Sample records for key analysis results

  1. Key components of financial-analysis education for clinical nurses.

    PubMed

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  2. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  3. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  4. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  5. Passage Key Inlet, Florida; CMS Modeling and Borrow Site Impact Analysis

    DTIC Science & Technology

    2016-06-01

    Impact Analysis by Kelly R. Legault and Sirisha Rayaprolu PURPOSE: This Coastal and Hydraulics Engineering Technical Note (CHETN) describes the...use of a nested Coastal Modeling System (CMS) model for Passage Key Inlet, which is one of the connections between the Gulf of Mexico and Tampa Bay...driven sediment transport at Passage Key Inlet. This analysis resulted in issuing a new Florida Department of Environmental Protection (FDEP) permit to

  6. The comparison and analysis of extracting video key frame

    NASA Astrophysics Data System (ADS)

    Ouyang, S. Z.; Zhong, L.; Luo, R. Q.

    2018-05-01

    Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.

  7. Protein analysis: key to the future.

    PubMed

    Boodhun, Nawsheen

    2018-05-01

    Protein analysis is crucial to elucidating the function of proteins and understanding the impact of their presence, absence and alteration. This is key to advancing knowledge about diseases, providing the opportunity for biomarker discovery and development of therapeutics. In this issue of Tech News, Nawsheen Boodhun explores the various means of protein analysis.

  8. Finite-size analysis of a continuous-variable quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grosshans, Frederic; Grangier, Philippe

    2010-06-15

    The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully securemore » secret keys in the finite-size scenario, over distances larger than 50 km.« less

  9. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  10. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  11. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  12. Identification of key regulators of pancreatic cancer progression through multidimensional systems-level analysis.

    PubMed

    Rajamani, Deepa; Bhasin, Manoj K

    2016-05-03

    that higher expression of IRS1 and DLL1 and lower expression of HMGA2, ACTN1 and SKI were associated with better survival probabilities. It is evident from the results that our hierarchical systems-level multidimensional analysis approach has been successful in isolating the converging regulatory modules and associated key regulatory molecules that are potential biomarkers for pancreatic cancer progression.

  13. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  14. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  15. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  16. Screening key candidate genes and pathways involved in insulinoma by microarray analysis.

    PubMed

    Zhou, Wuhua; Gong, Li; Li, Xuefeng; Wan, Yunyan; Wang, Xiangfei; Li, Huili; Jiang, Bin

    2018-06-01

    Insulinoma is a rare type tumor and its genetic features remain largely unknown. This study aimed to search for potential key genes and relevant enriched pathways of insulinoma.The gene expression data from GSE73338 were downloaded from Gene Expression Omnibus database. Differentially expressed genes (DEGs) were identified between insulinoma tissues and normal pancreas tissues, followed by pathway enrichment analysis, protein-protein interaction (PPI) network construction, and module analysis. The expressions of candidate key genes were validated by quantitative real-time polymerase chain reaction (RT-PCR) in insulinoma tissues.A total of 1632 DEGs were obtained, including 1117 upregulated genes and 514 downregulated genes. Pathway enrichment results showed that upregulated DEGs were significantly implicated in insulin secretion, and downregulated DEGs were mainly enriched in pancreatic secretion. PPI network analysis revealed 7 hub genes with degrees more than 10, including GCG (glucagon), GCGR (glucagon receptor), PLCB1 (phospholipase C, beta 1), CASR (calcium sensing receptor), F2R (coagulation factor II thrombin receptor), GRM1 (glutamate metabotropic receptor 1), and GRM5 (glutamate metabotropic receptor 5). DEGs involved in the significant modules were enriched in calcium signaling pathway, protein ubiquitination, and platelet degranulation. Quantitative RT-PCR data confirmed that the expression trends of these hub genes were similar to the results of bioinformatic analysis.The present study demonstrated that candidate DEGs and enriched pathways were the potential critical molecule events involved in the development of insulinoma, and these findings were useful for better understanding of insulinoma genesis.

  17. An Empirical Analysis of the Cascade Secret Key Reconciliation Protocol for Quantum Key Distribution

    DTIC Science & Technology

    2011-09-01

    performance with the parity checks within each pass increasing and as a result, the processing time is expected to increase as well. A conclusion is drawn... timely manner has driven efforts to develop new key distribution methods. The most promising method is Quantum Key Distribution (QKD) and is...thank the QKD Project Team for all of the insight and support they provided in such a short time period. Thanks are especially in order for my

  18. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  19. Asymmetry of perceived key movement in chorale sequences: converging evidence from a probe-tone analysis.

    PubMed

    Cuddy, L L; Thompson, W F

    1992-01-01

    In a probe-tone experiment, two groups of listeners--one trained, the other untrained, in traditional music theory--rated the goodness of fit of each of the 12 notes of the chromatic scale to four-voice harmonic sequences. Sequences were 12 simplified excerpts from Bach chorales, 4 nonmodulating, and 8 modulating. Modulations occurred either one or two steps in either the clockwise or the counterclockwise direction on the cycle of fifths. A consistent pattern of probe-tone ratings was obtained for each sequence, with no significant differences between listener groups. Two methods of analysis (Fourier analysis and regression analysis) revealed a directional asymmetry in the perceived key movement conveyed by modulating sequences. For a given modulation distance, modulations in the counterclockwise direction effected a clearer shift in tonal organization toward the final key than did clockwise modulations. The nature of the directional asymmetry was consistent with results reported for identification and rating of key change in the sequences (Thompson & Cuddy, 1989a). Further, according to the multiple-regression analysis, probe-tone ratings did not merely reflect the distribution of tones in the sequence. Rather, ratings were sensitive to the temporal structure of the tonal organization in the sequence.

  20. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  1. Empirical Analysis of Optical Attenuator Performance in Quantum Key Distribution Systems Using a Particle Model

    DTIC Science & Technology

    2012-03-01

    EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING A...DISTRIBUTION IS UNLIMITED AFIT/GCS/ENG/12-01 EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING ...challenging as the complexity of actual implementation specifics are considered. Two components common to most quantum key distribution

  2. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  3. Linking results of key and supplementary comparisons of AC/DC voltage transfer references

    NASA Astrophysics Data System (ADS)

    Velychko, Oleh

    2018-04-01

    A regional key comparison (KC) COOMET.EM-K6.a and a supplementary comparison (SC) COOMET.EM-S1 of AC/DC voltage transfer references were conducted between participating laboratories from the Eurasian region. Measurements were made over the period 2004-2014. The results showed good agreement between all but one of the participating laboratories. The proposed procedure of linking results of key and SCs of regional metrology organization of AC/DC voltage transfer references is presented. Linking results is realized for COOMET.EM-K6.a and CCEM-K6.a KCs, and for COOMET.EM-K6.a KC and COOMET.EM-S1 SC.

  4. Modeling, Simulation and Analysis of Public Key Infrastructure

    NASA Technical Reports Server (NTRS)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  5. Analysis of counterfactual quantum key distribution using error-correcting theory

    NASA Astrophysics Data System (ADS)

    Li, Yan-Bing

    2014-10-01

    Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.

  6. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  7. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  8. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.

    PubMed

    Mao, Chen-Chen; Zhou, Xing-Yu; Zhu, Jian-Rong; Zhang, Chun-Hui; Zhang, Chun-Mei; Wang, Qin

    2018-05-14

    Recently Zhang et al [ Phys. Rev. A95, 012333 (2017)] developed a new approach to estimate the failure probability for the decoy-state BB84 QKD system when taking finite-size key effect into account, which offers security comparable to Chernoff bound, while results in an improved key rate and transmission distance. Based on Zhang et al's work, now we extend this approach to the case of the measurement-device-independent quantum key distribution (MDI-QKD), and for the first time implement it onto the four-intensity decoy-state MDI-QKD system. Moreover, through utilizing joint constraints and collective error-estimation techniques, we can obviously increase the performance of practical MDI-QKD systems compared with either three- or four-intensity decoy-state MDI-QKD using Chernoff bound analysis, and achieve much higher level security compared with those applying Gaussian approximation analysis.

  9. A tandem regression-outlier analysis of a ligand cellular system for key structural modifications around ligand binding.

    PubMed

    Lin, Ying-Ting

    2013-04-30

    A tandem technique of hard equipment is often used for the chemical analysis of a single cell to first isolate and then detect the wanted identities. The first part is the separation of wanted chemicals from the bulk of a cell; the second part is the actual detection of the important identities. To identify the key structural modifications around ligand binding, the present study aims to develop a counterpart of tandem technique for cheminformatics. A statistical regression and its outliers act as a computational technique for separation. A PPARγ (peroxisome proliferator-activated receptor gamma) agonist cellular system was subjected to such an investigation. Results show that this tandem regression-outlier analysis, or the prioritization of the context equations tagged with features of the outliers, is an effective regression technique of cheminformatics to detect key structural modifications, as well as their tendency of impact to ligand binding. The key structural modifications around ligand binding are effectively extracted or characterized out of cellular reactions. This is because molecular binding is the paramount factor in such ligand cellular system and key structural modifications around ligand binding are expected to create outliers. Therefore, such outliers can be captured by this tandem regression-outlier analysis.

  10. Implementing recovery: an analysis of the key technologies in Scotland

    PubMed Central

    2011-01-01

    Background Over the past ten years the promotion of recovery has become a stated aim of mental health policies within a number of English speaking countries, including Scotland. Implementation of a recovery approach involves a significant reorientation of mental health services and practices, which often poses significant challenges for reformers. This article examines how four key technologies of recovery have assisted in the move towards the creation of a recovery-oriented mental health system in Scotland. Methods Drawing on documentary analysis and a series of interviews we examine the construction and implementation of four key recovery 'technologies' as they have been put to use in Scotland: recovery narratives, the Scottish Recovery Indicator (SRI), Wellness Recovery Action Planning (WRAP) and peer support. Results Our findings illuminate how each of these technologies works to instantiate, exemplify and disseminate a 'recovery orientation' at different sites within the mental health system in order to bring about a 'recovery oriented' mental health system. They also enable us to identify some of the factors that facilitate or hinder the effectiveness of those technologies in bringing about a change in how mental health services are delivered in Scotland. These finding provide a basis for some general reflections on the utility of 'recovery technologies' to implement a shift towards recovery in mental health services in Scotland and elsewhere. Conclusions Our analysis of this process within the Scottish context will be valuable for policy makers and service coordinators wishing to implement recovery values within their own national mental health systems. PMID:21569633

  11. Microarray analysis identifies candidate genes for key roles in coral development

    PubMed Central

    Grasso, Lauretta C; Maindonald, John; Rudd, Stephen; Hayward, David C; Saint, Robert; Miller, David J; Ball, Eldon E

    2008-01-01

    Background Anthozoan cnidarians are amongst the simplest animals at the tissue level of organization, but are surprisingly complex and vertebrate-like in terms of gene repertoire. As major components of tropical reef ecosystems, the stony corals are anthozoans of particular ecological significance. To better understand the molecular bases of both cnidarian development in general and coral-specific processes such as skeletogenesis and symbiont acquisition, microarray analysis was carried out through the period of early development – when skeletogenesis is initiated, and symbionts are first acquired. Results Of 5081 unique peptide coding genes, 1084 were differentially expressed (P ≤ 0.05) in comparisons between four different stages of coral development, spanning key developmental transitions. Genes of likely relevance to the processes of settlement, metamorphosis, calcification and interaction with symbionts were characterised further and their spatial expression patterns investigated using whole-mount in situ hybridization. Conclusion This study is the first large-scale investigation of developmental gene expression for any cnidarian, and has provided candidate genes for key roles in many aspects of coral biology, including calcification, metamorphosis and symbiont uptake. One surprising finding is that some of these genes have clear counterparts in higher animals but are not present in the closely-related sea anemone Nematostella. Secondly, coral-specific processes (i.e. traits which distinguish corals from their close relatives) may be analogous to similar processes in distantly related organisms. This first large-scale application of microarray analysis demonstrates the potential of this approach for investigating many aspects of coral biology, including the effects of stress and disease. PMID:19014561

  12. Partition of some key regulating services in terrestrial ecosystems: Meta-analysis and review.

    PubMed

    Viglizzo, E F; Jobbágy, E G; Ricard, M F; Paruelo, J M

    2016-08-15

    Our knowledge about the functional foundations of ecosystem service (ES) provision is still limited and more research is needed to elucidate key functional mechanisms. Using a simplified eco-hydrological scheme, in this work we analyzed how land-use decisions modify the partition of some essential regulatory ES by altering basic relationships between biomass stocks and water flows. A comprehensive meta-analysis and review was conducted based on global, regional and local data from peer-reviewed publications. We analyzed five datasets comprising 1348 studies and 3948 records on precipitation (PPT), aboveground biomass (AGB), AGB change, evapotranspiration (ET), water yield (WY), WY change, runoff (R) and infiltration (I). The conceptual framework was focused on ES that are associated with the ecological functions (e.g., intermediate ES) of ET, WY, R and I. ES included soil protection, carbon sequestration, local climate regulation, water-flow regulation and water recharge. To address the problem of data normality, the analysis included both parametric and non-parametric regression analysis. Results demonstrate that PPT is a first-order biophysical factor that controls ES release at the broader scales. At decreasing scales, ES are partitioned as result of PPT interactions with other biophysical and anthropogenic factors. At intermediate scales, land-use change interacts with PPT modifying ES partition as it the case of afforestation in dry regions, where ET and climate regulation may be enhanced at the expense of R and water-flow regulation. At smaller scales, site-specific conditions such as topography interact with PPT and AGB displaying different ES partition formats. The probable implications of future land-use and climate change on some key ES production and partition are discussed. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. Formal Analysis of Key Integrity in PKCS#11

    NASA Astrophysics Data System (ADS)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  14. LabKey Server: An open source platform for scientific data integration, analysis and collaboration

    PubMed Central

    2011-01-01

    Background Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. Results To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350

  15. LACIE analyst interpretation keys

    NASA Technical Reports Server (NTRS)

    Baron, J. G.; Payne, R. W.; Palmer, W. F. (Principal Investigator)

    1979-01-01

    Two interpretation aids, 'The Image Analysis Guide for Wheat/Small Grains Inventories' and 'The United States and Canadian Great Plains Regional Keys', were developed during LACIE phase 2 and implemented during phase 3 in order to provide analysts with a better understanding of the expected ranges in color variation of signatures for individual biostages and of the temporal sequences of LANDSAT signatures. The keys were tested using operational LACIE data, and the results demonstrate that their use provides improved labeling accuracy in all analyst experience groupings, in all geographic areas within the U.S. Great Plains, and during all periods of crop development.

  16. Toxicogenomics and cancer risk assessment: a framework for key event analysis and dose-response assessment for nongenotoxic carcinogens.

    PubMed

    Bercu, Joel P; Jolly, Robert A; Flagella, Kelly M; Baker, Thomas K; Romero, Pedro; Stevens, James L

    2010-12-01

    In order to determine a threshold for nongenotoxic carcinogens, the traditional risk assessment approach has been to identify a mode of action (MOA) with a nonlinear dose-response. The dose-response for one or more key event(s) linked to the MOA for carcinogenicity allows a point of departure (POD) to be selected from the most sensitive effect dose or no-effect dose. However, this can be challenging because multiple MOAs and key events may exist for carcinogenicity and oftentimes extensive research is required to elucidate the MOA. In the present study, a microarray analysis was conducted to determine if a POD could be identified following short-term oral rat exposure with two nongenotoxic rodent carcinogens, fenofibrate and methapyrilene, using a benchmark dose analysis of genes aggregated in Kyoto Encyclopedia of Genes and Genomes (KEGG) pathways and Gene Ontology (GO) biological processes, which likely encompass key event(s) for carcinogenicity. The gene expression response for fenofibrate given to rats for 2days was consistent with its MOA and known key events linked to PPARα activation. The temporal response from daily dosing with methapyrilene demonstrated biological complexity with waves of pathways/biological processes occurring over 1, 3, and 7days; nonetheless, the benchmark dose values were consistent over time. When comparing the dose-response of toxicogenomic data to tumorigenesis or precursor events, the toxicogenomics POD was slightly below any effect level. Our results suggest that toxicogenomic analysis using short-term studies can be used to identify a threshold for nongenotoxic carcinogens based on evaluation of potential key event(s) which then can be used within a risk assessment framework. Copyright © 2010 Elsevier Inc. All rights reserved.

  17. KEY COMPARISON: Final report on CCQM-K69 key comparison: Testosterone glucuronide in human urine

    NASA Astrophysics Data System (ADS)

    Liu, Fong-Ha; Mackay, Lindsey; Murby, John

    2010-01-01

    The CCQM-K69 key comparison of testosterone glucuronide in human urine was organized under the auspices of the CCQM Organic Analysis Working Group (OAWG). The National Measurement Institute Australia (NMIA) acted as the coordinating laboratory for the comparison. The samples distributed for the key comparison were prepared at NMIA with funding from the World Anti-Doping Agency (WADA). WADA granted the approval for this material to be used for the intercomparison provided the distribution and handling of the material were strictly controlled. Three national metrology institutes (NMIs)/designated institutes (DIs) developed reference methods and submitted data for the key comparison along with two other laboratories who participated in the parallel pilot study. A good selection of analytical methods and sample workup procedures was displayed in the results submitted considering the complexities of the matrix involved. The comparability of measurement results was successfully demonstrated by the participating NMIs. Only the key comparison data were used to estimate the key comparison reference value (KCRV), using the arithmetic mean approach. The reported expanded uncertainties for results ranged from 3.7% to 6.7% at the 95% level of confidence and all results agreed within the expanded uncertainty of the KCRV. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  18. Characterization of Factors Affecting Nanoparticle Tracking Analysis Results With Synthetic and Protein Nanoparticles.

    PubMed

    Krueger, Aaron B; Carnell, Pauline; Carpenter, John F

    2016-04-01

    In many manufacturing and research areas, the ability to accurately monitor and characterize nanoparticles is becoming increasingly important. Nanoparticle tracking analysis is rapidly becoming a standard method for this characterization, yet several key factors in data acquisition and analysis may affect results. Nanoparticle tracking analysis is prone to user input and bias on account of a high number of parameters available, contains a limited analysis volume, and individual sample characteristics such as polydispersity or complex protein solutions may affect analysis results. This study systematically addressed these key issues. The integrated syringe pump was used to increase the sample volume analyzed. It was observed that measurements recorded under flow caused a reduction in total particle counts for both polystyrene and protein particles compared to those collected under static conditions. In addition, data for polydisperse samples tended to lose peak resolution at higher flow rates, masking distinct particle populations. Furthermore, in a bimodal particle population, a bias was seen toward the larger species within the sample. The impacts of filtration on an agitated intravenous immunoglobulin sample and operating parameters including "MINexps" and "blur" were investigated to optimize the method. Taken together, this study provides recommendations on instrument settings and sample preparations to properly characterize complex samples. Copyright © 2016. Published by Elsevier Inc.

  19. Sensitivity analysis of key components in large-scale hydroeconomic models

    NASA Astrophysics Data System (ADS)

    Medellin-Azuara, J.; Connell, C. R.; Lund, J. R.; Howitt, R. E.

    2008-12-01

    This paper explores the likely impact of different estimation methods in key components of hydro-economic models such as hydrology and economic costs or benefits, using the CALVIN hydro-economic optimization for water supply in California. In perform our analysis using two climate scenarios: historical and warm-dry. The components compared were perturbed hydrology using six versus eighteen basins, highly-elastic urban water demands, and different valuation of agricultural water scarcity. Results indicate that large scale hydroeconomic hydro-economic models are often rather robust to a variety of estimation methods of ancillary models and components. Increasing the level of detail in the hydrologic representation of this system might not greatly affect overall estimates of climate and its effects and adaptations for California's water supply. More price responsive urban water demands will have a limited role in allocating water optimally among competing uses. Different estimation methods for the economic value of water and scarcity in agriculture may influence economically optimal water allocation; however land conversion patterns may have a stronger influence in this allocation. Overall optimization results of large-scale hydro-economic models remain useful for a wide range of assumptions in eliciting promising water management alternatives.

  20. LabKey Server NAb: A tool for analyzing, visualizing and sharing results from neutralizing antibody assays

    PubMed Central

    2011-01-01

    Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb) assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the LabKey Server NAb tool without

  1. Screening of the key volatile organic compounds of Tuber melanosporum fermentation by aroma sensory evaluation combination with principle component analysis

    PubMed Central

    Liu, Rui-Sang; Jin, Guang-Huai; Xiao, Deng-Rong; Li, Hong-Mei; Bai, Feng-Wu; Tang, Ya-Jie

    2015-01-01

    Aroma results from the interplay of volatile organic compounds (VOCs) and the attributes of microbial-producing aromas are significantly affected by fermentation conditions. Among the VOCs, only a few of them contribute to aroma. Thus, screening and identification of the key VOCs is critical for microbial-producing aroma. The traditional method is based on gas chromatography-olfactometry (GC-O), which is time-consuming and laborious. Considering the Tuber melanosporum fermentation system as an example, a new method to screen and identify the key VOCs by combining the aroma evaluation method with principle component analysis (PCA) was developed in this work. First, an aroma sensory evaluation method was developed to screen 34 potential favorite aroma samples from 504 fermentation samples. Second, PCA was employed to screen nine common key VOCs from these 34 samples. Third, seven key VOCs were identified by the traditional method. Finally, all of the seven key VOCs identified by the traditional method were also identified, along with four others, by the new strategy. These results indicate the reliability of the new method and demonstrate it to be a viable alternative to the traditional method. PMID:26655663

  2. Security Analysis of Measurement-Device-Independent Quantum Key Distribution in Collective-Rotation Noisy Environment

    NASA Astrophysics Data System (ADS)

    Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian

    2018-01-01

    Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.

  3. Final report on key comparison CCQM-K100: Analysis of copper in ethanol

    NASA Astrophysics Data System (ADS)

    Zhou, Tao; Kakoulides, Elias; Zhu, Yanbei; Jaehrling, Reinhard; Rienitz, Olaf; Saxby, David; Phukphatthanachai, Pranee; Yafa, Charun; Labarraque, Guillaume; Cankur, Oktay; Can, Süleyman Z.; Konopelko, Leonid A.; Kustikov, Yu A.; Caciano de Sena, Rodrigo; Marques Rodrigues, Janaina; Fonseca Sarmanho, Gabriel; Fortunato de Carvalho Rocha, Werickson; dos Reis, Lindomar Augusto

    2014-01-01

    The increase in renewable sources in the energy matrix of the countries is an effort to reduce dependency on crude oil and the environmental impacts associated with its use. In order to help overcome the lack of widely accepted quality standards for fuel ethanol and to guarantee its competitiveness in the international trade market, the NMIs have been working to develop certified reference materials for bio-fuels and measurement methods. Inorganic impurities such as Cu, Na and Fe may be present in the fuel ethanol and their presence is associated with corrosion and the formation of oxide deposits in some engine parts. The key comparison CCQM-K100 was carried out under the auspices of the Inorganic Analysis Working Group (IAWG) and the coordination of the National Institute of Metrology, Quality and Technology (INMETRO). The objective of this key comparison was to compare the measurement capabilities of the participants for the determination of Cu in fuel ethanol. Ten NMIs participated in this exercise and most of them used the isotopic dilution method for determining the amount of Cu. The median was chosen as key comparison reference value (KCRV). The assigned KCRV for the Cu content was 0.3589 µg/g with a combined standard uncertainty of 0.0014 µg/g. In general, there is a good agreement among the participants' results. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  4. LabKey Server: an open source platform for scientific data integration, analysis and collaboration.

    PubMed

    Nelson, Elizabeth K; Piehler, Britt; Eckels, Josh; Rauch, Adam; Bellew, Matthew; Hussey, Peter; Ramsay, Sarah; Nathe, Cory; Lum, Karl; Krouse, Kevin; Stearns, David; Connolly, Brian; Skillman, Tom; Igra, Mark

    2011-03-09

    Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350 organizations. It tracks

  5. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    NASA Astrophysics Data System (ADS)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  6. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  7. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review

    PubMed Central

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-01-01

    Objective The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Design Thematic analysis review of CM studies. Methods We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004–December 2015 period, then updated to July 2017, with the keywords ‘CM’ and ‘frequent use’. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir’s implementation of health innovations framework was used to organise results into four broad levels of factors: (1) environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Results Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. Conclusions CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. PMID:29061623

  8. Identification of gene expression profiles and key genes in subchondral bone of osteoarthritis using weighted gene coexpression network analysis.

    PubMed

    Guo, Sheng-Min; Wang, Jian-Xiong; Li, Jin; Xu, Fang-Yuan; Wei, Quan; Wang, Hai-Ming; Huang, Hou-Qiang; Zheng, Si-Lin; Xie, Yu-Jie; Zhang, Chi

    2018-06-15

    Osteoarthritis (OA) significantly influences the quality life of people around the world. It is urgent to find an effective way to understand the genetic etiology of OA. We used weighted gene coexpression network analysis (WGCNA) to explore the key genes involved in the subchondral bone pathological process of OA. Fifty gene expression profiles of GSE51588 were downloaded from the Gene Expression Omnibus database. The OA-associated genes and gene ontologies were acquired from JuniorDoc. Weighted gene coexpression network analysis was used to find disease-related networks based on 21756 gene expression correlation coefficients, hub-genes with the highest connectivity in each module were selected, and the correlation between module eigengene and clinical traits was calculated. The genes in the traits-related gene coexpression modules were subject to functional annotation and pathway enrichment analysis using ClusterProfiler. A total of 73 gene modules were identified, of which, 12 modules were found with high connectivity with clinical traits. Five modules were found with enriched OA-associated genes. Moreover, 310 OA-associated genes were found, and 34 of them were among hub-genes in each module. Consequently, enrichment results indicated some key metabolic pathways, such as extracellular matrix (ECM)-receptor interaction (hsa04512), focal adhesion (hsa04510), the phosphatidylinositol 3'-kinase (PI3K)-Akt signaling pathway (PI3K-AKT) (hsa04151), transforming growth factor beta pathway, and Wnt pathway. We intended to identify some core genes, collagen (COL)6A3, COL6A1, ITGA11, BAMBI, and HCK, which could influence downstream signaling pathways once they were activated. In this study, we identified important genes within key coexpression modules, which associate with a pathological process of subchondral bone in OA. Functional analysis results could provide important information to understand the mechanism of OA. © 2018 Wiley Periodicals, Inc.

  9. Key Performance Indicators: From Promise to Payoff. The Productivity for Results Series No. 2

    ERIC Educational Resources Information Center

    Casserly, Michael; Eugene, Michael

    2014-01-01

    This paper draws upon the expertise of two leading educators, Michael Casserly, director of the Council of the Great City Schools, and Michael Eugene, chief operating officer of the Orange County Public Schools in Florida. They outline a set of key performance indicators that some urban districts use to benchmark the results of their operating…

  10. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2006

    ERIC Educational Resources Information Center

    Johnston, Lloyd D., O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2007-01-01

    This report provides a summary of drug use trends from a survey of nearly 50,000 eighth-, tenth-, and twelfth- grade students nationwide. It also includes perceived risk, personal disapproval, and perceived availability of each drug by this group. A synopsis of the methods used in the study and an overview of the key results from the 2006 survey…

  11. First results of the Nordic and Baltic GNSS Analysis Centre

    NASA Astrophysics Data System (ADS)

    Lahtinen, Sonja; Pasi, Häkli; Jivall, Lotti; Kempe, Christina; Kollo, Karin; Kosenko, Ksenija; Pihlak, Priit; Prizginiene, Dalia; Tangen, Oddvar; Weber, Mette; Paršeliūnas, Eimuntas; Baniulis, Rimvydas; Galinauskas, Karolis

    2018-03-01

    The Nordic Geodetic Commission (NKG) has launched a joint NKG GNSS Analysis Centre that aims to routinely produce high qualityGNSS solutions for the common needs of the NKG and the Nordic and Baltic countries. A consistent and densified velocity field is needed for the constraining of the gla-cial isostatic adjustment (GIA) modelling that is a key component of maintaining the national reference frame realisations in the area. We described the methods of the NKG GNSS Analysis Centre including the defined processing setup for the local analysis centres (LAC) and for the combination centres.We analysed the results of the first 2.5 years (2014.5-2016). The results showed that different subnets were consistent with the combined solution within 1-2 mm level. We observed the so called network effect affecting our reference frame alignment. However, the accuracy of the reference frame alignment was on a few millimetre level in the area of the main interest (Nordic and Baltic Countries). TheNKGGNSS AC was declared fully operational in April 2017.

  12. Active magnetic radiation shielding system analysis and key technologies.

    PubMed

    Washburn, S A; Blattnig, S R; Singleterry, R C; Westover, S C

    2015-01-01

    Many active magnetic shielding designs have been proposed in order to reduce the radiation exposure received by astronauts on long duration, deep space missions. While these designs are promising, they pose significant engineering challenges. This work presents a survey of the major systems required for such unconfined magnetic field design, allowing the identification of key technologies for future development. Basic mass calculations are developed for each system and are used to determine the resulting galactic cosmic radiation exposure for a generic solenoid design, using a range of magnetic field strength and thickness values, allowing some of the basic characteristics of such a design to be observed. This study focuses on a solenoid shaped, active magnetic shield design; however, many of the principles discussed are applicable regardless of the exact design configuration, particularly the key technologies cited. Copyright © 2015 The Committee on Space Research (COSPAR). All rights reserved.

  13. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  14. Testing key predictions of the associative account of mirror neurons in humans using multivariate pattern analysis.

    PubMed

    Oosterhof, Nikolaas N; Wiggett, Alison J; Cross, Emily S

    2014-04-01

    Cook et al. overstate the evidence supporting their associative account of mirror neurons in humans: most studies do not address a key property, action-specificity that generalizes across the visual and motor domains. Multivariate pattern analysis (MVPA) of neuroimaging data can address this concern, and we illustrate how MVPA can be used to test key predictions of their account.

  15. The ClinicalTrials.gov results database--update and key issues.

    PubMed

    Zarin, Deborah A; Tse, Tony; Williams, Rebecca J; Califf, Robert M; Ide, Nicholas C

    2011-03-03

    The ClinicalTrials.gov trial registry was expanded in 2008 to include a database for reporting summary results. We summarize the structure and contents of the results database, provide an update of relevant policies, and show how the data can be used to gain insight into the state of clinical research. We analyzed ClinicalTrials.gov data that were publicly available between September 2009 and September 2010. As of September 27, 2010, ClinicalTrials.gov received approximately 330 new and 2000 revised registrations each week, along with 30 new and 80 revised results submissions. We characterized the 79,413 registry and 2178 results of trial records available as of September 2010. From a sample cohort of results records, 78 of 150 (52%) had associated publications within 2 years after posting. Of results records available publicly, 20% reported more than two primary outcome measures and 5% reported more than five. Of a sample of 100 registry record outcome measures, 61% lacked specificity in describing the metric used in the planned analysis. In a sample of 700 results records, the mean number of different analysis populations per study group was 2.5 (median, 1; range, 1 to 25). Of these trials, 24% reported results for 90% or less of their participants. ClinicalTrials.gov provides access to study results not otherwise available to the public. Although the database allows examination of various aspects of ongoing and completed clinical trials, its ultimate usefulness depends on the research community to submit accurate, informative data.

  16. Do clinical safety charts improve paramedic key performance indicator results? (A clinical improvement programme evaluation).

    PubMed

    Ebbs, Phillip; Middleton, Paul M; Bonner, Ann; Loudfoot, Allan; Elliott, Peter

    2012-07-01

    Is the Clinical Safety Chart clinical improvement programme (CIP) effective at improving paramedic key performance indicator (KPI) results within the Ambulance Service of New South Wales? The CIP intervention area was compared with the non-intervention area in order to determine whether there was a statistically significant improvement in KPI results. The CIP was associated with a statistically significant improvement in paramedic KPI results within the intervention area. The strategies used within this CIP are recommended for further consideration.

  17. The identification of key genes and pathways in hepatocellular carcinoma by bioinformatics analysis of high-throughput data.

    PubMed

    Zhang, Chaoyang; Peng, Li; Zhang, Yaqin; Liu, Zhaoyang; Li, Wenling; Chen, Shilian; Li, Guancheng

    2017-06-01

    Liver cancer is a serious threat to public health and has fairly complicated pathogenesis. Therefore, the identification of key genes and pathways is of much importance for clarifying molecular mechanism of hepatocellular carcinoma (HCC) initiation and progression. HCC-associated gene expression dataset was downloaded from Gene Expression Omnibus database. Statistical software R was used for significance analysis of differentially expressed genes (DEGs) between liver cancer samples and normal samples. Gene Ontology (GO) term enrichment analysis and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway analysis, based on R software, were applied for the identification of pathways in which DEGs significantly enriched. Cytoscape software was for the construction of protein-protein interaction (PPI) network and module analysis to find the hub genes and key pathways. Finally, weighted correlation network analysis (WGCNA) was conducted to further screen critical gene modules with similar expression pattern and explore their biological significance. Significance analysis identified 1230 DEGs with fold change >2, including 632 significantly down-regulated DEGs and 598 significantly up-regulated DEGs. GO term enrichment analysis suggested that up-regulated DEG significantly enriched in immune response, cell adhesion, cell migration, type I interferon signaling pathway, and cell proliferation, and the down-regulated DEG mainly enriched in response to endoplasmic reticulum stress and endoplasmic reticulum unfolded protein response. KEGG pathway analysis found DEGs significantly enriched in five pathways including complement and coagulation cascades, focal adhesion, ECM-receptor interaction, antigen processing and presentation, and protein processing in endoplasmic reticulum. The top 10 hub genes in HCC were separately GMPS, ACACA, ALB, TGFB1, KRAS, ERBB2, BCL2, EGFR, STAT3, and CD8A, which resulted from PPI network. The top 3 gene interaction modules in PPI network enriched

  18. Lunar Exploration Architecture Level Key Drivers and Sensitivities

    NASA Technical Reports Server (NTRS)

    Goodliff, Kandyce; Cirillo, William; Earle, Kevin; Reeves, J. D.; Shyface, Hilary; Andraschko, Mark; Merrill, R. Gabe; Stromgren, Chel; Cirillo, Christopher

    2009-01-01

    Strategic level analysis of the integrated behavior of lunar transportation and lunar surface systems architecture options is performed to assess the benefit, viability, affordability, and robustness of system design choices. This analysis employs both deterministic and probabilistic modeling techniques so that the extent of potential future uncertainties associated with each option are properly characterized. The results of these analyses are summarized in a predefined set of high-level Figures of Merit (FOMs) so as to provide senior NASA Constellation Program (CxP) and Exploration Systems Mission Directorate (ESMD) management with pertinent information to better inform strategic level decision making. The strategic level exploration architecture model is designed to perform analysis at as high a level as possible but still capture those details that have major impacts on system performance. The strategic analysis methodology focuses on integrated performance, affordability, and risk analysis, and captures the linkages and feedbacks between these three areas. Each of these results leads into the determination of the high-level FOMs. This strategic level analysis methodology has been previously applied to Space Shuttle and International Space Station assessments and is now being applied to the development of the Constellation Program point-of-departure lunar architecture. This paper provides an overview of the strategic analysis methodology and the lunar exploration architecture analyses to date. In studying these analysis results, the strategic analysis team has identified and characterized key drivers affecting the integrated architecture behavior. These key drivers include inclusion of a cargo lander, mission rate, mission location, fixed-versus- variable costs/return on investment, and the requirement for probabilistic analysis. Results of sensitivity analysis performed on lunar exploration architecture scenarios are also presented.

  19. Textual analysis of tobacco editorials: how are Key media gatekeepers framing the issues?

    PubMed

    Smith, Katherine Clegg; Wakefield, Melanie

    2005-01-01

    The news media's potential to promote awareness of health issues is established, and media advocacy is now an important tool in combating tobacco use. This study examines newspaper editors' perspectives of tobacco-related issues. This study presents a textual analysis of tobacco-related editorials. The data consist of editorials on tobacco from a sample of 310 U.S. daily newspapers over the course of 1 year (2001). Data were sampled from a random one-third of the days per month, yielding 162 editorials for analysis. A qualitative textual analysis was conducted. Each editorial was coded for theme, position, and frame. We analyzed the topics gaining editorial attention and the arguments made to support various perspectives. Editorials discussed a variety of both positive and negative news events, largely conveying support for tobacco-control objectives. Various organizing frames were used-supporting policy interventions, condemning the industry, highlighting individual rights, and expressing general cynicism were most prevalent. Editors largely promoted tobacco-control efforts, particularly policy advances. There was, however, little coverage of key issues such as health effects and addiction-perhaps because they are no longer perceived to be contentious. Advocates should seek to address this area and minimize the cynicism of key media gatekeepers to avoid undermining policy and individual change efforts.

  20. Identification of key micro-organisms involved in Douchi fermentation by statistical analysis and their use in an experimental fermentation.

    PubMed

    Chen, C; Xiang, J Y; Hu, W; Xie, Y B; Wang, T J; Cui, J W; Xu, Y; Liu, Z; Xiang, H; Xie, Q

    2015-11-01

    To screen and identify safe micro-organisms used during Douchi fermentation, and verify the feasibility of producing high-quality Douchi using these identified micro-organisms. PCR-denaturing gradient gel electrophoresis (DGGE) and automatic amino-acid analyser were used to investigate the microbial diversity and free amino acids (FAAs) content of 10 commercial Douchi samples. The correlations between microbial communities and FAAs were analysed by statistical analysis. Ten strains with significant positive correlation were identified. Then an experiment on Douchi fermentation by identified strains was carried out, and the nutritional composition in Douchi was analysed. Results showed that FAAs and relative content of isoflavone aglycones in verification Douchi samples were generally higher than those in commercial Douchi samples. Our study indicated that fungi, yeasts, Bacillus and lactic acid bacteria were the key players in Douchi fermentation, and with identified probiotic micro-organisms participating in fermentation, a higher quality Douchi product was produced. This is the first report to analyse and confirm the key micro-organisms during Douchi fermentation by statistical analysis. This work proves fermentation micro-organisms to be the key influencing factor of Douchi quality, and demonstrates the feasibility of fermenting Douchi using identified starter micro-organisms. © 2015 The Society for Applied Microbiology.

  1. Are the Keys loved to death? A study of diver specialization levels and preferences in the Florida Keys

    Treesearch

    Shona Paterson; David K. Loomis

    2010-01-01

    This paper presents research conducted for the Florida Reef Resilience Program on nonresident recreational SCUBA divers in three zones of the Florida Keys. When divers were segmented into specialization subgroups for analysis, divers in different subgroups tended to use different geographic locations. These results suggest differences in user preferences; yet when...

  2. Social Network Analysis Identifies Key Participants in Conservation Development.

    PubMed

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  3. Device-independent secret-key-rate analysis for quantum repeaters

    NASA Astrophysics Data System (ADS)

    Holz, Timo; Kampermann, Hermann; Bruß, Dagmar

    2018-01-01

    The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.

  4. Identification of Key Odorants in Withering-Flavored Green Tea by Aroma Extract Dilution Analysis

    NASA Astrophysics Data System (ADS)

    Mizukami, Yuzo; Yamaguchi, Yuichi

    This research aims to identify key odorants in withering-flavored green tea. Application of the aroma extract dilution analysis using the volatile fraction of green tea and withering-flavored green tea revealed 25 and 35 odor-active peaks with the flavor dilution factors of≥4, respectively. 4-mercapto-4-methylpentan-2-one, (E)-2-nonenal, linalool, (E,Z)-2,6-nonadienal and 3-methylnonane-2,4-dione were key odorants in green tea with the flavor dilution factor of≥16. As well as these 5 odorants, 1-octen-3-one, β-damascenone, geraniol, β-ionone, (Z)-methyljasmonate, indole and coumarine contributed to the withering flavor of green tea.

  5. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  6. Tight finite-key analysis for quantum cryptography

    PubMed Central

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-01

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies. PMID:22252558

  7. Tight finite-key analysis for quantum cryptography.

    PubMed

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  8. Analysis of key technologies for virtual instruments metrology

    NASA Astrophysics Data System (ADS)

    Liu, Guixiong; Xu, Qingui; Gao, Furong; Guan, Qiuju; Fang, Qiang

    2008-12-01

    Virtual instruments (VIs) require metrological verification when applied as measuring instruments. Owing to the software-centered architecture, metrological evaluation of VIs includes two aspects: measurement functions and software characteristics. Complexity of software imposes difficulties on metrological testing of VIs. Key approaches and technologies for metrology evaluation of virtual instruments are investigated and analyzed in this paper. The principal issue is evaluation of measurement uncertainty. The nature and regularity of measurement uncertainty caused by software and algorithms can be evaluated by modeling, simulation, analysis, testing and statistics with support of powerful computing capability of PC. Another concern is evaluation of software features like correctness, reliability, stability, security and real-time of VIs. Technologies from software engineering, software testing and computer security domain can be used for these purposes. For example, a variety of black-box testing, white-box testing and modeling approaches can be used to evaluate the reliability of modules, components, applications and the whole VI software. The security of a VI can be assessed by methods like vulnerability scanning and penetration analysis. In order to facilitate metrology institutions to perform metrological verification of VIs efficiently, an automatic metrological tool for the above validation is essential. Based on technologies of numerical simulation, software testing and system benchmarking, a framework for the automatic tool is proposed in this paper. Investigation on implementation of existing automatic tools that perform calculation of measurement uncertainty, software testing and security assessment demonstrates the feasibility of the automatic framework advanced.

  9. Analysis of the secrecy of the running key in quantum encryption channels using coherent states of light

    NASA Astrophysics Data System (ADS)

    Nikulin, Vladimir V.; Hughes, David H.; Malowicki, John; Bedi, Vijit

    2015-05-01

    Free-space optical communication channels offer secure links with low probability of interception and detection. Despite their point-to-point topology, additional security features may be required in privacy-critical applications. Encryption can be achieved at the physical layer by using quantized values of photons, which makes exploitation of such quantum communication links extremely difficult. One example of such technology is keyed communication in quantum noise, a novel quantum modulation protocol that offers ultra-secure communication with competitive performance characteristics. Its utilization relies on specific coherent measurements to decrypt the signal. The process of measurements is complicated by the inherent and irreducible quantum noise of coherent states. This problem is different from traditional laser communication with coherent detection; therefore continuous efforts are being made to improve the measurement techniques. Quantum-based encryption systems that use the phase of the signal as the information carrier impose aggressive requirements on the accuracy of the measurements when an unauthorized party attempts intercepting the data stream. Therefore, analysis of the secrecy of the data becomes extremely important. In this paper, we present the results of a study that had a goal of assessment of potential vulnerability of the running key. Basic results of the laboratory measurements are combined with simulation studies and statistical analysis that can be used for both conceptual improvement of the encryption approach and for quantitative comparison of secrecy of different quantum communication protocols.

  10. Screening for Key Pathways Associated with the Development of Osteoporosis by Bioinformatics Analysis

    PubMed Central

    Liu, Yanqing; Wang, Yueqiu; Zhang, Yanxia; Liu, Zhiyong; Xiang, Hongfei; Peng, Xianbo

    2017-01-01

    Objectives. We aimed to find the key pathways associated with the development of osteoporosis. Methods. We downloaded expression profile data of GSE35959 and analyzed the differentially expressed genes (DEGs) in 3 comparison groups (old_op versus middle, old_op versus old, and old_op versus senescent). KEGG (Kyoto Encyclopedia of Genes and Genomes) pathway enrichment analyses were carried out. Besides, Venn diagram analysis and gene functional interaction (FI) network analysis were performed. Results. Totally 520 DEGs, 966 DEGs, and 709 DEGs were obtained in old_op versus middle, old_op versus old, and old_op versus senescent groups, respectively. Lysosome pathway was the significantly enriched pathways enriched by intersection genes. The pathways enriched by subnetwork modules suggested that mitotic metaphase and anaphase and signaling by Rho GTPases in module 1 had more proteins from module. Conclusions. Lysosome pathway, mitotic metaphase and anaphase, and signaling by Rho GTPases may be involved in the development of osteoporosis. Furthermore, Rho GTPases may regulate the balance of bone resorption and bone formation via controlling osteoclast and osteoblast. These 3 pathways may be regarded as the treatment targets for osteoporosis. PMID:28466021

  11. Genome sequence analysis of dengue virus 1 isolated in Key West, Florida.

    PubMed

    Shin, Dongyoung; Richards, Stephanie L; Alto, Barry W; Bettinardi, David J; Smartt, Chelsea T

    2013-01-01

    Dengue virus (DENV) is transmitted to humans through the bite of mosquitoes. In November 2010, a dengue outbreak was reported in Monroe County in southern Florida (FL), including greater than 20 confirmed human cases. The virus collected from the human cases was verified as DENV serotype 1 (DENV-1) and one isolate was provided for sequence analysis. RNA was extracted from the DENV-1 isolate and was used in reverse transcription polymerase chain reaction (RT-PCR) to amplify PCR fragments to sequence. Nucleic acid primers were designed to generate overlapping PCR fragments that covered the entire genome. The DENV-1 isolate found in Key West (KW), FL was sequenced for whole genome characterization. Sequence assembly, Genbank searches, and recombination analyses were performed to verify the identity of the genome sequences and to determine percent similarity to known DENV-1 sequences. We show that the KW DENV-1 strain is 99% identical to Nicaraguan and Mexican DENV-1 strains. Phylogenetic and recombination analyses suggest that the DENV-1 isolated in KW originated from Nicaragua (NI) and the KW strain may circulate in KW. Also, recombination analysis results detected recombination events in the KW strain compared to DENV-1 strains from Puerto Rico. We evaluate the relative growth of KW strain of DENV-1 compared to other dengue viruses to determine whether the underlying genetics of the strain is associated with a replicative advantage, an important consideration since local transmission of DENV may result because domestic tourism can spread DENVs.

  12. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review.

    PubMed

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-10-22

    The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Thematic analysis review of CM studies. We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004-December 2015 period, then updated to July 2017, with the keywords 'CM' and 'frequent use'. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir's implementation of health innovations framework was used to organise results into four broad levels of factors: (1) ,environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted

  13. Key Parameters Evaluation for Hip Prosthesis with Finite Element Analysis

    NASA Astrophysics Data System (ADS)

    Guo, Hongqiang; Li, Dichen; Lian, Qin; Li, Xiang; Jin, Zhongmin

    2007-09-01

    Stem length and cross section are two key parameters that influence the stability and longevity of metallic hip prosthesis in the total hip arthroplasty (THA). In order to assess their influence to the stress and fatigue behavior of hip prosthesis, a series model of hip prosthesis with round-shaped or drum-shaped cross section, and with different stem lengths were created. These models were analyzed under both static and dynamic loading conditions with finite element analysis, and dynamic loading represents normal walking was used in the dynamic analysis. The stress on the metallic stem, cement, and adjacent bone were got, micromotion on the cement-metal interface were got too. Safety factors for fatigue life of the hip prothesis were calculated based on data obtained from dynamic analysis. Static analysis shows that drum-shaped cross section can decrease the displacement of the stem, that stress on drum-shaped stem focus on the corner of the femoral neck and the distal part of hip prosthesis, whereas the stress on the round-shaped stem distributes evenly over most part of the stem, and maximum stress on stem prosthesis fluctuates with stem length bottoming out at stem length range from 80 mm to 110 mm, that drum-shaped stems with drum height 8 mm generate more stress at the distal part of stem than drum-shaped stems with drum height 10 mm and round stems do. Dynamic and fatigue analysis shows that drum-shaped stem with drum height 10 mm and stem length 90 mm has the greatest safety factor therefore long fatigue life.

  14. The ClinicalTrials.gov Results Database — Update and Key Issues

    PubMed Central

    Zarin, Deborah A.; Tse, Tony; Williams, Rebecca J.; Califf, Robert M.; Ide, Nicholas C.

    2011-01-01

    BACKGROUND The ClinicalTrials.gov trial registry was expanded in 2008 to include a database for reporting summary results. We summarize the structure and contents of the results database, provide an update of relevant policies, and show how the data can be used to gain insight into the state of clinical research. METHODS We analyzed ClinicalTrials.gov data that were publicly available between September 2009 and September 2010. RESULTS As of September 27, 2010, ClinicalTrials.gov received approximately 330 new and 2000 revised registrations each week, along with 30 new and 80 revised results submissions. We characterized the 79,413 registry and 2178 results of trial records available as of September 2010. From a sample cohort of results records, 78 of 150 (52%) had associated publications within 2 years after posting. Of results records available publicly, 20% reported more than two primary outcome measures and 5% reported more than five. Of a sample of 100 registry record outcome measures, 61% lacked specificity in describing the metric used in the planned analysis. In a sample of 700 results records, the mean number of different analysis populations per study group was 2.5 (median, 1; range, 1 to 25). Of these trials, 24% reported results for 90% or less of their participants. CONCLUSIONS ClinicalTrials.gov provides access to study results not otherwise available to the public. Although the database allows examination of various aspects of ongoing and completed clinical trials, its ultimate usefulness depends on the research community to submit accurate, informative data. PMID:21366476

  15. Quality control, analysis and secure sharing of Luminex® immunoassay data using the open source LabKey Server platform

    PubMed Central

    2013-01-01

    Background Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists’ capacity to use these immunoassays to evaluate human clinical trials. Results The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose–response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Conclusions Unlike other tools tailored for

  16. A Key Gene, PLIN1, Can Affect Porcine Intramuscular Fat Content Based on Transcriptome Analysis

    PubMed Central

    Li, Bojiang; Weng, Qiannan; Dong, Chao; Zhang, Zengkai; Li, Rongyang; Liu, Jingge; Jiang, Aiwen; Li, Qifa; Jia, Chao; Wu, Wangjun; Liu, Honglin

    2018-01-01

    Intramuscular fat (IMF) content is an important indicator for meat quality evaluation. However, the key genes and molecular regulatory mechanisms affecting IMF deposition remain unclear. In the present study, we identified 75 differentially expressed genes (DEGs) between the higher (H) and lower (L) IMF content of pigs using transcriptome analysis, of which 27 were upregulated and 48 were downregulated. Notably, Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analysis indicated that the DEG perilipin-1 (PLIN1) was significantly enriched in the fat metabolism-related peroxisome proliferator-activated receptor (PPAR) signaling pathway. Furthermore, we determined the expression patterns and functional role of porcine PLIN1. Our results indicate that PLIN1 was highly expressed in porcine adipose tissue, and its expression level was significantly higher in the H IMF content group when compared with the L IMF content group, and expression was increased during adipocyte differentiation. Additionally, our results confirm that PLIN1 knockdown decreases the triglyceride (TG) level and lipid droplet (LD) size in porcine adipocytes. Overall, our data identify novel candidate genes affecting IMF content and provide new insight into PLIN1 in porcine IMF deposition and adipocyte differentiation. PMID:29617344

  17. A Key Gene, PLIN1, Can Affect Porcine Intramuscular Fat Content Based on Transcriptome Analysis.

    PubMed

    Li, Bojiang; Weng, Qiannan; Dong, Chao; Zhang, Zengkai; Li, Rongyang; Liu, Jingge; Jiang, Aiwen; Li, Qifa; Jia, Chao; Wu, Wangjun; Liu, Honglin

    2018-04-04

    Intramuscular fat (IMF) content is an important indicator for meat quality evaluation. However, the key genes and molecular regulatory mechanisms affecting IMF deposition remain unclear. In the present study, we identified 75 differentially expressed genes (DEGs) between the higher (H) and lower (L) IMF content of pigs using transcriptome analysis, of which 27 were upregulated and 48 were downregulated. Notably, Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analysis indicated that the DEG perilipin-1 ( PLIN1 ) was significantly enriched in the fat metabolism-related peroxisome proliferator-activated receptor (PPAR) signaling pathway. Furthermore, we determined the expression patterns and functional role of porcine PLIN1. Our results indicate that PLIN1 was highly expressed in porcine adipose tissue, and its expression level was significantly higher in the H IMF content group when compared with the L IMF content group, and expression was increased during adipocyte differentiation. Additionally, our results confirm that PLIN1 knockdown decreases the triglyceride (TG) level and lipid droplet (LD) size in porcine adipocytes. Overall, our data identify novel candidate genes affecting IMF content and provide new insight into PLIN1 in porcine IMF deposition and adipocyte differentiation.

  18. Synthetic data sets for the identification of key ingredients for RNA-seq differential analysis.

    PubMed

    Rigaill, Guillem; Balzergue, Sandrine; Brunaud, Véronique; Blondet, Eddy; Rau, Andrea; Rogier, Odile; Caius, José; Maugis-Rabusseau, Cathy; Soubigou-Taconnat, Ludivine; Aubourg, Sébastien; Lurin, Claire; Martin-Magniette, Marie-Laure; Delannoy, Etienne

    2018-01-01

    Numerous statistical pipelines are now available for the differential analysis of gene expression measured with RNA-sequencing technology. Most of them are based on similar statistical frameworks after normalization, differing primarily in the choice of data distribution, mean and variance estimation strategy and data filtering. We propose an evaluation of the impact of these choices when few biological replicates are available through the use of synthetic data sets. This framework is based on real data sets and allows the exploration of various scenarios differing in the proportion of non-differentially expressed genes. Hence, it provides an evaluation of the key ingredients of the differential analysis, free of the biases associated with the simulation of data using parametric models. Our results show the relevance of a proper modeling of the mean by using linear or generalized linear modeling. Once the mean is properly modeled, the impact of the other parameters on the performance of the test is much less important. Finally, we propose to use the simple visualization of the raw P-value histogram as a practical evaluation criterion of the performance of differential analysis methods on real data sets. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  20. Using Key Part-of-Speech Analysis to Examine Spoken Discourse by Taiwanese EFL Learners

    ERIC Educational Resources Information Center

    Lin, Yen-Liang

    2015-01-01

    This study reports on a corpus analysis of samples of spoken discourse between a group of British and Taiwanese adolescents, with the aim of exploring the statistically significant differences in the use of grammatical categories between the two groups of participants. The key word method extended to a part-of-speech level using the web-based…

  1. Organizational Analysis With Results Using Transactional Analysis

    ERIC Educational Resources Information Center

    Clary, Thomas C.; Clary, Erica W.

    1976-01-01

    OARTA (Organization Analysis with Results Using Transactional Analysis) is a way of thinking designed to resolve problems and reach goals through action-oriented research and analysis--a learning experience in which members of an organization can develop themselves and their organization. (ABM)

  2. Analytical Round Robin for Elastic-Plastic Analysis of Surface Cracked Plates: Phase I Results

    NASA Technical Reports Server (NTRS)

    Wells, D. N.; Allen, P. A.

    2012-01-01

    An analytical round robin for the elastic-plastic analysis of surface cracks in flat plates was conducted with 15 participants. Experimental results from a surface crack tension test in 2219-T8 aluminum plate provided the basis for the inter-laboratory study (ILS). The study proceeded in a blind fashion given that the analysis methodology was not specified to the participants, and key experimental results were withheld. This approach allowed the ILS to serve as a current measure of the state of the art for elastic-plastic fracture mechanics analysis. The analytical results and the associated methodologies were collected for comparison, and sources of variability were studied and isolated. The results of the study revealed that the J-integral analysis methodology using the domain integral method is robust, providing reliable J-integral values without being overly sensitive to modeling details. General modeling choices such as analysis code, model size (mesh density), crack tip meshing, or boundary conditions, were not found to be sources of significant variability. For analyses controlled only by far-field boundary conditions, the greatest source of variability in the J-integral assessment is introduced through the constitutive model. This variability can be substantially reduced by using crack mouth opening displacements to anchor the assessment. Conclusions provide recommendations for analysis standardization.

  3. A matter of definition--key elements identified in a discourse analysis of definitions of palliative care.

    PubMed

    Pastrana, T; Jünger, S; Ostgathe, C; Elsner, F; Radbruch, L

    2008-04-01

    For more than 30 years, the term "palliative care" has been used. From the outset, the term has undergone a series of transformations in its definitions and consequently in its tasks and goals. There remains a lack of consensus on a definition. The aim of this article is to analyse the definitions of palliative care in the specialist literature and to identify the key elements of palliative care using discourse analysis: a qualitative methodology. The literature search focused on definitions of the term 'palliative medicine' and 'palliative care' in the World Wide Web and medical reference books in English and German. A total of 37 English and 26 German definitions were identified and analysed. Our study confirmed the lack of a consistent meaning concerning the investigated terms, reflecting on-going discussion about the nature of the field among palliative care practitioners. Several common key elements were identified. Four main categories emerged from the discourse analysis of the definition of palliative care: target groups, structure, tasks and expertise. In addition, the theoretical principles and goals of palliative care were discussed and found to be key elements, with relief and prevention of suffering and improvement of quality of life as main goals. The identified key elements can contribute to the definition of the concept 'palliative care'. Our study confirms the importance of semantic and ethical influences on palliative care that should be considered in future research on semantics in different languages.

  4. Pricing and components analysis of some key essential pediatric medicine in Odisha state

    PubMed Central

    Samal, Satyajit; Swain, Trupti Rekha

    2017-01-01

    Objective: Study highlighting prices, i.e., the patients actually pay at ground level is important for interventions such as alternate procurement schemes or to expedite regulatory assessment of essential medicines for children. The present study was undertaken to study pricing and component analysis of few key essential medicines in Odisha state. Methodology: Six child-specific medicines of different formulations were selected based on use in different disease condition and having widest pricing variation. Data were collected, entered, and analyzed in the price components data collection form of the World Health Organization-Health Action International (WHO-HAI) 2007 Workbook version 5 – Part II provided as part of the WHO/HAI methodology. The analysis includes the cumulative percent markup, total cumulative percent markup, and percent contribution of individual components to the final medicine price in both public and private sector of Odisha state. Results: Add-on costs such as taxes, wholesale, and retail markups contribute substantially to the final price of medicines in private sector, particularly for branded-generic products. The largest contributor to add-on costs is at the level of retailer shop. Conclusion: Policy should be framed to achieve a greater transparency and uniformity of the pricing of medicines at different health sectors of Odisha. PMID:28458429

  5. Analysis of key safety metrics of thorium utilization in LWRs

    DOE PAGES

    Ade, Brian J.; Bowman, Stephen M.; Worrall, Andrew; ...

    2016-04-08

    Here, thorium has great potential to stretch nuclear fuel reserves because of its natural abundance and because it is possible to breed the 232Th isotope into a fissile fuel ( 233U). Various scenarios exist for utilization of thorium in the nuclear fuel cycle, including use in different nuclear reactor types (e.g., light water, high-temperature gas-cooled, fast spectrum sodium, and molten salt reactors), along with use in advanced accelerator-driven systems and even in fission-fusion hybrid systems. The most likely near-term application of thorium in the United States is in currently operating light water reactors (LWRs). This use is primarily based onmore » concepts that mix thorium with uranium (UO 2 + ThO 2) or that add fertile thorium (ThO 2) fuel pins to typical LWR fuel assemblies. Utilization of mixed fuel assemblies (PuO 2 + ThO 2) is also possible. The addition of thorium to currently operating LWRs would result in a number of different phenomenological impacts to the nuclear fuel. Thorium and its irradiation products have different nuclear characteristics from those of uranium and its irradiation products. ThO 2, alone or mixed with UO 2 fuel, leads to different chemical and physical properties of the fuel. These key reactor safety–related issues have been studied at Oak Ridge National Laboratory and documented in “Safety and Regulatory Issues of the Thorium Fuel Cycle” (NUREG/CR-7176, U.S. Nuclear Regulatory Commission, 2014). Various reactor analyses were performed using the SCALE code system for comparison of key performance parameters of both ThO 2 + UO 2 and ThO 2 + PuO 2 against those of UO 2 and typical UO 2 + PuO 2 mixed oxide fuels, including reactivity coefficients and power sharing between surrounding UO 2 assemblies and the assembly of interest. The decay heat and radiological source terms for spent fuel after its discharge from the reactor are also presented. Based on this evaluation, potential impacts on safety requirements and

  6. African Primary Care Research: Qualitative data analysis and writing results

    PubMed Central

    Govender, Indiran; Ogunbanjo, Gboyega A.; Mash, Bob

    2014-01-01

    Abstract This article is part of a series on African primary care research and gives practical guidance on qualitative data analysis and the presentation of qualitative findings. After an overview of qualitative methods and analytical approaches, the article focuses particularly on content analysis, using the framework method as an example. The steps of familiarisation, creating a thematic index, indexing, charting, interpretation and confirmation are described. Key concepts with regard to establishing the quality and trustworthiness of data analysis are described. Finally, an approach to the presentation of qualitative findings is given. PMID:26245437

  7. African Primary Care Research: qualitative data analysis and writing results.

    PubMed

    Mabuza, Langalibalele H; Govender, Indiran; Ogunbanjo, Gboyega A; Mash, Bob

    2014-06-05

    This article is part of a series on African primary care research and gives practical guidance on qualitative data analysis and the presentation of qualitative findings. After an overview of qualitative methods and analytical approaches, the article focuses particularly on content analysis, using the framework method as an example. The steps of familiarisation, creating a thematic index, indexing, charting, interpretation and confirmation are described. Key concepts with regard to establishing the quality and trustworthiness of data analysis are described. Finally, an approach to the presentation of qualitative findings is given.

  8. Identification of key factors affecting the water pollutant concentration in the sluice-controlled river reaches of the Shaying River in China via statistical analysis methods.

    PubMed

    Dou, Ming; Zhang, Yan; Zuo, Qiting; Mi, Qingbin

    2015-08-01

    The construction of sluices creates a strong disturbance in water environmental factors within a river. The change in water pollutant concentrations of sluice-controlled river reaches (SCRRs) is more complex than that of natural river segments. To determine the key factors affecting water pollutant concentration changes in SCRRs, river reaches near the Huaidian Sluice in the Shaying River of China were selected as a case study, and water quality monitoring experiments based on different regulating modes were implemented in 2009 and 2010. To identify the key factors affecting the change rates for the chemical oxygen demand of permanganate (CODMn) and ammonia nitrogen (NH3-N) concentrations in the SCRRs of the Huaidian Sluice, partial correlation analysis, principal component analysis and principal factor analysis were used. The results indicate four factors, i.e., the inflow quantity from upper reaches, opening size of sluice gates, water pollutant concentration from upper reaches, and turbidity before the sluice, which are the common key factors for the CODMn and NH3-N concentration change rates. Moreover, the dissolved oxygen before a sluice is a key factor for the permanganate concentration from CODMn change rate, and the water depth before a sluice is a key factor for the NH3-N concentration change rate. Multiple linear regressions between the water pollutant concentration change rate and key factors were established via multiple linear regression analyses, and the quantitative relationship between the CODMn and NH3-N concentration change rates and key affecting factors was analyzed. Finally, the mechanism of action for the key factors affecting the water pollutant concentration changes was analyzed. The results reveal that the inflow quantity from upper reaches, opening size of sluice gates, permanganate concentration from CODMn from upper reaches and dissolved oxygen before the sluice have a negative influence and the turbidity before the sluice has a positive

  9. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  10. 2016 Federal Employee Viewpoint Survey Results and Analysis

    EPA Pesticide Factsheets

    The Office of Personnel Management’s Federal Employee Viewpoint Survey results are used to gauge the attitudes and perceptions of employees in key work experience areas that drive satisfaction and commitment.

  11. 2017 Federal Employee Viewpoint Survey Results and Analysis

    EPA Pesticide Factsheets

    The Office of Personnel Management’s Federal Employee Viewpoint Survey results are used to gauge the attitudes and perceptions of employees in key work experience areas that drive satisfaction and commitment.

  12. 2015 Federal Employee Viewpoint Survey Results and Analysis

    EPA Pesticide Factsheets

    The Office of Personnel Management’s Federal Employee Viewpoint Survey results are used to gauge the attitudes and perceptions of employees in key work experience areas that drive satisfaction and commitment.

  13. Orion Post-Landing Crew Thermal Control Modeling and Analysis Results

    NASA Technical Reports Server (NTRS)

    Cross, Cynthia D.; Bue, Grant; Rains, George E.

    2009-01-01

    In a vehicle constrained by mass and power, it is necessary to ensure that during the process of reducing hardware mass and power that the health and well being of the crew is not compromised in the design process. To that end, it is necessary to ensure that in the final phase of flight - recovery, that the crew core body temperature remains below the crew cognitive deficit set by the Constellation program. This paper will describe the models used to calculate the thermal environment of the spacecraft after splashdown as well as the human thermal model used to calculate core body temperature. Then the results of these models will be examined to understand the key drivers for core body temperature. Finally, the analysis results will be used to show that additional cooling capability must be added to the vehicle to ensure crew member health post landing.

  14. Key Reliability Drivers of Liquid Propulsion Engines and A Reliability Model for Sensitivity Analysis

    NASA Technical Reports Server (NTRS)

    Huang, Zhao-Feng; Fint, Jeffry A.; Kuck, Frederick M.

    2005-01-01

    This paper is to address the in-flight reliability of a liquid propulsion engine system for a launch vehicle. We first establish a comprehensive list of system and sub-system reliability drivers for any liquid propulsion engine system. We then build a reliability model to parametrically analyze the impact of some reliability parameters. We present sensitivity analysis results for a selected subset of the key reliability drivers using the model. Reliability drivers identified include: number of engines for the liquid propulsion stage, single engine total reliability, engine operation duration, engine thrust size, reusability, engine de-rating or up-rating, engine-out design (including engine-out switching reliability, catastrophic fraction, preventable failure fraction, unnecessary shutdown fraction), propellant specific hazards, engine start and cutoff transient hazards, engine combustion cycles, vehicle and engine interface and interaction hazards, engine health management system, engine modification, engine ground start hold down with launch commit criteria, engine altitude start (1 in. start), Multiple altitude restart (less than 1 restart), component, subsystem and system design, manufacturing/ground operation support/pre and post flight check outs and inspection, extensiveness of the development program. We present some sensitivity analysis results for the following subset of the drivers: number of engines for the propulsion stage, single engine total reliability, engine operation duration, engine de-rating or up-rating requirements, engine-out design, catastrophic fraction, preventable failure fraction, unnecessary shutdown fraction, and engine health management system implementation (basic redlines and more advanced health management systems).

  15. Integrative Analysis of DNA Methylation and Gene Expression Data Identifies EPAS1 as a Key Regulator of COPD

    PubMed Central

    Yoo, Seungyeul; Takikawa, Sachiko; Geraghty, Patrick; Argmann, Carmen; Campbell, Joshua; Lin, Luan; Huang, Tao; Tu, Zhidong; Feronjy, Robert; Spira, Avrum; Schadt, Eric E.; Powell, Charles A.; Zhu, Jun

    2015-01-01

    Chronic Obstructive Pulmonary Disease (COPD) is a complex disease. Genetic, epigenetic, and environmental factors are known to contribute to COPD risk and disease progression. Therefore we developed a systematic approach to identify key regulators of COPD that integrates genome-wide DNA methylation, gene expression, and phenotype data in lung tissue from COPD and control samples. Our integrative analysis identified 126 key regulators of COPD. We identified EPAS1 as the only key regulator whose downstream genes significantly overlapped with multiple genes sets associated with COPD disease severity. EPAS1 is distinct in comparison with other key regulators in terms of methylation profile and downstream target genes. Genes predicted to be regulated by EPAS1 were enriched for biological processes including signaling, cell communications, and system development. We confirmed that EPAS1 protein levels are lower in human COPD lung tissue compared to non-disease controls and that Epas1 gene expression is reduced in mice chronically exposed to cigarette smoke. As EPAS1 downstream genes were significantly enriched for hypoxia responsive genes in endothelial cells, we tested EPAS1 function in human endothelial cells. EPAS1 knockdown by siRNA in endothelial cells impacted genes that significantly overlapped with EPAS1 downstream genes in lung tissue including hypoxia responsive genes, and genes associated with emphysema severity. Our first integrative analysis of genome-wide DNA methylation and gene expression profiles illustrates that not only does DNA methylation play a ‘causal’ role in the molecular pathophysiology of COPD, but it can be leveraged to directly identify novel key mediators of this pathophysiology. PMID:25569234

  16. Integrative analysis of DNA methylation and gene expression data identifies EPAS1 as a key regulator of COPD.

    PubMed

    Yoo, Seungyeul; Takikawa, Sachiko; Geraghty, Patrick; Argmann, Carmen; Campbell, Joshua; Lin, Luan; Huang, Tao; Tu, Zhidong; Foronjy, Robert F; Feronjy, Robert; Spira, Avrum; Schadt, Eric E; Powell, Charles A; Zhu, Jun

    2015-01-01

    Chronic Obstructive Pulmonary Disease (COPD) is a complex disease. Genetic, epigenetic, and environmental factors are known to contribute to COPD risk and disease progression. Therefore we developed a systematic approach to identify key regulators of COPD that integrates genome-wide DNA methylation, gene expression, and phenotype data in lung tissue from COPD and control samples. Our integrative analysis identified 126 key regulators of COPD. We identified EPAS1 as the only key regulator whose downstream genes significantly overlapped with multiple genes sets associated with COPD disease severity. EPAS1 is distinct in comparison with other key regulators in terms of methylation profile and downstream target genes. Genes predicted to be regulated by EPAS1 were enriched for biological processes including signaling, cell communications, and system development. We confirmed that EPAS1 protein levels are lower in human COPD lung tissue compared to non-disease controls and that Epas1 gene expression is reduced in mice chronically exposed to cigarette smoke. As EPAS1 downstream genes were significantly enriched for hypoxia responsive genes in endothelial cells, we tested EPAS1 function in human endothelial cells. EPAS1 knockdown by siRNA in endothelial cells impacted genes that significantly overlapped with EPAS1 downstream genes in lung tissue including hypoxia responsive genes, and genes associated with emphysema severity. Our first integrative analysis of genome-wide DNA methylation and gene expression profiles illustrates that not only does DNA methylation play a 'causal' role in the molecular pathophysiology of COPD, but it can be leveraged to directly identify novel key mediators of this pathophysiology.

  17. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  18. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    PubMed

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  19. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome

    PubMed Central

    2010-01-01

    Background Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Results Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p < 0.05), followed by muscle (601 genes) and adipose (16 genes). Results from modified GSEA showed that the high-CLA beef diet affected diverse biological processes across the three tissues, and that the majority of pathway changes reached significance only with the bi-directional test. Combining the liver tissue microarray results with plasma marker data revealed 110 CLA-sensitive genes showing strong canonical correlation with one or more plasma markers of metabolic health, and 9 significantly overrepresented pathways among this set; each of these pathways was also significantly changed by the high-CLA diet. Closer inspection of two of these pathways - selenoamino acid metabolism and steroid biosynthesis - illustrated clear diet

  20. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  1. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  2. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this presentation is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  3. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  4. Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Xueying; Zhang, Yichen; Zhao, Yijia; Wang, Xiangyu; Yu, Song; Guo, Hong

    2017-10-01

    We study the impact of the finite-size effect on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, mainly considering the finite-size effect on the parameter estimation procedure. The central-limit theorem and maximum likelihood estimation theorem are used to estimate the parameters. We also analyze the relationship between the number of exchanged signals and the optimal modulation variance in the protocol. It is proved that when Charlie's position is close to Bob, the CV-MDI QKD protocol has the farthest transmission distance in the finite-size scenario. Finally, we discuss the impact of finite-size effects related to the practical detection in the CV-MDI QKD protocol. The overall results indicate that the finite-size effect has a great influence on the secret-key rate of the CV-MDI QKD protocol and should not be ignored.

  5. [Key physical parameters of hawthorn leaf granules by stepwise regression analysis method].

    PubMed

    Jiang, Qie-Ying; Zeng, Rong-Gui; Li, Zhe; Luo, Juan; Zhao, Guo-Wei; Lv, Dan; Liao, Zheng-Gen

    2017-05-01

    The purpose of this study was to investigate the effect of key physical properties of hawthorn leaf granule on its dissolution behavior. Hawthorn leaves extract was utilized as a model drug. The extract was mixed with microcrystalline cellulose or starch with the same ratio by using different methods. Appropriate amount of lubricant and disintegrating agent was added into part of the mixed powder, and then the granules were prepared by using extrusion granulation and high shear granulation. The granules dissolution behavior was evaluated by using equilibrium dissolution quantity and dissolution rate constant of the hypericin as the indicators. Then the effect of physical properties on dissolution behavior was analyzed through the stepwise regression analysis method. The equilibrium dissolution quantity of hypericin and adsorption heat constant in hawthorn leaves were positively correlated with the monolayer adsorption capacity and negatively correlated with the moisture absorption rate constant. The dissolution rate constants were decreased with the increase of Hausner rate, monolayer adsorption capacity and adsorption heat constant, and were increased with the increase of Carr index and specific surface area. Adsorption heat constant, monolayer adsorption capacity, moisture absorption rate constant, Carr index and specific surface area were the key physical properties of hawthorn leaf granule to affect its dissolution behavior. Copyright© by the Chinese Pharmaceutical Association.

  6. Identification of the key regulating genes of diminished ovarian reserve (DOR) by network and gene ontology analysis.

    PubMed

    Pashaiasl, Maryam; Ebrahimi, Mansour; Ebrahimie, Esmaeil

    2016-09-01

    Diminished ovarian reserve (DOR) is one of the reasons for infertility that not only affects both older and young women. Ovarian reserve assessment can be used as a new prognostic tool for infertility treatment decision making. Here, up- and down-regulated gene expression profiles of granulosa cells were analysed to generate a putative interaction map of the involved genes. In addition, gene ontology (GO) analysis was used to get insight intol the biological processes and molecular functions of involved proteins in DOR. Eleven up-regulated genes and nine down-regulated genes were identified and assessed by constructing interaction networks based on their biological processes. PTGS2, CTGF, LHCGR, CITED, SOCS2, STAR and FSTL3 were the key nodes in the up-regulated networks, while the IGF2, AMH, GREM, and FOXC1 proteins were key in the down-regulated networks. MIRN101-1, MIRN153-1 and MIRN194-1 inhibited the expression of SOCS2, while CSH1 and BMP2 positively regulated IGF1 and IGF2. Ossification, ovarian follicle development, vasculogenesis, sequence-specific DNA binding transcription factor activity, and golgi apparatus are the major differential groups between up-regulated and down-regulated genes in DOR. Meta-analysis of publicly available transcriptomic data highlighted the high coexpression of CTGF, connective tissue growth factor, with the other key regulators of DOR. CTGF is involved in organ senescence and focal adhesion pathway according to GO analysis. These findings provide a comprehensive system biology based insight into the aetiology of DOR through network and gene ontology analyses.

  7. Cryptographic Key Management and Critical Risk Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of

  8. Weighted gene co‑expression network analysis in identification of key genes and networks for ischemic‑reperfusion remodeling myocardium.

    PubMed

    Guo, Nan; Zhang, Nan; Yan, Liqiu; Lian, Zheng; Wang, Jiawang; Lv, Fengfeng; Wang, Yunfei; Cao, Xufen

    2018-06-14

    Acute myocardial infarction induces ventricular remodeling, which is implicated in dilated heart and heart failure. The pathogenical mechanism of myocardium remodeling remains to be elucidated. The aim of the present study was to identify key genes and networks for myocardium remodeling following ischemia‑reperfusion (IR). First, the mRNA expression data from the National Center for Biotechnology Information database were downloaded to identify differences in mRNA expression of the IR heart at days 2 and 7. Then, weighted gene co‑expression network analysis, hierarchical clustering, protein‑protein interaction (PPI) network, Gene Ontology (GO), Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway were used to identify key genes and networks for the heart remodeling process following IR. A total of 3,321 differentially expressed genes were identified during the heart remodeling process. A total of 6 modules were identified through gene co‑expression network analysis. GO and KEGG analysis results suggested that each module represented a different biological function and was associated with different pathways. Finally, hub genes of each module were identified by PPI network construction. The present study revealed that heart remodeling following IR is a complicated process, involving extracellular matrix organization, neural development, apoptosis and energy metabolism. The dysregulated genes, including SRC proto‑oncogene, non‑receptor tyrosine kinase, discs large MAGUK scaffold protein 1, ATP citrate lyase, RAN, member RAS oncogene family, tumor protein p53, and polo like kinase 2, may be essential for heart remodeling following IR and may be used as potential targets for the inhibition of heart remodeling following acute myocardial infarction.

  9. Efficient bit sifting scheme of post-processing in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Le, Dan; Wu, Xianyan; Niu, Xiamu; Guo, Hong

    2015-10-01

    Bit sifting is an important step in the post-processing of quantum key distribution (QKD). Its function is to sift out the undetected original keys. The communication traffic of bit sifting has essential impact on the net secure key rate of a practical QKD system. In this paper, an efficient bit sifting scheme is presented, of which the core is a lossless source coding algorithm. Both theoretical analysis and experimental results demonstrate that the performance of the scheme is approaching the Shannon limit. The proposed scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means the proposed scheme can decrease the secure key consumption for classical channel authentication and increase the net secure key rate of the QKD system, as demonstrated by analyzing the improvement on the net secure key rate. Meanwhile, some recommendations on the application of the proposed scheme to some representative practical QKD systems are also provided.

  10. Analysis Results for Lunar Soil Simulant Using a Portable X-Ray Fluorescence Analyzer

    NASA Technical Reports Server (NTRS)

    Boothe, R. E.

    2006-01-01

    Lunar soil will potentially be used for oxygen generation, water generation, and as filler for building blocks during habitation missions on the Moon. NASA s in situ fabrication and repair program is evaluating portable technologies that can assess the chemistry of lunar soil and lunar soil simulants. This Technical Memorandum summarizes the results of the JSC 1 lunar soil simulant analysis using the TRACeR III IV handheld x-ray fluorescence analyzer, manufactured by KeyMaster Technologies, Inc. The focus of the evaluation was to determine how well the current instrument configuration would detect and quantify the components of JSC-1.

  11. Educational consequences of developmental speech disorder: Key Stage 1 National Curriculum assessment results in English and mathematics.

    PubMed

    Nathan, Liz; Stackhouse, Joy; Goulandris, Nata; Snowling, Margaret J

    2004-06-01

    Children with speech difficulties may have associated educational problems. This paper reports a study examining the educational attainment of children at Key Stage 1 of the National Curriculum who had previously been identified with a speech difficulty. (1) To examine the educational attainment at Key Stage 1 of children diagnosed with speech difficulties two/three years prior to the present study. (2) To compare the Key Stage 1 assessment results of children whose speech problems had resolved at the time of assessment with those whose problems persisted. Data were available from 39 children who had an earlier diagnosis of speech difficulties at age 4/5 (from an original cohort of 47) at the age of 7. A control group of 35 children identified and matched at preschool on age, nonverbal ability and gender provided comparative data. Results of Statutory Assessment Tests (SATs) in reading, reading comprehension, spelling, writing and maths, administered to children at the end of Year 2 of school were analysed. Performance across the two groups was compared. Performance was also compared to published statistics on national levels of attainment. Children with a history of speech difficulties performed less well than controls on reading, spelling and maths. However, children whose speech problems had resolved by the time of assessment performed no differently to controls. Children with persisting speech problems performed less well than controls on tests of literacy and maths. Spelling performance was a particular area of difficulty for children with persisting speech problems. Children with speech difficulties are likely to perform less well than expected on literacy and maths SAT's at age 7. Performance is related to whether the speech problem resolves early on and whether associated language problems exist. Whilst it is unclear whether poorer performance on maths is because of the language components of this task, the results indicate that speech problems, especially

  12. Determining barriers to creating an enabling environment in Cambodia: results from a baseline study with key populations and police

    PubMed Central

    Schneiders, Mira L; Weissman, Amy

    2016-01-01

    Introduction Cambodian law enforcement's limited acceptance of harm reduction has hindered HIV program effectiveness. With funding from the Australian Department of Foreign Affairs and Trade, FHI 360 supported the Ministry of Interior to implement the Police Community Partnership Initiative (PCPI) in Cambodia's capital Phnom Penh. To guide this, FHI 360 conducted a baseline study examining police and key populations’ attitudes and practices towards one another, including fear and occurrence of arrest. Methods Between December 2012 and January 2013, a cross-sectional survey of 199 police post officers, 199 people who use drugs (PWUD) including people who inject drugs (PWID), 199 men who have sex with men (MSM), 200 transgender women (TGW) and 200 female entertainment workers (FEW) was conducted in five Phnom Penh districts. Eligible participants were ≥18 years, members of a key population from selected hotspots or police officers, deputy chiefs or chiefs. Results Key populations’ median age was 25 years (IQR: 22–30); 40% had completed only primary school. Police were male (99.5%), with median age 43 years (IQR: 30 to 47), and 45 and 25% high school and university completion rates, respectively. Key populations feared arrest for carrying needles and syringes (67%), condoms (23%) and 19% felt afraid to access health services. Close to 75% of police reported body searching and 58% arresting key populations in the past six months for using drugs (64%), selling or distributing drugs (36%) or being violent (13%). Self-reported arrests (23% PWUD, 6% MSM, 6% TGW, 12% FEW; p<0.05), being verbally threatened (45% PWUD, 21% MSM, 25% TGW, 27% FEW; p<0.001) and body searched (44% PWUD, 28% MSM, 23% TGW, 8% FEW; p<0.001) was significantly higher among PWUD than other key populations. The majority (94%) of police believed arrest was an appropriate solution to reduce HIV and drug use and reported selling sex (88%) and carrying needles and syringes (55%) as valid reasons for

  13. Anomaly Monitoring Method for Key Components of Satellite

    PubMed Central

    Fan, Linjun; Xiao, Weidong; Tang, Jun

    2014-01-01

    This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM), which is made up of state estimation based on Multivariate State Estimation Techniques (MSET) and anomaly detection based on Sequential Probability Ratio Test (SPRT). On the basis of analysis failure of lithium-ion batteries (LIBs), we divided the failure of LIBs into internal failure, external failure, and thermal runaway and selected electrolyte resistance (R e) and the charge transfer resistance (R ct) as the key parameters of state estimation. Then, through the actual in-orbit telemetry data of the key parameters of LIBs, we obtained the actual residual value (R X) and healthy residual value (R L) of LIBs based on the state estimation of MSET, and then, through the residual values (R X and R L) of LIBs, we detected the anomaly states based on the anomaly detection of SPRT. Lastly, we conducted an example of AMM for LIBs, and, according to the results of AMM, we validated the feasibility and effectiveness of AMM by comparing it with the results of threshold detective method (TDM). PMID:24587703

  14. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome.

    PubMed

    Morine, Melissa J; McMonagle, Jolene; Toomey, Sinead; Reynolds, Clare M; Moloney, Aidan P; Gormley, Isobel C; Gaora, Peadar O; Roche, Helen M

    2010-10-07

    Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p < 0.05), followed by muscle (601 genes) and adipose (16 genes). Results from modified GSEA showed that the high-CLA beef diet affected diverse biological processes across the three tissues, and that the majority of pathway changes reached significance only with the bi-directional test. Combining the liver tissue microarray results with plasma marker data revealed 110 CLA-sensitive genes showing strong canonical correlation with one or more plasma markers of metabolic health, and 9 significantly overrepresented pathways among this set; each of these pathways was also significantly changed by the high-CLA diet. Closer inspection of two of these pathways--selenoamino acid metabolism and steroid biosynthesis--illustrated clear diet-sensitive changes in

  15. Multi-party quantum key agreement with five-qubit brown states

    NASA Astrophysics Data System (ADS)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  16. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  17. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  18. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  19. Slips of the Typewriter Key.

    ERIC Educational Resources Information Center

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  20. Key principles to guide development of consumer medicine information--content analysis of information design texts.

    PubMed

    Raynor, David K; Dickinson, David

    2009-04-01

    Effective written consumer medicines information is essential to support safe and effective medicine taking, but the wording and layout of currently provided materials do not meet patients' needs. To identify principles from the wider discipline of information design for use by health professionals when developing or assessing written drug information for patients. Six experts in information design nominated texts on best practice in information design applicable to consumer medicines information. A content analysis identified key principles that were tabulated to bring out key themes. Six texts that met the inclusion criteria, were identified, and content analysis indentified 4 themes: words, type, lines, and layout. Within these main themes, there were 24 subthemes. Selected principles relating to these subthemes were: use short familiar words, short sentences, and short headings that stand out from the text; use a conversational tone of voice, addressing the reader as "you"; use a large type size while retaining sufficient white space; use bullet points to organize lists; use unjustified text (ragged right) and bold, lower-case text for emphasis. Pictures or graphics do not necessarily improve a document. Applying the good information design principles identified to written consumer medicines information could support health professionals when developing and assessing drug information for patients.

  1. Security analysis of orthogonal-frequency-division-multiplexing-based continuous-variable quantum key distribution with imperfect modulation

    NASA Astrophysics Data System (ADS)

    Zhang, Hang; Mao, Yu; Huang, Duan; Li, Jiawei; Zhang, Ling; Guo, Ying

    2018-05-01

    We introduce a reliable scheme for continuous-variable quantum key distribution (CV-QKD) by using orthogonal frequency division multiplexing (OFDM). As a spectrally efficient multiplexing technique, OFDM allows a large number of closely spaced orthogonal subcarrier signals used to carry data on several parallel data streams or channels. We place emphasis on modulator impairments which would inevitably arise in the OFDM system and analyze how these impairments affect the OFDM-based CV-QKD system. Moreover, we also evaluate the security in the asymptotic limit and the Pirandola-Laurenza-Ottaviani-Banchi upper bound. Results indicate that although the emergence of imperfect modulation would bring about a slight decrease in the secret key bit rate of each subcarrier, the multiplexing technique combined with CV-QKD results in a desirable improvement on the total secret key bit rate which can raise the numerical value about an order of magnitude.

  2. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  3. Military Service Member and Veteran Reintegration: A Conceptual Analysis, Unified Definition, and Key Domains

    PubMed Central

    Elnitsky, Christine A.; Fisher, Michael P.; Blevins, Cara L.

    2017-01-01

    that may facilitate or challenge successful reintegration, and results suggest that successful coping with life stressors plays an integral role in post-deployment reintegration. Overall, the literature does not provide a comprehensive representation of reintegration among MSMVs. Although, previous research describes military service member and veteran reintegration challenges, this concept analysis provides a unified definition of the phenomenon and identifies key domains of reintegration that may broaden our understanding and guide reintegration research and practice. PMID:28352240

  4. Military Service Member and Veteran Reintegration: A Conceptual Analysis, Unified Definition, and Key Domains.

    PubMed

    Elnitsky, Christine A; Fisher, Michael P; Blevins, Cara L

    2017-01-01

    that may facilitate or challenge successful reintegration, and results suggest that successful coping with life stressors plays an integral role in post-deployment reintegration. Overall, the literature does not provide a comprehensive representation of reintegration among MSMVs. Although, previous research describes military service member and veteran reintegration challenges, this concept analysis provides a unified definition of the phenomenon and identifies key domains of reintegration that may broaden our understanding and guide reintegration research and practice.

  5. CCM key comparison CCM.D-K4 'Hydrometer'

    NASA Astrophysics Data System (ADS)

    Lorefice, S.; Becerra, L. O.; Lenard, E.; Lee, Y. J.; Lee, W. G.; Madec, T.; Meury, P. A.; Caceres, J.; Santos, C.; Vamossy, C.; Man, J.; Fen, K.; Toda, K.; Wright, J.; Bettin, H.; Toth, H.

    2016-01-01

    This report presents the comparison philosophy, methodology, analysis and the results of the designed CCM.D-K4 key comparison that covered the calibration of high resolution hydrometers for liquid and alcoholometers in the density range 600 kg/m3 to 2000 kg/m3 at the temperature of 20°C. The main purpose of this comparison was not only to evaluate the degree of equivalence in the calibration of high accuracy hydrometers between NMI participants, but also to link, were it is possible, the results of previous comparisons to Key Comparison Reference Values (KCRVs) of CCM.D-K4. Eleven NMI laboratories took part in the CCM.D-K4 divided in two groups (petals). With the CCM.D-K4 purpose, two similar sets consisting of three hydrometers for liquid density determinations and an alcoholometer were circulated to the NMI participants as a travelling standard in the time interval from January 2011 to April 2012. Twelve Key Comparison Reference Values (KCRVs) for each petal have been obtained at the density values related to the tested density marks of the transfer standards by the results of participants. The KCRVs and corresponding uncertainties were calculated by the weighted mean in the case of consistent results, otherwise the median was used. The degree of equivalence (DoE) with respect to the corresponding KCRV was determined for each participant and, in this particular comparison, the Weighted Least Squares (WLS) method was used to link the individual DoE of each participant by a continuous function. Significant drift of the transfer standards was not detected. This report also gives instructions on calculating pair-wise degrees of equivalence, with the addition of any information on correlations that may be necessary to estimate more accurately as well as the procedure for linking international comparisons to the CCM.D-K4. Finally an example of linkage to the CCM.D-K4 is given by dealing with the results of the bilateral comparison between INRiM and NMIA, which was

  6. Identification of the key odorants in Tahitian cured vanilla beans (Vanilla tahitensis) by GC-MS and an aroma extract dilution analysis.

    PubMed

    Takahashi, Makoto; Inai, Yoko; Miyazawa, Norio; Kurobayashi, Yoshiko; Fujita, Akira

    2013-01-01

    The key odorants of Tahitian vanilla beans (Vanilla tahitensis) were characterized by a sensory evaluation, aroma extract dilution analysis (AEDA), quantification, and aroma reconstitution. Vanillin and anisaldehyde were identified in the same highest flavor dilution (FD) factor as the most characteristic odor-active compounds in Tahitian vanilla beans, followed by anisyl alcohol and anisyl acetate. Vanillin and anisyl alcohol were by far the most abundant odorants present with the highest concentration in the beans, followed by acetic acid, anisaldehyde, and anisyl acetate. A sensory evaluation of Tahitian vanilla beans and its reconstitute aroma concentrate characterized both samples as similar. These results indicated vanillin, anisaldehyde, anisyl alcohol, and anisyl acetate to be the key odorants in Tahitian vanilla beans. 3-Methylnonane-2,4-dione were identified for the first time in vanilla beans. β-Damascenone and phenylacetic acid were identified for the first time in Tahitian vanilla beans.

  7. Continuous variable quantum key distribution with a real local oscillator using simultaneous pilot signals.

    PubMed

    Kleis, Sebastian; Rueckmann, Max; Schaeffer, Christian G

    2017-04-15

    In this Letter, we propose a novel implementation of continuous variable quantum key distribution that operates with a real local oscillator placed at the receiver site. In addition, pulsing of the continuous wave laser sources is not required, leading to an extraordinary practical and secure setup. It is suitable for arbitrary schemes based on modulated coherent states and heterodyne detection. The shown results include transmission experiments, as well as an excess noise analysis applying a discrete 8-state phase modulation. Achievable key rates under collective attacks are estimated. The results demonstrate the high potential of the approach to achieve high secret key rates at relatively low effort and cost.

  8. Drama in the Key Stage 3 English Framework. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    Effective drama teaching improves the following student skills: speaking and listening, reading and writing through developing thinking, communication skills, and critical analysis. Drama is part of young people's core curriculum entitlement in the United Kingdom. It is included in the English Curriculum Orders and in the Key Stage 3 Framework for…

  9. funRNA: a fungi-centered genomics platform for genes encoding key components of RNAi.

    PubMed

    Choi, Jaeyoung; Kim, Ki-Tae; Jeon, Jongbum; Wu, Jiayao; Song, Hyeunjeong; Asiegbu, Fred O; Lee, Yong-Hwan

    2014-01-01

    RNA interference (RNAi) is involved in genome defense as well as diverse cellular, developmental, and physiological processes. Key components of RNAi are Argonaute, Dicer, and RNA-dependent RNA polymerase (RdRP), which have been functionally characterized mainly in model organisms. The key components are believed to exist throughout eukaryotes; however, there is no systematic platform for archiving and dissecting these important gene families. In addition, few fungi have been studied to date, limiting our understanding of RNAi in fungi. Here we present funRNA http://funrna.riceblast.snu.ac.kr/, a fungal kingdom-wide comparative genomics platform for putative genes encoding Argonaute, Dicer, and RdRP. To identify and archive genes encoding the abovementioned key components, protein domain profiles were determined from reference sequences obtained from UniProtKB/SwissProt. The domain profiles were searched using fungal, metazoan, and plant genomes, as well as bacterial and archaeal genomes. 1,163, 442, and 678 genes encoding Argonaute, Dicer, and RdRP, respectively, were predicted. Based on the identification results, active site variation of Argonaute, diversification of Dicer, and sequence analysis of RdRP were discussed in a fungus-oriented manner. funRNA provides results from diverse bioinformatics programs and job submission forms for BLAST, BLASTMatrix, and ClustalW. Furthermore, sequence collections created in funRNA are synced with several gene family analysis portals and databases, offering further analysis opportunities. funRNA provides identification results from a broad taxonomic range and diverse analysis functions, and could be used in diverse comparative and evolutionary studies. It could serve as a versatile genomics workbench for key components of RNAi.

  10. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  11. The Value Added National Project. Technical Report: Primary 4. Value-Added Key Stage 1 to Key Stage 2.

    ERIC Educational Resources Information Center

    Tymms, Peter

    This is the fourth in a series of technical reports that have dealt with issues surrounding the possibility of national value-added systems for primary schools in England. The main focus has been on the relative progress made by students between the ends of Key Stage 1 (KS1) and Key Stage 2 (KS2). The analysis has indicated that the strength of…

  12. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  13. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2008-05-01

    The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

  14. Materials Analysis: A Key to Unlocking the Mystery of the Columbia Tragedy

    NASA Technical Reports Server (NTRS)

    Mayeaux, Brian M.; Collins, Thomas E.; Piascik, Robert S.; Russel, Richard W.; Jerman, Gregory A.; Shah, Sandeep R.; McDanels, Steven J.

    2004-01-01

    Materials analyses of key forensic evidence helped unlock the mystery of the loss of space shuttle Columbia that disintegrated February 1, 2003 while returning from a 16-day research mission. Following an intensive four-month recovery effort by federal, state, and local emergency management and law officials, Columbia debris was collected, catalogued, and reassembled at the Kennedy Space Center. Engineers and scientists from the Materials and Processes (M&P) team formed by NASA supported Columbia reconstruction efforts, provided factual data through analysis, and conducted experiments to validate the root cause of the accident. Fracture surfaces and thermal effects of selected airframe debris were assessed, and process flows for both nondestructive and destructive sampling and evaluation of debris were developed. The team also assessed left hand (LH) airframe components that were believed to be associated with a structural breach of Columbia. Analytical data collected by the M&P team showed that a significant thermal event occurred at the left wing leading edge in the proximity of LH reinforced carbon carbon (RCC) panels 8 and 9. The analysis also showed exposure to temperatures in excess of 1,649 C, which would severely degrade the support structure, tiles, and RCC panel materials. The integrated failure analysis of wing leading edge debris and deposits strongly supported the hypothesis that a breach occurred at LH RCC panel 8.

  15. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  16. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  17. Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.

    PubMed

    Capmany, José

    2009-04-13

    We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.

  18. Single-photon quantum key distribution in the presence of loss

    NASA Astrophysics Data System (ADS)

    Curty, Marcos; Moroder, Tobias

    2007-05-01

    We investigate two-way and one-way single-photon quantum key distribution (QKD) protocols in the presence of loss introduced by the quantum channel. Our analysis is based on a simple precondition for secure QKD in each case. In particular, the legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. We show that both criteria can be formulated as a convex optimization problem known as a semidefinite program, which can be efficiently solved. Moreover, we prove that the solution to the dual optimization corresponds to the evaluation of an optimal witness operator that belongs to the minimal verification set of them for the given two-way (or one-way) QKD protocol. A positive expectation value of this optimal witness operator states that no secret key can be distilled from the available measurements results. We apply such analysis to several well-known single-photon QKD protocols under losses.

  19. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  20. Physical and Chemical Analytical Analysis: A key component of Bioforensics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Velsko, S P

    The anthrax letters event of 2001 has raised our awareness of the potential importance of non-biological measurements on samples of biological agents used in a terrorism incident. Such measurements include a variety of mass spectral, spectroscopic, and other instrumental techniques that are part of the current armamentarium of the modern materials analysis or analytical chemistry laboratory. They can provide morphological, trace element, isotopic, and other molecular ''fingerprints'' of the agent that may be key pieces of evidence, supplementing that obtained from genetic analysis or other biological properties. The generation and interpretation of such data represents a new domain of forensicmore » science, closely aligned with other areas of ''microbial forensics''. This paper describes some major elements of the R&D agenda that will define this sub-field in the immediate future and provide the foundations for a coherent national capability. Data from chemical and physical analysis of BW materials can be useful to an investigation of a bio-terror event in two ways. First, it can be used to compare evidence samples collected at different locations where such incidents have occurred (e.g. between the powders in the New York and Washington letters in the Amerithrax investigation) or between the attack samples and those seized during the investigation of sites where it is suspected the material was manufactured (if such samples exist). Matching of sample properties can help establish the relatedness of disparate incidents, and mis-matches might exclude certain scenarios, or signify a more complex etiology of the events under investigation. Chemical and morphological analysis for sample matching has a long history in forensics, and is likely to be acceptable in principle in court, assuming that match criteria are well defined and derived from known limits of precision of the measurement techniques in question. Thus, apart from certain operational issues (such as how

  1. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  2. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  3. Extended analysis of the Trojan-horse attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  4. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  5. Counterfactual Quantum Deterministic Key Distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-Jing

    2013-01-01

    We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using our protocol. We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol. Most importantly, our analysis produces a bound tighter than the existing ones.

  6. Con: Meta-analysis: some key limitations and potential solutions.

    PubMed

    Esterhuizen, Tonya M; Thabane, Lehana

    2016-06-01

    Meta-analysis, a statistical combination of results of several trials to produce a summary effect, has been subject to criticism in the past, mainly for the reasons of poor quality of included studies, heterogeneity between studies meta-analyzed and failing to address publication bias. These limitations can cause the results to be misleading, which is important if policy and practice decisions are based on systematic reviews and meta-analyses. We elaborate on these limitations and illustrate them with examples from the nephrology literature. Finally, we present some potential solutions, notably, education in meta-analysis for evidence producers and consumers as well as the use of individual patient data for meta-analyses. © The Author 2016. Published by Oxford University Press on behalf of ERA-EDTA. All rights reserved.

  7. Identifying Key Hospital Service Quality Factors in Online Health Communities

    PubMed Central

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain

    2015-01-01

    Background The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. Objective As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. Methods We defined social media–based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea’s two biggest online portals were used to test the effectiveness of detection of social media–based key quality factors for hospitals. Results To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is

  8. Quality control, analysis and secure sharing of Luminex® immunoassay data using the open source LabKey Server platform.

    PubMed

    Eckels, Josh; Nathe, Cory; Nelson, Elizabeth K; Shoemaker, Sara G; Nostrand, Elizabeth Van; Yates, Nicole L; Ashley, Vicki C; Harris, Linda J; Bollenbeck, Mark; Fong, Youyi; Tomaras, Georgia D; Piehler, Britt

    2013-04-30

    Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists' capacity to use these immunoassays to evaluate human clinical trials. The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose-response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Unlike other tools tailored for Luminex immunoassays, LabKey Server

  9. Numerical approach for unstructured quantum key distribution

    PubMed Central

    Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert

    2016-01-01

    Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown. PMID:27198739

  10. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  11. Key Largo Limestone revisited: Pleistocene shelf-edge facies, Florida Keys, USA

    USGS Publications Warehouse

    Gray, Multer H.; Gischler, E.; Lundberg, J.; Simmons, K.R.; Shinn, E.A.

    2002-01-01

    New dates and analysis of 12 deep and 57 shallow cores allow a more detailed interpretation of the Pleistocene shelf edge of the Florida Platform as found in various facies of the Key Largo Limestone beneath the Florida Keys. In this study a three-phase evolution of the Quaternary units (Q1-Q5) of the Key Largo is presented with new subdivision of the Q5. (1) In the first phase, the Q1 and Q2 (perhaps deposited during oxygen-isotope stage 11) deep-water quartz-rich environment evolved into a shallow carbonate phase. (2) Subsequently, a Q3 (presumably corresponding to oxygen-isotope stage 9) flourishing reef and productive high-platform sediment phase developed. (3) Finally, a Q4 and Q5 (corresponding to oxygen-isotope stages 7 and 5) stabilization phase occured with reefs and leeward productive lagoons, followed by lower sea levels presenting a sequence of younger (isotope substages 5c, 5a) shelf-margin wedges, sediment veneers and outlier reefs. The Key Largo Limestone provides an accessible model of a carbonate shelf edge with fluctuating water depth, bordering a deep seaward basin for a period of at least 300 ka. During this time, at least four onlaps/offlaps, often separated by periods of karst development with associated diagenetic alterations, took place. The story presented by this limestone not only allows a better understanding of the history of south Florida but also aids in the interpretation of similar persistent shelf-edge sites bordering deep basins in other areas.

  12. The mid-IR and near-IR interferometry of AGNs: key results and their implications

    NASA Astrophysics Data System (ADS)

    Kishimoto, M.

    2015-09-01

    Infrared interferometry has been very productive in directly probing the structure of AGNs at sub-pc scales. With tens of objects already probed in the mid-IR and near-IR, I will summarize the key results and im- plications from this direct exploration. The Keck interferometry in the near-IR and VLTI in the mid-IR shaped the luminosity dependence of the torus size and structure, while the latter also revealed an equatorial structure at several Rsub (dust sublimation radius), and a polar-elongated region at a few tens of Rsub. Notably, this polar component seems to dominate the compact mid-IR flux. This component can persuasively be attributed to a polar outflow. However, interferometry, through emissivity estimations, also indicates that it is not a UV-optically-thin cloud but participating in the obscuration of the nucleus. I will discuss how to accommodate all these facts to build a consistent picture.

  13. Fully device-independent conference key agreement

    NASA Astrophysics Data System (ADS)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  14. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  15. Key Future Engineering Capabilities for Human Capital Retention

    NASA Astrophysics Data System (ADS)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  16. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  17. Key Process Uncertainties in Soil Carbon Dynamics: Comparing Multiple Model Structures and Observational Meta-analysis

    NASA Astrophysics Data System (ADS)

    Sulman, B. N.; Moore, J.; Averill, C.; Abramoff, R. Z.; Bradford, M.; Classen, A. T.; Hartman, M. D.; Kivlin, S. N.; Luo, Y.; Mayes, M. A.; Morrison, E. W.; Riley, W. J.; Salazar, A.; Schimel, J.; Sridhar, B.; Tang, J.; Wang, G.; Wieder, W. R.

    2016-12-01

    Soil carbon (C) dynamics are crucial to understanding and predicting C cycle responses to global change and soil C modeling is a key tool for understanding these dynamics. While first order model structures have historically dominated this area, a recent proliferation of alternative model structures representing different assumptions about microbial activity and mineral protection is providing new opportunities to explore process uncertainties related to soil C dynamics. We conducted idealized simulations of soil C responses to warming and litter addition using models from five research groups that incorporated different sets of assumptions about processes governing soil C decomposition and stabilization. We conducted a meta-analysis of published warming and C addition experiments for comparison with simulations. Assumptions related to mineral protection and microbial dynamics drove strong differences among models. In response to C additions, some models predicted long-term C accumulation while others predicted transient increases that were counteracted by accelerating decomposition. In experimental manipulations, doubling litter addition did not change soil C stocks in studies spanning as long as two decades. This result agreed with simulations from models with strong microbial growth responses and limited mineral sorption capacity. In observations, warming initially drove soil C loss via increased CO2 production, but in some studies soil C rebounded and increased over decadal time scales. In contrast, all models predicted sustained C losses under warming. The disagreement with experimental results could be explained by physiological or community-level acclimation, or by warming-related changes in plant growth. In addition to the role of microbial activity, assumptions related to mineral sorption and protected C played a key role in driving long-term model responses. In general, simulations were similar in their initial responses to perturbations but diverged over

  18. Identification and comparison of aberrant key regulatory networks in breast, colon, liver, lung, and stomach cancers through methylome database analysis.

    PubMed

    Kim, Byungtak; Kang, Seongeun; Jeong, Gookjoo; Park, Sung-Bin; Kim, Sun Jung

    2014-01-01

    Aberrant methylation of specific CpG sites at the promoter is widely responsible for genesis and development of various cancer types. Even though the microarray-based methylome analyzing techniques have contributed to the elucidation of the methylation change at the genome-wide level, the identification of key methylation markers or top regulatory networks appearing common in highly incident cancers through comparison analysis is still limited. In this study, we in silico performed the genome-wide methylation analysis on each 10 sets of normal and cancer pairs of five tissues: breast, colon, liver, lung, and stomach. The methylation array covers 27,578 CpG sites, corresponding to 14,495 genes, and significantly hypermethylated or hypomethylated genes in the cancer were collected (FDR adjusted p-value <0.05; methylation difference >0.3). Analysis of the dataset confirmed the methylation of previously known methylation markers and further identified novel methylation markers, such as GPX2, CLDN15, and KL. Cluster analysis using the methylome dataset resulted in a diagram with a bipartite mode distinguishing cancer cells from normal cells regardless of tissue types. The analysis further revealed that breast cancer was closest with lung cancer, whereas it was farthest from colon cancer. Pathway analysis identified that either the "cancer" related network or the "cancer" related bio-function appeared as the highest confidence in all the five cancers, whereas each cancer type represents its tissue-specific gene sets. Our results contribute toward understanding the essential abnormal epigenetic pathways involved in carcinogenesis. Further, the novel methylation markers could be applied to establish markers for cancer prognosis.

  19. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  20. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  1. Identification of key factors regulating self-renewal and differentiation in EML hematopoietic precursor cells by RNA-sequencing analysis.

    PubMed

    Zong, Shan; Deng, Shuyun; Chen, Kenian; Wu, Jia Qian

    2014-11-11

    Hematopoietic stem cells (HSCs) are used clinically for transplantation treatment to rebuild a patient's hematopoietic system in many diseases such as leukemia and lymphoma. Elucidating the mechanisms controlling HSCs self-renewal and differentiation is important for application of HSCs for research and clinical uses. However, it is not possible to obtain large quantity of HSCs due to their inability to proliferate in vitro. To overcome this hurdle, we used a mouse bone marrow derived cell line, the EML (Erythroid, Myeloid, and Lymphocytic) cell line, as a model system for this study. RNA-sequencing (RNA-Seq) has been increasingly used to replace microarray for gene expression studies. We report here a detailed method of using RNA-Seq technology to investigate the potential key factors in regulation of EML cell self-renewal and differentiation. The protocol provided in this paper is divided into three parts. The first part explains how to culture EML cells and separate Lin-CD34+ and Lin-CD34- cells. The second part of the protocol offers detailed procedures for total RNA preparation and the subsequent library construction for high-throughput sequencing. The last part describes the method for RNA-Seq data analysis and explains how to use the data to identify differentially expressed transcription factors between Lin-CD34+ and Lin-CD34- cells. The most significantly differentially expressed transcription factors were identified to be the potential key regulators controlling EML cell self-renewal and differentiation. In the discussion section of this paper, we highlight the key steps for successful performance of this experiment. In summary, this paper offers a method of using RNA-Seq technology to identify potential regulators of self-renewal and differentiation in EML cells. The key factors identified are subjected to downstream functional analysis in vitro and in vivo.

  2. Identification of Key Factors Regulating Self-renewal and Differentiation in EML Hematopoietic Precursor Cells by RNA-sequencing Analysis

    PubMed Central

    Chen, Kenian; Wu, Jia Qian

    2014-01-01

    Hematopoietic stem cells (HSCs) are used clinically for transplantation treatment to rebuild a patient's hematopoietic system in many diseases such as leukemia and lymphoma. Elucidating the mechanisms controlling HSCs self-renewal and differentiation is important for application of HSCs for research and clinical uses. However, it is not possible to obtain large quantity of HSCs due to their inability to proliferate in vitro. To overcome this hurdle, we used a mouse bone marrow derived cell line, the EML (Erythroid, Myeloid, and Lymphocytic) cell line, as a model system for this study. RNA-sequencing (RNA-Seq) has been increasingly used to replace microarray for gene expression studies. We report here a detailed method of using RNA-Seq technology to investigate the potential key factors in regulation of EML cell self-renewal and differentiation. The protocol provided in this paper is divided into three parts. The first part explains how to culture EML cells and separate Lin-CD34+ and Lin-CD34- cells. The second part of the protocol offers detailed procedures for total RNA preparation and the subsequent library construction for high-throughput sequencing. The last part describes the method for RNA-Seq data analysis and explains how to use the data to identify differentially expressed transcription factors between Lin-CD34+ and Lin-CD34- cells. The most significantly differentially expressed transcription factors were identified to be the potential key regulators controlling EML cell self-renewal and differentiation. In the discussion section of this paper, we highlight the key steps for successful performance of this experiment. In summary, this paper offers a method of using RNA-Seq technology to identify potential regulators of self-renewal and differentiation in EML cells. The key factors identified are subjected to downstream functional analysis in vitro and in vivo. PMID:25407807

  3. Quantum key distribution for composite dimensional finite systems

    NASA Astrophysics Data System (ADS)

    Shalaby, Mohamed; Kamal, Yasser

    2017-06-01

    The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.

  4. Tropical Rainfall Analysis Using TRMM in Combination With Other Satellite Gauge Data: Comparison with Global Precipitation Climatology Project (GPCP) Results

    NASA Technical Reports Server (NTRS)

    Adler, Robert F.; Huffman, George J.; Bolvin, David; Nelkin, Eric; Curtis, Scott

    1999-01-01

    This paper describes recent results of using Tropical Rainfall Measuring Mission (TRMM) information as the key calibration tool in a merged analysis on a 1 deg x 1 deg latitude/longitude monthly scale based on multiple satellite sources and raingauge analysis. The procedure used to produce the GPCP data set is a stepwise approach which first combines the satellite low-orbit microwave and geosynchronous IR observations into a "multi-satellite" product and than merges that result with the raingauge analysis. Preliminary results produced with the still-stabilizing TRMM algorithms indicate that TRMM shows tighter spatial gradients in tropical rain maxima with higher peaks in the center of the maxima. The TRMM analyses will be used to evaluate the evolution of the 1998 ENSO variations, again in comparison with the GPCP analyses.

  5. Feasibility of satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.

    2009-04-01

    In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).

  6. Weighted Key Player Problem for Social Network Analysis

    DTIC Science & Technology

    2011-03-01

    the degree of the actor, the number of adjacent neighbors, to de - termine its centrality value. Introduced in its current form by Freeman, a node’s...identifying individuals who are key in a number of contexts. This chapter developed the WKPP-Pos measure that allows for the inclusion of actor and...Techniques were de - 44 veloped for using the p-median to find optimal solutions to the WKPP-Pos measure and for using hierarchical clustering as a

  7. New national curricula guidelines that support the use of interprofessional education in the Brazilian context: An analysis of key documents.

    PubMed

    Freire Filho, José Rodrigues; Viana Da Costa, Marcelo; Forster, Aldaísa Cassanho; Reeves, Scott

    2017-11-01

    The National Curricular Guidelines (NCGs) are important documents for understanding the history of academic health professions education in Brazil. Key policies within the NCGs have helped to reorient health professions education and have stimulated curricular changes, including active learning methodologies and more integrated teaching-service environments, and, more recently, have introduced interprofessional education (IPE) in both undergraduate and postgraduate sectors. This article presents the findings of a study that examined the NCGs for nursing, dentistry, and medicine courses as juridical foundations for adopting strategies that promote IPE across higher education institutions in Brazil. We employed a comparative and exploratory documentary analysis to understand the role of IPE and collaborative practices in NCGs for the three largest professions in Brazil. Following a thematic analysis of these texts, four key themes emerged: faculty development; competencies for teamwork; curricular structure; and learning metrics. Key findings related to each of these themes are presented and discussed in relation to the wider interprofessional literature. The article goes on to argue that the statements contained in the NCGs about adoption of IPE and collaborative practices will have an important influence in shaping the future of health professions education in Brazil.

  8. RAPD analysis of the last population of a likely Florida Keys endemic cactus

    Treesearch

    D.R. Gordon; Thomas L. Kubisiak

    1998-01-01

    The semaphore cactus in the Florida Keys has until recently been considered a disjunct location of the Jamaican Opuntia spinosissima. Loss of all but one population in the Keys coupled with recent suggestions that the species should be taxonomically separated from the Jamaican cactus and is, therefore, a Florida Keys endemic, makes this population of conservation...

  9. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    NASA Astrophysics Data System (ADS)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    Over the past few decades, Scleractinian coral populations in the Florida Keys have increasingly experienced mortality due to bleaching events as well as microbial mediated illnesses such as black band and white band disease. Such pathologies seem to be most correlated with elevated sea surface temperatures, increased UV exposures, and shifts in the microbial community living on the coral itself. Recent studies indicate that corals’ exposure to UV in the Florida Keys is primarily controlled by the concentration of CDOM (Chromophoric Dissolved Organic Matter) in the water column. Further, microbial community alterations may be linked to changes in concentration and chemical composition of the larger DOM (Dissolved Organic Matter) pool. Our research characterized the spatial and temporal properties of DOM in Florida Bay and along the Keys ecosystems using DOC analyses, in-situ water column optical measurements, and spectral analyses including absorbance and fluorescence measurements. We analyzed DOM characteristics along transects running from the mouth of the Shark River at the southwest base of the Everglades, through Florida Bay, and along near-shore Keys coastal waters. Two 12 hour time-series samplings were also performed at the Seven-Mile Bridge, the primary Florida Bay discharge channel to the lower Keys region. Photo-bleaching experiments showed that the chemical characteristics of the DOM pool are altered by exposure to solar radiation. Results also show that DOC (~0.8-5.8 mg C/L) and CDOM (~0.5-16.5 absorbance coefficient at 305nm) concentrations exhibit seasonal fluctuations in our study region. EEM analyses suggest seasonal transitions between primarily marine (summer) and terrestrial (winter) sources along the Keys. We are currently combining EEM-PARAFAC analysis with in-situ optical measurements to model changes in the spectral properties of DOM in the water column. Additionally, we are using stable δ13C isotopic analysis to further characterize DOM

  10. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  11. Nonnegative constraint analysis of key fluorophores within human breast cancer using native fluorescence spectroscopy excited by selective wavelength of 300 nm

    NASA Astrophysics Data System (ADS)

    Pu, Yang; Sordillo, Laura A.; Alfano, Robert R.

    2015-03-01

    Native fluorescence spectroscopy offers an important role in cancer discrimination. It is widely acknowledged that the emission spectrum of tissue is a superposition of spectra of various salient fluorophores. In this study, the native fluorescence spectra of human cancerous and normal breast tissues excited by selected wavelength of 300 nm are used to investigate the key building block fluorophores: tryptophan and reduced nicotinamide adenine dinucleotide (NADH). The basis spectra of these key fluorophores' contribution to the tissue emission spectra are obtained by nonnegative constraint analysis. The emission spectra of human cancerous and normal tissue samples are projected onto the fluorophore spectral subspace. Since previous studies indicate that tryptophan and NADH are key fluorophores related with tumor evolution, it is essential to obtain their information from tissue fluorescence but discard the redundancy. To evaluate the efficacy of for cancer detection, linear discriminant analysis (LDA) classifier is used to evaluate the sensitivity, and specificity. This research demonstrates that the native fluorescence spectroscopy measurements are effective to detect changes of fluorophores' compositions in tissues due to the development of cancer.

  12. A new UKIDSS proper motion survey and key early results, including new benchmark systems

    NASA Astrophysics Data System (ADS)

    Smith, L.; Lucas, P.; Burningham, B.; Jones, H.; Pinfield, D.; Smart, R.; Andrei, A.

    We present a proper motion catalogue for the 1500 deg2 of 2 epoch J-band UKIDSS Large Area Survey (LAS) data, which includes 120,000 stellar sources with motions detected above the 5sigma level. Our upper limit on proper motion detection is 3\\farcs3 yr-1 and typical uncertainties are of order 10 mas yr-1 for bright sources from data with a modest 1.8-7.0 year epoch baseline. We developed a bespoke proper motion pipeline which applies a source-unique second order polynomial transformation to UKIDSS array coordinates to counter potential local non-uniformity in the focal plane. Our catalogue agrees well with the proper motion data supplied in the current WFCAM Science Archive (WSA) tenth data release (DR10) catalogue where there is overlap, and in various optical catalogues, but it benefits from some improvements, such as a larger matching radius and relative to absolute proper motion correction. We present proper motion results for 128 T dwarfs in the UKIDSS LAS and key early results of projects utilising our catalogue, in particular searches for brown dwarf benchmark systems through cross matches with existing proper motion catalogues. We report the discovery of two new T dwarf benchmark systems.

  13. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  14. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  15. A Novel Multiple-Access Correlation-Delay-Shift-Keying

    NASA Astrophysics Data System (ADS)

    Duan, J. Y.; Jiang, G. P.; Yang, H.

    In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).

  16. A fast image matching algorithm based on key points

    NASA Astrophysics Data System (ADS)

    Wang, Huilin; Wang, Ying; An, Ru; Yan, Peng

    2014-05-01

    Image matching is a very important technique in image processing. It has been widely used for object recognition and tracking, image retrieval, three-dimensional vision, change detection, aircraft position estimation, and multi-image registration. Based on the requirements of matching algorithm for craft navigation, such as speed, accuracy and adaptability, a fast key point image matching method is investigated and developed. The main research tasks includes: (1) Developing an improved celerity key point detection approach using self-adapting threshold of Features from Accelerated Segment Test (FAST). A method of calculating self-adapting threshold was introduced for images with different contrast. Hessian matrix was adopted to eliminate insecure edge points in order to obtain key points with higher stability. This approach in detecting key points has characteristics of small amount of computation, high positioning accuracy and strong anti-noise ability; (2) PCA-SIFT is utilized to describe key point. 128 dimensional vector are formed based on the SIFT method for the key points extracted. A low dimensional feature space was established by eigenvectors of all the key points, and each eigenvector was projected onto the feature space to form a low dimensional eigenvector. These key points were re-described by dimension-reduced eigenvectors. After reducing the dimension by the PCA, the descriptor was reduced to 20 dimensions from the original 128. This method can reduce dimensions of searching approximately near neighbors thereby increasing overall speed; (3) Distance ratio between the nearest neighbour and second nearest neighbour searching is regarded as the measurement criterion for initial matching points from which the original point pairs matched are obtained. Based on the analysis of the common methods (e.g. RANSAC (random sample consensus) and Hough transform cluster) used for elimination false matching point pairs, a heuristic local geometric restriction

  17. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  18. Channel analysis for single photon underwater free space quantum key distribution.

    PubMed

    Shi, Peng; Zhao, Shi-Cheng; Gu, Yong-Jian; Li, Wen-Dong

    2015-03-01

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate, and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  19. Consensus building for interlaboratory studies, key comparisons, and meta-analysis

    NASA Astrophysics Data System (ADS)

    Koepke, Amanda; Lafarge, Thomas; Possolo, Antonio; Toman, Blaza

    2017-06-01

    Interlaboratory studies in measurement science, including key comparisons, and meta-analyses in several fields, including medicine, serve to intercompare measurement results obtained independently, and typically produce a consensus value for the common measurand that blends the values measured by the participants. Since interlaboratory studies and meta-analyses reveal and quantify differences between measured values, regardless of the underlying causes for such differences, they also provide so-called ‘top-down’ evaluations of measurement uncertainty. Measured values are often substantially over-dispersed by comparison with their individual, stated uncertainties, thus suggesting the existence of yet unrecognized sources of uncertainty (dark uncertainty). We contrast two different approaches to take dark uncertainty into account both in the computation of consensus values and in the evaluation of the associated uncertainty, which have traditionally been preferred by different scientific communities. One inflates the stated uncertainties by a multiplicative factor. The other adds laboratory-specific ‘effects’ to the value of the measurand. After distinguishing what we call recipe-based and model-based approaches to data reductions in interlaboratory studies, we state six guiding principles that should inform such reductions. These principles favor model-based approaches that expose and facilitate the critical assessment of validating assumptions, and give preeminence to substantive criteria to determine which measurement results to include, and which to exclude, as opposed to purely statistical considerations, and also how to weigh them. Following an overview of maximum likelihood methods, three general purpose procedures for data reduction are described in detail, including explanations of how the consensus value and degrees of equivalence are computed, and the associated uncertainty evaluated: the DerSimonian-Laird procedure; a hierarchical Bayesian

  20. Key Elements of a Family Intervention for Schizophrenia: A Qualitative Analysis of an RCT.

    PubMed

    Grácio, Jaime; Gonçalves-Pereira, Manuel; Leff, Julian

    2018-03-01

    Schizophrenia is a complex biopsychosocial condition in which expressed emotion in family members is a robust predictor of relapse. Not surprisingly, family interventions are remarkably effective and thus recommended in current treatment guidelines. Their key elements seem to be common therapeutic factors, followed by education and coping skills training. However, few studies have explored these key elements and the process of the intervention itself. We conducted a qualitative and quantitative analysis of the records from a pioneering family intervention trial addressing expressed emotion, published by Leff and colleagues four decades ago. Records were analyzed into categories and data explored using descriptive statistics. This was complemented by a narrative evaluation using an inductive approach based on emotional markers and markers of change. The most used strategies in the intervention were addressing needs, followed by coping skills enhancement, advice, and emotional support. Dealing with overinvolvement and reframing were the next most frequent. Single-family home sessions seemed to augment the therapeutic work conducted in family groups. Overall the intervention seemed to promote cognitive and emotional change in the participants, and therapists were sensitive to the emotional trajectory of each subject. On the basis of our findings, we developed a longitudinal framework for better understanding the process of this treatment approach. © 2016 Family Process Institute.

  1. Passive decoy-state quantum key distribution with practical light sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Curty, Marcos; Ma, Xiongfeng; Qi, Bing

    2010-02-15

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simplemore » threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.« less

  2. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  3. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  4. Identifying key hospital service quality factors in online health communities.

    PubMed

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  5. Continuous-variable quantum key distribution with 1 Mbps secure key rate.

    PubMed

    Huang, Duan; Lin, Dakai; Wang, Chao; Liu, Weiqi; Fang, Shuanghong; Peng, Jinye; Huang, Peng; Zeng, Guihua

    2015-06-29

    We report the first continuous-variable quantum key distribution (CVQKD) experiment to enable the creation of 1 Mbps secure key rate over 25 km standard telecom fiber in a coarse wavelength division multiplexers (CWDM) environment. The result is achieved with two major technological advances: the use of a 1 GHz shot-noise-limited homodyne detector and the implementation of a 50 MHz clock system. The excess noise due to noise photons from local oscillator and classical data channels in CWDM is controlled effectively. We note that the experimental verification of high-bit-rate CVQKD in the multiplexing environment is a significant step closer toward large-scale deployment in fiber networks.

  6. The Digital Thread as the Key Enabler

    DTIC Science & Technology

    2016-11-01

    17 Defense AT&L: November-December 2016 The Digital Thread as the Key Enabler Col. Keith Bearden, USAF Bearden is the deputy director of...enabling you to do your job better, faster and cheaper. There is one initiative, the key enabler, to accomplish this goal—the digital thread . But let’s... process that would allow for rapid cross- domain analysis and technology transition prior to bending metal. • Re-establish a culture of “hands-on

  7. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  8. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  9. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  10. A Statewide Key Informant Survey and Social Indicators Analysis.

    ERIC Educational Resources Information Center

    Fleischer, Mitchell

    This needs assessment study of mental health needs of the elderly in Pennsylvania used a three-part approach. These parts were a review of existing data sources, an extensive key informant study, and a review of service delivery models. A recent study found a prevalence rate for mental illness in the elderly of 12.8%, more than 5% lower than the…

  11. 46 CFR 164.007-7 - Analysis of results.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 6 2013-10-01 2013-10-01 false Analysis of results. 164.007-7 Section 164.007-7...: SPECIFICATIONS AND APPROVAL MATERIALS Structural Insulations § 164.007-7 Analysis of results. (a) When only one sample is tested, the results of the test shall be binding and no analysis by the Coast Guard will be...

  12. 46 CFR 164.007-7 - Analysis of results.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Analysis of results. 164.007-7 Section 164.007-7...: SPECIFICATIONS AND APPROVAL MATERIALS Structural Insulations § 164.007-7 Analysis of results. (a) When only one sample is tested, the results of the test shall be binding and no analysis by the Coast Guard will be...

  13. 46 CFR 164.007-7 - Analysis of results.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 6 2011-10-01 2011-10-01 false Analysis of results. 164.007-7 Section 164.007-7...: SPECIFICATIONS AND APPROVAL MATERIALS Structural Insulations § 164.007-7 Analysis of results. (a) When only one sample is tested, the results of the test shall be binding and no analysis by the Coast Guard will be...

  14. 46 CFR 164.007-7 - Analysis of results.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 6 2012-10-01 2012-10-01 false Analysis of results. 164.007-7 Section 164.007-7...: SPECIFICATIONS AND APPROVAL MATERIALS Structural Insulations § 164.007-7 Analysis of results. (a) When only one sample is tested, the results of the test shall be binding and no analysis by the Coast Guard will be...

  15. 46 CFR 164.007-7 - Analysis of results.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 6 2014-10-01 2014-10-01 false Analysis of results. 164.007-7 Section 164.007-7...: SPECIFICATIONS AND APPROVAL MATERIALS Structural Insulations § 164.007-7 Analysis of results. (a) When only one sample is tested, the results of the test shall be binding and no analysis by the Coast Guard will be...

  16. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  17. Current Status of the LOFAR EoR Key Science Project

    NASA Astrophysics Data System (ADS)

    Koopmans, L. V. E.; LOFAR EoR KSP Team

    2018-05-01

    A short status update on the LOFAR Epoch of Reionization (EoR) Key Science Project (KSP) is given, regarding data acquisition, data processing and analysis, and current power-spectrum limits on the redshifted 21-cm signal of neutral hydrogen at redshifts z = 8 - 10. With caution, we present a preliminary astrophysical analysis of ~60 hr of processed LOFAR data and their resulting power spectrum, showing that potentially already interesting limits on X-ray heating during the Cosmic Dawn can already be gained. This is by no means the final analysis of this sub-set of data, but illustrates the future potential when all nearly 3000 hr of data in hand on two EoR windows will have been processed.

  18. An Analysis of the Contents and Pedagogy of Al-Kashi's 1427 "Key to Arithmetic" (Miftah Al-Hisab)

    ERIC Educational Resources Information Center

    Ta'ani, Osama Hekmat

    2011-01-01

    Al-Kashi's 1427 "Key to Arithmetic" had important use over several hundred years in mathematics teaching in Medieval Islam throughout the time of the Ottoman Empire. Its pedagogical features have never been studied before. In this dissertation I have made a close pedagogical analysis of these features and discovered several teaching…

  19. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  20. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  1. Keeping the Vision in Front of You: Results from Smart Start Key Participant Interviews.

    ERIC Educational Resources Information Center

    Bryant, Donna; Adkins, Amee

    Smart Start is North Carolina's partnership between state government and local leaders, service providers, and families to better serve children under 6 years of age and their families. Interviews were conducted to ascertain the impressions, attitudes, and advice of 55 key participants in the 12 pioneer Smart Start counties. The interviews were…

  2. The Psychedelic Debriefing in Alcohol Dependence Treatment: Illustrating Key Change Phenomena through Qualitative Content Analysis of Clinical Sessions

    PubMed Central

    Nielson, Elizabeth M.; May, Darrick G.; Forcehimes, Alyssa A.; Bogenschutz, Michael P.

    2018-01-01

    Research on the clinical applications of psychedelic-assisted psychotherapy has demonstrated promising early results for treatment of alcohol dependence. Detailed description of the content and methods of psychedelic-assisted psychotherapy, as it is conducted in clinical settings, is scarce. Methods: An open-label pilot (proof-of-concept) study of psilocybin-assisted treatment of alcohol dependence (NCT01534494) was conducted to generate data for a phase 2 RCT (NCT02061293) of a similar treatment in a larger population. The present paper presents a qualitative content analysis of the 17 debriefing sessions conducted in the pilot study, which occurred the day after corresponding psilocybin medication sessions. Results: Participants articulated a series of key phenomena related to change in drinking outcomes and acute subjective effects of psilocybin. Discussion: The data illuminate change processes in patients' own words during clinical sessions, shedding light on potential therapeutic mechanisms of change and how participants express effects of psilocybin. This study is unique in analyzing actual clinical sessions, as opposed to interviews of patients conducted separately from treatment. PMID:29515449

  3. KEY COMPARISON: CCQM-K21 Key Comparison Determination of pp’-DDT in fish oil

    NASA Astrophysics Data System (ADS)

    Webb, K. S.; Carter, D.; Wolff Briche, C. S. J.

    2003-01-01

    A key comparison on the determination of (pp'-dichlorodiphenyl) trichloroethane (pp'-DDT) in a fish oil matrix has been successfully completed. Nine NMIs participated in this key comparison and used the technique of isotope dilution gas-chromatography mass spectrometry (ID/GC/MS) for the determinations. Two samples (A and B) of fish oil were distributed to participants, each gravimetrically spiked with pp'-DDT. The KCRV for Sample A is 0.0743 +/- 0.0020 µg g-1 and that of Sample B is 0.1655 +/- 0.0014 µg g-1 of pp'-DDT in fish oil. The results for Sample A showed a RSD of 3.5%, the RSD for Sample B was within 1%. These results were an improvement over those of the corresponding pilot study (CCQM-P21), where at a mass fraction of pp'-DDT in fish oil of 0.311 µg g-1 the RSD was 2.6%. The compound pp'-DDT is a typical organochlorine pesticide and this key comparison has shown that NMIs have the ability to measure such compounds at levels typically found in the environment. The compound (pp'-dichlorodiphenyl) dichloroethylene (pp'-DDE), a metabolite of pp'-DDT, was the subject of a previous key comparison (CCQM-K5). The compound pp'-DDT is technically more challenging than that of pp'-DDE since it can decompose during the measurement procedure. Consequently the success of this key comparison, combined with that of CCQM-K5 demonstrates a broad measurement capability by NMIs for organochlorine compounds in the environment. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the Mutual Recognition Arrangement (MRA).

  4. The Key to Life Nutrition Program: results from a community-based dietary sodium reduction trial

    PubMed Central

    Robare, Joseph F; Milas, N Carole; Bayles, Constance M; Williams, Kathy; Newman, Anne B; Lovalekar, Mita T; Boudreau, Robert; McTigue, Kathleen; Albert, Steven M; Kuller, Lewis H

    2016-01-01

    Objective Evaluation of a dietary Na reduction trial in a community setting. Design Community-based randomized trial. Ten-week nutrition intervention activities focused on lifestyle modification to decrease dietary Na intake, under the supervision of a registered dietitian. Twenty-four hour urine specimens were collected at baseline and follow-up visits to determine 24 h urinary Na excretion. Setting The University of Pittsburgh Center for Healthy Aging, Key to Life Nutrition Program. Subjects Hypertensive adults at least 65 years of age. Results Mean age of participants was 75 years. Twenty-four hour mean urinary Na excretion at baseline was 3174 mg/d. This reduced to 2944 mg/d (P = 0·30) and 2875 mg/d (P ≤ 0·03) at 6-and 12-month follow-ups, respectively. In a sub-sample (urine volume of ≥ 1000 ml, baseline to 12 months), mean urinary Na excretion decreased from 3220 mg/d to 2875 mg/d (P ≤ 0·02). Conclusions Significant reductions in mean 24 h urinary Na were reported, but results fell short of the recommended guidelines of 1500 mg/d for at-risk individuals. Our results reiterate the difficulty in implementing these guidelines in community-based programmes. More aggressive public health efforts, food industry support and health policy changes are needed to decrease Na levels in older adults to the recommended guidelines. PMID:19781124

  5. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  6. Principles of visual key construction-with a visual identification key to the Fagaceae of the southeastern United States.

    PubMed

    Kirchoff, Bruce K; Leggett, Roxanne; Her, Va; Moua, Chue; Morrison, Jessica; Poole, Chamika

    2011-01-01

    Advances in digital imaging have made possible the creation of completely visual keys. By a visual key we mean a key based primarily on images, and that contains a minimal amount of text. Characters in visual keys are visually, not verbally defined. In this paper we create the first primarily visual key to a group of taxa, in this case the Fagaceae of the southeastern USA. We also modify our recently published set of best practices for image use in illustrated keys to make them applicable to visual keys. Photographs of the Fagaceae were obtained from internet and herbarium databases or were taken specifically for this project. The images were printed and then sorted into hierarchical groups. These hierarchical groups of images were used to create the 'couplets' in the key. A reciprocal process of key creation and testing was used to produce the final keys. Four keys were created, one for each of the parts-leaves, buds, fruits and bark. Species description pages consisting of multiple images were also created for each of the species in the key. Creation and testing of the key resulted in a modified list of best practices for image use visual keys. The inclusion of images into paper and electronic keys has greatly increased their ease of use. However, virtually all of these keys are still based upon verbally defined, atomistic characters. The creation of primarily visual keys allows us to overcome the well-known limitations of linguistic-based characters and create keys that are much easier to use, especially for botanical novices.

  7. Sarma-based key-group method for rock slope reliability analyses

    NASA Astrophysics Data System (ADS)

    Yarahmadi Bafghi, A. R.; Verdel, T.

    2005-08-01

    The methods used in conducting static stability analyses have remained pertinent to this day for reasons of both simplicity and speed of execution. The most well-known of these methods for purposes of stability analysis of fractured rock masses is the key-block method (KBM).This paper proposes an extension to the KBM, called the key-group method (KGM), which combines not only individual key-blocks but also groups of collapsable blocks into an iterative and progressive analysis of the stability of discontinuous rock slopes. To take intra-group forces into account, the Sarma method has been implemented within the KGM in order to generate a Sarma-based KGM, abbreviated SKGM. We will discuss herein the hypothesis behind this new method, details regarding its implementation, and validation through comparison with results obtained from the distinct element method.Furthermore, as an alternative to deterministic methods, reliability analyses or probabilistic analyses have been proposed to take account of the uncertainty in analytical parameters and models. The FOSM and ASM probabilistic methods could be implemented within the KGM and SKGM framework in order to take account of the uncertainty due to physical and mechanical data (density, cohesion and angle of friction). We will then show how such reliability analyses can be introduced into SKGM to give rise to the probabilistic SKGM (PSKGM) and how it can be used for rock slope reliability analyses. Copyright

  8. Analysis of Unmanned Aerial Vehicle (UAV) hyperspectral remote sensing monitoring key technology in coastal wetland

    NASA Astrophysics Data System (ADS)

    Ma, Yi; Zhang, Jie; Zhang, Jingyu

    2016-01-01

    The coastal wetland, a transitional zone between terrestrial ecosystems and marine ecosystems, is the type of great value to ecosystem services. For the recent 3 decades, area of the coastal wetland is decreasing and the ecological function is gradually degraded with the rapid development of economy, which restricts the sustainable development of economy and society in the coastal areas of China in turn. It is a major demand of the national reality to carry out the monitoring of coastal wetlands, to master the distribution and dynamic change. UAV, namely unmanned aerial vehicle, is a new platform for remote sensing. Compared with the traditional satellite and manned aerial remote sensing, it has the advantage of flexible implementation, no cloud cover, strong initiative and low cost. Image-spectrum merging is one character of high spectral remote sensing. At the same time of imaging, the spectral curve of each pixel is obtained, which is suitable for quantitative remote sensing, fine classification and target detection. Aimed at the frontier and hotspot of remote sensing monitoring technology, and faced the demand of the coastal wetland monitoring, this paper used UAV and the new remote sensor of high spectral imaging instrument to carry out the analysis of the key technologies of monitoring coastal wetlands by UAV on the basis of the current situation in overseas and domestic and the analysis of developing trend. According to the characteristic of airborne hyperspectral data on UAV, that is "three high and one many", the key technology research that should develop are promoted as follows: 1) the atmosphere correction of the UAV hyperspectral in coastal wetlands under the circumstance of complex underlying surface and variable geometry, 2) the best observation scale and scale transformation method of the UAV platform while monitoring the coastal wetland features, 3) the classification and detection method of typical features with high precision from multi scale

  9. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    NASA Astrophysics Data System (ADS)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  10. Coherent one-way quantum key distribution

    NASA Astrophysics Data System (ADS)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  11. Experimental demonstration of counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Ren, M.; Wu, G.; Wu, E.; Zeng, H.

    2011-04-01

    Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We experimentally realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 97.4%. According to the security analysis, the system was robust against the photon-number-splitting attack. The article is published in the original.

  12. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  13. [Key informers. When and How?].

    PubMed

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  14. Pricing and components analysis of some key essential pediatric medicine in Odisha state.

    PubMed

    Samal, Satyajit; Swain, Trupti Rekha

    2017-01-01

    Study highlighting prices, i.e., the patients actually pay at ground level is important for interventions such as alternate procurement schemes or to expedite regulatory assessment of essential medicines for children. The present study was undertaken to study pricing and component analysis of few key essential medicines in Odisha state. Six child-specific medicines of different formulations were selected based on use in different disease condition and having widest pricing variation. Data were collected, entered, and analyzed in the price components data collection form of the World Health Organization-Health Action International (WHO-HAI) 2007 Workbook version 5 - Part II provided as part of the WHO/HAI methodology. The analysis includes the cumulative percent markup, total cumulative percent markup, and percent contribution of individual components to the final medicine price in both public and private sector of Odisha state. Add-on costs such as taxes, wholesale, and retail markups contribute substantially to the final price of medicines in private sector, particularly for branded-generic products. The largest contributor to add-on costs is at the level of retailer shop. Policy should be framed to achieve a greater transparency and uniformity of the pricing of medicines at different health sectors of Odisha.

  15. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 2001.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This report presents an overview of the key findings from the Monitoring the Future 2001 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  16. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2002.

    ERIC Educational Resources Information Center

    Michigan Univ., Ann Arbor. Inst. for Social Research.

    This report presents an overview of the key findings from the Monitoring the Future 2002 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  17. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  18. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    NASA Technical Reports Server (NTRS)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  19. Quantum key distribution without the wavefunction

    NASA Astrophysics Data System (ADS)

    Niestegge, Gerd

    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.

  20. Communication scheme using a hyperchaotic semiconductor laser model: Chaos shift key revisited

    NASA Astrophysics Data System (ADS)

    Fataf, N. A. A.; Palit, Sanjay Kumar; Mukherjee, Sayan; Said, M. R. M.; Son, Doan Hoai; Banerjee, Santo

    2017-11-01

    Based on the Maxwell-Bloch equations, we considered a five-dimensional ODE system, describing the dynamics of a semiconductor laser. The system has rich dynamics with multi-periodic, chaotic and hyperchaotic states. In this analysis, we have investigated the hyperchaotic nature of the aforesaid model and proposed a communication scheme, the generalized form of chaos shift keys, where the coupled systems do not need to be in the synchronized state. The results are implemented with the hyperchaotic laser model followed by a comprehensive security analysis.

  1. Entropy driven key-lock assembly.

    PubMed

    Odriozola, G; Jiménez-Angeles, F; Lozada-Cassou, M

    2008-09-21

    The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism: There exists trajectories through which the key-lock pair could assemble avoiding trespassing potential barriers. Hence, solely the entropic contribution can induce their self-assembling even in the absence of attractive forces. This study points out the solvent contribution within the underlying mechanisms of substrate-protein assemblydisassembly processes, which are important steps of the enzyme catalysis and protein mediated transport.

  2. Entropy driven key-lock assembly

    NASA Astrophysics Data System (ADS)

    Odriozola, G.; Jiménez-Ángeles, F.; Lozada-Cassou, M.

    2008-09-01

    The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism: There exists trajectories through which the key-lock pair could assemble avoiding trespassing potential barriers. Hence, solely the entropic contribution can induce their self-assembling even in the absence of attractive forces. This study points out the solvent contribution within the underlying mechanisms of substrate-protein assembly/disassembly processes, which are important steps of the enzyme catalysis and protein mediated transport.

  3. Systematic Prioritization and Integrative Analysis of Copy Number Variations in Schizophrenia Reveal Key Schizophrenia Susceptibility Genes

    PubMed Central

    Luo, Xiongjian; Huang, Liang; Han, Leng; Luo, Zhenwu; Hu, Fang; Tieu, Roger; Gan, Lin

    2014-01-01

    Schizophrenia is a common mental disorder with high heritability and strong genetic heterogeneity. Common disease-common variants hypothesis predicts that schizophrenia is attributable in part to common genetic variants. However, recent studies have clearly demonstrated that copy number variations (CNVs) also play pivotal roles in schizophrenia susceptibility and explain a proportion of missing heritability. Though numerous CNVs have been identified, many of the regions affected by CNVs show poor overlapping among different studies, and it is not known whether the genes disrupted by CNVs contribute to the risk of schizophrenia. By using cumulative scoring, we systematically prioritized the genes affected by CNVs in schizophrenia. We identified 8 top genes that are frequently disrupted by CNVs, including NRXN1, CHRNA7, BCL9, CYFIP1, GJA8, NDE1, SNAP29, and GJA5. Integration of genes affected by CNVs with known schizophrenia susceptibility genes (from previous genetic linkage and association studies) reveals that many genes disrupted by CNVs are also associated with schizophrenia. Further protein-protein interaction (PPI) analysis indicates that protein products of genes affected by CNVs frequently interact with known schizophrenia-associated proteins. Finally, systematic integration of CNVs prioritization data with genetic association and PPI data identifies key schizophrenia candidate genes. Our results provide a global overview of genes impacted by CNVs in schizophrenia and reveal a densely interconnected molecular network of de novo CNVs in schizophrenia. Though the prioritized top genes represent promising schizophrenia risk genes, further work with different prioritization methods and independent samples is needed to confirm these findings. Nevertheless, the identified key candidate genes may have important roles in the pathogenesis of schizophrenia, and further functional characterization of these genes may provide pivotal targets for future therapeutics and

  4. One Step Quantum Key Distribution Based on EPR Entanglement.

    PubMed

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  5. Test 6, Test 7, and Gas Standard Analysis Results

    NASA Technical Reports Server (NTRS)

    Perez, Horacio, III

    2007-01-01

    This viewgraph presentation shows results of analyses on odor, toxic off gassing and gas standards. The topics include: 1) Statistical Analysis Definitions; 2) Odor Analysis Results NASA Standard 6001 Test 6; 3) Toxic Off gassing Analysis Results NASA Standard 6001 Test 7; and 4) Gas Standard Results NASA Standard 6001 Test 7;

  6. Long-distance practical quantum key distribution by entanglement swapping.

    PubMed

    Scherer, Artur; Sanders, Barry C; Tittel, Wolfgang

    2011-02-14

    We develop a model for practical, entanglement-based long-distance quantum key distribution employing entanglement swapping as a key building block. Relying only on existing off-the-shelf technology, we show how to optimize resources so as to maximize secret key distribution rates. The tools comprise lossy transmission links, such as telecom optical fibers or free space, parametric down-conversion sources of entangled photon pairs, and threshold detectors that are inefficient and have dark counts. Our analysis provides the optimal trade-off between detector efficiency and dark counts, which are usually competing, as well as the optimal source brightness that maximizes the secret key rate for specified distances (i.e. loss) between sender and receiver.

  7. Measurement errors in voice-key naming latency for Hiragana.

    PubMed

    Yamada, Jun; Tamaoka, Katsuo

    2003-12-01

    This study makes explicit the limitations and possibilities of voice-key naming latency research on single hiragana symbols (a Japanese syllabic script) by examining three sets of voice-key naming data against Sakuma, Fushimi, and Tatsumi's 1997 speech-analyzer voice-waveform data. Analysis showed that voice-key measurement errors can be substantial in standard procedures as they may conceal the true effects of significant variables involved in hiragana-naming behavior. While one can avoid voice-key measurement errors to some extent by applying Sakuma, et al.'s deltas and by excluding initial phonemes which induce measurement errors, such errors may be ignored when test items are words and other higher-level linguistic materials.

  8. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  9. Security of quantum key distribution with iterative sifting

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos

    2018-01-01

    Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.

  10. Key ingredients of anti-stigma programs for health care providers: a data synthesis of evaluative studies.

    PubMed

    Knaak, Stephanie; Modgill, Geeta; Patten, Scott B

    2014-10-01

    As part of its ongoing effort to combat stigma against mental illness among health care providers, the Mental Health Commission of Canada partnered with organizations conducting anti-stigma interventions. Our objective was to evaluate program effectiveness and to better understand what makes some programs more effective than others. Our paper reports the elements of these programs found to be most strongly associated with favourable outcomes. Our study employed a multi-phased, mixed-methods design. First, a grounded theory qualitative study was undertaken to identify key program elements. Next, each program (n = 22) was coded according to the presence or absence of the identified key program ingredients. Then, random-effects, meta-regression modelling was used to examine the association between program outcomes and the key ingredients. The qualitative analysis led to a 6-ingredient model of key program elements. Results of the quantitative analysis showed that programs that included all 6 of these ingredients performed significantly better than those that did not. Individual analyses of each of the 6 ingredients showed that including multiple forms of social contact and emphasizing recovery were characteristics of the most effective programs. The results provide a validation of a 6-ingredient model of key program elements for anti-stigma programming for health care providers. Emphasizing recovery and including multiple types of social contact are of particular importance for maximizing the effectiveness of anti-stigma programs for health care providers.

  11. KEY COMPARISON: Final report on international key comparison CCQM-K53: Oxygen in nitrogen

    NASA Astrophysics Data System (ADS)

    Lee, Jeongsoon; Bok Lee, Jin; Moon, Dong Min; Seog Kim, Jin; van der Veen, Adriaan M. H.; Besley, Laurie; Heine, Hans-Joachim; Martin, Belén; Konopelko, L. A.; Kato, Kenji; Shimosaka, Takuya; Perez Castorena, Alejandro; Macé, Tatiana; Milton, Martin J. T.; Kelley, Mike; Guenther, Franklin; Botha, Angelique

    2010-01-01

    Gravimetry is used as the primary method for the preparation of primary standard gas mixtures in most national metrology institutes, and it requires the combined abilities of purity assessment, weighing technique and analytical skills. At the CCQM GAWG meeting in October 2005, it was agreed that KRISS should coordinate a key comparison, CCQM-K53, on the gravimetric preparation of gas, at a level of 100 µmol/mol of oxygen in nitrogen. KRISS compared the gravimetric value of each cylinder with an analytical instrument. A preparation for oxygen gas standard mixture requires particular care to be accurate, because oxygen is a major component of the atmosphere. Key issues for this comparison are related to (1) the gravimetric technique which needs at least two steps for dilution, (2) oxygen impurity in nitrogen, and (3) argon impurity in nitrogen. The key comparison reference value is obtained from the linear regression line (with origin) of a selected set of participants. The KCRV subset, except one, agree with each other. The standard deviation of the x-residuals of this group (which consists of NMIJ, VSL, NIST, NPL, BAM, KRISS and CENAM) is 0.056 µmol/mol and consistent with the uncertainties given to their standard mixtures. The standard deviation of the residuals of all participating laboratory is 0.182 µmol/mol. With respect to impurity analysis, overall argon amounts of the cylinders are in the region of about 3 µmol/mol however; four cylinders showed an argon amount fraction over 10 µmol/mol. Two of these are inconsistent with the KCRV subset. The explicit separation between two peaks of oxygen and argon in the GC chromatogram is essential to maintain analytical capability. Additionally oxygen impurity analysis in nitrogen is indispensable to ensure the preparative capability. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The

  12. Microarray analysis reveals key genes and pathways in Tetralogy of Fallot

    PubMed Central

    He, Yue-E; Qiu, Hui-Xian; Jiang, Jian-Bing; Wu, Rong-Zhou; Xiang, Ru-Lian; Zhang, Yuan-Hai

    2017-01-01

    The aim of the present study was to identify key genes that may be involved in the pathogenesis of Tetralogy of Fallot (TOF) using bioinformatics methods. The GSE26125 microarray dataset, which includes cardiovascular tissue samples derived from 16 children with TOF and five healthy age-matched control infants, was downloaded from the Gene Expression Omnibus database. Differential expression analysis was performed between TOF and control samples to identify differentially expressed genes (DEGs) using Student's t-test, and the R/limma package, with a log2 fold-change of >2 and a false discovery rate of <0.01 set as thresholds. The biological functions of DEGs were analyzed using the ToppGene database. The ReactomeFIViz application was used to construct functional interaction (FI) networks, and the genes in each module were subjected to pathway enrichment analysis. The iRegulon plugin was used to identify transcription factors predicted to regulate the DEGs in the FI network, and the gene-transcription factor pairs were then visualized using Cytoscape software. A total of 878 DEGs were identified, including 848 upregulated genes and 30 downregulated genes. The gene FI network contained seven function modules, which were all comprised of upregulated genes. Genes enriched in Module 1 were enriched in the following three neurological disorder-associated signaling pathways: Parkinson's disease, Alzheimer's disease and Huntington's disease. Genes in Modules 0, 3 and 5 were dominantly enriched in pathways associated with ribosomes and protein translation. The Xbox binding protein 1 transcription factor was demonstrated to be involved in the regulation of genes encoding the subunits of cytoplasmic and mitochondrial ribosomes, as well as genes involved in neurodegenerative disorders. Therefore, dysfunction of genes involved in signaling pathways associated with neurodegenerative disorders, ribosome function and protein translation may contribute to the pathogenesis of TOF

  13. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis).

    PubMed

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants' growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., 'Photosynthesis'), GO terms (e.g., 'response to karrikin') and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology.

  14. Analysis of the key enzymes of butyric and acetic acid fermentation in biogas reactors

    PubMed Central

    Gabris, Christina; Bengelsdorf, Frank R; Dürre, Peter

    2015-01-01

    This study aimed at the investigation of the mechanisms of acidogenesis, which is a key process during anaerobic digestion. To expose possible bottlenecks, specific activities of the key enzymes of acidification, such as acetate kinase (Ack, 0.23–0.99 U mg−1 protein), butyrate kinase (Buk, < 0.03 U mg−1 protein) and butyryl-CoA:acetate-CoA transferase (But, 3.24–7.64 U mg−1 protein), were determined in cell free extracts of biogas reactor content from three different biogas reactors. Furthermore, the detection of Ack was successful via Western blot analysis. Quantification of corresponding functional genes encoding Buk (buk) and But (but) was not feasible, although an amplification was possible. Thus, phylogenetic trees were constructed based on respective gene fragments. Four new clades of possible butyrate-producing bacteria were postulated, as well as bacteria of the genera Roseburia or Clostridium identified. The low Buk activity was in contrast to the high specific But activity in the analysed samples. Butyrate formation via Buk activity does barely occur in the investigated biogas reactor. Specific enzyme activities (Ack, Buk and But) in samples drawn from three different biogas reactors correlated with ammonia and ammonium concentrations (NH3 and NH4+-N), and a negative dependency can be postulated. Thus, high concentrations of NH3 and NH4+-N may lead to a bottleneck in acidogenesis due to decreased specific acidogenic enzyme activities. PMID:26086956

  15. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  16. Identification of the Key Genes and Pathways in Esophageal Carcinoma.

    PubMed

    Su, Peng; Wen, Shiwang; Zhang, Yuefeng; Li, Yong; Xu, Yanzhao; Zhu, Yonggang; Lv, Huilai; Zhang, Fan; Wang, Mingbo; Tian, Ziqiang

    2016-01-01

    Objective . Esophageal carcinoma (EC) is a frequently common malignancy of gastrointestinal cancer in the world. This study aims to screen key genes and pathways in EC and elucidate the mechanism of it. Methods . 5 microarray datasets of EC were downloaded from Gene Expression Omnibus. Differentially expressed genes (DEGs) were screened by bioinformatics analysis. Gene Ontology (GO) enrichment, Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment, and protein-protein interaction (PPI) network construction were performed to obtain the biological roles of DEGs in EC. Quantitative real-time polymerase chain reaction (qRT-PCR) was used to verify the expression level of DEGs in EC. Results . A total of 1955 genes were filtered as DEGs in EC. The upregulated genes were significantly enriched in cell cycle and the downregulated genes significantly enriched in Endocytosis. PPI network displayed CDK4 and CCT3 were hub proteins in the network. The expression level of 8 dysregulated DEGs including CDK4, CCT3, THSD4, SIM2, MYBL2, CENPF, CDCA3, and CDKN3 was validated in EC compared to adjacent nontumor tissues and the results were matched with the microarray analysis. Conclusion . The significantly DEGs including CDK4, CCT3, THSD4, and SIM2 may play key roles in tumorigenesis and development of EC involved in cell cycle and Endocytosis.

  17. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  18. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  19. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    PubMed

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  20. Determining barriers to creating an enabling environment in Cambodia: results from a baseline study with key populations and police.

    PubMed

    Schneiders, Mira L; Weissman, Amy

    2016-01-01

    Cambodian law enforcement's limited acceptance of harm reduction has hindered HIV program effectiveness. With funding from the Australian Department of Foreign Affairs and Trade, FHI 360 supported the Ministry of Interior to implement the Police Community Partnership Initiative (PCPI) in Cambodia's capital Phnom Penh. To guide this, FHI 360 conducted a baseline study examining police and key populations' attitudes and practices towards one another, including fear and occurrence of arrest. Between December 2012 and January 2013, a cross-sectional survey of 199 police post officers, 199 people who use drugs (PWUD) including people who inject drugs (PWID), 199 men who have sex with men (MSM), 200 transgender women (TGW) and 200 female entertainment workers (FEW) was conducted in five Phnom Penh districts. Eligible participants were ≥18 years, members of a key population from selected hotspots or police officers, deputy chiefs or chiefs. Key populations' median age was 25 years (IQR: 22-30); 40% had completed only primary school. Police were male (99.5%), with median age 43 years (IQR: 30 to 47), and 45 and 25% high school and university completion rates, respectively. Key populations feared arrest for carrying needles and syringes (67%), condoms (23%) and 19% felt afraid to access health services. Close to 75% of police reported body searching and 58% arresting key populations in the past six months for using drugs (64%), selling or distributing drugs (36%) or being violent (13%). Self-reported arrests (23% PWUD, 6% MSM, 6% TGW, 12% FEW; p<0.05), being verbally threatened (45% PWUD, 21% MSM, 25% TGW, 27% FEW; p<0.001) and body searched (44% PWUD, 28% MSM, 23% TGW, 8% FEW; p<0.001) was significantly higher among PWUD than other key populations. The majority (94%) of police believed arrest was an appropriate solution to reduce HIV and drug use and reported selling sex (88%) and carrying needles and syringes (55%) as valid reasons for arrest. Key populations' fear of

  1. Key variables analysis of a novel continuous biodrying process for drying mixed sludge.

    PubMed

    Navaee-Ardeh, Shahram; Bertrand, François; Stuart, Paul R

    2010-05-01

    A novel continuous biodrying process has been developed whose goal is to increase the dry solids content of the sludge to economic levels rendering it suitable for a safe and economic combustion operation in a biomass boiler. The sludge drying rates are enhanced by the metabolic bioheat produced in the matrix of mixed sludge. The goal of this study was to systematically analyze the continuous biodrying reactor. By performing a variable analysis, it was found that the outlet relative humidity profile was the key variable in the biodrying reactor. The influence of different outlet relative humidity profiles was then evaluated using biodrying efficiency index. It was found that by maintaining the air outlet relative humidity profile at 85/85/96/96% in the four compartments of the reactor, the highest biodrying efficiency index can be achieved, while economic dry solids level (>45%w/w) are guaranteed. Crown Copyright 2009. Published by Elsevier Ltd. All rights reserved.

  2. Turbulence study in the vicinity of piano key weir: relevance, instrumentation, parameters and methods

    NASA Astrophysics Data System (ADS)

    Tiwari, Harinarayan; Sharma, Nayan

    2017-05-01

    This research paper focuses on the need of turbulence, instruments reliable to capture turbulence, different turbulence parameters and some advance methodology which can decompose various turbulence structures at different levels near hydraulic structures. Small-scale turbulence research has valid prospects in open channel flow. The relevance of the study is amplified as we introduce any hydraulic structure in the channel which disturbs the natural flow and creates discontinuity. To recover this discontinuity, the piano key weir (PKW) might be used with sloped keys. Constraints of empirical results in the vicinity of PKW necessitate extensive laboratory experiments with fair and reliable instrumentation techniques. Acoustic Doppler velocimeter was established to be best suited within range of some limitations using principal component analysis. Wavelet analysis is proposed to decompose the underlying turbulence structure in a better way.

  3. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    PubMed Central

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  4. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey.

    PubMed

    Borba, Christina P C; Ng, Lauren C; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L; Parnarouskis, Lindsey; Gray, Deborah A; Carney, Julia R; Domínguez, Silvia; Wang, Edward K S; Boxill, Ryan; Song, Suzan J; Henderson, David C

    2016-01-02

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants ( n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5-22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy.

  5. New results from FRECOPA analysis

    NASA Technical Reports Server (NTRS)

    Durin, Christian

    1993-01-01

    New results from the ongoing analysis of the FRECOPA's (FREnch COoperative PAssive payload) system hardware are discussed. FRECOPA (AO138) was one of the 57 experiments flown on the LDEF satellite. The experiment was located on the trailing edge (Tray B3) and was exposed to UV radiation (11,100 equivalent sun hours), approximately equal to 34,000 thermal cycles, higher vacuum levels than the leading edge, a low atomic oxygen flux, and minor doses of protons and electrons. Due to LDEF's extended mission (5.8 years), CNES decided to set up a team to analyze the FRECOPA system. Initial results were presented at the First Post-Retrieval Conference, June, 1991. The results obtained since then are summarized.

  6. Chronic Absenteeism: A Key Indicator of Student Success. Policy Analysis

    ERIC Educational Resources Information Center

    Rafa, Alyssa

    2017-01-01

    Research shows that chronic absenteeism can affect academic performance in later grades and is a key early warning sign that a student is more likely to drop out of high school. Several states enacted legislation to address this issue, and many states are currently discussing the utility of chronic absenteeism as an indicator of school quality or…

  7. Key features of an EU health information system: a concept mapping study.

    PubMed

    Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut

    2016-02-01

    Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  8. Results and analysis of the switchyard impact tests

    DOT National Transportation Integrated Search

    1980-01-01

    This report presents the results and analysis of series 3 through 7 and series 10 of the FRA/RPI/AAR Switchyard Impact Tests. The test results and analysis are used to evaluate the head shield and the shelf-E coupler as protective devices for hazardo...

  9. Efficient multiparty quantum key agreement with collective detection.

    PubMed

    Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie

    2017-11-10

    As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.

  10. One Step Quantum Key Distribution Based on EPR Entanglement

    PubMed Central

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-01-01

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865

  11. Colorectal Cancer Screening Programme in Spain: Results of Key Performance Indicators After Five Rounds (2000-2012).

    PubMed

    Binefa, Gemma; Garcia, Montse; Milà, Núria; Fernández, Esteve; Rodríguez-Moranta, Francisco; Gonzalo, Núria; Benito, Llúcia; Clopés, Ana; Guardiola, Jordi; Moreno, Víctor

    2016-01-20

    Effective quality assurance is essential in any screening programme. This article provides a unique insight into key quality indicators of five rounds of the first population-based colorectal cancer screening programme implemented in Spain (2000-2012), providing the results according to the type of screening (prevalent or first screen and incident or subsequent screen) and test (guaiac or immunochemical). The total crude participation rate increased from 17.2% (11,011) in the first round to 35.9% (22,988) in the last one. Rescreening rate was very high (88.6% in the fifth round). Positivity rate was superior with the faecal immunochemical test (6.2%) than with the guaiac-based test (0.7%) (p < 0.0001) and detection rates were also better with the immunochemical test. The most significant rise in detection rate was observed for high risk adenoma in men (45.5 per 1,000 screened). Most cancers were diagnosed at an early stage (61.4%) and there was a statistically significant difference between those detected in first or subsequent screening (52.6% and 70.0% respectively; p = 0.024). The availability of these results substantially improves data comparisons and the exchange of experience between screening programmes.

  12. Optimizing prognosis-related key miRNA-target interactions responsible for cancer metastasis.

    PubMed

    Zhao, Hongying; Yuan, Huating; Hu, Jing; Xu, Chaohan; Liao, Gaoming; Yin, Wenkang; Xu, Liwen; Wang, Li; Zhang, Xinxin; Shi, Aiai; Li, Jing; Xiao, Yun

    2017-12-12

    Increasing evidence suggests that the abnormality of microRNAs (miRNAs) and their downstream targets is frequently implicated in the pathogenesis of human cancers, however, the clinical benefit of causal miRNA-target interactions has been seldom studied. Here, we proposed a computational method to optimize prognosis-related key miRNA-target interactions by combining transcriptome and clinical data from thousands of TCGA tumors across 16 cancer types. We obtained a total of 1,956 prognosis-related key miRNA-target interactions between 112 miRNAs and 1,443 their targets. Interestingly, these key target genes are specifically involved in tumor progression-related functions, such as 'cell adhesion' and 'cell migration'. Furthermore, they are most significantly correlated with 'tissue invasion and metastasis', a hallmark of metastasis, in ten distinct types of cancer through the hallmark analysis. These results implicated that the prognosis-related key miRNA-target interactions were highly associated with cancer metastasis. Finally, we observed that the combination of these key miRNA-target interactions allowed to distinguish patients with good prognosis from those with poor prognosis both in most TCGA cancer types and independent validation sets, highlighting their roles in cancer metastasis. We provided a user-friendly database named miRNATarget (freely available at http://biocc.hrbmu.edu.cn/miRNATar/), which provides an overview of the prognosis-related key miRNA-target interactions across 16 cancer types.

  13. The Keys to the White House

    ERIC Educational Resources Information Center

    Lichtman, Allan J.

    2012-01-01

    The Keys to the White House is a historically-based system for predicting the result of the popular vote in American presidential elections. The Keys system tracks the big picture of how well the party holding the White House has governed and does not shift with events of the campaign. This model gives specificity to the idea that it is…

  14. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-05-01

    We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.

  15. KEY COMPARISON: Final report on CCEM key comparison CCEM.RF-K10.CL (GT-RF/99-2) 'Power in 50 Ω coaxial lines, frequency: 50 MHz to 26 GHz' measurement techniques and results

    NASA Astrophysics Data System (ADS)

    Janik, Dieter; Inoue, T.; Michaud, A.

    2006-01-01

    This report summarizes the results and the measuring methods of an international key comparison between twelve national metrology institutes (NMIs) and is concerning the calibration factor of RF power sensors in the coaxial 3.5 mm line for frequencies up to 26 GHz. Two RF power travelling standards fitted with male PC 3.5 mm connectors were measured at seven frequencies. The following NMIs participated: NMIJ (Japan), NRC (Canada), NIST (USA), METAS (Switzerland), CSIR-NML (South Africa), NMIA (Australia), NPL (UK), SiQ (Slovenia), IEN (Italy), VNIIFTRI (Russian Federation), SPRING (Singapore) and PTB (Germany), as the pilot laboratory. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  16. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  17. Safety culture: analysis of the causal relationships between its key dimensions.

    PubMed

    Fernández-Muñiz, Beatriz; Montes-Peón, José Manuel; Vázquez-Ordás, Camilo José

    2007-01-01

    Several fields are showing increasing interest in safety culture as a means of reducing accidents in the workplace. The literature shows that safety culture is a multidimensional concept. However, considerable confusion surrounds this concept, about which little consensus has been reached. This study proposes a model for a positive safety culture and tests this on a sample of 455 Spanish companies, using the structural equation modeling statistical technique. Results show the important role of managers in the promotion of employees' safe behavior, both directly, through their attitudes and behaviors, and indirectly, by developing a safety management system. This paper identifies the key dimensions of safety culture. In addition, a measurement scale for the safety management system is validated. This will assist organizations in defining areas where they need to progress if they wish to improve their safety. Also, we stress that managers need to be wholly committed to and personally involved in safety activities, thereby conveying the importance the firm attaches to these issues.

  18. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    PubMed

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2018-02-01

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  20. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  1. Predicting Key Events in the Popularity Evolution of Online Information.

    PubMed

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  2. ANALYSIS OF METEOROLOGICAL CONDITIONS DURING THE 1977 ANCLOTE KEYS PLUME STUDY

    EPA Science Inventory

    Meteorological conditions are described and analyzed for nine experimental observation periods of the Anclote Keys Plume Study, which was conducted near Tampa, Florida during February 1977. The primary objective of the Plume Study was to investigate both the short and long range ...

  3. 48 CFR 352.242-70 - Key personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... contracts (or as soon as possible, if an individual must be replaced, for example, as a result of leaving... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.242-70 Key personnel. As prescribed in 342.302(c)(2), the Contracting Officer shall insert the following clause: Key Personnel...

  4. 48 CFR 352.242-70 - Key personnel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contracts (or as soon as possible, if an individual must be replaced, for example, as a result of leaving... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.242-70 Key personnel. As prescribed in 342.302(c)(2), the Contracting Officer shall insert the following clause: Key Personnel...

  5. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  6. Characterization of the key aroma compounds in beef extract using aroma extract dilution analysis.

    PubMed

    Takakura, Yukiko; Sakamoto, Tomohiro; Hirai, Sachi; Masuzawa, Takuya; Wakabayashi, Hidehiko; Nishimura, Toshihide

    2014-05-01

    Aroma extract dilution analysis (AEDA) of an ether extract prepared from beef extract (BE) and subsequent identification experiments led to the determination of seven aroma-active compounds in the flavor dilution (FD) factor range of 32-128. Omission experiments to select the most aroma-active compounds from the seven aroma compounds suggested that 2,3,5-trimethyl pyrazine, 1-octen-3-ol, 3-methylbutanoic acid, and 4-hydroxy-2,5-dimethyl-3(2H)-furanone were the main active compounds contributing to the aroma of BE. Aroma recombination, addition, and omission experiments of the four aroma compounds in taste-reconstituted BE showed that each compound had an individual aroma profile. A comparison of the overall aroma between this recombination mixture and BE showed a high similarity, suggesting that the key aroma compounds had been identified successfully. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Iris recognition based on key image feature extraction.

    PubMed

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  8. Practical issues in quantum-key-distribution postprocessing

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.

    2010-01-01

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  9. Key concepts in consumer and community engagement: a scoping meta-review

    PubMed Central

    2014-01-01

    Background Although consumer and community engagement (CCE) in health care is receiving increasing attention, research and practice in this area are hampered by the variability of concepts and terminology commonly employed. This scoping meta-review aims to identify key CCE concepts and examine terminology used to describe them. Methods In a scoping meta-review, an extensive list of 47 phrases and 11 Medical Subject Headings (MeSH) was used to undertake a comprehensive and systematic search in PubMed Central, Embase, EBM reviews, CINAHL, APAPsycNET, and Scopus. Results 59 systematic reviews met the selection criteria and were included in the final analysis. The analysis identified nine different concepts related to CCE: shared decision making, self-management, CCE in health care systems, community-based health promotion, providing access to health care, rehabilitation, participation in research, collaboration in research design and conduct, and peer support. The identified concepts differ from each other in many aspects including the aim of the activity, the role of consumers and the type of professionals’ involvement. Each concept was described by a range of terms, with some terms shared by different concepts. In addition, two overlapping concepts of patient-centeredness and patient empowerment were recognised. Conclusions This study describes CCE-related key concepts and provides new insight into their relationship with different CCE-related terms. Identification of key CCE-related concepts and terms will be useful to focus future studies and initiatives and enhance production of CCE-related evidence. PMID:24923771

  10. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  11. Global analysis of plasticity in turgor loss point, a key drought tolerance trait.

    PubMed

    Bartlett, Megan K; Zhang, Ya; Kreidler, Nissa; Sun, Shanwen; Ardy, Rico; Cao, Kunfang; Sack, Lawren

    2014-12-01

    Many species face increasing drought under climate change. Plasticity has been predicted to strongly influence species' drought responses, but broad patterns in plasticity have not been examined for key drought tolerance traits, including turgor loss or 'wilting' point (πtlp ). As soil dries, plants shift πtlp by accumulating solutes (i.e. 'osmotic adjustment'). We conducted the first global analysis of plasticity in Δπtlp and related traits for 283 wild and crop species in ecosystems worldwide. Δπtlp was widely prevalent but moderate (-0.44 MPa), accounting for 16% of post-drought πtlp. Thus, pre-drought πtlp was a considerably stronger predictor of post-drought πtlp across species of wild plants. For cultivars of certain crops Δπtlp accounted for major differences in post-drought πtlp. Climate was correlated with pre- and post-drought πtlp, but not Δπtlp. Thus, despite the wide prevalence of plasticity, πtlp measured in one season can reliably characterise most species' constitutive drought tolerances and distributions relative to water supply. © 2014 John Wiley & Sons Ltd/CNRS.

  12. Network theory inspired analysis of time-resolved expression data reveals key players guiding P. patens stem cell development.

    PubMed

    Busch, Hauke; Boerries, Melanie; Bao, Jie; Hanke, Sebastian T; Hiss, Manuel; Tiko, Theodhor; Rensing, Stefan A

    2013-01-01

    Transcription factors (TFs) often trigger developmental decisions, yet, their transcripts are often only moderately regulated and thus not easily detected by conventional statistics on expression data. Here we present a method that allows to determine such genes based on trajectory analysis of time-resolved transcriptome data. As a proof of principle, we have analysed apical stem cells of filamentous moss (P. patens) protonemata that develop from leaflets upon their detachment from the plant. By our novel correlation analysis of the post detachment transcriptome kinetics we predict five out of 1,058 TFs to be involved in the signaling leading to the establishment of pluripotency. Among the predicted regulators is the basic helix loop helix TF PpRSL1, which we show to be involved in the establishment of apical stem cells in P. patens. Our methodology is expected to aid analysis of key players of developmental decisions in complex plant and animal systems.

  13. Characterization of the key aroma compounds in beef and pork vegetable gravies á la chef by application of the aroma extract dilution analysis.

    PubMed

    Christlbauer, Monika; Schieberle, Peter

    2009-10-14

    By application of the aroma extract dilution analysis (AEDA) on an aroma distillate isolated from a freshly prepared, stewed beef/vegetable gravy, 52 odor-active compounds were detected in the flavor dilution (FD) factor range of 4-4096. On the basis of high FD factors in combination with the results of the identification experiments, 3-(methylthio)propanal (cooked potato), 3-mercapto-2-methylpentan-1-ol (gravy-like), (E,E)-2,4-decadienal (deep-fried, fatty), 3-hydroxy-4,5-dimethyl-2(5H)-furanone (lovage-like), vanillin (vanilla-like), (E,E)-2,4-nonadienal (deep-fried), and (E)-2-undecenal (metallic) are suggested as key contributors to the aroma of the gravy. To get an insight into the role of the vegetables as sources of gravy odorants, a beef gravy was prepared without vegetables. The AEDA results revealed that, in particular, onions and leek are important sources of gravy aroma compounds, adding particularly the very potent, gravy-like smelling 3-mercapto-2-methylpentan-1-ol to the overall aroma profile. Further compounds that were clearly derived from the vegetables and, thus, are important modifiers of the overall aroma were 4-vinyl-2-methoxyphenol, (E)-beta-damascenone, beta-ionone, 2-isopropyl-3-methoxypyrazine, and 2-(sec-butyl)-3-methoxypyrazine. Interestingly, none of the key odorants detected in the gravy can be assumed to be formed from a reaction between beef and vegetable constituents. A comparison of the odorants in the beef/vegetable gravy with a gravy prepared according to the same procedure, but substituting beef by pork meat, indicated that most of the aroma compounds were identical-although different in FD factors-but the tallowy smelling 12-methyltridecanal was detected as key odorant only in the beef/vegetable gravy.

  14. Longitudinal meta-analysis of NIST pH Standard Reference Materials(®): a complement to pH key comparisons.

    PubMed

    Pratt, Kenneth W

    2015-04-01

    This meta-analysis assesses the long-term (up to 70 years) within-laboratory variation of the NIST pH Standard Reference Material® (SRM) tetroxalate, phthalate, phosphate, borate, and carbonate buffers. Values of ΔpH(S), the difference between the certified pH value, pH(S), of each SRM issue and the mean of all pH(S) values for the given SRM at that Celsius temperature, t, are graphed as a function of the SRM issue and t. In most cases, |ΔpH(S)| < 0.004. Deviations from the nominal base:acid amount (mole) ratio of a buffer yield t-independent, constant shifts in ΔpH(S). The mean ΔpH(S) characterizes such deviations. The corresponding mole fraction of impurity in the conjugate buffer component is generally <0.3 %. Changes in the equipment, personnel, materials, and methodology of the pH(S) measurement yield t-dependent variations. The standard deviation of ΔpH(S) characterizes such changes. Standard deviations of ΔpH(S) are generally 0.0015 or less. The results provide a long-term, single-institution complement to the time-specific, multi-institution results of pH key comparisons administered by the Consultative Committee for Metrology in Chemistry and Biology (CCQM).

  15. Using Qualitative Comparative Analysis of Key Informant Interviews in Health Services Research: Enhancing a Study of Adjuvant Therapy Use in Breast Cancer Care.

    PubMed

    McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra D; Bickell, Nina A

    2016-04-01

    Qualitative comparative analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. To explore the strengths and weaknesses of using QCA for HSR. Using data from semistructured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Ninety administrative and clinical key informants interviewed across 10 NYC area safety net hospitals. Transcribed interviews were coded by 3 investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods.

  16. Key Frame Extraction in the Summary Space.

    PubMed

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  17. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  18. Results and Analysis from Space Suit Joint Torque Testing

    NASA Technical Reports Server (NTRS)

    Matty, Jennifer E.; Aitchison, Lindsay

    2009-01-01

    A space suit s mobility is critical to an astronaut s ability to perform work efficiently. As mobility increases, the astronaut can perform tasks for longer durations with less fatigue. The term mobility, with respect to space suits, is defined in terms of two key components: joint range of motion and joint torque. Individually these measures describe the path which in which a joint travels and the force required to move it through that path. Previous space suits mobility requirements were defined as the collective result of these two measures and verified by the completion of discrete functional tasks. While a valid way to impose mobility requirements, such a method does necessitate a solid understanding of the operational scenarios in which the final suit will be performing. Because the Constellation space suit system requirements are being finalized with a relatively immature concept of operations, the Space Suit Element team elected to define mobility in terms of its constituent parts to increase the likelihood that the future pressure garment will be mobile enough to enable a broad scope of undefined exploration activities. The range of motion requirements were defined by measuring the ranges of motion test subjects achieved while performing a series of joint maximizing tasks in a variety of flight and prototype space suits. The definition of joint torque requirements has proved more elusive. NASA evaluated several different approaches to the problem before deciding to generate requirements based on unmanned joint torque evaluations of six different space suit configurations being articulated through 16 separate joint movements. This paper discusses the experiment design, data analysis and results, and the process used to determine the final values for the Constellation pressure garment joint torque requirements.

  19. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  20. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  1. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis)

    PubMed Central

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants’ growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., ‘Photosynthesis’), GO terms (e.g., ‘response to karrikin’) and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology. PMID:25901577

  2. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  3. Adding results to a meta-analysis: Theory and example

    NASA Astrophysics Data System (ADS)

    Willson, Victor L.

    Meta-analysis has been used as a research method to describe bodies of research data. It promotes hypothesis formation and the development of science education laws. A function overlooked, however, is the role it plays in updating research. Methods to integrate new research with meta-analysis results need explication. A procedure is presented using Bayesian analysis. Research in science education attitude correlation with achievement has been published after a recent meta-analysis of the topic. The results show how new findings complement the previous meta-analysis and extend its conclusions. Additional methodological questions adddressed are how studies are to be weighted, which variables are to be examined, and how often meta-analysis are to be updated.

  4. Partially Turboelectric Aircraft Drive Key Performance Parameters

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Duffy, Kirsten P.; Brown, Gerald V.

    2017-01-01

    The purpose of this paper is to propose electric drive specific power, electric drive efficiency, and electrical propulsion fraction as the key performance parameters for a partially turboelectric aircraft power system and to investigate their impact on the overall aircraft performance. Breguet range equations for a base conventional turbofan aircraft and a partially turboelectric aircraft are found. The benefits and costs that may result from the partially turboelectric system are enumerated. A break even analysis is conducted to find the minimum allowable electric drive specific power and efficiency, for a given electrical propulsion fraction, that can preserve the range, fuel weight, operating empty weight, and payload weight of the conventional aircraft. Current and future power system performance is compared to the required performance to determine the potential benefit.

  5. Predicting Key Events in the Popularity Evolution of Online Information

    PubMed Central

    Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121

  6. SWECS tower dynamics analysis methods and results

    NASA Technical Reports Server (NTRS)

    Wright, A. D.; Sexton, J. H.; Butterfield, C. P.; Thresher, R. M.

    1981-01-01

    Several different tower dynamics analysis methods and computer codes were used to determine the natural frequencies and mode shapes of both guyed and freestanding wind turbine towers. These analysis methods are described and the results for two types of towers, a guyed tower and a freestanding tower, are shown. The advantages and disadvantages in the use of and the accuracy of each method are also described.

  7. Identification of key genes associated with the effect of estrogen on ovarian cancer using microarray analysis.

    PubMed

    Zhang, Shi-tao; Zuo, Chao; Li, Wan-nan; Fu, Xue-qi; Xing, Shu; Zhang, Xiao-ping

    2016-02-01

    To identify key genes related to the effect of estrogen on ovarian cancer. Microarray data (GSE22600) were downloaded from Gene Expression Omnibus. Eight estrogen and seven placebo treatment samples were obtained using a 2 × 2 factorial designs, which contained 2 cell lines (PEO4 and 2008) and 2 treatments (estrogen and placebo). Differentially expressed genes were identified by Bayesian methods, and the genes with P < 0.05 and |log2FC (fold change)| ≥0.5 were chosen as cut-off criterion. Differentially co-expressed genes (DCGs) and differentially regulated genes (DRGs) were, respectively, identified by DCe function and DRsort function in DCGL package. Topological structure analysis was performed on the important transcriptional factors (TFs) and genes in transcriptional regulatory network using tYNA. Functional enrichment analysis was, respectively, performed for DEGs and the important genes using Gene Ontology and KEGG databases. In total, 465 DEGs were identified. Functional enrichment analysis of DEGs indicated that ACVR2B, LTBP1, BMP7 and MYC involved in TGF-beta signaling pathway. The 2285 DCG pairs and 357 DRGs were identified. Topological structure analysis showed that 52 important TFs and 65 important genes were identified. Functional enrichment analysis of the important genes showed that TP53 and MLH1 participated in DNA damage response and the genes (ACVR2B, LTBP1, BMP7 and MYC) involved in TGF-beta signaling pathway. TP53, MLH1, ACVR2B, LTBP1 and BMP7 might participate in the pathogenesis of ovarian cancer.

  8. Identification of key microRNAs and genes in preeclampsia by bioinformatics analysis

    PubMed Central

    Luo, Shouling; Cao, Nannan; Tang, Yao; Gu, Weirong

    2017-01-01

    Preeclampsia is a leading cause of perinatal maternal–foetal mortality and morbidity. The aim of this study is to identify the key microRNAs and genes in preeclampsia and uncover their potential functions. We downloaded the miRNA expression profile of GSE84260 and the gene expression profile of GSE73374 from the Gene Expression Omnibus database. Differentially expressed miRNAs and genes were identified and compared to miRNA-target information from MiRWalk 2.0, and a total of 65 differentially expressed miRNAs (DEMIs), including 32 up-regulated miRNAs and 33 down-regulated miRNAs, and 91 differentially expressed genes (DEGs), including 83 up-regulated genes and 8 down-regulated genes, were identified. The pathway enrichment analyses of the DEMIs showed that the up-regulated DEMIs were enriched in the Hippo signalling pathway and MAPK signalling pathway, and the down-regulated DEMIs were enriched in HTLV-I infection and miRNAs in cancers. The gene ontology (GO) and Kyoto Encyclopedia of Genes and Genomes pathway (KEGG) enrichment analyses of the DEGs were performed using Multifaceted Analysis Tool for Human Transcriptome. The up-regulated DEGs were enriched in biological processes (BPs), including the response to cAMP, response to hydrogen peroxide and cell-cell adhesion mediated by integrin; no enrichment of down-regulated DEGs was identified. KEGG analysis showed that the up-regulated DEGs were enriched in the Hippo signalling pathway and pathways in cancer. A PPI network of the DEGs was constructed by using Cytoscape software, and FOS, STAT1, MMP14, ITGB1, VCAN, DUSP1, LDHA, MCL1, MET, and ZFP36 were identified as the hub genes. The current study illustrates a characteristic microRNA profile and gene profile in preeclampsia, which may contribute to the interpretation of the progression of preeclampsia and provide novel biomarkers and therapeutic targets for preeclampsia. PMID:28594854

  9. Evaluating filterability of different types of sludge by statistical analysis: The role of key organic compounds in extracellular polymeric substances.

    PubMed

    Xiao, Keke; Chen, Yun; Jiang, Xie; Zhou, Yan

    2017-03-01

    An investigation was conducted for 20 different types of sludge in order to identify the key organic compounds in extracellular polymeric substances (EPS) that are important in assessing variations of sludge filterability. The different types of sludge varied in initial total solids (TS) content, organic composition and pre-treatment methods. For instance, some of the sludges were pre-treated by acid, ultrasonic, thermal, alkaline, or advanced oxidation technique. The Pearson's correlation results showed significant correlations between sludge filterability and zeta potential, pH, dissolved organic carbon, protein and polysaccharide in soluble EPS (SB EPS), loosely bound EPS (LB EPS) and tightly bound EPS (TB EPS). The principal component analysis (PCA) method was used to further explore correlations between variables and similarities among EPS fractions of different types of sludge. Two principal components were extracted: principal component 1 accounted for 59.24% of total EPS variations, while principal component 2 accounted for 25.46% of total EPS variations. Dissolved organic carbon, protein and polysaccharide in LB EPS showed higher eigenvector projection values than the corresponding compounds in SB EPS and TB EPS in principal component 1. Further characterization of fractionized key organic compounds in LB EPS was conducted with size-exclusion chromatography-organic carbon detection-organic nitrogen detection (LC-OCD-OND). A numerical multiple linear regression model was established to describe relationship between organic compounds in LB EPS and sludge filterability. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Discrete Event Simulation Modeling and Analysis of Key Leader Engagements

    DTIC Science & Technology

    2012-06-01

    to offer. GreenPlayer agents require four parameters, pC, pKLK, pTK, and pRK , which give probabilities for being corrupt, having key leader...HandleMessageRequest component. The same parameter constraints apply to these four parameters. The parameter pRK is the same parameter from the CreatePlayers component...whether the local Green player has resource critical knowledge by using the parameter pRK . It schedules an EndResourceKnowledgeRequest event, passing

  11. Using Qualitative Comparative Analysis (QCA) of Key Informant Interviews in Health Services Research: Enhancing a Study of Adjuvant Therapy Use in Breast Cancer Care

    PubMed Central

    McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra DeNardis; Bickell, Nina A.

    2015-01-01

    Background Qualitative Comparative Analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. Objective To explore the strengths and weaknesses of using QCA for HSR. Research Design Using data from semi-structured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Subjects Ninety administrative and clinical key informants interviewed across ten NYC area safety net hospitals. Measures Transcribed interviews were coded by three investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Results Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Conclusions Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods. PMID:26908085

  12. Cost-effectiveness analysis and efficient use of the pharmaceutical budget: the key role of clinical pharmacologists

    PubMed Central

    Edlin, Richard; Round, Jeff; Hulme, Claire; McCabe, Christopher

    2010-01-01

    The purpose of this paper is to provide information about cost-effectiveness analysis and the roles of clinical pharmacologists generally in providing efficient health care. The paper highlights the potential consequences of ‘off-label prescribing’ and ‘indication creep’ behaviour given slower growth (or potential cuts) in the NHS budget. This paper highlights the key roles of clinical pharmacologists in delivering an efficient health care system when resources are allocated using cost-effectiveness analyses. It describes what cost-effectiveness analysis (CEA) is and how incremental cost-effectiveness ratios (ICERs) are used to identify efficient options. After outlining the theoretical framework within which using CEA can promote the efficient allocation of the health care budget, it considers the place of disinvestment within achieving efficient resource allocation. Clinical pharmacologists are argued to be critical to providing improved population health under CEA-based resource allocation processes because of their roles in implementation and disinvestment. Given that the challenges facing the United Kingdom National Health Service (NHS) are likely to increase, this paper sets out the stark choices facing clinical pharmacologists. PMID:20716234

  13. Cost-effectiveness analysis and efficient use of the pharmaceutical budget: the key role of clinical pharmacologists.

    PubMed

    Edlin, Richard; Round, Jeff; Hulme, Claire; McCabe, Christopher

    2010-09-01

    The purpose of this paper is to provide information about cost-effectiveness analysis and the roles of clinical pharmacologists generally in providing efficient health care. The paper highlights the potential consequences of 'off-label prescribing' and 'indication creep' behaviour given slower growth (or potential cuts) in the NHS budget. This paper highlights the key roles of clinical pharmacologists in delivering an efficient health care system when resources are allocated using cost-effectiveness analyses. It describes what cost-effectiveness analysis (CEA) is and how incremental cost-effectiveness ratios (ICERs) are used to identify efficient options. After outlining the theoretical framework within which using CEA can promote the efficient allocation of the health care budget, it considers the place of disinvestment within achieving efficient resource allocation. Clinical pharmacologists are argued to be critical to providing improved population health under CEA-based resource allocation processes because of their roles in implementation and disinvestment. Given that the challenges facing the United Kingdom National Health Service (NHS) are likely to increase, this paper sets out the stark choices facing clinical pharmacologists.

  14. Too much information? A document analysis of sport safety resources from key organisations

    PubMed Central

    Finch, Caroline F

    2016-01-01

    Objectives The field of sport injury prevention has seen a marked increase in published research in recent years, with concomitant proliferation of lay sport safety resources, such as policies, fact sheets and posters. The aim of this study was to catalogue and categorise the number, type and topic focus of sport safety resources from a representative set of key organisations. Design Cataloguing and qualitative document analysis of resources available from the websites of six stakeholder organisations in Australia. Setting This study was part of a larger investigation, the National Guidance for Australian Football Partnerships and Safety (NoGAPS) project. Participants The NoGAPS study provided the context for a purposive sampling of six organisations involved in the promotion of safety in Australian football. These partners are recognised as being highly representative of organisations at national and state level that reflect similarly in their goals around sport safety promotion in Australia. Results The catalogue comprised 284 resources. More of the practical and less prescriptive types of resources, such as fact sheets, than formal policies were found. Resources for the prevention of physical injuries were the predominant sport safety issue addressed, with risk management, environmental issues and social behaviours comprising other categories. Duplication of resources for specific safety issues, within and across organisations, was found. Conclusions People working within sport settings have access to a proliferation of resources, which creates a potential rivalry for sourcing of injury prevention information. Important issues that are likely to influence the uptake of safety advice by the general sporting public include the sheer number of resources available, and the overlap and duplication of resources addressing the same issues. The existence of a large number of resources from reputable organisations does not mean that they are necessarily evidence based

  15. Comparative transcriptome analysis reveals key genes potentially related to soluble sugar and organic acid accumulation in watermelon

    PubMed Central

    Gao, Lei; Zhao, Shengjie; Lu, Xuqiang; He, Nan; Zhu, Hongju; Dou, Junling

    2018-01-01

    Soluble sugars and organic acids are important components of fruit flavor and have a strong impact on the overall organoleptic quality of watermelon (Citrullus lanatus) fruit. Several studies have analyzed the expression levels of the genes related to soluble sugar accumulation and the dynamic changes in their content during watermelon fruit development and ripening. Nevertheless, to date, there have been no reports on the organic acid content in watermelon or the genes regulating their synthesis. In this study, the soluble sugars and organic acids in watermelon were measured and a comparative transcriptome analysis was performed to identify the key genes involved in the accumulation of these substances during fruit development and ripening. The watermelon cultivar ‘203Z’ and its near-isogenic line (NIL) ‘SW’ (in the ‘203Z’ background) were used as experimental materials. The results suggested that soluble sugar consist of fructose, glucose and sucrose while malic-, citric-, and oxalic acids are the primary organic acids in watermelon fruit. Several differentially expressed genes (DEGs) related to soluble sugar- and organic acid accumulation and metabolism were identified. These include the DEGs encoding raffinose synthase, sucrose synthase (SuSy), sucrose-phosphate synthase (SPSs), insoluble acid invertases (IAI), NAD-dependent malate dehydrogenase (NAD-cyt MDH), aluminum-activated malate transporter (ALMT), and citrate synthase (CS). This is the first report addressing comparative transcriptome analysis via NILs materials in watermelon fruit. These findings provide an important basis for understanding the molecular mechanism that leads to soluble sugar and organic acid accumulation and metabolism during watermelon fruit development and ripening. PMID:29324867

  16. Comparative transcriptome analysis reveals key genes potentially related to soluble sugar and organic acid accumulation in watermelon.

    PubMed

    Gao, Lei; Zhao, Shengjie; Lu, Xuqiang; He, Nan; Zhu, Hongju; Dou, Junling; Liu, Wenge

    2018-01-01

    Soluble sugars and organic acids are important components of fruit flavor and have a strong impact on the overall organoleptic quality of watermelon (Citrullus lanatus) fruit. Several studies have analyzed the expression levels of the genes related to soluble sugar accumulation and the dynamic changes in their content during watermelon fruit development and ripening. Nevertheless, to date, there have been no reports on the organic acid content in watermelon or the genes regulating their synthesis. In this study, the soluble sugars and organic acids in watermelon were measured and a comparative transcriptome analysis was performed to identify the key genes involved in the accumulation of these substances during fruit development and ripening. The watermelon cultivar '203Z' and its near-isogenic line (NIL) 'SW' (in the '203Z' background) were used as experimental materials. The results suggested that soluble sugar consist of fructose, glucose and sucrose while malic-, citric-, and oxalic acids are the primary organic acids in watermelon fruit. Several differentially expressed genes (DEGs) related to soluble sugar- and organic acid accumulation and metabolism were identified. These include the DEGs encoding raffinose synthase, sucrose synthase (SuSy), sucrose-phosphate synthase (SPSs), insoluble acid invertases (IAI), NAD-dependent malate dehydrogenase (NAD-cyt MDH), aluminum-activated malate transporter (ALMT), and citrate synthase (CS). This is the first report addressing comparative transcriptome analysis via NILs materials in watermelon fruit. These findings provide an important basis for understanding the molecular mechanism that leads to soluble sugar and organic acid accumulation and metabolism during watermelon fruit development and ripening.

  17. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  18. Identification of Key Odorants in Used Disposable Absorbent Incontinence Products

    PubMed Central

    Hall, Gunnar; Forsgren-Brusk, Ulla

    2017-01-01

    PURPOSE: The purpose of this study was to identify key odorants in used disposable absorbent incontinence products. DESIGN: Descriptive in vitro study SUBJECTS AND SETTING: Samples of used incontinence products were collected from 8 residents with urinary incontinence living in geriatric nursing homes in the Gothenburg area of Sweden. Products were chosen from a larger set of products that had previously been characterized by descriptive odor analysis. METHODS: Pieces of the used incontinence products were cut from the wet area, placed in glass bottles, and kept frozen until dynamic headspace sampling of volatile compounds was completed. Gas chromatography–olfactometry was used to identify which compounds contributed most to the odors in the samples. Compounds were identified by gas chromatography–mass spectrometry. RESULTS: Twenty-eight volatiles were found to be key odorants in the used incontinence products. Twenty-six were successfully identified. They belonged to the following classes of chemical compounds: aldehydes (6); amines (1); aromatics (3); isothiocyanates (1); heterocyclics (2); ketones (6); sulfur compounds (6); and terpenes (1). CONCLUSION: Nine of the 28 key odorants were considered to be of particular importance to the odor of the used incontinence products: 3-methylbutanal, trimethylamine, cresol, guaiacol, 4,5-dimethylthiazole-S-oxide, diacetyl, dimethyl trisulfide, 5-methylthio-4-penten-2-ol, and an unidentified compound. PMID:28328644

  19. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  20. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  1. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE PAGES

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; ...

    2016-08-09

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  2. Effect of the Key Mixture Parameters on Shrinkage of Reactive Powder Concrete

    PubMed Central

    Zubair, Ahmed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 33 factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content. PMID:25050395

  3. Effect of the key mixture parameters on shrinkage of reactive powder concrete.

    PubMed

    Ahmad, Shamsad; Zubair, Ahmed; Maslehuddin, Mohammed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 3(3) factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content.

  4. Towards Improving our Understanding on the Retrievals of Key Parameters Characterising Land Surface Interactions from Space: Introduction & First Results from the PREMIER-EO Project

    NASA Astrophysics Data System (ADS)

    Ireland, Gareth; North, Matthew R.; Petropoulos, George P.; Srivastava, Prashant K.; Hodges, Crona

    2015-04-01

    Acquiring accurate information on the spatio-temporal variability of soil moisture content (SM) and evapotranspiration (ET) is of key importance to extend our understanding of the Earth system's physical processes, and is also required in a wide range of multi-disciplinary research studies and applications. The utility and applicability of Earth Observation (EO) technology provides an economically feasible solution to derive continuous spatio-temporal estimates of key parameters characterising land surface interactions, including ET as well as SM. Such information is of key value to practitioners, decision makers and scientists alike. The PREMIER-EO project recently funded by High Performance Computing Wales (HPCW) is a research initiative directed towards the development of a better understanding of EO technology's present ability to derive operational estimations of surface fluxes and SM. Moreover, the project aims at addressing knowledge gaps related to the operational estimation of such parameters, and thus contribute towards current ongoing global efforts towards enhancing the accuracy of those products. In this presentation we introduce the PREMIER-EO project, providing a detailed overview of the research aims and objectives for the 1 year duration of the project's implementation. Subsequently, we make available the initial results of the work carried out herein, in particular, related to an all-inclusive and robust evaluation of the accuracy of existing operational products of ET and SM from different ecosystems globally. The research outcomes of this project, once completed, will provide an important contribution towards addressing the knowledge gaps related to the operational estimation of ET and SM. This project results will also support efforts ongoing globally towards the operational development of related products using technologically advanced EO instruments which were launched recently or planned be launched in the next 1-2 years. Key Words: PREMIER

  5. Quantum cryptography to satellites for global secure key distribution

    NASA Astrophysics Data System (ADS)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  6. Identifying key genes, pathways and screening therapeutic agents for manganese-induced Alzheimer disease using bioinformatics analysis.

    PubMed

    Ling, JunJun; Yang, Shengyou; Huang, Yi; Wei, Dongfeng; Cheng, Weidong

    2018-06-01

    Alzheimer disease (AD) is a progressive neurodegenerative disease, the etiology of which remains largely unknown. Accumulating evidence indicates that elevated manganese (Mn) in brain exerts toxic effects on neurons and contributes to AD development. Thus, we aimed to explore the gene and pathway variations through analysis of high through-put data in this process.To screen the differentially expressed genes (DEGs) that may play critical roles in Mn-induced AD, public microarray data regarding Mn-treated neurocytes versus controls (GSE70845), and AD versus controls (GSE48350), were downloaded and the DEGs were screened out, respectively. The intersection of the DEGs of each datasets was obtained by using Venn analysis. Then, gene ontology (GO) function analysis and KEGG pathway analysis were carried out. For screening hub genes, protein-protein interaction network was constructed. At last, DEGs were analyzed in Connectivity Map (CMAP) for identification of small molecules that overcome Mn-induced neurotoxicity or AD development.The intersection of the DEGs obtained 140 upregulated and 267 downregulated genes. The top 5 items of biological processes of GO analysis were taxis, chemotaxis, cell-cell signaling, regulation of cellular physiological process, and response to wounding. The top 5 items of KEGG pathway analysis were cytokine-cytokine receptor interaction, apoptosis, oxidative phosphorylation, Toll-like receptor signaling pathway, and insulin signaling pathway. Afterwards, several hub genes such as INSR, VEGFA, PRKACB, DLG4, and BCL2 that might play key roles in Mn-induced AD were further screened out. Interestingly, tyrphostin AG-825, an inhibitor of tyrosine phosphorylation, was predicted to be a potential agent for overcoming Mn-induced neurotoxicity or AD development.The present study provided a novel insight into the molecular mechanisms of Mn-induced neurotoxicity or AD development and screened out several small molecular candidates that might be

  7. Gemini Planet Imager Exoplanet Survey: Key Results Two Years Into The Survey

    NASA Astrophysics Data System (ADS)

    Marchis, Franck; Rameau, Julien; Nielsen, Eric L.; De Rosa, Robert J.; Esposito, Thomas; Draper, Zachary H.; Macintosh, Bruce; Graham, James R.; GPIES

    2016-10-01

    The Gemini Planet Imager Exoplanet Survey (GPIES) is targeting 600 young, nearby stars using the GPI instrument. We report here on recent results obtained with this instrument from our team.Rameau et al. (ApJL, 822 2, L2, 2016) presented astrometric monitoring of the young exoplanet HD 95086 b obtained with GPI between 2013 and 2016. Efficient Monte Carlo techniques place preliminary constraints on the orbital parameters of HD 95086 b. Under the assumption of a coplanar planet-disk system, the periastron of HD 95086 b is beyond 51 AU. Therefore, HD 95086 b cannot carve the entire gap inferred from the measured infrared excess in the SED of HD 95086. Additional photometric and spectroscopic measurements reported by de Rosa et al. (2016, apJ, in press) showed that the spectral energy distribution of HD 95086 b is best fit by low temperature (T~800-1300 K), low surface gravity spectra from models which simulate high photospheric dust content. Its temperature is typical to L/T transition objects, but the spectral type is poorly constrained. HD 95086 b is an important exoplanet to test our models of atmospheric properties of young extrasolar planets.Direct detections of debris disk are keys to infer the collisional past and understand the formation of planetary systems. Two debris disks were recently studied with GPI:- Draper et al. (submitted to ApJ, 2016) show the resolved circumstellar debris disk around HD 111520 at a projected range of ~30-100 AU using both total and polarized H-band intensity. Structures in the disks such as a large brightness asymmetry and symmetric polarization fraction are seen. Additional data would confirm if a large disruption event from a stellar fly-by or planetary perturbations altered the disk density- Esposito et al. (submitted to ApJ, 2016) combined Keck NIRC2 data taken at 1.2-2.3 microns and GPI 1.6 micron total intensity and polarized light detections that probes down to projected separations less than 10 AU to show that the HD

  8. Job Interviews: Keys for Results

    ERIC Educational Resources Information Center

    Miller, Donald S.; Catt, Stephen E.; Slocombe, Thomas E.

    2014-01-01

    Many students seem disinterested in learning to handle employment interviews effectively. This article discusses students' motivation to become skilled interviewees and steps educators and counselors can take to increase students' interest in this crucial career activity. The article also discusses mistakes students frequently make during…

  9. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  10. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  11. Partitioned key-value store with atomic memory operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from themore » local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.« less

  12. A systems biology approach to detect key pathways and interaction networks in gastric cancer on the basis of microarray analysis.

    PubMed

    Guo, Leilei; Song, Chunhua; Wang, Peng; Dai, Liping; Zhang, Jianying; Wang, Kaijuan

    2015-11-01

    The aim of the present study was to explore key molecular pathways contributing to gastric cancer (GC) and to construct an interaction network between significant pathways and potential biomarkers. Publicly available gene expression profiles of GSE29272 for GC, and data for the corresponding normal tissue, were downloaded from Gene Expression Omnibus. Pre‑processing and differential analysis were performed with R statistical software packages, and a number of differentially expressed genes (DEGs) were obtained. A functional enrichment analysis was performed for all the DEGs with a BiNGO plug‑in in Cytoscape. Their correlation was analyzed in order to construct a network. The modularity analysis and pathway identification operations were used to identify graph clusters and associated pathways. The underlying molecular mechanisms involving these DEGs were also assessed by data mining. A total of 249 DEGs, which were markedly upregulated and downregulated, were identified. The extracellular region contained the most significantly over‑represented functional terms, with respect to upregulated and downregulated genes, and the closest topological matches were identified for taste transduction and regulation of autophagy. In addition, extracellular matrix‑receptor interactions were identified as the most relevant pathway associated with the progression of GC. The genes for fibronectin 1, secreted phosphoprotein 1, collagen type 4 variant α‑1/2 and thrombospondin 1, which are involved in the pathways, may be considered as potential therapeutic targets for GC. A series of associations between candidate genes and key pathways were also identified for GC, and their correlation may provide novel insights into the pathogenesis of GC.

  13. Decision Trajectories in Dementia Care Networks: Decisions and Related Key Events.

    PubMed

    Groen-van de Ven, Leontine; Smits, Carolien; Oldewarris, Karen; Span, Marijke; Jukema, Jan; Eefsting, Jan; Vernooij-Dassen, Myrra

    2017-10-01

    This prospective multiperspective study provides insight into the decision trajectories of people with dementia by studying the decisions made and related key events. This study includes three waves of interviews, conducted between July 2010 and July 2012, with 113 purposefully selected respondents (people with beginning to advanced stages of dementia and their informal and professional caregivers) completed in 12 months (285 interviews). Our multilayered qualitative analysis consists of content analysis, timeline methods, and constant comparison. Four decision themes emerged-managing daily life, arranging support, community living, and preparing for the future. Eight key events delineate the decision trajectories of people with dementia. Decisions and key events differ between people with dementia living alone and living with a caregiver. Our study clarifies that decisions relate not only to the disease but to living with the dementia. Individual differences in decision content and sequence may effect shared decision-making and advance care planning.

  14. North Atlantic Aerosol Properties and Direct Radiative Effects: Key Results from TARFOX and ACE-2

    NASA Technical Reports Server (NTRS)

    Russell, P. B.; Livingston, J. M.; Schmid, B.; Bergstrom, Robert A.; Hignett, P.; Hobbs, P. V.; Durkee, P. A.

    2000-01-01

    Aerosol effects on atmospheric radiative fluxes provide a forcing function that can change the climate In potentially significant ways. This aerosol radiative forcing is a major source of uncertainty in understanding the observed climate change of the past century and in predicting future climate. To help reduce this uncertainty, the International Global Atmospheric Chemistry Project (IGAC) has endorsed a series of multiplatform aerosol field campaigns. The Tropospheric Aerosol Radiative Forcing Observational Experiment (TARFOX) and the second Aerosol Characterization Experiment (ACE-2) were the first IGAC campaigns to address the impact of anthropogenic aerosols, Both TARFOX and ACE-2 gathered extensive data sets on aerosol properties and radiative effects, TARFOX focused on the urban-industrial haze plume flowing from the eastern United States over the western Atlantic Ocean, whereas ACE-2 studied aerosols carried over the eastern Atlantic from both European urban/industrial and African mineral sources. These aerosols often have a marked influence on the top-of-atmosphere radiances measured by satellites. Shown there are contours of aerosol optical depth derived from radiances measured by the AVHRR sensor on the NOAA-11 satellite. The contours readily show that aerosols originating in North America, Europe, and Africa impact the radiative properties of air over the North Atlantic. However, the accurate derivation of flux changes, or radiative forcing, from the satellite measured radiances or retrieved optical depths remains a difficult challenge. In this paper we summarize key initial results from TARFOX and, to a lesser extent, ACE-2, with a focus on those results that allow an improved assessment of the flux changes caused by North Atlantic aerosols at middle latitudes.

  15. Quantum key distribution with entangled photon sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-07-15

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDCmore » source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses.« less

  16. [Inter-and intra-operator variability in the analysis of semen parameters: results from a quality control program].

    PubMed

    Daoud, Salima; Chakroun-Feki, Nozha; Sellami, Afifa; Ammar-Keskes, Leila; Rebai, Tarek

    2016-01-01

    Semen analysis is a key part of male infertility investigation. The necessity of quality management implementation in the andrology laboratory has been recognized in order to ensure the reliability of its results. The aim of this study was to evaluate intra- and inter-individual variability in the assessment of semen parameters in our laboratory through a quality control programme. Four participants from the laboratory with different experience levels have participated in this study. Semen samples of varying quality were assessed for sperm motility, concentration and morphology and the results were used to evaluate inter-participant variability. In addition, replicates of each semen sample were analyzed to determine intra-individual variability for semen parameters analysis. The average values of inter-participant coefficients of variation for sperm motility, concentration and morphology were 12.8%, 19.8% and 48.9% respectively. The mean intra-participant coefficients of variation were, respectively, 6.9%, 12.3% and 42.7% for sperm motility, concentration and morphology. Despite some random errors of under- or overestimation, the overall results remained within the limits of acceptability for all participants. Sperm morphology assessment was particularly influenced by the participant's level of experience. The present data emphasize the need for appropriate training of the laboratory staff and for regular participation in internal quality control programmes in order to improve the reliability of laboratory results.

  17. The Key Factors Analysis of Palisades Temperature in Deep Open-pit Mine

    NASA Astrophysics Data System (ADS)

    Wang, Yuan; Du, Cuifeng; Jin, Wenbo; Wang, Puyu

    2018-01-01

    In order to study the key factors of palisades temperature field in a deep open-pit mine in the natural environment, the influence of natural factors on the palisades temperature in a deep open-pit mine were analysed based on the principle of heat transfer. Four typical places with different ways of solar radiation were selected to carry out the field test. The results show that solar radiation, atmospheric temperature, and wind speed are three main factors affecting the temperature of palisades and that the direct sunlight plays a leading role. The time period of the sun shining directly on the shady slope of the palisades is short because of blocking effect, whose temperature changes in a smaller scale. At the same time, the sun slope of the palisades suffers from the solar radiation for a long time, whose temperature changes in a larger scale, and the variation is similar to the air temperature.

  18. KEY RESULTS FROM IRRADIATION AND POST-IRRADIATION EXAMINATION OF AGR-1 UCO TRISO FUEL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demkowicz, Paul A.; Hunn, John D.; Petti, David A.

    The AGR-1 irradiation experiment was performed as the first test of tristructural isotropic (TRISO) fuel in the US Advanced Gas Reactor Fuel Development and Qualification Program. The experiment consisted of 72 right cylinder fuel compacts containing approximately 3×105 coated fuel particles with uranium oxide/uranium carbide (UCO) fuel kernels. The fuel was irradiated in the Advanced Test Reactor for a total of 620 effective full power days. Fuel burnup ranged from 11.3 to 19.6% fissions per initial metal atom and time average, volume average irradiation temperatures of the individual compacts ranged from 955 to 1136°C. This paper focuses on key resultsmore » from the irradiation and post-irradiation examination, which revealed a robust fuel with excellent performance characteristics under the conditions tested and have significantly improved the understanding of UCO coated particle fuel irradiation behavior within the US program. The fuel exhibited a very low incidence of TRISO coating failure during irradiation and post-irradiation safety testing at temperatures up to 1800°C. Advanced PIE methods have allowed particles with SiC coating failure to be isolated and meticulously examined, which has elucidated the specific causes of SiC failure in these specimens. The level of fission product release from the fuel during irradiation and post-irradiation safety testing has been studied in detail. Results indicated very low release of krypton and cesium through intact SiC and modest release of europium and strontium, while also confirming the potential for significant silver release through the coatings depending on irradiation conditions. Focused study of fission products within the coating layers of irradiated particles down to nanometer length scales has provided new insights into fission product transport through the coating layers and the role various fission products may have on coating integrity. The broader implications of these results and the application

  19. Pedigree-based analysis of derivation of genome segments of an elite rice reveals key regions during its breeding.

    PubMed

    Zhou, Degui; Chen, Wei; Lin, Zechuan; Chen, Haodong; Wang, Chongrong; Li, Hong; Yu, Renbo; Zhang, Fengyun; Zhen, Gang; Yi, Junliang; Li, Kanghuo; Liu, Yaoguang; Terzaghi, William; Tang, Xiaoyan; He, Hang; Zhou, Shaochuan; Deng, Xing Wang

    2016-02-01

    Analyses of genome variations with high-throughput assays have improved our understanding of genetic basis of crop domestication and identified the selected genome regions, but little is known about that of modern breeding, which has limited the usefulness of massive elite cultivars in further breeding. Here we deploy pedigree-based analysis of an elite rice, Huanghuazhan, to exploit key genome regions during its breeding. The cultivars in the pedigree were resequenced with 7.6× depth on average, and 2.1 million high-quality single nucleotide polymorphisms (SNPs) were obtained. Tracing the derivation of genome blocks with pedigree and information on SNPs revealed the chromosomal recombination during breeding, which showed that 26.22% of Huanghuazhan genome are strictly conserved key regions. These major effect regions were further supported by a QTL mapping of 260 recombinant inbred lines derived from the cross of Huanghuazhan and a very dissimilar cultivar, Shuanggui 36, and by the genome profile of eight cultivars and 36 elite lines derived from Huanghuazhan. Hitting these regions with the cloned genes revealed they include numbers of key genes, which were then applied to demonstrate how Huanghuazhan were bred after 30 years of effort and to dissect the deficiency of artificial selection. We concluded the regions are helpful to the further breeding based on this pedigree and performing breeding by design. Our study provides genetic dissection of modern rice breeding and sheds new light on how to perform genomewide breeding by design. © 2015 Society for Experimental Biology, Association of Applied Biologists and John Wiley & Sons Ltd.

  20. MC-GenomeKey: a multicloud system for the detection and annotation of genomic variants.

    PubMed

    Elshazly, Hatem; Souilmi, Yassine; Tonellato, Peter J; Wall, Dennis P; Abouelhoda, Mohamed

    2017-01-20

    Next Generation Genome sequencing techniques became affordable for massive sequencing efforts devoted to clinical characterization of human diseases. However, the cost of providing cloud-based data analysis of the mounting datasets remains a concerning bottleneck for providing cost-effective clinical services. To address this computational problem, it is important to optimize the variant analysis workflow and the used analysis tools to reduce the overall computational processing time, and concomitantly reduce the processing cost. Furthermore, it is important to capitalize on the use of the recent development in the cloud computing market, which have witnessed more providers competing in terms of products and prices. In this paper, we present a new package called MC-GenomeKey (Multi-Cloud GenomeKey) that efficiently executes the variant analysis workflow for detecting and annotating mutations using cloud resources from different commercial cloud providers. Our package supports Amazon, Google, and Azure clouds, as well as, any other cloud platform based on OpenStack. Our package allows different scenarios of execution with different levels of sophistication, up to the one where a workflow can be executed using a cluster whose nodes come from different clouds. MC-GenomeKey also supports scenarios to exploit the spot instance model of Amazon in combination with the use of other cloud platforms to provide significant cost reduction. To the best of our knowledge, this is the first solution that optimizes the execution of the workflow using computational resources from different cloud providers. MC-GenomeKey provides an efficient multicloud based solution to detect and annotate mutations. The package can run in different commercial cloud platforms, which enables the user to seize the best offers. The package also provides a reliable means to make use of the low-cost spot instance model of Amazon, as it provides an efficient solution to the sudden termination of spot

  1. [Review and analysis of the review results of Taiwan nurses association nursing projects (2011~2013)].

    PubMed

    Chang, Li-Yin; Chen, Yu-Chih; Huang, Kuang-Chi; Huang, Jui-Lan; Lee, Tso-Ying

    2015-04-01

    Nursing projects are a key part of N4 professional competency training for nursing personnel. Low passage rates for these projects have been shown to negatively affect the intent of nursing personnel to advance further in the nursing ladder system. This study analyzes the scores for nursing projects between 2011 and 2013, the passage rate for these projects, and the differences in passage rates between different types of projects. This retrospective and descriptive study collected data on nursing projects conducted under the auspices of the Taiwan Nurses Association between 2011 and 2013. Furthermore, the comments of reviewers on 100 nursing projects were randomly selected and subjected to content analysis. A total of 3,359 nursing projects were examined. Eliminating unqualified nursing projects left a total of 3,246 projects for the dataset. A total of 1,099 projects were scored with passing grades, giving a passing rate of 33.9%. The authors of these passing projects worked primarily in northern Taiwan, worked in medical centers, and worked in intensive care departments. The projects submitted by authors in central Taiwan had the highest average score and passing rate, while those living in offshore islands had the lowest average score and passing rate. Most of the project topics belonged to the category: "improvement of nursing service skills or quality" (77.3%). Items with the lowest scores were: validation of questions, analysis of the current situation, and evaluation of results. The topics of nursing projects did not relate significantly to passing rate. However, years of experience, geographic location of hospital, level of institution, and department each had a statistically significant impact on the passage rate. A content analysis of reviewer comments was used to extract common problems. Most of the positive comments were related to the category of "literature review and reference", while most of the negative comments were related to the categories of

  2. Integrated Analysis of Mutation Data from Various Sources Identifies Key Genes and Signaling Pathways in Hepatocellular Carcinoma

    PubMed Central

    Wei, Lin; Tang, Ruqi; Lian, Baofeng; Zhao, Yingjun; He, Xianghuo; Xie, Lu

    2014-01-01

    Background Recently, a number of studies have performed genome or exome sequencing of hepatocellular carcinoma (HCC) and identified hundreds or even thousands of mutations in protein-coding genes. However, these studies have only focused on a limited number of candidate genes, and many important mutation resources remain to be explored. Principal Findings In this study, we integrated mutation data obtained from various sources and performed pathway and network analysis. We identified 113 pathways that were significantly mutated in HCC samples and found that the mutated genes included in these pathways contained high percentages of known cancer genes, and damaging genes and also demonstrated high conservation scores, indicating their important roles in liver tumorigenesis. Five classes of pathways that were mutated most frequently included (a) proliferation and apoptosis related pathways, (b) tumor microenvironment related pathways, (c) neural signaling related pathways, (d) metabolic related pathways, and (e) circadian related pathways. Network analysis further revealed that the mutated genes with the highest betweenness coefficients, such as the well-known cancer genes TP53, CTNNB1 and recently identified novel mutated genes GNAL and the ADCY family, may play key roles in these significantly mutated pathways. Finally, we highlight several key genes (e.g., RPS6KA3 and PCLO) and pathways (e.g., axon guidance) in which the mutations were associated with clinical features. Conclusions Our workflow illustrates the increased statistical power of integrating multiple studies of the same subject, which can provide biological insights that would otherwise be masked under individual sample sets. This type of bioinformatics approach is consistent with the necessity of making the best use of the ever increasing data provided in valuable databases, such as TCGA, to enhance the speed of deciphering human cancers. PMID:24988079

  3. Integrated analysis of mutation data from various sources identifies key genes and signaling pathways in hepatocellular carcinoma.

    PubMed

    Zhang, Yuannv; Qiu, Zhaoping; Wei, Lin; Tang, Ruqi; Lian, Baofeng; Zhao, Yingjun; He, Xianghuo; Xie, Lu

    2014-01-01

    Recently, a number of studies have performed genome or exome sequencing of hepatocellular carcinoma (HCC) and identified hundreds or even thousands of mutations in protein-coding genes. However, these studies have only focused on a limited number of candidate genes, and many important mutation resources remain to be explored. In this study, we integrated mutation data obtained from various sources and performed pathway and network analysis. We identified 113 pathways that were significantly mutated in HCC samples and found that the mutated genes included in these pathways contained high percentages of known cancer genes, and damaging genes and also demonstrated high conservation scores, indicating their important roles in liver tumorigenesis. Five classes of pathways that were mutated most frequently included (a) proliferation and apoptosis related pathways, (b) tumor microenvironment related pathways, (c) neural signaling related pathways, (d) metabolic related pathways, and (e) circadian related pathways. Network analysis further revealed that the mutated genes with the highest betweenness coefficients, such as the well-known cancer genes TP53, CTNNB1 and recently identified novel mutated genes GNAL and the ADCY family, may play key roles in these significantly mutated pathways. Finally, we highlight several key genes (e.g., RPS6KA3 and PCLO) and pathways (e.g., axon guidance) in which the mutations were associated with clinical features. Our workflow illustrates the increased statistical power of integrating multiple studies of the same subject, which can provide biological insights that would otherwise be masked under individual sample sets. This type of bioinformatics approach is consistent with the necessity of making the best use of the ever increasing data provided in valuable databases, such as TCGA, to enhance the speed of deciphering human cancers.

  4. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.

    PubMed

    García-Patrón, Raúl; Cerf, Nicolas J

    2006-11-10

    A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented. Provided that the quantum channel is estimated via the covariance matrix of the quadratures, Gaussian attacks are shown to be optimal against all collective eavesdropping strategies. The proof is made strikingly simple by combining a physical model of measurement, an entanglement-based description of CV-QKD, and a recent powerful result on the extremality of Gaussian states [M. M. Wolf, Phys. Rev. Lett. 96, 080502 (2006)10.1103/PhysRevLett.96.080502].

  5. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  6. Comparison of key aroma compounds in five different types of Japanese soy sauces by aroma extract dilution analysis (AEDA).

    PubMed

    Kaneko, Shu; Kumazawa, Kenji; Nishimura, Osamu

    2012-04-18

    An investigation by the aroma extract dilution analysis (AEDA) technique of the aroma concentrate from five different types of Japanese soy sauces, categorized according to Japan Agricultural Standards as Koikuchi Shoyu (KS), Usukuchi Shoyu (US), Tamari Shoyu (TS), Sai-Shikomi Shoyu (SSS), and Shiro Shoyu (SS), revealed 25 key aroma compounds. Among them, 3-ethyl-1,2-cyclopentanedione and 2'-aminoacetophenone were identified in the soy sauces for the first time. Whereas 3-(methylthio)propanal (methional) and 3-hydroxy-4,5-dimethyl-2(5H)-furanone (sotolon) were detected in all of the soy sauce aroma concentrates as having high flavor dilution (FD) factors, 4-ethyl-2-methoxyphenol was detected as having a high FD factor in only four of the soy sauces (KS, US, TS, and SSS). Furthermore, 5(or 2)-ethyl-4-hydroxy-2(or 5)-methyl-3(2H)-furanone (4-HEMF) and 4-hydroxy-2,5-dimethyl-3(2H)-furanone (4-HDMF), which were thought to be the key odorants in KS, were detected in KS, US, TS, and SSS, but the FD factors widely varied among them. The sensory evaluations demonstrated that the aroma descriptions of a cooked potato-like note and a caramel-like/seasoning-like note were evaluated as high scores with no significant differences among the five soy sauces. On the other hand, a burnt/spicy note was evaluated as having high scores in KS, TS, and SSS, but it was evaluated as having a low score in SS. The comparative AEDA experiments and the auxiliary sensory experiments demonstrated that the five different types of Japanese soy sauces varied in their key aroma compounds and aroma characteristics, and the key aroma compounds in KS might not always be highly contributing in the other types of Japanese soy sauces.

  7. A comprehensive phylogenetic analysis of termites (Isoptera) illuminates key aspects of their evolutionary biology.

    PubMed

    Inward, Daegan J G; Vogler, Alfried P; Eggleton, Paul

    2007-09-01

    The first comprehensive combined molecular and morphological phylogenetic analysis of the major groups of termites is presented. This was based on the analysis of three genes (cytochrome oxidase II, 12S and 28S) and worker characters for approximately 250 species of termites. Parsimony analysis of the aligned dataset showed that the monophyly of Hodotermitidae, Kalotermitidae and Termitidae were well supported, while Termopsidae and Rhinotermitidae were both paraphyletic on the estimated cladogram. Within Termitidae, the most diverse and ecologically most important family, the monophyly of Macrotermitinae, Foraminitermitinae, Apicotermitinae, Syntermitinae and Nasutitermitinae were all broadly supported, but Termitinae was paraphyletic. The pantropical genera Termes, Amitermes and Nasutitermes were all paraphyletic on the estimated cladogram, with at least 17 genera nested within Nasutitermes, given the presently accepted generic limits. Key biological features were mapped onto the cladogram. It was not possible to reconstruct the evolution of true workers unambiguously, as it was as parsimonious to assume a basal evolution of true workers and subsequent evolution of pseudergates, as to assume a basal condition of pseudergates and subsequent evolution of true workers. However, true workers were only found in species with either separate- or intermediate-type nests, so that the mapping of nest habit and worker type onto the cladogram were perfectly correlated. Feeding group evolution, however, showed a much more complex pattern, particularly within the Termitidae, where it proved impossible to estimate unambiguously the ancestral state within the family (which is associated with the loss of worker gut flagellates). However, one biologically plausible optimization implies an initial evolution from wood-feeding to fungus-growing, proposed as the ancestral condition within the Termitidae, followed by the very early evolution of soil-feeding and subsequent re

  8. Characterization of the key aroma compounds in pork soup stock by using an aroma extract dilution analysis.

    PubMed

    Takakura, Yukiko; Osanai, Hiroki; Masuzawa, Takuya; Wakabayashi, Hidehiko; Nishimura, Toshihide

    2014-01-01

    The aroma extract dilution analysis of an extract prepared from pork stock and subsequent experiments led to the identification of 15 aroma-active compounds in the flavor dilution factor range of 64-2048. Omission experiments to select the most aroma-active compounds from the 15 odor compounds suggested acetol, octanoic acid, δ-decalactone, and decanoic acid as the main active compounds contributing to the aroma of pork stock. Aroma recombination, addition, and omission experiments of these four aroma compounds in taste-reconstituted pork stock showed that each compound had an individual aroma profile. A comparison of the overall aroma between this recombined mixture and pork stock showed strong similarity, suggesting that the key aroma compounds had been successfully identified.

  9. Input from Key Stakeholders in the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  10. Has payment by results affected the way that English hospitals provide care? Difference-in-differences analysis

    PubMed Central

    Yi, Deokhee; Sutton, Matt; Chalkley, Martin; Sussex, Jon; Scott, Anthony

    2009-01-01

    Objective To examine whether the introduction of payment by results (a fixed tariff case mix based payment system) was associated with changes in key outcome variables measuring volume, cost, and quality of care between 2003/4 and 2005/6. Setting Acute care hospitals in England. Design Difference-in-differences analysis (using a control group created from trusts in England and providers in Scotland not implementing payment by results in the relevant years); retrospective analysis of patient level secondary data with fixed effects models. Data sources English hospital episode statistics and Scottish morbidity records for 2002/3 to 2005/6. Main outcome measures Changes in length of stay and proportion of day case admissions as a proxy for unit cost; growth in number of spells to measure increases in output; and changes in in-hospital mortality, 30 day post-surgical mortality, and emergency readmission after treatment for hip fracture as measures of impact on quality of care. Results Length of stay fell more quickly and the proportion of day cases increased more quickly where payment by results was implemented, suggesting a reduction in the unit costs of care associated with payment by results. Some evidence of an association between the introduction of payment by results and growth in acute hospital activity was found. Little measurable change occurred in the quality of care indicators used in this study that can be attributed to the introduction of payment by results. Conclusion Reductions in unit costs may have been achieved without detrimental impact on the quality of care, at least in as far as these are measured by the proxy variables used in this study. PMID:19713233

  11. Gene expression profiles analysis identifies key genes for acute lung injury in patients with sepsis.

    PubMed

    Guo, Zhiqiang; Zhao, Chuncheng; Wang, Zheng

    2014-09-26

    To identify critical genes and biological pathways in acute lung injury (ALI), a comparative analysis of gene expression profiles of patients with ALI + sepsis compared with patients with sepsis alone were performed with bioinformatic tools. GSE10474 was downloaded from Gene Expression Omnibus, including a collective of 13 whole blood samples with ALI + sepsis and 21 whole blood samples with sepsis alone. After pre-treatment with robust multichip averaging (RMA) method, differential analysis was conducted using simpleaffy package based upon t-test and fold change. Hierarchical clustering was also performed using function hclust from package stats. Beisides, functional enrichment analysis was conducted using iGepros. Moreover, the gene regulatory network was constructed with information from Kyoto Encyclopedia of Genes and Genomes (KEGG) and then visualized by Cytoscape. A total of 128 differentially expressed genes (DEGs) were identified, including 47 up- and 81 down-regulated genes. The significantly enriched functions included negative regulation of cell proliferation, regulation of response to stimulus and cellular component morphogenesis. A total of 27 DEGs were significantly enriched in 16 KEGG pathways, such as protein digestion and absorption, fatty acid metabolism, amoebiasis, etc. Furthermore, the regulatory network of these 27 DEGs was constructed, which involved several key genes, including protein tyrosine kinase 2 (PTK2), v-src avian sarcoma (SRC) and Caveolin 2 (CAV2). PTK2, SRC and CAV2 may be potential markers for diagnosis and treatment of ALI. The virtual slide(s) for this article can be found here: http://www.diagnosticpathology.diagnomx.eu/vs/5865162912987143.

  12. Key Informants' Perspectives on Teacher Learning in Scotland

    ERIC Educational Resources Information Center

    Kennedy, Aileen; Christie, Donald; Fraser, Christine; Reid, Lesley; McKinney, Stephen; Welsh, Mary; Wilson, Alastair; Griffiths, Morwenna

    2008-01-01

    This article outlines the policy context for teachers' learning and continuing professional development in Scotland and considers this in relation to the perspectives of key informants gained through interview. The analysis draws on a triple-lens conceptual framework and points to some interesting contradictions between the policy text and the…

  13. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  14. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  15. Orbital transfer vehicle concept definition and system analysis study, 1986. Volume 9: Study extension results

    NASA Technical Reports Server (NTRS)

    Kofal, Allen E.

    1987-01-01

    The purpose of this extension to the OTV Concept Definition and Systems Analysis Study was to improve the definition of the OTV Program that will be most beneficial to the nation in the 1995 to 2010 timeframe. The implications of the defined mission and defined launch vehicle are investigated. The key mission requirements identified for the Space Transportation Architecture Study (STAS) were established and reflect a need for early capability and more ambitious capability growth. The key technical objectives and related issues addressed are summarized. The analyses of selected areas including aerobrake design, proximity operations, and the balance of EVA and IVA operations used in the support of the OTV at the space-base were enhanced. Sensitivity studies were conducted to establish how the OTV program should be tailored to meet changing circumstances.

  16. Key Technology Research on Open Architecture for The Sharing of Heterogeneous Geographic Analysis Models

    NASA Astrophysics Data System (ADS)

    Yue, S. S.; Wen, Y. N.; Lv, G. N.; Hu, D.

    2013-10-01

    In recent years, the increasing development of cloud computing technologies laid critical foundation for efficiently solving complicated geographic issues. However, it is still difficult to realize the cooperative operation of massive heterogeneous geographical models. Traditional cloud architecture is apt to provide centralized solution to end users, while all the required resources are often offered by large enterprises or special agencies. Thus, it's a closed framework from the perspective of resource utilization. Solving comprehensive geographic issues requires integrating multifarious heterogeneous geographical models and data. In this case, an open computing platform is in need, with which the model owners can package and deploy their models into cloud conveniently, while model users can search, access and utilize those models with cloud facility. Based on this concept, the open cloud service strategies for the sharing of heterogeneous geographic analysis models is studied in this article. The key technology: unified cloud interface strategy, sharing platform based on cloud service, and computing platform based on cloud service are discussed in detail, and related experiments are conducted for further verification.

  17. Security of Distributed-Phase-Reference Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Moroder, Tobias; Curty, Marcos; Lim, Charles Ci Wen; Thinh, Le Phuc; Zbinden, Hugo; Gisin, Nicolas

    2012-12-01

    Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.

  18. An absolute measure for a key currency

    NASA Astrophysics Data System (ADS)

    Oya, Shunsuke; Aihara, Kazuyuki; Hirata, Yoshito

    It is generally considered that the US dollar and the euro are the key currencies in the world and in Europe, respectively. However, there is no absolute general measure for a key currency. Here, we investigate the 24-hour periodicity of foreign exchange markets using a recurrence plot, and define an absolute measure for a key currency based on the strength of the periodicity. Moreover, we analyze the time evolution of this measure. The results show that the credibility of the US dollar has not decreased significantly since the Lehman shock, when the Lehman Brothers bankrupted and influenced the economic markets, and has increased even relatively better than that of the euro and that of the Japanese yen.

  19. Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol

    DTIC Science & Technology

    2011-06-01

    use in a quantum key system can be defined in two ways :  The number of messages passed between Alice and Bob  The...classical and quantum environment. Post- quantum cryptography , which is generally used to describe classical quantum -resilient protocols, includes...composed of a one- way quantum channel and a two - way classical channel. Owing to the physics of the channel, the quantum channel is subject to

  20. KEY COMPARISON: Results of the APMP Pressure key comparison APMP.M.P-K1c in gas media and gauge mode from 0.4 MPa to 4.0 MPa

    NASA Astrophysics Data System (ADS)

    Bandyopadhyay, A. K.; Woo, Sam Yong; Fitzgerald, Mark; Man, John; Ooiwa, Akira; Jescheck, M.; Jian, Wu; Fatt, Chen Soo; Chan, T. K.; Moore, Ken; El-Tawil, Alaaeldin A. E.

    2003-01-01

    This report summarizes the results of a regional key comparison (APMP-IC-2-97) under the aegis of the Asia Pacific Metrology Program (APMP) for pressure measurements in gas media and in gauge mode from 0.4 MPa to 4.0 MPa. The transfer standard was a pressure-balance with a piston-cylinder assembly with nominal effective area 8.4 mm2 (V-407) and was supplied by the National Metrology Institute of Japan [NMIJ]. Ten standard laboratories from the APMP region with one specially invited laboratory from the EUROMET region, namely Physikalisch-Technische Bundesanstalt (PTB), Germany, participated in this comparison. The comparison started in October 1998 and was completed in May 2001. The pilot laboratory prepared the calibration procedure [1] as per the guidelines of APMP and the International Bureau of Weights and Measures (BIPM) [2-4]. Detailed instructions for performing this key comparison were provided in the calibration protocol [1] and the required data were described in: (1) Annex 3 - characteristics of the laboratory standards, (2) Annex 4 - the effective area (A'p'/mm2) (the prime indicates values based on measured quantities) at 23°C of the travelling standard as a function of nominal pressure (p'/MPa) (five cycles both increasing and decreasing pressures at ten pre-determined pressure points) and (3) Annex 5 - the average effective area at 23°C (A'p'/mm2) obtained for each pressure p'/MPa with all uncertainty statements. The pilot laboratory processed the information and the data provided by the participants for these three annexes, starting with the information about the standards as provided in Annex 3. Based on this information, the participating laboratories are classified into two categories: (I) laboratories that are maintaining primary standards, and (II) laboratories that are maintaining standards loosely classified as secondary standards with a clear traceability as per norm of the BIPM. It is observed that out of these eleven laboratories, six

  1. Novel secret key generation techniques using memristor devices

    NASA Astrophysics Data System (ADS)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  2. Investigation of the key determinants of Asian nurses' quality of life.

    PubMed

    Makabe, Sachiko; Kowitlawakul, Yanika; Nurumal, Mohd Said; Takagai, Junko; Wichaikhum, Orn-Anong; Wangmo, Neyzang; Yap, Suk Foon; Kunaviktikul, Wipada; Komatsu, Junko; Shirakawa, Hideko; Kimura, Yutaka; Asanuma, Yoshihiro

    2018-06-01

    The study aimed to compare nurses' quality of life and investigate key determinants among Asian countries with different economic status. A cross-sectional survey was conducted across five Asian countries (Japan, Singapore, Malaysia, Thailand, and Bhutan). Quality of life (WHOQOL-BREF), job stress (National Institute of Occupational Safety and Health questionnaire), and demographic data were assessed. Stepwise multivariate linear regression analysis was performed to identify the key determinants of quality of life. Participants were 3,829 nurses (response rate: 82%) with a mean age of 33 ± 10 yr and majority were women (92%). Regarding quality of life, Bhutan yielded the highest scores, followed by Malaysia, Thailand, Singapore, and Japan, and these results were statistically significant. The key determinants that were significantly related to quality of life were "stress coping ability," "life satisfaction," "Japan," "social support," "job stress," and "Singapore" (adjusted R 2 =0.46). In conclusion, nurses' quality of life differs across Asian countries and is not linked to the country's economic development. To maintain a good quality of life for nurses, an international exchange program like international nursing conferences for work environment and staff coping strategies is recommended to broaden institution' minds and share experiences and exchange views to be able to realize their own problems and discover global solutions to them.

  3. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study

    PubMed Central

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Background and Objective: Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. Methods: This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. Results: The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. Conclusion: In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making. PMID:29854016

  4. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  5. Key Aroma Compounds in Smoked Cooked Loin.

    PubMed

    Kosowska, Monika; Majcher, Małgorzata A; Jeleń, Henryk H; Fortuna, Teresa

    2018-04-11

    Smoked cooked loin is one of the most popular meat products in Poland. In this study, key volatile compounds in this traditional Polish meat product were determined using gas chromatography-olfactometry and aroma extract dilution analysis (AEDA). In total, 27 odor-active volatile compounds were identified, with flavor dilution (FD) factors ranging from 4 to 1024, with the highest FD factors noted for 2-methoxyphenol, 2-methoxy-4-(prop-2-enyl)phenol, and 2-methoxy-4-( E)-(prop-1-en-1-yl)phenol. Results of the quantitative analyses based on determinations with stable isotope dilution assays (SIDAs) and standard addition (SA), followed by calculations of the odor activity value (OAV), enabled identifying 24 of the volatile compounds responsible for flavor development in the analyzed smoked cooked loin. The highest OAVs were obtained for 2-methoxyphenol, 2-methyl-3-furanthiol, 1-octen-3-one, and 2-methyl-3-(methyldithio)furan.

  6. Key Impact Factors on Dam Break Fatalities

    NASA Astrophysics Data System (ADS)

    Huang, D.; Yu, Z.; Song, Y.; Han, D.; Li, Y.

    2016-12-01

    Dam failures can lead to catastrophes on human society. However, there is a lack of research about dam break fatalities, especially on the key factors that affect fatalities. Based on the analysis of historical dam break cases, most studies have used the regression analysis to explore the correlation between those factors and fatalities, but without implementing optimization to find the dominating factors. In order to understand and reduce the risk of fatalities, this study has proposed a new method to select the impact factors on the fatality. It employs an improved ANN (Artificial Neural Network) combined with LOOCV (Leave-one-out cross-validation) and SFS (Stepwise Forward Selection) approach to explore the nonlinear relationship between impact factors and life losses. It not only considers the factors that have been widely used in the literature but also introduces new factors closely involved with fatalities. Dam break cases occurred in China from 1954 to 2013 are summarized, within which twenty-five cases are selected with a comprehensive coverage of geographic position and temporal variation. Twelve impact factors are taken into account as the inputs, i.e., severity of dam break flood (SF), population at risk (PR), public understanding of dam break (UB), warning time (TW), evacuation condition (EC), weather condition during dam break (WB), dam break mode (MB), water storage (SW), building vulnerability (VB), dam break time (TB), average distance from the affected area to the dam (DD) and preventive measures by government (PG).From those, three key factors of SF, MB and TB are chosen. The proposed method is able to extract the key factors, and the derived fatality model performs well in various types of dam break conditions.

  7. Public perceptions of key performance indicators of healthcare in Alberta, Canada.

    PubMed

    Northcott, Herbert C; Harvey, Michael D

    2012-06-01

    To examine the relationship between public perceptions of key performance indicators assessing various aspects of the health-care system. Cross-sequential survey research. Annual telephone surveys of random samples of adult Albertans selected by random digit dialing and stratified according to age, sex and region (n = 4000 for each survey year). The survey questionnaires included single-item measures of key performance indicators to assess public perceptions of availability, accessibility, quality, outcome and satisfaction with healthcare. Cronbach's α and factor analysis were used to assess the relationship between key performance indicators focusing on the health-care system overall and on a recent interaction with the health-care system. The province of Alberta, Canada during the years 1996-2004. Four thousand adults randomly selected each survey year. Survey questions measuring public perceptions of healthcare availability, accessibility, quality, outcome and satisfaction with healthcare. Factor analysis identified two principal components with key performance indicators focusing on the health system overall loading most strongly on the first component and key performance indicators focusing on the most recent health-care encounter loading most strongly on the second component. Assessments of the quality of care most recently received, accessibility of that care and perceived outcome of care tended to be higher than the more general assessments of overall health system quality and accessibility. Assessments of specific health-care encounters and more general assessments of the overall health-care system, while related, nevertheless comprise separate dimensions for health-care evaluation.

  8. Simultaneous detection of landmarks and key-frame in cardiac perfusion MRI using a joint spatial-temporal context model

    NASA Astrophysics Data System (ADS)

    Lu, Xiaoguang; Xue, Hui; Jolly, Marie-Pierre; Guetter, Christoph; Kellman, Peter; Hsu, Li-Yueh; Arai, Andrew; Zuehlsdorff, Sven; Littmann, Arne; Georgescu, Bogdan; Guehring, Jens

    2011-03-01

    Cardiac perfusion magnetic resonance imaging (MRI) has proven clinical significance in diagnosis of heart diseases. However, analysis of perfusion data is time-consuming, where automatic detection of anatomic landmarks and key-frames from perfusion MR sequences is helpful for anchoring structures and functional analysis of the heart, leading toward fully automated perfusion analysis. Learning-based object detection methods have demonstrated their capabilities to handle large variations of the object by exploring a local region, i.e., context. Conventional 2D approaches take into account spatial context only. Temporal signals in perfusion data present a strong cue for anchoring. We propose a joint context model to encode both spatial and temporal evidence. In addition, our spatial context is constructed not only based on the landmark of interest, but also the landmarks that are correlated in the neighboring anatomies. A discriminative model is learned through a probabilistic boosting tree. A marginal space learning strategy is applied to efficiently learn and search in a high dimensional parameter space. A fully automatic system is developed to simultaneously detect anatomic landmarks and key frames in both RV and LV from perfusion sequences. The proposed approach was evaluated on a database of 373 cardiac perfusion MRI sequences from 77 patients. Experimental results of a 4-fold cross validation show superior landmark detection accuracies of the proposed joint spatial-temporal approach to the 2D approach that is based on spatial context only. The key-frame identification results are promising.

  9. Risk management of key issues of FPSO

    NASA Astrophysics Data System (ADS)

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  10. Work Keys: Developing the Assessments.

    ERIC Educational Resources Information Center

    McLarty, Joyce R.

    The American College Testing Program is developing a new program, Work Keys, a system to develop and assess employability skills. It consists of four components: (1) a systematic process for profiling job skill requirements; (2) assessments that measure learners' job skill levels; (3) procedures and formats for conveying assessment results so they…

  11. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  12. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code.

    PubMed

    Lin, Chao; Shen, Xueju; Li, Baochen

    2014-08-25

    We demonstrate that all parameters of optical lightwave can be simultaneously designed as keys in security system. This multi-dimensional property of key can significantly enlarge the key space and further enhance the security level of the system. The single-shot off-axis digital holography with orthogonal polarized reference waves is employed to perform polarization state recording on object wave. Two pieces of polarization holograms are calculated and fabricated to be arranged in reference arms to generate random amplitude and phase distribution respectively. When reconstruction, original information which is represented with QR code can be retrieved using Fresnel diffraction with decryption keys and read out noise-free. Numerical simulation results for this cryptosystem are presented. An analysis on the key sensitivity and fault tolerance properties are also provided.

  13. Metropolitan Quantum Key Distribution with Silicon Photonics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalablemore » resource for future formation of metropolitan quantum-secure communications networks.« less

  14. Metropolitan Quantum Key Distribution with Silicon Photonics

    DOE PAGES

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; ...

    2018-04-06

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalablemore » resource for future formation of metropolitan quantum-secure communications networks.« less

  15. Metropolitan Quantum Key Distribution with Silicon Photonics

    NASA Astrophysics Data System (ADS)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  16. Dichotomous Identification Keys: A Ladder to Higher Order Knowledge about the Human Body

    ERIC Educational Resources Information Center

    Sorgo, Andrej

    2006-01-01

    We tried to enrich teaching human anatomy in high school biology lessons. Students construct dichotomous identification keys to the cells, tissues, organs, or body parts. By doing this, students have achieved higher-order cognitive levels of knowledge because construction of such keys is based on analysis, synthesis, and evaluation. Students found…

  17. Keys and the crisis in taxonomy: extinction or reinvention?

    PubMed

    Walter, David Evans; Winterton, Shaun

    2007-01-01

    Dichotomous keys that follow a single pathway of character state choices to an end point have been the primary tools for the identification of unknown organisms for more than two centuries. However, a revolution in computer diagnostics is now under way that may result in the replacement of traditional keys by matrix-based computer interactive keys that have many paths to a correct identification and make extensive use of hypertext to link to images, glossaries, and other support material. Progress is also being made on replacing keys entirely by optical matching of specimens to digital databases and DNA sequences. These new tools may go some way toward alleviating the taxonomic impediment to biodiversity studies and other ecological and evolutionary research, especially with better coordination between those who produce keys and those who use them and by integrating interactive keys into larger biological Web sites.

  18. Cloud Feedback Key to Marine Heatwave off Baja California

    NASA Astrophysics Data System (ADS)

    Myers, Timothy A.; Mechoso, Carlos R.; Cesana, Gregory V.; DeFlorio, Michael J.; Waliser, Duane E.

    2018-05-01

    Between 2013 and 2015, the northeast Pacific Ocean experienced the warmest surface temperature anomalies in the modern observational record. This "marine heatwave" marked a shift of Pacific decadal variability to its warm phase and was linked to significant impacts on marine species as well as exceptionally arid conditions in western North America. Here we show that the subtropical signature of this warming, off Baja California, was associated with a record deficit in the spatial coverage of co-located marine boundary layer clouds. This deficit coincided with a large increase in downwelling solar radiation that dominated the anomalous energy budget of the upper ocean, resulting in record-breaking warm sea surface temperature anomalies. Our observation-based analysis suggests that a positive cloud-surface temperature feedback was key to the extreme intensity of the heatwave. The results demonstrate the extent to which boundary layer clouds can contribute to regional variations in climate.

  19. Key terms for the assessment of the safety of vaccines in pregnancy: Results of a global consultative process to initiate harmonization of adverse event definitions.

    PubMed

    Munoz, Flor M; Eckert, Linda O; Katz, Mark A; Lambach, Philipp; Ortiz, Justin R; Bauwens, Jorgen; Bonhoeffer, Jan

    2015-11-25

    The variability of terms and definitions of Adverse Events Following Immunization (AEFI) represents a missed opportunity for optimal monitoring of safety of immunization in pregnancy. In 2014, the Brighton Collaboration Foundation and the World Health Organization (WHO) collaborated to address this gap. Two Brighton Collaboration interdisciplinary taskforces were formed. A landscape analysis included: (1) a systematic literature review of adverse event definitions used in vaccine studies during pregnancy; (2) a worldwide stakeholder survey of available terms and definitions; (3) and a series of taskforce meetings. Based on available evidence, taskforces proposed key terms and concept definitions to be refined, prioritized, and endorsed by a global expert consultation convened by WHO in Geneva, Switzerland in July 2014. Using pre-specified criteria, 45 maternal and 62 fetal/neonatal events were prioritized, and key terms and concept definitions were endorsed. In addition recommendations to further improve safety monitoring of immunization in pregnancy programs were specified. This includes elaboration of disease concepts into standardized case definitions with sufficient applicability and positive predictive value to be of use for monitoring the safety of immunization in pregnancy globally, as well as the development of guidance, tools, and datasets in support of a globally concerted approach. There is a need to improve the safety monitoring of immunization in pregnancy programs. A consensus list of terms and concept definitions of key events for monitoring immunization in pregnancy is available. Immediate actions to further strengthen monitoring of immunization in pregnancy programs are identified and recommended. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  20. Analytical performances of food microbiology laboratories - critical analysis of 7 years of proficiency testing results.

    PubMed

    Abdel Massih, M; Planchon, V; Polet, M; Dierick, K; Mahillon, J

    2016-02-01

    Based on the results of 19 food microbiology proficiency testing (PT) schemes, this study aimed to assess the laboratory performances, to highlight the main sources of unsatisfactory analytical results and to suggest areas of improvement. The 2009-2015 results of REQUASUD and IPH PT, involving a total of 48 laboratories, were analysed. On average, the laboratories failed to detect or enumerate foodborne pathogens in 3·0% of the tests. Thanks to a close collaboration with the PT participants, the causes of outliers could be identified in 74% of the cases. The main causes of erroneous PT results were either pre-analytical (handling of the samples, timing of analysis), analytical (unsuitable methods, confusion of samples, errors in colony counting or confirmation) or postanalytical mistakes (calculation and encoding of results). PT schemes are a privileged observation post to highlight analytical problems, which would otherwise remain unnoticed. In this perspective, this comprehensive study of PT results provides insight into the sources of systematic errors encountered during the analyses. This study draws the attention of the laboratories to the main causes of analytical errors and suggests practical solutions to avoid them, in an educational purpose. The observations support the hypothesis that regular participation to PT, when followed by feed-back and appropriate corrective actions, can play a key role in quality improvement and provide more confidence in the laboratory testing results. © 2015 The Society for Applied Microbiology.

  1. Sport promotion policies in the European Union: results of a contents analysis.

    PubMed

    Christiansen, N V; Kahlmeier, S; Racioppi, F

    2014-04-01

    Although sport promotion may play an important role in achieving the recommended levels of physical activity for health, until now, there has been no comprehensive assessment of how sport policies in Europe address health. This article aimed at filling this gap by reviewing and analyzing recent national policy developments in the area of sport promotion, with a focus on synergies and discrepancies with the promotion of health-enhancing physical activity. By applying various search methods, 130 documents focusing on sport and physical activity were identified in the World Health Organization (WHO) European Region. An analysis grid covering key indicators was developed for a systematic content analysis of 25 documents, selected according to established criteria. Analysis showed that general recommendations for good policy making were followed, such as establishing general goals, specifying time frame and responsible body for implementation and addressing different target groups. Furthermore, all sport strategies addressed health on an overall level and recognized the importance of Sport for All. However, in several strategies, there was a lack of measurable targets, specified budgets, and evaluation plans. The analysis showed that there is a great opportunity for health and sport sectors to work more closely together in the future, and identified areas where this could take place. © 2012 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. Hardening Logic Encryption against Key Extraction Attacks with Circuit Camouflage

    DTIC Science & Technology

    2017-03-01

    camouflage; obfuscation; SAT; key extraction; reverse engineering; security; trusted electronics Introduction Integrated Circuit (IC) designs are...Encryption Algorithms”, Hardware Oriented Security and Trust , 2015. 3. Rajendran J., Pino, Y., Sinanoglu, O., Karri, R., “Security Analysis of Logic

  3. Metabolomic Analysis of Key Central Carbon Metabolism Carboxylic Acids as Their 3-Nitrophenylhydrazones by UPLC/ESI-MS

    PubMed Central

    Han, Jun; Gagnon, Susannah; Eckle, Tobias; Borchers, Christoph H.

    2014-01-01

    Multiple hydroxy-, keto-, di-, and tri-carboxylic acids are among the cellular metabolites of central carbon metabolism (CCM). Sensitive and reliable analysis of these carboxylates is important for many biological and cell engineering studies. In this work, we examined 3-nitrophenylhydrazine as a derivatizing reagent and optimized the reaction conditions for the measurement of ten CCM related carboxylic compounds, including glycolate, lactate, malate, fumarate, succinate, citrate, isocitrate, pyruvate, oxaloacetate, and α-ketoglutarate as their 3-nitrophenylhydrazones using LC/MS with electrospray ionization. With the derivatization protocol which we have developed, and using negative-ion multiple reaction monitoring on a triple-quadrupole instrument, all of the carboxylates showed good linearity within a dynamic range of ca. 200 to more than 2000. The on-column limits of detection and quantitation were from high femtomoles to low picomoles. The analytical accuracies for eight of the ten analytes were determined to be between 89.5 to 114.8% (CV≤7.4%, n=6). Using a quadrupole time-of-flight instrument, the isotopic distribution patterns of these carboxylates, extracted from a 13C-labeled mouse heart, were successfully determined by UPLC/MS with full-mass detection, indicating the possible utility of this analytical method for metabolic flux analysis. In summary, this work demonstrates an efficient chemical derivatization LC/MS method for metabolomic analysis of these key CCM intermediates in a biological matrix. PMID:23580203

  4. Relativity Concept Inventory: Development, Analysis, and Results

    ERIC Educational Resources Information Center

    Aslanides, J. S.; Savage, C. M.

    2013-01-01

    We report on a concept inventory for special relativity: the development process, data analysis methods, and results from an introductory relativity class. The Relativity Concept Inventory tests understanding of relativistic concepts. An unusual feature is confidence testing for each question. This can provide additional information; for example,…

  5. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  6. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  7. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  8. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  9. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  10. Key Working for Families with Young Disabled Children

    PubMed Central

    Carter, Bernie; Thomas, Megan

    2011-01-01

    For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other

  11. Mont Terri Underground Rock Laboratory, Switzerland-Research Program And Key Results

    NASA Astrophysics Data System (ADS)

    Nussbaum, C. O.; Bossart, P. J.

    2012-12-01

    Argillaceous formations generally act as aquitards because of their low hydraulic conductivities. This property, together with the large retention capacity of clays for cationic contaminants and the potential for self-sealing, has brought clay formations into focus as potential host rocks for the geological disposal of radioactive waste. Excavated in the Opalinus Clay formation, the Mont Terri underground rock laboratory in the Jura Mountains of NW Switzerland is an important international test site for researching clay formations. Research is carried out in the underground facility, which is located adjacent to the security gallery of the Mont Terri motorway tunnel. Fifteen partners from European countries, USA, Canada and Japan participate in the project. The objectives of the research program are to analyze the hydrogeological, geochemical and rock mechanical properties of the Opalinus Clay, to determine the changes induced by the excavation of galleries and by heating of the rock formation, to test sealing and container emplacement techniques and to evaluate and improve suitable investigation techniques. For the safety of deep geological disposal, it is of key importance to understand the processes occurring in the undisturbed argillaceous environment, as well as the processes in a disturbed system, during the operation of the repository. The objectives are related to: 1. Understanding processes and mechanisms in undisturbed clays and 2. Experiments related to repository-induced perturbations. Experiments of the first group are dedicated to: i) Improvement of drilling and excavation technologies and sampling methods; ii) Estimation of hydrogeological, rock mechanical and geochemical parameters of the undisturbed Opalinus Clay. Upscaling of parameters from laboratory to in situ scale; iii) Geochemistry of porewater and natural gases; evolution of porewater over time scales; iv) Assessment of long-term hydraulic transients associated with erosion and thermal

  12. An investigation into the differentiating characteristics between car key burglars and regular burglars.

    PubMed

    Chapman, Rachel; Smith, Lisa L; Bond, John W

    2012-07-01

    Car key burglary has recently become the focus of empirical investigation as offenders, no longer able to steal vehicles without first obtaining their keys, resort to "burgling" target properties. Research surrounding the modus operandi of these offenses is beginning to emerge; however, little attention has been paid to investigating the characteristics of car key burglary offenders. Challenging the assumption that car key burglary offenses are perpetrated by regular burglars, this study aims to differentiate between offenders. Logistic regression analysis of 110 car key and 110 regular burglary offenders revealed that car key burglars are more likely to have previous vehicle theft convictions and are also more likely to be detected on information supplied to the police than regular burglars. Regular burglars are more likely to have previous shoplifting convictions. It was concluded that car key burglars are a distinct sample of offenders and the implications of these findings are discussed. © 2012 American Academy of Forensic Sciences.

  13. Final report on key comparison CCQM-K81: Chloramphenicol in pig muscle

    NASA Astrophysics Data System (ADS)

    Polzer, Joachim; Henrion, Andre; Gowik, Petra

    2013-01-01

    Under the auspices of the Organic Analysis Working Group (OAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) a key comparison, CCQM-K81 'Chloramphenicol in pig muscle', was coordinated by BVL and PTB in 2009/2010. Six NMIs/DIs participated in this comparison. Chloramphenicol (CAP) is an effective broad-spectrum antibiotic which can in principle be used for the treatment of humans and animals. Its use for the treatment of food-producing animals is, however, forbidden worldwide in many countries due to potential severe side effects. The key comparison was the follow-up to the successful pilot study 'CCQM-P90: chloramphenicol in milk'. With this key comparison it was intended to demonstrate the capability of NMIs/DIs to analyse traces of CAP in food at concentration levels resulting from legal requirements for food control. Additionally, the quality of this kind of analysis with respect to compliance with legal requirements for food control methods and the international comparability of measurements should be evaluated in general. The study was classified as a 'track C' study (studies in emerging areas of global interest). For the study incurred lyophilised pig muscle material containing CAP (at a mass-fraction level around the maximum allowable level for import for a number of countries) has been produced as a candidate reference material by BVL and IRMM (Institute for Reference Materials and Measurements, JRC of the European Commission). Animal treatment and slaughtering of the animal to gain incurred muscle material as well as pre-testing of the CAP content was done at the BVL. The IRMM did further processing of the material and testing of homogeneity and stability. Participants were invited to assign the mass fraction of free CAP in the comparison sample. CCQM-K81 demonstrated successfully the capability of the participating laboratories to assign chloramphenicol values in tissue down to residue levels of around 0.3 ng/g (referring to the

  14. Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit

    NASA Astrophysics Data System (ADS)

    Chan, Chung

    2017-10-01

    The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated components for generating a common secret key. The objective is to maximize the achievable key rate as a function of the joint entropy of the compressed sources. Since the maximum achievable key rate captures the total amount of information mutual to the compressed sources, an optimal compression scheme essentially maximizes the multivariate mutual information per bit of randomness of the private sources, and can therefore be viewed more generally as a dimension reduction technique. Single-letter lower and upper bounds on the maximum achievable key rate are derived for the general source model, and an explicit polynomial-time computable formula is obtained for the pairwise independent network model. In particular, the converse results and the upper bounds are obtained from those of the related secret key agreement problem with rate-limited discussion. A precise duality is shown for the two-user case with one-way discussion, and such duality is extended to obtain the desired converse results in the multi-user case. In addition to posing new challenges in information processing and dimension reduction, the compressed secret key agreement problem helps shed new light on resolving the difficult problem of secret key agreement with rate-limited discussion, by offering a more structured achieving scheme and some simpler conjectures to prove.

  15. Incompleteness and limit of security theory of quantum key distribution

    NASA Astrophysics Data System (ADS)

    Hirota, Osamu; Murakami, Dan; Kato, Kentaro; Futami, Fumio

    2012-10-01

    It is claimed in the many papers that a trace distance: d guarantees the universal composition security in quantum key distribution (QKD) like BB84 protocol. In this introduction paper, at first, it is explicitly explained what is the main misconception in the claim of the unconditional security for QKD theory. In general terms, the cause of the misunderstanding on the security claim is the Lemma in the paper of Renner. It suggests that the generation of the perfect random key is assured by the probability (1-d), and its failure probability is d. Thus, it concludes that the generated key provides the perfect random key sequence when the protocol is success. So the QKD provides perfect secrecy to the one time pad. This is the reason for the composition claim. However, the quantity of the trace distance (or variational distance) is not the probability for such an event. If d is not small enough, always the generated key sequence is not uniform. Now one needs the reconstruction of the evaluation of the trace distance if one wants to use it. One should first go back to the indistinguishability theory in the computational complexity based, and to clarify the meaning of the value of the variational distance. In addition, the same analysis for the information theoretic case is necessary. The recent serial papers by H.P.Yuen have given the answer on such questions. In this paper, we show more concise description of Yuen's theory, and clarify that the upper bound theories for the trace distance by Tomamichel et al and Hayashi et al are constructed by the wrong reasoning of Renner and it is unsuitable as the security analysis. Finally, we introduce a new macroscopic quantum communication to replace Q-bit QKD.

  16. Key-lock colloids in a nematic liquid crystal.

    PubMed

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  17. Phylogenetic analysis of dengue virus types 1 and 4 circulating in Puerto Rico and Key West, Florida, during 2010 epidemics.

    PubMed

    Añez, Germán; Heisey, Daniel A R; Espina, Luz M; Stramer, Susan L; Rios, Maria

    2012-09-01

    We describe sequences of six strains of dengue virus (DENV): three DENV-1 isolates and two DENV-4 isolates from Puerto Rico, and a DENV-1 strain from Key West, Florida, obtained from blood donors during 2010 epidemics. Phylogenetic analysis revealed that the Puerto Rico DENV-1 strains constitute a new lineage within genotype V different from those that circulated in Puerto Rico during the past two decades. The newer Puerto Rico DENV-1 strains associated with strains from the Caribbean and South America. The DENV-1 strain from Key West, Florida clustered with a strain isolated from mosquito pools collected in that area and with a number of strains from Nicaragua and Mexico circulating during 2006-2009. The Puerto Rico DENV-4 isolates of genotype II associated with strains that have circulated on the island throughout the 1980s and 1990s and with strains from the Caribbean region and Central America. Introduction and circulation of novel DENV lineages in dengue-endemic regions have the potential to increase the severity of dengue cases.

  18. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  19. Implementation of Point-of-Care Diagnostics in Rural Primary Healthcare Clinics in South Africa: Perspectives of Key Stakeholders

    PubMed Central

    Mashamba-Thompson, Tivani P.; Jama, Ngcwalisa A.; Sartorius, Benn; Drain, Paul K.; Thompson, Rowan M.

    2017-01-01

    Introduction: Key stakeholders’ involvement is crucial to the sustainability of quality point-of-care (POC) diagnostics services in low-and-middle income countries. The aim of this study was to explore key stakeholder perceptions on the implementation of POC diagnostics in rural primary healthcare (PHC) clinics in South Africa. Method: We conducted a qualitative study encompassing in-depth interviews with multiple key stakeholders of POC diagnostic services for rural and resource-limited PHC clinics. Interviews were digitally recorded and transcribed verbatim prior to thematic content analysis. Thematic content analysis was conducted using themes guided by the World Health Organisation (WHO) quality-ASSURED (Affordable, Sensitive, Specific, User friendly, Rapid and to enable treatment at first visit and Robust, Equipment free and Delivered to those who need it) criteria for POC diagnostic services in resource-limited settings. Results: 11 key stakeholders participated in the study. All stakeholders perceived the main advantage of POC diagnostics as enabling access to healthcare for rural patients. Stakeholders perceived the current POC diagnostic services to have an ability to meet patients’ needs, but recommended further improvement of the following areas: research on cost-effectiveness; improved quality management systems; development of affordable POC diagnostic and clinic-based monitoring and evaluation. Conclusions: Key stakeholders of POC diagnostics in rural PHC clinics in South Africa highlighted the need to assess affordability and ensure quality assurance of current services before adopting new POC diagnostics and scaling up current POC diagnostics. PMID:28075337

  20. Performance analysis of air-water quantum key distribution with an irregular sea surface

    NASA Astrophysics Data System (ADS)

    Xu, Hua-bin; Zhou, Yuan-yuan; Zhou, Xue-jun; Wang, Lian

    2018-05-01

    In the air-water quantum key distribution (QKD), the irregular sea surface has some influence on the photon polarization state. The wind is considered as the main factor causing the irregularity, so the model of irregular sea surface based on the wind speed is adopted. The relationships of the quantum bit error rate with the wind speed and the initial incident angle are simulated. Therefore, the maximum secure transmission depth of QKD is confirmed, and the limitation of the wind speed and the initial incident angle is determined. The simulation results show that when the wind speed and the initial incident angle increase, the performance of QKD will fall down. Under the intercept-resend attack condition, the maximum safe transmission depth of QKD is up to 105 m. To realize safe communications in the safe diving depth of submarines (100 m), the initial incident angle is requested to be not exceeding 26°, and with the initial incident angle increased, the limitation of wind speed is decreased.

  1. Continuous-variable quantum key distribution protocols over noisy channels.

    PubMed

    García-Patrón, Raúl; Cerf, Nicolas J

    2009-04-03

    A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne detection is introduced and shown to attain higher secret key rates over a noisy line than any other one-way Gaussian protocol. This increased resistance to channel noise can be understood as resulting from purposely adding noise to the signal that is converted into the secret key. This notion of noise-enhanced tolerance to noise also provides a better physical insight into the poorly understood discrepancies between the previously defined families of Gaussian protocols.

  2. Effects of Fermentation Temperature on Key Aroma Compounds and Sensory Properties of Apple Wine.

    PubMed

    Peng, Bangzhu; Li, Fuling; Cui, Lu; Guo, Yaodong

    2015-12-01

    Fermentation temperature strongly affects yeast metabolism during apple wine making and thus aromatic and quality profiles. In this study, the temperature effect during apple wine making on both the key aroma compounds and sensory properties of apple wine were investigated. The concentration of nine key aroma compounds (ethyl acetate, isobutyl acetate, isopentylacetate, ethyl caprylate, ethyl 4-hydroxybutanoate, isobutylalcohol, isopentylalcohol, 3-methylthio-1-propanol, and benzeneethanol) in apple wine significantly increased with the increase of fermentation temperature from 17 to 20 °C, and then eight out of the nine key aroma compounds with an exception of ethyl 4-hydroxybutanoate, decreased when the temperature goes up 20 to 26 °C. Sensory analysis showed that the apple wine fermented at 20 °C had the highest acceptance for consumers. Fermentation at the temperature of 20 °C was therefore considered to be the most suitable condition using the selected yeast strain (Saccharomyces cerevisiae AP05) for apple wine making. Changes in the fermentation temperature can considerably affect the production of key aroma compounds and sensory profiles of apple wine. These results could help apple wine producers make better quality production for consumers at the optimal fermentation temperature. © 2015 Institute of Food Technologists®

  3. Self-referenced continuous-variable quantum key distribution protocol

    DOE PAGES

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin; ...

    2015-10-21

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  4. Self-referenced continuous-variable quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  5. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lütkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-01

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  6. Investigation of the key determinants of Asian nurses’ quality of life

    PubMed Central

    MAKABE, Sachiko; KOWITLAWAKUL, Yanika; NURUMAL, Mohd Said; TAKAGAI, Junko; WICHAIKHUM, Orn-Anong; WANGMO, Neyzang; YAP, Suk Foon; KUNAVIKTIKUL, Wipada; KOMATSU, Junko; SHIRAKAWA, Hideko; KIMURA, Yutaka; ASANUMA, Yoshihiro

    2018-01-01

    The study aimed to compare nurses’ quality of life and investigate key determinants among Asian countries with different economic status. A cross-sectional survey was conducted across five Asian countries (Japan, Singapore, Malaysia, Thailand, and Bhutan). Quality of life (WHOQOL-BREF), job stress (National Institute of Occupational Safety and Health questionnaire), and demographic data were assessed. Stepwise multivariate linear regression analysis was performed to identify the key determinants of quality of life. Participants were 3,829 nurses (response rate: 82%) with a mean age of 33 ± 10 yr and majority were women (92%). Regarding quality of life, Bhutan yielded the highest scores, followed by Malaysia, Thailand, Singapore, and Japan, and these results were statistically significant. The key determinants that were significantly related to quality of life were “stress coping ability,” “life satisfaction,” “Japan,” “social support,” “job stress,” and “Singapore” (adjusted R2=0.46). In conclusion, nurses’ quality of life differs across Asian countries and is not linked to the country’s economic development. To maintain a good quality of life for nurses, an international exchange program like international nursing conferences for work environment and staff coping strategies is recommended to broaden institution’ minds and share experiences and exchange views to be able to realize their own problems and discover global solutions to them. PMID:29491251

  7. An economic cost analysis of emergency department key performance indicators in Ireland.

    PubMed

    Gannon, Brenda; Jones, Cheryl; McCabe, Aileen; O'Sullivan, Ronan; Wakai, Abel

    2017-06-01

    High quality data is fundamental to using key performance indicators (KPIs) for performance monitoring. However, the resources required to collect high quality data are often significant and should usually be targeted at high priority areas. As part of a study of 11 emergency department (ED) KPIs in Ireland, the primary objective of this study was to estimate the relative cost of collecting the additional minimum data set (MDS) elements for those 11 KPIs. An economic cost analysis focused on 12 EDs in the Republic of Ireland. The resource use data were obtained using two separate focus group interviews. The number of available MDS elements was obtained from a sample of 100 patient records per KPI per participating ED. Unit costs for all resource use were taken at the midpoint of the relevant staff salary scales. An ED would need to spend an estimated additional &OV0556;3561 per month on average to capture all the MDS elements relevant to the 11 KPIs investigated. The additional cost ranges from 14.8 to 39.2%; this range is 13.9-32.3% for small EDs, whereas the range for medium EDs is 11.7-40%. Regional EDs have a higher additional estimated cost to capture all the relevant MDS elements (&OV0556;3907), compared with urban EDs (&OV0556;3353). The additional cost of data collection, contingent on that already collected, required to capture all the relevant MDS elements for the KPIs examined, ranges from 14.8 to 39.2% per KPI, with variation identified between regional and urban hospitals.

  8. Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)

    NASA Astrophysics Data System (ADS)

    Škorić, Boris; de Vries, Manon

    Perfect encryption of quantum states using the Quantum One-Time Pad (QOTP) requires two classical key bits per qubit. Almost-perfect encryption, with information-theoretic security, requires only slightly more than 1. We slightly improve lower bounds on the key length. We show that key length n+2log1ɛ suffices to encrypt n qubits in such a way that the cipherstate’s L1-distance from uniformity is upperbounded by ɛ. For a stricter security definition involving the ∞-norm, we prove sufficient key length n+logn+2log1ɛ+1+1nlog1δ+logln21-ɛ, where δ is a small probability of failure. Our proof uses Pauli operators, whereas previous results on the ∞-norm needed Haar measure sampling. We show how to QOTP-encrypt classical plaintext in a nontrivial way: we encode a plaintext bit as the vector ±(1,1,1)/3 on the Bloch sphere. Applying the Pauli encryption operators results in eight possible cipherstates which are equally spread out on the Bloch sphere. This encoding, especially when combined with the half-keylength option of QOTP, has advantages over 4-state and 6-state encoding in applications such as Quantum Key Recycling (QKR) and Unclonable Encryption (UE). We propose a key recycling scheme that is more efficient and can tolerate more noise than a recent scheme by Fehr and Salvail. For 8-state QOTP encryption with pseudorandom keys, we do a statistical analysis of the cipherstate eigenvalues. We present numerics up to nine qubits.

  9. Analysis of landslide overgrowing rates at Vaskiny Dachi key site, Central Yamal, Russia

    NASA Astrophysics Data System (ADS)

    Khomutov, A.

    2009-04-01

    An estimation of overgrowing of landslide-affected slopes by vegetation at three main landslide elements: shear surface, landslide body and "frontal zone" at Vaskiny Dachi key site is presented. Vaskiny Dachi key site is located in the watershed of Se-Yakha and Mordy-Yakha rivers on Central Yamal, Russia. The area is represented by highly-dissected alluvial-lacustrine-marine plains and terraces. The closest to Vaskiny Dachi climate station is Marresale, about 90 km southwest of Vaskiny Dachi, at the Kara sea coast. The weather here is probably somewhat cooler than at Vaskiny Dachi. The average annual (summer) air temperature at Marresale is -8.3° C (4.3° C) ("Russia's Weather" Server). To estimate vegetation cover dynamics on cryogenic landslides at "Vaskiny Dachi", data published by O.Rebristaya and others (1995) were used. Their observations were done in 1991-1993, and were supplemented by further field observations (Leibman et al., 2000, Khomutov & Leibman 2007) and by field and remote sensing observations in 2008. An estimation of vegetation cover dynamics on cryogenic landslides at "Vaskiny Dachi" leads to the following results. Immediately after landsliding in 1989, landslide shear surface was bare without any vegetation, landslide body had initial vegetation, and "frontal zone" was under liquefied sediment masses. "Frontal zone" formed in front of a landslide body, appears as a result of damming of drainage routes by a landslide body with flooding of the shear surface "upstream" of the landslide body, formation of a sedge-cottongrass meadow there, and swamping downstream (Khomutov & Leibman 2007). By 1993, landslide shear surface got overgrown by species subordinate in surrounding initial landscapes (Alopecurus alpinus, Festuca ovina, Calamagrostis neglecta, Poa alpigena ssp. Alpigena, etc.). Landslide body was covered by initial communities which got depressed: vitality of Salix polaris, Vaccinium vitis-idaea was reduced, dead off moss cover and overgrown

  10. Efficient and universal quantum key distribution based on chaos and middleware

    NASA Astrophysics Data System (ADS)

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.

  11. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  12. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  13. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  14. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  15. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  16. Bibliometric Characteristics of Articles on Key Competences Indexed in ERIC from 1990 to 2013

    ERIC Educational Resources Information Center

    Buscà Donet, Francesc; Ambròs Pallares, Alba; Burset Burillo, Sílvia

    2017-01-01

    This paper analyses the bibliometric characteristics of 616 journal articles on key competences indexed in ERIC in a 23-year-period following documentary analysis. This observation method allowed us to highlight key elements like the population, educational level, topics, etc. to focus whether this literature contributes towards implementing…

  17. Scaling-up HIV responses with key populations in West Africa.

    PubMed

    Wheeler, Tisha; Wolf, R Cameron; Kapesa, Laurent; Cheng Surdo, Alison; Dallabetta, Gina

    2015-03-01

    Despite decades of HIV responses in pockets of West and Central Africa (WCA), the HIV response with key populations remains an understudied area. Recently, there has been a proliferation of studies highlighting epidemiologic and behavioral data that challenge attitudes of complacency among donors and country governments uncomfortable in addressing key populations. The articles in this series highlight new studies that provide a better understanding of the epidemiologic and structural burden facing key populations in the WCA region and how to improve responses through more effective targeting. Key populations face pervasive structural barriers including institutional and sexual violence and an intersection of stigma, criminalization, and marginalization as sexual minorities. Despite decades of smaller interventions that have shown the importance of integrated services for key populations, there remains incongruent provision of outreach or testing or family planning pointing to sustained risk. There remains an incongruent resource provision for key populations where they shoulder the burden of HIV and their access to services alone could turn around HIV epidemics within the region. These proximal and distal determinants must be addressed in regional efforts, led by the community, and resourced for scale, targeting those most at risk for the acquisition and transmission of HIV. This special issue builds the knowledge base for the region focusing on interventions that remove barriers to service access including treatment uptake for those living with HIV. Better analysis and use of data for strategic planning are shown to lead to more effective targeting of prevention, care, and HIV treatment programs with key populations. These articles further demonstrate the immediate need for comprehensive action to address HIV among key populations throughout the WCA region.

  18. YoungStar in Wisconsin: Analysis of Data as of July 2014. Executive Summary: Key Findings and Analysis

    ERIC Educational Resources Information Center

    Wisconsin Council on Children and Families, 2014

    2014-01-01

    YoungStar is a five-star quality rating system for child care providers based on education, learning environment, business methods, and practices around child health and well-being. Through this rating system, the state is addressing several key issues in Wisconsin's child care system. The rating system will: (1) Improve the overall quality of…

  19. The Key Pieces of the Career Survival and Success Puzzle.

    ERIC Educational Resources Information Center

    Simonetti, Jack L.

    1999-01-01

    Analysis of career-success factors identified by 5,000 managers yielded 10 key pieces: excellent performance record, communication skills, interpersonal skills, personality, skill currency, significant work experiences, power, ability to withstand pressure, ability to make difficult decisions, and having a mentor. (SK)

  20. Comparative analysis of genes encoding key steroid core oxidation enzymes in fast-growing Mycobacterium spp. strains.

    PubMed

    Bragin, E Yu; Shtratnikova, V Yu; Dovbnya, D V; Schelkunov, M I; Pekov, Yu A; Malakho, S G; Egorova, O V; Ivashina, T V; Sokolov, S L; Ashapkin, V V; Donova, M V

    2013-11-01

    A comparative genome analysis of Mycobacterium spp. VKM Ac-1815D, 1816D and 1817D strains used for efficient production of key steroid intermediates (androst-4-ene-3,17-dione, AD, androsta-1,4-diene-3,17-dione, ADD, 9α-hydroxy androst-4-ene-3,17-dione, 9-OH-AD) from phytosterol has been carried out by deep sequencing. The assembled contig sequences were analyzed for the presence putative genes of steroid catabolism pathways. Since 3-ketosteroid-9α-hydroxylases (KSH) and 3-ketosteroid-Δ(1)-dehydrogenase (Δ(1) KSTD) play key role in steroid core oxidation, special attention was paid to the genes encoding these enzymes. At least three genes of Δ(1) KSTD (kstD), five genes of KSH subunit A (kshA), and one gene of KSH subunit B of 3-ketosteroid-9α-hydroxylases (kshB) have been found in Mycobacterium sp. VKM Ac-1817D. Strains of Mycobacterium spp. VKM Ac-1815D and 1816D were found to possess at least one kstD, one kshB and two kshA genes. The assembled genome sequence of Mycobacterium sp. VKM Ac-1817D differs from those of 1815D and 1816D strains, whereas these last two are nearly identical, differing by 13 single nucleotide substitutions (SNPs). One of these SNPs is located in the coding region of a kstD gene and corresponds to an amino acid substitution Lys (135) in 1816D for Ser (135) in 1815D. The findings may be useful for targeted genetic engineering of the biocatalysts for biotechnological application. Copyright © 2013. Published by Elsevier Ltd.

  1. ANALYSIS RESULTS FOR BUILDING 241 702-AZ A TRAIN

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DUNCAN JB; FRYE JM; COOKE CA

    2006-12-13

    This report presents the analyses results for three samples obtained under RPP-PLAN-28509, Sampling and Analysis Plan for Building 241 702-AZ A Train. The sampling and analysis was done in response to problem evaluation request number PER-2004-6139, 702-AZ Filter Rooms Need Radiological Cleanup Efforts.

  2. Polyphenism in social insects: insights from a transcriptome-wide analysis of gene expression in the life stages of the key pollinator, Bombus terrestris

    PubMed Central

    2011-01-01

    Background Understanding polyphenism, the ability of a single genome to express multiple morphologically and behaviourally distinct phenotypes, is an important goal for evolutionary and developmental biology. Polyphenism has been key to the evolution of the Hymenoptera, and particularly the social Hymenoptera where the genome of a single species regulates distinct larval stages, sexual dimorphism and physical castes within the female sex. Transcriptomic analyses of social Hymenoptera will therefore provide unique insights into how changes in gene expression underlie such complexity. Here we describe gene expression in individual specimens of the pre-adult stages, sexes and castes of the key pollinator, the buff-tailed bumblebee Bombus terrestris. Results cDNA was prepared from mRNA from five life cycle stages (one larva, one pupa, one male, one gyne and two workers) and a total of 1,610,742 expressed sequence tags (ESTs) were generated using Roche 454 technology, substantially increasing the sequence data available for this important species. Overlapping ESTs were assembled into 36,354 B. terrestris putative transcripts, and functionally annotated. A preliminary assessment of differences in gene expression across non-replicated specimens from the pre-adult stages, castes and sexes was performed using R-STAT analysis. Individual samples from the life cycle stages of the bumblebee differed in the expression of a wide array of genes, including genes involved in amino acid storage, metabolism, immunity and olfaction. Conclusions Detailed analyses of immune and olfaction gene expression across phenotypes demonstrated how transcriptomic analyses can inform our understanding of processes central to the biology of B. terrestris and the social Hymenoptera in general. For example, examination of immunity-related genes identified high conservation of important immunity pathway components across individual specimens from the life cycle stages while olfactory-related genes

  3. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.

    PubMed

    Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B

    2018-04-30

    We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.

  4. Representation of analysis results involving aleatory and epistemic uncertainty.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Jay Dean; Helton, Jon Craig; Oberkampf, William Louis

    2008-08-01

    Procedures are described for the representation of results in analyses that involve both aleatory uncertainty and epistemic uncertainty, with aleatory uncertainty deriving from an inherent randomness in the behavior of the system under study and epistemic uncertainty deriving from a lack of knowledge about the appropriate values to use for quantities that are assumed to have fixed but poorly known values in the context of a specific study. Aleatory uncertainty is usually represented with probability and leads to cumulative distribution functions (CDFs) or complementary cumulative distribution functions (CCDFs) for analysis results of interest. Several mathematical structures are available for themore » representation of epistemic uncertainty, including interval analysis, possibility theory, evidence theory and probability theory. In the presence of epistemic uncertainty, there is not a single CDF or CCDF for a given analysis result. Rather, there is a family of CDFs and a corresponding family of CCDFs that derive from epistemic uncertainty and have an uncertainty structure that derives from the particular uncertainty structure (i.e., interval analysis, possibility theory, evidence theory, probability theory) used to represent epistemic uncertainty. Graphical formats for the representation of epistemic uncertainty in families of CDFs and CCDFs are investigated and presented for the indicated characterizations of epistemic uncertainty.« less

  5. Continuous variable quantum key distribution with modulated entangled states.

    PubMed

    Madsen, Lars S; Usenko, Vladyslav C; Lassen, Mikael; Filip, Radim; Andersen, Ulrik L

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising avenue for extending the distance for which secure communication is possible.

  6. Key challenges in the development and implementation of telehealth projects.

    PubMed

    Joseph, Victor; West, Robert M; Shickle, Darren; Keen, Justin; Clamp, Susan

    2011-01-01

    A literature review was carried out to identify the key challenges in the implementation of telehealth. This was followed by a survey of organisations in England involved in telehealth projects in order to understand the challenges they faced. Ten of the 13 health or local authority organisations surveyed had telehealth projects and three were at the planning stage. The analysis revealed seven key challenges facing implementers of telehealth in England. Based on the findings from the literature review and the survey, a model was constructed and a checklist drawn up. The model contained the following elements: identifying issues, needs and partners; producing a strategy; securing funding; implementing changes; and monitoring and evaluating a telehealth project. The checklist was validated by using key informants from the organisations originally surveyed. The checklist may be useful to guide telehealth development and implementation in the future.

  7. Research on the architecture and key technologies of SIG

    NASA Astrophysics Data System (ADS)

    Fu, Zhongliang; Meng, Qingxiang; Huang, Yan; Liu, Shufan

    2007-06-01

    Along with the development of computer network, Grid has become one of the hottest issues of researches on sharing and cooperation of Internet resources throughout the world. This paper illustrates a new architecture of SIG-a five-hierarchy architecture (including Data Collecting Layer, Grid Layer, Service Layer, Application Layer and Client Layer) of SIG from the traditional three hierarchies (only including resource layer, service layer and client layer). In the paper, the author proposes a new mixed network mode of Spatial Information Grid which integrates CAG (Certificate Authority of Grid) and P2P (Peer to Peer) in the Grid Layer, besides, the author discusses some key technologies of SIG and analysis the functions of these key technologies.

  8. A more secure parallel keyed hash function based on chaotic neural network

    NASA Astrophysics Data System (ADS)

    Huang, Zhongquan

    2011-08-01

    Although various hash functions based on chaos or chaotic neural network were proposed, most of them can not work efficiently in parallel computing environment. Recently, an algorithm for parallel keyed hash function construction based on chaotic neural network was proposed [13]. However, there is a strict limitation in this scheme that its secret keys must be nonce numbers. In other words, if the keys are used more than once in this scheme, there will be some potential security flaw. In this paper, we analyze the cause of vulnerability of the original one in detail, and then propose the corresponding enhancement measures, which can remove the limitation on the secret keys. Theoretical analysis and computer simulation indicate that the modified hash function is more secure and practical than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function, such as good statistical properties, high message and key sensitivity, and strong collision resistance, etc.

  9. Recommendations for sex/gender neuroimaging research: key principles and implications for research design, analysis, and interpretation

    PubMed Central

    Rippon, Gina; Jordan-Young, Rebecca; Kaiser, Anelis; Fine, Cordelia

    2014-01-01

    Neuroimaging (NI) technologies are having increasing impact in the study of complex cognitive and social processes. In this emerging field of social cognitive neuroscience, a central goal should be to increase the understanding of the interaction between the neurobiology of the individual and the environment in which humans develop and function. The study of sex/gender is often a focus for NI research, and may be motivated by a desire to better understand general developmental principles, mental health problems that show female-male disparities, and gendered differences in society. In order to ensure the maximum possible contribution of NI research to these goals, we draw attention to four key principles—overlap, mosaicism, contingency and entanglement—that have emerged from sex/gender research and that should inform NI research design, analysis and interpretation. We discuss the implications of these principles in the form of constructive guidelines and suggestions for researchers, editors, reviewers and science communicators. PMID:25221493

  10. Recommendations for sex/gender neuroimaging research: key principles and implications for research design, analysis, and interpretation.

    PubMed

    Rippon, Gina; Jordan-Young, Rebecca; Kaiser, Anelis; Fine, Cordelia

    2014-01-01

    Neuroimaging (NI) technologies are having increasing impact in the study of complex cognitive and social processes. In this emerging field of social cognitive neuroscience, a central goal should be to increase the understanding of the interaction between the neurobiology of the individual and the environment in which humans develop and function. The study of sex/gender is often a focus for NI research, and may be motivated by a desire to better understand general developmental principles, mental health problems that show female-male disparities, and gendered differences in society. In order to ensure the maximum possible contribution of NI research to these goals, we draw attention to four key principles-overlap, mosaicism, contingency and entanglement-that have emerged from sex/gender research and that should inform NI research design, analysis and interpretation. We discuss the implications of these principles in the form of constructive guidelines and suggestions for researchers, editors, reviewers and science communicators.

  11. Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-01

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  12. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

    PubMed

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-16

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  13. Four Keys to a Smooth Flight.

    ERIC Educational Resources Information Center

    O'Neill, Jan; Conzemius, Anne

    2002-01-01

    Describes four key elements typically seen in schools that show continuous improvement in student results. Such schools' cultures are permeated by a shared focus on student learning, a strong culture of reflective practice, a collaborative environment where teachers see colleagues and parents as important partners, and an ever increasing…

  14. Key technique study and application of infrared thermography in hypersonic wind tunnel

    NASA Astrophysics Data System (ADS)

    LI, Ming; Yang, Yan-guang; Li, Zhi-hui; Zhu, Zhi-wei; Zhou, Jia-sui

    2014-11-01

    The solutions to some key techniques using infrared thermographic technique in hypersonic wind tunnel, such as temperature measurement under great measurement angle, the corresponding relation between model spatial coordinates and the ones in infrared map, the measurement uncertainty analysis of the test data etc., are studied. The typical results in the hypersonic wind tunnel test are presented, including the comparison of the transfer rates on a thin skin flat plate model with a wedge measured with infrared thermography and thermocouple, the experimental study heating effect on the flat plate model impinged by plume flow and the aerodynamic heating on the lift model.

  15. The Effects of Prostate Cancer Treatment on the Sexual Behavior of Gay and Bisexual Men: Key Results from the "Restore" Study | Division of Cancer Prevention

    Cancer.gov

    Speaker | "The Effects of Prostate Cancer Treatment on the Sexual Behavior of Gay and Bisexual Men: Key Results from the 'Restore' Study" will be presented by B.R. Simon Rosser, PhD, MPH, Professor of the Division of Epidemiology & Community Health and Director of HIV/STI Intervention & Prevention Studies at the University of Minnesota School of Public Health in Minneapolis,

  16. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    NASA Astrophysics Data System (ADS)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  17. Results and evaluation of key comparison CCM.P-K12.1 for very low helium flow rates (leak rates)

    NASA Astrophysics Data System (ADS)

    Šetina, Janez; Vičar, Martin; Pražák, Dominik

    2015-01-01

    The Czech Metrology Institute (CMI) took part and failed to prove equivalence in the Key Comparison CCM.P-K12 of helium leak artefacts (leak rates) into vacuum. After identifying and eliminating the cause of the failure, the Institute of Metals and Technology (IMT) of Slovenia, a successful participant in CCM.P-K12, volunteered to serve as pilot and link in a following bilateral comparison of IMT and CMI that obtained designation CCM.P-K12.1 in June 2012. It was decided to perform the comparison with a glass permeation helium leak artefact at nominally 3.10-11 mol/s (7.4.10-7 mbar.L.s-1) at 23 °C. Both the laboratory standards took part in CCM.P-K12 and were considered as primary. The comparison measurements were performed in October 2012. CMI proved equivalence both with IMT and with the reference value of the key comparison CCM.P-K12. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  18. Examining the influence of family physician supply on district health system performance in South Africa: An ecological analysis of key health indicators

    PubMed Central

    Mash, Robert J.

    2017-01-01

    Background The supply of appropriate health workers is a key building block in the World Health Organization’s model of effective health systems. Primary care teams are stronger if they contain doctors with postgraduate training in family medicine. The contribution of such family physicians to the performance of primary care systems has not been evaluated in the African context. Family physicians with postgraduate training entered the South African district health system (DHS) from 2011. Aim This study aimed to evaluate the impact of family physicians within the DHS of South Africa. The objectives were to evaluate the impact of an increase in family physician supply in each district (number per 10 000 population) on key health indicators. Setting All 52 South African health districts were included as units of analysis. Methods An ecological study evaluated the correlations between the supply of family physicians and routinely collected data on district performance for two time periods: 2010/2011 and 2014/2015. Results Five years after the introduction of the new generation of family physicians, this study showed no demonstrable correlation between family physician supply and improved health indicators from the macro-perspective of the district. Conclusion The lack of a measurable impact at the level of the district is most likely because of the very low supply of family physicians in the public sector. Studies which evaluate impact closer to the family physician’s circle of control may be better positioned to demonstrate a measurable impact in the short term. PMID:28470076

  19. Attribution of Observed Streamflow Changes in Key British Columbia Drainage Basins

    NASA Astrophysics Data System (ADS)

    Najafi, Mohammad Reza; Zwiers, Francis W.; Gillett, Nathan P.

    2017-11-01

    We study the observed decline in summer streamflow in four key river basins in British Columbia (BC), Canada, using a formal detection and attribution (D&A) analysis procedure. Reconstructed and simulated streamflow is generated using the semidistributed variable infiltration capacity hydrologic model, which is driven by 1/16° gridded observations and downscaled climate model data from the Coupled Model Intercomparison Project phase 5 (CMIP5), respectively. The internal variability of the regional hydrologic components using 5100 years of streamflow was simulated using CMIP5 preindustrial control runs. Results show that the observed changes in summer streamflow are inconsistent with simulations representing the responses to natural forcing factors alone, while the response to anthropogenic and natural forcing factors combined is detected in these changes. A two-signal D&A analysis indicates that the effects of anthropogenic (ANT) forcing factors are discernable from natural forcing in BC, albeit with large uncertainties.

  20. An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution

    DTIC Science & Technology

    2012-02-01

    offers another alternative for exchanging a symmetric key without compromising security. Quantum cryptography is the use of quantum mechanics to... quantum money), and, more significantly for our purposes here, a method for the transmission of two or three messages in such a way that reading...well as two channels. A quantum channel is used to communicate qubits (photons), and it is assumed that only active eavesdropping may take place on

  1. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  2. System analysis study of space platform and station accommodations for life sciences research facilities. Volume 2: Study results, attachment 2. Phase A: Conceptual design and programmatics

    NASA Technical Reports Server (NTRS)

    Wiley, Lowell F.

    1985-01-01

    The study results from the conceptual design and programmatics segment of the Space Platform and Station Accommodation for Life Sciences Research Facilities. The results and significant findings of the conceptual design and programmatics were generated by these tasks: (1) the review and update engineering and science requirements; (2) analysis of life sciences mission transition scenario; (3) the review and update of key trade issues; (4) the development of conceptual definition and designs; and (5) the development of the work breakdown schedule and its dictionary, program schedule, and estimated costs.

  3. KEY COMPARISON Report to the CCT on key comparison EUROMET.T-K6 (EUROMET Project no. 621): Comparison of the realizations of local dew/frost-point temperature scales in the range -50 °C to +20 °C

    NASA Astrophysics Data System (ADS)

    Heinonen, Martti

    2010-01-01

    The first humidity CIPM key comparison, CCT-K6, will be completed in 2010. The corresponding European regional key comparison, EUROMET.T-K6, was carried out in 2004 to 2008. National metrology institutes from 24 countries participated in the comparison. The comparison covered the dew-point temperature range from -50 °C to +20 °C. It was organized as three parallel loops with two specially manufactured precision chilled mirror hygrometers as transfer standards in each loop. The comparison scheme was designed to ensure high quality results with evenly spread workload for the participants. MIKES was coordinating the project. This report presents the results of the comparison and provides detailed information on the measurements performed by all participating laboratories and the analysis of the results. Conclusions on the equivalence of the dew-point temperature standards are drawn on the basis of calculated bilateral degrees of equivalence and deviations from EURAMET comparison reference values (ERV). Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  4. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    NASA Astrophysics Data System (ADS)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  5. Physically Active Adults: An Analysis of the Key Variables That Keep Them Moving

    ERIC Educational Resources Information Center

    Downs, Andrew

    2016-01-01

    Background: A large proportion of adults are insufficiently physically active, and researchers have yet to determine the factors that enable individuals to maintain adequate levels of physical activity throughout adulthood. Purpose: This study sought to identify the key variables linked with consistent physical activity in adulthood as elucidated…

  6. Medical technology as a key driver of rising health expenditure: disentangling the relationship

    PubMed Central

    Sorenson, Corinna; Drummond, Michael; Bhuiyan Khan, Beena

    2013-01-01

    Health care spending has risen steadily in most countries, becoming a concern for decision-makers worldwide. Commentators often point to new medical technology as the key driver for burgeoning expenditures. This paper critically appraises this conjecture, based on an analysis of the existing literature, with the aim of offering a more detailed and considered analysis of this relationship. Several databases were searched to identify relevant literature. Various categories of studies (eg, multivariate and cost-effectiveness analyses) were included to cover different perspectives, methodological approaches, and issues regarding the link between medical technology and costs. Selected articles were reviewed and relevant information was extracted into a standardized template and analyzed for key cross-cutting themes, ie, impact of technology on costs, factors influencing this relationship, and methodological challenges in measuring such linkages. A total of 86 studies were reviewed. The analysis suggests that the relationship between medical technology and spending is complex and often conflicting. Findings were frequently contingent on varying factors, such as the availability of other interventions, patient population, and the methodological approach employed. Moreover, the impact of technology on costs differed across technologies, in that some (eg, cancer drugs, invasive medical devices) had significant financial implications, while others were cost-neutral or cost-saving. In light of these issues, we argue that decision-makers and other commentators should extend their focus beyond costs solely to include consideration of whether medical technology results in better value in health care and broader socioeconomic benefits. PMID:23807855

  7. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  8. Entangled quantum key distribution over two free-space optical links.

    PubMed

    Erven, C; Couteau, C; Laflamme, R; Weihs, G

    2008-10-13

    We report on the first real-time implementation of a quantum key distribution (QKD) system using entangled photon pairs that are sent over two free-space optical telescope links. The entangled photon pairs are produced with a type-II spontaneous parametric down-conversion source placed in a central, potentially untrusted, location. The two free-space links cover a distance of 435 m and 1,325 m respectively, producing a total separation of 1,575 m. The system relies on passive polarization analysis units, GPS timing receivers for synchronization, and custom written software to perform the complete QKD protocol including error correction and privacy amplification. Over 6.5 hours during the night, we observed an average raw key generation rate of 565 bits/s, an average quantum bit error rate (QBER) of 4.92%, and an average secure key generation rate of 85 bits/s.

  9. Long-distance entanglement-based quantum key distribution experiment using practical detectors.

    PubMed

    Takesue, Hiroki; Harada, Ken-Ichi; Tamaki, Kiyoshi; Fukuda, Hiroshi; Tsuchizawa, Tai; Watanabe, Toshifumi; Yamada, Koji; Itabashi, Sei-Ichi

    2010-08-02

    We report an entanglement-based quantum key distribution experiment that we performed over 100 km of optical fiber using a practical source and detectors. We used a silicon-based photon-pair source that generated high-purity time-bin entangled photons, and high-speed single photon detectors based on InGaAs/InP avalanche photodiodes with the sinusoidal gating technique. To calculate the secure key rate, we employed a security proof that validated the use of practical detectors. As a result, we confirmed the successful generation of sifted keys over 100 km of optical fiber with a key rate of 4.8 bit/s and an error rate of 9.1%, with which we can distill secure keys with a key rate of 0.15 bit/s.

  10. Communicating with individuals receiving home mechanical ventilation: the experiences of key communication partners.

    PubMed

    Laakso, Katja; Markström, Agneta; Havstam, Christina; Idvall, Markus; Hartelius, Lena

    2014-01-01

    The aim of the study was to explore the communication experiences of key communications partners (CPs) of individuals receiving home mechanical ventilation (HMV), with particular emphasis on the possibilities, difficulties and limitations CPs experienced in communication, possible support given to facilitate communication and exploring what made a skilled communicator. A qualitative research design using interviews was used. The participants included 19 key CPs of individuals receiving HMV. The analysis resulted in five themes: Encountering communication limitations, Functional communication strategies, Being a communication facilitator, Role insecurity and Emotional reactions and coping. The findings revealed that CPs needed to develop partly new reference frames for communication. In particular, participants emphasised the need to understand and interpret subtle details in the communicative interaction. The findings are discussed in the light of previous research, in particular an earlier study exploring another perspective; the ventilator-supported individuals' experiences of communication. Issues relating to the educational needs of CPs of individuals receiving HMV are discussed. The results are intended to enhance understanding of the challenges that individuals receiving HMV and their CPs face with communication, which should be of relevance not only to speech therapists, but for all healthcare practitioners in the field of HMV.

  11. Teaching key use to persons with severe disabilities in congregate living settings.

    PubMed

    Ivancic, M T; Schepis, M M

    1995-01-01

    Key use remains overlooked for increasing independent material use by persons with severe mental retardation. In Experiment 1, a procedure to train key locating was evaluated in a multiple-probe withdrawal design across three groups of participants. Most participants located their keys when reinforced for doing so; however, key locating decreased when the reinforcement procedure was withdrawn. In Experiment 2, a multiple probe design across four participant groups was used to evaluate a training procedure to teach key use. Twenty of 25 participants used a key to open and lock their personal lockers as a result of training. However, only 36% of the participants were able to use their keys without prompts from experimenters.

  12. Key drivers of airline loyalty.

    PubMed

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  13. Key drivers of airline loyalty

    PubMed Central

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  14. Two-party quantum key agreement with five-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  15. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017

    PubMed Central

    Sell, Tara Kirk

    2017-01-01

    Objectives. To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. Methods. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. Results. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. Conclusions. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained. PMID:28892451

  16. 76 FR 68314 - Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ...-AA08 Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL AGENCY: Coast... World Championship, a series of high-speed boat races. The event is scheduled to take place on Wednesday... Key West World Championship, a series of high-speed boat races. The event will be held on the waters...

  17. SIMS prototype system 3 test results: Engineering analysis

    NASA Technical Reports Server (NTRS)

    1978-01-01

    The results obtained during testing of a closed hydronic drain down solar system designed for space and hot water heating is presented. Data analysis is included which documents the system performance and verifies the suitability of SIMS Prototype System 3 for field installation.

  18. Transcriptome analysis reveals key roles of AtLBR-2 in LPS-induced defense responses in plants.

    PubMed

    Iizasa, Sayaka; Iizasa, Ei'ichi; Watanabe, Keiichi; Nagano, Yukio

    2017-12-29

    Lipopolysaccharide (LPS) from Gram-negative bacteria cause innate immune responses in animals and plants. The molecules involved in LPS signaling in animals are well studied, whereas those in plants are not yet as well documented. Recently, we identified Arabidopsis AtLBR-2, which binds to LPS from Pseudomonas aeruginosa (pLPS) directly and regulates pLPS-induced defense responses, such as pathogenesis-related 1 (PR1) expression and reactive oxygen species (ROS) production. In this study, we investigated the pLPS-induced transcriptomic changes in wild-type (WT) and the atlbr-2 mutant Arabidopsis plants using RNA-Seq technology. RNA-Seq data analysis revealed that pLPS treatment significantly altered the expression of 2139 genes, with 605 up-regulated and 1534 down-regulated genes in WT. Gene ontology (GO) analysis on these genes showed that GO terms, "response to bacterium", "response to salicylic acid (SA) stimulus", and "response to abscisic acid (ABA) stimulus" were enriched amongst only in up-regulated genes, as compared to the genes that were down-regulated. Comparative analysis of differentially expressed genes between WT and the atlbr-2 mutant revealed that 65 genes were up-regulated in WT but not in the atlbr-2 after pLPS treatment. Furthermore, GO analysis on these 65 genes demonstrated their importance for the enrichment of several defense-related GO terms, including "response to bacterium", "response to SA stimulus", and "response to ABA stimulus". We also found reduced levels of pLPS-induced conjugated SA glucoside (SAG) accumulation in atlbr-2 mutants, and no differences were observed in the gene expression levels in SA-treated WT and the atlbr-2 mutants. These 65 AtLBR-2-dependent up-regulated genes appear to be important for the enrichment of some defense-related GO terms. Moreover, AtLBR-2 might be a key molecule that is indispensable for the up-regulation of defense-related genes and for SA signaling pathway, which is involved in defense against

  19. 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni; Takesue, Hiroki; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa

    2006-12-01

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 µm single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  20. Quantification of key long-term risks at CO₂ sequestration sites: Latest results from US DOE's National Risk Assessment Partnership (NRAP) Project

    DOE PAGES

    Pawar, Rajesh; Bromhal, Grant; Carroll, Susan; ...

    2014-12-31

    Risk assessment for geologic CO₂ storage including quantification of risks is an area of active investigation. The National Risk Assessment Partnership (NRAP) is a US-Department of Energy (US-DOE) effort focused on developing a defensible, science-based methodology and platform for quantifying risk profiles at geologic CO₂ sequestration sites. NRAP has been developing a methodology that centers round development of an integrated assessment model (IAM) using system modeling approach to quantify risks and risk profiles. The IAM has been used to calculate risk profiles with a few key potential impacts due to potential CO₂ and brine leakage. The simulation results are alsomore » used to determine long-term storage security relationships and compare the long-term storage effectiveness to IPCC storage permanence goal. Additionally, we also demonstrate application of IAM for uncertainty quantification in order to determine parameters to which the uncertainty in model results is most sensitive.« less

  1. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  2. Variability in surface infrared reflectance of thirteen nitrile rubber gloves at key wavelengths for analysis of captan.

    PubMed

    Phalen, R N; Que Hee, Shane S

    2007-02-01

    The aim of this study was to investigate the surface variability of 13 powder-free, unlined, and unsupported nitrile rubber gloves using attenuated total reflection Fourier transform infrared (ATR-FT-IR) spectrophotometry at key wavelengths for analysis of captan contamination. The within-glove, within-lot, and between-lot variability was measured at 740, 1124, 1252, and 1735 cm(-1), the characteristic captan reflectance minima wavelengths. Three glove brands were assessed after conditioning overnight at relative humidity (RH) values ranging from 2 +/- 1 to 87 +/- 4% and temperatures ranging from -8.6 +/- 0.7 to 59.2 +/- 0.9 degrees C. For all gloves, 1735 cm(-1) provided the lowest background absorbance and greatest potential sensitivity for captan analysis on the outer glove surface: absorbances ranged from 0.0074 +/- 0.0005 (Microflex) to 0.0195 +/- 0.0024 (SafeSkin); average within-glove coefficients of variation (CV) ranged from 2.7% (Best, range 0.9-5.3%) to 10% (SafeSkin, 1.2-17%); within-glove CVs greater than 10% were for one brand (SafeSkin); within-lot CVs ranged from 2.8% (Best N-Dex) to 28% (SafeSkin Blue); and between-lot variation was statistically significant (p < or = 0.05) for all but two SafeSkin lots. The RH had variable effects dependent on wavelength, being minimal at 1735, 1252, and 1124 cm(-1) and highest at 3430 cm(-1) (O-H stretch region). There was no significant effect of temperature conditioning. Substantial within-glove, within-lot, and between-lot variability was observed. Thus, surface analysis using ATR-FT-IR must treat glove brands and lots as different. ATR-FT-IR proved to be a useful real-time analytical tool for measuring glove variability, detecting surface humidity effects, and choosing selective and sensitive wavelengths for analysis of nonvolatile surface contaminants.

  3. Conjoint Analysis of Study Abroad Preferences: Key Attributes, Segments and Implications for Increasing Student Participation

    ERIC Educational Resources Information Center

    Garver, Michael S.; Divine, Richard L.

    2008-01-01

    An adaptive conjoint analysis was performed on the study abroad preferences of a sample of undergraduate college students. The results indicate that trip location, cost, and time spent abroad are the three most important determinants of student preference for different study abroad trip scenarios. The analysis also uncovered four different study…

  4. Key Reconciliation for High Performance Quantum Key Distribution

    PubMed Central

    Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente

    2013-01-01

    Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440

  5. Remote sensing of key grassland nutrients using hyperspectral techniques in KwaZulu-Natal, South Africa

    NASA Astrophysics Data System (ADS)

    Singh, Leeth; Mutanga, Onisimo; Mafongoya, Paramu; Peerbhay, Kabir

    2017-07-01

    The concentration of forage fiber content is critical in explaining the palatability of forage quality for livestock grazers in tropical grasslands. Traditional methods of determining forage fiber content are usually time consuming, costly, and require specialized laboratory analysis. With the potential of remote sensing technologies, determination of key fiber attributes can be made more accurately. This study aims to determine the effectiveness of known absorption wavelengths for detecting forage fiber biochemicals, neutral detergent fiber, acid detergent fiber, and lignin using hyperspectral data. Hyperspectral reflectance spectral measurements (350 to 2500 nm) of grass were collected and implemented within the random forest (RF) ensemble. Results show successful correlations between the known absorption features and the biochemicals with coefficients of determination (R2) ranging from 0.57 to 0.81 and root mean square errors ranging from 6.97 to 3.03 g/kg. In comparison, using the entire dataset, the study identified additional wavelengths for detecting fiber biochemicals, which contributes to the accurate determination of forage quality in a grassland environment. Overall, the results showed that hyperspectral remote sensing in conjunction with the competent RF ensemble could discriminate each key biochemical evaluated. This study shows the potential to upscale the methodology to a space-borne multispectral platform with similar spectral configurations for an accurate and cost effective mapping analysis of forage quality.

  6. Quantum exhaustive key search with simplified-DES as a case study.

    PubMed

    Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N

    2016-01-01

    To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.

  7. What detrended fluctuation analysis can tell us about NBA results

    NASA Astrophysics Data System (ADS)

    Ferreira, Paulo

    2018-06-01

    Basketball is one of the favourite sports in the United States and NBA the most popular basketball league in the world, followed not only by Americans but by fans everywhere. At present, people are increasingly interested in betting on sports in general and on basketball in particular. So analysis of trends in the results could be important for gamblers. In this paper, detrended fluctuation analysis is applied to 28 NBA teams, in order to understand if their results have (or not) any kind of memory. Our results show that all the teams are persistent in their results. Nevertheless, some teams have higher persistence than others, which could be important for gamblers in deciding how to bet.

  8. Development of Test-Analysis Models (TAM) for correlation of dynamic test and analysis results

    NASA Technical Reports Server (NTRS)

    Angelucci, Filippo; Javeed, Mehzad; Mcgowan, Paul

    1992-01-01

    The primary objective of structural analysis of aerospace applications is to obtain a verified finite element model (FEM). The verified FEM can be used for loads analysis, evaluate structural modifications, or design control systems. Verification of the FEM is generally obtained as the result of correlating test and FEM models. A test analysis model (TAM) is very useful in the correlation process. A TAM is essentially a FEM reduced to the size of the test model, which attempts to preserve the dynamic characteristics of the original FEM in the analysis range of interest. Numerous methods for generating TAMs have been developed in the literature. The major emphasis of this paper is a description of the procedures necessary for creation of the TAM and the correlation of the reduced models with the FEM or the test results. Herein, three methods are discussed, namely Guyan, Improved Reduced System (IRS), and Hybrid. Also included are the procedures for performing these analyses using MSC/NASTRAN. Finally, application of the TAM process is demonstrated with an experimental test configuration of a ten bay cantilevered truss structure.

  9. Identification of a Key Gene Involved in Branched-Chain Short Fatty Acids Formation in Natto by Transcriptional Analysis and Enzymatic Characterization in Bacillus subtilis.

    PubMed

    Hong, Chenlu; Chen, Yangyang; Li, Lu; Chen, Shouwen; Wei, Xuetuan

    2017-03-01

    Natto as a fermented soybean product has many health benefits for human due to its rich nutritional and functional components. However, the unpleasant odor of natto, caused by the formation of branched-chain short fatty acids (BCFAs), prohibits the wide acceptance of natto products. This work is to identify the key gene of BCFAs formation and develop the guidance to reduce natto odor. Transcriptional analysis of BCFAs synthesis pathway genes was conducted in two Bacillus subtilis strains with obvious different BCFAs synthesis abilities. The transcriptional levels of bcd, bkdAA, and ptb in B. subtilis H-9 were 2.7-fold, 0.7-fold, and 8.9-fold higher than that of B. subtilis H-4, respectively. Therefore, the ptb gene with the highest transcriptional change was considered as the key gene in BCFAs synthesis. The ptb encoded enzyme Ptb was further characterized by inducible expression in Escherichia coli. The recombinant Ptb protein (about 32 kDa) was verified by sodium dodecyl sulfate (SDS)-polyacrylamide gel electrophoresis analysis. The catalysis functions of Ptb were confirmed on substrates of isovaleryl-CoA and isobutyryl-CoA, and the higher catalysis efficiency of Ptb on isovaleryl-CoA explained the higher level of isovaleric acid in natto. The optimal activities of Ptb were observed at 50 °C and pH 8.0, and the enzymatic activity was inhibited by Ca 2+ , Zn 2+ , Ba 2+ , Mn 2+ , Cu 2+ , SDS, and EDTA. Collectively, this study reports a key gene responsible for BCFAs formation in natto fermentation and provides potential strategies to solve the odor problem.

  10. 25 CFR 502.14 - Key employee.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  11. Identification of the key molecules involved in chronic copper exposure-aggravated memory impairment in transgenic mice of Alzheimer's disease using proteomic analysis.

    PubMed

    Yu, Jun; Luo, Xiaobin; Xu, Hua; Ma, Quan; Yuan, Jianhui; Li, Xuling; Chang, Raymond Chuen-Chung; Qu, Zhongsen; Huang, Xinfeng; Zhuang, Zhixiong; Liu, Jianjun; Yang, Xifei

    2015-01-01

    Alzheimer's disease (AD) is the most common neurodegenerative disease characterized by a progressive impairment of cognitive functions including spatial learning and memory. Excess copper exposure accelerates the development of AD; however, the potential mechanisms by which copper exacerbates the symptoms of AD remain unknown. In this study, we explored the effects of chronic copper exposure on cognitive function by treating 6 month-old triple AD transgenic (3xTg-AD) mice with 250 ppm copper sulfate in drinking water for 6 months, and identified several potential key molecules involved in the effects of chronic copper exposure on memory by proteomic analysis. The behavioral test showed that chronic copper exposure aggravated memory impairment of 3xTg-AD mice. Two-dimensional fluorescence difference gel electrophoresis (2D-DIGE) coupled with mass spectrometry revealed a total of 44 differentially expressed proteins (18 upregulated and 26 down-regulated) in hippocampus between the wild-type (WT) mice and non-exposed 3xTg-AD mice. A total of 40 differentially expressed proteins were revealed (20 upregulated and 20 down-regulated) in hippocampus between copper exposed and non-exposed 3xTg-AD mice. Among these differentially expressed proteins, complexin-1 and complexin-2, two memory associated proteins, were significantly decreased in hippocampus of 3xTg-AD mice compared with the WT mice. Furthermore, the expression of these two proteins was further down-regulated in 3xTg-AD mice when exposed to copper. The abnormal expression of complexin-1 and complexin-2 identified by proteomic analysis was verified by western blot analysis. Taken together, our data showed that chronic copper exposure accelerated memory impairment and altered the expression of proteins in hippocampus in 3xTg-AD mice. The functional analysis on the differentially expressed proteins suggested that complexin-1 and complexin-2 may be the key molecules involved in chronic copper exposure

  12. Revocable identity-based proxy re-signature against signing key exposure.

    PubMed

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  13. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    NASA Astrophysics Data System (ADS)

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu

    2007-06-01

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  14. Simultaneous transmission for an encrypted image and a double random-phase encryption key.

    PubMed

    Yuan, Sheng; Zhou, Xin; Li, Da-hai; Zhou, Ding-fu

    2007-06-20

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  15. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  16. Value of Earth Observations: Key principles and techniques of socioeconomic benefits analysis (Invited)

    NASA Astrophysics Data System (ADS)

    Friedl, L.; Macauley, M.; Bernknopf, R.

    2013-12-01

    Internationally, multiple organizations are placing greater emphasis on the societal benefits that governments, businesses, and NGOs can derive from applications of Earth-observing satellite observations, research, and models. A growing set of qualitative, anecdotal examples on the uses of Earth observations across a range of sectors can be complemented by the quantitative substantiation of the socioeconomic benefits. In turn, the expanding breadth of environmental data available and the awareness of their beneficial applications to inform decisions can support new products and services by companies, agencies, and civil society. There are, however, significant efforts needed to bridge the Earth sciences and social and economic sciences fields to build capacity, develop case studies, and refine analytic techniques in quantifying socioeconomic benefits from the use of Earth observations. Some government programs, such as the NASA Earth Science Division's Applied Sciences Program have initiated activities in recent years to quantify the socioeconomic benefits from applications of Earth observations research, and to develop multidisciplinary models for organizations' decision-making activities. A community of practice has conducted workshops, developed impact analysis reports, published a book, developed a primer, and pursued other activities to advance analytic methodologies and build capacity. This paper will present an overview of measuring socioeconomic impacts of Earth observations and how the measures can be translated into a value of Earth observation information. It will address key terms, techniques, principles and applications of socioeconomic impact analyses. It will also discuss activities to pursue a research agenda on analytic techniques, develop a body of knowledge, and promote broader skills and capabilities.

  17. 78 FR 33221 - Special Local Regulation; Annual Swim Around Key West, Atlantic Ocean and Gulf of Mexico; Key...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-04

    ... Fort Zach State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key... State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key Channel and West...

  18. Identification of Key Transcription Factors Associated with Lung Squamous Cell Carcinoma

    PubMed Central

    Zhang, Feng; Chen, Xia; Wei, Ke; Liu, Daoming; Xu, Xiaodong; Zhang, Xing; Shi, Hong

    2017-01-01

    Background Lung squamous cell carcinoma (lung SCC) is a common type of lung cancer, but its mechanism of pathogenesis is unclear. The aim of this study was to identify key transcription factors in lung SCC and elucidate its mechanism. Material/Methods Six published microarray datasets of lung SCC were downloaded from Gene Expression Omnibus (GEO) for integrated bioinformatics analysis. Significance analysis of microarrays was used to identify differentially expressed genes (DEGs) between lung SCC and normal controls. The biological functions and signaling pathways of DEGs were mapped in the Gene Otology and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway database, respectively. A transcription factor gene regulatory network was used to obtain insights into the functions of DEGs. Results A total of 1,011 genes, including 539 upregulated genes and 462 downregulated genes, were filtered as DEGs between lung SCC and normal controls. DEGs were significantly enriched in cell cycle, DNA replication, p53 signaling pathway, pathways in cancer, adherens junction, and cell adhesion molecules signaling pathways. There were 57 transcription factors identified, which were used to construct a regulatory network. The network consisted of 736 interactions between 49 transcription factors and 486 DEGs. NFIC, BRCA1, and NFATC2 were the top 3 transcription factors that had the highest connectivity with DEGs and that regulated 83, 82, and 75 DEGs in the network, respectively. Conclusions NFIC, BRCA1, and NFATC2 might be the key transcription factors in the development of lung SCC by regulating the genes involved in cell cycle and DNA replication pathways. PMID:28081052

  19. New hematological key for bovine leukemia virus-infected Japanese Black cattle.

    PubMed

    Mekata, Hirohisa; Yamamoto, Mari; Kirino, Yumi; Sekiguchi, Satoshi; Konnai, Satoru; Horii, Yoichiro; Norimine, Junzo

    2018-02-20

    The European Community's (EC) Key, which is also called Bendixen's Key, is a well-established bovine leukemia virus (BLV) diagnostic method that classifies cattle according to the absolute lymphocyte count and age. The EC Key was originally designed for dairy cattle and is not necessarily suitable for Japanese Black (JB) beef cattle. This study revealed the lymphocyte counts in the BLV-free and -infected JB cattle were significantly lower than those in the Holstein cattle. Therefore, applying the EC Key to JB cattle could result in a large number of undetected BLV-infected cattle. Our proposed hematological key, which was designed for JB cattle, improves the detection of BLV-infected cattle by approximately 20%. We believe that this study could help promote BLV control.

  20. Proof-of-principle test of coherent-state continuous variable quantum key distribution through turbulent atmosphere (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Derkach, Ivan D.; Peuntinger, Christian; Ruppert, László; Heim, Bettina; Gunthner, Kevin; Usenko, Vladyslav C.; Elser, Dominique; Marquardt, Christoph; Filip, Radim; Leuchs, Gerd

    2016-10-01

    Continuous-variable quantum key distribution is a practical application of quantum information theory that is aimed at generation of secret cryptographic key between two remote trusted parties and that uses multi-photon quantum states as carriers of key bits. Remote parties share the secret key via a quantum channel, that presumably is under control of of an eavesdropper, and which properties must be taken into account in the security analysis. Well-studied fiber-optical quantum channels commonly possess stable transmittance and low noise levels, while free-space channels represent a simpler, less demanding and more flexible alternative, but suffer from atmospheric effects such as turbulence that in particular causes a non-uniform transmittance distribution referred to as fading. Nonetheless free-space channels, providing an unobstructed line-of-sight, are more apt for short, mid-range and potentially long-range (using satellites) communication and will play an important role in the future development and implementation of QKD networks. It was previously theoretically shown that coherent-state CV QKD should be in principle possible to implement over a free-space fading channel, but strong transmittance fluctuations result in the significant modulation-dependent channel excess noise. In this regime the post-selection of highly transmitting sub-channels may be needed, which can even restore the security of the protocol in the strongly turbulent channels. We now report the first proof-of-principle experimental test of coherent state CV QKD protocol using different levels Gaussian modulation over a mid-range (1.6-kilometer long) free-space atmospheric quantum channel. The transmittance of the link was characterized using intensity measurements for the reference but channel estimation using the modulated coherent states was also studied. We consider security against Gaussian collective attacks, that were shown to be optimal against CV QKD protocols . We assumed a

  1. Holo-analysis.

    PubMed

    Rosen, G D

    2006-06-01

    Meta-analysis is a vague descriptor used to encompass very diverse methods of data collection analysis, ranging from simple averages to more complex statistical methods. Holo-analysis is a fully comprehensive statistical analysis of all available data and all available variables in a specified topic, with results expressed in a holistic factual empirical model. The objectives and applications of holo-analysis include software production for prediction of responses with confidence limits, translation of research conditions to praxis (field) circumstances, exposure of key missing variables, discovery of theoretically unpredictable variables and interactions, and planning future research. Holo-analyses are cited as examples of the effects on broiler feed intake and live weight gain of exogenous phytases, which account for 70% of variation in responses in terms of 20 highly significant chronological, dietary, environmental, genetic, managemental, and nutrient variables. Even better future accountancy of variation will be facilitated if and when authors of papers routinely provide key data for currently neglected variables, such as temperatures, complete feed formulations, and mortalities.

  2. Benthic boundary layer processes in the Lower Florida Keys

    USGS Publications Warehouse

    Lavoie, D.L.; Richardson, M.D.; Holmes, C.

    1997-01-01

    This special issue of Geo-Marine Letters, "Benthic Boundary Layer Processes in the Lower Florida Keys," includes 12 papers that present preliminary results from the Key West Campaign. The Dry Tortugas and Marquesas Keys test sites were selected by a group of 115 scientists and technicians to study benthic boundary layer processes in a carbonate environment controlled by bioturbation and biogeochemical processes. Major activities included remote sediment classification; high-frequency acoustic scattering experiments; sediment sampling for radiological, geotechnical, biological, biogeochemical, physical, and geoacoustic studies; and hydrodynamic studies using an instrumented tetrapod. All these data are being used to improve our understanding of the effects of environmental processes on sediment structure and behavior.

  3. Comparison is key.

    PubMed

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  4. Securing quantum key distribution systems using fewer states

    NASA Astrophysics Data System (ADS)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  5. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less

  6. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  7. Key Relation Extraction from Biomedical Publications.

    PubMed

    Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian

    2017-01-01

    Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.

  8. Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier

    PubMed Central

    Akram, M. Usman; Khan, Shoab A.; Javed, Muhammad Younus

    2014-01-01

    National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict key players from a covert network by applying a hybrid framework. The proposed system calculates certain centrality measures for each node in the network and then applies novel hybrid classifier for detection of key players. Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destabilize the involved network. As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network. PMID:25136674

  9. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  10. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  11. A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

    PubMed Central

    Moon, Soo Young; Cho, Tae Ho

    2014-01-01

    Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥10%. PMID:25136649

  12. Trace Elements in the Sea Surface Microlayer: Results from a Two Year Study in the Florida Keys

    NASA Astrophysics Data System (ADS)

    Ebling, A. M.; Westrich, J. R.; Lipp, E. K.; Mellett, T.; Buck, K. N.; Landing, W. M.

    2016-02-01

    Natural and anthropogenic aerosols are a significant source of trace elements to oligotrophic ocean surface waters, where they provide episodic pulses of limiting micronutrients for the microbial community. Opportunistic bacteria have been shown to experience rapid growth during deposition events. However, little is known about the fate of trace elements at the air-sea interface, i.e. the sea surface microlayer. It has been hypothesized that dust particles would be retained in the sea surface microlayer long enough to undergo chemical and physical changes that would affect the bioavailability of trace elements. In this study, aerosols, sea surface microlayer, and underlying water column samples were collected in the Florida Keys in July 2014 and May 2015 at various locations and analyzed for a suite of dissolved and particulate trace elements. Sea surface microlayer samples ( 50 μm) were collected using a cylinder of ultra-pure quartz glass; a novel adaptation of the glass plate technique. Sampling sites ranged from a more pristine environment approximately ten kilometers offshore to a more anthropogenic environment within a shallow bay a few hundred meters offshore. While it was clear from the results that dust deposition events played a large role in the chemical composition of the sea surface microlayer (elevated concentrations in dissolved and particulate trace elements associated with dust deposition), the location where the samples were collected also had a large impact on the sea surface microlayer as well as the underlying water column. The results were compared with other parameters analyzed such as Vibrio cultures as well as iron speciation, providing an important step towards our goal of understanding of the fate of trace elements in the sea surface microlayer as well as the specific effects of aeolian dust deposition on heterotrophic microbes in the upper ocean.

  13. Bioelectrical impedance analysis for bovine milk: Preliminary results

    NASA Astrophysics Data System (ADS)

    Bertemes-Filho, P.; Valicheski, R.; Pereira, R. M.; Paterno, A. S.

    2010-04-01

    This work reports the investigation and analysis of bovine milk quality by using biological impedance measurements using electrical impedance spectroscopy (EIS). The samples were distinguished by a first chemical analysis using Fourier transform midinfrared spectroscopy (FTIR) and flow citometry. A set of milk samples (100ml each) obtained from 17 different cows in lactation with and without mastitis were analyzed with the proposed technique using EIS. The samples were adulterated by adding distilled water and hydrogen peroxide in a controlled manner. FTIR spectroscopy and flow cytometry were performed, and impedance measurements were made in a frequency range from 500Hz up to 1MHz with an implemented EIS system. The system's phase shift was compensated by measuring saline solutions. It was possible to show that the results obtained with the Bioelectrical Impedance Analysis (BIA) technique may detect changes in the milk caused by mastitis and the presence of water and hydrogen peroxide in the bovine milk.

  14. Fundamental rate-loss tradeoff for optical quantum key distribution.

    PubMed

    Takeoka, Masahiro; Guha, Saikat; Wilde, Mark M

    2014-10-24

    Since 1984, various optical quantum key distribution (QKD) protocols have been proposed and examined. In all of them, the rate of secret key generation decays exponentially with distance. A natural and fundamental question is then whether there are yet-to-be discovered optical QKD protocols (without quantum repeaters) that could circumvent this rate-distance tradeoff. This paper provides a major step towards answering this question. Here we show that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use. Our result has major implications for understanding the secret key agreement capacity of optical channels-a long-standing open problem in optical quantum information theory-and strongly suggests a real need for quantum repeaters to perform QKD at high rates over long distances.

  15. Meta-analysis of individual registry results enhances international registry collaboration.

    PubMed

    Paxton, Elizabeth W; Mohaddes, Maziar; Laaksonen, Inari; Lorimer, Michelle; Graves, Stephen E; Malchau, Henrik; Namba, Robert S; Kärrholm, John; Rolfson, Ola; Cafri, Guy

    2018-03-28

    Background and purpose - Although common in medical research, meta-analysis has not been widely adopted in registry collaborations. A meta-analytic approach in which each registry conducts a standardized analysis on its own data followed by a meta-analysis to calculate a weighted average of the estimates allows collaboration without sharing patient-level data. The value of meta-analysis as an alternative to individual patient data analysis is illustrated in this study by comparing the risk of revision of porous tantalum cups versus other uncemented cups in primary total hip arthroplasties from Sweden, Australia, and a US registry (2003-2015). Patients and methods - For both individual patient data analysis and meta-analysis approaches a Cox proportional hazard model was fit for time to revision, comparing porous tantalum (n = 23,201) with other uncemented cups (n = 128,321). Covariates included age, sex, diagnosis, head size, and stem fixation. In the meta-analysis approach, treatment effect size (i.e., Cox model hazard ratio) was calculated within each registry and a weighted average for the individual registries' estimates was calculated. Results - Patient-level data analysis and meta-analytic approaches yielded the same results with the porous tantalum cups having a higher risk of revision than other uncemented cups (HR (95% CI) 1.6 (1.4-1.7) and HR (95% CI) 1.5 (1.4-1.7), respectively). Adding the US cohort to the meta-analysis led to greater generalizability, increased precision of the treatment effect, and similar findings (HR (95% CI) 1.6 (1.4-1.7)) with increased risk of porous tantalum cups. Interpretation - The meta-analytic technique is a viable option to address privacy, security, and data ownership concerns allowing more expansive registry collaboration, greater generalizability, and increased precision of treatment effects.

  16. Key results of the mini-dome Fresnel lens concentrator array development program under recently completed NASA and SDIO SBIR projects

    NASA Technical Reports Server (NTRS)

    Oneill, Mark J.; Piszczor, Michael F.; Fraas, Lewis M.

    1991-01-01

    Since 1986, ENTECH and the NASA Lewis Research Center have been developing a new photovoltaic concentrator system for space power applications. The unique refractive system uses small, dome shaped Fresnel lenses to focus sunlight onto high efficiency photovoltaic concentrator cells which use prismatic cell covers to further increase their performance. Highlights of the five-year development include near Air Mass Zero (AM0) Lear Jet flight testing of mini-dome lenses (90 pct. net optical efficiency achieved); tests verifying sun-pointing error tolerance with negligible power loss; simulator testing of prism-covered GaAs concentrator cells (24 pct. AM0 efficiency); testing of prism-covered Boeing GaAs/GaSb tandem cells (31 pct. AM0 efficiency); and fabrication and outdoor testing of a 36-lens/cell element panel. These test results have confirmed previous analytical predictions which indicate substantial performance improvements for this technology over current array systems. Based on program results to date, it appears than an array power density of 300 watts/sq m and a specific power of 100 watts/kg can be achieved in the near term. All components of the array appear to be readily manufacturable from space-durable materials at reasonable cost. A concise review is presented of the key results leading to the current array, and further development plans for the future are briefly discussed.

  17. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    NASA Astrophysics Data System (ADS)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  18. Pan-cancer transcriptomic analysis associates long non-coding RNAs with key mutational driver events

    PubMed Central

    Ashouri, Arghavan; Sayin, Volkan I.; Van den Eynden, Jimmy; Singh, Simranjit X.; Papagiannakopoulos, Thales; Larsson, Erik

    2016-01-01

    Thousands of long non-coding RNAs (lncRNAs) lie interspersed with coding genes across the genome, and a small subset has been implicated as downstream effectors in oncogenic pathways. Here we make use of transcriptome and exome sequencing data from thousands of tumours across 19 cancer types, to identify lncRNAs that are induced or repressed in relation to somatic mutations in key oncogenic driver genes. Our screen confirms known coding and non-coding effectors and also associates many new lncRNAs to relevant pathways. The associations are often highly reproducible across cancer types, and while many lncRNAs are co-expressed with their protein-coding hosts or neighbours, some are intergenic and independent. We highlight lncRNAs with possible functions downstream of the tumour suppressor TP53 and the master antioxidant transcription factor NFE2L2. Our study provides a comprehensive overview of lncRNA transcriptional alterations in relation to key driver mutational events in human cancers. PMID:28959951

  19. Presentation of economic evaluation results.

    PubMed

    Chaikledkaew, Usa

    2014-05-01

    The first HTA guidelines for Thailand included a chapter outlining a set of guidelines on how best to report the findings of health economic evaluations, based on a review of best practice and existing guidelines on the presentation of economic evaluation results from around the world. In this second edition of HTA guidelines for Thailand, the recommendations build on the first edition by using a case study to illustrate how the guidelines can be applied in a real research context. The guidelines propose that all reporting include ten key elements: defining the scope of the study, selection of comparator(s), defining the type of economic evaluation, measurement of costs, measurement of clinical effects, handling time in economic evaluation studies, handling uncertainty and sensitivity analysis, presentation of the results, discussion of the results, and disclosure of funding and authors conflict of interest.

  20. The key actor: a qualitative study of patient participation in the handover process in Europe

    PubMed Central

    Flink, Maria; Hesselink, Gijs; Pijnenborg, Loes; Wollersheim, Hub; Vernooij-Dassen, Myrra; Dudzik-Urbaniak, Ewa; Orrego, Carola; Toccafondi, Giulio; Schoonhoven, Lisette; Gademan, Petra J; Johnson, Julie K; Öhlén, Gunnar; Hansagi, Helen; Olsson, Mariann; Barach, Paul

    2012-01-01

    Background Patient safety experts have postulated that increasing patient participation in communications during patient handovers will improve the quality of patient transitions, and that this may reduce hospital readmissions. Choosing strategies that enhance patient safety through improved handovers requires better understanding of patient experiences and preferences for participation. Objective The aim of this paper is to explore the patients’ experiences and perspectives related to the handovers between their primary care providers and the inpatient hospital. Methods A qualitative secondary analysis was performed, based on individual and focus group patient interviews with 90 patients in five European countries. Results The analysis revealed three themes: patient positioning in the handover process; prerequisites for patient participation and patient preferences for the handover process. Patients’ participation ranged from being the key actor, to sharing the responsibility with healthcare professional(s), to being passive participants. For active participation patients required both personal and social resources as well as prerequisites such as information and respect. Some patients preferred to be the key actor in charge; others preferred their healthcare professionals to be the key actors in the handover. Conclusions Patients’ participation is related to the healthcare system, the activity of healthcare professionals’ and patients’ capacity for participation. Patients prefer a handover process where the responsibility is clear and unambiguous. Healthcare organisations need a clear and well-considered system of responsibility for handover processes, that takes into account the individual patient's need of clarity, and support in relation to his/hers own recourses. PMID:23112290

  1. Measurement-Device-Independent Quantum Key Distribution over 200 km

    NASA Astrophysics Data System (ADS)

    Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei

    2014-11-01

    Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.

  2. The Geology of the Florida Keys.

    ERIC Educational Resources Information Center

    Shinn, Eugene A.

    1988-01-01

    Describes some of the ancient geologic history of the Florida Keys from Key Largo to Key West including the effects of glaciers, sea level rise, reef distribution, spurs and grooves, backstepping and ecological zonation, growth rates and erosion. Predicts future changes in this area. (CW)

  3. Comparison Campaign of VLBI Data Analysis Software - First Results

    NASA Technical Reports Server (NTRS)

    Plank, Lucia; Bohm, Johannes; Schuh, Harald

    2010-01-01

    During the development of the Vienna VLBI Software VieVS at the Institute of Geodesy and Geophysics at Vienna University of Technology, a special comparison setup was developed with the goal of easily finding links between deviations of results achieved with different software packages and certain parameters of the observation. The object of comparison is the computed time delay, a value calculated for each observation including all relevant models and corrections that need to be applied in geodetic VLBI analysis. Besides investigating the effects of the various models on the total delay, results of comparisons between VieVS and Occam 6.1 are shown. Using the same methods, a Comparison Campaign of VLBI data analysis software called DeDeCC is about to be launched within the IVS soon.

  4. Captured key electrical safety lockout system

    DOEpatents

    Darimont, Daniel E.

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  5. Captured key electrical safety lockout system

    DOEpatents

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  6. Managing the pursuit of health and wealth: the key challenges.

    PubMed

    Fidler, David P; Drager, Nick; Lee, Kelley

    2009-01-24

    This article forms part of a six-part Series on trade and health, and sets the stage for this Series by analysing key aspects of the relationship between trade and health. The Series takes stock of this relation and provides timely analysis of the key challenges facing efforts to achieve an appropriate balance between trade and health across a diverse range of issues. This introductory article reviews how trade and health have risen and expanded on global policy agendas in the past decade in unprecedented ways, describes how trade and health issues are respectively governed in international relations, examines the ongoing search for policy coherence between the two policy spheres, and highlights the topics of the remaining articles in the Series.

  7. Managing the pursuit of health and wealth: the key challenges

    PubMed Central

    Fidler, David P; Drager, Nick; Lee, Kelley

    2009-01-01

    This article forms part of a six-part Series on trade and health, and sets the stage for this Series by analysing key aspects of the relationship between trade and health. The Series takes stock of this relation and provides timely analysis of the key challenges facing efforts to achieve an appropriate balance between trade and health across a diverse range of issues. This introductory article reviews how trade and health have risen and expanded on global policy agendas in the past decade in unprecedented ways, describes how trade and health issues are respectively governed in international relations, examines the ongoing search for policy coherence between the two policy spheres, and highlights the topics of the remaining articles in the Series. PMID:19167061

  8. Key acceptability attributes of orodispersible films.

    PubMed

    Scarpa, Mariagiovanna; Paudel, Amrit; Kloprogge, Frank; Hsiao, Wen Kai; Bresciani, Massimo; Gaisford, Simon; Orlu, Mine

    2018-04-01

    The features rendering orodispersible films (ODFs) patient-centric formulations are widely discussed in the scientific literature. However there is a lack of research studies exploring ODF characteristics with a potential impact on end-user acceptability. The aim of this study was to identify the key ODF characteristics affecting end-user acceptability by developing in vitro test methods for the prediction of ODFs acceptability and correlate these formulation characteristics with the data obtained from a human panel study. Four drug-free single-polymer films were prepared by solvent casting. Solutions of poly(vinyl) alcohol (PVOH) 39 KDa (P1), PVOH 197 KDa (P2), carboxymethylcellulose (CMC) 395 KDa (C1), and CMC 725 KDa (C2) were prepared. Texture analysis and Dynamic Mechanical Analysis (DMA) were used to assess film tack. Petri dish and drop methods were used to assess disintegration time. A human panel of 24 healthy young adults was employed to identify end-user acceptability criteria of the four study film samples. Texture analysis data of ODF tack were not found to be in agreement with the in vivo perceived stickiness in the mouth. However, measurement of the area under the adhesive force curve obtained by DMA correlated with in vivo perceived stickiness data for all samples. The disintegration times obtained by drop method were more comparable to human panel data than the petri dish method. Hence DMA and drop methods proved to be promising methodologies for the prediction of the end-user acceptability. The type and molecular weight of the film-forming polymer had a strong influence on stickiness perception, whereas only polymeric molecular weight influenced perceived disintegration time. The human panel study showed that Participant Reported Outcomes (PROs) for the perceived stickiness in the mouth and disintegration time of test films received significantly different scores between samples, and thus were identified as the key attributes with the

  9. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, R. K.; Peters, Scott

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modifiedmore » and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of

  10. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  11. Secret-key expansion from covert communication

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  12. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  13. The genetic potential for key biogeochemical processes in Arctic frost flowers and young sea ice revealed by metagenomic analysis.

    PubMed

    Bowman, Jeff S; Berthiaume, Chris T; Armbrust, E Virginia; Deming, Jody W

    2014-08-01

    Newly formed sea ice is a vast and biogeochemically active environment. Recently, we reported an unusual microbial community dominated by members of the Rhizobiales in frost flowers at the surface of Arctic young sea ice based on the presence of 16S gene sequences related to these strains. Here, we use metagenomic analysis of two samples, from a field of frost flowers and the underlying young sea ice, to explore the metabolic potential of this surface ice community. The analysis links genes for key biogeochemical processes to the Rhizobiales, including dimethylsulfide uptake, betaine glycine turnover, and halocarbon production. Nodulation and nitrogen fixation genes characteristic of terrestrial root-nodulating Rhizobiales were generally lacking from these metagenomes. Non-Rhizobiales clades at the ice surface had genes that would enable additional biogeochemical processes, including mercury reduction and dimethylsulfoniopropionate catabolism. Although the ultimate source of the observed microbial community is not known, considerations of the possible role of eolian deposition or transport with particles entrained during ice formation favor a suspended particle source for this microbial community. © 2014 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.

  14. Co-expression analysis reveals key gene modules and pathway of human coronary heart disease.

    PubMed

    Tang, Yu; Ke, Zun-Ping; Peng, Yi-Gen; Cai, Ping-Tai

    2018-02-01

    Coronary heart disease is a kind of disease which causes great injury to people world-widely. Although gene expression analyses had been performed previously, to our best knowledge, systemic co-expression analysis for this disease is still lacking to date. Microarray data of coronary heart disease was downloaded from NCBI with the accession number of GSE20681. Co-expression modules were constructed by WGCNA. Besides, the connectivity degree of eigengenes was analyzed. Furthermore, GO and KEGG enrichment analysis was performed on these eigengenes in these constructed modules. A total of 11 co-expression modules were constructed by the 3000 up-regulated genes from the 99 samples with coronary heart disease. The average number of genes in these modules was 270. The interaction analysis indicated the relative independence of gene expression in these modules. The functional enrichment analysis showed that there was a significant difference in the enriched terms and degree among these 11 modules. The results showed that modules 9 and 10 played critical roles in the occurrence of coronary disease. Pathways of hsa00190 (oxidative phosphorylation) and (hsa01130: biosynthesis of antibiotics) were thought to be closely related to the occurrence and development of coronary heart disease. Our result demonstrated that modules 9 and 10 were the most critical modules in the occurrence of coronary heart disease. Pathways as hsa00190 (oxidative phosphorylation) and (hsa01130: biosynthesis of antibiotics) had the potential to serve as the prognostic and predictive marker of coronary heart disease. © 2017 Wiley Periodicals, Inc.

  15. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  16. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  17. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  18. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  19. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017.

    PubMed

    Watson, Crystal R; Watson, Matthew; Sell, Tara Kirk

    2017-09-01

    To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained.

  20. Revocable identity-based proxy re-signature against signing key exposure

    PubMed Central

    Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125