is entering its fourth year of production operation. Most Tier1 facilities have been in operation for almost a decade, when development and ramp-up efforts are included. LHC's distributed computing model is based on the availability of high capacity, high performance network facilities for both the WAN and LAN data movement, particularly within the Tier1 centers. As a result, the Tier1 centers tend to be on the leading edge of data center networking technology. In this paper, we analyze past and current developments in Tier1 LAN networking, as well as extrapolating where we anticipate networking technology is heading. Our analysis will include examination into the following areas: • Evolution of Tier1 centers to their current state • Evolving data center networking models and how they apply to Tier1 centers • Impact of emerging network technologies (e.g. 10GE-connected hosts, 40GE/100GE links, IPv6) on Tier1 centers • Trends in WAN data movement and emergence of software-defined WAN network capabilities • Network virtualization

  18. Factors discriminating among profiles of resilience and psychopathology in children exposed to intimate partner violence (IPV).

    PubMed

    Graham-Bermann, Sandra A; Gruber, Gabrielle; Howell, Kathryn H; Girz, Laura

    2009-09-01

    To evaluate the social and emotional adjustment of 219 children in families with varying levels of intimate partner violence (IPV) using a model of risk and protection. To explore factors that differentiate children with poor adjustment from those with resilience. Mothers who experienced IPV in the past year and their children ages 6-12 were interviewed. Standardized measures assessed family violence, parenting, family functioning, maternal mental health, and children's adjustment and beliefs. Using cluster analysis, all cases with valid data on the Child Behavior Checklist, Child Depression Inventory, General Self-Worth and Social Self-Competence measures were described by four profiles of children's adjustment: Severe Adjustment Problems (24%); children who were Struggling (45%); those with Depression Only (11%); and Resilient (20%) with high competence and low adjustment problems. Multinomial logistic regression analyses showed children in the Severe Problems cluster witnessed more family violence and had mothers higher in depression and trauma symptoms than other children. Resilient and Struggling children had mothers with better parenting, more family strengths and no past violent partner. Parents of children with Severe Problems were lacking these attributes. The Depressed profile children witnessed less violence but had greater fears and worries about mother's safety. Factors related to the child, to the mother and to the family distinguish different profiles of adjustment for children exposed to IPV who are living in the community. Resilient children have less violence exposure, fewer fears and worries, and mothers with better mental health and parenting skills, suggesting avenues for intervention with this population. Findings suggest that child adjustment is largely influenced by parent functioning. Thus, services should be targeted at both the child and the parent. Clinical interventions shaped to the unique needs of the child might also be tested with

  19. Social support needs identified by mothers affected by intimate partner violence.

    PubMed

    Letourneau, Nicole; Morris, Catherine Young; Stewart, Miriam; Hughes, Jean; Critchley, Kim A; Secco, Loretta

    2013-09-01

    In order to offer optimal supports and services for mothers affected by intimate partner violence (IPV), an understanding of these mothers' perceptions of support needs, resources, barriers to support, and preferences for support intervention is warranted. Moreover, the growing recognition of the effects of IPV on maternal-infant relationships and of the importance of these early relationships to long-term child health outcomes suggests interventions are needed to support optimal maternal-infant relationships in these families. Thus, 64 mothers exposed to IPV when their infants were below 12 months of age participated in a retrospective qualitative study to identify mothers' support needs, resources, barriers to support, and preferences for specific support interventions to promote optimal mother-infant relationships. Participants identified both personal needs (including needs for leaving or staying with the violent partner), along with intertwined needs to care for, and help, their infants cope with the experience of violence. Mothers reported that integrated services that include information and practical support from professionals with emotional and affirmation support from peers would promote positive, nurturing mother-infant relationships and healthy child development.

  20. Analysis of Handoff Mechanisms in Mobile IP

    NASA Astrophysics Data System (ADS)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  1. Identifying signs and symptoms of intimate partner violence in an oncology setting.

    PubMed

    Mick, JoAnn

    2006-08-01

    Domestic violence (DV), or intimate partner violence (IPV), is a prevailing problem in public health. Often, healthcare providers may be the first people that victims of DV will approach to reveal their problem or seek assistance. IPV is a pattern of control using assault and intimidating behaviors that has devastating effects on individuals, their families, and communities. Oncology nurses need to become familiar with common indicators of DV so that signs and symptoms of abuse can be identified when assessing patients in an oncology setting. Standards of oncology nursing practice support that the psychosocial impact of cancer on patients and their families or significant others needs to be considered at all stages of diagnosis and treatment. The psychosocial impact of other personal situations or concerns, such as IPV, can add to the complexity of cancer management. Routine screening for signs and symptoms of psychosocial distress helps identify patients who require additional interventions. Oncology nursing practice is based on a holistic approach to patient care, which supports that identification of physical and psychosocial needs are equally important. Oncology nursing provides many unique opportunities to help patients cope with cancer. Routine nursing assessment for signs and symptoms of abuse will provide an opportunity to assist patients with cancer to manage not only the life-threatening aspects of their diagnosis but also the life-threatening aspects of IPV.

  2. Network-Based Integration of GWAS and Gene Expression Identifies a HOX-Centric Network Associated with Serous Ovarian Cancer Risk.

    PubMed

    Kar, Siddhartha P; Tyrer, Jonathan P; Li, Qiyuan; Lawrenson, Kate; Aben, Katja K H; Anton-Culver, Hoda; Antonenkova, Natalia; Chenevix-Trench, Georgia; Baker, Helen; Bandera, Elisa V; Bean, Yukie T; Beckmann, Matthias W; Berchuck, Andrew; Bisogna, Maria; Bjørge, Line; Bogdanova, Natalia; Brinton, Louise; Brooks-Wilson, Angela; Butzow, Ralf; Campbell, Ian; Carty, Karen; Chang-Claude, Jenny; Chen, Yian Ann; Chen, Zhihua; Cook, Linda S; Cramer, Daniel; Cunningham, Julie M; Cybulski, Cezary; Dansonka-Mieszkowska, Agnieszka; Dennis, Joe; Dicks, Ed; Doherty, Jennifer A; Dörk, Thilo; du Bois, Andreas; Dürst, Matthias; Eccles, Diana; Easton, Douglas F; Edwards, Robert P; Ekici, Arif B; Fasching, Peter A; Fridley, Brooke L; Gao, Yu-Tang; Gentry-Maharaj, Aleksandra; Giles, Graham G; Glasspool, Rosalind; Goode, Ellen L; Goodman, Marc T; Grownwald, Jacek; Harrington, Patricia; Harter, Philipp; Hein, Alexander; Heitz, Florian; Hildebrandt, Michelle A T; Hillemanns, Peter; Hogdall, Estrid; Hogdall, Claus K; Hosono, Satoyo; Iversen, Edwin S; Jakubowska, Anna; Paul, James; Jensen, Allan; Ji, Bu-Tian; Karlan, Beth Y; Kjaer, Susanne K; Kelemen, Linda E; Kellar, Melissa; Kelley, Joseph; Kiemeney, Lambertus A; Krakstad, Camilla; Kupryjanczyk, Jolanta; Lambrechts, Diether; Lambrechts, Sandrina; Le, Nhu D; Lee, Alice W; Lele, Shashi; Leminen, Arto; Lester, Jenny; Levine, Douglas A; Liang, Dong; Lissowska, Jolanta; Lu, Karen; Lubinski, Jan; Lundvall, Lene; Massuger, Leon; Matsuo, Keitaro; McGuire, Valerie; McLaughlin, John R; McNeish, Iain A; Menon, Usha; Modugno, Francesmary; Moysich, Kirsten B; Narod, Steven A; Nedergaard, Lotte; Ness, Roberta B; Nevanlinna, Heli; Odunsi, Kunle; Olson, Sara H; Orlow, Irene; Orsulic, Sandra; Weber, Rachel Palmieri; Pearce, Celeste Leigh; Pejovic, Tanja; Pelttari, Liisa M; Permuth-Wey, Jennifer; Phelan, Catherine M; Pike, Malcolm C; Poole, Elizabeth M; Ramus, Susan J; Risch, Harvey A; Rosen, Barry; Rossing, Mary Anne; Rothstein, Joseph H; Rudolph, Anja; Runnebaum, Ingo B; Rzepecka, Iwona K; Salvesen, Helga B; Schildkraut, Joellen M; Schwaab, Ira; Shu, Xiao-Ou; Shvetsov, Yurii B; Siddiqui, Nadeem; Sieh, Weiva; Song, Honglin; Southey, Melissa C; Sucheston-Campbell, Lara E; Tangen, Ingvild L; Teo, Soo-Hwang; Terry, Kathryn L; Thompson, Pamela J; Timorek, Agnieszka; Tsai, Ya-Yu; Tworoger, Shelley S; van Altena, Anne M; Van Nieuwenhuysen, Els; Vergote, Ignace; Vierkant, Robert A; Wang-Gohrke, Shan; Walsh, Christine; Wentzensen, Nicolas; Whittemore, Alice S; Wicklund, Kristine G; Wilkens, Lynne R; Woo, Yin-Ling; Wu, Xifeng; Wu, Anna; Yang, Hannah; Zheng, Wei; Ziogas, Argyrios; Sellers, Thomas A; Monteiro, Alvaro N A; Freedman, Matthew L; Gayther, Simon A; Pharoah, Paul D P

    2015-10-01

    Genome-wide association studies (GWAS) have so far reported 12 loci associated with serous epithelial ovarian cancer (EOC) risk. We hypothesized that some of these loci function through nearby transcription factor (TF) genes and that putative target genes of these TFs as identified by coexpression may also be enriched for additional EOC risk associations. We selected TF genes within 1 Mb of the top signal at the 12 genome-wide significant risk loci. Mutual information, a form of correlation, was used to build networks of genes strongly coexpressed with each selected TF gene in the unified microarray dataset of 489 serous EOC tumors from The Cancer Genome Atlas. Genes represented in this dataset were subsequently ranked using a gene-level test based on results for germline SNPs from a serous EOC GWAS meta-analysis (2,196 cases/4,396 controls). Gene set enrichment analysis identified six networks centered on TF genes (HOXB2, HOXB5, HOXB6, HOXB7 at 17q21.32 and HOXD1, HOXD3 at 2q31) that were significantly enriched for genes from the risk-associated end of the ranked list (P < 0.05 and FDR < 0.05). These results were replicated (P < 0.05) using an independent association study (7,035 cases/21,693 controls). Genes underlying enrichment in the six networks were pooled into a combined network. We identified a HOX-centric network associated with serous EOC risk containing several genes with known or emerging roles in serous EOC development. Network analysis integrating large, context-specific datasets has the potential to offer mechanistic insights into cancer susceptibility and prioritize genes for experimental characterization. ©2015 American Association for Cancer Research.

  3. Identifying a base network of federally funded streamgaging stations

    USGS Publications Warehouse

    Ries, Kernell G.; Kolva, J.R.; Stewart, D.W.

    2004-01-01

    The U.S. Geological Survey (USGS) has completed a preliminary analysis to identify streamgaging stations needed in a base network that would satisfy five primary Federal goals for collecting streamflow information. The five goals are (1) determining streamflow at interstate and international borders and at locations mandated by court decrees, (2) determining the streamflow component of water budgets for the major river basins of the Nation, (3) providing real-time streamflow information to the U.S. National Weather Service to support flood-forecasting activities, (4) providing streamflow information at locations of monitoring stations included in USGS national water-quality networks, and (5) providing streamflow information necessary for regionalization of streamflow characteristics and assessing potential long-term trends in streamflow associated with changes in climate. The analysis was done using a Geographic Information System. USGS headquarters staff made initial selections of stations that satisfied at least one of the five goals, and then staff in each of the 48 USGS district offices reviewed the selections, making suggestions for additions or changes based on detailed local knowledge of the streams in the area. The analysis indicated that 4,242 streamgaging stations are needed in the base network to meet the 5 Federal goals for streamflow information. Of these, 2,692 stations (63.5 percent) are currently operated by the USGS, 277 stations (6.5 percent) are currently operated by other agencies, 865 (20.4 percent) are discontinued USGS stations that need to be reactivated, and 408 (9.6 percent) are locations where new stations are needed. Copyright ASCE 2004.

  4. On Applicability of Network Coding Technique for 6LoWPAN-based Sensor Networks.

    PubMed

    Amanowicz, Marek; Krygier, Jaroslaw

    2018-05-26

    In this paper, the applicability of the network coding technique in 6LoWPAN-based sensor multihop networks is examined. The 6LoWPAN is one of the standards proposed for the Internet of Things architecture. Thus, we can expect the significant growth of traffic in such networks, which can lead to overload and decrease in the sensor network lifetime. The authors propose the inter-session network coding mechanism that can be implemented in resource-limited sensor motes. The solution reduces the overall traffic in the network, and in consequence, the energy consumption is decreased. Used procedures take into account deep header compressions of the native 6LoWPAN packets and the hop-by-hop changes of the header structure. Applied simplifications reduce signaling traffic that is typically occurring in network coding deployments, keeping the solution usefulness for the wireless sensor networks with limited resources. The authors validate the proposed procedures in terms of end-to-end packet delay, packet loss ratio, traffic in the air, total energy consumption, and network lifetime. The solution has been tested in a real wireless sensor network. The results confirm the efficiency of the proposed technique, mostly in delay-tolerant sensor networks.

  5. Health and Health Care From the Perspective of Intimate Partner Violence Adult Female Victims in Shelters: Impact of IPV, Unmet Needs, Barriers, Experiences, and Preferences.

    PubMed

    Wadsworth, Pamela; Kothari, Catherine; Lubwama, Grace; Brown, Cathy L; Frank Benton, Jennifer

    Intimate partner violence (IPV) predicts poor health for victims and their children, but little is known about the perspective of victims. This study reports the perspectives of adult female IPV victims about the impact of IPV on their health and barriers of health care access for themselves and their children. The majority rated their health as good to excellent (69%). However, 83.5% indicated that IPV negatively affected their health; 53.5% had unmet health care needs. Mental health care was the most common unmet need for women; children's unmet needs were immunizations and preventive care. Transportation difficulties posed the biggest barrier to health care access.

  6. Identifying causal networks linking cancer processes and anti-tumor immunity using Bayesian network inference and metagene constructs.

    PubMed

    Kaiser, Jacob L; Bland, Cassidy L; Klinke, David J

    2016-03-01

    Cancer arises from a deregulation of both intracellular and intercellular networks that maintain system homeostasis. Identifying the architecture of these networks and how they are changed in cancer is a pre-requisite for designing drugs to restore homeostasis. Since intercellular networks only appear in intact systems, it is difficult to identify how these networks become altered in human cancer using many of the common experimental models. To overcome this, we used the diversity in normal and malignant human tissue samples from the Cancer Genome Atlas (TCGA) database of human breast cancer to identify the topology associated with intercellular networks in vivo. To improve the underlying biological signals, we constructed Bayesian networks using metagene constructs, which represented groups of genes that are concomitantly associated with different immune and cancer states. We also used bootstrap resampling to establish the significance associated with the inferred networks. In short, we found opposing relationships between cell proliferation and epithelial-to-mesenchymal transformation (EMT) with regards to macrophage polarization. These results were consistent across multiple carcinomas in that proliferation was associated with a type 1 cell-mediated anti-tumor immune response and EMT was associated with a pro-tumor anti-inflammatory response. To address the identifiability of these networks from other datasets, we could identify the relationship between EMT and macrophage polarization with fewer samples when the Bayesian network was generated from malignant samples alone. However, the relationship between proliferation and macrophage polarization was identified with fewer samples when the samples were taken from a combination of the normal and malignant samples. © 2016 American Institute of Chemical Engineers Biotechnol. Prog., 32:470-479, 2016. © 2016 American Institute of Chemical Engineers.

  7. Identifying Broadband Rotational Spectra with Neural Networks

    NASA Astrophysics Data System (ADS)

    Zaleski, Daniel P.; Prozument, Kirill

    2017-06-01

    A typical broadband rotational spectrum may contain several thousand observable transitions, spanning many species. Identifying the individual spectra, particularly when the dynamic range reaches 1,000:1 or even 10,000:1, can be challenging. One approach is to apply automated fitting routines. In this approach, combinations of 3 transitions can be created to form a "triple", which allows fitting of the A, B, and C rotational constants in a Watson-type Hamiltonian. On a standard desktop computer, with a target molecule of interest, a typical AUTOFIT routine takes 2-12 hours depending on the spectral density. A new approach is to utilize machine learning to train a computer to recognize the patterns (frequency spacing and relative intensities) inherit in rotational spectra and to identify the individual spectra in a raw broadband rotational spectrum. Here, recurrent neural networks have been trained to identify different types of rotational spectra and classify them accordingly. Furthermore, early results in applying convolutional neural networks for spectral object recognition in broadband rotational spectra appear promising. Perez et al. "Broadband Fourier transform rotational spectroscopy for structure determination: The water heptamer." Chem. Phys. Lett., 2013, 571, 1-15. Seifert et al. "AUTOFIT, an Automated Fitting Tool for Broadband Rotational Spectra, and Applications to 1-Hexanal." J. Mol. Spectrosc., 2015, 312, 13-21. Bishop. "Neural networks for pattern recognition." Oxford university press, 1995.

  8. Network-based integration of GWAS and gene expression identifies a HOX-centric network associated with serous ovarian cancer risk

    PubMed Central

    Kar, Siddhartha P.; Tyrer, Jonathan P.; Li, Qiyuan; Lawrenson, Kate; Aben, Katja K.H.; Anton-Culver, Hoda; Antonenkova, Natalia; Chenevix-Trench, Georgia; Baker, Helen; Bandera, Elisa V.; Bean, Yukie T.; Beckmann, Matthias W.; Berchuck, Andrew; Bisogna, Maria; Bjørge, Line; Bogdanova, Natalia; Brinton, Louise; Brooks-Wilson, Angela; Butzow, Ralf; Campbell, Ian; Carty, Karen; Chang-Claude, Jenny; Chen, Yian Ann; Chen, Zhihua; Cook, Linda S.; Cramer, Daniel; Cunningham, Julie M.; Cybulski, Cezary; Dansonka-Mieszkowska, Agnieszka; Dennis, Joe; Dicks, Ed; Doherty, Jennifer A.; Dörk, Thilo; du Bois, Andreas; Dürst, Matthias; Eccles, Diana; Easton, Douglas F.; Edwards, Robert P.; Ekici, Arif B.; Fasching, Peter A.; Fridley, Brooke L.; Gao, Yu-Tang; Gentry-Maharaj, Aleksandra; Giles, Graham G.; Glasspool, Rosalind; Goode, Ellen L.; Goodman, Marc T.; Grownwald, Jacek; Harrington, Patricia; Harter, Philipp; Hein, Alexander; Heitz, Florian; Hildebrandt, Michelle A.T.; Hillemanns, Peter; Hogdall, Estrid; Hogdall, Claus K.; Hosono, Satoyo; Iversen, Edwin S.; Jakubowska, Anna; Paul, James; Jensen, Allan; Ji, Bu-Tian; Karlan, Beth Y; Kjaer, Susanne K.; Kelemen, Linda E.; Kellar, Melissa; Kelley, Joseph; Kiemeney, Lambertus A.; Krakstad, Camilla; Kupryjanczyk, Jolanta; Lambrechts, Diether; Lambrechts, Sandrina; Le, Nhu D.; Lee, Alice W.; Lele, Shashi; Leminen, Arto; Lester, Jenny; Levine, Douglas A.; Liang, Dong; Lissowska, Jolanta; Lu, Karen; Lubinski, Jan; Lundvall, Lene; Massuger, Leon; Matsuo, Keitaro; McGuire, Valerie; McLaughlin, John R.; McNeish, Iain A.; Menon, Usha; Modugno, Francesmary; Moysich, Kirsten B.; Narod, Steven A.; Nedergaard, Lotte; Ness, Roberta B.; Nevanlinna, Heli; Odunsi, Kunle; Olson, Sara H.; Orlow, Irene; Orsulic, Sandra; Weber, Rachel Palmieri; Pearce, Celeste Leigh; Pejovic, Tanja; Pelttari, Liisa M.; Permuth-Wey, Jennifer; Phelan, Catherine M.; Pike, Malcolm C.; Poole, Elizabeth M.; Ramus, Susan J.; Risch, Harvey A.; Rosen, Barry; Rossing, Mary Anne; Rothstein, Joseph H.; Rudolph, Anja; Runnebaum, Ingo B.; Rzepecka, Iwona K.; Salvesen, Helga B.; Schildkraut, Joellen M.; Schwaab, Ira; Shu, Xiao-Ou; Shvetsov, Yurii B; Siddiqui, Nadeem; Sieh, Weiva; Song, Honglin; Southey, Melissa C.; Sucheston-Campbell, Lara E.; Tangen, Ingvild L.; Teo, Soo-Hwang; Terry, Kathryn L.; Thompson, Pamela J; Timorek, Agnieszka; Tsai, Ya-Yu; Tworoger, Shelley S.; van Altena, Anne M.; Van Nieuwenhuysen, Els; Vergote, Ignace; Vierkant, Robert A.; Wang-Gohrke, Shan; Walsh, Christine; Wentzensen, Nicolas; Whittemore, Alice S.; Wicklund, Kristine G.; Wilkens, Lynne R.; Woo, Yin-Ling; Wu, Xifeng; Wu, Anna; Yang, Hannah; Zheng, Wei; Ziogas, Argyrios; Sellers, Thomas A.; Monteiro, Alvaro N. A.; Freedman, Matthew L.; Gayther, Simon A.; Pharoah, Paul D. P.

    2015-01-01

    Background Genome-wide association studies (GWAS) have so far reported 12 loci associated with serous epithelial ovarian cancer (EOC) risk. We hypothesized that some of these loci function through nearby transcription factor (TF) genes and that putative target genes of these TFs as identified by co-expression may also be enriched for additional EOC risk associations. Methods We selected TF genes within 1 Mb of the top signal at the 12 genome-wide significant risk loci. Mutual information, a form of correlation, was used to build networks of genes strongly co-expressed with each selected TF gene in the unified microarray data set of 489 serous EOC tumors from The Cancer Genome Atlas. Genes represented in this data set were subsequently ranked using a gene-level test based on results for germline SNPs from a serous EOC GWAS meta-analysis (2,196 cases/4,396 controls). Results Gene set enrichment analysis identified six networks centered on TF genes (HOXB2, HOXB5, HOXB6, HOXB7 at 17q21.32 and HOXD1, HOXD3 at 2q31) that were significantly enriched for genes from the risk-associated end of the ranked list (P<0.05 and FDR<0.05). These results were replicated (P<0.05) using an independent association study (7,035 cases/21,693 controls). Genes underlying enrichment in the six networks were pooled into a combined network. Conclusion We identified a HOX-centric network associated with serous EOC risk containing several genes with known or emerging roles in serous EOC development. Impact Network analysis integrating large, context-specific data sets has the potential to offer mechanistic insights into cancer susceptibility and prioritize genes for experimental characterization. PMID:26209509

  9. Project WINGS (Women Initiating New Goals of Safety): A randomised controlled trial of a screening, brief intervention and referral to treatment (SBIRT) service to identify and address intimate partner violence victimisation among substance-using women receiving community supervision.

    PubMed

    Gilbert, Louisa; Shaw, Stacey A; Goddard-Eckrich, Dawn; Chang, Mingway; Rowe, Jessica; McCrimmon, Tara; Almonte, Maria; Goodwin, Sharun; Epperson, Matthew

    2015-12-10

    The high rate of intimate partner violence (IPV) victimisation found among substance-using women receiving community supervision underscores the need for effective IPV victimisation screening, brief intervention and referral to treatment services (SBIRT) for this population. This randomised controlled trial (RCT) aims to assess the feasibility, safety and efficacy of a single-session computerised self-paced IPV SBIRT (Computerised WINGS) in identifying IPV victimisation among women under community supervision and increasing access to IPV services, compared to the same IPV SBIRT service delivered by a case manager (Case Manager WINGS). This RCT was conducted with 191 substance-using women in probation and community court sites in New York City. No significant differences were found between Computerised and Case Manager WINGS arms on any outcomes. Both arms reported identical high rates of any physical, sexual or psychological IPV victimisation in the past year (77% for both arms) during the intervention. Both arms experienced significant increases from baseline to the 3-month follow-up in receipt of IPV services, social support, IPV self-efficacy and abstinence from drug use. Findings suggest that both modalities of WINGS show promise in identifying and addressing IPV victimisation among substance-using women receiving community supervision. Copyright © 2015 John Wiley & Sons, Ltd.

  10. Promotion of Latina Health: Intersectionality of IPV and Risk for HIV/AIDS.

    PubMed

    Rountree, Michele A; Granillo, Teresa; Bagwell-Gray, Meredith

    2016-04-01

    Latina women in the United States are vulnerable to two intersecting public health concerns: intimate partner violence (IPV) and subsequent risk for HIV/AIDS infection. Examination of the cultural and contextual life factors of this understudied population is crucial to developing culturally relevant HIV interventions. Focus groups with Latinas (15 monolingual; 10 bilingual) who have experienced IPV were conducted. Monolingual and bilingual Latinas endorsed that they were concerned about HIV infection, naming partner infidelity and experiences of forced and coerced sex as primary reasons for their concern. However, monolingual participants had lower levels of HIV knowledge, spending much time discussing myths of HIV infection, whereas bilingual participants spent more time discussing specific prevention techniques, including challenges related to the violence in their relationships. These findings suggest that HIV/AIDS prevention programs for Latinas need to pay close attention to the different historical, contextual, and cultural experiences of this at-risk group of women. © The Author(s) 2015.

  11. Identifying influential spreaders in complex networks based on gravity formula

    NASA Astrophysics Data System (ADS)

    Ma, Ling-ling; Ma, Chuang; Zhang, Hai-Feng; Wang, Bing-Hong

    2016-06-01

    How to identify the influential spreaders in social networks is crucial for accelerating/hindering information diffusion, increasing product exposure, controlling diseases and rumors, and so on. In this paper, by viewing the k-shell value of each node as its mass and the shortest path distance between two nodes as their distance, then inspired by the idea of the gravity formula, we propose a gravity centrality index to identify the influential spreaders in complex networks. The comparison between the gravity centrality index and some well-known centralities, such as degree centrality, betweenness centrality, closeness centrality, and k-shell centrality, and so forth, indicates that our method can effectively identify the influential spreaders in real networks as well as synthetic networks. We also use the classical Susceptible-Infected-Recovered (SIR) epidemic model to verify the good performance of our method.

  12. US LHCNet: Transatlantic Networking for the LHC and the U.S. HEP Community

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Newman, Harvey B; Barczyk, Artur J

    2013-04-05

    US LHCNet provides the transatlantic connectivity between the Tier1 computing facilities at the Fermilab and Brookhaven National Labs and the Tier0 and Tier1 facilities at CERN, as well as Tier1s elsewhere in Europe and Asia. Together with ESnet, Internet2, and other R&E Networks participating in the LHCONE initiative, US LHCNet also supports transatlantic connections between the Tier2 centers (where most of the data analysis is taking place) and the Tier1s as needed. Given the key roles of the US and European Tier1 centers as well as Tier2 centers on both continents, the largest data flows are across the Atlantic, wheremore » US LHCNet has the major role. US LHCNet manages and operates the transatlantic network infrastructure including four Points of Presence (PoPs) and currently six transatlantic OC-192 (10Gbps) leased links. Operating at the optical layer, the network provides a highly resilient fabric for data movement, with a target service availability level in excess of 99.95%. This level of resilience and seamless operation is achieved through careful design including path diversity on both submarine and terrestrial segments, use of carrier-grade equipment with built-in high-availability and redundancy features, deployment of robust failover mechanisms based on SONET protection schemes, as well as the design of facility-diverse paths between the LHC computing sites. The US LHCNet network provides services at Layer 1(optical), Layer 2 (Ethernet) and Layer 3 (IPv4 and IPv6). The flexible design of the network, including modular equipment, a talented and agile team, and flexible circuit lease management, allows US LHCNet to react quickly to changing requirements form the LHC community. Network capacity is provisioned just-in-time to meet the needs, as demonstrated in the past years during the changing LHC start-up plans.« less

  13. Introduction of digital object identifiers (DOI) for seismic networks

    NASA Astrophysics Data System (ADS)

    Evans, Peter; Strollo, Angelo; Clark, Adam; Ahern, Tim; Newman, Rob; Clinton, John; Pequegnat, Catherine; Pedersen, Helle

    2015-04-01

    Proper attribution for scientific source data is important in promoting transparency and recognising the role of data providers in science. Data sets such as those produced by seismic networks now need to be citable and permanently locatable for research users. Recently the EIDA and IRIS-DMC communities have worked together on development of methods for generation, maintenance and promotion of persistent identifiers for seismic networks. This resulted in a 2014 Recommendation by the International Federation of Digital Seismograph Networks (FDSN) on the use of Digital Object Identifiers (DOI) for seismic networks. These can be cited equivalently to scientific papers, and tools such as DataCite allow the tracking of citations to these datasets. The GEOFON, IRIS and RESIF data centres have now begun to roll-out of these seismic network DOIs. This has involved working with principal investigators to prepare metadata consistent with the FDSN recommendation, preparation of landing pages, and changes to the web sites to promote DOIs where available. This has involved preparing improved descriptions of the data (metadata) and clarifying how individuals and institutions should best be recognised for their contributions to making the data available. We illustrate this process for a few representative networks. We will be in contact with additional network operators to help them establish DOIs for their networks in future.

  14. Phase II and III Clinical Studies of Diphtheria-Tetanus-Acellular Pertussis Vaccine Containing Inactivated Polio Vaccine Derived from Sabin Strains (DTaP-sIPV).

    PubMed

    Okada, Kenji; Miyazaki, Chiaki; Kino, Yoichiro; Ozaki, Takao; Hirose, Mizuo; Ueda, Kohji

    2013-07-15

    Phase II and III clinical studies were conducted to evaluate immunogenicity and safety of a novel DTaP-IPV vaccine consisting of Sabin inactivated poliovirus vaccine (sIPV) and diphtheria-tetanus-acellular pertussis vaccine (DTaP). A Phase II study was conducted in 104 healthy infants using Formulation H of the DTaP-sIPV vaccine containing high-dose sIPV (3, 100, and 100 D-antigen units for types 1, 2, and 3, respectively), and Formulations M and L, containing half and one-fourth of the sIPV in Formulation H, respectively. Each formulation was administered 3 times for primary immunization and once for booster immunization. A Phase III study was conducted in 342 healthy infants who received either Formulation M + oral polio vaccine (OPV) placebo or DTaP + OPV. The OPV or OPV placebo was orally administered twice between primary and booster immunizations. Formulation M was selected as the optimum dose. In the Phase III study, the seropositive rate was 100% for all Sabin strains after primary immunization, and the neutralizing antibody titer after booster immunization was higher than in the control group (DTaP + OPV). All adverse reactions were clinically acceptable. DTaP-sIPV was shown to be a safe and immunogenic vaccine. JapicCTI-121902 for Phase II study, JapicCTI-101075 for Phase III study (http://www.clinicaltrials.jp/user/cte_main.jsp).

  15. Identifying key nodes in multilayer networks based on tensor decomposition.

    PubMed

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  16. Identifying key nodes in multilayer networks based on tensor decomposition

    NASA Astrophysics Data System (ADS)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  17. Identifying influential nodes in complex networks: A node information dimension approach

    NASA Astrophysics Data System (ADS)

    Bian, Tian; Deng, Yong

    2018-04-01

    In the field of complex networks, how to identify influential nodes is a significant issue in analyzing the structure of a network. In the existing method proposed to identify influential nodes based on the local dimension, the global structure information in complex networks is not taken into consideration. In this paper, a node information dimension is proposed by synthesizing the local dimensions at different topological distance scales. A case study of the Netscience network is used to illustrate the efficiency and practicability of the proposed method.

  18. Enhancing assessment of interpersonal violence (IPV) pregnancy-related homicide risk within nursing curricula.

    PubMed

    Clements, Paul Thomas; Holt, Karyn E; Hasson, Catherine M; Fay-Hillier, Theresa

    2011-12-01

    Pregnancy and motherhood traditionally represent evolution of the next generation; yet, contemporary research and analyses confirm that this time can also be manifested in fear by the expectant mother within an environment of battering, cruelty, physical and emotional abuse, and sexual assault. Often to the surprise of many healthcare providers, the Centers for Disease Control and Prevention have consistently reported that Interpersonal Violence (IPV) related homicide is a leading cause of traumatic death among new and expectant mothers. In spite of these staggering statistical and anecdotal findings, universal screening for violence during pregnancy continues to be minimal. Forensic nurses might be prompted to respond to the consequences of violence and its resultant negative effects on expectant mothers by strategically incorporating systematic and consistent assessment into foundational nursing curricula regarding IPV as a leading risk factor for injury or death. © 2011 International Association of Forensic Nurses.

  19. Systematization of the Introduction of IPV and Switch from tOPV to bOPV in the Americas

    PubMed Central

    Thrush, Elizabeth; Jauregui, Barbara

    2017-01-01

    Abstract The synchronized introduction of the inactivated polio vaccine (IPV) and the switch from trivalent oral polio vaccine (tOPV) to bivalent oral polio vaccine (bOPV) has constituted an effort without precedents, and with astonishing results. Within the established time frame, all countries in our region managed to carry out the decision, planning, and introduction of this vaccine and subsequent switch to their national immunization schedules. The purpose of this article is to systematize the process of IPV introduction and switch in Latin America and the Caribbean, which constitutes an important piece in the documentation of the polio legacy in the Americas. Regional level as well as country perspectives and viewpoints are described. Analyzing and summarizing the lessons learned from the introduction of IPV and the switch from tOPV to bOPV can be useful for the introduction of new vaccines in the Pan American Health Organization (PAHO) region and in other regions of the world, and to help our own region successfully carry out another synchronized vaccine introduction in the future, if necessary. PMID:28838161

  20. The Structure of Male Adolescent Peer Networks and Risk for Intimate Partner Violence Perpetration: Findings from a National Sample

    ERIC Educational Resources Information Center

    Casey, Erin A.; Beadnell, Blair

    2010-01-01

    Although peer networks have been implicated as influential in a range of adolescent behaviors, little is known about relationships between peer network structures and risk for intimate partner violence (IPV) among youth. This study is a descriptive analysis of how peer network "types" may be related to subsequent risk for IPV…

  1. 17 CFR 45.6 - Legal entity identifiers

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Legal entity identifiers 45.6... RECORDKEEPING AND REPORTING REQUIREMENTS § 45.6 Legal entity identifiers Each counterparty to any swap subject... reporting pursuant to this part by means of a single legal entity identifier as specified in this section...

  2. Accuracy and Acceptability of a Screening Tool for Identifying Intimate Partner Violence Perpetration among Women Veterans: A Pre-Implementation Evaluation.

    PubMed

    Portnoy, Galina A; Haskell, Sally G; King, Matthew W; Maskin, Rachel; Gerber, Megan R; Iverson, Katherine M

    2018-06-06

    Veterans are at heightened risk for perpetrating intimate partner violence (IPV), yet there is limited evidence to inform practice and policy for the detection of IPV perpetration. The present study evaluated the accuracy and acceptability of a potential IPV perpetration screening tool for use with women veterans. A national sample of women veterans completed a 2016 web-based survey that included a modified 5-item Extended-Hurt/Insult/Threaten/Scream (Modified E-HITS) and the Revised Conflict Tactics Scales (CTS-2). Items also assessed women's perceptions of the acceptability and appropriateness of the modified E-HITS questions for use in healthcare settings. Accuracy statistics, including sensitivity and specificity, were calculated using the CTS-2 as the reference standard. Primary measures included the Modified E-HITS (index test), CTS-2 (reference standard), and items assessing acceptability. This study included 187 women, of whom 31 women veterans (16.6%) reported past-6-month IPV perpetration on the CTS-2. The Modified E-HITS demonstrated good overall accuracy (area under the curve, 0.86; 95% confidence interval, 0.78-0.94). In addition, the majority of women perceived the questions to be acceptable and appropriate. Findings demonstrate that the Modified E-HITS is promising as a low-burden tool for detecting of IPV perpetration among women veterans. This tool may help the Veterans Health Administration and other health care providers detect IPV perpetration and offer appropriate referrals for comprehensive assessment and services. Published by Elsevier Inc.

  3. Identifying the Key Weaknesses in Network Security at Colleges.

    ERIC Educational Resources Information Center

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  4. Identifying partial topology of complex dynamical networks via a pinning mechanism

    NASA Astrophysics Data System (ADS)

    Zhu, Shuaibing; Zhou, Jin; Lu, Jun-an

    2018-04-01

    In this paper, we study the problem of identifying the partial topology of complex dynamical networks via a pinning mechanism. By using the network synchronization theory and the adaptive feedback controlling method, we propose a method which can greatly reduce the number of nodes and observers in the response network. Particularly, this method can also identify the whole topology of complex networks. A theorem is established rigorously, from which some corollaries are also derived in order to make our method more cost-effective. Several numerical examples are provided to verify the effectiveness of the proposed method. In the simulation, an approach is also given to avoid possible identification failure caused by inner synchronization of the drive network.

  5. Identifying gene networks underlying the neurobiology of ethanol and alcoholism.

    PubMed

    Wolen, Aaron R; Miles, Michael F

    2012-01-01

    For complex disorders such as alcoholism, identifying the genes linked to these diseases and their specific roles is difficult. Traditional genetic approaches, such as genetic association studies (including genome-wide association studies) and analyses of quantitative trait loci (QTLs) in both humans and laboratory animals already have helped identify some candidate genes. However, because of technical obstacles, such as the small impact of any individual gene, these approaches only have limited effectiveness in identifying specific genes that contribute to complex diseases. The emerging field of systems biology, which allows for analyses of entire gene networks, may help researchers better elucidate the genetic basis of alcoholism, both in humans and in animal models. Such networks can be identified using approaches such as high-throughput molecular profiling (e.g., through microarray-based gene expression analyses) or strategies referred to as genetical genomics, such as the mapping of expression QTLs (eQTLs). Characterization of gene networks can shed light on the biological pathways underlying complex traits and provide the functional context for identifying those genes that contribute to disease development.

  6. Structural identifiability of cyclic graphical models of biological networks with latent variables.

    PubMed

    Wang, Yulin; Lu, Na; Miao, Hongyu

    2016-06-13

    Graphical models have long been used to describe biological networks for a variety of important tasks such as the determination of key biological parameters, and the structure of graphical model ultimately determines whether such unknown parameters can be unambiguously obtained from experimental observations (i.e., the identifiability problem). Limited by resources or technical capacities, complex biological networks are usually partially observed in experiment, which thus introduces latent variables into the corresponding graphical models. A number of previous studies have tackled the parameter identifiability problem for graphical models such as linear structural equation models (SEMs) with or without latent variables. However, the limited resolution and efficiency of existing approaches necessarily calls for further development of novel structural identifiability analysis algorithms. An efficient structural identifiability analysis algorithm is developed in this study for a broad range of network structures. The proposed method adopts the Wright's path coefficient method to generate identifiability equations in forms of symbolic polynomials, and then converts these symbolic equations to binary matrices (called identifiability matrix). Several matrix operations are introduced for identifiability matrix reduction with system equivalency maintained. Based on the reduced identifiability matrices, the structural identifiability of each parameter is determined. A number of benchmark models are used to verify the validity of the proposed approach. Finally, the network module for influenza A virus replication is employed as a real example to illustrate the application of the proposed approach in practice. The proposed approach can deal with cyclic networks with latent variables. The key advantage is that it intentionally avoids symbolic computation and is thus highly efficient. Also, this method is capable of determining the identifiability of each single parameter and

  7. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  8. Social network analysis in identifying influential webloggers: A preliminary study

    NASA Astrophysics Data System (ADS)

    Hasmuni, Noraini; Sulaiman, Nor Intan Saniah; Zaibidi, Nerda Zura

    2014-12-01

    In recent years, second generation of internet-based services such as weblog has become an effective communication tool to publish information on the Web. Weblogs have unique characteristics that deserve users' attention. Some of webloggers have seen weblogs as appropriate medium to initiate and expand business. These webloggers or also known as direct profit-oriented webloggers (DPOWs) communicate and share knowledge with each other through social interaction. However, survivability is the main issue among DPOW. Frequent communication with influential webloggers is one of the way to keep survive as DPOW. This paper aims to understand the network structure and identify influential webloggers within the network. Proper understanding of the network structure can assist us in knowing how the information is exchanged among members and enhance survivability among DPOW. 30 DPOW were involved in this study. Degree centrality and betweenness centrality measurement in Social Network Analysis (SNA) were used to examine the strength relation and identify influential webloggers within the network. Thus, webloggers with the highest value of these measurements are considered as the most influential webloggers in the network.

  9. Social Network Analysis Identifies Key Participants in Conservation Development.

    PubMed

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  10. Identifiability of tree-child phylogenetic networks under a probabilistic recombination-mutation model of evolution.

    PubMed

    Francis, Andrew; Moulton, Vincent

    2018-06-07

    Phylogenetic networks are an extension of phylogenetic trees which are used to represent evolutionary histories in which reticulation events (such as recombination and hybridization) have occurred. A central question for such networks is that of identifiability, which essentially asks under what circumstances can we reliably identify the phylogenetic network that gave rise to the observed data? Recently, identifiability results have appeared for networks relative to a model of sequence evolution that generalizes the standard Markov models used for phylogenetic trees. However, these results are quite limited in terms of the complexity of the networks that are considered. In this paper, by introducing an alternative probabilistic model for evolution along a network that is based on some ground-breaking work by Thatte for pedigrees, we are able to obtain an identifiability result for a much larger class of phylogenetic networks (essentially the class of so-called tree-child networks). To prove our main theorem, we derive some new results for identifying tree-child networks combinatorially, and then adapt some techniques developed by Thatte for pedigrees to show that our combinatorial results imply identifiability in the probabilistic setting. We hope that the introduction of our new model for networks could lead to new approaches to reliably construct phylogenetic networks. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. All-IP wireless sensor networks for real-time patient monitoring.

    PubMed

    Wang, Xiaonan; Le, Deguang; Cheng, Hongbin; Xie, Conghua

    2014-12-01

    This paper proposes the all-IP WSNs (wireless sensor networks) for real-time patient monitoring. In this paper, the all-IP WSN architecture based on gateway trees is proposed and the hierarchical address structure is presented. Based on this architecture, the all-IP WSN can perform routing without route discovery. Moreover, a mobile node is always identified by a home address and it does not need to be configured with a care-of address during the mobility process, so the communication disruption caused by the address change is avoided. Through the proposed scheme, a physician can monitor the vital signs of a patient at any time and at any places, and according to the IPv6 address he can also obtain the location information of the patient in order to perform effective and timely treatment. Finally, the proposed scheme is evaluated based on the simulation, and the simulation data indicate that the proposed scheme might effectively reduce the communication delay and control cost, and lower the packet loss rate. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. Securing Mobile Networks in an Operational Setting

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  13. Systematization of the Introduction of IPV and Switch from tOPV to bOPV in the Americas.

    PubMed

    Pedreira, Cristina; Thrush, Elizabeth; Jauregui, Barbara

    2017-07-01

    The synchronized introduction of the inactivated polio vaccine (IPV) and the switch from trivalent oral polio vaccine (tOPV) to bivalent oral polio vaccine (bOPV) has constituted an effort without precedents, and with astonishing results. Within the established time frame, all countries in our region managed to carry out the decision, planning, and introduction of this vaccine and subsequent switch to their national immunization schedules.The purpose of this article is to systematize the process of IPV introduction and switch in Latin America and the Caribbean, which constitutes an important piece in the documentation of the polio legacy in the Americas. Regional level as well as country perspectives and viewpoints are described. Analyzing and summarizing the lessons learned from the introduction of IPV and the switch from tOPV to bOPV can be useful for the introduction of new vaccines in the Pan American Health Organization (PAHO) region and in other regions of the world, and to help our own region successfully carry out another synchronized vaccine introduction in the future, if necessary. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  14. Genetic associations with micronutrient levels identified in immune and gastrointestinal networks.

    PubMed

    Morine, Melissa J; Monteiro, Jacqueline Pontes; Wise, Carolyn; Teitel, Candee; Pence, Lisa; Williams, Anna; Ning, Baitang; McCabe-Sellers, Beverly; Champagne, Catherine; Turner, Jerome; Shelby, Beatrice; Bogle, Margaret; Beger, Richard D; Priami, Corrado; Kaput, Jim

    2014-07-01

    The discovery of vitamins and clarification of their role in preventing frank essential nutrient deficiencies occurred in the early 1900s. Much vitamin research has understandably focused on public health and the effects of single nutrients to alleviate acute conditions. The physiological processes for maintaining health, however, are complex systems that depend upon interactions between multiple nutrients, environmental factors, and genetic makeup. To analyze the relationship between these factors and nutritional health, data were obtained from an observational, community-based participatory research program of children and teens (age 6-14) enrolled in a summer day camp in the Delta region of Arkansas. Assessments of erythrocyte S-adenosylmethionine (SAM) and S-adenosylhomocysteine (SAH), plasma homocysteine (Hcy) and 6 organic micronutrients (retinol, 25-hydroxy vitamin D3, pyridoxal, thiamin, riboflavin, and vitamin E), and 1,129 plasma proteins were performed at 3 time points in each of 2 years. Genetic makeup was analyzed with 1 M SNP genotyping arrays, and nutrient status was assessed with 24-h dietary intake questionnaires. A pattern of metabolites (met_PC1) that included the ratio of erythrocyte SAM/SAH, Hcy, and 5 vitamins were identified by principal component analysis. Met_PC1 levels were significantly associated with (1) single-nucleotide polymorphisms, (2) levels of plasma proteins, and (3) multilocus genotypes coding for gastrointestinal and immune functions, as identified in a global network of metabolic/protein-protein interactions. Subsequent mining of data from curated pathway, network, and genome-wide association studies identified genetic and functional relationships that may be explained by gene-nutrient interactions. The systems nutrition strategy described here has thus associated a multivariate metabolite pattern in blood with genes involved in immune and gastrointestinal functions.

  15. IPV6 Alias Resolution Via Induced Router Fragmentation

    DTIC Science & Technology

    2013-06-01

    26 3.4 Controlled Alias Resolution . . . . . . . . . . . . . . . . . . . . . . 28 4 Analysis 29 4.1 Efficacy of TBT ...17 Figure 3.1 TBT , the “Too-Big Trick” . . . . . . . . . . . . . . . . . . . . . . . . 23 Figure 3.2 GNS3 Test Topology with Asymmetric MTU...13 Table 4.1 TBT Response Characteristics . . . . . . . . . . . . . . . . . . . . . . 30 Table 4.2 Operating System Identifiers for Alias

  16. Identifying critical transitions and their leading biomolecular networks in complex diseases.

    PubMed

    Liu, Rui; Li, Meiyi; Liu, Zhi-Ping; Wu, Jiarui; Chen, Luonan; Aihara, Kazuyuki

    2012-01-01

    Identifying a critical transition and its leading biomolecular network during the initiation and progression of a complex disease is a challenging task, but holds the key to early diagnosis and further elucidation of the essential mechanisms of disease deterioration at the network level. In this study, we developed a novel computational method for identifying early-warning signals of the critical transition and its leading network during a disease progression, based on high-throughput data using a small number of samples. The leading network makes the first move from the normal state toward the disease state during a transition, and thus is causally related with disease-driving genes or networks. Specifically, we first define a state-transition-based local network entropy (SNE), and prove that SNE can serve as a general early-warning indicator of any imminent transitions, regardless of specific differences among systems. The effectiveness of this method was validated by functional analysis and experimental data.

  17. A Systems Approach Identifies Networks and Genes Linking Sleep and Stress: Implications for Neuropsychiatric Disorders

    PubMed Central

    Jiang, Peng; Scarpa, Joseph R.; Fitzpatrick, Karrie; Losic, Bojan; Gao, Vance D.; Hao, Ke; Summa, Keith C.; Yang, He S.; Zhang, Bin; Allada, Ravi; Vitaterna, Martha H.; Turek, Fred W.; Kasarskis, Andrew

    2016-01-01

    SUMMARY Sleep dysfunction and stress susceptibility are co-morbid complex traits, which often precede and predispose patients to a variety of neuropsychiatric diseases. Here, we demonstrate multi-level organizations of genetic landscape, candidate genes, and molecular networks associated with 328 stress and sleep traits in a chronically stressed population of 338 (C57BL/6J×A/J) F2 mice. We constructed striatal gene co-expression networks, revealing functionally and cell-type specific gene co-regulations important for stress and sleep. Using a composite ranking system, we identified network modules most relevant for 15 independent phenotypic categories, highlighting a mitochondria/synaptic module that links sleep and stress. The key network regulators of this module are overrepresented with genes implicated in neuropsychiatric diseases. Our work suggests the interplay between sleep, stress, and neuropathology emerge from genetic influences on gene expression and their collective organization through complex molecular networks, providing a framework to interrogate the mechanisms underlying sleep, stress susceptibility, and related neuropsychiatric disorders. PMID:25921536

  18. Aggression by Children Exposed to IPV: Exploring the Role of Child Depressive Symptoms, Trauma-Related Symptoms, & Warmth in Family Relationships.

    PubMed

    Piotrowski, Caroline C; Cameranesi, Margherita

    2018-06-01

    Multi-informant reports of aggression by siblings in families with and without a history of IPV were compared. Associations between aggressive behavior and child depressive and trauma-related symptoms, as well as maternal and sibling warmth were also explored. Mothers, observers and the siblings themselves reported on aggressive behaviour. Mothers reported on child trauma-related symptoms while children provided self-report on depressive symptoms and mother-child and sibling warmth. The frequency of observed aggression did not differ across groups on average, although more sibling dyads exposed to IPV engaged in aggression than those not exposed. Child reports of sibling aggression did not differ across groups but mothers reported significantly less aggressive behavior by children exposed to IPV than those not exposed. Regression results indicated that depressive and trauma-related symptoms were significant risk factors for aggression, while the role of mother-child and sibling warmth was more complex. Results were discussed within a developmental psychopathology framework.

  19. Identifying changes in the support networks of end-of-life carers using social network analysis

    PubMed Central

    Leonard, Rosemary; Horsfall, Debbie; Noonan, Kerrie

    2015-01-01

    End-of-life caring is often associated with reduced social networks for both the dying person and for the carer. However, those adopting a community participation and development approach, see the potential for the expansion and strengthening of networks. This paper uses Knox, Savage and Harvey's definitions of three generations social network analysis to analyse the caring networks of people with a terminal illness who are being cared for at home and identifies changes in these caring networks that occurred over the period of caring. Participatory network mapping of initial and current networks was used in nine focus groups. The analysis used key concepts from social network analysis (size, density, transitivity, betweenness and local clustering) together with qualitative analyses of the group's reflections on the maps. The results showed an increase in the size of the networks and that ties between the original members of the network strengthened. The qualitative data revealed the importance between core and peripheral network members and the diverse contributions of the network members. The research supports the value of third generation social network analysis and the potential for end-of-life caring to build social capital. PMID:24644162

  20. Cross-platform method for identifying candidate network biomarkers for prostate cancer.

    PubMed

    Jin, G; Zhou, X; Cui, K; Zhang, X-S; Chen, L; Wong, S T C

    2009-11-01

    Discovering biomarkers using mass spectrometry (MS) and microarray expression profiles is a promising strategy in molecular diagnosis. Here, the authors proposed a new pipeline for biomarker discovery that integrates disease information for proteins and genes, expression profiles in both genomic and proteomic levels, and protein-protein interactions (PPIs) to discover high confidence network biomarkers. Using this pipeline, a total of 474 molecules (genes and proteins) related to prostate cancer were identified and a prostate-cancer-related network (PCRN) was derived from the integrative information. Thus, a set of candidate network biomarkers were identified from multiple expression profiles composed by eight microarray datasets and one proteomics dataset. The network biomarkers with PPIs can accurately distinguish the prostate patients from the normal ones, which potentially provide more reliable hits of biomarker candidates than conventional biomarker discovery methods.

  1. Combined immunogenicity data for a new DTaP-IPV-Hep B-PRP-T vaccine (Hexaxim) following primary series administration at 2, 4, 6 months of age in Latin America.

    PubMed

    Santos-Lima, Eduardo; B'Chir, Siham; Lane, Andrew

    2013-02-18

    The immunogenicity of a primary series of a new, fully liquid DTaP-IPV-Hep B-PRP-T vaccine (Hexaxim), administered at 2, 4, 6 months of age in four clinical studies is reviewed. Immunogenicity data at 1 month after the third vaccination were assessed and pooled from a total of 1270 participants (per-protocol population) in four randomized clinical trials in Argentina, Mexico, and Peru. Hepatitis B vaccine was not administered at birth. All seroprotection (D, T, polio-1, -2, -3, Hep B, PRP-T [Hib]), seroconversion (PT and FHA), and vaccine response (PT and FHA) data were high, and were similar to licensed comparators (pooled SP, SC, and VR rates were 97.1-100%, 96.0-97.0%, and 99.7-99.9%, respectively). These data show the good immunogenicity of this new hexavalent vaccine that can provide the opportunity to increase global compliance to complex pediatric vaccination schedules. Copyright © 2013. Published by Elsevier Ltd.

  2. Identifying influential spreaders in complex networks through local effective spreading paths

    NASA Astrophysics Data System (ADS)

    Wang, Xiaojie; Zhang, Xue; Yi, Dongyun; Zhao, Chengli

    2017-05-01

    How to effectively identify a set of influential spreaders in complex networks is of great theoretical and practical value, which can help to inhibit the rapid spread of epidemics, promote the sales of products by word-of-mouth advertising, and so on. A naive strategy is to select the top ranked nodes as identified by some centrality indices, and other strategies are mainly based on greedy methods and heuristic methods. However, most of those approaches did not concern the connections between nodes. Usually, the distances between the selected spreaders are very close, leading to a serious overlapping of their influence. As a consequence, the global influence of the spreaders in networks will be greatly reduced, which largely restricts the performance of those methods. In this paper, a simple and efficient method is proposed to identify a set of discrete yet influential spreaders. By analyzing the spreading paths in the network, we present the concept of effective spreading paths and measure the influence of nodes via expectation calculation. The numerical analysis in undirected and directed networks all show that our proposed method outperforms many other centrality-based and heuristic benchmarks, especially in large-scale networks. Besides, experimental results on different spreading models and parameters demonstrates the stability and wide applicability of our method.

  3. The Stability of Intimate Partner Violence Perpetration From Adolescence to Emerging Adulthood in Sexual Minorities.

    PubMed

    Shorey, Ryan C; Fite, Paula J; Cohen, Joseph R; Stuart, Gregory L; Temple, Jeff R

    2018-06-01

    The objective of this study was to examine the stability of physical and sexual intimate partner violence (IPV) perpetration from adolescence to emerging adulthood among sexual minorities. Adolescents who identified as a sexual minority (N = 135; 71.1% female; mean age = 15.02, standard deviation=.77; 34.1% African-American/black, 26.7% white, 22.2% Hispanic) from southeast Texas were assessed annually for 6 years on their IPV perpetration. Structural equation modeling demonstrated that physical IPV perpetration was modestly stable across years 1-4 (24.6%, 24.6%, 26.4%, and 21.6%, respectively), decreased in year 5 (18.6%), and increased in year 6 (24.5%). The stability of sexual IPV perpetration was high across all 6 years (14.3%, 13%, 14.9%, 10.8%, 12.4%, and 14.4%). This is the first study to examine the stability of IPV perpetration among sexual minority adolescents. Findings suggest that the development of interventions for IPV among sexual minority adolescents is needed, as IPV is unlikely to desist from adolescence to emerging adulthood. Copyright © 2017 The Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  4. Women's Healthcare Utilization Following Routine Screening for Past-Year Intimate Partner Violence in the Veterans Health Administration.

    PubMed

    Dichter, Melissa E; Sorrentino, Anneliese E; Haywood, Terri N; Bellamy, Scarlett L; Medvedeva, Elina; Roberts, Christopher B; Iverson, Katherine M

    2018-06-01

    Experience of intimate partner violence (IPV) can have adverse health impacts and has been associated with elevated rates of healthcare service utilization. Healthcare encounters present opportunities to identify IPV-related concerns and connect patients with services. The Veterans Health Administration (VHA) conducts IPV screening within an integrated healthcare system. The objectives of this study were to compare service utilization in the 6 months following IPV screening between those screening positive and negative for past-year IPV (IPV+, IPV-) and to examine the timing and types of healthcare services accessed among women screening IPV+. A retrospective chart review was conducted for 8888 female VHA patients across 13 VHA facilities who were screened for past-year IPV between April 2014 and April 2016. Demographic characteristics (age, race, ethnicity, marital status, veteran status), IPV screening response, and healthcare encounters (based on visit identification codes). In the 6 months following routine screening for past-year IPV, patients screening IPV+ were more likely to utilize outpatient care (aOR = 1.85 [CI 1.26, 2.70]), including primary care or psychosocial care, and to have an inpatient stay (aOR = 2.09 [CI 1.23, 3.57]), compared with patients screening IPV-. Among those with any utilization, frequency of outpatient encounters within the 6-month period following screening was higher among those screening IPV+ compared with those screening IPV-. The majority of patients screening positive for past-year IPV returned for an outpatient visit within a brief time frame following the screening visit (> 70% within 14 days, >95% within 6 months). More than one in four patients screening IPV+ had an emergency department visit within the 6 months following screening. Women who screen positive for past-year IPV have high rates of return to outpatient visits following screening, presenting opportunities for follow-up support. Higher rates of

  5. Microbiome Networks: A Systems Framework for Identifying Candidate Microbial Assemblages for Disease Management.

    PubMed

    Poudel, R; Jumpponen, A; Schlatter, D C; Paulitz, T C; Gardener, B B McSpadden; Kinkel, L L; Garrett, K A

    2016-10-01

    Network models of soil and plant microbiomes provide new opportunities for enhancing disease management, but also challenges for interpretation. We present a framework for interpreting microbiome networks, illustrating how observed network structures can be used to generate testable hypotheses about candidate microbes affecting plant health. The framework includes four types of network analyses. "General network analysis" identifies candidate taxa for maintaining an existing microbial community. "Host-focused analysis" includes a node representing a plant response such as yield, identifying taxa with direct or indirect associations with that node. "Pathogen-focused analysis" identifies taxa with direct or indirect associations with taxa known a priori as pathogens. "Disease-focused analysis" identifies taxa associated with disease. Positive direct or indirect associations with desirable outcomes, or negative associations with undesirable outcomes, indicate candidate taxa. Network analysis provides characterization not only of taxa with direct associations with important outcomes such as disease suppression, biofertilization, or expression of plant host resistance, but also taxa with indirect associations via their association with other key taxa. We illustrate the interpretation of network structure with analyses of microbiomes in the oak phyllosphere, and in wheat rhizosphere and bulk soil associated with the presence or absence of infection by Rhizoctonia solani.

  6. DTaP5-IPV-Hib-HepB, a hexavalent vaccine for infants and toddlers.

    PubMed

    Lee, Andrew W; Jordanov, Emilia; Boisnard, Florence; Marshall, Gary S

    2017-02-01

    Combination vaccines reduce the 'shot burden' and simplify the childhood immunization schedule. Only 5-valent DTaP-based vaccines are licensed in the U.S. Areas covered: A new combination vaccine - DTaP5-IPV-Hib-HepB - is described, which induces antibody responses in infants (given in different schedules, including a 2, 4, and 6-month schedule) that are similar to the respective component vaccines. The vaccine appears to be safe and would be expected to protect against six diseases: diphtheria, tetanus, pertussis, hepatitis B, H influenzae type b, and polio. Administration is associated with higher rates of mild fever, but without significant safety signals. Expert commentary: Incorporation of this hexavalent vaccine into the U.S. schedule could improve coverage rates and timeliness, and addition to the E.U. market would add depth to the available repertoire of combination vaccines.

  7. Identifying Typhoon Tracks based on Event Synchronization derived Spatially Embedded Climate Networks

    NASA Astrophysics Data System (ADS)

    Ozturk, Ugur; Marwan, Norbert; Kurths, Jürgen

    2017-04-01

    Complex networks are commonly used for investigating spatiotemporal dynamics of complex systems, e.g. extreme rainfall. Especially directed networks are very effective tools in identifying climatic patterns on spatially embedded networks. They can capture the network flux, so as the principal dynamics of spreading significant phenomena. Network measures, such as network divergence, bare the source-receptor relation of the directed networks. However, it is still a challenge how to catch fast evolving atmospheric events, i.e. typhoons. In this study, we propose a new technique, namely Radial Ranks, to detect the general pattern of typhoons forward direction based on the strength parameter of the event synchronization over Japan. We suggest to subset a circular zone of high correlation around the selected grid based on the strength parameter. Radial sums of the strength parameter along vectors within this zone, radial ranks are measured for potential directions, which allows us to trace the network flux over long distances. We employed also the delay parameter of event synchronization to identify and separate the frontal storms' and typhoons' individual behaviors.

  8. Identifying the Critical Links in Road Transportation Networks: Centrality-based approach utilizing structural properties

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinthavali, Supriya

    Surface transportation road networks share structural properties similar to other complex networks (e.g., social networks, information networks, biological networks, and so on). This research investigates the structural properties of road networks for any possible correlation with the traffic characteristics such as link flows those determined independently. Additionally, we define a criticality index for the links of the road network that identifies the relative importance in the network. We tested our hypotheses with two sample road networks. Results show that, correlation exists between the link flows and centrality measures of a link of the road (dual graph approach is followed) andmore » the criticality index is found to be effective for one test network to identify the vulnerable nodes.« less

  9. A systems approach identifies networks and genes linking sleep and stress: implications for neuropsychiatric disorders.

    PubMed

    Jiang, Peng; Scarpa, Joseph R; Fitzpatrick, Karrie; Losic, Bojan; Gao, Vance D; Hao, Ke; Summa, Keith C; Yang, He S; Zhang, Bin; Allada, Ravi; Vitaterna, Martha H; Turek, Fred W; Kasarskis, Andrew

    2015-05-05

    Sleep dysfunction and stress susceptibility are comorbid complex traits that often precede and predispose patients to a variety of neuropsychiatric diseases. Here, we demonstrate multilevel organizations of genetic landscape, candidate genes, and molecular networks associated with 328 stress and sleep traits in a chronically stressed population of 338 (C57BL/6J × A/J) F2 mice. We constructed striatal gene co-expression networks, revealing functionally and cell-type-specific gene co-regulations important for stress and sleep. Using a composite ranking system, we identified network modules most relevant for 15 independent phenotypic categories, highlighting a mitochondria/synaptic module that links sleep and stress. The key network regulators of this module are overrepresented with genes implicated in neuropsychiatric diseases. Our work suggests that the interplay among sleep, stress, and neuropathology emerges from genetic influences on gene expression and their collective organization through complex molecular networks, providing a framework for interrogating the mechanisms underlying sleep, stress susceptibility, and related neuropsychiatric disorders. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  10. Identifying influential directors in the United States corporate governance network.

    PubMed

    Huang, Xuqing; Vodenska, Irena; Wang, Fengzhong; Havlin, Shlomo; Stanley, H Eugene

    2011-10-01

    The influence of directors has been one of the most engaging topics recently, but surprisingly little research has been done to quantitatively evaluate the influence and power of directors. We analyze the structure of the US corporate governance network for the 11-year period 1996-2006 based on director data from the Investor Responsibility Research Center director database, and we develop a centrality measure named the influence factor to estimate the influence of directors quantitatively. The US corporate governance network is a network of directors with nodes representing directors and links between two directors representing their service on common company boards. We assume that information flows in the network through information-sharing processes among linked directors. The influence factor assigned to a director is based on the level of information that a director obtains from the entire network. We find that, contrary to commonly accepted belief that directors of large companies, measured by market capitalization, are the most powerful, in some instances, the directors who are influential do not necessarily serve on boards of large companies. By applying our influence factor method to identify the influential people contained in the lists created by popular magazines such as Fortune, Networking World, and Treasury and Risk Management, we find that the influence factor method is consistently either the best or one of the two best methods in identifying powerful people compared to other general centrality measures that are used to denote the significance of a node in complex network theory.

  11. Identifying influential directors in the United States corporate governance network

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Vodenska, Irena; Wang, Fengzhong; Havlin, Shlomo; Stanley, H. Eugene

    2011-10-01

    The influence of directors has been one of the most engaging topics recently, but surprisingly little research has been done to quantitatively evaluate the influence and power of directors. We analyze the structure of the US corporate governance network for the 11-year period 1996-2006 based on director data from the Investor Responsibility Research Center director database, and we develop a centrality measure named the influence factor to estimate the influence of directors quantitatively. The US corporate governance network is a network of directors with nodes representing directors and links between two directors representing their service on common company boards. We assume that information flows in the network through information-sharing processes among linked directors. The influence factor assigned to a director is based on the level of information that a director obtains from the entire network. We find that, contrary to commonly accepted belief that directors of large companies, measured by market capitalization, are the most powerful, in some instances, the directors who are influential do not necessarily serve on boards of large companies. By applying our influence factor method to identify the influential people contained in the lists created by popular magazines such as Fortune, Networking World, and Treasury and Risk Management, we find that the influence factor method is consistently either the best or one of the two best methods in identifying powerful people compared to other general centrality measures that are used to denote the significance of a node in complex network theory.

  12. Lasting immune memory against hepatitis B in 12-13-year-old adolescents previously vaccinated with 4 doses of hexavalent DTPa-HBV-IPV/Hib vaccine in infancy.

    PubMed

    Behre, Ulrich; Van Der Meeren, Olivier; Crasta, Priya; Hanssens, Linda; Mesaros, Narcisa

    2016-11-01

    Vaccinating infants against hepatitis B virus (HBV) is the most effective way of preventing the disease. However, since HBV exposure can increase during adolescence, it is essential that antibody persistence is maintained. We evaluated the antibody persistence and immune memory against hepatitis B, in 12-13 y olds who had received complete primary + booster vaccination with diphtheria-tetanus-acellular pertussis-hepatitis B-inactivated poliovirus/Haemophilus influenza type b (DTPa-HBV-IPV/Hib) vaccine in infancy. Open phase-IV study conducted at 12 centers in Germany [NCT02052661]. Adolescents aged 12-13 y, vaccinated with 4 doses of DTPa-HBV-IPV/Hib (Infanrix hexa™, GSK Vaccines) in infancy, received a single challenge dose of monovalent pediatric hepatitis B vaccine (Engerix™-B Kinder; GSK Vaccines). Blood samples were taken before and 1-month post-challenge to measure anti-hepatitis B (anti-HBs) antibodies using a chemiluminescence immunoassay (seroprotection cut-off: ≥10 mIU/ml). Post-challenge adverse events (AEs) were monitored. 300 subjects were vaccinated; of 293 subjects in the ATP immunogenicity cohort, 60.5% had pre-challenge anti-HBs antibodies ≥10 mIU/ml, which rose to 97.6% post-challenge (≥100 mIU/ml in 94.1%). An anamnestic response was seen in 96.5% subjects. A 150-fold increase in antibody geometric mean concentrations was observed (22.4 to 3502.6 mIU/ml). Pain (44%) and fatigue (24.3%) were the most frequent solicited local and general AEs, respectively; 14.7% subjects reported unsolicited symptoms during the 31-day post-vaccination period. Two vaccine-unrelated serious AEs occurred. Vaccination with DTPa-HBV-IPV/Hib in infancy induces sustained seroprotection and immune memory against HBV, as shown by the strong anamnestic response to the hepatitis B vaccine challenge in 12-13 year-old adolescents.

  13. Semantic integration to identify overlapping functional modules in protein interaction networks

    PubMed Central

    Cho, Young-Rae; Hwang, Woochang; Ramanathan, Murali; Zhang, Aidong

    2007-01-01

    Background The systematic analysis of protein-protein interactions can enable a better understanding of cellular organization, processes and functions. Functional modules can be identified from the protein interaction networks derived from experimental data sets. However, these analyses are challenging because of the presence of unreliable interactions and the complex connectivity of the network. The integration of protein-protein interactions with the data from other sources can be leveraged for improving the effectiveness of functional module detection algorithms. Results We have developed novel metrics, called semantic similarity and semantic interactivity, which use Gene Ontology (GO) annotations to measure the reliability of protein-protein interactions. The protein interaction networks can be converted into a weighted graph representation by assigning the reliability values to each interaction as a weight. We presented a flow-based modularization algorithm to efficiently identify overlapping modules in the weighted interaction networks. The experimental results show that the semantic similarity and semantic interactivity of interacting pairs were positively correlated with functional co-occurrence. The effectiveness of the algorithm for identifying modules was evaluated using functional categories from the MIPS database. We demonstrated that our algorithm had higher accuracy compared to other competing approaches. Conclusion The integration of protein interaction networks with GO annotation data and the capability of detecting overlapping modules substantially improve the accuracy of module identification. PMID:17650343

  14. KLK6-regulated miRNA networks activate oncogenic pathways in breast cancer subtypes.

    PubMed

    Sidiropoulos, Konstantinos G; Ding, Qiang; Pampalakis, Georgios; White, Nicole M A; Boulos, Peter; Sotiropoulou, Georgia; Yousef, George M

    2016-08-01

    KLK6 is expressed in normal mammary tissues and is aberrantly regulated in breast cancer. At physiological levels of expression, i.e. those found in normal mammary tissues, KLK6 acts as a tumor suppressor in human breast cancer. However, aberrant overexpression of KLK6 (i.e. 50-100-fold higher than normal), a characteristic of a subset of human breast cancers is associated with increased tumorigenicity (Pampalakis et al. Cancer Res 69:3779-3787, 2009). Here, we stably transfected KLK6-non-expressing MDA-MB-231 breast cancer cells with the full-length KLK6 cDNA to overexpress KLK6 at levels comparable to those observed in patients, and investigated potential oncogenic miRNA networks regulated by these abnormally high KLK6 expression levels and increased activity of this serine protease. A number of miRNAs that are upregulated (e.g. miR-146a) or downregulated (e.g. miR-34a) via KLK6-induced alterations in the miRNA biogenesis machinery were identified. Integrated experimental and bioinformatics analyses identified convergent miRNA networks targeting the cell cycle, MYC, MAPK, and other signaling pathways. In large clinical datasets, significant correlations between KLK6 and downstream MAPK and MYC targets at both the RNA and protein levels was confirmed, as well as negative correlation with GATA3. It was also demonstrated that KLK6 overexpression and likely its proteolytic activity is associated with alterations in downstream miRNAs and their targets, and these differ with the molecular subtypes of breast cancer. The data partly explains the different characteristics of breast cancer subtypes. Importantly, we introduce a combined KLK6-CDKN1B+MYC+CDKN1C score for prediction of long-term patient survival outcomes, with higher scores indicating poor survival. Copyright © 2016 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  15. How to Identify Success Among Networks That Promote Active Living.

    PubMed

    Litt, Jill; Varda, Danielle; Reed, Hannah; Retrum, Jessica; Tabak, Rachel; Gustat, Jeanette; O'Hara Tompkins, Nancy

    2015-11-01

    We evaluated organization- and network-level factors that influence organizations' perceived success. This is important for managing interorganizational networks, which can mobilize communities to address complex health issues such as physical activity, and for achieving change. In 2011, we used structured interview and network survey data from 22 states in the United States to estimate multilevel random-intercept models to understand organization- and network-level factors that explain perceived network success. A total of 53 of 59 "whole networks" met the criteria for inclusion in the analysis (89.8%). Coordinators identified 559 organizations, with 3 to 12 organizations from each network taking the online survey (response rate = 69.7%; range = 33%-100%). Occupying a leadership position (P < .01), the amount of time with the network (P < .05), and support from community leaders (P < .05) emerged as correlates of perceived success. Organizations' perceptions of success can influence decisions about continuing involvement and investment in networks designed to promote environment and policy change for active living. Understanding these factors can help leaders manage complex networks that involve diverse memberships, varied interests, and competing community-level priorities.

  16. Mapping Autonomous System’s Router Level Topology in IPv6

    DTIC Science & Technology

    2007-06-01

    useful and is called rate limiting. Rate limiting sends enough probes to one of the alias addresses to cause the router to begin rate limiting the...network. The second key capability required was alias and anonymous resolution: if there was no method of making these functions happen then any graph...command, then port unreachable responses were received by probes through d5 to interface d13 or d5. Again, it is believed that this happened

  17. How to Identify Success Among Networks That Promote Active Living

    PubMed Central

    Varda, Danielle; Reed, Hannah; Retrum, Jessica; Tabak, Rachel; Gustat, Jeanette; O'Hara Tompkins, Nancy

    2015-01-01

    Objectives. We evaluated organization- and network-level factors that influence organizations’ perceived success. This is important for managing interorganizational networks, which can mobilize communities to address complex health issues such as physical activity, and for achieving change. Methods. In 2011, we used structured interview and network survey data from 22 states in the United States to estimate multilevel random-intercept models to understand organization- and network-level factors that explain perceived network success. Results. A total of 53 of 59 “whole networks” met the criteria for inclusion in the analysis (89.8%). Coordinators identified 559 organizations, with 3 to 12 organizations from each network taking the online survey (response rate = 69.7%; range = 33%–100%). Occupying a leadership position (P < .01), the amount of time with the network (P < .05), and support from community leaders (P < .05) emerged as correlates of perceived success. Conclusions. Organizations’ perceptions of success can influence decisions about continuing involvement and investment in networks designed to promote environment and policy change for active living. Understanding these factors can help leaders manage complex networks that involve diverse memberships, varied interests, and competing community-level priorities. PMID:26378863

  18. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    PubMed

    Zhu, Fenghui; Wang, Wenxu; Di, Zengru; Fan, Ying

    2014-01-01

    Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  19. Version 6 of the consensus yeast metabolic network refines biochemical coverage and improves model performance

    PubMed Central

    Heavner, Benjamin D.; Smallbone, Kieran; Price, Nathan D.; Walker, Larry P.

    2013-01-01

    Updates to maintain a state-of-the art reconstruction of the yeast metabolic network are essential to reflect our understanding of yeast metabolism and functional organization, to eliminate any inaccuracies identified in earlier iterations, to improve predictive accuracy and to continue to expand into novel subsystems to extend the comprehensiveness of the model. Here, we present version 6 of the consensus yeast metabolic network (Yeast 6) as an update to the community effort to computationally reconstruct the genome-scale metabolic network of Saccharomyces cerevisiae S288c. Yeast 6 comprises 1458 metabolites participating in 1888 reactions, which are annotated with 900 yeast genes encoding the catalyzing enzymes. Compared with Yeast 5, Yeast 6 demonstrates improved sensitivity, specificity and positive and negative predictive values for predicting gene essentiality in glucose-limited aerobic conditions when analyzed with flux balance analysis. Additionally, Yeast 6 improves the accuracy of predicting the likelihood that a mutation will cause auxotrophy. The network reconstruction is available as a Systems Biology Markup Language (SBML) file enriched with Minimium Information Requested in the Annotation of Biochemical Models (MIRIAM)-compliant annotations. Small- and macromolecules in the network are referenced to authoritative databases such as Uniprot or ChEBI. Molecules and reactions are also annotated with appropriate publications that contain supporting evidence. Yeast 6 is freely available at http://yeast.sf.net/ as three separate SBML files: a model using the SBML level 3 Flux Balance Constraint package, a model compatible with the MATLAB® COBRA Toolbox for backward compatibility and a reconstruction containing only reactions for which there is experimental evidence (without the non-biological reactions necessary for simulating growth). Database URL: http://yeast.sf.net/ PMID:23935056

  20. Identifying influential spreaders in complex networks based on kshell hybrid method

    NASA Astrophysics Data System (ADS)

    Namtirtha, Amrita; Dutta, Animesh; Dutta, Biswanath

    2018-06-01

    Influential spreaders are the key players in maximizing or controlling the spreading in a complex network. Identifying the influential spreaders using kshell decomposition method has become very popular in the recent time. In the literature, the core nodes i.e. with the largest kshell index of a network are considered as the most influential spreaders. We have studied the kshell method and spreading dynamics of nodes using Susceptible-Infected-Recovered (SIR) epidemic model to understand the behavior of influential spreaders in terms of its topological location in the network. From the study, we have found that every node in the core area is not the most influential spreader. Even a strategically placed lower shell node can also be a most influential spreader. Moreover, the core area can also be situated at the periphery of the network. The existing indexing methods are only designed to identify the most influential spreaders from core nodes and not from lower shells. In this work, we propose a kshell hybrid method to identify highly influential spreaders not only from the core but also from lower shells. The proposed method comprises the parameters such as kshell power, node's degree, contact distance, and many levels of neighbors' influence potential. The proposed method is evaluated using nine real world network datasets. In terms of the spreading dynamics, the experimental results show the superiority of the proposed method over the other existing indexing methods such as the kshell method, the neighborhood coreness centrality, the mixed degree decomposition, etc. Furthermore, the proposed method can also be applied to large-scale networks by considering the three levels of neighbors' influence potential.

  1. Identifying a Probabilistic Boolean Threshold Network From Samples.

    PubMed

    Melkman, Avraham A; Cheng, Xiaoqing; Ching, Wai-Ki; Akutsu, Tatsuya

    2018-04-01

    This paper studies the problem of exactly identifying the structure of a probabilistic Boolean network (PBN) from a given set of samples, where PBNs are probabilistic extensions of Boolean networks. Cheng et al. studied the problem while focusing on PBNs consisting of pairs of AND/OR functions. This paper considers PBNs consisting of Boolean threshold functions while focusing on those threshold functions that have unit coefficients. The treatment of Boolean threshold functions, and triplets and -tuplets of such functions, necessitates a deepening of the theoretical analyses. It is shown that wide classes of PBNs with such threshold functions can be exactly identified from samples under reasonable constraints, which include: 1) PBNs in which any number of threshold functions can be assigned provided that all have the same number of input variables and 2) PBNs consisting of pairs of threshold functions with different numbers of input variables. It is also shown that the problem of deciding the equivalence of two Boolean threshold functions is solvable in pseudopolynomial time but remains co-NP complete.

  2. Quantitative methods of identifying the key nodes in the illegal wildlife trade network

    PubMed Central

    Patel, Nikkita Gunvant; Rorres, Chris; Joly, Damien O.; Brownstein, John S.; Boston, Ray; Levy, Michael Z.; Smith, Gary

    2015-01-01

    Innovative approaches are needed to combat the illegal trade in wildlife. Here, we used network analysis and a new database, HealthMap Wildlife Trade, to identify the key nodes (countries) that support the illegal wildlife trade. We identified key exporters and importers from the number of shipments a country sent and received and from the number of connections a country had to other countries over a given time period. We used flow betweenness centrality measurements to identify key intermediary countries. We found the set of nodes whose removal from the network would cause the maximum disruption to the network. Selecting six nodes would fragment 89.5% of the network for elephants, 92.3% for rhinoceros, and 98.1% for tigers. We then found sets of nodes that would best disseminate an educational message via direct connections through the network. We would need to select 18 nodes to reach 100% of the elephant trade network, 16 nodes for rhinoceros, and 10 for tigers. Although the choice of locations for interventions should be customized for the animal and the goal of the intervention, China was the most frequently selected country for network fragmentation and information dissemination. Identification of key countries will help strategize illegal wildlife trade interventions. PMID:26080413

  3. Co-expression network analysis identified six hub genes in association with metastasis risk and prognosis in hepatocellular carcinoma

    PubMed Central

    Feng, Juerong; Zhou, Rui; Chang, Ying; Liu, Jing; Zhao, Qiu

    2017-01-01

    Hepatocellular carcinoma (HCC) has a high incidence and mortality worldwide, and its carcinogenesis and progression are influenced by a complex network of gene interactions. A weighted gene co-expression network was constructed to identify gene modules associated with the clinical traits in HCC (n = 214). Among the 13 modules, high correlation was only found between the red module and metastasis risk (classified by the HCC metastasis gene signature) (R2 = −0.74). Moreover, in the red module, 34 network hub genes for metastasis risk were identified, six of which (ABAT, AGXT, ALDH6A1, CYP4A11, DAO and EHHADH) were also hub nodes in the protein-protein interaction network of the module genes. Thus, a total of six hub genes were identified. In validation, all hub genes showed a negative correlation with the four-stage HCC progression (P for trend < 0.05) in the test set. Furthermore, in the training set, HCC samples with any hub gene lowly expressed demonstrated a higher recurrence rate and poorer survival rate (hazard ratios with 95% confidence intervals > 1). RNA-sequencing data of 142 HCC samples showed consistent results in the prognosis. Gene set enrichment analysis (GSEA) demonstrated that in the samples with any hub gene highly expressed, a total of 24 functional gene sets were enriched, most of which focused on amino acid metabolism and oxidation. In conclusion, co-expression network analysis identified six hub genes in association with HCC metastasis risk and prognosis, which might improve the prognosis by influencing amino acid metabolism and oxidation. PMID:28430663

  4. Application of artificial neural networks to identify equilibration in computer simulations

    NASA Astrophysics Data System (ADS)

    Leibowitz, Mitchell H.; Miller, Evan D.; Henry, Michael M.; Jankowski, Eric

    2017-11-01

    Determining which microstates generated by a thermodynamic simulation are representative of the ensemble for which sampling is desired is a ubiquitous, underspecified problem. Artificial neural networks are one type of machine learning algorithm that can provide a reproducible way to apply pattern recognition heuristics to underspecified problems. Here we use the open-source TensorFlow machine learning library and apply it to the problem of identifying which hypothetical observation sequences from a computer simulation are “equilibrated” and which are not. We generate training populations and test populations of observation sequences with embedded linear and exponential correlations. We train a two-neuron artificial network to distinguish the correlated and uncorrelated sequences. We find that this simple network is good enough for > 98% accuracy in identifying exponentially-decaying energy trajectories from molecular simulations.

  5. Controllability analysis of the directed human protein interaction network identifies disease genes and drug targets

    PubMed Central

    Vinayagam, Arunachalam; Gibson, Travis E.; Lee, Ho-Joon; Yilmazel, Bahar; Roesel, Charles; Hu, Yanhui; Kwon, Young; Sharma, Amitabh; Liu, Yang-Yu; Perrimon, Norbert; Barabási, Albert-László

    2016-01-01

    The protein–protein interaction (PPI) network is crucial for cellular information processing and decision-making. With suitable inputs, PPI networks drive the cells to diverse functional outcomes such as cell proliferation or cell death. Here, we characterize the structural controllability of a large directed human PPI network comprising 6,339 proteins and 34,813 interactions. This network allows us to classify proteins as “indispensable,” “neutral,” or “dispensable,” which correlates to increasing, no effect, or decreasing the number of driver nodes in the network upon removal of that protein. We find that 21% of the proteins in the PPI network are indispensable. Interestingly, these indispensable proteins are the primary targets of disease-causing mutations, human viruses, and drugs, suggesting that altering a network’s control property is critical for the transition between healthy and disease states. Furthermore, analyzing copy number alterations data from 1,547 cancer patients reveals that 56 genes that are frequently amplified or deleted in nine different cancers are indispensable. Among the 56 genes, 46 of them have not been previously associated with cancer. This suggests that controllability analysis is very useful in identifying novel disease genes and potential drug targets. PMID:27091990

  6. Network pharmacology analysis of the anti-cancer pharmacological mechanisms of Ganoderma lucidum extract with experimental support using Hepa1-6-bearing C57 BL/6 mice.

    PubMed

    Zhao, Ruo-Lin; He, Yu-Min

    2018-01-10

    Ganoderma lucidum (GL) is an oriental medical fungus, which was used to prevent and treat many diseases. Previously, the effective compounds of Ganoderma lucidum extract (GLE) were extracted from two kinds of GL, [Ganoderma lucidum (Leyss. Ex Fr.) Karst.] and [Ganoderma sinense Zhao, Xu et Zhang], which have been used for adjuvant anti-cancer clinical therapy for more than 20 years. However, its concrete active compounds and its regulation mechanisms on tumor are unclear. In this study, we aimed to identify the main active compounds from GLE and to investigate its anti-cancer mechanisms via drug-target biological network construction and prediction. The main active compounds of GLE were identified by HPLC, EI-MS and NMR, and the compounds related targets were predicted using docking program. To investigate the functions of GL holistically, the active compounds of GL and related targets were predicted based on four public databases. Subsequently, the Identified-Compound-Target network and Predicted-Compound-Target network were constructed respectively, and they were overlapped to detect the hub potential targets in both networks. Furthermore, the qRT-PCR and western-blot assays were used to validate the expression levels of target genes in GLE treated Hepa1-6-bearing C57 BL/6 mice. In our work, 12 active compounds of GLE were identified, including Ganoderic acid A, Ganoderenic acid A, Ganoderic acid B, Ganoderic acid H, Ganoderic acid C2, Ganoderenic acid D, Ganoderic acid D, Ganoderenic acid G, Ganoderic acid Y, Kaemferol, Genistein and Ergosterol. Using the docking program, 20 targets were mapped to 12 compounds of GLE. Furthermore, 122 effective active compounds of GL and 116 targets were holistically predicted using public databases. Compare with the Identified-Compound-Target network and Predicted-Compound-Target network, 6 hub targets were screened, including AR, CHRM2, ESR1, NR3C1, NR3C2 and PGR, which was considered as potential markers and might play

  7. Criteria for Evaluating Alternative Network and Link Layer Protocols for the NASA Constellation Program Communication Architecture

    NASA Technical Reports Server (NTRS)

    Benbenek, Daniel; Soloff, Jason; Lieb, Erica

    2010-01-01

    Selecting a communications and network architecture for future manned space flight requires an evaluation of the varying goals and objectives of the program, development of communications and network architecture evaluation criteria, and assessment of critical architecture trades. This paper uses Cx Program proposed exploration activities as a guideline; lunar sortie, outpost, Mars, and flexible path options are described. A set of proposed communications network architecture criteria are proposed and described. They include: interoperability, security, reliability, and ease of automating topology changes. Finally a key set of architecture options are traded including (1) multiplexing data at a common network layer vs. at the data link layer, (2) implementing multiple network layers vs. a single network layer, and (3) the use of a particular network layer protocol, primarily IPv6 vs. Delay Tolerant Networking (DTN). In summary, the protocol options are evaluated against the proposed exploration activities and their relative performance with respect to the criteria are assessed. An architectural approach which includes (a) the capability of multiplexing at both the network layer and the data link layer and (b) a single network layer for operations at each program phase, as these solutions are best suited to respond to the widest array of program needs and meet each of the evaluation criteria.

  8. Network analysis of translocated Takahe populations to identify disease surveillance targets.

    PubMed

    Grange, Zoë L; VAN Andel, Mary; French, Nigel P; Gartrell, Brett D

    2014-04-01

    Social network analysis is being increasingly used in epidemiology and disease modeling in humans, domestic animals, and wildlife. We investigated this tool in describing a translocation network (area that allows movement of animals between geographically isolated locations) used for the conservation of an endangered flightless rail, the Takahe (Porphyrio hochstetteri). We collated records of Takahe translocations within New Zealand and used social network principles to describe the connectivity of the translocation network. That is, networks were constructed and analyzed using adjacency matrices with values based on the tie weights between nodes. Five annual network matrices were created using the Takahe data set, each incremental year included records of previous years. Weights of movements between connected locations were assigned by the number of Takahe moved. We calculated the number of nodes (i(total)) and the number of ties (t(total)) between the nodes. To quantify the small-world character of the networks, we compared the real networks to random graphs of the equivalent size, weighting, and node strength. Descriptive analysis of cumulative annual Takahe movement networks involved determination of node-level characteristics, including centrality descriptors of relevance to disease modeling such as weighted measures of in degree (k(i)(in)), out degree (k(i)(out)), and betweenness (B(i)). Key players were assigned according to the highest node measure of k(i)(in), k(i)(out), and B(i) per network. Networks increased in size throughout the time frame considered. The network had some degree small-world characteristics. Nodes with the highest cumulative tie weights connecting them were the captive breeding center, the Murchison Mountains and 2 offshore islands. The key player fluctuated between the captive breeding center and the Murchison Mountains. The cumulative networks identified the captive breeding center every year as the hub of the network until the final

  9. Mobility management techniques for the next-generation wireless networks

    NASA Astrophysics Data System (ADS)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  10. Beliefs About Sexual Intimate Partner Violence Perpetration Among Adolescents in South Africa.

    PubMed

    Pöllänen, Katri; de Vries, Hein; Mathews, Catherine; Schneider, Francine; de Vries, Petrus J

    2018-02-01

    Sexual intimate partner violence (IPV) is a public health problem worldwide. Research regarding beliefs about perpetrating sexual IPV is, however, limited. This study investigated attitudes, social influence, and self-efficacy beliefs and intentions toward perpetrating sexual IPV among Grade 8 adolescents ( M age = 13.73, SD = 1.04) in the Western Cape Province of South Africa. The study sample was taken from the baseline data of the Promoting sexual and reproductive health among adolescents in Southern and Eastern Africa (PREPARE) study, a cluster-randomized controlled trial. Young adolescents ( N = 2,199), from 42 randomly selected high schools, participated in the study and answered a paper-and-pencil questionnaire. Multivariate ANOVA were conducted to assess differences in beliefs and intention toward perpetrating sexual IPV between boys and girls, and between perpetrators and nonperpetrators. Results showed that boys were more frequently perpetrators (11.3% vs. 3.2%) and victims (13.6% vs. 6.4%) of sexual IPV than girls. Boys' attitudes toward perpetrating sexual IPV were more supportive than girls'. Boys perceived their social network to be more likely to think that putting pressure on a boyfriend or girlfriend to have sex is okay, and boys had a lower self-efficacy to refrain from pressuring a boyfriend or girlfriend to have sex compared with girls. Both boys and girls, who have perpetrated sexual IPV, had more tolerant attitude, social influence, and self-efficacy beliefs toward sexual IPV perpetration, compared with nonperpetrators. Intention not to perpetrate sexual IPV did not differ between boys and girls, or between perpetrators and nonperpetrators. Our findings suggest that interventions should address attitude and social influence beliefs regarding sexual IPV perpetration. More attention should be given to sexual IPV perpetration among boys. Given that sexual IPV victimization and perpetration are significantly linked, prevention of sexual IPV

  11. Gaussian Graphical Models Identify Networks of Dietary Intake in a German Adult Population.

    PubMed

    Iqbal, Khalid; Buijsse, Brian; Wirth, Janine; Schulze, Matthias B; Floegel, Anna; Boeing, Heiner

    2016-03-01

    Data-reduction methods such as principal component analysis are often used to derive dietary patterns. However, such methods do not assess how foods are consumed in relation to each other. Gaussian graphical models (GGMs) are a set of novel methods that can address this issue. We sought to apply GGMs to derive sex-specific dietary intake networks representing consumption patterns in a German adult population. Dietary intake data from 10,780 men and 16,340 women of the European Prospective Investigation into Cancer and Nutrition (EPIC)-Potsdam cohort were cross-sectionally analyzed to construct dietary intake networks. Food intake for each participant was estimated using a 148-item food-frequency questionnaire that captured the intake of 49 food groups. GGMs were applied to log-transformed intakes (grams per day) of 49 food groups to construct sex-specific food networks. Semiparametric Gaussian copula graphical models (SGCGMs) were used to confirm GGM results. In men, GGMs identified 1 major dietary network that consisted of intakes of red meat, processed meat, cooked vegetables, sauces, potatoes, cabbage, poultry, legumes, mushrooms, soup, and whole-grain and refined breads. For women, a similar network was identified with the addition of fried potatoes. Other identified networks consisted of dairy products and sweet food groups. SGCGMs yielded results comparable to those of GGMs. GGMs are a powerful exploratory method that can be used to construct dietary networks representing dietary intake patterns that reveal how foods are consumed in relation to each other. GGMs indicated an apparent major role of red meat intake in a consumption pattern in the studied population. In the future, identified networks might be transformed into pattern scores for investigating their associations with health outcomes. © 2016 American Society for Nutrition.

  12. Immunogenicity and safety of primary and booster vaccination with 2 investigational formulations of diphtheria, tetanus and Haemophilus influenzae type b antigens in a hexavalent DTPa-HBV-IPV/Hib combination vaccine in comparison with the licensed Infanrix hexa.

    PubMed

    Vesikari, Timo; Rivera, Luis; Korhonen, Tiina; Ahonen, Anitta; Cheuvart, Brigitte; Hezareh, Marjan; Janssens, Winnie; Mesaros, Narcisa

    2017-07-03

    Safety and immunogenicity of 2 investigational formulations of diphtheria, tetanus and Haemophilus influenzae type b antigens of the combined diphtheria-tetanus-acellular pertussis-hepatitis B-inactivated poliomyelitis-Hib vaccine (DTPa-HBV-IPV/Hib) were evaluated in a Primary (NCT01248884) and a Booster vaccination (NCT01453998) study. In the Primary study, 721 healthy infants (randomized 1:1:1) received 3 doses of DTPa-HBV-IPV/Hib formulation A (D A T A Pa-HBV-IPV/Hib), or B (D B T B Pa-HBV-IPV/Hib) or the licensed DTPa-HBV-IPV/Hib vaccine (Infanrix hexa, GSK; control group) at 2, 3, 4 months of age. Infants were planned to receive a booster dose at 12-15 months of age with the same formulation received in the Primary study; however, following high incidence of fever associated with the investigational formulations in the Primary study, the Booster study protocol was amended and all infants yet to receive a booster dose (N = 385) received the licensed vaccine. In the Primary study, non-inferiority of 3-dose vaccination with investigational formulations compared with the licensed vaccine was not demonstrated due to anti-pertactin failing to meet the non-inferiority criterion. Post-primary vaccination, most infants had seroprotective levels of anti-diphtheria (100% of infants), anti-tetanus antigens (100%), against hepatitis B (≥ 97.5% across groups), polyribosyl-ribitol-phosphate (≥ 88.0%) and poliovirus types 1-3 (≥ 90.5%). Seropositivity rates for each pertussis antigen were 100% in all groups. Higher incidence of fever (> 38°C) was reported in infants receiving the investigational formulations (Primary study: 75.0% [A] and 72.1% [B] vs 58.8% [control]; Booster study, before amendment: 49.4% and 46.6% vs 37.4%, respectively). The development of the investigational formulations was not further pursued.

  13. Immunogenicity and safety of primary and booster vaccination with 2 investigational formulations of diphtheria, tetanus and Haemophilus influenzae type b antigens in a hexavalent DTPa-HBV-IPV/Hib combination vaccine in comparison with the licensed Infanrix hexa

    PubMed Central

    Vesikari, Timo; Rivera, Luis; Korhonen, Tiina; Ahonen, Anitta; Cheuvart, Brigitte; Hezareh, Marjan; Janssens, Winnie; Mesaros, Narcisa

    2017-01-01

    ABSTRACT Safety and immunogenicity of 2 investigational formulations of diphtheria, tetanus and Haemophilus influenzae type b antigens of the combined diphtheria-tetanus-acellular pertussis-hepatitis B-inactivated poliomyelitis-Hib vaccine (DTPa-HBV-IPV/Hib) were evaluated in a Primary (NCT01248884) and a Booster vaccination (NCT01453998) study. In the Primary study, 721 healthy infants (randomized 1:1:1) received 3 doses of DTPa-HBV-IPV/Hib formulation A (DATAPa-HBV-IPV/Hib), or B (DBTBPa-HBV-IPV/Hib) or the licensed DTPa-HBV-IPV/Hib vaccine (Infanrix hexa, GSK; control group) at 2, 3, 4 months of age. Infants were planned to receive a booster dose at 12–15 months of age with the same formulation received in the Primary study; however, following high incidence of fever associated with the investigational formulations in the Primary study, the Booster study protocol was amended and all infants yet to receive a booster dose (N = 385) received the licensed vaccine. In the Primary study, non-inferiority of 3-dose vaccination with investigational formulations compared with the licensed vaccine was not demonstrated due to anti-pertactin failing to meet the non-inferiority criterion. Post-primary vaccination, most infants had seroprotective levels of anti-diphtheria (100% of infants), anti-tetanus antigens (100%), against hepatitis B (≥ 97.5% across groups), polyribosyl-ribitol-phosphate (≥ 88.0%) and poliovirus types 1–3 (≥ 90.5%). Seropositivity rates for each pertussis antigen were 100% in all groups. Higher incidence of fever (> 38°C) was reported in infants receiving the investigational formulations (Primary study: 75.0% [A] and 72.1% [B] vs 58.8% [control]; Booster study, before amendment: 49.4% and 46.6% vs 37.4%, respectively). The development of the investigational formulations was not further pursued. PMID:28340322

  14. Effectively identifying user profiles in network and host metrics

    NASA Astrophysics Data System (ADS)

    Murphy, John P.; Berk, Vincent H.; Gregorio-de Souza, Ian

    2010-04-01

    This work presents a collection of methods that is used to effectively identify users of computers systems based on their particular usage of the software and the network. Not only are we able to identify individual computer users by their behavioral patterns, we are also able to detect significant deviations in their typical computer usage over time, or compared to a group of their peers. For instance, most people have a small, and relatively unique selection of regularly visited websites, certain email services, daily work hours, and typical preferred applications for mandated tasks. We argue that these habitual patterns are sufficiently specific to identify fully anonymized network users. We demonstrate that with only a modest data collection capability, profiles of individual computer users can be constructed so as to uniquely identify a profiled user from among their peers. As time progresses and habits or circumstances change, the methods presented update each profile so that changes in user behavior can be reliably detected over both abrupt and gradual time frames, without losing the ability to identify the profiled user. The primary benefit of our methodology allows one to efficiently detect deviant behaviors, such as subverted user accounts, or organizational policy violations. Thanks to the relative robustness, these techniques can be used in scenarios with very diverse data collection capabilities, and data privacy requirements. In addition to behavioral change detection, the generated profiles can also be compared against pre-defined examples of known adversarial patterns.

  15. Early Cerebellar Network Shifting in Spinocerebellar Ataxia Type 6

    PubMed Central

    Falcon, M.I.; Gomez, C.M.; Chen, E.E.; Shereen, A.; Solodkin, A.

    2016-01-01

    Spinocerebellar ataxia 6 (SCA6), an autosomal dominant degenerative disease, is characterized by diplopia, gait ataxia, and incoordination due to severe progressive degeneration of Purkinje cells in the vestibulo- and spinocerebellum. Ocular motor deficits are common, including difficulty fixating on moving objects, nystagmus and disruption of smooth pursuit movements. In presymptomatic SCA6, there are alterations in saccades and smooth-pursuit movements. We sought to assess functional and structural changes in cerebellar connectivity associated with a visual task, hypothesizing that gradual changes would parallel disease progression. We acquired functional magnetic resonance imaging and diffusion tensor imaging data during a passive smooth-pursuit task in 14 SCA6 patients, representing a range of disease duration and severity, and performed a cross-sectional comparison of cerebellar networks compared with healthy controls. We identified a shift in activation from vermis in presymptomatic individuals to lateral cerebellum in moderate-to-severe cases. Concomitantly, effective connectivity between regions of cerebral cortex and cerebellum was at its highest in moderate cases, and disappeared in severe cases. Finally, we noted structural differences in the cerebral and cerebellar peduncles. These unique results, spanning both functional and structural domains, highlight widespread changes in SCA6 and compensatory mechanisms associated with cerebellar physiology that could be utilized in developing new therapies. PMID:26209844

  16. Advanced development and calibration of the network robustness index to identify critical road network links.

    DOT National Transportation Integrated Search

    2010-05-31

    In this research project, transportation flexibility and reliability concepts are extended and applied : to a new method for identifying the most critical links in a road network. Current transportation : management practices typically utilize locali...

  17. Computationally identified novel agonists for GPRC6A

    PubMed Central

    Ye, Ruisong; Hwang, Dong-Jin; Miller, Duane D.; Smith, Jeremy C.; Baudry, Jerome; Quarles, L. Darryl

    2018-01-01

    New insights into G protein coupled receptor regulation of glucose metabolism by β-cells, skeletal muscle and liver hepatocytes identify GPRC6A as a potential therapeutic target for treating type 2 diabetes mellitus (T2D). Activating GPRC6A with a small molecule drug represents a potential paradigm-shifting opportunity to make significant strides in regulating glucose homeostasis by simultaneously correcting multiple metabolic derangements that underlie T2D, including abnormalities in β-cell proliferation and insulin secretion and peripheral insulin resistance. Using a computational, structure-based high-throughput screening approach, we identified novel tri-phenyl compounds predicted to bind to the venus fly trap (VFT) and 7-transmembrane (7-TM) domains of GPRC6A. Experimental testing found that these compounds dose-dependently stimulated GPRC6A signaling in a heterologous cell expression system. Additional chemical modifications and functional analysis identified one tri-phenyl lead compound, DJ-V-159 that demonstrated the greatest potency in stimulating insulin secretion in β-cells and lowering serum glucose in wild-type mice. Collectively, these studies show that GPRC6A is a “druggable” target for developing chemical probes to treat T2DM. PMID:29684031

  18. Identifying novel genes and chemicals related to nasopharyngeal cancer in a heterogeneous network.

    PubMed

    Li, Zhandong; An, Lifeng; Li, Hao; Wang, ShaoPeng; Zhou, You; Yuan, Fei; Li, Lin

    2016-05-05

    Nasopharyngeal cancer or nasopharyngeal carcinoma (NPC) is the most common cancer originating in the nasopharynx. The factors that induce nasopharyngeal cancer are still not clear. Additional information about the chemicals or genes related to nasopharyngeal cancer will promote a better understanding of the pathogenesis of this cancer and the factors that induce it. Thus, a computational method NPC-RGCP was proposed in this study to identify the possible relevant chemicals and genes based on the presently known chemicals and genes related to nasopharyngeal cancer. To extensively utilize the functional associations between proteins and chemicals, a heterogeneous network was constructed based on interactions of proteins and chemicals. The NPC-RGCP included two stages: the searching stage and the screening stage. The former stage is for finding new possible genes and chemicals in the heterogeneous network, while the latter stage is for screening and removing false discoveries and selecting the core genes and chemicals. As a result, five putative genes, CXCR3, IRF1, CDK1, GSTP1, and CDH2, and seven putative chemicals, iron, propionic acid, dimethyl sulfoxide, isopropanol, erythrose 4-phosphate, β-D-Fructose 6-phosphate, and flavin adenine dinucleotide, were identified by NPC-RGCP. Extensive analyses provided confirmation that the putative genes and chemicals have significant associations with nasopharyngeal cancer.

  19. Identifying novel genes and chemicals related to nasopharyngeal cancer in a heterogeneous network

    PubMed Central

    Li, Zhandong; An, Lifeng; Li, Hao; Wang, ShaoPeng; Zhou, You; Yuan, Fei; Li, Lin

    2016-01-01

    Nasopharyngeal cancer or nasopharyngeal carcinoma (NPC) is the most common cancer originating in the nasopharynx. The factors that induce nasopharyngeal cancer are still not clear. Additional information about the chemicals or genes related to nasopharyngeal cancer will promote a better understanding of the pathogenesis of this cancer and the factors that induce it. Thus, a computational method NPC-RGCP was proposed in this study to identify the possible relevant chemicals and genes based on the presently known chemicals and genes related to nasopharyngeal cancer. To extensively utilize the functional associations between proteins and chemicals, a heterogeneous network was constructed based on interactions of proteins and chemicals. The NPC-RGCP included two stages: the searching stage and the screening stage. The former stage is for finding new possible genes and chemicals in the heterogeneous network, while the latter stage is for screening and removing false discoveries and selecting the core genes and chemicals. As a result, five putative genes, CXCR3, IRF1, CDK1, GSTP1, and CDH2, and seven putative chemicals, iron, propionic acid, dimethyl sulfoxide, isopropanol, erythrose 4-phosphate, β-D-Fructose 6-phosphate, and flavin adenine dinucleotide, were identified by NPC-RGCP. Extensive analyses provided confirmation that the putative genes and chemicals have significant associations with nasopharyngeal cancer. PMID:27149165

  20. Identifying Node Role in Social Network Based on Multiple Indicators

    PubMed Central

    Huang, Shaobin; Lv, Tianyang; Zhang, Xizhe; Yang, Yange; Zheng, Weimin; Wen, Chao

    2014-01-01

    It is a classic topic of social network analysis to evaluate the importance of nodes and identify the node that takes on the role of core or bridge in a network. Because a single indicator is not sufficient to analyze multiple characteristics of a node, it is a natural solution to apply multiple indicators that should be selected carefully. An intuitive idea is to select some indicators with weak correlations to efficiently assess different characteristics of a node. However, this paper shows that it is much better to select the indicators with strong correlations. Because indicator correlation is based on the statistical analysis of a large number of nodes, the particularity of an important node will be outlined if its indicator relationship doesn't comply with the statistical correlation. Therefore, the paper selects the multiple indicators including degree, ego-betweenness centrality and eigenvector centrality to evaluate the importance and the role of a node. The importance of a node is equal to the normalized sum of its three indicators. A candidate for core or bridge is selected from the great degree nodes or the nodes with great ego-betweenness centrality respectively. Then, the role of a candidate is determined according to the difference between its indicators' relationship with the statistical correlation of the overall network. Based on 18 real networks and 3 kinds of model networks, the experimental results show that the proposed methods perform quite well in evaluating the importance of nodes and in identifying the node role. PMID:25089823

  1. Faculty Use of Author Identifiers and Researcher Networking Tools

    ERIC Educational Resources Information Center

    Tran, Clara Y.; Lyon, Jennifer A.

    2017-01-01

    This cross-sectional survey focused on faculty use and knowledge of author identifiers and researcher networking systems, and professional use of social media, at a large state university. Results from 296 completed faculty surveys representing all disciplines (9.3% response rate) show low levels of awareness and variable resource preferences. The…

  2. 'Difficulties come to humans and not trees and they need to be faced': a study on resilience among Indian women experiencing intimate partner violence.

    PubMed

    Shanthakumari, R Shobitha; Chandra, Prabha S; Riazantseva, Ekaterina; Stewart, Donna E

    2014-11-01

    Not much is known about factors that contribute to resilience among women facing intimate partner violence (IPV), particularly from countries where patriarchy predominates. This qualitative study aimed to gather the perspectives of Indian women self-identified as resilient in the face of IPV and tried to understand the strategies and resources that helped them to maintain or regain resilience. Data were collected from 16 consenting women who reported IPV and whose husbands were being treated for alcohol problems at a psychiatric centre in Bangalore, India. A semi-structured guided interview format that aimed at understanding factors that enabled them to feel resilient despite IPV in their challenging circumstances was used to gather narratives from the participants. Six themes were identified using QSR NVivo software. They were as follows: the support of women, men and family; personal attributes; dignity and work; being strong for the children; and faith in God. Among these women, supportive social networks, personal attributes and aspirations were major clusters contributing to resilience. Attention to these factors may provide an important, strengths-based perspective for interventions to enhance women's resilience when facing IPV. © The Author(s) 2013.

  3. ICan: an integrated co-alteration network to identify ovarian cancer-related genes.

    PubMed

    Zhou, Yuanshuai; Liu, Yongjing; Li, Kening; Zhang, Rui; Qiu, Fujun; Zhao, Ning; Xu, Yan

    2015-01-01

    Over the last decade, an increasing number of integrative studies on cancer-related genes have been published. Integrative analyses aim to overcome the limitation of a single data type, and provide a more complete view of carcinogenesis. The vast majority of these studies used sample-matched data of gene expression and copy number to investigate the impact of copy number alteration on gene expression, and to predict and prioritize candidate oncogenes and tumor suppressor genes. However, correlations between genes were neglected in these studies. Our work aimed to evaluate the co-alteration of copy number, methylation and expression, allowing us to identify cancer-related genes and essential functional modules in cancer. We built the Integrated Co-alteration network (ICan) based on multi-omics data, and analyzed the network to uncover cancer-related genes. After comparison with random networks, we identified 155 ovarian cancer-related genes, including well-known (TP53, BRCA1, RB1 and PTEN) and also novel cancer-related genes, such as PDPN and EphA2. We compared the results with a conventional method: CNAmet, and obtained a significantly better area under the curve value (ICan: 0.8179, CNAmet: 0.5183). In this paper, we describe a framework to find cancer-related genes based on an Integrated Co-alteration network. Our results proved that ICan could precisely identify candidate cancer genes and provide increased mechanistic understanding of carcinogenesis. This work suggested a new research direction for biological network analyses involving multi-omics data.

  4. An Novel Architecture of Large-scale Communication in IOT

    NASA Astrophysics Data System (ADS)

    Ma, Wubin; Deng, Su; Huang, Hongbin

    2018-03-01

    In recent years, many scholars have done a great deal of research on the development of Internet of Things and networked physical systems. However, few people have made the detailed visualization of the large-scale communications architecture in the IOT. In fact, the non-uniform technology between IPv6 and access points has led to a lack of broad principles of large-scale communications architectures. Therefore, this paper presents the Uni-IPv6 Access and Information Exchange Method (UAIEM), a new architecture and algorithm that addresses large-scale communications in the IOT.

  5. Immunogenicity, Safety and Reactogenicity of a Booster Dose of the 10-Valent Pneumococcal Nontypeable H. influenzae Protein D Conjugate Vaccine Coadministered With DTPa-IPV-Hib in Dutch Children: A Randomized Controlled Trial.

    PubMed

    van den Bergh, Menno R; Spijkerman, Judith; François, Nancy; Swinnen, Kristien; Borys, Dorota; Schuerman, Lode; Veenhoven, Reinier H; Sanders, Elisabeth A M

    2016-07-01

    Immune responses and safety profiles may be affected when vaccines are coadministered. We evaluated the immunogenicity, safety and reactogenicity of a booster dose of the 10-valent pneumococcal nontypeable Haemophilus influenzae protein D-conjugate (PHiD-CV; Synflorix GSK Vaccines) and DTPa-IPV-Hib (Pediacel Sanofi Pasteur MSD) when coadministered. We performed booster assessment in a randomized controlled trial in the Netherlands. Of 780 enrolled healthy infants, 774 toddlers participated in the booster phase and received (1:1:1) (1) PHiD-CV + DTPa-HBV-IPV/Hib (Infanrix hexa, GSK Vaccines), (2) PHiD-CV + DTPa-IPV-Hib, or (3) 7-valent pneumococcal conjugate vaccine (7vCRM, Prevenar/Prevnar, Pfizer, Inc.) + DTPa-IPV-Hib at 2, 3, 4 and 11-13 months old. Blood samples were taken postprimary, prebooster, 1 and 12 months postbooster. Antipneumococcal antibody responses were comparable between both PHiD-CV groups, except for serotype 18C (conjugated to tetanus toxoid). Anti-18C antibody geometric mean concentrations (GMCs) were higher when coadministered with DTPa-HBV-IPV/Hib. For each vaccine serotype, the percentages of children with antibody concentration ≥ 0.20 μg/mL were within the same ranges between PHiD-CV groups (93.8%-100%). The same was observed for the percentages of participants with opsonophagocytic activity titer ≥ 8 (90.9%-100%). When comparing both DTPa-IPV-Hib groups, postbooster antidiphtheria antibody GMCs were higher when coadministered with 7vCRM, while antitetanus and antipolyribosyl-ribitol phosphate antibody GMCs were higher with PHiD-CV coadministration. Regardless, antibody levels to these antigens were well above thresholds. Safety and reactogenicity profiles were comparable between groups. Coadministration of a booster dose of PHiD-CV and DTPa-IPV-Hib was immunogenic and well tolerated.

  6. Identifying network representation issues with the network trip.

    DOT National Transportation Integrated Search

    2012-04-23

    The purpose of this study was to evaluate the effects of road-network representation on the application of the Network Robustness Index (NRI), using the Chittenden County Regional Transportation Model. The results are expected to improve the requirem...

  7. Identifying protein complexes in PPI network using non-cooperative sequential game.

    PubMed

    Maulik, Ujjwal; Basu, Srinka; Ray, Sumanta

    2017-08-21

    Identifying protein complexes from protein-protein interaction (PPI) network is an important and challenging task in computational biology as it helps in better understanding of cellular mechanisms in various organisms. In this paper we propose a noncooperative sequential game based model for protein complex detection from PPI network. The key hypothesis is that protein complex formation is driven by mechanism that eventually optimizes the number of interactions within the complex leading to dense subgraph. The hypothesis is drawn from the observed network property named small world. The proposed multi-player game model translates the hypothesis into the game strategies. The Nash equilibrium of the game corresponds to a network partition where each protein either belong to a complex or form a singleton cluster. We further propose an algorithm to find the Nash equilibrium of the sequential game. The exhaustive experiment on synthetic benchmark and real life yeast networks evaluates the structural as well as biological significance of the network partitions.

  8. Identifying familiar strangers in human encounter networks

    NASA Astrophysics Data System (ADS)

    Liang, Di; Li, Xiang; Zhang, Yi-Qing

    2016-10-01

    Familiar strangers, pairs of individuals who encounter repeatedly but never know each other, have been discovered for four decades yet lack an effective method to identify. Here we propose a novel method called familiar stranger classifier (FSC) to identify familiar strangers from three empirical datasets, and classify human relationships into four types, i.e., familiar stranger (FS), in-role (IR), friend (F) and stranger (S). The analyses of the human encounter networks show that the average number of FS one may encounter is finite but larger than the Dunbar Number, and their encounters are structurally more stable and denser than those of S, indicating the encounters of FS are not limited by the social capacity, and more robust than the random scenario. Moreover, the temporal statistics of encounters between FS over the whole time span show strong periodicity, which are diverse from the bursts of encounters within one day, suggesting the significance of longitudinal patterns of human encounters. The proposed method to identify FS in this paper provides a valid framework to understand human encounter patterns and analyse complex human social behaviors.

  9. Priorities for research in child maltreatment, intimate partner violence and resilience to violence exposures: results of an international Delphi consensus development process.

    PubMed

    Wathen, C Nadine; MacGregor, Jennifer C D; Hammerton, Joanne; Coben, Jeffrey H; Herrman, Helen; Stewart, Donna E; MacMillan, Harriet L

    2012-08-21

    Intimate partner violence (IPV) and child maltreatment (CM) are major global public health problems. The Preventing Violence Across the Lifespan (PreVAiL) Research Network, an international group of over 60 researchers and national and international knowledge-user partners in CM and IPV, sought to identify evidence-based research priorities in IPV and CM, with a focus on resilience, using a modified Delphi consensus development process. Review of existing empirical evidence, PreVAiL documents and team discussion identified a starting list of 20 priorities in the following categories: resilience to violence exposure (RES), CM, and IPV, as well as priorities that cross-cut the content areas (CC), and others specific to research methodologies (RM) in violence research. PreVAiL members (N = 47) completed two online survey rounds, and one round of discussions via three teleconference calls to rate, rank and refine research priorities. Research priorities were: to examine key elements of promising or successful programmes in RES/CM/IPV to build intervention pilot work; CC: to integrate violence questions into national and international surveys, and RM: to investigate methods for collecting and collating datasets to link data and to conduct pooled, meta and sub-group analyses to identify promising interventions for particular groups. These evidence-based research priorities, developed by an international team of violence, gender and mental health researchers and knowledge-user partners, are of relevance for prevention and resilience-oriented research in the areas of IPV and CM.

  10. Mother's IPV, Child Maltreatment Type and the Presence of PTSD in Children and Adolescents.

    PubMed

    Castro, Maravillas; Alcántara-López, Mavi; Martínez, Antonia; Fernández, Visitación; Sánchez-Meca, Julio; López-Soler, Concepción

    2017-09-17

    This correlational cross-sectional study was designed to investigate whether the intimate partner violence (IPV) suffered by mothers (physical and psychological maltreatment), child eyewitness of psychological and physical maltreatment suffered by the mother, the neglect suffered by children, and the maltreatment (physical and psychological) directly suffered by children are statistically associated to post-traumatic stress disorder (PTSD) symptoms exhibited by the child. In addition, the prevalence of child PTSD was estimated, as well as the concordance between the PTSD symptoms assessed by the Child PTSD Symptom Scale (CPSS) and the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR) criteria for child PTSD. The sample consisted of 152 Spanish children aged 8 to 17 and their mothers, who were recruited from Centers of Specialized Assistance for Women Victims of IPV. PTSD prevalence was 20.4%. The results of a canonical correlation analysis showed that the two types of maltreatment with the largest contribution to the canonical variable were physical maltreatment directly suffered by the child, and child eyewitness of physical maltreatment suffered by the mother. The potential developmental pathway of PTSD when both children and mothers suffer severe maltreatment needs to be examined, and this will contribute to the choice of the most effective type of specialized intervention.

  11. A network analysis of the Chinese medicine Lianhua-Qingwen formula to identify its main effective components.

    PubMed

    Wang, Chun-Hua; Zhong, Yi; Zhang, Yan; Liu, Jin-Ping; Wang, Yue-Fei; Jia, Wei-Na; Wang, Guo-Cai; Li, Zheng; Zhu, Yan; Gao, Xiu-Mei

    2016-02-01

    Chinese medicine is known to treat complex diseases with multiple components and multiple targets. However, the main effective components and their related key targets and functions remain to be identified. Herein, a network analysis method was developed to identify the main effective components and key targets of a Chinese medicine, Lianhua-Qingwen Formula (LQF). The LQF is commonly used for the prevention and treatment of viral influenza in China. It is composed of 11 herbs, gypsum and menthol with 61 compounds being identified in our previous work. In this paper, these 61 candidate compounds were used to find their related targets and construct the predicted-target (PT) network. An influenza-related protein-protein interaction (PPI) network was constructed and integrated with the PT network. Then the compound-effective target (CET) network and compound-ineffective target network (CIT) were extracted, respectively. A novel approach was developed to identify effective components by comparing CET and CIT networks. As a result, 15 main effective components were identified along with 61 corresponding targets. 7 of these main effective components were further experimentally validated to have antivirus efficacy in vitro. The main effective component-target (MECT) network was further constructed with main effective components and their key targets. Gene Ontology (GO) analysis of the MECT network predicted key functions such as NO production being modulated by the LQF. Interestingly, five effective components were experimentally tested and exhibited inhibitory effects on NO production in the LPS induced RAW 264.7 cell. In summary, we have developed a novel approach to identify the main effective components in a Chinese medicine LQF and experimentally validated some of the predictions.

  12. Gender-specific mortality in DTP-IPV- and MMR±MenC-eligible age groups to determine possible sex-differential effects of vaccination: an observational study.

    PubMed

    Schurink-van't Klooster, Tessa M; Knol, Mirjam J; de Melker, Hester E; van der Sande, Marianne A B

    2015-03-24

    Several studies suggested that vaccines could have non-specific effects on mortality depending on the type of vaccine. Non-specific effects seem to be different in boys and girls. In this study we want to investigate whether there are differences in gender-specific mortality among Dutch children according to the last vaccination received. We tested the hypothesis that the mortality rate ratio for girls versus boys is more favourable for girls following MMR±MenC vaccination (from 14 months of age) compared with the ratio following DTP-IPV vaccination (2-13 months of age). Secondarily, we investigated whether there were gender-specific changes in mortality following booster vaccination at 4 years of age. This observational study included all Dutch children aged 0-11 years from 2000 until 2011. Age groups were classified according to the last vaccination offered. The mortality rates for all natural causes of death were calculated by gender and age group. Incidence rate ratios (IRRs) were computed using a multivariable Poisson analysis to compare mortality in boys and girls across different age groups. The study population consisted of 6,261,472 children. During the study period, 14,038 children (0.22%) died, 91% of which were attributed to a known natural cause of death. The mortality rate for natural causes was higher among boys than girls in all age groups. Adjusted IRRs for girls compared with boys ranged between 0.81 (95% CI 0.74-0.89) and 0.91 (95% CI 0.77-1.07) over the age groups. The IRR did not significantly differ between all vaccine-related age groups (p=0.723), between children 2-13 months (following DTP-IPV vaccination) and 14 months-3 years (following MMR±MenC vaccination) (p=0.493) and between children 14 months-3 years and 4-8 years old (following DTP-IPV vaccination) (p=0.868). In the Netherlands, a high income country, no differences in gender-specific mortality related to the type of last vaccination received were observed in DTP-IPV- and MMR

  13. Identifying a set of influential spreaders in complex networks

    NASA Astrophysics Data System (ADS)

    Zhang, Jian-Xiong; Chen, Duan-Bing; Dong, Qiang; Zhao, Zhi-Dan

    2016-06-01

    Identifying a set of influential spreaders in complex networks plays a crucial role in effective information spreading. A simple strategy is to choose top-r ranked nodes as spreaders according to influence ranking method such as PageRank, ClusterRank and k-shell decomposition. Besides, some heuristic methods such as hill-climbing, SPIN, degree discount and independent set based are also proposed. However, these approaches suffer from a possibility that some spreaders are so close together that they overlap sphere of influence or time consuming. In this report, we present a simply yet effectively iterative method named VoteRank to identify a set of decentralized spreaders with the best spreading ability. In this approach, all nodes vote in a spreader in each turn, and the voting ability of neighbors of elected spreader will be decreased in subsequent turn. Experimental results on four real networks show that under Susceptible-Infected-Recovered (SIR) and Susceptible-Infected (SI) models, VoteRank outperforms the traditional benchmark methods on both spreading rate and final affected scale. What’s more, VoteRank has superior computational efficiency.

  14. Identifying a system of predominant negative symptoms: Network analysis of three randomized clinical trials.

    PubMed

    Levine, Stephen Z; Leucht, Stefan

    2016-12-01

    Reasons for the recent mixed success of research into negative symptoms may be informed by conceptualizing negative symptoms as a system that is identifiable from network analysis. We aimed to identify: (I) negative symptom systems; (I) central negative symptoms within each system; and (III) differences between the systems, based on network analysis of negative symptoms for baseline, endpoint and change. Patients with chronic schizophrenia and predominant negative symptoms participated in three clinical trials that compared placebo and amisulpride to 60days (n=487). Networks analyses were computed from the Scale for the Assessment of Negative Symptoms (SANS) scores for baseline and endpoint for severity, and estimated change based on mixed models. Central symptoms to each network were identified. The networks were contrasted for connectivity with permutation tests. Network analysis showed that the baseline and endpoint symptom severity systems formed symptom groups of Affect, Poor responsiveness, Lack of interest, and Apathy-inattentiveness. The baseline and endpoint networks did not significantly differ in terms of connectivity, but both significantly (P<0.05) differed to the change network. In the change network the apathy-inattentiveness symptom group split into three other groups. The most central symptoms were Decreased Spontaneous Movements at baseline and endpoint, and Poverty of Speech for estimated change. Results provide preliminary evidence for: (I) a replicable negative symptom severity system; and (II) symptoms with high centrality (e.g., Decreased Spontaneous Movement), that may be future treatment targets following replication to ensure the curent results generalize to other samples. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. Identifying Gatekeepers in Online Learning Networks

    ERIC Educational Resources Information Center

    Gursakal, Necmi; Bozkurt, Aras

    2017-01-01

    The rise of the networked society has not only changed our perceptions but also the definitions, roles, processes and dynamics of online learning networks. From offline to online worlds, networks are everywhere and gatekeepers are an important entity in these networks. In this context, the purpose of this paper is to explore gatekeeping and…

  16. ICan: An Integrated Co-Alteration Network to Identify Ovarian Cancer-Related Genes

    PubMed Central

    Zhou, Yuanshuai; Liu, Yongjing; Li, Kening; Zhang, Rui; Qiu, Fujun; Zhao, Ning; Xu, Yan

    2015-01-01

    Background Over the last decade, an increasing number of integrative studies on cancer-related genes have been published. Integrative analyses aim to overcome the limitation of a single data type, and provide a more complete view of carcinogenesis. The vast majority of these studies used sample-matched data of gene expression and copy number to investigate the impact of copy number alteration on gene expression, and to predict and prioritize candidate oncogenes and tumor suppressor genes. However, correlations between genes were neglected in these studies. Our work aimed to evaluate the co-alteration of copy number, methylation and expression, allowing us to identify cancer-related genes and essential functional modules in cancer. Results We built the Integrated Co-alteration network (ICan) based on multi-omics data, and analyzed the network to uncover cancer-related genes. After comparison with random networks, we identified 155 ovarian cancer-related genes, including well-known (TP53, BRCA1, RB1 and PTEN) and also novel cancer-related genes, such as PDPN and EphA2. We compared the results with a conventional method: CNAmet, and obtained a significantly better area under the curve value (ICan: 0.8179, CNAmet: 0.5183). Conclusion In this paper, we describe a framework to find cancer-related genes based on an Integrated Co-alteration network. Our results proved that ICan could precisely identify candidate cancer genes and provide increased mechanistic understanding of carcinogenesis. This work suggested a new research direction for biological network analyses involving multi-omics data. PMID:25803614

  17. Identifying Jets Using Artifical Neural Networks

    NASA Astrophysics Data System (ADS)

    Rosand, Benjamin; Caines, Helen; Checa, Sofia

    2017-09-01

    We investigate particle jet interactions with the Quark Gluon Plasma (QGP) using artificial neural networks modeled on those used in computer image recognition. We create jet images by binning jet particles into pixels and preprocessing every image. We analyzed the jets with a Multi-layered maxout network and a convolutional network. We demonstrate each network's effectiveness in differentiating simulated quenched jets from unquenched jets, and we investigate the method that the network uses to discriminate among different quenched jet simulations. Finally, we develop a greater understanding of the physics behind quenched jets by investigating what the network learnt as well as its effectiveness in differentiating samples. Yale College Freshman Summer Research Fellowship in the Sciences and Engineering.

  18. Extensive swelling of the limb and systemic symptoms after a fourth dose of acellular pertussis containing vaccines in England in children aged 3-6years.

    PubMed

    Southern, Jo; Waight, Pauline A; Andrews, Nick; Miller, Elizabeth

    2017-01-23

    Extensive limb swelling (ESL) after a booster dose of acellular pertussis (aP) containing vaccine can cause concern and has the potential to be confused with cellulitis. In the United Kingdom aP-containing vaccine was introduced for primary immunisation at 2, 3 and 4months of age in 2004, with the first cohorts eligible to receive a fourth dose in 2007 at school entry. We assessed the frequency of ESL (here defined as swelling >100mms diameter) in 973 children receiving a fourth dose of one of four aP vaccines given combined with inactivated polio, tetanus and either low dose diphtheria (TdaP/IPV) or high dose diphtheria (DTaP/IPV) vaccine; 2 of the 3 DTaP/IPV vaccines also contained Haemophilus influenza b conjugate vaccine (Hib). Post-vaccination symptoms and local reactions were recorded in 7-day diaries or by a telephone follow up if no diary was returned. Local swellings >50mm diameter were reported by 2.2% TdaP/IPV recipients compared with 6.6-11.1% of DTaP/IPV recipients; the corresponding proportions for redness >50mms was 7.0% for TdaP/IPV and 13.3-17.7% for DTaP/IPV recipients. Among the latter, the addition of Hib did not affect the frequency or size of local reactions. Pain at the injection site and systemic symptoms did not differ between the four vaccine groups. A history of atopy was not associated with development of local swelling or redness. A total of 13 children (1.3%) experienced an ESL, three after TdaP/IPV. ESLs resolved without systemic upset within a few days and were usually painless; medical advice was only sought for two children. Parents should be informed about the possible occurrence of an ESL with the pre-school aP-containing booster vaccine but can be reassured that it is a benign and transient condition. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Immunogenicity and Safety of a Booster Injection of DTap-IPV//Hib (Pentaxim) Administered Concomitantly With Tetravalent Dengue Vaccine in Healthy Toddlers 15-18 Months of Age in Mexico: A Randomized Trial.

    PubMed

    Melo, Flor Irene Rodriguez; Morales, José Juan Renteria; De Los Santos, Abiel Homero Mascareñas; Rivas, Enrique; Vigne, Claire; Noriega, Fernando

    2017-06-01

    The live, attenuated, tetravalent dengue vaccine (CYD-TDV) is licensed in a number of dengue endemic countries for individuals ≥9 years of age. Before the integration of any vaccine into childhood vaccination schedules, a lack of immune interference and acceptable safety when coadministered with other recommended vaccines should be demonstrated. This randomized, multi-center phase III trial was conducted in Mexico. Healthy toddlers (n = 732) received a booster dose of a licensed pentavalent combination vaccine [diphtheria, tetanus, acellular pertussis, inactivated polio vaccine and Haemophilus influenzae type b (DTaP-IPV//Hib)] either concomitantly or sequentially, with the second dose of CYD-TDV administered as a 3-dose schedule. Antibody titers against diphtheria toxoid, tetanus toxoid and pertussis antigens were measured by enzyme-linked immunosorbent assay. Antibodies against poliovirus and dengue serotypes were measured using a plaque reduction neutralization test. Noninferiority was demonstrated for each of the DTaP-IPV//Hib antigens if the lower limit of the 2-sided 95% confidence interval of the difference in seroconversion rates between the 2 groups (CYD-TDV and placebo) was ≥10%. Safety of both vaccines was assessed. Noninferiority in immune response was demonstrated for all DTaP-IPV//Hib antigens. After 3 doses of CYD-TDV, no difference was observed in the immune response for CYD-TDV between groups. There were no safety concerns during the study. Coadministration of the DTaP-IPV//Hib booster vaccine with CYD-TDV has no observed impact on the immunogenicity or safety profile of the DTaP-IPV//Hib booster vaccine. No difference was observed on the CYD-TDV profile when administered concomitantly or sequentially with the DTaP-IPV//Hib booster vaccine.

  20. TimeXNet Web: Identifying cellular response networks from diverse omics time-course data.

    PubMed

    Tan, Phit Ling; López, Yosvany; Nakai, Kenta; Patil, Ashwini

    2018-05-14

    Condition-specific time-course omics profiles are frequently used to study cellular response to stimuli and identify associated signaling pathways. However, few online tools allow users to analyze multiple types of high-throughput time-course data. TimeXNet Web is a web server that extracts a time-dependent gene/protein response network from time-course transcriptomic, proteomic or phospho-proteomic data, and an input interaction network. It classifies the given genes/proteins into time-dependent groups based on the time of their highest activity and identifies the most probable paths connecting genes/proteins in consecutive groups. The response sub-network is enriched in activated genes/proteins and contains novel regulators that do not show any observable change in the input data. Users can view the resultant response network and analyze it for functional enrichment. TimeXNet Web supports the analysis of high-throughput data from multiple species by providing high quality, weighted protein-protein interaction networks for 12 model organisms. http://txnet.hgc.jp/. ashwini@hgc.jp. Supplementary data are available at Bioinformatics online.

  1. Emerging Fabric of Science: Persistent Identifiers and Knowledge Networks

    NASA Astrophysics Data System (ADS)

    Hugo, W.

    2017-12-01

    There is an increasing emphasis on the use of persistent identifiers in the description of scientific activity, whether this is done to cite scholarly publications and research output, reliably identify role players such as funders and researchers, or to provide long-lasting references to controlled vocabulary. The ICSU World Data System has been promoting the establishment of a "Knowledge Network" to describe research activity, realising that parts of the network will be established as a federated `system', based on linkages between registries of persistent identifiers. In addition, there is a growing focus on not only the relationship between these major role players and associated digital objects, but also on the processes of science: provenance, reproducibility, and re-usability being significant topics of discussion. The paper will focus on description of the `Fabric of Science' from the perspectives of both structure and processes, review the state of implementation of real services and infrastructure in support of it. A case is made for inclusion of persistent identifiers into the mainstream activities of scientists and data infrastructure managers, and for the development of services, such as Scholix, to make better use of the relationships between digital objects and major role players. A proposal is made for the adoption of a federated system of services that are based on a hybrid graph-object framework similar to Scholix for recording the activity of scientific research. Finally, links to related ideas are explored: novel ways of representing of knowledge (such as Nanopublications) and the possibility that the publication paradigm currently in use may have to be amended.

  2. Identifying key genes in glaucoma based on a benchmarked dataset and the gene regulatory network.

    PubMed

    Chen, Xi; Wang, Qiao-Ling; Zhang, Meng-Hui

    2017-10-01

    The current study aimed to identify key genes in glaucoma based on a benchmarked dataset and gene regulatory network (GRN). Local and global noise was added to the gene expression dataset to produce a benchmarked dataset. Differentially-expressed genes (DEGs) between patients with glaucoma and normal controls were identified utilizing the Linear Models for Microarray Data (Limma) package based on benchmarked dataset. A total of 5 GRN inference methods, including Zscore, GeneNet, context likelihood of relatedness (CLR) algorithm, Partial Correlation coefficient with Information Theory (PCIT) and GEne Network Inference with Ensemble of Trees (Genie3) were evaluated using receiver operating characteristic (ROC) and precision and recall (PR) curves. The interference method with the best performance was selected to construct the GRN. Subsequently, topological centrality (degree, closeness and betweenness) was conducted to identify key genes in the GRN of glaucoma. Finally, the key genes were validated by performing reverse transcription-quantitative polymerase chain reaction (RT-qPCR). A total of 176 DEGs were detected from the benchmarked dataset. The ROC and PR curves of the 5 methods were analyzed and it was determined that Genie3 had a clear advantage over the other methods; thus, Genie3 was used to construct the GRN. Following topological centrality analysis, 14 key genes for glaucoma were identified, including IL6 , EPHA2 and GSTT1 and 5 of these 14 key genes were validated by RT-qPCR. Therefore, the current study identified 14 key genes in glaucoma, which may be potential biomarkers to use in the diagnosis of glaucoma and aid in identifying the molecular mechanism of this disease.

  3. Identifying Potential Kidney Donors Using Social Networking Websites

    PubMed Central

    Chang, Alexander; Anderson, Emily E.; Turner, Hang T.; Shoham, David; Hou, Susan H.; Grams, Morgan

    2013-01-01

    Social networking sites like Facebook may be a powerful tool for increasing rates of live kidney donation. They allow for wide dissemination of information and discussion, and could lessen anxiety associated with a face-to-face request for donation. However, sparse data exist on the use of social media for this purpose. We searched Facebook, the most popular social networking site, for publicly available English-language pages seeking kidney donors for a specific individual, abstracting information on the potential recipient, characteristics of the page itself, and whether potential donors were tested. In the 91 pages meeting inclusion criteria, the mean age of potential recipients was 37 (range: 2–69); 88% were U.S. residents. Other posted information included the individual’s photograph (76%), blood type (64%), cause of kidney disease (43%), and location (71%). Thirty-two percent of pages reported having potential donors tested, and 10% reported receiving a live donor kidney transplant. Those reporting donor testing shared more potential recipient characteristics, provided more information about transplantation, and had higher page traffic. Facebook is already being used to identify potential kidney donors. Future studies should focus on how to safely, ethically, and effectively use social networking sites to inform potential donors and potentially expand live kidney donation. PMID:23600791

  4. A network-based, integrative study to identify core biological pathways that drive breast cancer clinical subtypes

    PubMed Central

    Dutta, B; Pusztai, L; Qi, Y; André, F; Lazar, V; Bianchini, G; Ueno, N; Agarwal, R; Wang, B; Shiang, C Y; Hortobagyi, G N; Mills, G B; Symmans, W F; Balázsi, G

    2012-01-01

    Background: The rapid collection of diverse genome-scale data raises the urgent need to integrate and utilise these resources for biological discovery or biomedical applications. For example, diverse transcriptomic and gene copy number variation data are currently collected for various cancers, but relatively few current methods are capable to utilise the emerging information. Methods: We developed and tested a data-integration method to identify gene networks that drive the biology of breast cancer clinical subtypes. The method simultaneously overlays gene expression and gene copy number data on protein–protein interaction, transcriptional-regulatory and signalling networks by identifying coincident genomic and transcriptional disturbances in local network neighborhoods. Results: We identified distinct driver-networks for each of the three common clinical breast cancer subtypes: oestrogen receptor (ER)+, human epidermal growth factor receptor 2 (HER2)+, and triple receptor-negative breast cancers (TNBC) from patient and cell line data sets. Driver-networks inferred from independent datasets were significantly reproducible. We also confirmed the functional relevance of a subset of randomly selected driver-network members for TNBC in gene knockdown experiments in vitro. We found that TNBC driver-network members genes have increased functional specificity to TNBC cell lines and higher functional sensitivity compared with genes selected by differential expression alone. Conclusion: Clinical subtype-specific driver-networks identified through data integration are reproducible and functionally important. PMID:22343619

  5. A probabilistic approach to identify putative drug targets in biochemical networks.

    PubMed

    Murabito, Ettore; Smallbone, Kieran; Swinton, Jonathan; Westerhoff, Hans V; Steuer, Ralf

    2011-06-06

    Network-based drug design holds great promise in clinical research as a way to overcome the limitations of traditional approaches in the development of drugs with high efficacy and low toxicity. This novel strategy aims to study how a biochemical network as a whole, rather than its individual components, responds to specific perturbations in different physiological conditions. Proteins exerting little control over normal cells and larger control over altered cells may be considered as good candidates for drug targets. The application of network-based drug design would greatly benefit from using an explicit computational model describing the dynamics of the system under investigation. However, creating a fully characterized kinetic model is not an easy task, even for relatively small networks, as it is still significantly hampered by the lack of data about kinetic mechanisms and parameters values. Here, we propose a Monte Carlo approach to identify the differences between flux control profiles of a metabolic network in different physiological states, when information about the kinetics of the system is partially or totally missing. Based on experimentally accessible information on metabolic phenotypes, we develop a novel method to determine probabilistic differences in the flux control coefficients between the two observable phenotypes. Knowledge of how differences in flux control are distributed among the different enzymatic steps is exploited to identify points of fragility in one of the phenotypes. Using a prototypical cancerous phenotype as an example, we demonstrate how our approach can assist researchers in developing compounds with high efficacy and low toxicity. © 2010 The Royal Society

  6. Identifying online user reputation of user-object bipartite networks

    NASA Astrophysics Data System (ADS)

    Liu, Xiao-Lu; Liu, Jian-Guo; Yang, Kai; Guo, Qiang; Han, Jing-Ti

    2017-02-01

    Identifying online user reputation based on the rating information of the user-object bipartite networks is important for understanding online user collective behaviors. Based on the Bayesian analysis, we present a parameter-free algorithm for ranking online user reputation, where the user reputation is calculated based on the probability that their ratings are consistent with the main part of all user opinions. The experimental results show that the AUC values of the presented algorithm could reach 0.8929 and 0.8483 for the MovieLens and Netflix data sets, respectively, which is better than the results generated by the CR and IARR methods. Furthermore, the experimental results for different user groups indicate that the presented algorithm outperforms the iterative ranking methods in both ranking accuracy and computation complexity. Moreover, the results for the synthetic networks show that the computation complexity of the presented algorithm is a linear function of the network size, which suggests that the presented algorithm is very effective and efficient for the large scale dynamic online systems.

  7. Filtering Gene Ontology semantic similarity for identifying protein complexes in large protein interaction networks.

    PubMed

    Wang, Jian; Xie, Dong; Lin, Hongfei; Yang, Zhihao; Zhang, Yijia

    2012-06-21

    Many biological processes recognize in particular the importance of protein complexes, and various computational approaches have been developed to identify complexes from protein-protein interaction (PPI) networks. However, high false-positive rate of PPIs leads to challenging identification. A protein semantic similarity measure is proposed in this study, based on the ontology structure of Gene Ontology (GO) terms and GO annotations to estimate the reliability of interactions in PPI networks. Interaction pairs with low GO semantic similarity are removed from the network as unreliable interactions. Then, a cluster-expanding algorithm is used to detect complexes with core-attachment structure on filtered network. Our method is applied to three different yeast PPI networks. The effectiveness of our method is examined on two benchmark complex datasets. Experimental results show that our method performed better than other state-of-the-art approaches in most evaluation metrics. The method detects protein complexes from large scale PPI networks by filtering GO semantic similarity. Removing interactions with low GO similarity significantly improves the performance of complex identification. The expanding strategy is also effective to identify attachment proteins of complexes.

  8. Mother’s IPV, Child Maltreatment Type and the Presence of PTSD in Children and Adolescents

    PubMed Central

    Castro, Maravillas; Alcántara-López, Mavi; Martínez, Antonia; Fernández, Visitación; Sánchez-Meca, Julio; López-Soler, Concepción

    2017-01-01

    This correlational cross-sectional study was designed to investigate whether the intimate partner violence (IPV) suffered by mothers (physical and psychological maltreatment), child eyewitness of psychological and physical maltreatment suffered by the mother, the neglect suffered by children, and the maltreatment (physical and psychological) directly suffered by children are statistically associated to post-traumatic stress disorder (PTSD) symptoms exhibited by the child. In addition, the prevalence of child PTSD was estimated, as well as the concordance between the PTSD symptoms assessed by the Child PTSD Symptom Scale (CPSS) and the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR) criteria for child PTSD. The sample consisted of 152 Spanish children aged 8 to 17 and their mothers, who were recruited from Centers of Specialized Assistance for Women Victims of IPV. PTSD prevalence was 20.4%. The results of a canonical correlation analysis showed that the two types of maltreatment with the largest contribution to the canonical variable were physical maltreatment directly suffered by the child, and child eyewitness of physical maltreatment suffered by the mother. The potential developmental pathway of PTSD when both children and mothers suffer severe maltreatment needs to be examined, and this will contribute to the choice of the most effective type of specialized intervention. PMID:28926979

  9. Priorities for research in child maltreatment, intimate partner violence and resilience to violence exposures: results of an international Delphi consensus development process

    PubMed Central

    2012-01-01

    Background Intimate partner violence (IPV) and child maltreatment (CM) are major global public health problems. The Preventing Violence Across the Lifespan (PreVAiL) Research Network, an international group of over 60 researchers and national and international knowledge-user partners in CM and IPV, sought to identify evidence-based research priorities in IPV and CM, with a focus on resilience, using a modified Delphi consensus development process. Methods Review of existing empirical evidence, PreVAiL documents and team discussion identified a starting list of 20 priorities in the following categories: resilience to violence exposure (RES), CM, and IPV, as well as priorities that cross-cut the content areas (CC), and others specific to research methodologies (RM) in violence research. PreVAiL members (N = 47) completed two online survey rounds, and one round of discussions via three teleconference calls to rate, rank and refine research priorities. Results Research priorities were: to examine key elements of promising or successful programmes in RES/CM/IPV to build intervention pilot work; CC: to integrate violence questions into national and international surveys, and RM: to investigate methods for collecting and collating datasets to link data and to conduct pooled, meta and sub-group analyses to identify promising interventions for particular groups. Conclusions These evidence-based research priorities, developed by an international team of violence, gender and mental health researchers and knowledge-user partners, are of relevance for prevention and resilience-oriented research in the areas of IPV and CM. PMID:22908894

  10. Reverse engineering of TLX oncogenic transcriptional networks identifies RUNX1 as tumor suppressor in T-ALL.

    PubMed

    Della Gatta, Giusy; Palomero, Teresa; Perez-Garcia, Arianne; Ambesi-Impiombato, Alberto; Bansal, Mukesh; Carpenter, Zachary W; De Keersmaecker, Kim; Sole, Xavier; Xu, Luyao; Paietta, Elisabeth; Racevskis, Janis; Wiernik, Peter H; Rowe, Jacob M; Meijerink, Jules P; Califano, Andrea; Ferrando, Adolfo A

    2012-02-26

    The TLX1 and TLX3 transcription factor oncogenes have a key role in the pathogenesis of T cell acute lymphoblastic leukemia (T-ALL). Here we used reverse engineering of global transcriptional networks to decipher the oncogenic regulatory circuit controlled by TLX1 and TLX3. This systems biology analysis defined T cell leukemia homeobox 1 (TLX1) and TLX3 as master regulators of an oncogenic transcriptional circuit governing T-ALL. Notably, a network structure analysis of this hierarchical network identified RUNX1 as a key mediator of the T-ALL induced by TLX1 and TLX3 and predicted a tumor-suppressor role for RUNX1 in T cell transformation. Consistent with these results, we identified recurrent somatic loss-of-function mutations in RUNX1 in human T-ALL. Overall, these results place TLX1 and TLX3 at the top of an oncogenic transcriptional network controlling leukemia development, show the power of network analyses to identify key elements in the regulatory circuits governing human cancer and identify RUNX1 as a tumor-suppressor gene in T-ALL.

  11. Gene networks associated with conditional fear in mice identified using a systems genetics approach

    PubMed Central

    2011-01-01

    Background Our understanding of the genetic basis of learning and memory remains shrouded in mystery. To explore the genetic networks governing the biology of conditional fear, we used a systems genetics approach to analyze a hybrid mouse diversity panel (HMDP) with high mapping resolution. Results A total of 27 behavioral quantitative trait loci were mapped with a false discovery rate of 5%. By integrating fear phenotypes, transcript profiling data from hippocampus and striatum and also genotype information, two gene co-expression networks correlated with context-dependent immobility were identified. We prioritized the key markers and genes in these pathways using intramodular connectivity measures and structural equation modeling. Highly connected genes in the context fear modules included Psmd6, Ube2a and Usp33, suggesting an important role for ubiquitination in learning and memory. In addition, we surveyed the architecture of brain transcript regulation and demonstrated preservation of gene co-expression modules in hippocampus and striatum, while also highlighting important differences. Rps15a, Kif3a, Stard7, 6330503K22RIK, and Plvap were among the individual genes whose transcript abundance were strongly associated with fear phenotypes. Conclusion Application of our multi-faceted mapping strategy permits an increasingly detailed characterization of the genetic networks underlying behavior. PMID:21410935

  12. Advanced Wireless Integrated Navy Network - AWINN

    DTIC Science & Technology

    2005-06-30

    de Sousa, GRA (5/15/05-6/30/05) George C. Hadjichristofi, GRA (4/1/05-5/14/05) Unghee Lee, GRA (33% for 4/1/05-5/14/05, 100% for 5/15/05-6/30/05...and initial implementation of test bed conversion to support Internet Protocol version 6 (IPv6). In this section, we also report on accomplishments in...below. 2.1.2 Task Activities for the Period Subtask 2. la Policy-based Quality of Service Task Obiective: The objectives of this subtask are to

  13. 17 CFR 45.6 - Legal entity identifiers

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... applied to swap data repositories by part 49 of this chapter. (4) Open Source. The schema for the legal... Section 45.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SWAP DATA... to the jurisdiction of the Commission shall be identified in all recordkeeping and all swap data...

  14. 17 CFR 45.6 - Legal entity identifiers

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... applied to swap data repositories by part 49 of this chapter. (4) Open Source. The schema for the legal... Section 45.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SWAP DATA... to the jurisdiction of the Commission shall be identified in all recordkeeping and all swap data...

  15. Identifying the Community Structure of the Food-Trade International Multi-Network

    NASA Technical Reports Server (NTRS)

    Torreggiani, S.; Mangioni, G.

    2018-01-01

    Achieving international food security requires improved understanding of how international trade networks connect countries around the world through the import-export flows of food commodities. The properties of international food trade networks are still poorly documented, especially from a multi-network perspective. In particular, nothing is known about the multi-network's community structure. Here we find that the individual crop-specific layers of the multi-network have densely connected trading groups, a consistent characteristic over the period 2001-2011. Further, the multi-network is characterized by low variability over this period but with substantial heterogeneity across layers in each year. In particular, the layers are mostly assortative: more-intensively connected countries tend to import from and export to countries that are themselves more connected. We also fit econometric models to identify social, economic and geographic factors explaining the probability that any two countries are co-present in the same community. Our estimates indicate that the probability of country pairs belonging to the same food trade community depends more on geopolitical and economic factors-such as geographical proximity and trade-agreement co-membership-than on country economic size and/or income. These community-structure findings of the multi-network are especially valuable for efforts to understand past and emerging dynamics in the global food system, especially those that examine potential 'shocks' to global food trade.

  16. A meta-analysis of public microarray data identifies biological regulatory networks in Parkinson's disease.

    PubMed

    Su, Lining; Wang, Chunjie; Zheng, Chenqing; Wei, Huiping; Song, Xiaoqing

    2018-04-13

    Parkinson's disease (PD) is a long-term degenerative disease that is caused by environmental and genetic factors. The networks of genes and their regulators that control the progression and development of PD require further elucidation. We examine common differentially expressed genes (DEGs) from several PD blood and substantia nigra (SN) microarray datasets by meta-analysis. Further we screen the PD-specific genes from common DEGs using GCBI. Next, we used a series of bioinformatics software to analyze the miRNAs, lncRNAs and SNPs associated with the common PD-specific genes, and then identify the mTF-miRNA-gene-gTF network. Our results identified 36 common DEGs in PD blood studies and 17 common DEGs in PD SN studies, and five of the genes were previously known to be associated with PD. Further study of the regulatory miRNAs associated with the common PD-specific genes revealed 14 PD-specific miRNAs in our study. Analysis of the mTF-miRNA-gene-gTF network about PD-specific genes revealed two feed-forward loops: one involving the SPRK2 gene, hsa-miR-19a-3p and SPI1, and the second involving the SPRK2 gene, hsa-miR-17-3p and SPI. The long non-coding RNA (lncRNA)-mediated regulatory network identified lncRNAs associated with PD-specific genes and PD-specific miRNAs. Moreover, single nucleotide polymorphism (SNP) analysis of the PD-specific genes identified two significant SNPs, and SNP analysis of the neurodegenerative disease-specific genes identified seven significant SNPs. Most of these SNPs are present in the 3'-untranslated region of genes and are controlled by several miRNAs. Our study identified a total of 53 common DEGs in PD patients compared with healthy controls in blood and brain datasets and five of these genes were previously linked with PD. Regulatory network analysis identified PD-specific miRNAs, associated long non-coding RNA and feed-forward loops, which contribute to our understanding of the mechanisms underlying PD. The SNPs identified in our

  17. Use of artificial neural networks to identify the origin of green macroalgae

    NASA Astrophysics Data System (ADS)

    Żbikowski, Radosław

    2011-08-01

    This study demonstrates application of artificial neural networks (ANNs) for identifying the origin of green macroalgae ( Enteromorpha sp. and Cladophora sp.) according to their concentrations of Cd, Cu, Ni, Zn, Mn, Pb, Na, Ca, K and Mg. Earlier studies confirmed that algae can be used for biomonitoring surveys of metal contaminants in coastal areas of the Southern Baltic. The same data sets were classified with the use of different structures of radial basis function (RBF) and multilayer perceptron (MLP) networks. The selected networks were able to classify the samples according to their geographical origin, i.e. Southern Baltic, Gulf of Gdańsk and Vistula Lagoon. Additionally in the case of macroalgae from the Gulf of Gdańsk, the networks enabled the discrimination of samples according to areas of contrasting levels of pollution. Hence this study shows that artificial neural networks can be a valuable tool in biomonitoring studies.

  18. Towards the Development of an Intimate Partner Violence Screening Tool for Gay and Bisexual Men

    PubMed Central

    Stephenson, Rob; Hall, Casey D.; Williams, Whitney; Sato, Kimi; Finneran, Catherine

    2013-01-01

    Introduction: Recent research suggests that gay and bisexual men experience intimate partner violence (IPV) at rates comparable to heterosexual women. However, current screening tools used to identify persons experiencing IPV were largely created for use with heterosexual women. Given the high prevalence of IPV among gay and bisexual men in the United States, the lack of IPV screening tools that reflect the lived realities of gay and bisexual men is problematic.This paper describes the development of a short-form IPV screening tool intended to be used with gay and bisexual men. Methods: A novel definition of IPV, informed by formative Focus Group Discussions, was derived from a quantitative survey of approximately 1,100 venue-recruited gay and bisexual men. From this new definition, a draft IPV screening tool was created. After expert review (n=13) and cognitive interviews with gay and bisexual men (n=47), a screening tool of six questions was finalized.A national, online-recruited sample (n=822) was used to compare rates of IPV identified by the novel tool and current standard tools. Results: The six-item, short-form tool created through the six-stage research process captured a significantly higher prevalence of recent experience of IPV compared to a current and commonly used screening tool (30.7% versus 7.5%, p<0.05). The novel short-form tool described additional domains of IPV not currently found in screening tools, including monitoring behaviors, controlling behaviors, and HIV-related IPV. The screener takes less than five minutes to complete and is 6th grade reading level. Conclusion: Gay and bisexual men experiencing IPV must first be identified before services can reach them. Given emergent literature that demonstrates the high prevalence of IPV among gay and bisexual men and the known adverse health sequela of experiencing IPV, this novel screening tool may allow for the quick identification of men experiencing IPV and the opportunity for referrals for

  19. Towards the development of an intimate partner violence screening tool for gay and bisexual men.

    PubMed

    Stephenson, Rob; Hall, Casey D; Williams, Whitney; Sato, Kimi; Finneran, Catherine

    2013-08-01

    Recent research suggests that gay and bisexual men experience intimate partner violence (IPV) at rates comparable to heterosexual women. However, current screening tools used to identify persons experiencing IPV were largely created for use with heterosexual women. Given the high prevalence of IPV among gay and bisexual men in the United States, the lack of IPV screening tools that reflect the lived realities of gay and bisexual men is problematic.This paper describes the development of a short-form IPV screening tool intended to be used with gay and bisexual men. A novel definition of IPV, informed by formative Focus Group Discussions, was derived from a quantitative survey of approximately 1,100 venue-recruited gay and bisexual men. From this new definition, a draft IPV screening tool was created. After expert review (n=13) and cognitive interviews with gay and bisexual men (n=47), a screening tool of six questions was finalized.A national, online-recruited sample (n=822) was used to compare rates of IPV identified by the novel tool and current standard tools. The six-item, short-form tool created through the six-stage research process captured a significantly higher prevalence of recent experience of IPV compared to a current and commonly used screening tool (30.7% versus 7.5%, p<0.05). The novel short-form tool described additional domains of IPV not currently found in screening tools, including monitoring behaviors, controlling behaviors, and HIV-related IPV. The screener takes less than five minutes to complete and is 6th grade reading level. Gay and bisexual men experiencing IPV must first be identified before services can reach them. Given emergent literature that demonstrates the high prevalence of IPV among gay and bisexual men and the known adverse health sequela of experiencing IPV, this novel screening tool may allow for the quick identification of men experiencing IPV and the opportunity for referrals for the synergistic management of IPV. Future work

  20. Identifying and Investigating the "Best" Schools: A Network-Based Analysis

    ERIC Educational Resources Information Center

    Joshi, Priyadarshani

    2018-01-01

    This paper aims to provide a fresh perspective on the predominantly negative discourse on schooling quality in low-income countries by focusing on the research questions: "How can one identify great schools and what makes them special?" Using a network-based perspective, I measure peer evaluations of quality in two districts in Nepal.…

  1. Identifying major depressive disorder using Hurst exponent of resting-state brain networks.

    PubMed

    Wei, Maobin; Qin, Jiaolong; Yan, Rui; Li, Haoran; Yao, Zhijian; Lu, Qing

    2013-12-30

    Resting-state functional magnetic resonance imaging (fMRI) studies of major depressive disorder (MDD) have revealed abnormalities of functional connectivity within or among the resting-state networks. They provide valuable insight into the pathological mechanisms of depression. However, few reports were involved in the "long-term memory" of fMRI signals. This study was to investigate the "long-term memory" of resting-state networks by calculating their Hurst exponents for identifying depressed patients from healthy controls. Resting-state networks were extracted from fMRI data of 20 MDD and 20 matched healthy control subjects. The Hurst exponent of each network was estimated by Range Scale analysis for further discriminant analysis. 95% of depressed patients and 85% of healthy controls were correctly classified by Support Vector Machine with an accuracy of 90%. The right fronto-parietal and default mode network constructed a deficit network (lower memory and more irregularity in MDD), while the left fronto-parietal, ventromedial prefrontal and salience network belonged to an excess network (longer memory in MDD), suggesting these dysfunctional networks may be related to a portion of the complex of emotional and cognitive disturbances. The abnormal "long-term memory" of resting-state networks associated with depression may provide a new possibility towards the exploration of the pathophysiological mechanisms of MDD. © 2013 Elsevier Ireland Ltd. All rights reserved.

  2. Interpersonal violence in posttraumatic women: brain networks triggered by trauma-related pictures.

    PubMed

    Neumeister, Paula; Feldker, Katharina; Heitmann, Carina Y; Helmich, Ruth; Gathmann, Bettina; Becker, Michael P I; Straube, Thomas

    2017-04-01

    Interpersonal violence (IPV) is one of the most frequent causes for the development of posttraumatic stress disorder (PTSD) in women. Trauma-related triggers have been proposed to evoke automatic emotional responses in PTSD. The present functional magnetic resonance study investigated the neural basis of trauma-related picture processing in women with IPV-PTSD (n = 18) relative to healthy controls (n = 18) using a newly standardized trauma-related picture set and a non-emotional vigilance task. We aimed to identify brain activation and connectivity evoked by trauma-related pictures, and associations with PTSD symptom severity. We found hyperactivation during trauma-related vs neutral picture processing in both subcortical [basolateral amygdala (BLA), thalamus, brainstem] and cortical [anterior cingulate cortex (ACC), medial prefrontal cortex (mPFC), insula, occipital cortex] regions in IPV-PTSD. In patients, brain activation in amygdala, ACC, insula, occipital cortex and brainstem correlated positively with symptom severity. Furthermore, connectivity analyses revealed hyperconnectivity between BLA and dorsal ACC/mPFC. Results show symptom severity-dependent brain activation and hyperconnectivity in response to trauma-related pictures in brain regions related to fear and visual processing in women suffering from IPV-PTSD. These brain mechanisms appear to be associated with immediate responses to trauma-related triggers presented in a non-emotional context in this PTSD subgroup. © The Author (2016). Published by Oxford University Press.

  3. Effects of early exposure and lifetime exposure to intimate partner violence (IPV) on child adjustment.

    PubMed

    Graham-Bermann, Sandra A; Perkins, Suzanne

    2010-01-01

    Children exposed to overwhelming and potentially traumatic events early in their lives are considered at-risk for problems in adjustment. Yet it is not known whether it is the age of first exposure (AFE) to violence or the amount of violence that the child witnessed in their lifetime that has the greatest impact on adjustment. For a sample of 190 children ages 6 to 12 exposed to intimate partner violence, their mothers reported that the average length of their abusive relationship was 10 years. The majority of children were first exposed to family violence as infants (64%), with only 12% first exposed when school-aged. Both the AFE and an estimate of the cumulative amount of violence were significantly and negatively related to children's behavioral problems. However, in regression analyses controlling for child sex, ethnicity, age, and family environment variables, cumulative violence exposure accounted for greater variance in adjustment than did AFE. Furthermore, cumulative violence exposure mediated the relationship between AFE and externalizing behavior problems, indicating that the cumulative exposure to IPV outweighed the AFE in its effect on child adjustment.

  4. Intimate partner violence among women veterans by sexual orientation.

    PubMed

    Dardis, Christina M; Shipherd, Jillian C; Iverson, Katherine M

    2017-08-01

    National estimates suggest intimate partner violence (IPV) rates are equal or higher among lesbian, bisexual, or questioning (LBQ)-identified women than heterosexual-identified women. Women veterans are a population at high risk for IPV, yet the occurrence of lifetime and past-year IPV experiences by sexual orientation have not been examined in this population. Lifetime and past-year IPV experiences and current IPV-related posttraumatic stress disorder (PTSD) symptoms were assessed with validated screening measures as part of a 2014 web-based national survey of women veterans. Among 403 respondents, 9.7% (n = 39) identified as LBQ, and 90.3% (n = 364) identified as heterosexual. When controlling for age, LBQ-identified women veterans were significantly more likely to report lifetime sexual and physical IPV and lifetime intimate partner stalking. In the past year, LBQ-identified veterans were twice as likely to endorse emotional mistreatment and physical IPV, and three times more likely to endorse sexual IPV, than were heterosexual-identified women veterans. However, sexual orientation was unrelated to IPV-related PTSD symptoms, when controlling for age, race, and number IPV forms experienced. IPV is prevalent among LBQ-identified women veterans, suggesting the need to understand the potentially unique contextual factors and health-care needs of this group.

  5. Identifying the community structure of the food-trade international multi-network

    NASA Astrophysics Data System (ADS)

    Torreggiani, S.; Mangioni, G.; Puma, M. J.; Fagiolo, G.

    2018-05-01

    Achieving international food security requires improved understanding of how international trade networks connect countries around the world through the import-export flows of food commodities. The properties of international food trade networks are still poorly documented, especially from a multi-network perspective. In particular, nothing is known about the multi-network’s community structure. Here we find that the individual crop-specific layers of the multi-network have densely connected trading groups, a consistent characteristic over the period 2001–2011. Further, the multi-network is characterized by low variability over this period but with substantial heterogeneity across layers in each year. In particular, the layers are mostly assortative: more-intensively connected countries tend to import from and export to countries that are themselves more connected. We also fit econometric models to identify social, economic and geographic factors explaining the probability that any two countries are co-present in the same community. Our estimates indicate that the probability of country pairs belonging to the same food trade community depends more on geopolitical and economic factors—such as geographical proximity and trade-agreement co-membership—than on country economic size and/or income. These community-structure findings of the multi-network are especially valuable for efforts to understand past and emerging dynamics in the global food system, especially those that examine potential ‘shocks’ to global food trade.

  6. Causal network analysis of head and neck keloid tissue identifies potential master regulators.

    PubMed

    Garcia-Rodriguez, Laura; Jones, Lamont; Chen, Kang Mei; Datta, Indrani; Divine, George; Worsham, Maria J

    2016-10-01

    To generate novel insights and hypotheses in keloid development from potential master regulators. Prospective cohort. Six fresh keloid and six normal skin samples from 12 anonymous donors were used in a prospective cohort study. Genome-wide profiling was done previously on the cohort using the Infinium HumanMethylation450 BeadChip (Illumina, San Diego, CA). The 190 statistically significant CpG islands between keloid and normal tissue mapped to 152 genes (P < .05). The top 10 statistically significant genes (VAMP5, ACTR3C, GALNT3, KCNAB2, LRRC61, SCML4, SYNGR1, TNS1, PLEKHG5, PPP1R13-α, false discovery rate <.015) were uploaded into the Ingenuity Pathway Analysis software's Causal Network Analysis (QIAGEN, Redwood City, CA). To reflect expected gene expression direction in the context of methylation changes, the inverse of the methylation ratio from keloid versus normal tissue was used for the analysis. Causal Network Analysis identified disease-specific master regulator molecules based on downstream differentially expressed keloid-specific genes and expected directionality of expression (hypermethylated vs. hypomethylated). Causal Network Analysis software identified four hierarchical networks that included four master regulators (pyroxamide, tributyrin, PRKG2, and PENK) and 19 intermediate regulators. Causal Network Analysis of differentiated methylated gene data of keloid versus normal skin demonstrated four causal networks with four master regulators. These hierarchical networks suggest potential driver roles for their downstream keloid gene targets in the pathogenesis of the keloid phenotype, likely triggered due to perturbation/injury to normal tissue. NA Laryngoscope, 126:E319-E324, 2016. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  7. Using LTI Dynamics to Identify the Influential Nodes in a Network

    PubMed Central

    Jorswieck, Eduard; Scheunert, Christian

    2016-01-01

    Networks are used for modeling numerous technical, social or biological systems. In order to better understand the system dynamics, it is a matter of great interest to identify the most important nodes within the network. For a large set of problems, whether it is the optimal use of available resources, spreading information efficiently or even protection from malicious attacks, the most important node is the most influential spreader, the one that is capable of propagating information in the shortest time to a large portion of the network. Here we propose the Node Imposed Response (NiR), a measure which accurately evaluates node spreading power. It outperforms betweenness, degree, k-shell and h-index centrality in many cases and shows the similar accuracy to dynamics-sensitive centrality. We utilize the system-theoretic approach considering the network as a Linear Time-Invariant system. By observing the system response we can quantify the importance of each node. In addition, our study provides a robust tool set for various protective strategies. PMID:28030548

  8. Identifying potential kidney donors using social networking web sites.

    PubMed

    Chang, Alexander; Anderson, Emily E; Turner, Hang T; Shoham, David; Hou, Susan H; Grams, Morgan

    2013-01-01

    Social networking sites like Facebook may be a powerful tool for increasing rates of live kidney donation. They allow for wide dissemination of information and discussion and could lessen anxiety associated with a face-to-face request for donation. However, sparse data exist on the use of social media for this purpose. We searched Facebook, the most popular social networking site, for publicly available English-language pages seeking kidney donors for a specific individual, abstracting information on the potential recipient, characteristics of the page itself, and whether potential donors were tested. In the 91 pages meeting inclusion criteria, the mean age of potential recipients was 37 (range: 2-69); 88% were US residents. Other posted information included the individual's photograph (76%), blood type (64%), cause of kidney disease (43%), and location (71%). Thirty-two percent of pages reported having potential donors tested, and 10% reported receiving a live-donor kidney transplant. Those reporting donor testing shared more potential recipient characteristics, provided more information about transplantation, and had higher page traffic. Facebook is already being used to identify potential kidney donors. Future studies should focus on how to safely, ethically, and effectively use social networking sites to inform potential donors and potentially expand live kidney donation. © 2013 John Wiley & Sons A/S.

  9. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  10. Reactions to Participating in Intimate Partner Violence and Minority Stress Research: A Mixed Methodological Study of Self-Identified Lesbian and Gay Emerging Adults.

    PubMed

    Edwards, Katie M; Sylaska, Kateryna M

    2016-01-01

    The purpose of this study was to examine lesbian and gay (LG) young adults' reactions to participating in intimate partner violence (IPV) and minority stress research using a mixed methodological design. Participants were 277 U.S. college students currently involved in same-sex relationships and self-identified cisgender LG who completed an online questionnaire that included closed- and open-ended questions. Results suggested that IPV research was well tolerated by the vast majority of participants; close to one in 10 participants reported being upset by the study questions, yet 75% of upset individuals reported some level of personal benefit. Reasons for upset as identified in the open-ended responses included thinking about personal experiences with IPV, as the perpetrator or friend of a victim, as well as thinking about the uncertainty of their future with their current partner. The correlates of emotional reactions and personal benefits to research participation were also examined, and these varied among gay men and lesbian women. Implications of these findings underscore the importance of accurate reflection of risk and benefits in informed consent documents as well as systematic evaluation of sexual minority participants' reactions to research participation in an effort to conduct ethically sound sexual science research.

  11. Discrete particle swarm optimization for identifying community structures in signed social networks.

    PubMed

    Cai, Qing; Gong, Maoguo; Shen, Bo; Ma, Lijia; Jiao, Licheng

    2014-10-01

    Modern science of networks has facilitated us with enormous convenience to the understanding of complex systems. Community structure is believed to be one of the notable features of complex networks representing real complicated systems. Very often, uncovering community structures in networks can be regarded as an optimization problem, thus, many evolutionary algorithms based approaches have been put forward. Particle swarm optimization (PSO) is an artificial intelligent algorithm originated from social behavior such as birds flocking and fish schooling. PSO has been proved to be an effective optimization technique. However, PSO was originally designed for continuous optimization which confounds its applications to discrete contexts. In this paper, a novel discrete PSO algorithm is suggested for identifying community structures in signed networks. In the suggested method, particles' status has been redesigned in discrete form so as to make PSO proper for discrete scenarios, and particles' updating rules have been reformulated by making use of the topology of the signed network. Extensive experiments compared with three state-of-the-art approaches on both synthetic and real-world signed networks demonstrate that the proposed method is effective and promising. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. An efficient graph theory based method to identify every minimal reaction set in a metabolic network

    PubMed Central

    2014-01-01

    Background Development of cells with minimal metabolic functionality is gaining importance due to their efficiency in producing chemicals and fuels. Existing computational methods to identify minimal reaction sets in metabolic networks are computationally expensive. Further, they identify only one of the several possible minimal reaction sets. Results In this paper, we propose an efficient graph theory based recursive optimization approach to identify all minimal reaction sets. Graph theoretical insights offer systematic methods to not only reduce the number of variables in math programming and increase its computational efficiency, but also provide efficient ways to find multiple optimal solutions. The efficacy of the proposed approach is demonstrated using case studies from Escherichia coli and Saccharomyces cerevisiae. In case study 1, the proposed method identified three minimal reaction sets each containing 38 reactions in Escherichia coli central metabolic network with 77 reactions. Analysis of these three minimal reaction sets revealed that one of them is more suitable for developing minimal metabolism cell compared to other two due to practically achievable internal flux distribution. In case study 2, the proposed method identified 256 minimal reaction sets from the Saccharomyces cerevisiae genome scale metabolic network with 620 reactions. The proposed method required only 4.5 hours to identify all the 256 minimal reaction sets and has shown a significant reduction (approximately 80%) in the solution time when compared to the existing methods for finding minimal reaction set. Conclusions Identification of all minimal reactions sets in metabolic networks is essential since different minimal reaction sets have different properties that effect the bioprocess development. The proposed method correctly identified all minimal reaction sets in a both the case studies. The proposed method is computationally efficient compared to other methods for finding minimal

  13. Identifying hub stations and important lines of bus networks: A case study in Xiamen, China

    NASA Astrophysics Data System (ADS)

    Zhang, Hui; Zhuge, Chengxiang; Yu, Xiaohua

    2018-07-01

    Hub stations and important lines play key roles in transfers between stations. In this paper, a node failure model is proposed to identify hub stations. In the model, we introduce two new indicators called neighborhood degree ratio and transfer index to evaluate the importance of stations, which consider neighborhood stations' degree of station and the initial transfer times between stations. Moreover, line accessibility is developed to measure the importance of lines in the bus network. Xiamen bus network in 2016 is utilized to test the model. The results show that the two introduced indicators are more effective to identify hub stations compared with traditional complex network indicators such as degree, clustering coefficient and betweenness.

  14. Pathway cross-talk network analysis identifies critical pathways in neonatal sepsis.

    PubMed

    Meng, Yu-Xiu; Liu, Quan-Hong; Chen, Deng-Hong; Meng, Ying

    2017-06-01

    Despite advances in neonatal care, sepsis remains a major cause of morbidity and mortality in neonates worldwide. Pathway cross-talk analysis might contribute to the inference of the driving forces in bacterial sepsis and facilitate a better understanding of underlying pathogenesis of neonatal sepsis. This study aimed to explore the critical pathways associated with the progression of neonatal sepsis by the pathway cross-talk analysis. By integrating neonatal transcriptome data with known pathway data and protein-protein interaction data, we systematically uncovered the disease pathway cross-talks and constructed a disease pathway cross-talk network for neonatal sepsis. Then, attract method was employed to explore the dysregulated pathways associated with neonatal sepsis. To determine the critical pathways in neonatal sepsis, rank product (RP) algorithm, centrality analysis and impact factor (IF) were introduced sequentially, which synthetically considered the differential expression of genes and pathways, pathways cross-talks and pathway parameters in the network. The dysregulated pathways with the highest IF values as well as RP<0.01 were defined as critical pathways in neonatal sepsis. By integrating three kinds of data, only 6919 common genes were included to perform the pathway cross-talk analysis. By statistic analysis, a total of 1249 significant pathway cross-talks were selected to construct the pathway cross-talk network. Moreover, 47 dys-regulated pathways were identified via attract method, 20 pathways were identified under RP<0.01, and the top 10 pathways with the highest IF were also screened from the pathway cross-talk network. Among them, we selected 8 common pathways, i.e. critical pathways. In this study, we systematically tracked 8 critical pathways involved in neonatal sepsis by integrating attract method and pathway cross-talk network. These pathways might be responsible for the host response in infection, and of great value for advancing

  15. Amino acid positions subject to multiple coevolutionary constraints can be robustly identified by their eigenvector network centrality scores.

    PubMed

    Parente, Daniel J; Ray, J Christian J; Swint-Kruse, Liskin

    2015-12-01

    As proteins evolve, amino acid positions key to protein structure or function are subject to mutational constraints. These positions can be detected by analyzing sequence families for amino acid conservation or for coevolution between pairs of positions. Coevolutionary scores are usually rank-ordered and thresholded to reveal the top pairwise scores, but they also can be treated as weighted networks. Here, we used network analyses to bypass a major complication of coevolution studies: For a given sequence alignment, alternative algorithms usually identify different, top pairwise scores. We reconciled results from five commonly-used, mathematically divergent algorithms (ELSC, McBASC, OMES, SCA, and ZNMI), using the LacI/GalR and 1,6-bisphosphate aldolase protein families as models. Calculations used unthresholded coevolution scores from which column-specific properties such as sequence entropy and random noise were subtracted; "central" positions were identified by calculating various network centrality scores. When compared among algorithms, network centrality methods, particularly eigenvector centrality, showed markedly better agreement than comparisons of the top pairwise scores. Positions with large centrality scores occurred at key structural locations and/or were functionally sensitive to mutations. Further, the top central positions often differed from those with top pairwise coevolution scores: instead of a few strong scores, central positions often had multiple, moderate scores. We conclude that eigenvector centrality calculations reveal a robust evolutionary pattern of constraints-detectable by divergent algorithms--that occur at key protein locations. Finally, we discuss the fact that multiple patterns coexist in evolutionary data that, together, give rise to emergent protein functions. © 2015 Wiley Periodicals, Inc.

  16. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight cell - Update II

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    An update of validation test results confirming the breakthrough in LEO cycle life of nickel-hydrogen cells containing 26 percent KOH electrolyte is presented. A breakthrough in the LEO cycle life of individual pressure vessel (IPV) nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40,000 LEO cycles, compared to 3500 cycles for cells containing 31 percent KOH. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min discharge (2X normal rate). The depth-of-discharge was 80 percent. Six 48-Ah Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells), and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The three 31 percent KOH cells failed (cycles 3729, 4165, and 11355). One of the 26 percent KOH cells failed at cycle 15314. The other two 26 percent KOH cells were cycled for over 16,000 cycles during the continuing test.

  17. Identifying Dynamic Protein Complexes Based on Gene Expression Profiles and PPI Networks

    PubMed Central

    Li, Min; Chen, Weijie; Wang, Jianxin; Pan, Yi

    2014-01-01

    Identification of protein complexes from protein-protein interaction networks has become a key problem for understanding cellular life in postgenomic era. Many computational methods have been proposed for identifying protein complexes. Up to now, the existing computational methods are mostly applied on static PPI networks. However, proteins and their interactions are dynamic in reality. Identifying dynamic protein complexes is more meaningful and challenging. In this paper, a novel algorithm, named DPC, is proposed to identify dynamic protein complexes by integrating PPI data and gene expression profiles. According to Core-Attachment assumption, these proteins which are always active in the molecular cycle are regarded as core proteins. The protein-complex cores are identified from these always active proteins by detecting dense subgraphs. Final protein complexes are extended from the protein-complex cores by adding attachments based on a topological character of “closeness” and dynamic meaning. The protein complexes produced by our algorithm DPC contain two parts: static core expressed in all the molecular cycle and dynamic attachments short-lived. The proposed algorithm DPC was applied on the data of Saccharomyces cerevisiae and the experimental results show that DPC outperforms CMC, MCL, SPICi, HC-PIN, COACH, and Core-Attachment based on the validation of matching with known complexes and hF-measures. PMID:24963481

  18. Intimate Partner Violence Among Patients With Dissociative Disorders.

    PubMed

    Webermann, Aliya R; Brand, Bethany L; Kumar, Shaina A

    2017-12-01

    Childhood trauma is common among survivors and perpetrators of intimate partner violence (IPV). Although symptoms of posttraumatic stress disorder (PTSD) and dissociative disorders (DDs) are predictors of IPV victimization and perpetration, few studies explore IPV among those with DDs. The present study examined IPV and symptoms as predictors among participants in the Treatment of Patients With Dissociative Disorders (TOP DD) Network study, an educational intervention for individuals with DDs and their clinicians. Both clinicians and patients reported on patients' history of physical, emotional, and sexual IPV as both victims and perpetrators. Patients self-reported dissociative, posttraumatic (PTSD), and emotion dysregulation symptoms, as well as IPV-specific dissociative symptoms. According to patients and clinicians, patients were frequently victims of IPV, most commonly emotional IPV. Dissociative symptoms predicted IPV exposure, whereas dissociative and emotion dysregulation symptoms predicted IPV-specific dissociative symptoms.

  19. Intimate partner violence against low-income women in Mexico City and associations with work-related disruptions: a latent class analysis using cross-sectional data.

    PubMed

    Gupta, Jhumka; Willie, Tiara C; Harris, Courtney; Campos, Paola Abril; Falb, Kathryn L; Garcia Moreno, Claudia; Diaz Olavarrieta, Claudia; Okechukwu, Cassandra A

    2018-03-07

    Disrupting women's employment is a strategy that abusive partners could use to prevent women from maintaining economic independence and stability. Yet, few studies have investigated disruptions in employment among victims of intimate partner violence (IPV) in low-income and middle-income countries. Moreover, even fewer have sought to identify which female victims of IPV are most vulnerable to such disruptions. Using baseline data from 947 women in Mexico City enrolled in a randomised controlled trial, multilevel latent class analysis (LCA) was used to classify women based on their reported IPV experiences. Furthermore, multilevel logistic regression analyses were performed on a subsample of women reporting current work (n=572) to investigate associations between LCA membership and IPV-related employment disruptions. Overall, 40.6% of women who were working at the time of the survey reported some form of work-related disruption due to IPV. LCA identified four distinct classes of IPV experiences: Low Physical and Sexual Violence (39.1%); High Sexual and Low Physical Violence class (9.6%); High Physical and Low Sexual Violence and Injuries (36.5%); High Physical and Sexual Violence and Injuries (14.8%). Compared with women in the Low Physical and Sexual Violence class, women in the High Physical and Sexual Violence and Injuries class and women in the High Physical and Low Sexual Violence and Injuries class were at greater risk of work disruption (adjusted relative risk (ARR) 2.44, 95% CI 1.80 to 3.29; ARR 2.05, 95% CI 1.56 to 2.70, respectively). No other statistically significant associations emerged. IPV, and specific patterns of IPV experiences, must be considered both in work settings and, more broadly, by economic development programmes. NCT01661504. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. An artificial neural network system to identify alleles in reference electropherograms.

    PubMed

    Taylor, Duncan; Harrison, Ash; Powers, David

    2017-09-01

    Electropherograms are produced in great numbers in forensic DNA laboratories as part of everyday criminal casework. Before the results of these electropherograms can be used they must be scrutinised by analysts to determine what the identified data tells them about the underlying DNA sequences and what is purely an artefact of the DNA profiling process. This process of interpreting the electropherograms can be time consuming and is prone to subjective differences between analysts. Recently it was demonstrated that artificial neural networks could be used to classify information within an electropherogram as allelic (i.e. representative of a DNA fragment present in the DNA extract) or as one of several different categories of artefactual fluorescence that arise as a result of generating an electropherogram. We extend that work here to demonstrate a series of algorithms and artificial neural networks that can be used to identify peaks on an electropherogram and classify them. We demonstrate the functioning of the system on several profiles and compare the results to a leading commercial DNA profile reading system. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Geographically Modified PageRank Algorithms: Identifying the Spatial Concentration of Human Movement in a Geospatial Network.

    PubMed

    Chin, Wei-Chien-Benny; Wen, Tzai-Hung

    2015-01-01

    A network approach, which simplifies geographic settings as a form of nodes and links, emphasizes the connectivity and relationships of spatial features. Topological networks of spatial features are used to explore geographical connectivity and structures. The PageRank algorithm, a network metric, is often used to help identify important locations where people or automobiles concentrate in the geographical literature. However, geographic considerations, including proximity and location attractiveness, are ignored in most network metrics. The objective of the present study is to propose two geographically modified PageRank algorithms-Distance-Decay PageRank (DDPR) and Geographical PageRank (GPR)-that incorporate geographic considerations into PageRank algorithms to identify the spatial concentration of human movement in a geospatial network. Our findings indicate that in both intercity and within-city settings the proposed algorithms more effectively capture the spatial locations where people reside than traditional commonly-used network metrics. In comparing location attractiveness and distance decay, we conclude that the concentration of human movement is largely determined by the distance decay. This implies that geographic proximity remains a key factor in human mobility.

  2. Identifying the architecture of a supracellular actomyosin network that induces tissue folding

    NASA Astrophysics Data System (ADS)

    Yevick, Hannah; Stoop, Norbert; Dunkel, Jorn; Martin, Adam

    During embryonic development, the establishment of correct tissue form ensures proper tissue function. Yet, how the thousands of cells within a tissue coordinate force production to sculpt tissue shape is poorly understood. One important tissue shape change is tissue folding where a cell sheet bends to form a closed tube. Drosophila (fruit fly) embryos undergo such a folding event, called ventral furrow formation. The ventral furrow is associated with a supracellular network of actin and myosin, where actin-myosin fibers assemble and connect between cells. It is not known how this tissue-wide network grows and connects over time, how reproducible it is between embryos, and what determines its architecture. Here, we used topological feature analysis to quantitatively and dynamically map the connections and architecture of this supracellular network across hundreds of cells in the folding tissue. We identified the importance of the cell unit in setting up the tissue-scale architecture of the network. Our mathematical framework allows us to explore stereotypic properties of the myosin network such that we can investigate the reproducibility of mechanical connections for a morphogenetic process. NIH F32.

  3. Network analysis of patient flow in two UK acute care hospitals identifies key sub-networks for A&E performance

    PubMed Central

    Stringer, Clive; Beeknoo, Neeraj

    2017-01-01

    The topology of the patient flow network in a hospital is complex, comprising hundreds of overlapping patient journeys, and is a determinant of operational efficiency. To understand the network architecture of patient flow, we performed a data-driven network analysis of patient flow through two acute hospital sites of King’s College Hospital NHS Foundation Trust. Administration databases were queried for all intra-hospital patient transfers in an 18-month period and modelled as a dynamic weighted directed graph. A ‘core’ subnetwork containing only 13–17% of all edges channelled 83–90% of the patient flow, while an ‘ephemeral’ network constituted the remainder. Unsupervised cluster analysis and differential network analysis identified sub-networks where traffic is most associated with A&E performance. Increased flow to clinical decision units was associated with the best A&E performance in both sites. The component analysis also detected a weekend effect on patient transfers which was not associated with performance. We have performed the first data-driven hypothesis-free analysis of patient flow which can enhance understanding of whole healthcare systems. Such analysis can drive transformation in healthcare as it has in industries such as manufacturing. PMID:28968472

  4. MIR@NT@N: a framework integrating transcription factors, microRNAs and their targets to identify sub-network motifs in a meta-regulation network model

    PubMed Central

    2011-01-01

    Background To understand biological processes and diseases, it is crucial to unravel the concerted interplay of transcription factors (TFs), microRNAs (miRNAs) and their targets within regulatory networks and fundamental sub-networks. An integrative computational resource generating a comprehensive view of these regulatory molecular interactions at a genome-wide scale would be of great interest to biologists, but is not available to date. Results To identify and analyze molecular interaction networks, we developed MIR@NT@N, an integrative approach based on a meta-regulation network model and a large-scale database. MIR@NT@N uses a graph-based approach to predict novel molecular actors across multiple regulatory processes (i.e. TFs acting on protein-coding or miRNA genes, or miRNAs acting on messenger RNAs). Exploiting these predictions, the user can generate networks and further analyze them to identify sub-networks, including motifs such as feedback and feedforward loops (FBL and FFL). In addition, networks can be built from lists of molecular actors with an a priori role in a given biological process to predict novel and unanticipated interactions. Analyses can be contextualized and filtered by integrating additional information such as microarray expression data. All results, including generated graphs, can be visualized, saved and exported into various formats. MIR@NT@N performances have been evaluated using published data and then applied to the regulatory program underlying epithelium to mesenchyme transition (EMT), an evolutionary-conserved process which is implicated in embryonic development and disease. Conclusions MIR@NT@N is an effective computational approach to identify novel molecular regulations and to predict gene regulatory networks and sub-networks including conserved motifs within a given biological context. Taking advantage of the M@IA environment, MIR@NT@N is a user-friendly web resource freely available at http://mironton.uni.lu which will be

  5. Identifying Repetitive Institutional Review Board Stipulations by Natural Language Processing and Network Analysis.

    PubMed

    Kury, Fabrício S P; Cimino, James J

    2015-01-01

    The corrections ("stipulations") to a proposed research study protocol produced by an institutional review board (IRB) can often be repetitive across many studies; however, there is no standard set of stipulations that could be used, for example, by researchers wishing to anticipate and correct problems in their research proposals prior to submitting to an IRB. The objective of the research was to computationally identify the most repetitive types of stipulations generated in the course of IRB deliberations. The text of each stipulation was normalized using the natural language processing techniques. An undirected weighted network was constructed in which each stipulation was represented by a node, and each link, if present, had weight corresponding to the TF-IDF Cosine Similarity of the stipulations. Network analysis software was then used to identify clusters in the network representing similar stipulations. The final results were correlated with additional data to produce further insights about the IRB workflow. From a corpus of 18,582 stipulations we identified 31 types of repetitive stipulations. Those types accounted for 3,870 stipulations (20.8% of the corpus) produced for 697 (88.7%) of all protocols in 392 (also 88.7%) of all the CNS IRB meetings with stipulations entered in our data source. A notable peroportion of the corrections produced by the IRB can be considered highly repetitive. Our shareable method relied on a minimal manual analysis and provides an intuitive exploration with theoretically unbounded granularity. Finer granularity allowed for the insight that is anticipated to prevent the need for identifying the IRB panel expertise or any human supervision.

  6. Trade-off of cerebello-cortical and cortico-cortical functional networks for planning in 6-year-old children.

    PubMed

    Kipping, Judy A; Margulies, Daniel S; Eickhoff, Simon B; Lee, Annie; Qiu, Anqi

    2018-08-01

    Childhood is a critical period for the development of cognitive planning. There is a lack of knowledge on its neural mechanisms in children. This study aimed to examine cerebello-cortical and cortico-cortical functional connectivity in association with planning skills in 6-year-olds (n = 76). We identified the cerebello-cortical and cortico-cortical functional networks related to cognitive planning using activation likelihood estimation (ALE) meta-analysis on existing functional imaging studies on spatial planning, and data-driven independent component analysis (ICA) of children's resting-state functional MRI (rs-fMRI). We investigated associations of cerebello-cortical and cortico-cortical functional connectivity with planning ability in 6-year-olds, as assessed using the Stockings of Cambridge task. Long-range functional connectivity of two cerebellar networks (lobules VI and lateral VIIa) with the prefrontal and premotor cortex were greater in children with poorer planning ability. In contrast, cortico-cortical association networks were not associated with the performance of planning in children. These results highlighted the key contribution of the lateral cerebello-frontal functional connectivity, but not cortico-cortical association functional connectivity, for planning ability in 6-year-olds. Our results suggested that brain adaptation to the acquisition of planning ability during childhood is partially achieved through the engagement of the cerebello-cortical functional connectivity. Copyright © 2018 Elsevier Inc. All rights reserved.

  7. Depleted UF6 Management Information Network - A resource for the public,

    Science.gov Websites

    Depleted UF6 Management Information Network Web Site is an online repository of information about the U.S ) and DUF6, research and development efforts for beneficial uses of DU, DOE's program for management of line DUF6 Guide DUF6 Guide line Introductory information about depleted uranium: how it is created

  8. Algorithm to Identify Frequent Coupled Modules from Two-Layered Network Series: Application to Study Transcription and Splicing Coupling

    PubMed Central

    Li, Wenyuan; Dai, Chao; Liu, Chun-Chi

    2012-01-01

    Abstract Current network analysis methods all focus on one or multiple networks of the same type. However, cells are organized by multi-layer networks (e.g., transcriptional regulatory networks, splicing regulatory networks, protein-protein interaction networks), which interact and influence each other. Elucidating the coupling mechanisms among those different types of networks is essential in understanding the functions and mechanisms of cellular activities. In this article, we developed the first computational method for pattern mining across many two-layered graphs, with the two layers representing different types yet coupled biological networks. We formulated the problem of identifying frequent coupled clusters between the two layers of networks into a tensor-based computation problem, and proposed an efficient solution to solve the problem. We applied the method to 38 two-layered co-transcription and co-splicing networks, derived from 38 RNA-seq datasets. With the identified atlas of coupled transcription-splicing modules, we explored to what extent, for which cellular functions, and by what mechanisms transcription-splicing coupling takes place. PMID:22697243

  9. [Formula: see text]A longitudinal analysis of the attention networks in 6- to 11-year-old children.

    PubMed

    Lewis, Frances C; Reeve, Robert A; Johnson, Katherine A

    2018-02-01

    Attention is critical for everyday functioning. Posner and Petersen's model of attention describes three neural networks involved in attention control-the alerting network for arousal, the orienting network for selecting sensory input and reorienting attention, and the executive network for the regulatory control of attention. No longitudinal research has examined relative change in these networks in children. A modified version of the attention network task (ANT) was used to examine changes in the three attention networks, three times over 12 months, in 114 6-, 8- and 10-year-olds. Findings showed that the alerting network continued to develop over this period, the orienting network had stabilized by 6 years, and the conflict network had largely stabilized by 7 years. The reorienting of attention was also assessed using invalid cues, which showed a similar developmental trajectory to the orienting attention network and had stabilized by 6 years. The results confirm that age 6 to 7 years is a critical period in the development of attention, in particular executive attention. The largest improvement over the evaluation period was between 6 and 7 years; however, subtle changes were found in attention beyond 8 years of age.

  10. Identifying protein complex by integrating characteristic of core-attachment into dynamic PPI network.

    PubMed

    Shen, Xianjun; Yi, Li; Jiang, Xingpeng; He, Tingting; Yang, Jincai; Xie, Wei; Hu, Po; Hu, Xiaohua

    2017-01-01

    How to identify protein complex is an important and challenging task in proteomics. It would make great contribution to our knowledge of molecular mechanism in cell life activities. However, the inherent organization and dynamic characteristic of cell system have rarely been incorporated into the existing algorithms for detecting protein complexes because of the limitation of protein-protein interaction (PPI) data produced by high throughput techniques. The availability of time course gene expression profile enables us to uncover the dynamics of molecular networks and improve the detection of protein complexes. In order to achieve this goal, this paper proposes a novel algorithm DCA (Dynamic Core-Attachment). It detects protein-complex core comprising of continually expressed and highly connected proteins in dynamic PPI network, and then the protein complex is formed by including the attachments with high adhesion into the core. The integration of core-attachment feature into the dynamic PPI network is responsible for the superiority of our algorithm. DCA has been applied on two different yeast dynamic PPI networks and the experimental results show that it performs significantly better than the state-of-the-art techniques in terms of prediction accuracy, hF-measure and statistical significance in biology. In addition, the identified complexes with strong biological significance provide potential candidate complexes for biologists to validate.

  11. Large-scale integrative network-based analysis identifies common pathways disrupted by copy number alterations across cancers

    PubMed Central

    2013-01-01

    Background Many large-scale studies analyzed high-throughput genomic data to identify altered pathways essential to the development and progression of specific types of cancer. However, no previous study has been extended to provide a comprehensive analysis of pathways disrupted by copy number alterations across different human cancers. Towards this goal, we propose a network-based method to integrate copy number alteration data with human protein-protein interaction networks and pathway databases to identify pathways that are commonly disrupted in many different types of cancer. Results We applied our approach to a data set of 2,172 cancer patients across 16 different types of cancers, and discovered a set of commonly disrupted pathways, which are likely essential for tumor formation in majority of the cancers. We also identified pathways that are only disrupted in specific cancer types, providing molecular markers for different human cancers. Analysis with independent microarray gene expression datasets confirms that the commonly disrupted pathways can be used to identify patient subgroups with significantly different survival outcomes. We also provide a network view of disrupted pathways to explain how copy number alterations affect pathways that regulate cell growth, cycle, and differentiation for tumorigenesis. Conclusions In this work, we demonstrated that the network-based integrative analysis can help to identify pathways disrupted by copy number alterations across 16 types of human cancers, which are not readily identifiable by conventional overrepresentation-based and other pathway-based methods. All the results and source code are available at http://compbio.cs.umn.edu/NetPathID/. PMID:23822816

  12. IPv6 Geolocation Using Latency Constraints

    DTIC Science & Technology

    2014-03-01

    CDF area regions for ONE2ONE . . . . . . . . . . . . . . . . . . . . 37 ix THIS PAGE INTENTIONALLY LEFT BLANK x List of Tables Table 2.1 Number of... List of Acronyms and Abbreviations Ark archipelago AS autonomous system ASN autonomous system number BGP Border Gateway Protocol CAIDA Cooperative...request registered information by the organization such as the organization’s phone number , administrator, or physical address [19]. The DNS is a

  13. Analyzed immunogenicity of fractional doses of Sabin-inactivated poliovirus vaccine (sIPV) with intradermal delivery in rats.

    PubMed

    Ma, Lei; Cai, Wei; Sun, Mingbo; Cun, Yina; Zhou, Jian; Liu, Jing; Hu, Wenzhu; Zhang, Xinwen; Song, Shaohui; Jiang, Shude; Liao, Guoyang

    2016-12-01

    The live-attenuated oral polio vaccine (OPV) will be no longer used when wild poliovirus (WPV) eliminating in worldwide, according to GPEI (the Global Polio Eradication Initiative) Reports. It is planning to replace OPV by Sabin-based inactivated poliovirus vaccine (sIPV) in developing countries, with purpose of reducing of the economic burden and maintaining of the appropriate antibody levels in population. It studied serial fractional doses immunized by intradermal injection (ID) in rats, to reduce consume of antigen and financial burden, maintaining sufficient immunogenicity; Methods: Study groups were divided in 4 groups of dose gradient, which were one-tenth (1/10), one-fifth (1/5), one-third (1/3) and one-full dose (1/1), according to the volume of distribution taken from the same batch of vaccine (sIPV). Wistar rats were injected intradermally with the needle and syringe sing the mantoux technique taken once month for 3 times. It was used as positive control that intramuscular inoculation (IM) was injected with one-full dose (1/1) with same batch of sIPV. PBS was used as negative control. Blood samples were collected via tail vein. After 30 d with 3 round of immunization, it analyzed the changes of neutralization antibody titers in the each group by each immunization program end; Results: The results of seroconversion had positive correlation with different doses in ID groups. The higher concentration of D-antigen (D-Ag) could conduct higher seroconversion. Furthermore, different types of viruses had different seroconversion trend. It showed that the geometric mean titers (GMTs) of each fractional-dose ID groups increased by higher concentration of D-Ag, and it got significant lower than the full-dose IM group. At 90 th days of immunization, the GMTs for each poliovirus subtypes of fractional doses were almost higher than 1:8, implied that it could be meaning positive seroprotection titer for polio vaccine types, according to WHO suggestion; Conclusions

  14. Beyond passivity: Dependency as a risk factor for intimate partner violence.

    PubMed

    Kane, Fallon A; Bornstein, Robert F

    2016-02-01

    Interpersonal dependency in male perpetrators of intimate partner violence (IPV) is an understudied phenomenon but one that has noteworthy clinical implications. The present investigation used meta-analytic techniques to quantify the dependency-IPV link in all extant studies examining this relationship (n of studies = 17). Studies were gathered via an extensive literature search using relevant dependency/IPV search terms in the PsychInfo, Medline and Google Scholar databases. Results revealed a small but statistically significant relationship between dependency and perpetration of IPV in men (r = 0.150, Combined Z = 4.25, p < 0.0001), with the magnitude of the dependency-IPV link becoming stronger (r = 0.365, Combined Z = 6.00, p < 0.0001) when studies using measures of dependent personality disorder symptoms were omitted. Other moderators of the dependency-IPV effect size included IPV measure, type of sample and perpetrator age. These findings illuminate the underlying dynamics and interpersonal processes involved in some instances of IPV and may aid in understanding how to identify and treat male perpetrators of domestic violence. Copyright © 2015 John Wiley & Sons, Ltd.

  15. Cost-effectiveness of using social networks to identify undiagnosed HIV infection among minority populations.

    PubMed

    Shrestha, Ram K; Sansom, Stephanie L; Kimbrough, Lisa; Hutchinson, Angela B; Daltry, Daniel; Maldonado, Waleska; Simpson-May, Georgia M; Illemszky, Sean

    2010-01-01

    In 2003, the Centers for Disease Control and Prevention launched the Advancing HIV Prevention project to implement new strategies for diagnosing human immunodeficiency virus (HIV) infections outside medical settings and prevent new infections by working with HIV-infected persons and their partners. : To assess the cost and effectiveness of a social network strategy to identify new HIV diagnoses among minority populations. Four community-based organizations (CBOs) in Boston, Philadelphia, and Washington, District of Columbia, implemented a social network strategy for HIV counseling and testing from October 2003 to December 2005. We used standardized cost collection forms to collect program costs attributable to staff time, travel, incentives, test kits, testing supplies, office space, equipment, and utilities. The CBOs used the networks of high-risk and HIV-infected persons (recruiters) who referred their partners and associates for HIV counseling and testing. We obtained HIV-testing outcomes from project databases. Number of HIV tests, number of new HIV-diagnoses notified, total program cost, cost per person tested, cost per person notified of new HIV diagnosis. Two CBOs, both based in Philadelphia, identified 25 and 17 recruiters on average annually and tested 136 and 330 network associates, respectively. Among those tested, 12 and 13 associates were notified of new HIV diagnoses (seropositivity: 9.8%, 4.4%). CBOs in Boston, Massachusetts, and Washington, District of Columbia, identified 26 and 24 recruiters per year on average and tested 228 and 123 network associates. Among those tested, 12 and 11 associates were notified of new HIV diagnoses (seropositivity: 5.1%, 8.7%). The cost per associate notified of a new HIV diagnosis was $11 578 and $12 135 in Philadelphia, and $16 437 and $16 101 in Boston, Massachusetts, and Washington, District of Columbia. The cost of notifying someone with a new HIV diagnosis using social networks varied across sites. Our analysis

  16. Childhood sexual abuse, intimate partner violence during pregnancy, and posttraumatic stress symptoms following childbirth: a path analysis.

    PubMed

    Oliveira, Aline Gaudard E Silva de; Reichenheim, Michael Eduardo; Moraes, Claudia Leite; Howard, Louise Michele; Lobato, Gustavo

    2017-04-01

    The aim of the study was to explore the pathways by which childhood sexual abuse (CSA), psychological and physical intimate partner violence (IPV) during pregnancy, and other covariates relate to each other and to posttraumatic stress disorder (PTSD) symptoms in the postpartum period. The sample comprised 456 women who gave birth at a maternity service for high-risk pregnancies in Rio de Janeiro, Brazil, interviewed at 6-8 weeks after birth. A path analysis was carried out to explore the postulated pathways between exposures and outcome. Trauma History Questionnaire, Conflict Tactics Scales and Posttraumatic Stress Disorder Checklist were used to assess information about exposures of main interest and outcome. The link between CSA and PTSD symptoms was mediated by history of trauma, psychiatric history, psychological IPV, and fear of childbirth during pregnancy. Physical IPV was directly associated with postnatal PTSD symptoms, whereas psychological IPV connection seemed to be partially mediated by physical abuse and fear of childbirth during pregnancy. The role of CSA, IPV, and other psychosocial characteristics on the occurrence of PTSD symptoms following childbirth as well as the intricate network of these events should be acknowledged in clinic and intervention approaches.

  17. Effect of LEO cycling on 125 Ah advanced design IPV nickel-hydrogen flight cells. An update

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Hall, Stephen W.

    1991-01-01

    Validation testing of the NASA Lewis 125 Ah advanced design individual pressure vessel (IPV) nickel-hydrogen flight cells was conducted. Work consisted of characterization, storage, and cycle life testing. There was no capacity degradation after 52 days of storage with the cells in the discharged state, an open circuit, 0 C, and a hydrogen pressure of 14.5 psia. The catalyzed wall wick cells were cycled for over 11,000 cycles with no cell failures in the continuing test. One of the noncatalyzed wall wick cells failed.

  18. Implementation and Analysis of a Threat Model for IPv6 Host Autoconfiguration

    DTIC Science & Technology

    2006-09-01

    Collision Generator”, two Denial of Service attacks. The software was developed in NetBeans IDE 5.0, and the comments were converted to Javadoc with the...appropriate NetBeans function. A. ICMPV6 SUPPORT FOR JPCAP As the attack uses ICMPv6 messages, a means must be provided to generate these messages...ICMP packet. * * Developed in NetBeans IDE 5.0 * Makes use of Jpcap 0.5.1 library * (http://netresearch.ics.uci.edu/kfujii/jpcap/doc

  19. Identifying module biomarkers from gastric cancer by differential correlation network

    PubMed Central

    Liu, Xiaoping; Chang, Xiao

    2016-01-01

    Gastric cancer (stomach cancer) is a severe disease caused by dysregulation of many functionally correlated genes or pathways instead of the mutation of individual genes. Systematic identification of gastric cancer biomarkers can provide insights into the mechanisms underlying this deadly disease and help in the development of new drugs. In this paper, we present a novel network-based approach to predict module biomarkers of gastric cancer that can effectively distinguish the disease from normal samples. Specifically, by assuming that gastric cancer has mainly resulted from dysfunction of biomolecular networks rather than individual genes in an organism, the genes in the module biomarkers are potentially related to gastric cancer. Finally, we identified a module biomarker with 27 genes, and by comparing the module biomarker with known gastric cancer biomarkers, we found that our module biomarker exhibited a greater ability to diagnose the samples with gastric cancer. PMID:27703371

  20. Gene expression patterns combined with network analysis identify hub genes associated with bladder cancer.

    PubMed

    Bi, Dongbin; Ning, Hao; Liu, Shuai; Que, Xinxiang; Ding, Kejia

    2015-06-01

    To explore molecular mechanisms of bladder cancer (BC), network strategy was used to find biomarkers for early detection and diagnosis. The differentially expressed genes (DEGs) between bladder carcinoma patients and normal subjects were screened using empirical Bayes method of the linear models for microarray data package. Co-expression networks were constructed by differentially co-expressed genes and links. Regulatory impact factors (RIF) metric was used to identify critical transcription factors (TFs). The protein-protein interaction (PPI) networks were constructed by the Search Tool for the Retrieval of Interacting Genes/Proteins (STRING) and clusters were obtained through molecular complex detection (MCODE) algorithm. Centralities analyses for complex networks were performed based on degree, stress and betweenness. Enrichment analyses were performed based on Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) databases. Co-expression networks and TFs (based on expression data of global DEGs and DEGs in different stages and grades) were identified. Hub genes of complex networks, such as UBE2C, ACTA2, FABP4, CKS2, FN1 and TOP2A, were also obtained according to analysis of degree. In gene enrichment analyses of global DEGs, cell adhesion, proteinaceous extracellular matrix and extracellular matrix structural constituent were top three GO terms. ECM-receptor interaction, focal adhesion, and cell cycle were significant pathways. Our results provide some potential underlying biomarkers of BC. However, further validation is required and deep studies are needed to elucidate the pathogenesis of BC. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. A cross-sectional study identifying the pattern of factors related to psychological intimate partner violence exposure in Slovenian family practice attendees: what hurt them the most

    PubMed Central

    2014-01-01

    Background Intimate partner violence (IPV) is yet to be fully acknowledged as a public health problem in Slovenia. This study aimed to explore the health and other patient characteristics associated with psychological IPV exposure and gender-related specificity in family clinic attendees. Methods In a multi-centre cross-sectional study, 960 family practice attendees aged 18 years and above were recruited. In 689 interviews with currently- or previously-partnered patients, the short form of A Domestic Violence Exposure Questionnaire and additional questions about behavioural patterns of exposure to psychological abuse in the past year were given. General practitioners (GPs) reviewed the medical charts of 470 patients who met the IPV exposure criteria. The Domestic Violence Exposure Medical Chart Check List was used, collecting data on the patients’ lives and physical, sexual and reproductive, and psychological health status, as well as sick leave, hospitalisation, visits to family practices and referrals to other clinical specialists in the past year. In multivariate logistic regression modelling the factors associated with past year psychological IPV exposure were identified, with P < 0.05 set as the level of statistical significance. Results Of the participants (n = 470), 12.1% (n = 57) were exposed to psychological IPV in the previous year (46 women and 11 men). They expressed more complaints regarding sexual and reproductive (p = 0.011), and psychological and behavioural status (p <0.001), in the year prior to the survey. Unemployment or working part-time, a college degree, an intimate relationship of six years or more and a history of disputes in the intimate relationship, increased the odds of psychological IPV exposure in the sample, explaining 41% of the variance. In females, unemployment and a history of disputes in the intimate relationship explained 43% of the variance. Conclusions The prevalence of psychological IPV above 10% during the past year

  2. Gene Network Construction from Microarray Data Identifies a Key Network Module and Several Candidate Hub Genes in Age-Associated Spatial Learning Impairment

    PubMed Central

    Uddin, Raihan; Singh, Shiva M.

    2017-01-01

    As humans age many suffer from a decrease in normal brain functions including spatial learning impairments. This study aimed to better understand the molecular mechanisms in age-associated spatial learning impairment (ASLI). We used a mathematical modeling approach implemented in Weighted Gene Co-expression Network Analysis (WGCNA) to create and compare gene network models of young (learning unimpaired) and aged (predominantly learning impaired) brains from a set of exploratory datasets in rats in the context of ASLI. The major goal was to overcome some of the limitations previously observed in the traditional meta- and pathway analysis using these data, and identify novel ASLI related genes and their networks based on co-expression relationship of genes. This analysis identified a set of network modules in the young, each of which is highly enriched with genes functioning in broad but distinct GO functional categories or biological pathways. Interestingly, the analysis pointed to a single module that was highly enriched with genes functioning in “learning and memory” related functions and pathways. Subsequent differential network analysis of this “learning and memory” module in the aged (predominantly learning impaired) rats compared to the young learning unimpaired rats allowed us to identify a set of novel ASLI candidate hub genes. Some of these genes show significant repeatability in networks generated from independent young and aged validation datasets. These hub genes are highly co-expressed with other genes in the network, which not only show differential expression but also differential co-expression and differential connectivity across age and learning impairment. The known function of these hub genes indicate that they play key roles in critical pathways, including kinase and phosphatase signaling, in functions related to various ion channels, and in maintaining neuronal integrity relating to synaptic plasticity and memory formation. Taken

  3. Gene Network Construction from Microarray Data Identifies a Key Network Module and Several Candidate Hub Genes in Age-Associated Spatial Learning Impairment.

    PubMed

    Uddin, Raihan; Singh, Shiva M

    2017-01-01

    As humans age many suffer from a decrease in normal brain functions including spatial learning impairments. This study aimed to better understand the molecular mechanisms in age-associated spatial learning impairment (ASLI). We used a mathematical modeling approach implemented in Weighted Gene Co-expression Network Analysis (WGCNA) to create and compare gene network models of young (learning unimpaired) and aged (predominantly learning impaired) brains from a set of exploratory datasets in rats in the context of ASLI. The major goal was to overcome some of the limitations previously observed in the traditional meta- and pathway analysis using these data, and identify novel ASLI related genes and their networks based on co-expression relationship of genes. This analysis identified a set of network modules in the young, each of which is highly enriched with genes functioning in broad but distinct GO functional categories or biological pathways. Interestingly, the analysis pointed to a single module that was highly enriched with genes functioning in "learning and memory" related functions and pathways. Subsequent differential network analysis of this "learning and memory" module in the aged (predominantly learning impaired) rats compared to the young learning unimpaired rats allowed us to identify a set of novel ASLI candidate hub genes. Some of these genes show significant repeatability in networks generated from independent young and aged validation datasets. These hub genes are highly co-expressed with other genes in the network, which not only show differential expression but also differential co-expression and differential connectivity across age and learning impairment. The known function of these hub genes indicate that they play key roles in critical pathways, including kinase and phosphatase signaling, in functions related to various ion channels, and in maintaining neuronal integrity relating to synaptic plasticity and memory formation. Taken together, they

  4. Geographically Modified PageRank Algorithms: Identifying the Spatial Concentration of Human Movement in a Geospatial Network

    PubMed Central

    2015-01-01

    A network approach, which simplifies geographic settings as a form of nodes and links, emphasizes the connectivity and relationships of spatial features. Topological networks of spatial features are used to explore geographical connectivity and structures. The PageRank algorithm, a network metric, is often used to help identify important locations where people or automobiles concentrate in the geographical literature. However, geographic considerations, including proximity and location attractiveness, are ignored in most network metrics. The objective of the present study is to propose two geographically modified PageRank algorithms—Distance-Decay PageRank (DDPR) and Geographical PageRank (GPR)—that incorporate geographic considerations into PageRank algorithms to identify the spatial concentration of human movement in a geospatial network. Our findings indicate that in both intercity and within-city settings the proposed algorithms more effectively capture the spatial locations where people reside than traditional commonly-used network metrics. In comparing location attractiveness and distance decay, we conclude that the concentration of human movement is largely determined by the distance decay. This implies that geographic proximity remains a key factor in human mobility. PMID:26437000

  5. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight battery cells

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Hall, Stephen W.

    1990-01-01

    A breakthrough in low earth orbit (LEO) cycle life of individual pressure vessel (IPV) nickel hydrogen battery cells was reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40,000 LEO cycles compared to 3500 cycles for cells containing 31 percent KOH. The effect of KOH concentration on cycle life was studied. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min charge (2 x normal rate). The depth of discharge (DOD) was 80 percent. The cell temperature was maintained at 23 C. The next step is to validate these results using flight hardware and a real time LEO test. NASA Lewis has a contract with the Naval Weapons Support Center (NWSC), Crane, Indiana, to validate the boiler plate test results. Six 48 A-hr Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells) and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The cells were cycled for over 8000 cycles in the continuing test. There were no failures for the cells containing 26 percent KOH. There was two failures, however, for the cells containing 31 percent KOH.

  6. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight battery cells

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Hall, Stephen W.

    1990-01-01

    A breakthrough in the low-earth-orbit (LEO) cycle life of individual pressure vessel (IPV) nickel hydrogen battery cells is reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40,000 LEO cycles compared to 3500 cycles for cells containing 31 percent KOH. The effect of KOH concentration on cycle life was studied. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min charge (2 x normal rate). The depth of discharge (DOD) was 80 percent. The cell temperature was maintained at 23 C. The next step is to validate these results using flight hardware and real time LEO test. NASA Lewis has a contract with the Naval Weapons Support Center (NWSC), Crane, Indiana to validate the boiler plate test results. Six 48 A-hr Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells) and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The cells were cycled for over 8000 cycles in the continuing test. There were no failures for the cells containing 26 percent KOH. There were two failures, however, for the cells containing 31 percent KOH.

  7. Identifying the most influential spreaders in complex networks by an Extended Local K-Shell Sum

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Zhang, Ruisheng; Yang, Zhao; Hu, Rongjing; Li, Mengtian; Yuan, Yongna; Li, Keqin

    Identifying influential spreaders is crucial for developing strategies to control the spreading process on complex networks. Following the well-known K-Shell (KS) decomposition, several improved measures are proposed. However, these measures cannot identify the most influential spreaders accurately. In this paper, we define a Local K-Shell Sum (LKSS) by calculating the sum of the K-Shell indices of the neighbors within 2-hops of a given node. Based on the LKSS, we propose an Extended Local K-Shell Sum (ELKSS) centrality to rank spreaders. The ELKSS is defined as the sum of the LKSS of the nearest neighbors of a given node. By assuming that the spreading process on networks follows the Susceptible-Infectious-Recovered (SIR) model, we perform extensive simulations on a series of real networks to compare the performance between the ELKSS centrality and other six measures. The results show that the ELKSS centrality has a better performance than the six measures to distinguish the spreading ability of nodes and to identify the most influential spreaders accurately.

  8. Social Network Analysis: A Simple but Powerful Tool for Identifying Teacher Leaders

    ERIC Educational Resources Information Center

    Smith, P. Sean; Trygstad, Peggy J.; Hayes, Meredith L.

    2018-01-01

    Instructional teacher leadership is central to a vision of distributed leadership. However, identifying instructional teacher leaders can be a daunting task, particularly for administrators who find themselves either newly appointed or faced with high staff turnover. This article describes the use of social network analysis (SNA), a simple but…

  9. Influence maximization in time bounded network identifies transcription factors regulating perturbed pathways

    PubMed Central

    Jo, Kyuri; Jung, Inuk; Moon, Ji Hwan; Kim, Sun

    2016-01-01

    Motivation: To understand the dynamic nature of the biological process, it is crucial to identify perturbed pathways in an altered environment and also to infer regulators that trigger the response. Current time-series analysis methods, however, are not powerful enough to identify perturbed pathways and regulators simultaneously. Widely used methods include methods to determine gene sets such as differentially expressed genes or gene clusters and these genes sets need to be further interpreted in terms of biological pathways using other tools. Most pathway analysis methods are not designed for time series data and they do not consider gene-gene influence on the time dimension. Results: In this article, we propose a novel time-series analysis method TimeTP for determining transcription factors (TFs) regulating pathway perturbation, which narrows the focus to perturbed sub-pathways and utilizes the gene regulatory network and protein–protein interaction network to locate TFs triggering the perturbation. TimeTP first identifies perturbed sub-pathways that propagate the expression changes along the time. Starting points of the perturbed sub-pathways are mapped into the network and the most influential TFs are determined by influence maximization technique. The analysis result is visually summarized in TF-Pathway map in time clock. TimeTP was applied to PIK3CA knock-in dataset and found significant sub-pathways and their regulators relevant to the PIP3 signaling pathway. Availability and Implementation: TimeTP is implemented in Python and available at http://biohealth.snu.ac.kr/software/TimeTP/. Supplementary information: Supplementary data are available at Bioinformatics online. Contact: sunkim.bioinfo@snu.ac.kr PMID:27307609

  10. Intimate Partner Violence Experienced by Physicians: A Review.

    PubMed

    Hernandez, Barbara Couden; Reibling, Ellen T; Maddux, Charles; Kahn, Michael

    2016-03-01

    Physicians play a significant role in screening for domestic violence. However, little information is available about the prevalence of physicians who experience intimate partner violence (IPV) or the implications for their clinical practice. National surveys indicate a potential prevalence of 16% for sexual abuse and 32% for abuse by an intimate partner. This extrapolates to more than 395,000 potential physician victims, the majority of which are women. We conducted a systematic review of IPV and physician victims from 1990 to 2014 that included peer-reviewed journals, trade books, and dissertations that referenced physician victims. We identified 17 publications; nine quantitative studies, four first-person accounts, one qualitative study, and a qualitative dissertation that included two physician subjects. Two case studies of victimized physicians were identified in trade books. Quantitative results noted that women reported higher prevalence for all experiences of violence [childhood exposure (6%-32%), adult IPV exposure (7%-24%)] than men (6%-10%). This review highlights the need for improved understanding of physician experience with IPV, and development of physician-sensitive resources and treatment approaches. Contributions and limitations are provided for each publication. IPV exposure impacts clinical practice, including reticence to consistently screen patients. Lower reported prevalence may be related to extreme stigma among physicians that may prevent their reporting and help seeking, but more research is needed. We provide recommendations for clinical practice, education, and future research.

  11. DoD Cybersecurity Weakness as Reported in Audit Reports Issued From August 1, 2014, Through July 31, 2015 (REDACTED)

    DTIC Science & Technology

    2015-09-25

    Protocol Version 6 ( IPv6 ). The Federal and DoD requirements were not completed because the DoD Chief Information Officer (CIO) and U.S. Cyber Command...had not made IPv6 a priority. Further, the DoD CIO did not have a current plan of action and milestones to advance DoD IPv6 migration efforts...According to the report, the continued use of IPv4 will delay the potential benefits of IPv6 , such as improved communication, warfighter mobility

  12. Postpartum Intimate Partner Violence and Health Risks Among Young Mothers in the United States: A Prospective Study

    PubMed Central

    Ickovics, Jeannette; Lewis, Jessica B.; Magriples, Urania; Kershaw, Trace S.

    2014-01-01

    The study assessed the relationship between postpartum intimate partner violence (IPV) and postpartum health risks among young mothers over time. Data were collected from 2001 to 2005 on young women aged 14–25 attending obstetrics and gynecology clinics in two US cities. Postpartum IPV (i.e., emotional, physical, sexual) was assessed at 6 and 12 months after childbirth (n = 734). Four types of postpartum IPV patterns were examined: emerged IPV, dissipated IPV, repeated IPV, and no IPV. Emerged IPV occurred at 12 months postpartum, not 6 months postpartum. Dissipated IPV occurred at 6 months postpartum, not 12 months postpartum. Repeated IPV was reported at 6 months and 12 months postpartum. Postpartum health risks studied at both time points were perceived stress, depression, fear of condom negotiation, condom use, infant sleeping problems, and parental stress. Repeated measures analysis of covariance was used. The proportion of young mothers reporting IPV after childbirth increased from 17.9 % at 6 months postpartum to 25.3 % at 12 months postpartum (P < 0.001). Emerged and/or repeated postpartum IPV were associated with increased perceived stress, depression, fear of condom negotiation, and infant sleeping problems as well as decreased condom use (P < 0.05). Dissipated postpartum IPV was associated with decreased depression (P < 0.05). IPV screening and prevention programs for young mothers may reduce health risks observed in this group during the postpartum period. PMID:24562504

  13. A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL).

    PubMed

    Chen, Yibo; Chanet, Jean-Pierre; Hou, Kun-Mean; Shi, Hongling; de Sousa, Gil

    2015-08-10

    In recent years, IoT (Internet of Things) technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs) can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs) complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF) that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL) was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds.

  14. A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL)

    PubMed Central

    Chen, Yibo; Chanet, Jean-Pierre; Hou, Kun-Mean; Shi, Hongling; de Sousa, Gil

    2015-01-01

    In recent years, IoT (Internet of Things) technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs) can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs) complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF) that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL) was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds. PMID:26266411

  15. The Department of Defense’s Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    DTIC Science & Technology

    2006-12-01

    Robert N. Beck, Dean Graduate School of Business and Public Policy iv THIS PAGE INTENTIONALLY...THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT...Warfighter Information Network – Tactical 1 I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT APPLIED PROJECT PLAN A. TENTATIVE PROJECT TITLE

  16. Vial usage, device dead space, vaccine wastage, and dose accuracy of intradermal delivery devices for inactivated poliovirus vaccine (IPV).

    PubMed

    Jarrahian, Courtney; Rein-Weston, Annie; Saxon, Gene; Creelman, Ben; Kachmarik, Greg; Anand, Abhijeet; Zehrung, Darin

    2017-03-27

    Intradermal delivery of a fractional dose of inactivated poliovirus vaccine (IPV) offers potential benefits compared to intramuscular (IM) delivery, including possible cost reductions and easing of IPV supply shortages. Objectives of this study were to assess intradermal delivery devices for dead space, wastage generated by the filling process, dose accuracy, and total number of doses that can be delivered per vial. Devices tested included syringes with staked (fixed) needles (autodisable syringes and syringes used with intradermal adapters), a luer-slip needle and syringe, a mini-needle syringe, a hollow microneedle device, and disposable-syringe jet injectors with their associated filling adapters. Each device was used to withdraw 0.1-mL fractional doses from single-dose IM glass vials which were then ejected into a beaker. Both vial and device were weighed before and after filling and again after expulsion of liquid to record change in volume at each stage of the process. Data were used to calculate the number of doses that could potentially be obtained from multidose vials. Results show wide variability in dead space, dose accuracy, overall wastage, and total number of doses that can be obtained per vial among intradermal delivery devices. Syringes with staked needles had relatively low dead space and low overall wastage, and could achieve a greater number of doses per vial compared to syringes with a detachable luer-slip needle. Of the disposable-syringe jet injectors tested, one was comparable to syringes with staked needles. If intradermal delivery of IPV is introduced, selection of an intradermal delivery device can have a substantial impact on vaccine wasted during administration, and thus on the required quantity of vaccine that needs to be purchased. An ideal intradermal delivery device should be not only safe, reliable, accurate, and acceptable to users and vaccine recipients, but should also have low dead space, high dose accuracy, and low overall

  17. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    PubMed

    Nicholson, Emma; Murphy, Tara; Larkin, Philip; Normand, Charles; Guerin, Suzanne

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users. Preferred reporting items for systematic review and meta-analysis protocol guidelines will inform the search and analysis plan to ensure that the synthesis of the data is as rigorous as possible. An approach based on critical interpretative synthesis will be adapted to include a thematic synthesis for the identification of higher-order themes and messages from a body of dissemination products generated by the Palliative Care Research Network. The thematic synthesis outlined in the present protocol offers a novel method of synthesising data from a focused research network that employs a variety of dissemination materials as a means of identifying key themes and messages from a specific body of research. The high-level themes and messages will be identified from the thematic synthesis, widely disseminated and targeted towards a range of stakeholders and knowledge users such as carers, health and social care professionals, policy makers and researchers.

  18. Posttraumatic stress disorder symptoms and attitudes about social support: Does shame matter?

    PubMed

    Dodson, Thomas S; Beck, J Gayle

    2017-04-01

    Considerable research has examined the association between posttraumatic stress disorder (PTSD) symptoms and social support. One facet of this relationship that deserves greater attention concerns trauma survivors' negative expectations towards social support, termed negative network orientation. To expand our understanding of negative network orientation, the current study examined shame as a possible mediator in the relationship between PTSD symptoms and negative network orientation, in a sample of 202 female survivors of intimate partner violence (IPV). Additionally, a history of child abuse (CA) was evaluated as a moderator of the association between shame and negative network orientation in this model. Path analyses indicated a significant indirect effect between PTSD symptoms and negative network orientation through shame, indicative of mediation. A history of CA moderated this effect, such that women with a history of CA in addition to IPV showed a significantly stronger relationship between PTSD symptoms and negative network orientation through shame, relative to women who only had a history of IPV. These findings support the relevance of shame in understanding the association between PTSD symptoms and negative beliefs about social support and highlight the role of childhood abuse as a moderator in this process among IPV survivors. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. A novel method to identify pathways associated with renal cell carcinoma based on a gene co-expression network

    PubMed Central

    RUAN, XIYUN; LI, HONGYUN; LIU, BO; CHEN, JIE; ZHANG, SHIBAO; SUN, ZEQIANG; LIU, SHUANGQING; SUN, FAHAI; LIU, QINGYONG

    2015-01-01

    The aim of the present study was to develop a novel method for identifying pathways associated with renal cell carcinoma (RCC) based on a gene co-expression network. A framework was established where a co-expression network was derived from the database as well as various co-expression approaches. First, the backbone of the network based on differentially expressed (DE) genes between RCC patients and normal controls was constructed by the Search Tool for the Retrieval of Interacting Genes/Proteins (STRING) database. The differentially co-expressed links were detected by Pearson’s correlation, the empirical Bayesian (EB) approach and Weighted Gene Co-expression Network Analysis (WGCNA). The co-expressed gene pairs were merged by a rank-based algorithm. We obtained 842; 371; 2,883 and 1,595 co-expressed gene pairs from the co-expression networks of the STRING database, Pearson’s correlation EB method and WGCNA, respectively. Two hundred and eighty-one differentially co-expressed (DC) gene pairs were obtained from the merged network using this novel method. Pathway enrichment analysis based on the Kyoto Encyclopedia of Genes and Genomes (KEGG) database and the network enrichment analysis (NEA) method were performed to verify feasibility of the merged method. Results of the KEGG and NEA pathway analyses showed that the network was associated with RCC. The suggested method was computationally efficient to identify pathways associated with RCC and has been identified as a useful complement to traditional co-expression analysis. PMID:26058425

  20. A novel method to identify hub pathways of rheumatoid arthritis based on differential pathway networks.

    PubMed

    Wei, Shi-Tong; Sun, Yong-Hua; Zong, Shi-Hua

    2017-09-01

    The aim of the current study was to identify hub pathways of rheumatoid arthritis (RA) using a novel method based on differential pathway network (DPN) analysis. The present study proposed a DPN where protein‑protein interaction (PPI) network was integrated with pathway‑pathway interactions. Pathway data was obtained from background PPI network and the Reactome pathway database. Subsequently, pathway interactions were extracted from the pathway data by building randomized gene‑gene interactions and a weight value was assigned to each pathway interaction using Spearman correlation coefficient (SCC) to identify differential pathway interactions. Differential pathway interactions were visualized using Cytoscape to construct a DPN. Topological analysis was conducted to identify hub pathways that possessed the top 5% degree distribution of DPN. Modules of DPN were mined according to ClusterONE. A total of 855 pathways were selected to build pathway interactions. By filtrating pathway interactions of weight values >0.7, a DPN with 312 nodes and 791 edges was obtained. Topological degree analysis revealed 15 hub pathways, such as heparan sulfate/heparin‑glycosaminoglycan (HS‑GAG) degradation, HS‑GAG metabolism and keratan sulfate degradation for RA based on DPN. Furthermore, hub pathways were also important in modules, which validated the significance of hub pathways. In conclusion, the proposed method is a computationally efficient way to identify hub pathways of RA, which identified 15 hub pathways that may be potential biomarkers and provide insight to future investigation and treatment of RA.

  1. Protein-protein interaction networks identify targets which rescue the MPP+ cellular model of Parkinson’s disease

    NASA Astrophysics Data System (ADS)

    Keane, Harriet; Ryan, Brent J.; Jackson, Brendan; Whitmore, Alan; Wade-Martins, Richard

    2015-11-01

    Neurodegenerative diseases are complex multifactorial disorders characterised by the interplay of many dysregulated physiological processes. As an exemplar, Parkinson’s disease (PD) involves multiple perturbed cellular functions, including mitochondrial dysfunction and autophagic dysregulation in preferentially-sensitive dopamine neurons, a selective pathophysiology recapitulated in vitro using the neurotoxin MPP+. Here we explore a network science approach for the selection of therapeutic protein targets in the cellular MPP+ model. We hypothesised that analysis of protein-protein interaction networks modelling MPP+ toxicity could identify proteins critical for mediating MPP+ toxicity. Analysis of protein-protein interaction networks constructed to model the interplay of mitochondrial dysfunction and autophagic dysregulation (key aspects of MPP+ toxicity) enabled us to identify four proteins predicted to be key for MPP+ toxicity (P62, GABARAP, GBRL1 and GBRL2). Combined, but not individual, knockdown of these proteins increased cellular susceptibility to MPP+ toxicity. Conversely, combined, but not individual, over-expression of the network targets provided rescue of MPP+ toxicity associated with the formation of autophagosome-like structures. We also found that modulation of two distinct proteins in the protein-protein interaction network was necessary and sufficient to mitigate neurotoxicity. Together, these findings validate our network science approach to multi-target identification in complex neurological diseases.

  2. Development of Thread-compatible Open Source Stack

    NASA Astrophysics Data System (ADS)

    Zimmermann, Lukas; Mars, Nidhal; Schappacher, Manuel; Sikora, Axel

    2017-07-01

    The Thread protocol is a recent development based on 6LoWPAN (IPv6 over IEEE 802.15.4), but with extensions regarding a more media independent approach, which - additionally - also promises true interoperability. To evaluate and analyse the operation of a Thread network a given open source 6LoWPAN stack for embedded devices (emb::6) has been extended in order to comply with the Thread specification. The implementation covers Mesh Link Establishment (MLE) and network layer functionality as well as 6LoWPAN mesh under routing mechanism based on MAC short addresses. The development has been verified on a virtualization platform and allows dynamical establishment of network topologies based on Thread’s partitioning algorithm.

  3. Co-extinction in a host-parasite network: identifying key hosts for network stability.

    PubMed

    Dallas, Tad; Cornelius, Emily

    2015-08-17

    Parasites comprise a substantial portion of total biodiversity. Ultimately, this means that host extinction could result in many secondary extinctions of obligate parasites and potentially alter host-parasite network structure. Here, we examined a highly resolved fish-parasite network to determine key hosts responsible for maintaining parasite diversity and network structure (quantified here as nestedness and modularity). We evaluated four possible host extinction orders and compared the resulting co-extinction dynamics to random extinction simulations; including host removal based on estimated extinction risk, parasite species richness and host level contributions to nestedness and modularity. We found that all extinction orders, except the one based on realistic extinction risk, resulted in faster declines in parasite diversity and network structure relative to random biodiversity loss. Further, we determined species-level contributions to network structure were best predicted by parasite species richness and host family. Taken together, we demonstrate that a small proportion of hosts contribute substantially to network structure and that removal of these hosts results in rapid declines in parasite diversity and network structure. As network stability can potentially be inferred through measures of network structure, our findings may provide insight into species traits that confer stability.

  4. Differential Network Analyses of Alzheimer’s Disease Identify Early Events in Alzheimer’s Disease Pathology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xia, Jing; Rocke, David M.; Perry, George

    In late-onset Alzheimer’s disease (AD), multiple brain regions are not affected simultaneously. Comparing the gene expression of the affected regions to identify the differences in the biological processes perturbed can lead to greater insight into AD pathogenesis and early characteristics. We identified differentially expressed (DE) genes from single cell microarray data of four AD affected brain regions: entorhinal cortex (EC), hippocampus (HIP), posterior cingulate cortex (PCC), and middle temporal gyrus (MTG). We organized the DE genes in the four brain regions into region-specific gene coexpression networks. Differential neighborhood analyses in the coexpression networks were performed to identify genes with lowmore » topological overlap (TO) of their direct neighbors. The low TO genes were used to characterize the biological differences between two regions. Our analyses show that increased oxidative stress, along with alterations in lipid metabolism in neurons, may be some of the very early events occurring in AD pathology. Cellular defense mechanisms try to intervene but fail, finally resulting in AD pathology as the disease progresses. Furthermore, disease annotation of the low TO genes in two independent protein interaction networks has resulted in association between cancer, diabetes, renal diseases, and cardiovascular diseases.« less

  5. Differential Network Analyses of Alzheimer’s Disease Identify Early Events in Alzheimer’s Disease Pathology

    DOE PAGES

    Xia, Jing; Rocke, David M.; Perry, George; ...

    2014-01-01

    In late-onset Alzheimer’s disease (AD), multiple brain regions are not affected simultaneously. Comparing the gene expression of the affected regions to identify the differences in the biological processes perturbed can lead to greater insight into AD pathogenesis and early characteristics. We identified differentially expressed (DE) genes from single cell microarray data of four AD affected brain regions: entorhinal cortex (EC), hippocampus (HIP), posterior cingulate cortex (PCC), and middle temporal gyrus (MTG). We organized the DE genes in the four brain regions into region-specific gene coexpression networks. Differential neighborhood analyses in the coexpression networks were performed to identify genes with lowmore » topological overlap (TO) of their direct neighbors. The low TO genes were used to characterize the biological differences between two regions. Our analyses show that increased oxidative stress, along with alterations in lipid metabolism in neurons, may be some of the very early events occurring in AD pathology. Cellular defense mechanisms try to intervene but fail, finally resulting in AD pathology as the disease progresses. Furthermore, disease annotation of the low TO genes in two independent protein interaction networks has resulted in association between cancer, diabetes, renal diseases, and cardiovascular diseases.« less

  6. A gene co-expression network model identifies yield-related vicinity networks in Jatropha curcas shoot system.

    PubMed

    Govender, Nisha; Senan, Siju; Mohamed-Hussein, Zeti-Azura; Wickneswari, Ratnam

    2018-06-15

    The plant shoot system consists of reproductive organs such as inflorescences, buds and fruits, and the vegetative leaves and stems. In this study, the reproductive part of the Jatropha curcas shoot system, which includes the aerial shoots, shoots bearing the inflorescence and inflorescence were investigated in regard to gene-to-gene interactions underpinning yield-related biological processes. An RNA-seq based sequencing of shoot tissues performed on an Illumina HiSeq. 2500 platform generated 18 transcriptomes. Using the reference genome-based mapping approach, a total of 64 361 genes was identified in all samples and the data was annotated against the non-redundant database by the BLAST2GO Pro. Suite. After removing the outlier genes and samples, a total of 12 734 genes across 17 samples were subjected to gene co-expression network construction using petal, an R library. A gene co-expression network model built with scale-free and small-world properties extracted four vicinity networks (VNs) with putative involvement in yield-related biological processes as follow; heat stress tolerance, floral and shoot meristem differentiation, biosynthesis of chlorophyll molecules and laticifers, cell wall metabolism and epigenetic regulations. Our VNs revealed putative key players that could be adapted in breeding strategies for J. curcas shoot system improvements.

  7. Immunizations and Developmental Milestones for Your Child from Birth Through 6 Years Old

    MedlinePlus

    ... type b n Hib Pneumococcal n PCV Inactivated Poliovirus n IPV Influenza (Flu) Milestones should be achieved ... type b n Hib Pneumococcal n PCV Inactivated Poliovirus n IPV Influenza (Flu) n Influenza, first dose ...

  8. Identifying aMCI with Functional Connectivity Network Characteristics based on Subtle AAL Atlas.

    PubMed

    Zhuo, Zhizheng; Mo, Xiao; Ma, Xiangyu; Han, Ying; Li, Haiyun

    2018-05-02

    To investigate the subtle functional connectivity alterations of aMCI based on AAL atlas with 1024 regions (AAL_1024 atlas). Functional MRI images of 32 aMCI patients (Male/Female:15/17, Ages:66.8±8.36y) and 35 normal controls (Male/Female:13/22, Ages: 62.4±8.14y) were obtained in this study. Firstly, functional connectivity networks were constructed by Pearson's Correlation based on the subtle AAL_1024 atlas. Then, local and global network parameters were calculated from the thresholding functional connectivity matrices. Finally, multiple-comparison analysis was performed on these parameters to find the functional network alterations of aMCI. And furtherly, a couple of classifiers were adopted to identify the aMCI by using the network parameters. More subtle local brain functional alterations were detected by using AAL_1024 atlas. And the predominate nodes including hippocampus, inferior temporal gyrus, inferior parietal gyrus were identified which was not detected by AAL_90 atlas. The identification of aMCI from normal controls were significantly improved with the highest accuracy (98.51%), sensitivity (100%) and specificity (97.14%) compared to those (88.06%, 84.38% and 91.43% for the highest accuracy, sensitivity and specificity respectively) obtained by using AAL_90 atlas. More subtle functional connectivity alterations of aMCI could be found based on AAL_1024 atlas than those based on AAL_90 atlas. Besides, the identification of aMCI could also be improved. Copyright © 2018. Published by Elsevier B.V.

  9. A Sparse Reconstruction Approach for Identifying Gene Regulatory Networks Using Steady-State Experiment Data

    PubMed Central

    Zhang, Wanhong; Zhou, Tong

    2015-01-01

    Motivation Identifying gene regulatory networks (GRNs) which consist of a large number of interacting units has become a problem of paramount importance in systems biology. Situations exist extensively in which causal interacting relationships among these units are required to be reconstructed from measured expression data and other a priori information. Though numerous classical methods have been developed to unravel the interactions of GRNs, these methods either have higher computing complexities or have lower estimation accuracies. Note that great similarities exist between identification of genes that directly regulate a specific gene and a sparse vector reconstruction, which often relates to the determination of the number, location and magnitude of nonzero entries of an unknown vector by solving an underdetermined system of linear equations y = Φx. Based on these similarities, we propose a novel framework of sparse reconstruction to identify the structure of a GRN, so as to increase accuracy of causal regulation estimations, as well as to reduce their computational complexity. Results In this paper, a sparse reconstruction framework is proposed on basis of steady-state experiment data to identify GRN structure. Different from traditional methods, this approach is adopted which is well suitable for a large-scale underdetermined problem in inferring a sparse vector. We investigate how to combine the noisy steady-state experiment data and a sparse reconstruction algorithm to identify causal relationships. Efficiency of this method is tested by an artificial linear network, a mitogen-activated protein kinase (MAPK) pathway network and the in silico networks of the DREAM challenges. The performance of the suggested approach is compared with two state-of-the-art algorithms, the widely adopted total least-squares (TLS) method and those available results on the DREAM project. Actual results show that, with a lower computational cost, the proposed method can

  10. Applying network theory to animal movements to identify properties of landscape space use.

    PubMed

    Bastille-Rousseau, Guillaume; Douglas-Hamilton, Iain; Blake, Stephen; Northrup, Joseph M; Wittemyer, George

    2018-04-01

    Network (graph) theory is a popular analytical framework to characterize the structure and dynamics among discrete objects and is particularly effective at identifying critical hubs and patterns of connectivity. The identification of such attributes is a fundamental objective of animal movement research, yet network theory has rarely been applied directly to animal relocation data. We develop an approach that allows the analysis of movement data using network theory by defining occupied pixels as nodes and connection among these pixels as edges. We first quantify node-level (local) metrics and graph-level (system) metrics on simulated movement trajectories to assess the ability of these metrics to pull out known properties in movement paths. We then apply our framework to empirical data from African elephants (Loxodonta africana), giant Galapagos tortoises (Chelonoidis spp.), and mule deer (Odocoileous hemionus). Our results indicate that certain node-level metrics, namely degree, weight, and betweenness, perform well in capturing local patterns of space use, such as the definition of core areas and paths used for inter-patch movement. These metrics were generally applicable across data sets, indicating their robustness to assumptions structuring analysis or strategies of movement. Other metrics capture local patterns effectively, but were sensitive to specified graph properties, indicating case specific applications. Our analysis indicates that graph-level metrics are unlikely to outperform other approaches for the categorization of general movement strategies (central place foraging, migration, nomadism). By identifying critical nodes, our approach provides a robust quantitative framework to identify local properties of space use that can be used to evaluate the effect of the loss of specific nodes on range wide connectivity. Our network approach is intuitive, and can be implemented across imperfectly sampled or large-scale data sets efficiently, providing a

  11. Cognitive-Behavioral Therapy for PTSD and Depression Symptoms Reduces Risk for Future Intimate Partner Violence among Interpersonal Trauma Survivors

    PubMed Central

    Iverson, Katherine M.; Gradus, Jaimie L.; Resick, Patricia A.; Suvak, Michael K.; Smith, Kamala F.; Monson, Candice M.

    2010-01-01

    Objective Women who develop symptoms of posttraumatic stress disorder (PTSD) and depression subsequent to interpersonal trauma are at heightened risk for future intimate partner violence (IPV) victimization. Cognitive-behavioral therapy (CBT) is effective in reducing PTSD and depression symptoms, yet limited research has investigated the effectiveness of cognitive-behavior therapy in reducing risk for future IPV among interpersonal trauma survivors. Method This study examined the effect of CBT for PTSD and depressive symptoms on the risk of future IPV victimization in a sample of women survivors of interpersonal violence. The current sample included 150 women diagnosed with PTSD secondary to an array of interpersonal traumatic events who were participating in a randomized clinical trial of different forms of cognitive processing therapy for the treatment of PTSD. Participants were assessed at nine time points as part of the larger trial: pre-treatment, six times during treatment, post-treatment, and at 6-month follow-up. Results As hypothesized, reductions in both PTSD and depressive symptoms during treatment were associated with a decreased likelihood of IPV victimization at a 6-month follow-up even after controlling for recent IPV (i.e., IPV from a current partner within the year prior to beginning the study) and prior interpersonal traumas. Conclusions These findings highlight the importance of identifying and treating PTSD and depressive symptoms among interpersonal trauma survivors as a method for reducing risk for future IPV. PMID:21341889

  12. Is economic dependence on the husband a risk factor for intimate partner violence against female factory workers in Nepal?

    PubMed

    Dhungel, Sunita; Dhungel, Pabita; Dhital, Shalik Ram; Stock, Christiane

    2017-09-13

    Violence related injury is a serious public health issue all over the world. This study aims to assess the association between several socio-economic factors and intimate partner violence (IPV) in Nepal. A cross-sectional study was conducted among 236 women working in carpet and garment factories in Kathmandu, Nepal. Interviews were conducted to collect quantitative data on three forms of IPV, namely physical violence, psychological violence and sexual violence, as well as on a number of potentially associated factors. Twenty-two percent of women experienced sexual IPV, 28% physical IPV and 35% psychological IPV at least once in the last 12 months. The variables independently associated with at least one form of IPV were: age of the woman >29 years [OR = 4.23, p = 0.025 for physical IPV; OR = 6.94, p = 0.008 for sexual IPV; OR = 3.42, p = 0.043 for psychological IPV], alcohol consumption of the husband [OR = 9.97, p < 0.001 for physical IPV; OR = 3.76, p = 0.004 for sexual IPV; OR = 4.85, p < 0.001 for psychological IPV], education of the husband above primary level [OR = 0.43, p = 0.013 for physical IPV; OR = 0.51, p = 0.033 for psychological IPV], and economic dependency of the woman on the husband [OR = 3.04, p = 0.021 for physical IPV; OR = 2.97, p = 0.008 for psychological IPV]. This study identified various factors associated with IPV and showed that economic dependence of wives on their husband was among the most important ones. Thus, for the prevention of IPV against women, long term strategies aiming at livelihood and economic empowerment as well as independence of women would be suggested.

  13. Social network analysis identified central outcomes for core outcome sets using systematic reviews of HIV/AIDS.

    PubMed

    Saldanha, Ian J; Li, Tianjing; Yang, Cui; Ugarte-Gil, Cesar; Rutherford, George W; Dickersin, Kay

    2016-02-01

    Methods to develop core outcome sets, the minimum outcomes that should be measured in research in a topic area, vary. We applied social network analysis methods to understand outcome co-occurrence patterns in human immunodeficiency virus (HIV)/AIDS systematic reviews and identify outcomes central to the network of outcomes in HIV/AIDS. We examined all Cochrane reviews of HIV/AIDS as of June 2013. We defined a tie as two outcomes (nodes) co-occurring in ≥2 reviews. To identify central outcomes, we used normalized node betweenness centrality (nNBC) (the extent to which connections between other outcomes in a network rely on that outcome as an intermediary). We conducted a subgroup analysis by HIV/AIDS intervention type (i.e., clinical management, biomedical prevention, behavioral prevention, and health services). The 140 included reviews examined 1,140 outcomes, 294 of which were unique. The most central outcome overall was all-cause mortality (nNBC = 23.9). The most central and most frequent outcomes differed overall and within subgroups. For example, "adverse events (specified)" was among the most central but not among the most frequent outcomes, overall. Social network analysis methods are a novel application to identify central outcomes, which provides additional information potentially useful for developing core outcome sets. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Systems genetics identifies a convergent gene network for cognition and neurodevelopmental disease.

    PubMed

    Johnson, Michael R; Shkura, Kirill; Langley, Sarah R; Delahaye-Duriez, Andree; Srivastava, Prashant; Hill, W David; Rackham, Owen J L; Davies, Gail; Harris, Sarah E; Moreno-Moral, Aida; Rotival, Maxime; Speed, Doug; Petrovski, Slavé; Katz, Anaïs; Hayward, Caroline; Porteous, David J; Smith, Blair H; Padmanabhan, Sandosh; Hocking, Lynne J; Starr, John M; Liewald, David C; Visconti, Alessia; Falchi, Mario; Bottolo, Leonardo; Rossetti, Tiziana; Danis, Bénédicte; Mazzuferi, Manuela; Foerch, Patrik; Grote, Alexander; Helmstaedter, Christoph; Becker, Albert J; Kaminski, Rafal M; Deary, Ian J; Petretto, Enrico

    2016-02-01

    Genetic determinants of cognition are poorly characterized, and their relationship to genes that confer risk for neurodevelopmental disease is unclear. Here we performed a systems-level analysis of genome-wide gene expression data to infer gene-regulatory networks conserved across species and brain regions. Two of these networks, M1 and M3, showed replicable enrichment for common genetic variants underlying healthy human cognitive abilities, including memory. Using exome sequence data from 6,871 trios, we found that M3 genes were also enriched for mutations ascertained from patients with neurodevelopmental disease generally, and intellectual disability and epileptic encephalopathy in particular. M3 consists of 150 genes whose expression is tightly developmentally regulated, but which are collectively poorly annotated for known functional pathways. These results illustrate how systems-level analyses can reveal previously unappreciated relationships between neurodevelopmental disease-associated genes in the developed human brain, and provide empirical support for a convergent gene-regulatory network influencing cognition and neurodevelopmental disease.

  15. An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility.

    PubMed

    Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok

    2017-04-19

    The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.

  16. An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility

    PubMed Central

    Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok

    2017-01-01

    The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms. PMID:28422084

  17. Identifying and tracking dynamic processes in social networks

    NASA Astrophysics Data System (ADS)

    Chung, Wayne; Savell, Robert; Schütt, Jan-Peter; Cybenko, George

    2006-05-01

    The detection and tracking of embedded malicious subnets in an active social network can be computationally daunting due to the quantity of transactional data generated in the natural interaction of large numbers of actors comprising a network. In addition, detection of illicit behavior may be further complicated by evasive strategies designed to camouflage the activities of the covert subnet. In this work, we move beyond traditional static methods of social network analysis to develop a set of dynamic process models which encode various modes of behavior in active social networks. These models will serve as the basis for a new application of the Process Query System (PQS) to the identification and tracking of covert dynamic processes in social networks. We present a preliminary result from application of our technique in a real-world data stream-- the Enron email corpus.

  18. Intimate partner violence against women during and after pregnancy: a cross-sectional study in Mumbai slums.

    PubMed

    Das, Sushmita; Bapat, Ujwala; Shah More, Neena; Alcock, Glyn; Joshi, Wasundhara; Pantvaidya, Shanti; Osrin, David

    2013-09-09

    At least one-third of women in India experience intimate partner violence (IPV) at some point in adulthood. Our objectives were to describe the prevalence of IPV during pregnancy and after delivery in an urban slum setting, to review its social determinants, and to explore its effects on maternal and newborn health. We did a cross-sectional study nested within the data collection system for a concurrent trial. Through urban community surveillance, we identified births in 48 slum areas and interviewed mothers ~6 weeks later. After collecting information on demographic characteristics, socioeconomic indicators, and maternal and newborn care, we asked their opinions on the justifiability of IPV and on their experience of it in the last 12 months. Of 2139 respondents, 35% (748) said that violence was justifiable if a woman disrespected her in-laws or argued with her husband, failed to provide good food, housework and childcare, or went out without permission. 318 (15%, 95% CI 13, 16%) reported IPV in the year that included pregnancy and the postpartum period. Physical IPV was reported by 247 (12%, 95% CI 10, 13%), sexual IPV by 35 (2%, 95% CI 1, 2%), and emotional IPV by 167 (8%, 95% CI 7, 9). 219 (69%) women said that the likelihood of IPV was either unaffected by or increased during maternity. IPV was more likely to be reported by women from poorer families and when husbands used alcohol. Although 18% of women who had suffered physical IPV sought clinical care for their injuries, seeking help from organizations outside the family to address IPV itself was rare. Women who reported IPV were more likely to have reported illness during pregnancy and use of modern methods of family planning. They were more than twice as likely to say that there were situations in which violence was justifiable (odds ratio 2.6, 95% CI 1.7, 3.4). One in seven women suffered IPV during or shortly after pregnancy. The elements of the violent milieu are mutually reinforcing and need to be

  19. Intimate partner violence against women during and after pregnancy: a cross-sectional study in Mumbai slums

    PubMed Central

    2013-01-01

    Background At least one-third of women in India experience intimate partner violence (IPV) at some point in adulthood. Our objectives were to describe the prevalence of IPV during pregnancy and after delivery in an urban slum setting, to review its social determinants, and to explore its effects on maternal and newborn health. Methods We did a cross-sectional study nested within the data collection system for a concurrent trial. Through urban community surveillance, we identified births in 48 slum areas and interviewed mothers ~6 weeks later. After collecting information on demographic characteristics, socioeconomic indicators, and maternal and newborn care, we asked their opinions on the justifiability of IPV and on their experience of it in the last 12 months. Results Of 2139 respondents, 35% (748) said that violence was justifiable if a woman disrespected her in-laws or argued with her husband, failed to provide good food, housework and childcare, or went out without permission. 318 (15%, 95% CI 13, 16%) reported IPV in the year that included pregnancy and the postpartum period. Physical IPV was reported by 247 (12%, 95% CI 10, 13%), sexual IPV by 35 (2%, 95% CI 1, 2%), and emotional IPV by 167 (8%, 95% CI 7, 9). 219 (69%) women said that the likelihood of IPV was either unaffected by or increased during maternity. IPV was more likely to be reported by women from poorer families and when husbands used alcohol. Although 18% of women who had suffered physical IPV sought clinical care for their injuries, seeking help from organizations outside the family to address IPV itself was rare. Women who reported IPV were more likely to have reported illness during pregnancy and use of modern methods of family planning. They were more than twice as likely to say that there were situations in which violence was justifiable (odds ratio 2.6, 95% CI 1.7, 3.4). Conclusions One in seven women suffered IPV during or shortly after pregnancy. The elements of the violent milieu are

  20. SurvNet: a web server for identifying network-based biomarkers that most correlate with patient survival data.

    PubMed

    Li, Jun; Roebuck, Paul; Grünewald, Stefan; Liang, Han

    2012-07-01

    An important task in biomedical research is identifying biomarkers that correlate with patient clinical data, and these biomarkers then provide a critical foundation for the diagnosis and treatment of disease. Conventionally, such an analysis is based on individual genes, but the results are often noisy and difficult to interpret. Using a biological network as the searching platform, network-based biomarkers are expected to be more robust and provide deep insights into the molecular mechanisms of disease. We have developed a novel bioinformatics web server for identifying network-based biomarkers that most correlate with patient survival data, SurvNet. The web server takes three input files: one biological network file, representing a gene regulatory or protein interaction network; one molecular profiling file, containing any type of gene- or protein-centred high-throughput biological data (e.g. microarray expression data or DNA methylation data); and one patient survival data file (e.g. patients' progression-free survival data). Given user-defined parameters, SurvNet will automatically search for subnetworks that most correlate with the observed patient survival data. As the output, SurvNet will generate a list of network biomarkers and display them through a user-friendly interface. SurvNet can be accessed at http://bioinformatics.mdanderson.org/main/SurvNet.

  1. Subcortical electrostimulation to identify network subserving motor control.

    PubMed

    Schucht, Philippe; Moritz-Gasser, Sylvie; Herbet, Guillaume; Raabe, Andreas; Duffau, Hugues

    2013-11-01

    Recent anatomical-functional studies have transformed our understanding of cerebral motor control away from a hierarchical structure and toward parallel and interconnected specialized circuits. Subcortical electrical stimulation during awake surgery provides a unique opportunity to identify white matter tracts involved in motor control. For the first time, this study reports the findings on motor modulatory responses evoked by subcortical stimulation and investigates the cortico-subcortical connectivity of cerebral motor control. Twenty-one selected patients were operated while awake for frontal, insular, and parietal diffuse low-grade gliomas. Subcortical electrostimulation mapping was used to search for interference with voluntary movements. The corresponding stimulation sites were localized on brain schemas using the anterior and posterior commissures method. Subcortical negative motor responses were evoked in 20/21 patients, whereas acceleration of voluntary movements and positive motor responses were observed in three and five patients, respectively. The majority of the stimulation sites were detected rostral of the corticospinal tract near the vertical anterior-commissural line, and additional sites were seen in the frontal and parietal white matter. The diverse interferences with motor function resulting in inhibition and acceleration imply a modulatory influence of the detected fiber network. The subcortical stimulation sites were distributed veil-like, anterior to the primary motor fibers, suggesting descending pathways originating from premotor areas known for negative motor response characteristics. Further stimulation sites in the parietal white matter as well as in the anterior arm of the internal capsule indicate a large-scale fronto-parietal motor control network. Copyright © 2012 Wiley Periodicals, Inc.

  2. Disproportionate Mental Health Burden Associated With Past-Year Intimate Partner Violence Among Women Receiving Care in the Veterans Health Administration.

    PubMed

    Dichter, Melissa E; Sorrentino, Anneliese; Bellamy, Scarlett; Medvedeva, Elina; Roberts, Christopher B; Iverson, Katherine M

    2017-12-01

    Experience of intimate partner violence (IPV) can lead to mental health conditions, including anxiety, depression, and unhealthy substance use. Women seen in the Veterans Health Administration (VHA) face high rates of both IPV and mental health morbidity. This study aimed to identify associations between recent IPV experience and mental health diagnoses among women VHA patients. We examined medical records data for 8,888 female veteran and nonveteran VHA patients across 13 VHA facilities who were screened for past-year IPV between April, 2014 and April, 2016. Compared with women who screened negative for past-year IPV (IPV-), those who screened positive (IPV+; 8.7%) were more than twice as likely to have a mental health diagnosis, adjusted odds ratio (AOR) = 2.27, 95% confidence interval (CI) [1.95, 2.64]; or more than two mental health diagnoses, AOR = 2.29, 95% CI [1.93, 2.72]). Screening IPV+ was also associated with significantly higher odds of each type of mental health morbidity (AOR range = 1.85-3.19) except psychoses. Over half (53.5%) of the women who screened IPV+ had a mental health diagnosis, compared with fewer than one-third (32.6%) of those who screened IPV-. Each subtype of IPV (psychological, physical, and sexual violence) was significantly associated with having a mental health diagnosis (AOR range = 2.25-2.37) or comorbidity (AOR range = 2.17-2.78). Associations remained when adjusting for military sexual trauma and combat trauma among the veteran subsample. These findings highlight the mental health burden associated with past-year IPV among female VHA patients and underscore the need to address psychological and sexual IPV, in addition to physical violence. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  3. Intimate partner violence around the time of pregnancy and postpartum depression: The experience of women of Bangladesh.

    PubMed

    Islam, Md Jahirul; Broidy, Lisa; Baird, Kathleen; Mazerolle, Paul

    2017-01-01

    Intimate partner violence (IPV) around the time of pregnancy is a serious public health concern and is known to have an adverse effect on perinatal mental health. In order to craft appropriate and effective interventions, it is important to understand how the association between IPV and postpartum depression (PPD) may differ as a function of the type and timing of IPV victimization. Here we evaluate the influence of physical, sexual and psychological IPV before, during and after pregnancy on PPD. Cross-sectional survey data was collected between October 2015 and January 2016 in the Chandpur District of Bangladesh from 426 new mothers, aged 15-49 years, who were in the first six months postpartum. Multivariate logistic regression models were used to estimate the association between IPV and PPD, adjusted for socio-demographic, reproductive and psychosocial confounding factors. Approximately 35.2% of women experienced PPD within the first six months following childbirth. Controlling for confounders, the odds of PPD was significantly greater among women who reported exposure to physical (AOR: 1.79, 95% CI [1.25, 3.43]), sexual (AOR: 2.25, 95% CI [1.14, 4.45]) or psychological (AOR: 6.92, 95% CI [1.71, 28.04]) IPV during pregnancy as opposed to those who did not. However, both before and after pregnancy, only physical IPV evidences a direct effect on PPD. Results highlight the mental health consequences of IPV for women of Bangladesh, as well as the influence of timing and type of IPV on PPD outcomes. The findings confirm that exposure to IPV significantly increases the odds of PPD. The association is particularly strong for physical IPV during all periods and psychological IPV during pregnancy. Results reinforce the need to conduct routine screening during pregnancy to identify women with a history of IPV who may at risk for PPD and to offer them necessary support.

  4. Immunogenicity to poliovirus type 2 following two doses of fractional intradermal inactivated poliovirus vaccine: A novel dose sparing immunization schedule.

    PubMed

    Anand, Abhijeet; Molodecky, Natalie A; Pallansch, Mark A; Sutter, Roland W

    2017-05-19

    The polio eradication endgame strategic plan calls for the sequential removal of Sabin poliovirus serotypes from the trivalent oral poliovirus vaccine (tOPV), starting with type 2, and the introduction of ≥1 dose of inactivated poliovirus vaccine (IPV), to maintain an immunity base against poliovirus type 2. The global removal of oral poliovirus type 2 was successfully implemented in May 2016. However, IPV supply constraints has prevented introduction in 21 countries and led to complete stock-out in >20 countries. We conducted a literature review and contacted corresponding authors of recent studies with fractional-dose IPV (fIPV), one-fifth of intramuscular dose administered intradermally, to conduct additional type 2 immunogenicity analyses of two fIPV doses compared with one full-dose IPV. Four studies were identified that assessed immunogenicity of two fIPV doses compared to one full-dose IPV. Two fractional doses are more immunogenic than 1 full-dose, with type 2 seroconversion rates improving between absolute 19-42% (median: 37%, p<0.001) and relative increase of 53-125% (median: 82%), and antibody titer to type 2 increasing by 2-32-fold (median: 10-fold). Early age of administration and shorter intervals between doses were associated with lower immunogenicity. Overall, two fIPV doses are more immunogenic than a single full-dose, associated with significantly increased seroconversion rates and antibody titers. Two fIPV doses together use two-fifth of the vaccine compared to one full-dose IPV. In response to the current IPV shortage, a schedule of two fIPV doses at ages 6 and 14weekshas been endorsed by technical oversight committees and has been introduced in some affected countries. Copyright © 2017. Published by Elsevier Ltd.

  5. Identifiability of large-scale non-linear dynamic network models applied to the ADM1-case study.

    PubMed

    Nimmegeers, Philippe; Lauwers, Joost; Telen, Dries; Logist, Filip; Impe, Jan Van

    2017-06-01

    In this work, both the structural and practical identifiability of the Anaerobic Digestion Model no. 1 (ADM1) is investigated, which serves as a relevant case study of large non-linear dynamic network models. The structural identifiability is investigated using the probabilistic algorithm, adapted to deal with the specifics of the case study (i.e., a large-scale non-linear dynamic system of differential and algebraic equations). The practical identifiability is analyzed using a Monte Carlo parameter estimation procedure for a 'non-informative' and 'informative' experiment, which are heuristically designed. The model structure of ADM1 has been modified by replacing parameters by parameter combinations, to provide a generally locally structurally identifiable version of ADM1. This means that in an idealized theoretical situation, the parameters can be estimated accurately. Furthermore, the generally positive structural identifiability results can be explained from the large number of interconnections between the states in the network structure. This interconnectivity, however, is also observed in the parameter estimates, making uncorrelated parameter estimations in practice difficult. Copyright © 2017. Published by Elsevier Inc.

  6. Strategies for a better performance of RPL under mobility in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Latib, Z. A.; Jamil, A.; Alduais, N. A. M.; Abdullah, J.; Audah, L. H. M.; Alias, R.

    2017-09-01

    A Wireless Sensor Network (WSN) is usually stationary, which the network comprises of static nodes. The increase demand for mobility in various applications such as environmental monitoring, medical, home automation, and military, raises the question how IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) would perform under these mobility applications. This paper aims to understand performance of RPL and come out with strategies for a better performance of RPL in mobility scenarios. Because of this, this paper evaluates the performance of the RPL protocol under three different scenarios: sink and sensor nodes are static, static sink and mobile sensor nodes, and sink and sensor nodes are mobile. The network scenarios are implemented in Cooja simulator. A WSN consists of 25 sensor nodes and one sink node is configured in the simulation environment. The simulation is varied over different packet rates and ContikiMAC's Clear Channel Assessment (CCA) rate. As the performance metric, RPL is evaluated in term of packet delivery ratio (PDR), power consumption and packet rates. The simulation results show RPL provides a poor PDR in the mobility scenarios when compared to the static scenario. In addition, RPL consumes more power and increases duty-cycle rate to support mobility when compared to the static scenario. Based on the findings, we suggest three strategies for a better performance of RPL in mobility scenarios. First, RPL should operates at a lower packet rates when implemented in the mobility scenarios. Second, RPL should be implemented with a higher duty-cycle rate. Lastly, the sink node should be positioned as much as possible in the center of the mobile network.

  7. Genexpi: a toolset for identifying regulons and validating gene regulatory networks using time-course expression data.

    PubMed

    Modrák, Martin; Vohradský, Jiří

    2018-04-13

    Identifying regulons of sigma factors is a vital subtask of gene network inference. Integrating multiple sources of data is essential for correct identification of regulons and complete gene regulatory networks. Time series of expression data measured with microarrays or RNA-seq combined with static binding experiments (e.g., ChIP-seq) or literature mining may be used for inference of sigma factor regulatory networks. We introduce Genexpi: a tool to identify sigma factors by combining candidates obtained from ChIP experiments or literature mining with time-course gene expression data. While Genexpi can be used to infer other types of regulatory interactions, it was designed and validated on real biological data from bacterial regulons. In this paper, we put primary focus on CyGenexpi: a plugin integrating Genexpi with the Cytoscape software for ease of use. As a part of this effort, a plugin for handling time series data in Cytoscape called CyDataseries has been developed and made available. Genexpi is also available as a standalone command line tool and an R package. Genexpi is a useful part of gene network inference toolbox. It provides meaningful information about the composition of regulons and delivers biologically interpretable results.

  8. Identifying key genes in rheumatoid arthritis by weighted gene co-expression network analysis.

    PubMed

    Ma, Chunhui; Lv, Qi; Teng, Songsong; Yu, Yinxian; Niu, Kerun; Yi, Chengqin

    2017-08-01

    This study aimed to identify rheumatoid arthritis (RA) related genes based on microarray data using the WGCNA (weighted gene co-expression network analysis) method. Two gene expression profile datasets GSE55235 (10 RA samples and 10 healthy controls) and GSE77298 (16 RA samples and seven healthy controls) were downloaded from Gene Expression Omnibus database. Characteristic genes were identified using metaDE package. WGCNA was used to find disease-related networks based on gene expression correlation coefficients, and module significance was defined as the average gene significance of all genes used to assess the correlation between the module and RA status. Genes in the disease-related gene co-expression network were subject to functional annotation and pathway enrichment analysis using Database for Annotation Visualization and Integrated Discovery. Characteristic genes were also mapped to the Connectivity Map to screen small molecules. A total of 599 characteristic genes were identified. For each dataset, characteristic genes in the green, red and turquoise modules were most closely associated with RA, with gene numbers of 54, 43 and 79, respectively. These genes were enriched in totally enriched in 17 Gene Ontology terms, mainly related to immune response (CD97, FYB, CXCL1, IKBKE, CCR1, etc.), inflammatory response (CD97, CXCL1, C3AR1, CCR1, LYZ, etc.) and homeostasis (C3AR1, CCR1, PLN, CCL19, PPT1, etc.). Two small-molecule drugs sanguinarine and papaverine were predicted to have a therapeutic effect against RA. Genes related to immune response, inflammatory response and homeostasis presumably have critical roles in RA pathogenesis. Sanguinarine and papaverine have a potential therapeutic effect against RA. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  9. Identifying the greatest team and captain—A complex network approach to cricket matches

    NASA Astrophysics Data System (ADS)

    Mukherjee, Satyam

    2012-12-01

    We consider all Test matches played between 1877 and 2010 and One Day International (ODI) matches played between 1971 and 2010. We form directed and weighted networks of teams and also of their captains. The success of a team (or captain) is determined by the ‘quality’ of the wins, not simply by the number of wins. We apply the diffusion-based PageRank algorithm to the networks to assess the importance of the wins, and rank the respective teams and captains. Our analysis identifies Australia as the best team in both forms of cricket, Test and ODI. Steve Waugh is identified as the best captain in Test cricket and Ricky Ponting is the best captain in the ODI format. We also compare our ranking scheme with an existing ranking scheme, the Reliance ICC ranking. Our method does not depend on ‘external’ criteria in the ranking of teams (captains). The purpose of this paper is to introduce a revised ranking of cricket teams and to quantify the success of the captains.

  10. Using peptide array to identify binding motifs and interaction networks for modular domains.

    PubMed

    Li, Shawn S-C; Wu, Chenggang

    2009-01-01

    Specific protein-protein interactions underlie all essential biological processes and form the basis of cellular signal transduction. The recognition of a short, linear peptide sequence in one protein by a modular domain in another represents a common theme of macromolecular recognition in cells, and the importance of this mode of protein-protein interaction is highlighted by the large number of peptide-binding domains encoded by the human genome. This phenomenon also provides a unique opportunity to identify protein-protein binding events using peptide arrays and complementary biochemical assays. Accordingly, high-density peptide array has emerged as a useful tool by which to map domain-mediated protein-protein interaction networks at the proteome level. Using the Src-homology 2 (SH2) and 3 (SH3) domains as examples, we describe the application of oriented peptide array libraries in uncovering specific motifs recognized by an SH2 domain and the use of high-density peptide arrays in identifying interaction networks mediated by the SH3 domain. Methods reviewed here could also be applied to other modular domains, including catalytic domains, that recognize linear peptide sequences.

  11. Identifying influential user communities on the social network

    NASA Astrophysics Data System (ADS)

    Hu, Weishu; Gong, Zhiguo; Hou U, Leong; Guo, Jingzhi

    2015-10-01

    Nowadays social network services have been popularly used in electronic commerce systems. Users on the social network can develop different relationships based on their common interests and activities. In order to promote the business, it is interesting to explore hidden relationships among users developed on the social network. Such knowledge can be used to locate target users for different advertisements and to provide effective product recommendations. In this paper, we define and study a novel community detection problem that is to discover the hidden community structure in large social networks based on their common interests. We observe that the users typically pay more attention to those users who share similar interests, which enable a way to partition the users into different communities according to their common interests. We propose two algorithms to detect influential communities using common interests in large social networks efficiently and effectively. We conduct our experimental evaluation using a data set from Epinions, which demonstrates that our method achieves 4-11.8% accuracy improvement over the state-of-the-art method.

  12. Pathway Interaction Network Analysis Identifies Dysregulated Pathways in Human Monocytes Infected by Listeria monocytogenes.

    PubMed

    Fan, Wufeng; Zhou, Yuhan; Li, Hao

    2017-01-01

    In our study, we aimed to extract dysregulated pathways in human monocytes infected by Listeria monocytogenes (LM) based on pathway interaction network (PIN) which presented the functional dependency between pathways. After genes were aligned to the pathways, principal component analysis (PCA) was used to calculate the pathway activity for each pathway, followed by detecting seed pathway. A PIN was constructed based on gene expression profile, protein-protein interactions (PPIs), and cellular pathways. Identifying dysregulated pathways from the PIN was performed relying on seed pathway and classification accuracy. To evaluate whether the PIN method was feasible or not, we compared the introduced method with standard network centrality measures. The pathway of RNA polymerase II pretranscription events was selected as the seed pathway. Taking this seed pathway as start, one pathway set (9 dysregulated pathways) with AUC score of 1.00 was identified. Among the 5 hub pathways obtained using standard network centrality measures, 4 pathways were the common ones between the two methods. RNA polymerase II transcription and DNA replication owned a higher number of pathway genes and DEGs. These dysregulated pathways work together to influence the progression of LM infection, and they will be available as biomarkers to diagnose LM infection.

  13. Identifying the turning point: using the transtheoretical model of change to map intimate partner violence disclosure in emergency department settings.

    PubMed

    Catallo, Cristina; Jack, Susan M; Ciliska, Donna; Macmillan, Harriet L

    2012-01-01

    Background. The transtheoretical model of change (TTM) was used as a framework to examine the steps that women took to disclose intimate partner violence (IPV) in urban emergency departments. Methods. Mapping methods portrayed the evolving nature of decisions that facilitated or inhibited disclosure. This paper is a secondary analysis of qualitative data from a mixed methods study that explored abused women's decision making process about IPV disclosure. Findings. Change maps were created for 19 participants with movement from the precontemplation to the maintenance stages of the model. Disclosure often occurred after a significant "turning point event" combined with a series of smaller events over a period of time. The significant life event often involved a weighing of options where participants considered the perceived risks against the potential benefits of disclosure. Conclusions. Abused women experienced intrusion from the chaotic nature of the emergency department. IPV disclosure was perceived as a positive experience when participants trusted the health care provider and felt control over their decisions to disclose IPV. Practice Implications. Nurses can use these findings to gauge the readiness of women to disclose IPV in the emergency department setting.

  14. Identifying the Turning Point: Using the Transtheoretical Model of Change to Map Intimate Partner Violence Disclosure in Emergency Department Settings

    PubMed Central

    Catallo, Cristina; Jack, Susan M.; Ciliska, Donna; MacMillan, Harriet L.

    2012-01-01

    Background. The transtheoretical model of change (TTM) was used as a framework to examine the steps that women took to disclose intimate partner violence (IPV) in urban emergency departments. Methods. Mapping methods portrayed the evolving nature of decisions that facilitated or inhibited disclosure. This paper is a secondary analysis of qualitative data from a mixed methods study that explored abused women's decision making process about IPV disclosure. Findings. Change maps were created for 19 participants with movement from the precontemplation to the maintenance stages of the model. Disclosure often occurred after a significant “turning point event” combined with a series of smaller events over a period of time. The significant life event often involved a weighing of options where participants considered the perceived risks against the potential benefits of disclosure. Conclusions. Abused women experienced intrusion from the chaotic nature of the emergency department. IPV disclosure was perceived as a positive experience when participants trusted the health care provider and felt control over their decisions to disclose IPV. Practice Implications. Nurses can use these findings to gauge the readiness of women to disclose IPV in the emergency department setting. PMID:22792480

  15. Occult abusive injuries in children brought for care after intimate partner violence: An exploratory study.

    PubMed

    Tiyyagura, Gunjan; Christian, Cindy; Berger, Rachel; Lindberg, Daniel

    2018-05-01

    Children in homes with intimate partner violence (IPV) are at increased risk for physical abuse. We determined the frequency and injury patterns in children who underwent child abuse consultation after IPV exposure by retrospectively analyzing the "Examination of Siblings To Recognize Abuse" cohort of children referred for physical abuse. Children were selected who presented after IPV exposure. Among 2890 children evaluated by child abuse pediatricians, 61 (2.1%) patients presented after IPV exposure. Of the 61, 11 (18.0%) were exposed to IPV, but had no direct involvement in the IPV event, 36 (59.0%) sustained inadvertent trauma during IPV, and 14 (23.0%) were directly assaulted during IPV. Thirty-six patients (59.0%) had an injury: 31 (51.0%) had cutaneous injuries and 15 (24.6%) had internal injuries including fracture(s), intracranial or intra-abdominal injury. Of the 15 patients with internal injuries, 14 (93.3%) were less than 12 months old. Among the 36 patients with injuries, 16 (44.4%) had no report of direct injury, a report of a mechanism that did not explain the identified injuries, or a report of trauma without a specific mechanism. Five (13.9%) did not have physical examination findings to suggest the extent of their internal injuries. Injuries are present in a significant proportion of children presenting to Emergency Departments after IPV exposure. History and physical examination alone are insufficient to detect internal injuries especially in infants. These preliminary results support the need for future, prospective studies of occult injury in children exposed to IPV. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Does intimate partner violence impact on women's initiation and duration of breastfeeding?

    PubMed

    James, Jennifer P; Taft, Angela; Amir, Lisa H; Agius, Paul

    2014-07-01

    Intimate Partner Violence (IPV) is prevalent among recent mothers and negatively impacts their physical and emotional health. Furthermore, the negative influence of IPV on parenting capacity and children's development is well described. However, it is unclear whether there is any relationship between IPV and method of infant feeding. Little is known about how women who are subjected to IPV make decisions about infant feeding or whether living in this context impacts on their experience of breastfeeding. With what is known about the importance of breastfeeding, particularly for vulnerable populations, research is essential to inform clinical practice and to develop appropriate community support strategies. This paper describes an analysis of data from a pragmatic cluster randomised controlled trial: Improving maternal and child health nurse care for vulnerable mothers (MOVE). The MOVE trial was conducted in the north-western suburbs of Melbourne, Australia from April 2010-April 2011 and involved 80 maternal and child health centres, 160 nurses and 2621 women who completed a survey. Intimate partner violence was measured using the Composite Abuse Scale. Ninety-six per cent (n = 2111) of participating women initiated breastfeeding, with 80% (n = 1776) and 74% (n = 1537) indicating 'any' breastfeeding at 3 and 6 months respectively. Respondents tended to be older, well-educated with a household income > $70,000 per annum compared to the general population. The characteristics of women from the IPV and non-IPV groups were similar and together were comparable to all women who gave birth in north-west Melbourne. The reported prevalence of IPV in this survey was 6.3% (n = 138), which may be an underestimate. Breastfeeding rates did not significantly differ between IPV and non-IPV groups. Our findings suggest that women who experience IPV are just as likely to breastfeed as the broader population of women. While this analysis provide's a snapshot of breastfeeding rates for

  17. Patent Network Analysis and Quadratic Assignment Procedures to Identify the Convergence of Robot Technologies

    PubMed Central

    Lee, Woo Jin; Lee, Won Kyung

    2016-01-01

    Because of the remarkable developments in robotics in recent years, technological convergence has been active in this area. We focused on finding patterns of convergence within robot technology using network analysis of patents in both the USPTO and KIPO. To identify the variables that affect convergence, we used quadratic assignment procedures (QAP). From our analysis, we observed the patent network ecology related to convergence and found technologies that have great potential to converge with other robotics technologies. The results of our study are expected to contribute to setting up convergence based R&D policies for robotics, which can lead new innovation. PMID:27764196

  18. Intimate Partner Violence and Its Associated Factors in a Sample of Colombian Immigrant Population in Spain.

    PubMed

    Colorado-Yohar, Sandra Milena; Agudelo-Suárez, Andrés A; Huerta, José M; Torres-Cantero, Alberto M

    2016-08-01

    Immigrants are vulnerable to Intimate partner violence (IPV). This study aims at characterising IPV among Colombian immigrants, and to identify its associated factors. Cross-sectional study on 336 Colombian immigrants (46 % women), aged 15-70 years, living in Spain. Self-reported questionnaire information on IPV suffered throughout the last year was collected face-to-face. Multivariable logistic regression was used to identify factors associated with IPV. Almost 30 % of participants reported IPV, without differences by gender (p = 0.339). Partner's alcohol consumption was associated with a higher frequency of being victim of IPV in both sexes. In women, low educational level, and discrimination were further associated to IPV. Younger age, and poorer self-perceived health in Spain as compared to Colombia were factors associated in men. Results showed similarly high levels of IPV among immigrant men and women. Alcohol consumption, education, discrimination, age, and poor self-perceived health were factors associated to IPV.

  19. Immunogenicity and Safety of Primary and Booster Vaccinations of a Fully Liquid DTaP-IPV-HB-PRP-T Hexavalent Vaccine in Healthy Infants and Toddlers in Germany and the Czech Republic.

    PubMed

    Prymula, Roman; Kieninger, Dorothee; Feroldi, Emmanuel; Jordanov, Emilia; B'Chir, Siham; DaCosta, Xavier

    2018-05-14

    To support a fully liquid, diphtheria (D)-tetanus (T)-acellular pertussis (aP)-inactivated poliovirus (IPV)-hepatitis B (HB)-Haemophilus influenzae b (PRP-T) vaccine in Europe using a 2, 3, 4 month primary series and a booster at 11 to 15 months of age. Phase III, randomized, observer-blind studies in Germany and the Czech Republic. Participants who had not received HB vaccine were randomized to a 2, 3, 4 month primary series of DTaP-IPV-HB-PRP-T (Group 1; N=266) or a reconstituted DTaPHB-IPV//PRP-T comparator (Group 2; N=263) and a booster of the same vaccine. Pneumococcal vaccine (PCV13) and rotavirus vaccine (RV) were coadministered at 2, 3, 4 months and the booster was coadministered with PCV13. Non-inferiority (Group 1 versus Group 2) was tested post-primary series for seroprotection rates (anti-HB and anti-PRP) and vaccine response rates (anti-PT and anti-FHA). Safety was assessed by parental reports. Non-inferiority was demonstrated with the lower bound of the 95% CI for the difference (Group 1-Group 2) being >-10% for each comparison. Primary series immune responses were high for all antigens and similar in each group. Pre-booster antibody persistence was good and there was a strong anamnestic response, both being similar for the investigational and control vaccines. Responses to PCV13 and RV were similar in each group. There were no safety concerns. These data support the use of the DTaP-IPV-HB-PRP-T vaccine in a 2, 3, 4 month schedule without a birth dose of HB vaccine, with a booster dose in the second year of life administered with routine childhood vaccines.

  20. An ensemble of dynamic neural network identifiers for fault detection and isolation of gas turbine engines.

    PubMed

    Amozegar, M; Khorasani, K

    2016-04-01

    In this paper, a new approach for Fault Detection and Isolation (FDI) of gas turbine engines is proposed by developing an ensemble of dynamic neural network identifiers. For health monitoring of the gas turbine engine, its dynamics is first identified by constructing three separate or individual dynamic neural network architectures. Specifically, a dynamic multi-layer perceptron (MLP), a dynamic radial-basis function (RBF) neural network, and a dynamic support vector machine (SVM) are trained to individually identify and represent the gas turbine engine dynamics. Next, three ensemble-based techniques are developed to represent the gas turbine engine dynamics, namely, two heterogeneous ensemble models and one homogeneous ensemble model. It is first shown that all ensemble approaches do significantly improve the overall performance and accuracy of the developed system identification scheme when compared to each of the stand-alone solutions. The best selected stand-alone model (i.e., the dynamic RBF network) and the best selected ensemble architecture (i.e., the heterogeneous ensemble) in terms of their performances in achieving an accurate system identification are then selected for solving the FDI task. The required residual signals are generated by using both a single model-based solution and an ensemble-based solution under various gas turbine engine health conditions. Our extensive simulation studies demonstrate that the fault detection and isolation task achieved by using the residuals that are obtained from the dynamic ensemble scheme results in a significantly more accurate and reliable performance as illustrated through detailed quantitative confusion matrix analysis and comparative studies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Transcriptional Network Analysis Identifies BACH1 as a Master Regulator of Breast Cancer Bone Metastasis

    PubMed Central

    Liang, Yajun; Wu, Heng; Lei, Rong; Chong, Robert A.; Wei, Yong; Lu, Xin; Tagkopoulos, Ilias; Kung, Sun-Yuan; Yang, Qifeng; Hu, Guohong; Kang, Yibin

    2012-01-01

    The application of functional genomic analysis of breast cancer metastasis has led to the identification of a growing number of organ-specific metastasis genes, which often function in concert to facilitate different steps of the metastatic cascade. However, the gene regulatory network that controls the expression of these metastasis genes remains largely unknown. Here, we demonstrate a computational approach for the deconvolution of transcriptional networks to discover master regulators of breast cancer bone metastasis. Several known regulators of breast cancer bone metastasis such as Smad4 and HIF1 were identified in our analysis. Experimental validation of the networks revealed BACH1, a basic leucine zipper transcription factor, as the common regulator of several functional metastasis genes, including MMP1 and CXCR4. Ectopic expression of BACH1 enhanced the malignance of breast cancer cells, and conversely, BACH1 knockdown significantly reduced bone metastasis. The expression of BACH1 and its target genes was linked to the higher risk of breast cancer recurrence in patients. This study established BACH1 as the master regulator of breast cancer bone metastasis and provided a paradigm to identify molecular determinants in complex pathological processes. PMID:22875853

  2. Cold-Adapted Viral Attenuation (CAVA): Highly Temperature Sensitive Polioviruses as Novel Vaccine Strains for a Next Generation Inactivated Poliovirus Vaccine

    PubMed Central

    Sanders, Barbara P.; de los Rios Oakes, Isabel; van Hoek, Vladimir; Bockstal, Viki; Kamphuis, Tobias; Uil, Taco G.; Song, Yutong; Cooper, Gillian; Crawt, Laura E.; Martín, Javier; Zahn, Roland; Lewis, John; Wimmer, Eckard; Custers, Jerome H. H. V.; Schuitemaker, Hanneke; Cello, Jeronimo; Edo-Matas, Diana

    2016-01-01

    The poliovirus vaccine field is moving towards novel vaccination strategies. Withdrawal of the Oral Poliovirus Vaccine and implementation of the conventional Inactivated Poliovirus Vaccine (cIPV) is imminent. Moreover, replacement of the virulent poliovirus strains currently used for cIPV with attenuated strains is preferred. We generated Cold-Adapted Viral Attenuation (CAVA) poliovirus strains by serial passage at low temperature and subsequent genetic engineering, which contain the capsid sequences of cIPV strains combined with a set of mutations identified during cold-adaptation. These viruses displayed a highly temperature sensitive phenotype with no signs of productive infection at 37°C as visualized by electron microscopy. Furthermore, decreases in infectious titers, viral RNA, and protein levels were measured during infection at 37°C, suggesting a block in the viral replication cycle at RNA replication, protein translation, or earlier. However, at 30°C, they could be propagated to high titers (9.4–9.9 Log10TCID50/ml) on the PER.C6 cell culture platform. We identified 14 mutations in the IRES and non-structural regions, which in combination induced the temperature sensitive phenotype, also when transferred to the genomes of other wild-type and attenuated polioviruses. The temperature sensitivity translated to complete absence of neurovirulence in CD155 transgenic mice. Attenuation was also confirmed after extended in vitro passage at small scale using conditions (MOI, cell density, temperature) anticipated for vaccine production. The inability of CAVA strains to replicate at 37°C makes reversion to a neurovirulent phenotype in vivo highly unlikely, therefore, these strains can be considered safe for the manufacture of IPV. The CAVA strains were immunogenic in the Wistar rat potency model for cIPV, inducing high neutralizing antibody titers in a dose-dependent manner in response to D-antigen doses used for cIPV. In combination with the highly productive

  3. Cold-Adapted Viral Attenuation (CAVA): Highly Temperature Sensitive Polioviruses as Novel Vaccine Strains for a Next Generation Inactivated Poliovirus Vaccine.

    PubMed

    Sanders, Barbara P; de Los Rios Oakes, Isabel; van Hoek, Vladimir; Bockstal, Viki; Kamphuis, Tobias; Uil, Taco G; Song, Yutong; Cooper, Gillian; Crawt, Laura E; Martín, Javier; Zahn, Roland; Lewis, John; Wimmer, Eckard; Custers, Jerome H H V; Schuitemaker, Hanneke; Cello, Jeronimo; Edo-Matas, Diana

    2016-03-01

    The poliovirus vaccine field is moving towards novel vaccination strategies. Withdrawal of the Oral Poliovirus Vaccine and implementation of the conventional Inactivated Poliovirus Vaccine (cIPV) is imminent. Moreover, replacement of the virulent poliovirus strains currently used for cIPV with attenuated strains is preferred. We generated Cold-Adapted Viral Attenuation (CAVA) poliovirus strains by serial passage at low temperature and subsequent genetic engineering, which contain the capsid sequences of cIPV strains combined with a set of mutations identified during cold-adaptation. These viruses displayed a highly temperature sensitive phenotype with no signs of productive infection at 37°C as visualized by electron microscopy. Furthermore, decreases in infectious titers, viral RNA, and protein levels were measured during infection at 37°C, suggesting a block in the viral replication cycle at RNA replication, protein translation, or earlier. However, at 30°C, they could be propagated to high titers (9.4-9.9 Log10TCID50/ml) on the PER.C6 cell culture platform. We identified 14 mutations in the IRES and non-structural regions, which in combination induced the temperature sensitive phenotype, also when transferred to the genomes of other wild-type and attenuated polioviruses. The temperature sensitivity translated to complete absence of neurovirulence in CD155 transgenic mice. Attenuation was also confirmed after extended in vitro passage at small scale using conditions (MOI, cell density, temperature) anticipated for vaccine production. The inability of CAVA strains to replicate at 37°C makes reversion to a neurovirulent phenotype in vivo highly unlikely, therefore, these strains can be considered safe for the manufacture of IPV. The CAVA strains were immunogenic in the Wistar rat potency model for cIPV, inducing high neutralizing antibody titers in a dose-dependent manner in response to D-antigen doses used for cIPV. In combination with the highly productive

  4. A computational approach to identify cellular heterogeneity and tissue-specific gene regulatory networks.

    PubMed

    Jambusaria, Ankit; Klomp, Jeff; Hong, Zhigang; Rafii, Shahin; Dai, Yang; Malik, Asrar B; Rehman, Jalees

    2018-06-07

    The heterogeneity of cells across tissue types represents a major challenge for studying biological mechanisms as well as for therapeutic targeting of distinct tissues. Computational prediction of tissue-specific gene regulatory networks may provide important insights into the mechanisms underlying the cellular heterogeneity of cells in distinct organs and tissues. Using three pathway analysis techniques, gene set enrichment analysis (GSEA), parametric analysis of gene set enrichment (PGSEA), alongside our novel model (HeteroPath), which assesses heterogeneously upregulated and downregulated genes within the context of pathways, we generated distinct tissue-specific gene regulatory networks. We analyzed gene expression data derived from freshly isolated heart, brain, and lung endothelial cells and populations of neurons in the hippocampus, cingulate cortex, and amygdala. In both datasets, we found that HeteroPath segregated the distinct cellular populations by identifying regulatory pathways that were not identified by GSEA or PGSEA. Using simulated datasets, HeteroPath demonstrated robustness that was comparable to what was seen using existing gene set enrichment methods. Furthermore, we generated tissue-specific gene regulatory networks involved in vascular heterogeneity and neuronal heterogeneity by performing motif enrichment of the heterogeneous genes identified by HeteroPath and linking the enriched motifs to regulatory transcription factors in the ENCODE database. HeteroPath assesses contextual bidirectional gene expression within pathways and thus allows for transcriptomic assessment of cellular heterogeneity. Unraveling tissue-specific heterogeneity of gene expression can lead to a better understanding of the molecular underpinnings of tissue-specific phenotypes.

  5. Intimate partner violence against Japanese and non-Japanese women in Japan: a cross-sectional study in the perinatal setting.

    PubMed

    Inami, Eriko; Kataoka, Yaeko; Eto, Hiromi; Horiuchi, Shigeko

    2010-06-01

    To identify the prevalence of intimate partner violence (IPV) against Japanese women (JW) and non-Japanese women (NJW) in a perinatal setting. Additional purposes were to identify the associated factors of IPV, describe the characteristics of IPV against NJW, and assess the acceptability of the Violence Against Women Screen (VAWS) instrument as a screening tool. A cross-sectional survey was conducted from September to November 2007 in an urban hospital maternity clinic in Tokyo, Japan. Women who attended the maternity clinic received the VAWS instrument, which was translated into four languages (Japanese with Kanji and Hiragana, English, Chinese, and Tagalog) and was used to identify IPV. A total of 400 women participated in the study: 357 were JW and 43 were NJW. The prevalence rate of IPV among the JW was 31.4% and 21.4% among the NJW. There was no statistical significance between the two groups. A multiple logistic regression with adjusted odds ratio identified two associated factors for IPV: being multipara and previous experience of physical violence from a partner. The prevalence of IPV was not statistically different among JW and NJW. Screening for IPV, early intervention, and support should be expanded in hospitals and maternity clinics in Japan.

  6. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight cells-update 2

    NASA Technical Reports Server (NTRS)

    Smithrick, John J.; Hall, Stephen W.

    1991-01-01

    An update of validation test results confirming the breakthrough in low earth orbit (LEO) cycle life of nickel-hydrogen cells containing 26 percent KOH electrolyte is presented. A breakthrough in the LEO cycle life of individual pressure vessel (IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40 000 LEO cycles compared to 3500 cycles for cells containing 31 percent KOH. This test was conducted at Hughes Aircraft Company under a NASA Lewis contract. The purpose was to investigate the effect of KOH concentration on cycle life. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min discharge (2x normal rate). The depth of discharge (DOD) was 80 percent. The cell temperature was maintained at 23 C. The boiler plate test results are in the process of being validated using flight hardware and real time LEO test at the Naval Weapons Support Center (NWSC), Crane, Indiana under a NASA Lewis Contract. Six 48 Ah Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells), and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The three 31 percent KOH cells failed (cycles 3729, 4165, and 11355). One of the 26 percent KOH cells failed at cycle 15314. The other two 26 percent KOH cells were cycled for over 16600 cycles during the continuing test.

  7. Adaptive identifier for uncertain complex nonlinear systems based on continuous neural networks.

    PubMed

    Alfaro-Ponce, Mariel; Cruz, Amadeo Argüelles; Chairez, Isaac

    2014-03-01

    This paper presents the design of a complex-valued differential neural network identifier for uncertain nonlinear systems defined in the complex domain. This design includes the construction of an adaptive algorithm to adjust the parameters included in the identifier. The algorithm is obtained based on a special class of controlled Lyapunov functions. The quality of the identification process is characterized using the practical stability framework. Indeed, the region where the identification error converges is derived by the same Lyapunov method. This zone is defined by the power of uncertainties and perturbations affecting the complex-valued uncertain dynamics. Moreover, this convergence zone is reduced to its lowest possible value using ideas related to the so-called ellipsoid methodology. Two simple but informative numerical examples are developed to show how the identifier proposed in this paper can be used to approximate uncertain nonlinear systems valued in the complex domain.

  8. Link and Network Layers Design for Ultra-High-Speed Terahertz-Band Communications Networks

    DTIC Science & Technology

    2017-01-01

    throughput, and identify the optimal parameter values for their design (Sec. 6.2.3). Moreover, we validate and test the scheme with experimental data obtained...LINK AND NETWORK LAYERS DESIGN FOR ULTRA-HIGH- SPEED TERAHERTZ-BAND COMMUNICATIONS NETWORKS STATE UNIVERSITY OF NEW YORK (SUNY) AT BUFFALO JANUARY...TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) FEB 2015 – SEP 2016 4. TITLE AND SUBTITLE LINK AND NETWORK LAYERS DESIGN FOR ULTRA-HIGH

  9. Integrating Genetic and Gene Co-expression Analysis Identifies Gene Networks Involved in Alcohol and Stress Responses

    PubMed Central

    Luo, Jie; Xu, Pei; Cao, Peijian; Wan, Hongjian; Lv, Xiaonan; Xu, Shengchun; Wang, Gangjun; Cook, Melloni N.; Jones, Byron C.; Lu, Lu; Wang, Xusheng

    2018-01-01

    Although the link between stress and alcohol is well recognized, the underlying mechanisms of how they interplay at the molecular level remain unclear. The purpose of this study is to identify molecular networks underlying the effects of alcohol and stress responses, as well as their interaction on anxiety behaviors in the hippocampus of mice using a systems genetics approach. Here, we applied a gene co-expression network approach to transcriptomes of 41 BXD mouse strains under four conditions: stress, alcohol, stress-induced alcohol and control. The co-expression analysis identified 14 modules and characterized four expression patterns across the four conditions. The four expression patterns include up-regulation in no restraint stress and given an ethanol injection (NOE) but restoration in restraint stress followed by an ethanol injection (RSE; pattern 1), down-regulation in NOE but rescue in RSE (pattern 2), up-regulation in both restraint stress followed by a saline injection (RSS) and NOE, and further amplification in RSE (pattern 3), and up-regulation in RSS but reduction in both NOE and RSE (pattern 4). We further identified four functional subnetworks by superimposing protein-protein interactions (PPIs) to the 14 co-expression modules, including γ-aminobutyric acid receptor (GABA) signaling, glutamate signaling, neuropeptide signaling, cAMP-dependent signaling. We further performed module specificity analysis to identify modules that are specific to stress, alcohol, or stress-induced alcohol responses. Finally, we conducted causality analysis to link genetic variation to these identified modules, and anxiety behaviors after stress and alcohol treatments. This study underscores the importance of integrative analysis and offers new insights into the molecular networks underlying stress and alcohol responses. PMID:29674951

  10. Identifying biological pathways that underlie primordial short stature using network analysis.

    PubMed

    Hanson, Dan; Stevens, Adam; Murray, Philip G; Black, Graeme C M; Clayton, Peter E

    2014-06-01

    Mutations in CUL7, OBSL1 and CCDC8, leading to disordered ubiquitination, cause one of the commonest primordial growth disorders, 3-M syndrome. This condition is associated with i) abnormal p53 function, ii) GH and/or IGF1 resistance, which may relate to failure to recycle signalling molecules, and iii) cellular IGF2 deficiency. However the exact molecular mechanisms that may link these abnormalities generating growth restriction remain undefined. In this study, we have used immunoprecipitation/mass spectrometry and transcriptomic studies to generate a 3-M 'interactome', to define key cellular pathways and biological functions associated with growth failure seen in 3-M. We identified 189 proteins which interacted with CUL7, OBSL1 and CCDC8, from which a network including 176 of these proteins was generated. To strengthen the association to 3-M syndrome, these proteins were compared with an inferred network generated from the genes that were differentially expressed in 3-M fibroblasts compared with controls. This resulted in a final 3-M network of 131 proteins, with the most significant biological pathway within the network being mRNA splicing/processing. We have shown using an exogenous insulin receptor (INSR) minigene system that alternative splicing of exon 11 is significantly changed in HEK293 cells with altered expression of CUL7, OBSL1 and CCDC8 and in 3-M fibroblasts. The net result is a reduction in the expression of the mitogenic INSR isoform in 3-M syndrome. From these preliminary data, we hypothesise that disordered ubiquitination could result in aberrant mRNA splicing in 3-M; however, further investigation is required to determine whether this contributes to growth failure. © 2014 The authors.

  11. Gene Network for Identifying the Entropy Changes of Different Modules in Pediatric Sepsis.

    PubMed

    Yang, Jing; Zhang, Pingli; Wang, Lumin

    2016-01-01

    Pediatric sepsis is a disease that threatens life of children. The incidence of pediatric sepsis is higher in developing countries due to various reasons, such as insufficient immunization and nutrition, water and air pollution, etc. Exploring the potential genes via different methods is of significance for the prevention and treatment of pediatric sepsis. This study aimed to identify potential genes associated with pediatric sepsis utilizing analysis of gene network and entropy. The mRNA expression in the blood samples collected from 20 septic children and 30 healthy controls was quantified by using Affymetrix HG-U133A microarray. Two condition-specific protein-protein interaction networks (PINs), one for the healthy control and the other one for the children with sepsis, were deduced by combining the fundamental human PINs with gene expression profiles in the two phenotypes. Subsequently, distinct modules from the two conditional networks were extracted by adopting a maximal clique-merging approach. Delta entropy (ΔS) was calculated between sepsis and control modules. Then, key genes displaying changes in gene composition were identified by matching the control and sepsis modules. Two objective modules were obtained, in which ribosomal protein RPL4 and RPL9 as well as TOP2A were probably considered as the key genes differentiating sepsis from healthy controls. According to previous reports and this work, TOP2A is the potential gene therapy target for pediatric sepsis. The relationship between pediatric sepsis and RPL4 and RPL9 needs further investigation. © 2016 The Author(s) Published by S. Karger AG, Basel.

  12. Children exposed to intimate partner violence: Identifying differential effects of family environment on children's trauma and psychopathology symptoms through regression mixture models.

    PubMed

    McDonald, Shelby Elaine; Shin, Sunny; Corona, Rosalie; Maternick, Anna; Graham-Bermann, Sandra A; Ascione, Frank R; Herbert Williams, James

    2016-08-01

    The majority of analytic approaches aimed at understanding the influence of environmental context on children's socioemotional adjustment assume comparable effects of contextual risk and protective factors for all children. Using self-reported data from 289 maternal caregiver-child dyads, we examined the degree to which there are differential effects of severity of intimate partner violence (IPV) exposure, yearly household income, and number of children in the family on posttraumatic stress symptoms (PTS) and psychopathology symptoms (i.e., internalizing and externalizing problems) among school-age children between the ages of 7-12 years. A regression mixture model identified three latent classes that were primarily distinguished by differential effects of IPV exposure severity on PTS and psychopathology symptoms: (1) asymptomatic with low sensitivity to environmental factors (66% of children), (2) maladjusted with moderate sensitivity (24%), and (3) highly maladjusted with high sensitivity (10%). Children with mothers who had higher levels of education were more likely to be in the maladjusted with moderate sensitivity group than the asymptomatic with low sensitivity group. Latino children were less likely to be in both maladjusted groups compared to the asymptomatic group. Overall, the findings suggest differential effects of family environmental factors on PTS and psychopathology symptoms among children exposed to IPV. Implications for research and practice are discussed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Wnt6 activates endoderm in the sea urchin gene regulatory network

    PubMed Central

    Croce, Jenifer; Range, Ryan; Wu, Shu-Yu; Miranda, Esther; Lhomond, Guy; Peng, Jeff Chieh-fu; Lepage, Thierry; McClay, David R.

    2011-01-01

    In the sea urchin, entry of β-catenin into the nuclei of the vegetal cells at 4th and 5th cleavages is necessary for activation of the endomesoderm gene regulatory network. Beyond that, little is known about how the embryo uses maternal information to initiate specification. Here, experiments establish that of the three maternal Wnts in the egg, Wnt6 is necessary for activation of endodermal genes in the endomesoderm GRN. A small region of the vegetal cortex is shown to be necessary for activation of the endomesoderm GRN. If that cortical region of the egg is removed, addition of Wnt6 rescues endoderm. At a molecular level, the vegetal cortex region contains a localized concentration of Dishevelled (Dsh) protein, a transducer of the canonical Wnt pathway; however, Wnt6 mRNA is not similarly localized. Ectopic activation of the Wnt pathway, through the expression of an activated form of β-catenin, of a dominant-negative variant of GSK-3β or of Dsh itself, rescues endomesoderm specification in eggs depleted of the vegetal cortex. Knockdown experiments in whole embryos show that absence of Wnt6 produces embryos that lack endoderm, but those embryos continue to express a number of mesoderm markers. Thus, maternal Wnt6 plus a localized vegetal cortical molecule, possibly Dsh, is necessary for endoderm specification; this has been verified in two species of sea urchin. The data also show that Wnt6 is only one of what are likely to be multiple components that are necessary for activation of the entire endomesoderm gene regulatory network. PMID:21750039

  14. A novel method for identifying disease associated protein complexes based on functional similarity protein complex networks.

    PubMed

    Le, Duc-Hau

    2015-01-01

    Protein complexes formed by non-covalent interaction among proteins play important roles in cellular functions. Computational and purification methods have been used to identify many protein complexes and their cellular functions. However, their roles in terms of causing disease have not been well discovered yet. There exist only a few studies for the identification of disease-associated protein complexes. However, they mostly utilize complicated heterogeneous networks which are constructed based on an out-of-date database of phenotype similarity network collected from literature. In addition, they only apply for diseases for which tissue-specific data exist. In this study, we propose a method to identify novel disease-protein complex associations. First, we introduce a framework to construct functional similarity protein complex networks where two protein complexes are functionally connected by either shared protein elements, shared annotating GO terms or based on protein interactions between elements in each protein complex. Second, we propose a simple but effective neighborhood-based algorithm, which yields a local similarity measure, to rank disease candidate protein complexes. Comparing the predictive performance of our proposed algorithm with that of two state-of-the-art network propagation algorithms including one we used in our previous study, we found that it performed statistically significantly better than that of these two algorithms for all the constructed functional similarity protein complex networks. In addition, it ran about 32 times faster than these two algorithms. Moreover, our proposed method always achieved high performance in terms of AUC values irrespective of the ways to construct the functional similarity protein complex networks and the used algorithms. The performance of our method was also higher than that reported in some existing methods which were based on complicated heterogeneous networks. Finally, we also tested our method with

  15. Computational Framework for Analysis of Prey–Prey Associations in Interaction Proteomics Identifies Novel Human Protein–Protein Interactions and Networks

    PubMed Central

    Saha, Sudipto; Dazard, Jean-Eudes; Xu, Hua; Ewing, Rob M.

    2013-01-01

    Large-scale protein–protein interaction data sets have been generated for several species including yeast and human and have enabled the identification, quantification, and prediction of cellular molecular networks. Affinity purification-mass spectrometry (AP-MS) is the preeminent methodology for large-scale analysis of protein complexes, performed by immunopurifying a specific “bait” protein and its associated “prey” proteins. The analysis and interpretation of AP-MS data sets is, however, not straightforward. In addition, although yeast AP-MS data sets are relatively comprehensive, current human AP-MS data sets only sparsely cover the human interactome. Here we develop a framework for analysis of AP-MS data sets that addresses the issues of noise, missing data, and sparsity of coverage in the context of a current, real world human AP-MS data set. Our goal is to extend and increase the density of the known human interactome by integrating bait–prey and cocomplexed preys (prey–prey associations) into networks. Our framework incorporates a score for each identified protein, as well as elements of signal processing to improve the confidence of identified protein–protein interactions. We identify many protein networks enriched in known biological processes and functions. In addition, we show that integrated bait–prey and prey–prey interactions can be used to refine network topology and extend known protein networks. PMID:22845868

  16. Modeling the spread of polio in an IPV-vaccinated population: lessons learned from the 2013 silent outbreak in southern Israel.

    PubMed

    Yaari, Rami; Kaliner, Ehud; Grotto, Itamar; Katriel, Guy; Moran-Gilad, Jacob; Sofer, Danit; Mendelson, Ella; Miller, Elizabeth; Huppert, Amit; Anis, E; Kopel, E; Manor, Y; Mor, O; Shulman, L; Singer, R; Weil, M

    2016-06-23

    Polio eradication is an extraordinary globally coordinated health program in terms of its magnitude and reach, leading to the elimination of wild poliovirus (WPV) in most parts of the world. In 2013, a silent outbreak of WPV was detected in Israel, a country using an inactivated polio vaccine (IPV) exclusively since 2005. The outbreak was detected using environmental surveillance (ES) of sewage reservoirs. Stool surveys indicated the outbreak to be restricted mainly to children under the age of 10 in the Bedouin population of southern Israel. In order to curtail the outbreak, a nationwide vaccination campaign using oral polio vaccine (OPV) was conducted, targeting all children under 10. A transmission model, fitted to the results of the stool surveys, with additional conditions set by the ES measurements, was used to evaluate the prevalence of WPV in Bedouin children and the effectiveness of the vaccination campaign. Employing the parameter estimates of the model fitting, the model was used to investigate the effect of alternative timings, coverages and dosages of the OPV campaign on the outcome of the outbreak. The mean estimate for the mean reproductive number was 1.77 (95 % credible interval, 1.46-2.30). With seasonal variation, the reproductive number maximum range was between zero and six. The mean estimate for the mean infectious periods was 16.8 (8.6-24.9) days. The modeling indicates the OPV campaign was effective in curtailing the outbreak. The mean estimate for the attack rate in Bedouin children under 10 at the end of 2014 was 42 % (22-65 %), whereas without the campaign the mean projected attack rate was 57 % (35-74 %). The campaign also likely shortened the duration of the outbreak by a mean estimate of 309 (2-846) days. A faster initiation of the OPV campaign could have reduced the incidence of WPV even if a lower coverage was reached, at the risk of prolonging the outbreak. OPV campaigns are essential for interrupting WPV transmission, even in a

  17. Genomic locus modulating corneal thickness in the mouse identifies POU6F2 as a potential risk of developing glaucoma

    PubMed Central

    Li, Ying; Wang, Jiaxing; Allingham, R. Rand; Hauser, Michael A.; Wiggs, Janey L.; Geisert, Eldon E.

    2018-01-01

    Central corneal thickness (CCT) is one of the most heritable ocular traits and it is also a phenotypic risk factor for primary open angle glaucoma (POAG). The present study uses the BXD Recombinant Inbred (RI) strains to identify novel quantitative trait loci (QTLs) modulating CCT in the mouse with the potential of identifying a molecular link between CCT and risk of developing POAG. The BXD RI strain set was used to define mammalian genomic loci modulating CCT, with a total of 818 corneas measured from 61 BXD RI strains (between 60–100 days of age). The mice were anesthetized and the eyes were positioned in front of the lens of the Phoenix Micron IV Image-Guided OCT system or the Bioptigen OCT system. CCT data for each strain was averaged and used to QTLs modulating this phenotype using the bioinformatics tools on GeneNetwork (www.genenetwork.org). The candidate genes and genomic loci identified in the mouse were then directly compared with the summary data from a human POAG genome wide association study (NEIGHBORHOOD) to determine if any genomic elements modulating mouse CCT are also risk factors for POAG.This analysis revealed one significant QTL on Chr 13 and a suggestive QTL on Chr 7. The significant locus on Chr 13 (13 to 19 Mb) was examined further to define candidate genes modulating this eye phenotype. For the Chr 13 QTL in the mouse, only one gene in the region (Pou6f2) contained nonsynonymous SNPs. Of these five nonsynonymous SNPs in Pou6f2, two resulted in changes in the amino acid proline which could result in altered secondary structure affecting protein function. The 7 Mb region under the mouse Chr 13 peak distributes over 2 chromosomes in the human: Chr 1 and Chr 7. These genomic loci were examined in the NEIGHBORHOOD database to determine if they are potential risk factors for human glaucoma identified using meta-data from human GWAS. The top 50 hits all resided within one gene (POU6F2), with the highest significance level of p = 10−6 for SNP

  18. Aging in the Shadow of Violence: A Phenomenological Conceptual Framework for Understanding Elderly Women Who Experienced Lifelong IPV.

    PubMed

    Band-Winterstein, Tova

    2015-01-01

    This article suggests a heuristic framework for understanding elderly women's "lived experience" of lifelong intimate partner violence (IPV). This framework is based on the phenomenological qualitative studies of 31 women, aged 60-83, using a semistructured interview guide. From the results, a matrix emerged built on two axes. The first axis consists of three phenomenological dimensions: suffering, a "ticking clock," and life wisdom. The second axis consists of four themes that emerged from the content analysis: loneliness, regret, being in a state of waiting, and being a living monument to perpetual victimhood. The practical implications of these phenomenological findings are then discussed.

  19. Building Nehemiah's Wall: The North Minneapolis Faith Community's Role in the Prevention of Intimate Partner Violence.

    PubMed

    Raymond, Jeannette L; Spencer, Rachael A; Lynch, Alice O; Clark, Cari Jo

    2016-12-01

    African American women who are victims of intimate partner violence (IPV) often rely on faith when exposed to IPV; however, the role of the faith community in the lives of IPV victims is less clear. This study uses a community-based approach to examine the role of the faith community in addressing IPV in heterosexual relationships in North Minneapolis where rates of poverty and IPV among African Americans are disproportionately high compared to other cities in Minnesota. Five focus group discussions (FGDs) were held with 34 lay and secular leaders of mixed genders in the North Minneapolis community. FGDs were evaluated using a grounded theory method of analysis. Discussions revealed that some faith leaders effectively identified IPV as a community issue and intervened but that many remained silent or were not well trained to address the issue safely. Faith-based solutions were identified to address IPV in the African American community and included the faith community speaking openly about IPV, developing programs for unmarried and adolescent couples, and coordinating services with secular IPV support organizations.

  20. The Gene Regulatory Network of Lens Induction Is Wired through Meis-Dependent Shadow Enhancers of Pax6

    PubMed Central

    Antosova, Barbora; Smolikova, Jana; Klimova, Lucie; Lachova, Jitka; Bendova, Michaela; Kozmikova, Iryna; Machon, Ondrej; Kozmik, Zbynek

    2016-01-01

    Lens induction is a classical developmental model allowing investigation of cell specification, spatiotemporal control of gene expression, as well as how transcription factors are integrated into highly complex gene regulatory networks (GRNs). Pax6 represents a key node in the gene regulatory network governing mammalian lens induction. Meis1 and Meis2 homeoproteins are considered as essential upstream regulators of Pax6 during lens morphogenesis based on their interaction with the ectoderm enhancer (EE) located upstream of Pax6 transcription start site. Despite this generally accepted regulatory pathway, Meis1-, Meis2- and EE-deficient mice have surprisingly mild eye phenotypes at placodal stage of lens development. Here, we show that simultaneous deletion of Meis1 and Meis2 in presumptive lens ectoderm results in arrested lens development in the pre-placodal stage, and neither lens placode nor lens is formed. We found that in the presumptive lens ectoderm of Meis1/Meis2 deficient embryos Pax6 expression is absent. We demonstrate using chromatin immunoprecipitation (ChIP) that in addition to EE, Meis homeoproteins bind to a remote, ultraconserved SIMO enhancer of Pax6. We further show, using in vivo gene reporter analyses, that the lens-specific activity of SIMO enhancer is dependent on the presence of three Meis binding sites, phylogenetically conserved from man to zebrafish. Genetic ablation of EE and SIMO enhancers demostrates their requirement for lens induction and uncovers an apparent redundancy at early stages of lens development. These findings identify a genetic requirement for Meis1 and Meis2 during the early steps of mammalian eye development. Moreover, they reveal an apparent robustness in the gene regulatory mechanism whereby two independent "shadow enhancers" maintain critical levels of a dosage-sensitive gene, Pax6, during lens induction. PMID:27918583

  1. Children Exposed to Intimate Partner Violence: Identifying Differential Effects of Family Environment on Children’s Trauma and Psychopathology Symptoms through Regression Mixture Models

    PubMed Central

    McDonald, Shelby Elaine; Shin, Sunny; Corona, Rosalie; Maternick, Anna; Graham-Bermann, Sandra A.; Ascione, Frank R.; Williams, James Herbert

    2016-01-01

    The majority of analytic approaches aimed at understanding the influence of environmental context on children’s socioemotional adjustment assume comparable effects of contextual risk and protective factors for all children. Using self-reported data from 289 maternal caregiver-child dyads, we examined the degree to which there are differential effects of severity of intimate partner violence (IPV) exposure, yearly household income, and number of children in the family on posttraumatic stress symptoms (PTS) and psychopathology symptoms (i.e., internalizing and externalizing problems) among school-age children between the ages of 7 to 12 years. A regression mixture model identified three latent classes that were primarily distinguished by differential effects of IPV exposure severity on PTS and psychopathology symptoms: (1) asymptomatic with low sensitivity to environmental factors (66% of children), (2) maladjusted with moderate sensitivity (24%), and (3) highly maladjusted with high sensitivity (10%). Children with mothers who had higher levels of education were more likely to be in the maladjusted with moderate sensitivity group than the asymptomatic with low sensitivity group. Latino children were less likely to be in both maladjusted groups compared to the asymptomatic group. Overall, the findings suggest differential effects of family environmental factors on PTS and psychopathology symptoms among children exposed to IPV. Implications for research and practice are discussed. PMID:27337691

  2. Network-Based Methods for Identifying Key Active Proteins in the Extracellular Electron Transfer Process in Shewanella oneidensis MR-1.

    PubMed

    Ding, Dewu; Sun, Xiao

    2018-01-16

    Shewanella oneidensis MR-1 can transfer electrons from the intracellular environment to the extracellular space of the cells to reduce the extracellular insoluble electron acceptors (Extracellular Electron Transfer, EET). Benefiting from this EET capability, Shewanella has been widely used in different areas, such as energy production, wastewater treatment, and bioremediation. Genome-wide proteomics data was used to determine the active proteins involved in activating the EET process. We identified 1012 proteins with decreased expression and 811 proteins with increased expression when the EET process changed from inactivation to activation. We then networked these proteins to construct the active protein networks, and identified the top 20 key active proteins by network centralization analysis, including metabolism- and energy-related proteins, signal and transcriptional regulatory proteins, translation-related proteins, and the EET-related proteins. We also constructed the integrated protein interaction and transcriptional regulatory networks for the active proteins, then found three exclusive active network motifs involved in activating the EET process-Bi-feedforward Loop, Regulatory Cascade with a Feedback, and Feedback with a Protein-Protein Interaction (PPI)-and identified the active proteins involved in these motifs. Both enrichment analysis and comparative analysis to the whole-genome data implicated the multiheme c -type cytochromes and multiple signal processing proteins involved in the process. Furthermore, the interactions of these motif-guided active proteins and the involved functional modules were discussed. Collectively, by using network-based methods, this work reported a proteome-wide search for the key active proteins that potentially activate the EET process.

  3. Network-based approach to identify prognostic biomarkers for estrogen receptor-positive breast cancer treatment with tamoxifen.

    PubMed

    Liu, Rong; Guo, Cheng-Xian; Zhou, Hong-Hao

    2015-01-01

    This study aims to identify effective gene networks and prognostic biomarkers associated with estrogen receptor positive (ER+) breast cancer using human mRNA studies. Weighted gene coexpression network analysis was performed with a complex ER+ breast cancer transcriptome to investigate the function of networks and key genes in the prognosis of breast cancer. We found a significant correlation of an expression module with distant metastasis-free survival (HR = 2.25; 95% CI .21.03-4.88 in discovery set; HR = 1.78; 95% CI = 1.07-2.93 in validation set). This module contained genes enriched in the biological process of the M phase. From this module, we further identified and validated 5 hub genes (CDK1, DLGAP5, MELK, NUSAP1, and RRM2), the expression levels of which were strongly associated with poor survival. Highly expressed MELK indicated poor survival in luminal A and luminal B breast cancer molecular subtypes. This gene was also found to be associated with tamoxifen resistance. Results indicated that a network-based approach may facilitate the discovery of biomarkers for the prognosis of ER+ breast cancer and may also be used as a basis for establishing personalized therapies. Nevertheless, before the application of this approach in clinical settings, in vivo and in vitro experiments and multi-center randomized controlled clinical trials are still needed.

  4. In-Silico Integration Approach to Identify a Key miRNA Regulating a Gene Network in Aggressive Prostate Cancer

    PubMed Central

    Colaprico, Antonio; Bontempi, Gianluca; Castiglioni, Isabella

    2018-01-01

    Like other cancer diseases, prostate cancer (PC) is caused by the accumulation of genetic alterations in the cells that drives malignant growth. These alterations are revealed by gene profiling and copy number alteration (CNA) analysis. Moreover, recent evidence suggests that also microRNAs have an important role in PC development. Despite efforts to profile PC, the alterations (gene, CNA, and miRNA) and biological processes that correlate with disease development and progression remain partially elusive. Many gene signatures proposed as diagnostic or prognostic tools in cancer poorly overlap. The identification of co-expressed genes, that are functionally related, can identify a core network of genes associated with PC with a better reproducibility. By combining different approaches, including the integration of mRNA expression profiles, CNAs, and miRNA expression levels, we identified a gene signature of four genes overlapping with other published gene signatures and able to distinguish, in silico, high Gleason-scored PC from normal human tissue, which was further enriched to 19 genes by gene co-expression analysis. From the analysis of miRNAs possibly regulating this network, we found that hsa-miR-153 was highly connected to the genes in the network. Our results identify a four-gene signature with diagnostic and prognostic value in PC and suggest an interesting gene network that could play a key regulatory role in PC development and progression. Furthermore, hsa-miR-153, controlling this network, could be a potential biomarker for theranostics in high Gleason-scored PC. PMID:29562723

  5. Unperceived intimate partner violence and women's health.

    PubMed

    Sonego, Michela; Gandarillas, Ana; Zorrilla, Belén; Lasheras, Luisa; Pires, Marisa; Anes, Ana; Ordobás, María

    2013-01-01

    Women who experience intimate partner violence (IPV) often do not perceive themselves as abused. This study sought to estimate the health effects of unperceived IPV (uIPV), taking violence-free women as the reference, and to compare the effects of uIPV with those of perceived IPV (pIPV). We performed a cross-sectional population study through telephone interviews of 2835 women aged 18 to 70 years living in the region of Madrid and having an ongoing intimate partner relationship or contact with a former partner in the preceding year. Based on 26 questions from the Conflict Tactics Scale-1 and the Enquête Nacional sur les Violences envers les Femmes en France and the question "Do you feel abused by your partner?" a variable was constructed in three categories, namely, the absence of IPV, uIPV and pIPV. Using logistic regression, we analyzed the association between health problems, medication use, health-service utilization and IPV (perceived and unperceived) vis-à-vis the absence of IPV. There were 247 cases of uIPV and 96 of pIPV (prevalences of 8.8% and 3.4%, respectively). The multivariate analysis showed that a substantial number of the outcomes explored were associated with uIPV, pIPV, or both. The highest odds ratios (ORs) were obtained for depression (Patient Health Questionnaire-9≥10) (uIPV: OR 3.4, 95% CI 2.4-3.8; and pIPV: 4.1, 95%CI 2.5-6.8). In most problems, the ORs did not significantly differ between the two types of IPV. uIPV is 2.6 times more frequent than pIPV and is associated with at least as many health problems as pIPV. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  6. Intimate partner violence around the time of pregnancy and postpartum depression: The experience of women of Bangladesh

    PubMed Central

    Broidy, Lisa; Baird, Kathleen; Mazerolle, Paul

    2017-01-01

    Background and objectives Intimate partner violence (IPV) around the time of pregnancy is a serious public health concern and is known to have an adverse effect on perinatal mental health. In order to craft appropriate and effective interventions, it is important to understand how the association between IPV and postpartum depression (PPD) may differ as a function of the type and timing of IPV victimization. Here we evaluate the influence of physical, sexual and psychological IPV before, during and after pregnancy on PPD. Methods Cross-sectional survey data was collected between October 2015 and January 2016 in the Chandpur District of Bangladesh from 426 new mothers, aged 15–49 years, who were in the first six months postpartum. Multivariate logistic regression models were used to estimate the association between IPV and PPD, adjusted for socio-demographic, reproductive and psychosocial confounding factors. Results Approximately 35.2% of women experienced PPD within the first six months following childbirth. Controlling for confounders, the odds of PPD was significantly greater among women who reported exposure to physical (AOR: 1.79, 95% CI [1.25, 3.43]), sexual (AOR: 2.25, 95% CI [1.14, 4.45]) or psychological (AOR: 6.92, 95% CI [1.71, 28.04]) IPV during pregnancy as opposed to those who did not. However, both before and after pregnancy, only physical IPV evidences a direct effect on PPD. Results highlight the mental health consequences of IPV for women of Bangladesh, as well as the influence of timing and type of IPV on PPD outcomes. Conclusions and implications The findings confirm that exposure to IPV significantly increases the odds of PPD. The association is particularly strong for physical IPV during all periods and psychological IPV during pregnancy. Results reinforce the need to conduct routine screening during pregnancy to identify women with a history of IPV who may at risk for PPD and to offer them necessary support. PMID:28472056

  7. Approaches used by employee assistance programs to address perpetration of intimate partner violence.

    PubMed

    Walters, Jennifer L Hardison; Pollack, Keshia M; Clinton-Sherrod, Monique; Lindquist, Christine H; McKay, Tasseli; Lasater, Beth M

    2012-01-01

    Employee Assistance Programs (EAPs) are workplace resources available to employees with problems impacting work performance. EAPs are well-positioned to address intimate partner violence (IPV), a major public health problem with workplace impacts. A purposeful sample of 28 EAPs across the United States was surveyed to identify policies and programs to address IPV, including perpetration. Most EAPs did not report having standardized approaches for addressing IPV perpetration. EAPs also described significant barriers to identifying IPV perpetrators, with the majority relying on self-disclosure on the part of the perpetrator when contacting the EAP. These results suggest that many EAPs--even when interacting with employees who present with issues known to correlate with IPV--are missing a potential opportunity to assess and intervene with IPV perpetrators.

  8. Immunogenicity and safety of a booster dose of diphtheria, tetanus, acellular pertussis and inactivated poliomyelitis vaccine (Tdap-IPV; Repevax) administered concomitantly versus non-concomitantly with an influenza vaccine (Vaxigrip) to adults aged ≥60 years: an open-label, randomised trial.

    PubMed

    Zimmermann, Ulrich; Gavazzi, Gaëtan; Richard, Patrick; Eymin, Cécile; Soubeyrand, Benoît; Baudin, Martine

    2013-03-01

    Annual influenza vaccination provides an opportunity to administer a booster dose of diphtheria, tetanus, acellular pertussis and inactivated poliomyelitis vaccine (Tdap-IPV) to the elderly. This study evaluated immune responses to and safety of the two vaccines administered concomitantly or sequentially to elderly individuals in France and Germany. Individuals aged ≥60 years who had received a diphtheria/tetanus booster within 5-15 years were randomised (1:1) to receive either Tdap-IPV and an inactivated influenza vaccine concomitantly (Group 1) or inactivated influenza vaccine then Tdap-IPV 28-35 days later (Group 2). Antibody titres were measured before and 28-35 days after each vaccination. The mean age of randomised individuals (n=954) was 68.8 years. Post-vaccination seroprotection rates (≥0.1 IU/mL for diphtheria/tetanus and ≥8 1/dilution for polio) for Group 1 were non-inferior to Group 2 for diphtheria (85.4% vs. 87.5%), tetanus (both 100%), polio type 1 (99.8% vs. 100%), polio type 2 (both 100%) and polio type 3 (99.3% vs. 99.8%). Similarly, percentages of individuals with pertussis antibodies ≥5 EU/mL for Group 1 were non-inferior to Group 2: pertussis toxin (94.3% vs. 98.1%), filamentous haemagglutinin (99.8% vs. 100%), pertactin (97.3% vs. 96.0%), fimbriae 2 and 3 (91.7% vs. 89.5%). Post-vaccination geometric mean titres of anti-influenza haemagglutinin antibodies for Group 1 were non-inferior to Group 2. Adverse events following administration of Tdap-IPV were similar in both study groups, with no vaccine-related serious adverse events. Tdap-IPV and inactivated influenza vaccine can be administered concomitantly in the elderly without impairing tolerability or the immune response to either vaccine. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Identifying essential proteins based on sub-network partition and prioritization by integrating subcellular localization information.

    PubMed

    Li, Min; Li, Wenkai; Wu, Fang-Xiang; Pan, Yi; Wang, Jianxin

    2018-06-14

    Essential proteins are important participants in various life activities and play a vital role in the survival and reproduction of living organisms. Identification of essential proteins from protein-protein interaction (PPI) networks has great significance to facilitate the study of human complex diseases, the design of drugs and the development of bioinformatics and computational science. Studies have shown that highly connected proteins in a PPI network tend to be essential. A series of computational methods have been proposed to identify essential proteins by analyzing topological structures of PPI networks. However, the high noise in the PPI data can degrade the accuracy of essential protein prediction. Moreover, proteins must be located in the appropriate subcellular localization to perform their functions, and only when the proteins are located in the same subcellular localization, it is possible that they can interact with each other. In this paper, we propose a new network-based essential protein discovery method based on sub-network partition and prioritization by integrating subcellular localization information, named SPP. The proposed method SPP was tested on two different yeast PPI networks obtained from DIP database and BioGRID database. The experimental results show that SPP can effectively reduce the effect of false positives in PPI networks and predict essential proteins more accurately compared with other existing computational methods DC, BC, CC, SC, EC, IC, NC. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. Network-Based Integration of Disparate Omic Data To Identify "Silent Players" in Cancer

    PubMed Central

    Ruffalo, Matthew

    2015-01-01

    Development of high-throughput monitoring technologies enables interrogation of cancer samples at various levels of cellular activity. Capitalizing on these developments, various public efforts such as The Cancer Genome Atlas (TCGA) generate disparate omic data for large patient cohorts. As demonstrated by recent studies, these heterogeneous data sources provide the opportunity to gain insights into the molecular changes that drive cancer pathogenesis and progression. However, these insights are limited by the vast search space and as a result low statistical power to make new discoveries. In this paper, we propose methods for integrating disparate omic data using molecular interaction networks, with a view to gaining mechanistic insights into the relationship between molecular changes at different levels of cellular activity. Namely, we hypothesize that genes that play a role in cancer development and progression may be implicated by neither frequent mutation nor differential expression, and that network-based integration of mutation and differential expression data can reveal these “silent players”. For this purpose, we utilize network-propagation algorithms to simulate the information flow in the cell at a sample-specific resolution. We then use the propagated mutation and expression signals to identify genes that are not necessarily mutated or differentially expressed genes, but have an essential role in tumor development and patient outcome. We test the proposed method on breast cancer and glioblastoma multiforme data obtained from TCGA. Our results show that the proposed method can identify important proteins that are not readily revealed by molecular data, providing insights beyond what can be gleaned by analyzing different types of molecular data in isolation. PMID:26683094

  11. Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology

    NASA Astrophysics Data System (ADS)

    Ukil, Sanchaita; Sinha, Meenakshee; Varshney, Lavneesh; Agrawal, Shipra

    Type 2 Diabetes is a complex multifactorial disease, which alters several signaling cascades giving rise to serious complications. It is one of the major risk factors for cardiovascular diseases. The present research work describes an integrated functional network biology approach to identify pathways that get transcriptionally altered and lead to complex complications thereby amplifying the phenotypic effect of the impaired disease state. We have identified two sub-network modules, which could be activated under abnormal circumstances in diabetes. Present work describes key proteins such as P85A and SRC serving as important nodes to mediate alternate signaling routes during diseased condition. P85A has been shown to be an important link between stress responsive MAPK and CVD markers involved in fibrosis. MAPK8 has been shown to interact with P85A and further activate CTGF through VEGF signaling. We have traced a novel and unique route correlating inflammation and fibrosis by considering P85A as a key mediator of signals. The next sub-network module shows SRC as a junction for various signaling processes, which results in interaction between NF-kB and beta catenin to cause cell death. The powerful interaction between these important genes in response to transcriptionally altered lipid metabolism and impaired inflammatory response via SRC causes apoptosis of cells. The crosstalk between inflammation, lipid homeostasis and stress, and their serious effects downstream have been explained in the present analyses.

  12. Identification of host transcriptional networks showing concentration-dependent regulation by HPV16 E6 and E7 proteins in basal cervical squamous epithelial cells

    PubMed Central

    Smith, Stephen P.; Scarpini, Cinzia G.; Groves, Ian J.; Odle, Richard I.; Coleman, Nicholas

    2016-01-01

    Development of cervical squamous cell carcinoma requires increased expression of the major high-risk human-papillomavirus (HPV) oncogenes E6 and E7 in basal cervical epithelial cells. We used a systems biology approach to identify host transcriptional networks in such cells and study the concentration-dependent changes produced by HPV16-E6 and -E7 oncoproteins. We investigated sample sets derived from the W12 model of cervical neoplastic progression, for which high quality phenotype/genotype data were available. We defined a gene co-expression matrix containing a small number of highly-connected hub nodes that controlled large numbers of downstream genes (regulons), indicating the scale-free nature of host gene co-expression in W12. We identified a small number of ‘master regulators’ for which downstream effector genes were significantly associated with protein levels of HPV16 E6 (n = 7) or HPV16 E7 (n = 5). We validated our data by depleting E6/E7 in relevant cells and by functional analysis of selected genes in vitro. We conclude that the network of transcriptional interactions in HPV16-infected basal-type cervical epithelium is regulated in a concentration-dependent manner by E6/E7, via a limited number of central master-regulators. These effects are likely to be significant in cervical carcinogenesis, where there is competitive selection of cells with elevated expression of virus oncoproteins. PMID:27457222

  13. A Phase III randomized, double-blind, clinical trial of an investigational hexavalent vaccine given at 2, 4, and 11-12 months.

    PubMed

    Silfverdal, Sven-Arne; Icardi, Giancarlo; Vesikari, Timo; Flores, Sheryl A; Pagnoni, Marco F; Xu, Jin; Liu, G Frank; Stek, Jon E; Boisnard, Florence; Thomas, Stéphane; Ziani, Eddy; Lee, Andrew W

    2016-07-19

    Combination vaccines simplify vaccination visits and improve coverage and timeliness. DTaP5-HB-IPV-Hib is a new investigational, fully-liquid, combination vaccine designed to protect against 6 infectious diseases, including 5 pertussis antigens and OMPC instead of PT as conjugated protein for Hib component. In this multicenter, double-blind, comparator-controlled, Phase III study (NCT01480258) conducted in Sweden, Italy, and Finland, healthy infants were randomized 1:1 to receive one two immunization regimens. The DTaP5-HB-IPV-Hib Group received the investigational hexavalent vaccine (DTaP5-HB-IPV-Hib) and the Control Group received Infanrix-hexa (DTPa3-HBV-IPV/Hib) at 2, 4 and 11-12months of age. Both groups received concomitantly Prevnar 13 (PCV13) and Rotateq (RV5) or Rotarix (RV1) at 2, 4months of age and PCV13 at 11-12months. Subjects administered RV5 received a 3rd dose at 5months of age. A total of 656 subjects were randomized to the DTaP5-HB-IPV-Hib Group and 659 subjects to Control Group. Immune responses to all vaccine antigens post-toddler dose were non-inferior in the DTaP5-HB-IPV-Hib Group as compared to the Control Group. Additionally, the post-dose 2 and pre-toddler DTaP5-HB-IPV-Hib anti-PRP responses were superior. The DTaP5-HB-IPV-Hib Group responses to concomitant RV1 were non-inferior compared to the Control Group. Solicited adverse event rates after any dose were similar in both groups, except for higher rates of pyrexia (6.4% difference; 95% CI: 1.5,11.3) and somnolence (5.8% difference; 95% CI: 1.7,9.8) in the DTaP5-HB-IPV-Hib Group. Vaccine-related serious adverse events occurred infrequently in the DTaP5-HB-IPV-Hib Group (0.3%) and the Control Group (0.5%). The safety and immunogenicity of DTaP5-HB-IPV-Hib is generally comparable to Control when administered in the 2, 4, 11-12month schedule. Early Hib responses were superior versus Control. DTaP5-HB-IPV-Hib could provide a new hexavalent option for pediatric combination vaccines, aligned

  14. Identifying all moiety conservation laws in genome-scale metabolic networks.

    PubMed

    De Martino, Andrea; De Martino, Daniele; Mulet, Roberto; Pagnani, Andrea

    2014-01-01

    The stoichiometry of a metabolic network gives rise to a set of conservation laws for the aggregate level of specific pools of metabolites, which, on one hand, pose dynamical constraints that cross-link the variations of metabolite concentrations and, on the other, provide key insight into a cell's metabolic production capabilities. When the conserved quantity identifies with a chemical moiety, extracting all such conservation laws from the stoichiometry amounts to finding all non-negative integer solutions of a linear system, a programming problem known to be NP-hard. We present an efficient strategy to compute the complete set of integer conservation laws of a genome-scale stoichiometric matrix, also providing a certificate for correctness and maximality of the solution. Our method is deployed for the analysis of moiety conservation relationships in two large-scale reconstructions of the metabolism of the bacterium E. coli, in six tissue-specific human metabolic networks, and, finally, in the human reactome as a whole, revealing that bacterial metabolism could be evolutionarily designed to cover broader production spectra than human metabolism. Convergence to the full set of moiety conservation laws in each case is achieved in extremely reduced computing times. In addition, we uncover a scaling relation that links the size of the independent pool basis to the number of metabolites, for which we present an analytical explanation.

  15. Adding insult to injury: intimate partner violence among women and men reporting activity limitations.

    PubMed

    Cohen, Marsha M; Forte, Tonia; Du Mont, Janice; Hyman, Ilene; Romans, Sarah

    2006-08-01

    Women with activity limitations (ALs) are at risk for Intimate partner violence (IPV). This study examined IPV in men versus women with ALs. Data from the Canadian 1999 General Social Survey compared physical, sexual, emotional, and financial IPV from a current/expartner in 5 years for men and women with ALs compared with those without ALs. Logistic regression examined sex differences in IPV among those with ALs, adjusting for sociodemographic factors. Rates of physical (11.9% versus 7.8%; p < 0.0001), sexual (3.5% versus 1.4%; p < 0.0001), emotional (27.1% versus 17.7%; p < 0.0001), and financial (7.5% versus 3.4%; p < 0.0001) IPV were greater in women with compared with without ALs. A similar pattern was seen for men, with greater rates of physical (9.2% versus 6.6%; p = 0.006), emotional (22.6% versus 18.2%; p = 0.002), and financial (2.6% versus 1.4%; p = 0.005) IPV in men with ALs than men without ALs. Risk factors for IPV included younger age, being divorced/separated or single, and having lower income and poorer health. Women with ALs were more likely than men to experience any IPV (29.1% versus 24.9%) and more severe and more incidents of IPV. In multivariable analysis, women were no longer at greater risk for "any IPV" after adjusting for sociodemographic variables (odds ratio = 1.09; 95% confidence interval, 0.88-1.36). This is the first study to document IPV rates in men with ALs. Women with ALs were more likely to be divorced/separated, living in poverty, and in poorer health than men with ALs. These factors accounted for sex differences in IPV rates.

  16. Synergistic use of compound properties and docking scores in neural network modeling of CYP2D6 binding: predicting affinity and conformational sampling.

    PubMed

    Bazeley, Peter S; Prithivi, Sridevi; Struble, Craig A; Povinelli, Richard J; Sem, Daniel S

    2006-01-01

    Cytochrome P450 2D6 (CYP2D6) is used to develop an approach for predicting affinity and relevant binding conformation(s) for highly flexible binding sites. The approach combines the use of docking scores and compound properties as attributes in building a neural network (NN) model. It begins by identifying segments of CYP2D6 that are important for binding specificity, based on structural variability among diverse CYP enzymes. A family of distinct, low-energy conformations of CYP2D6 are generated using simulated annealing (SA) and a collection of 82 compounds with known CYP2D6 affinities are docked. Interestingly, docking poses are observed on the backside of the heme as well as in the known active site. Docking scores for the active site binders, along with compound-specific attributes, are used to train a neural network model to properly bin compounds as strong binders, moderate binders, or nonbinders. Attribute selection is used to preselect the most important scores and compound-specific attributes for the model. A prediction accuracy of 85+/-6% is achieved. Dominant attributes include docking scores for three of the 20 conformations in the ensemble as well as the compound's formal charge, number of aromatic rings, and AlogP. Although compound properties were highly predictive attributes (12% improvement over baseline) in the NN-based prediction of CYP2D6 binders, their combined use with docking score attributes is synergistic (net increase of 23% above baseline). Beyond prediction of affinity, attribute selection provides a way to identify the most relevant protein conformation(s), in terms of binding competence. In the case of CYP2D6, three out of the ensemble of 20 SA-generated structures are found to be the most predictive for binding.

  17. Changes in HIV needs identified by the National AIDS Hotline of Trinidad and Tobago.

    PubMed

    Reid, Sandra D; Nielsen, Anders L; Reddock, Rhoda

    2010-02-01

    To examine utilization of the National AIDS Hotline of Trinidad and Tobago (AIDSLINE), evaluate its validity as a reliable data source for monitoring national HIV-related needs, and identify changes in caller requests between two different time periods. A total of 7 046 anonymous hotline calls in 1998-2002 (T1) and 2 338 calls in 2007 (T2) were analyzed for associations between caller characteristics and call content. A subsample of the data was also analyzed qualitatively. T1 findings were compared with HIV-related data collected by national policy-makers during that period, to evaluate the hotline's validity as a data source, and findings from T2, to reveal changes in call content over time. In T1, the hotline was well utilized for information and counseling by both the general population and those living with HIV/AIDS. Call content from T2 indicated an increase versus T1 in 1) general awareness of HIV and other sexually transmitted diseases; 2) HIV testing; and 3) knowledge of HIV symptoms and transmission. HIV-related mental health needs, and the relationship between HIV and both child sexual abuse (CSA) and intimate partner violence (IPV), were identified as emerging issues. AIDSLINE is a well-utilized tool for providing information and counseling on national HIV-related issues, and a valid, cost-effective, easily accessed information source for planners and policy-makers involved in HIV management. Over the two study periods, there was an increase in HIV awareness and testing and in requests related to mental health, CSA, and IPV, but no change in sexual behaviors.

  18. Relation of Childhood Sexual Abuse, Intimate Partner Violence, and Depression to Risk Factors for HIV Among Black Men Who Have Sex With Men in 6 US Cities

    PubMed Central

    Wilton, Leo; Magnus, Manya; Wang, Lei; Wang, Jing; Dyer, Typhanye Penniman; Koblin, Beryl A.; Hucks-Ortiz, Christopher; Fields, Sheldon D.; Shoptaw, Steve; Stephenson, Rob; O’Cleirigh, Conall; Cummings, Vanessa

    2015-01-01

    Objectives. We assessed the relation of childhood sexual abuse (CSA), intimate partner violence (IPV), and depression to HIV sexual risk behaviors among Black men who have sex with men (MSM). Methods. Participants were 1522 Black MSM recruited from 6 US cities between July 2009 and December 2011. Univariate and multivariable logistic regression models were used. Results. Participants reported sex before age 12 years with someone at least 5 years older (31.1%), unwanted sex when aged 12 to 16 years (30%), IPV (51.8%), and depression (43.8%). Experiencing CSA when aged 12 to 16 years was inversely associated with any receptive condomless anal sex with a male partner (adjusted odds ratio [AOR] = 0.50; 95% confidence interval [CI] = 0.29, 0.86). Pressured or forced sex was positively associated with any receptive anal sex (AOR = 2.24; 95% CI = 1.57, 3.20). Experiencing CSA when younger than 12 years, physical abuse, emotional abuse, having been stalked, and pressured or forced sex were positively associated with having more than 3 male partners in the past 6 months. Among HIV-positive MSM (n = 337), CSA between ages 12 and 16 years was positively associated with having more than 3 male partners in the past 6 months. Conclusions. Rates of CSA, IPV, and depression were high, but associations with HIV sexual risk outcomes were modest. PMID:26469666

  19. Intimate partner violence among pregnant women in Rwanda

    PubMed Central

    Ntaganira, Joseph; Muula, Adamson S; Masaisa, Florence; Dusabeyezu, Fidens; Siziya, Seter; Rudatsikira, Emmanuel

    2008-01-01

    Background Intimate partner violence (IPV), defined as actual or threatened physical, sexual, psychological, and emotional abuse by current or former partners is a global public health concern. The prevalence and determinants of intimate partner violence (IPV) against pregnant women has not been described in Rwanda. A study was conducted to identify variables associated with IPV among Rwandan pregnant women. Methods A convenient sample of 600 pregnant women attending antenatal clinics were administered a questionnaire which included items on demographics, HIV status, IPV, and alcohol use by the male partner. Mean age and proportions of IPV in different groups were assessed. Odds of IPV were estimated using logistic regression analysis. Results Of the 600 respondents, 35.1% reported IPV in the last 12 months. HIV+ pregnant women had higher rates of all forms of IVP violence than HIV- pregnant women: pulling hair (44.3% vs. 20.3%), slapping (32.0% vs. 15.3%), kicking with fists (36.3% vs. 19.7%), throwing to the ground and kicking with feet (23.3% vs. 12.7%), and burning with hot liquid (4.1% vs. 3.5%). HIV positive participants were more than twice likely to report physical IPV than those who were HIV negative (OR = 2.38; 95% CI [1.59, 3.57]). Other factors positively associated with physical IPV included sexual abuse before the age of 14 years (OR = 2.69; 95% CI [1.69, 4.29]), having an alcohol drinking male partner (OR = 4.10; 95% CI [2.48, 6.77] for occasional drinkers and OR = 3.37; 95% CI [2.05, 5.54] for heavy drinkers), and having a male partner with other sexual partners (OR = 1.53; 95% CI [1.15, 2.20]. Education was negatively associated with lifetime IPV. Conclusion We have reported on prevalence of IPV violence among pregnant women attending antenatal care in Rwanda, Central Africa. We advocate that screening for IPV be an integral part of HIV and AIDS care, as well as routine antenatal care. Services for battered women should also be made available. PMID

  20. Disparities in Exposure to Intimate Partner Violence Among Transgender/Gender Nonconforming and Sexual Minority Primary Care Patients.

    PubMed

    Valentine, Sarah E; Peitzmeier, Sarah M; King, Dana S; O'Cleirigh, Conall; Marquez, Samantha M; Presley, Cara; Potter, Jennifer

    2017-08-01

    We investigated the odds of intimate partner violence (IPV) among primary care patients across subgroups of transgender and gender nonconforming (TGNC) individuals relative to cisgender women, and cisgender sexual minority men and women relative to cisgender heterosexual men and women. Participants completed an IPV screener as part of routine primary care visits at an urban community health center (N = 7572). Electronic medical record data were pooled for all patients who received the IPV screener January 1 to December 31, 2014. Overall, 3.6% of the sample reported experiencing physical or sexual IPV in the past year. Compared to cisgender women (past-year prevalence 2.7%), all TGNC subgroups reported elevated odds of physical or sexual IPV, including transgender women (past-year prevalence 12.1%; adjusted odds ratio [AOR] = 5.0, 95% confidence interval [CI] = 2.9-8.6), transgender men (6.6%; AOR = 2.4, 95% CI: 1.2-4.6), gender non-binary individuals (8.2%, AOR = 3.1, 95% CI = 1.7-5.4), and TGNC individuals who did not report their gender identity (9.1%; AOR = 3.7, 95% CI = 2.2-6.3). The prevalence of isolation-related IPV and controlling behaviors was also high in some TGNC groups. Our findings support that IPV is prevalent across genders and sexual orientations. Clinical guidelines for IPV screening should be expanded to include TGNC individuals and not just cisgender women. Future research could explore the complex patterns by which individuals of different genders are at increased risk for different types of IPV, and investigate the best ways to screen TGNC patients and support TGNC survivors.

  1. The Feto-Maternal Health Cost of Intimate Partner Violence Among Delivery-Related Discharges in the United States, 2002-2009.

    PubMed

    Mogos, Mulubrhan F; Araya, Winta N; Masho, Saba W; Salemi, Jason L; Shieh, Carol; Salihu, Hamisu M

    2016-02-01

    Our purpose was to estimate the national prevalence of intimate partner violence (IPV) among delivery-related discharges and to investigate its association with adverse feto-maternal birth outcomes and delivery-related cost. A retrospective cross-sectional analysis of delivery-related hospital discharges from 2002 to 2009 was conducted using the Nationwide Inpatient Sample (NIS). We used ICD-9-CM codes to identify IPV, covariates, and outcomes. Multivariable logistic regression modeling was used to calculate adjusted odds ratios (OR) and 95% confidence intervals (CI) for the associations between IPV and each outcome. Joinpoint regression was used for trend analysis. During the study period, 3,649 delivery-related discharges were diagnosed with IPV (11.2 per 100,000; 95% CI = [10.0, 12.4]). IPV diagnosis during delivery is associated with stillbirth (AOR = 4.12, 95% CI = [2.75, 6.17]), preterm birth (AOR = 1.97, 95% CI = [1.59, 2.44]), fetal death (AOR = 3.34, 95% CI = [1.99, 5.61]), infant with poor intrauterine growth (AOR = 1.55, 95% CI = [1.01, 2.40]), and increased inpatient hospital care cost (US$5,438.2 vs. US$4,080.1) per each discharge, incurring an additional cost of US$4,955,707 during the study period. IPV occurring during pregnancy has a significant health burden to both the mother and infant. Education about IPV; screening at periodic intervals, including during obstetric visits; and ongoing clinical care could help to reduce or eliminate adverse effects of pregnancy-related IPV. Preventing the lifelong consequences associated with IPV can have a positive effect on the overall health of all women and delivery-related health care cost. © The Author(s) 2014.

  2. A network approach for identifying and delimiting biogeographical regions.

    PubMed

    Vilhena, Daril A; Antonelli, Alexandre

    2015-04-24

    Biogeographical regions (geographically distinct assemblages of species and communities) constitute a cornerstone for ecology, biogeography, evolution and conservation biology. Species turnover measures are often used to quantify spatial biodiversity patterns, but algorithms based on similarity can be sensitive to common sampling biases in species distribution data. Here we apply a community detection approach from network theory that incorporates complex, higher-order presence-absence patterns. We demonstrate the performance of the method by applying it to all amphibian species in the world (c. 6,100 species), all vascular plant species of the USA (c. 17,600) and a hypothetical data set containing a zone of biotic transition. In comparison with current methods, our approach tackles the challenges posed by transition zones and succeeds in retrieving a larger number of commonly recognized biogeographical regions. This method can be applied to generate objective, data-derived identification and delimitation of the world's biogeographical regions.

  3. A Security Strategy for Cyber Threats on Neighbor Discovery in 6Lowpan Networks

    DTIC Science & Technology

    2017-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. A SECURITY...STRATEGY FOR CYBER THREATS ON NEIGHBOR DISCOVERY IN 6LOWPAN NETWORKS by Cheng Hai Ang December 2017 Thesis Advisor: Preetha Thulasiraman...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE A SECURITY STRATEGY FOR CYBER THREATS ON NEIGHBOR DISCOVERY IN 6LOWPAN

  4. Long life 80Ah standard IPV NiH2 battery cell

    NASA Technical Reports Server (NTRS)

    Armantrout, Jon D.; Waller, J. S.

    1995-01-01

    A standard Nickel-Hydrogen (NiH2) Individual Pressure Vessel (IPV) battery cell is needed to meet future low cost, high performance mission requirements for NASA, military, and civil space programs. A common or standard cell design has evolved from the heritage of HST, Milstar, and other Air Force Mantech cell designs with substantial flight experience, while incorporating some of the historical COMSAT cell design features described in a previous NASA publication. Key features include slurry process nickel electrodes having high strength, long life and high yield (lower cost), and dual layer zircar separators for improved KOH retention, uniformality, and longer life. The cell design will have a zirconium oxide wall wick inside the pressure vessel to redistribute electrolyte and extend life. The slurry electrode will be 35 mils thick to take advantage of qualified cell mechanical configurations and proven assembly and activation techniques developed by Eagle Picher Industries (EPI) for the Hubble Space Telescope (HST) RNH-90-3 and 'Generic HST' RNH-90-5 cell designs with back-to-back nickel electrodes produced by the dry sinter process. The 80Ah common cell design can be scaled to meet capacity requirements from 60Ah to 100Ah. Producibility, commonality, and long life performance will be enhanced with the robust cell design described herein.

  5. Intimate Partner Violence Programs in a Children's Hospital: Comprehensive Assessment Utilizing a Delphi Instrument.

    PubMed

    Randell, Kimberly A; Evans, Sarah E; O'Malley, Donna; Dowd, M Denise

    2015-03-01

    The purpose of this study was to conduct a baseline assessment of intimate partner violence (IPV) practices in a pediatric hospital system. The Delphi Instrument for Hospital-based Domestic Violence Programs was used to assess the structure and components of the hospital system's IPV practices. Through key stakeholder interviews, we also assessed IPV practices in individual patient care areas. Qualitative analysis of interview data used a grounded theory approach. The hospital scored 17 of 100 points on the Delphi instrument assessment. Key areas of weakness identified by the Delphi instrument and interviews included lack of coordinated provider training and evaluation of IPV-related processes and no standards for IPV screening, safety assessment, and documentation. Most interviewees supported addressing IPV; all identified barriers to IPV screening at individual provider and institutional levels. Institutional barriers included lack of a standardized response to IPV disclosure, need for individualized screening protocols for different patient care settings, lack of standardized provider training, concerns about overextending social work resources, and lack of resources for hospital staff experiencing vicarious trauma. Individual barriers included concern that screening may harm physician-patient-family relationships and the perception that physicians are unwilling to address psychosocial issues. The Delphi Instrument for Hospital-based Domestic Violence Programs identified weaknesses and key areas for improvement in IPV practices. Deficiencies revealed by the Delphi instrument were affirmed by individual interview results. Institutional and individual provider level barriers must be addressed to optimize IPV practices in a pediatric hospital system. Copyright © 2015 by the American Academy of Pediatrics.

  6. Characteristics of Intimate Partner Violence Incidents and the Environments in Which They Occur: Victim Reports to Responding Law Enforcement Officers.

    PubMed

    Campbell, Andrew M; Hicks, Ralph A; Thompson, Shannon L; Wiehe, Sarah E

    2017-04-01

    The objectives of this study were to identify intimate partner violence (IPV) incidence rates, to quantify specific risks and characteristics of these incidents and the environments in which they occur, to identify how often children are present for or injured during these incidents, and to identify differences in victim reports of IPV to law enforcement officers at the scene of the incident compared with previously published reports of IPV from retropsective, anonymous surveys and domestic violence shelter interviews. Data gathered by responding law enforcement officers at the scene of the IPV incident were used to determine the prevalence of IPV incident characteristics and outcomes. Females aged 20 to 39 years, unmarried adults, and African Americans were disproportionately represented as victims of IPV in this study. IPV incidents were significantly more likely to occur on Saturdays and Sundays and during the months of May through August. Relationship durations for suspect-victim pairs were most often less than 12 months at the time of the incident. Weapon use and/or strangulation was common, occurring in 44% of all incidents. Minors (under age 18 years) were frequently present in the home during the IPV incident or a member of the household (59%). This study provides a unique perspective of IPV by utilizing data collected directly from the scene of the incident by first responders. Previously published characteristics of IPV were confirmed, but this study also brings to light new and critical information concerning this prevalent form of violence. Study findings relating to incidence, seasonality, severity, disproportionately affected populations, and child exposure are discussed.

  7. Identifying and ranking influential spreaders in complex networks by combining a local-degree sum and the clustering coefficient

    NASA Astrophysics Data System (ADS)

    Li, Mengtian; Zhang, Ruisheng; Hu, Rongjing; Yang, Fan; Yao, Yabing; Yuan, Yongna

    2018-03-01

    Identifying influential spreaders is a crucial problem that can help authorities to control the spreading process in complex networks. Based on the classical degree centrality (DC), several improved measures have been presented. However, these measures cannot rank spreaders accurately. In this paper, we first calculate the sum of the degrees of the nearest neighbors of a given node, and based on the calculated sum, a novel centrality named clustered local-degree (CLD) is proposed, which combines the sum and the clustering coefficients of nodes to rank spreaders. By assuming that the spreading process in networks follows the susceptible-infectious-recovered (SIR) model, we perform extensive simulations on a series of real networks to compare the performances between the CLD centrality and other six measures. The results show that the CLD centrality has a competitive performance in distinguishing the spreading ability of nodes, and exposes the best performance to identify influential spreaders accurately.

  8. Social network characteristics and HIV vulnerability among transgender persons in San Salvador: identifying opportunities for HIV prevention strategies.

    PubMed

    Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz

    2012-01-01

    The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.

  9. Social Network Characteristics and HIV Vulnerability Among Transgender Persons in San Salvador: Identifying Opportunities for HIV Prevention Strategies

    PubMed Central

    Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz

    2013-01-01

    The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents’ social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population. PMID:21538082

  10. Contextual Hub Analysis Tool (CHAT): A Cytoscape app for identifying contextually relevant hubs in biological networks.

    PubMed

    Muetze, Tanja; Goenawan, Ivan H; Wiencko, Heather L; Bernal-Llinares, Manuel; Bryan, Kenneth; Lynn, David J

    2016-01-01

    Highly connected nodes (hubs) in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT), which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed) than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest. CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store ( http://apps.cytoscape.org/apps/chat).

  11. Microarray analysis and scale-free gene networks identify candidate regulators in drought-stressed roots of loblolly pine (P. taeda L.)

    PubMed Central

    2011-01-01

    Background Global transcriptional analysis of loblolly pine (Pinus taeda L.) is challenging due to limited molecular tools. PtGen2, a 26,496 feature cDNA microarray, was fabricated and used to assess drought-induced gene expression in loblolly pine propagule roots. Statistical analysis of differential expression and weighted gene correlation network analysis were used to identify drought-responsive genes and further characterize the molecular basis of drought tolerance in loblolly pine. Results Microarrays were used to interrogate root cDNA populations obtained from 12 genotype × treatment combinations (four genotypes, three watering regimes). Comparison of drought-stressed roots with roots from the control treatment identified 2445 genes displaying at least a 1.5-fold expression difference (false discovery rate = 0.01). Genes commonly associated with drought response in pine and other plant species, as well as a number of abiotic and biotic stress-related genes, were up-regulated in drought-stressed roots. Only 76 genes were identified as differentially expressed in drought-recovered roots, indicating that the transcript population can return to the pre-drought state within 48 hours. Gene correlation analysis predicts a scale-free network topology and identifies eleven co-expression modules that ranged in size from 34 to 938 members. Network topological parameters identified a number of central nodes (hubs) including those with significant homology (E-values ≤ 2 × 10-30) to 9-cis-epoxycarotenoid dioxygenase, zeatin O-glucosyltransferase, and ABA-responsive protein. Identified hubs also include genes that have been associated previously with osmotic stress, phytohormones, enzymes that detoxify reactive oxygen species, and several genes of unknown function. Conclusion PtGen2 was used to evaluate transcriptome responses in loblolly pine and was leveraged to identify 2445 differentially expressed genes responding to severe drought stress in roots. Many of the

  12. High-frequency intimate partner violence during pregnancy, postnatal depression and suicidal tendencies in Harare, Zimbabwe.

    PubMed

    Shamu, Simukai; Zarowsky, Christina; Roelens, Kristien; Temmerman, Marleen; Abrahams, Naeemah

    2016-01-01

    Intimate partner violence (IPV) is a common form of violence experienced by pregnant women and is believed to have adverse mental health effects postnatally. This study investigated the association of postnatal depression (PND) and suicidal ideation with emotional, physical and sexual IPV experienced by women during pregnancy. Data were collected from 842 women interviewed postnatally in six postnatal clinics in Harare, Zimbabwe. We used the World Health Organization versions of IPV and Centre for Epidemiological Studies - Depression Scale measures to assess IPV and PND respectively. We derived a violence severity variable and combined forms of IPV variables from IPV questions. Logistic regression was used to analyse data whilst controlling for past mental health and IPV experiences. One in five women [21.4% (95% CI 18.6-24.2)] met the diagnostic criteria for PND symptomatology whilst 21.6% (95% CI 18.8-24.4) reported postpartum suicide thoughts and 4% (95% CI 2.7-5.4) reported suicide attempts. Two thirds (65.4%) reported any form of IPV. Although individual forms of severe IPV were associated with PND, stronger associations were found between PND and severe emotional IPV or severe combined forms of IPV. Suicidal ideation was associated with emotional IPV. Other forms of IPV, except when combined with emotional IPV, were not individually associated with suicidal ideation. Emotional IPV during pregnancy negatively affects women's mental health in the postnatal period. Clinicians and researchers should include it in their conceptualisation of violence and health. Further research must look at possible indirect relationships between sexual and physical IPV on mental health. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. G6PD/PK ratio: a reliable parameter to identify glucose-6-phosphate dehydrogenase deficiency associated with microcytic anemia in heterozygous subjects.

    PubMed

    Tagarelli, Antonio; Piro, Anna; Tagarelli, Giuseppe; Bastone, Loredana; Paleari, Renata; Mosca, Andrea

    2004-10-01

    To determine if measuring the ratio of glucose-6-phosphate dehydrogenase (G6PD) to pyruvate kinase (PK) is more reliable than only measuring G6PD activity to identify heterozygous G6PD- individuals with associated microcytic anemia in the Calabrian population, which shows high frequencies of both the thalassaemia (thal) trait and G6PD deficiency. Measurement of G6PD and PK activities was carried out on 205 samples of whole blood from Calabrian subjects of both sexes (age range 10-50 years) using a double starter differential pH-metry technique. The G6PD/PK ratio is able to differentiate G6PD- heterozygous individuals from the normal population. G6PD/PK values also allowed us to easily identify the G6PD- heterozygous subjects with microcytic anaemia. Student's t test shows that G6PD/PK ratio is more reliable in both sample groups, relative to G6PD activity in normal subjects. G6PD/PK ratio is a reliable diagnostic parameter for mass screening for G6PD deficiency.

  14. Sex Venue-Based Network Analysis to Identify HIV Prevention Dissemination Targets for Men Who Have Sex with Men.

    PubMed

    Patel, Rupa R; Luke, Douglas A; Proctor, Enola K; Powderly, William G; Chan, Philip A; Mayer, Kenneth H; Harrison, Laura C; Dhand, Amar

    2018-01-01

    The aim of this study was to identify sex venue-based networks among men who have sex with men (MSM) to inform HIV preexposure prophylaxis (PrEP) dissemination efforts. Using a cross-sectional design, we interviewed MSM about the venues where their recent sexual partners were found. Venues were organized into network matrices grouped by condom use and race. We examined network structure, central venues, and network subgroups. Among 49 participants, the median age was 27 years, 49% were Black and 86% reported condomless anal sex (ncAS). Analysis revealed a map of 54 virtual and physical venues with an overlap in the ncAS and with condom anal sex (cAS) venues. In the ncAS network, virtual and physical locations were more interconnected. The ncAS venues reported by Blacks were more diffusely organized than those reported by Whites. The network structures of sex venues for at-risk MSM differed by race. Network information can enhance HIV prevention dissemination efforts among subpopulations, including PrEP implementation.

  15. Sex Venue-Based Network Analysis to Identify HIV Prevention Dissemination Targets for Men Who Have Sex with Men

    PubMed Central

    Luke, Douglas A.; Proctor, Enola K.; Powderly, William G.; Chan, Philip A.; Mayer, Kenneth H.; Harrison, Laura C.; Dhand, Amar

    2018-01-01

    Abstract Purpose: The aim of this study was to identify sex venue-based networks among men who have sex with men (MSM) to inform HIV preexposure prophylaxis (PrEP) dissemination efforts. Methods: Using a cross-sectional design, we interviewed MSM about the venues where their recent sexual partners were found. Venues were organized into network matrices grouped by condom use and race. We examined network structure, central venues, and network subgroups. Results: Among 49 participants, the median age was 27 years, 49% were Black and 86% reported condomless anal sex (ncAS). Analysis revealed a map of 54 virtual and physical venues with an overlap in the ncAS and with condom anal sex (cAS) venues. In the ncAS network, virtual and physical locations were more interconnected. The ncAS venues reported by Blacks were more diffusely organized than those reported by Whites. Conclusion: The network structures of sex venues for at-risk MSM differed by race. Network information can enhance HIV prevention dissemination efforts among subpopulations, including PrEP implementation. PMID:29324178

  16. Impact of Intimate Partner Violence on Infant Temperament.

    PubMed

    Edhborg, Maigun; E-Nasreen, Hashima; Kabir, Zarina Nahar

    2017-06-01

    Intimate partner violence (IPV) during the first year postpartum is common in Bangladesh, and many infants are exposed to hostile and aggressive environment. The aim of the current study was to investigate how IPV (physical, emotional, and sexual) impacts on the mother's perception of her infant's temperament 6 to 8 months postpartum, and whether maternal depressive symptom at 6 to 8 months postpartum is a mediator in this association. A total of 656 rural Bangladeshi women and their children 6 to 8 months postpartum were included in this study. Data were collected by structured interviews. The women were asked about physical, sexual, and emotional IPV; depressive symptoms (Edinburgh Postnatal Depressive Symptoms [EPDS]); and their perception of infant temperament assessed by the Infant Characteristic Questionnaire (ICQ). Descriptive analyses were conducted for prevalence of IPV and maternal depressive symptoms. Mediation analysis was conducted with a series of linear regressions with types of IPV as independent variables, ICQ including its subscales as dependent variables and maternal depressive symptoms as potential mediator. All the analyses were adjusted for the woman's and her husband's ages and number of children of the couple. Nearly 90% of the mothers reported some kind of IPV at 6 to 8 months postpartum. All types of IPV were directly associated with the mother's perception of her infant as unadaptable. Maternal depressive symptom was a mediating factor between physical IPV and the ICQ subscales fussy-difficult and unpredictable. In addition, depressive symptoms mediated between sexual and emotional IPV, and the mother's perception of the infant as unpredictable. The results showed that IPV influenced how mothers perceived their infant's temperament. It is important that health care professionals at maternal and child health services enquire about IPV with possibilities to refer the family or the mother and infant for appropriate support.

  17. Prevalence of Intimate Partner Violence among Women Veterans who Utilize Veterans Health Administration Primary Care.

    PubMed

    Kimerling, Rachel; Iverson, Katherine M; Dichter, Melissa E; Rodriguez, Allison L; Wong, Ava; Pavao, Joanne

    2016-08-01

    The objectives of this study were to identify the prevalence of past-year intimate partner violence (IPV) among women Veterans utilizing Veterans Health Administration (VHA) primary care, and to document associated demographic, military, and primary care characteristics. This was a retrospective cohort design, where participants completed a telephone survey in 2012 (84% participation rate); responses were linked to VHA administrative data for utilization in the year prior to the survey. A national stratified random sample of 6,287 women Veteran VHA primary care users participated in the study. Past-year IPV was assessed using the HARK screening tool. Self-report items and scales assessed demographic and military characteristics. Primary care characteristics were assessed via self-report and VHA administrative data. The prevalence of past-year IPV among women Veterans was 18.5% (se = 0.5%), with higher rates (22.2% - 25.5%) among women up to age 55. Other demographic correlates included indicators of economic hardship, lesbian or bisexual orientation, and being a parent/guardian of a child less than 18 years old. Military correlates included service during Vietnam to post-Vietnam eras, less than 10 years of service, and experiences of Military Sexual Trauma (MST). Most (77.3%, se = 1.2%) women who experienced IPV identified a VHA provider as their usual provider. Compared with women who did not report past-year IPV, women who reported IPV had more primary care visits, yet experienced lower continuity of care across providers. The high prevalence of past-year IPV among women beyond childbearing years, the majority of whom primarily rely on VHA as a source of health care, reinforces the importance of screening all women for IPV in VHA primary care settings. Key considerations for service implementation include sensitivity with respect to sexual orientation, race/ethnicity, and other aspects of diversity, as well as care coordination and linkages with social

  18. An inter-residue network model to identify mutational-constrained regions on the Ebola coat glycoprotein

    PubMed Central

    Quinlan, Devin S.; Raman, Rahul; Tharakaraman, Kannan; Subramanian, Vidya; del Hierro, Gabriella; Sasisekharan, Ram

    2017-01-01

    Recently, progress has been made in the development of vaccines and monoclonal antibody cocktails that target the Ebola coat glycoprotein (GP). Based on the mutation rates for Ebola virus given its natural sequence evolution, these treatment strategies are likely to impose additional selection pressure to drive acquisition of mutations in GP that escape neutralization. Given the high degree of sequence conservation among GP of Ebola viruses, it would be challenging to determine the propensity of acquiring mutations in response to vaccine or treatment with one or a cocktail of monoclonal antibodies. In this study, we analyzed the mutability of each residue using an approach that captures the structural constraints on mutability based on the extent of its inter-residue interaction network within the three-dimensional structure of the trimeric GP. This analysis showed two distinct clusters of highly networked residues along the GP1-GP2 interface, part of which overlapped with epitope surfaces of known neutralizing antibodies. This network approach also permitted us to identify additional residues in the network of the known hotspot residues of different anti-Ebola antibodies that would impact antibody-epitope interactions. PMID:28397835

  19. Characteristics of household addresses that repeatedly contact 911 to report intimate partner violence.

    PubMed

    Houry, Debra; Parramore, Constance; Fayard, Gregory; Thorn, Jennifer; Heron, Sheryl; Kellermann, Arthur

    2004-06-01

    To determine whether households that generate several 911 calls differ in important ways from those that make a single call and to determine whether households that generate repeat 911 calls for intimate partner violence (IPV) experience more severe violence than those that do not. All cases of police-documented IPV were reviewed and linked with their respective 911 calls. Each incident report was reviewed to determine the relationship between the offender and victim, demographic characteristics of the offender and victim, weapon and substance involvement, prior incidents of IPV, and violence severity. Of the 1,505 IPV addresses identified during the 12-month study interval, 1,010 (67.1%) placed more than one phone call to report IPV. Sixty-nine percent of African American victims, 50.6% of white victims, and 36.8% of Hispanic victims were repeat callers (p < 0.001). There were no differences between addresses that generated repeat calls versus single calls with respect to offender alcohol or drug involvement, presence of children, victim age, or offender age. Sixty-seven percent of households with severe violence and 66.9% of households with minor violence generated repeat 911 calls (p = 0.98). Ethnic differences in 911 use for IPV exist between African Americans, whites, and Hispanics. However, unknown societal, economic, or cultural issues could have influenced this finding. Households that repeatedly contacted 911 during the study interval to report IPV were not more likely to experience severe violence than those that placed a single 911 call.

  20. Identifying Key Actors in Heterogeneous Networks

    DTIC Science & Technology

    2017-11-29

    analysis (SNA) and game theory (GT) to improve accuracy for detecting significant or “powerful” actors within a total actor space when both resource...coalesce in order to achieve a desired outcome. Cooperative game theory (CGT) models of coalition formation are based on two limiting assumptions: that...demonstration of a new approach for synthesizing social network analysis and game theory. The ultimate goal of this research agenda is to generalize

  1. Intimate partner violence trends in Brazil: data from two waves of the Brazilian National Alcohol and Drugs Survey.

    PubMed

    Ally, Elizabeth Z; Laranjeira, Ronaldo; Viana, Maria C; Pinsky, Ilana; Caetano, Raul; Mitsuhiro, Sandro; Madruga, Clarice S

    2016-01-01

    To compare intimate partner violence (IPV) prevalence rates in 2006 and 2012 in a nationally representative household sample in Brazil. The associations between IPV and substance use were also investigated. IPV was assessed using the Conflict Tactic Scale-R in two waves (2006/2012) of the Brazilian Alcohol and Drugs Survey. Weighted prevalence rates and adjusted logistic regression models were calculated. Prevalence rates of IPV victimization decreased significantly, especially among women (8.8 to 6.3%). The rates of IPV perpetration also decreased significantly (10.6 to 8.4% for the overall sample and 9.2 to 6.1% in men), as well as the rates of bidirectional violence (by individuals who were simultaneously victims and perpetrators of violence) (3.2 to 2.4% for the overall sample). Alcohol increased the likelihood of being a victim (odds ratio [OR] = 1.6) and perpetrator (OR = 2.4) of IPV. Use of illicit drugs increased up to 4.5 times the likelihood of being a perpetrator. In spite of the significant reduction in most types of IPV between 2006 and 2012, violence perpetrated by women was not significantly reduced, and the current national rates are still high. Further, this study suggests that use of alcohol and other psychoactive drugs plays a major role in IPV. Prevention initiatives must take drug misuse into consideration.

  2. Temporal network analysis identifies early physiological and transcriptomic indicators of mild drought in Brassica rapa

    PubMed Central

    Gehan, Malia A; Mockler, Todd C; Weinig, Cynthia; Ewers, Brent E

    2017-01-01

    The dynamics of local climates make development of agricultural strategies challenging. Yield improvement has progressed slowly, especially in drought-prone regions where annual crop production suffers from episodic aridity. Underlying drought responses are circadian and diel control of gene expression that regulate daily variations in metabolic and physiological pathways. To identify transcriptomic changes that occur in the crop Brassica rapa during initial perception of drought, we applied a co-expression network approach to associate rhythmic gene expression changes with physiological responses. Coupled analysis of transcriptome and physiological parameters over a two-day time course in control and drought-stressed plants provided temporal resolution necessary for correlation of network modules with dynamic changes in stomatal conductance, photosynthetic rate, and photosystem II efficiency. This approach enabled the identification of drought-responsive genes based on their differential rhythmic expression profiles in well-watered versus droughted networks and provided new insights into the dynamic physiological changes that occur during drought. PMID:28826479

  3. Genome wide association identifies common variants at the SERPINA6/SERPINA1 locus influencing plasma cortisol and corticosteroid binding globulin.

    PubMed

    Bolton, Jennifer L; Hayward, Caroline; Direk, Nese; Lewis, John G; Hammond, Geoffrey L; Hill, Lesley A; Anderson, Anna; Huffman, Jennifer; Wilson, James F; Campbell, Harry; Rudan, Igor; Wright, Alan; Hastie, Nicholas; Wild, Sarah H; Velders, Fleur P; Hofman, Albert; Uitterlinden, Andre G; Lahti, Jari; Räikkönen, Katri; Kajantie, Eero; Widen, Elisabeth; Palotie, Aarno; Eriksson, Johan G; Kaakinen, Marika; Järvelin, Marjo-Riitta; Timpson, Nicholas J; Davey Smith, George; Ring, Susan M; Evans, David M; St Pourcain, Beate; Tanaka, Toshiko; Milaneschi, Yuri; Bandinelli, Stefania; Ferrucci, Luigi; van der Harst, Pim; Rosmalen, Judith G M; Bakker, Stephen J L; Verweij, Niek; Dullaart, Robin P F; Mahajan, Anubha; Lindgren, Cecilia M; Morris, Andrew; Lind, Lars; Ingelsson, Erik; Anderson, Laura N; Pennell, Craig E; Lye, Stephen J; Matthews, Stephen G; Eriksson, Joel; Mellstrom, Dan; Ohlsson, Claes; Price, Jackie F; Strachan, Mark W J; Reynolds, Rebecca M; Tiemeier, Henning; Walker, Brian R

    2014-07-01

    Variation in plasma levels of cortisol, an essential hormone in the stress response, is associated in population-based studies with cardio-metabolic, inflammatory and neuro-cognitive traits and diseases. Heritability of plasma cortisol is estimated at 30-60% but no common genetic contribution has been identified. The CORtisol NETwork (CORNET) consortium undertook genome wide association meta-analysis for plasma cortisol in 12,597 Caucasian participants, replicated in 2,795 participants. The results indicate that <1% of variance in plasma cortisol is accounted for by genetic variation in a single region of chromosome 14. This locus spans SERPINA6, encoding corticosteroid binding globulin (CBG, the major cortisol-binding protein in plasma), and SERPINA1, encoding α1-antitrypsin (which inhibits cleavage of the reactive centre loop that releases cortisol from CBG). Three partially independent signals were identified within the region, represented by common SNPs; detailed biochemical investigation in a nested sub-cohort showed all these SNPs were associated with variation in total cortisol binding activity in plasma, but some variants influenced total CBG concentrations while the top hit (rs12589136) influenced the immunoreactivity of the reactive centre loop of CBG. Exome chip and 1000 Genomes imputation analysis of this locus in the CROATIA-Korcula cohort identified missense mutations in SERPINA6 and SERPINA1 that did not account for the effects of common variants. These findings reveal a novel common genetic source of variation in binding of cortisol by CBG, and reinforce the key role of CBG in determining plasma cortisol levels. In turn this genetic variation may contribute to cortisol-associated degenerative diseases.

  4. The deep space network, volume 6

    NASA Technical Reports Server (NTRS)

    1971-01-01

    Progress on Deep Space Network (DSN) supporting research and technology is presented, together with advanced development and engineering, implementation, and DSN operations of flight projects. The DSN is described. Interplanetary and planetary flight projects and radio science experiments are discussed. Tracking and navigational accuracy analysis, communications systems and elements research, and supporting research are considered. Development of the ground communications and deep space instrumentation facilities is also presented. Network allocation schedules and angle tracking and test development are included.

  5. Resource-constrained Data Collection and Fusion for Identifying Weak Distributed Patterns in Networks

    DTIC Science & Technology

    2013-10-15

    statistic,” in Artifical Intelligence and Statistics (AISTATS), 2013. [6] ——, “Detecting activity in graphs via the Graph Ellipsoid Scan Statistic... Artifical Intelligence and Statistics (AISTATS), 2013. [8] ——, “Near-optimal anomaly detection in graphs using Lovász Extended Scan Statistic,” in Neural...networks,” in Artificial Intelligence and Statistics (AISTATS), 2010. 11 [11] D. Aldous, “The random walk construction of uniform spanning trees and

  6. Determination of optimal cutoff value to accurately identify glucose-6-phosphate dehydrogenase-deficient heterozygous female neonates.

    PubMed

    Miao, Jing-Kun; Chen, Qi-Xiong; Bao, Li-Ming; Huang, Yi; Zhang, Juan; Wan, Ke-Xing; Yi, Jing; Wang, Shi-Yi; Zou, Lin; Li, Ting-Yu

    2013-09-23

    Conventional screening tests to assess G6PD deficiency use a low cutoff value of 2.10 U/gHb which may not be adequate for detecting females with heterozygous deficiency. The aim of present study was to determine an appropriate cutoff value with increased sensitivity in identifying G6PD-deficient heterozygous females. G6PD activity analysis was performed on 51,747 neonates using semi-quantitative fluorescent spot test. Neonates suspected with G6PD deficiency were further analyzed using quantitatively enzymatic assay and for common G6PD mutations. The cutoff values of G6PD activity were estimated using the receiver operating characteristic curve. Our results demonstrated that using 2.10 U/g Hb as a cutoff, the sensitivity of the assay to detect female neonates with G6PD heterozygous deficiency was 83.3%, as compared with 97.6% using 2.55 U/g Hb as a cutoff. The high cutoff identified 21% (8/38) of the female neonates with partial G6PD deficiency which were not detected with 2.10 U/g Hb. Our study found that high cutoffs, 2.35 and 2.55 U/g Hb, would increase assay's sensitivity to identify male and female G6PD deficiency neonates, respectively. We established a reliable cutoff value of G6PD activity with increased sensitivity in identifying female newborns with partial G6PD deficiency. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. Pre- and postnatal exposure to intimate partner violence among South African HIV-infected mothers and infant developmental functioning at 12 months of age.

    PubMed

    Rodriguez, Violeta J; Peltzer, Karl; Matseke, Gladys; Weiss, Stephen M; Shine, Agnes; Jones, Deborah L

    2018-05-23

    In rural South Africa, pregnant HIV-infected women report high rates of psychological (55%) and physical (20%) intimate partner violence (IPV). IPV increases the risk of infant developmental delays. Such delays may have negative socioemotional and cognitive outcomes throughout the lifespan. This paper assesses the relationship between IPV and infant development in rural South Africa. The present investigation was a cross-sectional add-on follow-up designed retrospectively. A randomly selected sub-sample of mothers from the main randomized controlled trial (n = 72) were asked to participate with their infants at 12 months of age; all women invited agreed to participate. Women were 18.35 ± 5.47 weeks pregnant; demographics, HIV disclosure status, and pre- and postnatal IPV measured via the Conflict Tactics Scale during pregnancy at baseline and 12 months post-partum were assessed. Infant HIV serostatus and developmental functioning at 12 months of age were assessed. Women were a mean age of 29 ± 2 years. One third had completed at least 12 years of education and had a monthly income of ~ US$76. At 12 months post-partum, 6% of infants tested HIV seropositive. Postnatal physical IPV was associated with delays in cognitive and receptive language development p < 0.05, but only in unadjusted analyses. This study identified an association between early IPV exposure and infant cognitive and receptive communication delays. Given the small sample size, findings support replication. Longitudinal studies are needed to confirm temporal order and identify appropriate timing for interventions in HIV-exposed infants.

  8. Safety and reactogenicity of the combined diphtheria-tetanus-acellular pertussis-inactivated poliovirus-Haemophilus influenzae type b (DTPa-IPV/Hib) vaccine in healthy Vietnamese toddlers: An open-label, phase III study.

    PubMed

    Anh, Dang Duc; Van Der Meeren, Olivier; Karkada, Naveen; Assudani, Deepak; Yu, Ta-Wen; Han, Htay Htay

    2016-03-03

    The introduction of combination vaccines plays a significant role in increasing vaccine acceptance and widening vaccine coverage. Primary vaccination against diphtheria, tetanus, pertussis, poliomyelitis and Haemophilus influenza type b (Hib) diseases has been implemented in Vietnam. In this study we evaluated the safety and reactogenicity of combined diphtheria-tetanus-pertussis-inactivated polio (DTPa-IPV)/Hib vaccine when administered as a booster dose in 300 healthy Vietnamese children <2 years of age (mean age: 15.8 months). During the 4-day follow-up period, pain (31.7%) and redness (27.3%) were the most frequent solicited local symptoms. Pain (2%) was also the most frequent grade 3 local symptom. One subject reported 2 serious adverse events that were not causally related to the study vaccine. DTPa-IPV/Hib conjugate vaccine was well tolerated as a booster dose in healthy Vietnamese children aged <2 years.

  9. NetCoffee: a fast and accurate global alignment approach to identify functionally conserved proteins in multiple networks.

    PubMed

    Hu, Jialu; Kehr, Birte; Reinert, Knut

    2014-02-15

    Owing to recent advancements in high-throughput technologies, protein-protein interaction networks of more and more species become available in public databases. The question of how to identify functionally conserved proteins across species attracts a lot of attention in computational biology. Network alignments provide a systematic way to solve this problem. However, most existing alignment tools encounter limitations in tackling this problem. Therefore, the demand for faster and more efficient alignment tools is growing. We present a fast and accurate algorithm, NetCoffee, which allows to find a global alignment of multiple protein-protein interaction networks. NetCoffee searches for a global alignment by maximizing a target function using simulated annealing on a set of weighted bipartite graphs that are constructed using a triplet approach similar to T-Coffee. To assess its performance, NetCoffee was applied to four real datasets. Our results suggest that NetCoffee remedies several limitations of previous algorithms, outperforms all existing alignment tools in terms of speed and nevertheless identifies biologically meaningful alignments. The source code and data are freely available for download under the GNU GPL v3 license at https://code.google.com/p/netcoffee/.

  10. Emergency seismic and CGPS networks: a first employment for the L'Aquila Mw 6.3 earthquake

    NASA Astrophysics Data System (ADS)

    Abruzzese, L.; Avallone, A.; Cecere, G.; Cattaneo, M.; Cardinale, V.; Castagnozzi, A.; Cogliano, R.; Criscuoli, F.; D'Agostino, N.; D'Ambrosio, C.; de Luca, G.; D'Anastasio, E.; Falco, L.; Flammia, V.; Migliari, F.; Minichiello, F.; Memmolo, A.; Monachesi, G.; Moschillo, R.; Pignone, M.; Pucillo, S.; Selvaggi, G.; Zarrilli, L.; Delladio, A.; Govoni, A.; Franceschi, D.; de Martin, M.; Moretti, M.

    2009-12-01

    During the last 2 years, the Istituto Nazionale di Geofisica e Vulcanologia (INGV) developed an important real-time temporary seismic network infrastructure in order to densify the Italian National Seismic Network in epicentral areas thus enhancing the localization of the micro-seismicity after main earthquake events. This real-time temporary seismic network is constituted by various mobile and autonomous seismic stations that in group of three are telemetered to a Very Small Aperture Terminal (VSAT). This system uses a dedicated bandwidth on UHF, Wi-Fi and satellite frequency that allows the data flow in real-time at INGV centre in Rome (and Grottaminarda as backup center). The deployment of the seismic network is managed in a geographical information systems (GIS) by particular scenarios that visualizes, for the epicentral area, information about instrumental seismicity, seismic risk, macroseismic felts and territorial data. Starting from digital terrain model, the surface spatial analysis (Viewshed, Observer Point) allows the geographic arrangement of the stations and relative scenarios. The April, 6th, 2009 Mw 6.3 L'Aquila destructive earthquake represented the first real-case to test the entire emergency seismic network infrastructure. Less than 6 hours after the earthquake occurrence, a first accelerometer station was already sending data at INGV seismic monitoring headquarters. A total number of 9 seismic stations have been installed within 3 days after the earthquake. Furthermore, 5 permanent GPS stations have been installed in the epicentral area within 1 to 9 days after the main shock to detect the post-seismic deformation induced by the earthquake. We will show and describe the details of the Emergency Seismic Network infrastructure, and the first results from the collected data.

  11. [Health status and intimate partner violence].

    PubMed

    Sanz-Barbero, Belén; Rey, Lourdes; Otero-García, Laura

    2014-01-01

    To describe the prevalence of intimate partner violence (IPV) in Spain in the last year and at some point during the lifetime, to determine health status in women according to whether they had experienced IPV or not, and to analyze the individual variables associated with IPV in Spain. A cross-sectional study was performed of the database, Macrosurvey on Gender Violence in Spain 2011. This database includes data on 7,898 women older than 18 years old. The dependent variables were IPV-last year, IPV-ever in life. Covariates consisted of sociodemographic characteristics, socioeconomic status, maternal experience of IPV, social support, and self-care. The measure of association used was the OR with its 95% confidence interval (95% CI). A total of 3.6% of women had experienced IPV-last year and 12.2% ever in life. Female victims of IPV had poorer health than women who had not experienced IPV. Immigrant women living in Spain for 6 years or more were more likely to experience IPV-ever in life than Spanish women [OR (95% CI): 1.95 (1.50, 2.53)]. An interaction was found between nationality and the existence of children under 18 years old. Among women with children under 18 years old, immigrant women were more likely to experience IPV-last year than Spanish women [OR (95% CI): 1.99 (1.25, 3.17)]. Other variables associated with IPV were age, low socioeconomic status, low social support and having a mother who had experienced IPV. In Spain, some women have a higher probability of experiencing IPV. The variables associated with greater vulnerability to IPV should be taken into account when implementing measures to prevent or alleviate IPV. Copyright © 2013 SESPAS. Published by Elsevier Espana. All rights reserved.

  12. Identifying Functional Mechanisms of Gene and Protein Regulatory Networks in Response to a Broader Range of Environmental Stresses

    PubMed Central

    Li, Cheng-Wei; Chen, Bor-Sen

    2010-01-01

    Cellular responses to sudden environmental stresses or physiological changes provide living organisms with the opportunity for final survival and further development. Therefore, it is an important topic to understand protective mechanisms against environmental stresses from the viewpoint of gene and protein networks. We propose two coupled nonlinear stochastic dynamic models to reconstruct stress-activated gene and protein regulatory networks via microarray data in response to environmental stresses. According to the reconstructed gene/protein networks, some possible mutual interactions, feedforward and feedback loops are found for accelerating response and filtering noises in these signaling pathways. A bow-tie core network is also identified to coordinate mutual interactions and feedforward loops, feedback inhibitions, feedback activations, and cross talks to cope efficiently with a broader range of environmental stresses with limited proteins and pathways. PMID:20454442

  13. Intimate partner violence and repeat induced abortion in Italy: A cross sectional study.

    PubMed

    Citernesi, Angela; Dubini, Valeria; Uglietti, Anna; Ricci, Elena; Cipriani, Sonia; Parazzini, Fabio

    2015-01-01

    To investigate the impact of intimate partner violence (IPV) on the risk of repeat induced abortion (RIA), we compared IPV history among women with and without previous induced abortion (IA). All consecutive women aged 18 years or more requiring IA in 12 Italian abortion clinics were eligible for inclusion in the study. They were asked to fill in an anonymous, self-developed questionnaire assessing sociodemographic data and their history of different types of violence and related risk factors. The analysis included 1030 women, 624 (60.6%) of whom reported a previous IA. Past or current IPV was reported by 19.3%: 7.0% reported sexual violence, 11.3% physical abuse and 12.1% psychological abuse. Past or current IPV was reported by 22.3% of women with RIA and 14.8% of those undergoing their first IA (adjusted odds ratio 1.57, 95% confidence interval 1.07-2.30; p = 0.02). When we considered sexual, psychological and physical abuse separately, we found that any kind of abuse was more frequent in women with RIA than in women with no previous IA. This study underlines the impact of IPV on the risk of RIA and suggests the need for screening for IPV among women requiring abortion, in order to identify women at risk of RIA and to improve their general and reproductive health.

  14. High Intrapatient Variability of Tacrolimus Exposure in the Early Period After Liver Transplantation Is Associated With Poorer Outcomes.

    PubMed

    Rayar, Michel; Tron, Camille; Jézéquel, Caroline; Beaurepaire, Jean Marie; Petitcollin, Antoine; Houssel-Debry, Pauline; Camus, Christophe; Verdier, Marie Clémence; Dehlawi, Ammar; Lakéhal, Mohamed; Desfourneaux, Véronique; Meunier, Bernard; Sulpice, Laurent; Bellissant, Eric; Boudjema, Karim; Lemaitre, Florian

    2018-03-01

    Tacrolimus (TAC) is the cornerstone of immunosuppressive regimen in liver transplantation (LT). Its pharmacokinetics is characterized by a high interpatient and intrapatient variability (IPV) leading to an unpredictable dose-response relationship. The aim of our study was to evaluate the impact of TAC IPV (IPV) on graft and patient outcomes after LT. We retrospectively analyzed 812 LT recipients treated with TAC. The IPV of TAC concentrations was estimated by calculating the coefficient of variation (CV) of whole blood trough concentrations. Patients were categorized in 2 groups: low IPV (CV < 40%) and high IPV (CV ≥ 40%). There were significantly more neurologic complications (31.2% vs 16.6%, P < 0.001), cardiovascular complications (19.7% vs 9.7%, P < 0.001), and acute renal failure requiring dialysis (8.5% vs 2.2%, P < 0.001) in the high CV group than in the low CV group. Moreover, graft survival was significantly poorer in the high CV group (hazard ratio, 1.42; 95% confidence interval, 1.04-1.95; P = 0.03). A pretransplantation elevated Model for End-Stage Liver Disease score (P < 0.001) and Child-Pugh grade (P < 0.001) were identified as risk factors for presenting a high CV. A high CV of TAC concentrations was found to be predictive of TAC-related toxicity and poorer survival.

  15. Employee assistance program services for intimate partner violence and client satisfaction with these services.

    PubMed

    Pollack, Keshia M; McKay, Tasseli; Cumminskey, Chris; Clinton-Sherrod, A Monique; Lindquist, Christine H; Lasater, Beth M; Walters, Jennifer L Hardison; Krotki, Karol; Grisso, Jeane Ann

    2010-08-01

    To describe intimate partner violence (IPV) services available through employee assistance programs (EAPs) and determine women's satisfaction with these services. A mixed-methods study consisting of semistructured telephone interviews with 28 EAPs about IPV-related services and a national web-based survey of 1765 women regarding their interactions with EAPs when seeking IPV-related assistance. Data were collected in the fall of 2008. EAPs provide fairly extensive services to individuals experiencing IPV. Satisfaction with EAP services for IPV was significantly associated with annual income and the type of help received from the EAP, but not with type of IPV experienced. EAP representatives described challenges with accurately identifying IPV victims and women expressed concerns with confidentiality. Future efforts to enhance the ability of EAPs to respond effectively to IPV should address confidentially and strengthen how IPV-related assistance is delivered.

  16. Identifying cases of heroin toxicity where 6-acetylmorphine (6-AM) is not detected by toxicological analyses.

    PubMed

    Ellis, Ashley D; McGwin, Gerald; Davis, Gregory G; Dye, Daniel W

    2016-09-01

    Heroin has a half-life of 2-6 min and is metabolized too quickly to be detected in autopsy samples. The presence of 6-acetylmophine (6-AM) in urine, blood, or other samples is convincing evidence of heroin use by a decedent, but 6-AM itself has a half-life of 6-25 min before it is hydrolyzed to morphine, so 6-AM may not be present in sufficient concentration to detect in postmortem samples. Codeine is often present in heroin preparations as an impurity and is not a metabolite of heroin. Studies report that a ratio of morphine to codeine greater than one indicates heroin use. We hypothesize that the ratio of morphine to codeine in our decedents abusing drugs intravenously will be no different in individuals with 6-AM present than in individuals where no 6-AM is detected, and we report our study of this hypothesis. All accidental deaths investigated by the Jefferson County Coroner/Medical Examiner Office from 2010 to 2013 with morphine detected in blood samples collected at autopsy were reviewed. Five deaths where trauma caused or contributed to death were excluded from the review. The presence or absence of 6-AM and the concentrations of morphine and codeine were recorded for each case. The ratio of morphine to codeine was calculated for all decedents. Any individual in whom no morphine or codeine was detected in a postmortem sample was excluded from further study. Absence or presence of drug paraphernalia or evidence of intravascular (IV) drug use was documented in each case to identify IV drug users. The proportion of the IV drug users with and without 6-AM present in a postmortem sample was compared to the M/C ratio for the individuals. Of the 230 deaths included in the analysis, 103 IV drug users with quantifiable morphine and codeine in a postmortem sample were identified allowing for calculation of an M/C ratio. In these IV drug users, the M/C ratio was greater than 1 in 98 % of decedents. When controlling for the absence or presence of 6-AM there was no

  17. Dynamics on networks: the role of local dynamics and global networks on the emergence of hypersynchronous neural activity.

    PubMed

    Schmidt, Helmut; Petkov, George; Richardson, Mark P; Terry, John R

    2014-11-01

    Graph theory has evolved into a useful tool for studying complex brain networks inferred from a variety of measures of neural activity, including fMRI, DTI, MEG and EEG. In the study of neurological disorders, recent work has discovered differences in the structure of graphs inferred from patient and control cohorts. However, most of these studies pursue a purely observational approach; identifying correlations between properties of graphs and the cohort which they describe, without consideration of the underlying mechanisms. To move beyond this necessitates the development of computational modeling approaches to appropriately interpret network interactions and the alterations in brain dynamics they permit, which in the field of complexity sciences is known as dynamics on networks. In this study we describe the development and application of this framework using modular networks of Kuramoto oscillators. We use this framework to understand functional networks inferred from resting state EEG recordings of a cohort of 35 adults with heterogeneous idiopathic generalized epilepsies and 40 healthy adult controls. Taking emergent synchrony across the global network as a proxy for seizures, our study finds that the critical strength of coupling required to synchronize the global network is significantly decreased for the epilepsy cohort for functional networks inferred from both theta (3-6 Hz) and low-alpha (6-9 Hz) bands. We further identify left frontal regions as a potential driver of seizure activity within these networks. We also explore the ability of our method to identify individuals with epilepsy, observing up to 80% predictive power through use of receiver operating characteristic analysis. Collectively these findings demonstrate that a computer model based analysis of routine clinical EEG provides significant additional information beyond standard clinical interpretation, which should ultimately enable a more appropriate mechanistic stratification of people with

  18. The prevalence and factors associated with ever perpetrating intimate partner violence by men receiving substance use treatment in Brazil and England: A cross-cultural comparison.

    PubMed

    Gilchrist, Gail; Radcliffe, Polly; Noto, Ana Regina; d'Oliveira, Ana Flávia Pires Lucas

    2017-01-01

    Intimate partner violence (IPV) perpetration is common among men who use substances. Substance use is a contributing factor for IPV perpetration. This cross-sectional study determined lifetime prevalence and factors associated with ever perpetrating IPV by men receiving substance use treatment in Brazil (n = 281) and England (n = 223). IPV, adverse childhood experiences, attitudes towards gender relations and roles, current health state, substance use, depressive symptoms and anger expression were assessed. Logistic regression determined factors associated with ever perpetrating any (emotional, physical and/or sexual) IPV. Multinomial logistic regression determined factors associated with ever perpetrating different types of IPV. 74.6% (373/500) reported ever perpetrating IPV: 16.5% (82/498) emotional IPV only, 46.4% (231/498) physical IPV (with/without emotional IPV) and 11.6% (58/498) sexual IPV (with/without emotional and/or physical IPV). Higher anger expression, higher depressive symptoms, fighting physically with another man in the past year (Brazil only), experiencing a greater number of adverse childhood experiences and a higher hazardous drinking score (England only) predicted ever perpetrating IPV. Compared to never perpetrating any IPV, anger expression was associated with emotional and physical IPV perpetration; fighting physically with another man in the past year was associated with physical IPV perpetration and experiencing a greater number of adverse childhood experiences and a higher hazardous drinking score were associated with both physical and sexual IPV perpetration. Integrated interventions that address IPV and substance use delivered in substance use treatment could improve outcomes for perpetrators and victims.[Gilchrist G, Radcliffe P, Noto AR, d'Oliveira AFPL. The prevalence and factors associated with ever perpetrating intimate partner violence by men receiving substance use treatment in Brazil and England: A cross

  19. Lifetime Exposure to Intimate Partner Violence and Proinflammatory Cytokine Levels Across the Perinatal Period.

    PubMed

    Robertson Blackmore, Emma; Mittal, Mona; Cai, Xueya; Moynihan, Jan A; Matthieu, Monica M; O'Connor, Thomas G

    2016-10-01

    Intimate partner violence (IPV) is a public health concern, affecting one-third of US women. Prior research suggests an association between exposure to IPV and poor maternal perinatal health, but the underlying biological correlates are not well understood. This study examined the relationship between exposure to IPV and proinflammatory cytokine levels, a candidate mechanism accounting for poor psychiatric and obstetric outcomes, across the perinatal period. Data were obtained from a prospective, longitudinal cohort study of 171 women receiving obstetrical care from a hospital-based practice serving a predominantly low-income minority population. Participants completed questionnaires on IPV exposure, psychiatric symptoms, and psychosocial and obstetric factors and provided blood samples at 18 and 32 weeks of gestation and 6 weeks and 6 months postpartum. Serum levels of interleukin-6 (IL-6) and tumor necrosis factor alpha (TNF-α) were assayed via enzyme-linked immunosorbent assay. Thirty-five (20.5%) women reported lifetime exposure to IPV and 7 (4.1%) reported being physically hurt in the preceding 12 months (4 while pregnant). Lifetime exposure to IPV was associated with increased likelihood of experiencing perinatal depression and smoking during pregnancy. Women with a history of IPV had significantly higher levels of TNF-α at 18 weeks (z = -2.29, p < 0.05), but significantly smaller changes in levels of IL-6 (β = -0.36, p = 0.04) across time. Lifetime exposure to IPV was associated with a range of adverse mental health outcomes and may affect proinflammatory cytokine levels in pregnancy.

  20. The effects of social capital and neighborhood characteristics on intimate partner violence: a consideration of social resources and risks.

    PubMed

    Kirst, Maritt; Lazgare, Luis Palma; Zhang, Yu Janice; O'Campo, Patricia

    2015-06-01

    Intimate partner violence (IPV) is a growing public health problem, and gaps exist in knowledge with respect to appropriate prevention and treatment strategies. A growing body of research evidence suggests that beyond individual factors (e.g., socio-economic status, psychological processes, substance abuse problems), neighborhood characteristics, such as neighborhood economic disadvantage, high crime rates, high unemployment and social disorder, are associated with increased risk for IPV. However, existing research in this area has focused primarily on risk factors inherent in neighborhoods, and has failed to adequately examine resources within social networks and neighborhoods that may buffer or prevent the occurrence of IPV. This study examines the effects of neighborhood characteristics, such as economic disadvantage and disorder, and individual and neighborhood resources, such as social capital, on IPV among a representative sample of 2412 residents of Toronto, Ontario, Canada. Using a population based sample of 2412 randomly selected Toronto adults with comprehensive neighborhood level data on a broad set of characteristics, we conducted multi-level modeling to examine the effects of individual- and neighborhood-level effects on IPV outcomes. We also examined protective factors through a comprehensive operationalization of the concept of social capital, involving neighborhood collective efficacy, community group participation, social network structure and social support. Findings show that residents who were involved in one or more community groups in the last 12 months and had high perceived neighborhood problems were more likely to have experienced physical IPV. Residents who had high perceived social support and low perceived neighborhood problems were less likely to experience non-physical IPV. These relationships did not differ by neighborhood income or gender. Findings suggest interesting contextual effects of social capital on IPV. Consistent with