Sample records for key discussion points

  1. [Discussion on the key points of building modern theory of acupuncture treatment].

    PubMed

    Yang, Guang

    2013-10-01

    Acupuncture treatment is different from treatment of materia medica. However, syndrome differentiation system of internal medicine is adopted all the time for the present acupuncture textbooks. It is held that the characteristics of acupuncture can not be fully reflexed, and advantages of acupuncture can not be brought into full play. Therefore, it's urgent to build up a modem theory on acupuncture treatment which is fit for the clinical practice of acupuncture and can give a better play for the treatment of acupuncture. A clear target is one of the characteristics of acupuncture treatment. And it is based on the understanding of the location of disease, therefore, disease differentiation is held as the basis of acupuncture treatment. The aim of meridian differentiation is to select distal effective points on the base of diseases differentiation, which is also taken as the characteristics of acupuncture treatment. Syndrome differentiation is a process of understanding the general pathological states of the human body, it is an important process to enhance the therapeutic effect of acupuncture. Thus, the key point for establishing the modern acupuncture theory is clarifying the values of disease differentiation, meridian differentiation and syndrome differentiation.

  2. EURAMET.T-K7 Key Comparison of Water Triple-Point Cells

    NASA Astrophysics Data System (ADS)

    Peruzzi, A.; Bosma, R.; Kerkhof, O.; Rosenkranz, P.; Del Campo Maldonado, M. D.; Strnad, R.; Nielsen, J.; Anagnostou, M.; Veliki, T.; Zvizdic, D.; Grudnewicz, E.; Nedea, M.; Neagu, D. M.; Steur, P.; Filipe, E.; Lobo, I.; Antonsen, I.; Renaot, E.; Heinonen, M.; Weckstrom, T.; Bojkovski, J.; Turzo-Andras, E.; Nemeth, S.; White, M.; Tegeler, E.; Dobre, M.; Duris, S.; Kartal Dogan, A.; Uytun, A.; Augevicius, V.; Pauzha, A.; Pokhodun, A.; Simic, S.

    2011-12-01

    The results of a EURAMET key comparison of water triple-point cells (EURAMET.T-K7) are reported. The equipment used, the measuring conditions applied, and the procedures adopted for the water triple-point measurement at the participating laboratories are synthetically presented. The definitions of the national reference for the water triple-point temperature adopted by each laboratory are disclosed. The multiplicity of degrees of equivalence arising for the linking laboratories with respect to the "mother" comparison CCT-K7 is discussed in detail.

  3. A fast image matching algorithm based on key points

    NASA Astrophysics Data System (ADS)

    Wang, Huilin; Wang, Ying; An, Ru; Yan, Peng

    2014-05-01

    Image matching is a very important technique in image processing. It has been widely used for object recognition and tracking, image retrieval, three-dimensional vision, change detection, aircraft position estimation, and multi-image registration. Based on the requirements of matching algorithm for craft navigation, such as speed, accuracy and adaptability, a fast key point image matching method is investigated and developed. The main research tasks includes: (1) Developing an improved celerity key point detection approach using self-adapting threshold of Features from Accelerated Segment Test (FAST). A method of calculating self-adapting threshold was introduced for images with different contrast. Hessian matrix was adopted to eliminate insecure edge points in order to obtain key points with higher stability. This approach in detecting key points has characteristics of small amount of computation, high positioning accuracy and strong anti-noise ability; (2) PCA-SIFT is utilized to describe key point. 128 dimensional vector are formed based on the SIFT method for the key points extracted. A low dimensional feature space was established by eigenvectors of all the key points, and each eigenvector was projected onto the feature space to form a low dimensional eigenvector. These key points were re-described by dimension-reduced eigenvectors. After reducing the dimension by the PCA, the descriptor was reduced to 20 dimensions from the original 128. This method can reduce dimensions of searching approximately near neighbors thereby increasing overall speed; (3) Distance ratio between the nearest neighbour and second nearest neighbour searching is regarded as the measurement criterion for initial matching points from which the original point pairs matched are obtained. Based on the analysis of the common methods (e.g. RANSAC (random sample consensus) and Hough transform cluster) used for elimination false matching point pairs, a heuristic local geometric restriction

  4. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  5. Talking Points: Discussion Activities in the Primary Classroom

    ERIC Educational Resources Information Center

    Dawes, Lyn

    2011-01-01

    "Talking Points: Discussion Activities in the Primary Classroom" encourages and supports classroom discussion on a range of topics, enabling children to develop the important life-skill of effective group communication. Children who can explain their own ideas and take account of the points of view and reasons of others are in the process of…

  6. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  7. ClinicalKey: a point-of-care search engine.

    PubMed

    Vardell, Emily

    2013-01-01

    ClinicalKey is a new point-of-care resource for health care professionals. Through controlled vocabulary, ClinicalKey offers a cross section of resources on diseases and procedures, from journals to e-books and practice guidelines to patient education. A sample search was conducted to demonstrate the features of the database, and a comparison with similar tools is presented.

  8. Manager. Outlining for Busy Managers the Key Points of Effective Management. The Supervisor's "Do-It-Yourself" Series 2.

    ERIC Educational Resources Information Center

    Rabey, Gordon P.

    This guide, which is intended for new supervisors and managers to use in an independent study setting, deals with the key points of effective management. The following topics are discussed in the individual sections: understanding what a manager is and why managers are appointed; setting objectives and achieving results; planning and controlling…

  9. Parametric Human Body Reconstruction Based on Sparse Key Points.

    PubMed

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  10. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations not...

  11. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied...

  12. ClinicalKey 2.0: Upgrades in a Point-of-Care Search Engine.

    PubMed

    Huslig, Mary Ann; Vardell, Emily

    2015-01-01

    ClinicalKey 2.0, launched September 23, 2014, offers a mobile-friendly design with a search history feature for targeting point-of-care resources for health care professionals. Browsing is improved with searchable, filterable listings of sources highlighting new resources. ClinicalKey 2.0 improvements include more than 1,400 new Topic Pages for quick access to point-of-care content. A sample search details some of the upgrades and content options.

  13. 25th anniversary article: key points for high-mobility organic field-effect transistors.

    PubMed

    Dong, Huanli; Fu, Xiaolong; Liu, Jie; Wang, Zongrui; Hu, Wenping

    2013-11-20

    Remarkable progress has been made in developing high performance organic field-effect transistors (OFETs) and the mobility of OFETs has been approaching the values of polycrystalline silicon, meeting the requirements of various electronic applications from electronic papers to integrated circuits. In this review, the key points for development of high mobility OFETs are highlighted from aspects of molecular engineering, process engineering and interface engineering. The importance of other factors, such as impurities and testing conditions is also addressed. Finally, the current challenges in this field for practical applications of OFETs are further discussed. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Evaluating Multisystemic Efforts to Impact Disproportionality through Key Decision Points

    ERIC Educational Resources Information Center

    Derezotes, Dennette; Richardson, Brad; King, Connie Bear; Kleinschmit-Rembert, Julia; Pratt, Betty

    2008-01-01

    Working in four communities, Casey Foundation/Center for the Study of Social Policy (CSSP) Alliance on Racial Equity (the Alliance) have developed a Racial Equity Scorecard for measuring disproportionality at key decision points for use in impacting disproportionality in the child welfare system. The four communities include King County,…

  15. Bench press exercise: the key points.

    PubMed

    Padulo, J; Laffaye, G; Chaouachi, A; Chamari, K

    2015-06-01

    The bench press exercise (BPE) is receiving increasing interest as a field testing, training/therapeutic modality to improve neuromuscular performance or to increase bone mass density. Several studies have been performed using BPE as a standard for increasing upper-limb strength. For this purpose, the position of the bar, the loads, the sets, the number of repetitions, the recovery time in-between sets, the movement speed, the muscular work and the use of the determination of the one repetition maximum (1-RM) are the classical tools investigated in the literature that have been shown to affect the BPE effect on neuromuscular. The goal of the present short review is to make a picture of the current knowledge on the bench press exercise, which could be very helpful for a better understanding of this standard movement and its effects. Based on the related literature, several recommendations on these key points are presented here.

  16. 41 CFR Appendix A to Subpart B of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart B of Part 102 Public Contracts and Property Management Federal Property.... B, App. A Appendix A to Subpart B of Part 102-3—Key Points and Principles This appendix provides... principles that may be applied to situations not covered elsewhere in this subpart. The guidance follows: Key...

  17. Eighth International Chorea-Acanthocytosis Symposium: Summary of Workshop Discussion and Action Points.

    PubMed

    Pappas, Samuel S; Bonifacino, Juan; Danek, Adrian; Dauer, William T; De, Mithu; De Franceschi, Lucia; DiPaolo, Gilbert; Fuller, Robert; Haucke, Volker; Hermann, Andreas; Kornmann, Benoit; Landwehrmeyer, Bernhard; Levin, Johannes; Neiman, Aaron M; Rudnicki, Dobrila D; Sibon, Ody; Velayos-Baeza, Antonio; Vonk, Jan J; Walker, Ruth H; Weisman, Lois S; Albin, Roger L

    2017-01-01

    Chorea-Acanthocytosis (ChAc) is a rare hereditary neurological disorder characterized by abnormal movements, red blood cell pathology, and progressive neurodegeneration. Little is understood of the pathogenesis of ChAc and related disorders (collectively Neuroacanthocytosis). The Eighth International Chorea-Acanthocytosis Symposium was held in May 2016 in Ann Arbor, MI, USA, and focused on molecular mechanisms driving ChAc pathophysiology. Accompanying the meeting, members of the neuroacanthocytosis research community and other invited scientists met in a workshop to discuss the current understanding and next steps needed to better understand ChAc pathogenesis. These discussions identified several broad and critical needs for advancing ChAc research and patient care, and led to the definition of 18 specific action points related to functional and molecular studies, animal models, and clinical research. These action points, described below, represent tractable research goals to pursue for the next several years.

  18. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL ADVISORY COMMITTEE... or agency management directives; (iv) The applicability of conflict of interest statutes and other... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false 3-Key Points and...

  19. Shifts in Key Time Points and Strategies for a Multisegment Motor Task in Healthy Aging Subjects.

    PubMed

    Casteran, Matthieu; Hilt, Pauline M; Mourey, France; Manckoundia, Patrick; French, Robert; Thomas, Elizabeth

    2018-05-05

    In this study, we compared key temporal points in the whole body pointing movement of healthy aging and young subjects. During this movement, subject leans forward from a standing position to reach a target. As it involves forward inclination of the trunk, the movement creates a risk for falling. We examined two strategic time points during the task-first, the crossover point where the velocity of the center of mass (CoM) in the vertical dimension outstripped the velocity in the anteroposterior dimension and secondly, the time to peak of the CoM velocity profile. Transitions to stabilizing postures occur at these time points. They both occurred earlier in aging subjects. The crossover point also showed adjustments with target distance in aging subjects, while this was not observed in younger subjects. The shifts in these key time points could not be attributed to differences in movement duration between the two groups. Investigation with an optimal control model showed that the temporal adjustment as a function of target distance in the healthy aging subjects fits into a strategy that emphasized equilibrium maintenance rather than absolute work as a control strategy.

  20. 41 CFR Appendix A to Subpart A of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false 3-Key Points and Principles A Appendix A to Subpart A of Part 102 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL ADVISORY COMMITTEE...

  1. [Clinical key points. Gonioscopy].

    PubMed

    Hamard, P

    2007-05-01

    Gonioscopy should be performed in all patients with glaucoma or suspected of having glaucoma. Four points are systematically evaluated: the width of the angle, the degree of trabecular pigmentation, the iridotrabecular appositions or synechia, and the level of iris insertion and the shape of the peripheral iris profile.

  2. KEY COMPARISON: Final Report on CCT-K7: Key comparison of water triple point cells

    NASA Astrophysics Data System (ADS)

    Stock, M.; Solve, S.; del Campo, D.; Chimenti, V.; Méndez-Lango, E.; Liedberg, H.; Steur, P. P. M.; Marcarino, P.; Dematteis, R.; Filipe, E.; Lobo, I.; Kang, K. H.; Gam, K. S.; Kim, Y.-G.; Renaot, E.; Bonnier, G.; Valin, M.; White, R.; Dransfield, T. D.; Duan, Y.; Xiaoke, Y.; Strouse, G.; Ballico, M.; Sukkar, D.; Arai, M.; Mans, A.; de Groot, M.; Kerkhof, O.; Rusby, R.; Gray, J.; Head, D.; Hill, K.; Tegeler, E.; Noatsch, U.; Duris, S.; Kho, H. Y.; Ugur, S.; Pokhodun, A.; Gerasimov, S. F.

    2006-01-01

    The triple point of water serves to define the kelvin, the unit of thermodynamic temperature, in the International System of Units (SI). Furthermore, it is the most important fixed point of the International Temperature Scale of 1990 (ITS-90). Any uncertainty in the realization of the triple point of water contributes directly to the measurement uncertainty over the wide temperature range from 13.8033 K to 1234.93 K. The Consultative Committee for Thermometry (CCT) decided at its 21st meeting in 2001 to carry out a comparison of water triple point cells and charged the BIPM with its organization. Water triple point cells from 20 national metrology institutes were carried to the BIPM and were compared with highest accuracy with two reference cells. The small day-to-day changes of the reference cells were determined by a least-squares technique. Prior to the measurements at the BIPM, the transfer cells were compared with the corresponding national references and therefore also allow comparison of the national references of the water triple point. This report presents the results of this comparison and gives detailed information about the measurements made at the BIPM and in the participating laboratories. It was found that the transfer cells show a standard deviation of 50 µK the difference between the extremes is 160 µK. The same spread is observed between the national references. The most important result of this work is that a correlation between the isotopic composition of the cell water and the triple point temperature was observed. To reduce the spread between different realizations, it is therefore proposed that the definition of the kelvin should refer to water of a specified isotopic composition. The CCT recommended to the International Committee of Weights and Measures (CIPM) to clarify the definition of the kelvin in the SI brochure by explicitly referring to water with the isotopic composition of Vienna Standard Mean Ocean Water (VSMOW). The CIPM

  3. End points and assessments in esthetic dental treatment.

    PubMed

    Ishida, Yuichi; Fujimoto, Keiko; Higaki, Nobuaki; Goto, Takaharu; Ichikawa, Tetsuo

    2015-10-01

    There are two key considerations for successful esthetic dental treatments. This article systematically describes the two key considerations: the end points of esthetic dental treatments and assessments of esthetic outcomes, which are also important for acquiring clinical skill in esthetic dental treatments. The end point and assessment of esthetic dental treatment were discussed through literature reviews and clinical practices. Before designing a treatment plan, the end point of dental treatment should be established. The section entitled "End point of esthetic dental treatment" discusses treatments for maxillary anterior teeth and the restoration of facial profile with prostheses. The process of assessing treatment outcomes entitled "Assessments of esthetic dental treatment" discusses objective and subjective evaluation methods. Practitioners should reach an agreement regarding desired end points with patients through medical interviews, and continuing improvements and developments of esthetic assessments are required to raise the therapeutic level of esthetic dental treatments. Copyright © 2015 Japan Prosthodontic Society. Published by Elsevier Ltd. All rights reserved.

  4. Space Station Crew Discusses Life in Space with West Point Cadets

    NASA Image and Video Library

    2017-11-27

    Aboard the International Space Station, Expedition 53 Commander Randy Bresnik and Flight Engineers Mark Vande Hei and Joe Acaba of NASA discussed life and research aboard the orbital outpost during an in-flight event Nov. 27 with cadets at the U.S. Military Academy in West Point, New York. Bresnik, who is a retired Marine Colonel, is in the final weeks of his five-and-a-half-month mission on the station, while Vande Hei, a former Army Colonel, and Acaba, a former Marine reservist, will remain aboard the complex until late February.

  5. MycoKey Round Table Discussions of Future Directions in Research on Chemical Detection Methods, Genetics and Biodiversity of Mycotoxins.

    PubMed

    Leslie, John F; Lattanzio, Veronica; Audenaert, Kris; Battilani, Paola; Cary, Jeffrey; Chulze, Sofia N; De Saeger, Sarah; Gerardino, Annamaria; Karlovsky, Petr; Liao, Yu-Cai; Maragos, Chris M; Meca, Giuseppe; Medina, Angel; Moretti, Antonio; Munkvold, Gary; Mulè, Giuseppina; Njobeh, Patrick; Pecorelli, Ivan; Perrone, Giancarlo; Pietri, Amedeo; Palazzini, Juan M; Proctor, Robert H; Rahayu, Endang S; Ramírez, Maria L; Samson, Robert; Stroka, Jörg; Sulyok, Michael; Sumarah, Mark; Waalwijk, Cees; Zhang, Qi; Zhang, Hao; Logrieco, Antonio F

    2018-03-01

    MycoKey, an EU-funded Horizon 2020 project, includes a series of "Roundtable Discussions" to gather information on trending research areas in the field of mycotoxicology. This paper includes summaries of the Roundtable Discussions on Chemical Detection and Monitoring of mycotoxins and on the role of genetics and biodiversity in mycotoxin production. Discussions were managed by using the nominal group discussion technique, which generates numerous ideas and provides a ranking for those identified as the most important. Four questions were posed for each research area, as well as two questions that were common to both discussions. Test kits, usually antibody based, were one major focus of the discussions at the Chemical Detection and Monitoring roundtable because of their many favorable features, e.g., cost, speed and ease of use. The second area of focus for this roundtable was multi-mycotoxin detection protocols and the challenges still to be met to enable these protocols to become methods of choice for regulated mycotoxins. For the genetic and biodiversity group, both the depth and the breadth of trending research areas were notable. For some areas, e.g., microbiome studies, the suggested research questions were primarily of a descriptive nature. In other areas, multiple experimental approaches, e.g., transcriptomics, proteomics, RNAi and gene deletions, are needed to understand the regulation of toxin production and mechanisms underlying successful biological controls. Answers to the research questions will provide starting points for developing acceptable prevention and remediation processes. Forging a partnership between scientists and appropriately-placed communications experts was recognized by both groups as an essential step to communicating risks, while retaining overall confidence in the safety of the food supply and the integrity of the food production chain.

  6. MycoKey Round Table Discussions of Future Directions in Research on Chemical Detection Methods, Genetics and Biodiversity of Mycotoxins

    PubMed Central

    Lattanzio, Veronica; Cary, Jeffrey; Chulze, Sofia N.; Gerardino, Annamaria; Liao, Yu-Cai; Maragos, Chris M.; Meca, Giuseppe; Moretti, Antonio; Munkvold, Gary; Mulè, Giuseppina; Njobeh, Patrick; Pecorelli, Ivan; Pietri, Amedeo; Proctor, Robert H.; Rahayu, Endang S.; Ramírez, Maria L.; Samson, Robert; Stroka, Jörg; Sumarah, Mark; Zhang, Qi; Zhang, Hao; Logrieco, Antonio F.

    2018-01-01

    MycoKey, an EU-funded Horizon 2020 project, includes a series of “Roundtable Discussions” to gather information on trending research areas in the field of mycotoxicology. This paper includes summaries of the Roundtable Discussions on Chemical Detection and Monitoring of mycotoxins and on the role of genetics and biodiversity in mycotoxin production. Discussions were managed by using the nominal group discussion technique, which generates numerous ideas and provides a ranking for those identified as the most important. Four questions were posed for each research area, as well as two questions that were common to both discussions. Test kits, usually antibody based, were one major focus of the discussions at the Chemical Detection and Monitoring roundtable because of their many favorable features, e.g., cost, speed and ease of use. The second area of focus for this roundtable was multi-mycotoxin detection protocols and the challenges still to be met to enable these protocols to become methods of choice for regulated mycotoxins. For the genetic and biodiversity group, both the depth and the breadth of trending research areas were notable. For some areas, e.g., microbiome studies, the suggested research questions were primarily of a descriptive nature. In other areas, multiple experimental approaches, e.g., transcriptomics, proteomics, RNAi and gene deletions, are needed to understand the regulation of toxin production and mechanisms underlying successful biological controls. Answers to the research questions will provide starting points for developing acceptable prevention and remediation processes. Forging a partnership between scientists and appropriately-placed communications experts was recognized by both groups as an essential step to communicating risks, while retaining overall confidence in the safety of the food supply and the integrity of the food production chain. PMID:29494529

  7. Key points for abolishing Female Genital Mutilation from the perspective of the men involved.

    PubMed

    Ruiz, Ismael Jiménez; Martínez, Pilar Almansa; Del Mar Pastor Bravo, María

    2016-03-01

    female Genital Mutilation is internationally considered an affront on human rights and an act of violence against women and young girls. Furthermore, it hierarchises and perpetuates inequality and denies the right to bodily and psychosocial integrity of women and young girls. to detect the key points for the abolition of Female Genital Mutilation as well as the necessary resources for its eradication. a qualitative methodology with an ethnonursing perspective, via semi-structured interviews, held both individually and in groups, in 21 men familiar with Female Genital Mutilation. through the voices of men familiar with this tradition, five key points are presented for its gradual eradication: sensitisation and awareness building, team action, abolition-promoting media, focusing action on rural areas and applying educational means before punitive ones. awareness-raising via the combined efforts of families, communities and governments, together with the promotion of health education programmes in demonstrating the complications derived from this practice, play a vital part in eradicating Female Genital Mutilation. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Viscosupplementation for Osteoarthritis of the Knee: A Key Opinion Leader Panel Discussion.

    PubMed

    Bert, Jack; Kenney, Jim; Sgaglione, Nicholas A; McClelland, Scott; Brophy, Robert; Toth, John; Ruane, Joseph; Ali, Yousaf; Arquette, Sheila; Dasa, Vinod; Lopes, Maria

    2018-06-01

    With a sharp rise in the prevalence of osteoarthritis of the knee (OAK) in a younger population, new management strategies are needed to preserve mobility, improve patients' quality of life, and reduce the effects of potential disease-related comorbidities. Viscosupplementation with the use of hyaluronic acid (HA) injection is a treatment option for OAK that can provide lubrication and elastic shock absorption, leading to potential pain relief, improved function, and reduced stiffness. A key opinion leader (KOL) panel discussion was held December 3, 2016, with the objective of sharing opinions, ideas, information, and trends regarding OAK and the potential treatment and management offered by viscosupplementation. The panel concluded that viscosupplementation with HA injections presents a viable, cost-effective, and safe alternative for the treatment of OAK. This panel discussion and report was facilitated by Magellan Rx Manage-ment and funded by Sanofi. Bert and Ruane report fees from Sanofi outside of this project. Sgaglione reports royalty payments from Zimmer Biomet and Wolters Kluwer. Dasa has received fees from Bioventus and Myoscience. All the authors received an honorarium for work on this project. Lopes is employed by Magellan Rx Management.

  9. [Key points for the management of dermatitis in Latin America. The SLAAI Consensus].

    PubMed

    Sánchez, Jorge; Páez, Bruno; Macías-Weinmann, Alejandra; De Falco, Alicia

    2015-01-01

    The incidence of atopic dermatitis in Latin America, as in other regions, has been increasing in recent years. The SLAAI consensus is based on a systematic search for articles related to dermatitis, with focus in the pathophysiology and treatment and its impact on Latin America, and reviewed using the Delphi methodology (Revista Alergia Mexico 2014;61:178-211). In this article we highlight the key points of consensus and particular considerations in Latin America.

  10. [Discussion on appraisal methods and key technologies of arbuscular mycorrhizal fungi and medicinal plant symbiosis system].

    PubMed

    Chen, Meilan; Guo, Lanping; Yang, Guang; Chen, Min; Yang, Li; Huang, Luqi

    2011-11-01

    Applications of arbuscular mycorrhizal fungi in research of medicinal plant cultivation are increased in recent years. Medicinal plants habitat is complicated and many inclusions are in root, however crop habitat is simple and few inclusions in root. So appraisal methods and key technologies about the symbiotic system of crop and arbuscular mycorrhizal fungi can't completely suitable for the symbiotic system of medicinal plants and arbuscular mycorrhizal fungi. This article discuss the appraisal methods and key technologies about the symbiotic system of medicinal plant and arbuscular mycorrhizal fungi from the isolation and identification of arbuscular mycorrhiza, and the appraisal of colonization intensity. This article provides guidance for application research of arbuscular mycorrhizal fungi in cultivation of medicinal plants.

  11. Ensuring quality: a key consideration in scaling-up HIV-related point-of-care testing programs

    PubMed Central

    Fonjungo, Peter N.; Osmanov, Saladin; Kuritsky, Joel; Ndihokubwayo, Jean Bosco; Bachanas, Pam; Peeling, Rosanna W.; Timperi, Ralph; Fine, Glenn; Stevens, Wendy; Habiyambere, Vincent; Nkengasong, John N.

    2016-01-01

    Objective: The objective of the WHO/US President's Emergency Plan for AIDS Relief consultation was to discuss innovative strategies, offer guidance, and develop a comprehensive policy framework for implementing quality-assured HIV-related point-of-care testing (POCT). Methods: The consultation was attended by representatives from international agencies (WHO, UNICEF, UNITAID, Clinton Health Access Initiative), United States Agency for International Development, Centers for Disease Control and Prevention/President's Emergency Plan for AIDS Relief Cooperative Agreement Partners, and experts from more than 25 countries, including policy makers, clinicians, laboratory experts, and program implementers. Main outcomes: There was strong consensus among all participants that ensuring access to quality of POCT represents one of the key challenges for the success of HIV prevention, treatment, and care programs. The following four strategies were recommended: implement a newly proposed concept of a sustainable quality assurance cycle that includes careful planning; definition of goals and targets; timely implementation; continuous monitoring; improvements and adjustments, where necessary; and a detailed evaluation; the importance of supporting a cadre of workers [e.g. volunteer quality corps (Q-Corps)] with the role to ensure that the quality assurance cycle is followed and sustained; implementation of the new strategy should be seen as a step-wise process, supported by development of appropriate policies and tools; and joint partnership under the leadership of the ministries of health to ensure sustainability of implementing novel approaches. Conclusion: The outcomes of this consultation have been well received by program implementers in the field. The recommendations also laid the groundwork for developing key policy and quality documents for the implementation of HIV-related POCT. PMID:26807969

  12. [Research progress on standards of commodity classes of Chinese materia medica and discussion on several key problems].

    PubMed

    Yang, Guang; Zeng, Yan; Guo, Lan-Ping; Huang, Lu-Qi; Jin, Yan; Zheng, Yu-Guang; Wang, Yong-Yan

    2014-05-01

    Standards of commodity classes of Chinese materia medica is an important way to solve the "Lemons Problem" of traditional Chinese medicine market. Standards of commodity classes are also helpful to rebuild market mechanisms for "high price for good quality". The previous edition of commodity classes standards of Chinese materia medica was made 30 years ago. It is no longer adapted to the market demand. This article researched progress on standards of commodity classes of Chinese materia medica. It considered that biological activity is a better choice than chemical constituents for standards of commodity classes of Chinese materia medica. It is also considered that the key point to set standards of commodity classes is finding the influencing factors between "good quality" and "bad quality". The article also discussed the range of commodity classes of Chinese materia medica, and how to coordinate standards of pharmacopoeia and commodity classes. According to different demands, diversiform standards can be used in commodity classes of Chinese materia medica, but efficacy is considered the most important index of commodity standard. Decoction pieces can be included in standards of commodity classes of Chinese materia medica. The authors also formulated the standards of commodity classes of Notoginseng Radix as an example, and hope this study can make a positive and promotion effect on traditional Chinese medicine market related research.

  13. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    PubMed Central

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  14. A Discussion with Sandy O'Sullivan about Key Issues for the Australian Indigenous Studies Learning and Teaching Network

    ERIC Educational Resources Information Center

    Barney, Katelyn

    2014-01-01

    This article takes the form of an interview with Sandy O'Sullivan, who is a partner on the Australian Indigenous Studies Learning and Teaching Network, about key issues that have arisen through Network discussions. She is a Wiradjuri woman and a Senior Aboriginal researcher at the Batchelor Institute of Indigenous Tertiary Education. O'Sullivan…

  15. Scored Discussions.

    ERIC Educational Resources Information Center

    Zola, John

    1992-01-01

    Suggests a classroom strategy to help students learn to analyze and discuss significant issues from history and current policy debates. Describes scored discussions in which small groups of students receive points for participation. Provides an example of a discussion on gold mining. Includes an agenda. Explores uses of scored discussions and…

  16. MycoKey round table discussions of future directions in research on chemical detection methods, genetics and biodiversity of mycotoxins

    USDA-ARS?s Scientific Manuscript database

    MycoKey, an EU-funded Horizon 2020 project, includes a series of “Roundtable Discussions” to gather information on trending research areas in the field of mycotoxicology. This presentation includes summaries of the Roundtable Discussions on the role of Genetics and Biodiversity in mycotoxin product...

  17. Election 2000: The Keys Point to Gore.

    ERIC Educational Resources Information Center

    Lichtman, Allan J.

    2000-01-01

    Asserts that Vice President Al Gore will be elected in 2000 based on the performance of the Clinton administration. Utilizes the key to the White House, 13 true-or-false diagnostic questions stated as propositions. If five or less are false then the party in power wins. (CMK)

  18. Critical Issues and Key Points from the Survey to the Creation of the Historical Building Information Model: the Case of Santo Stefano Basilica

    NASA Astrophysics Data System (ADS)

    Castagnetti, C.; Dubbini, M.; Ricci, P. C.; Rivola, R.; Giannini, M.; Capra, A.

    2017-05-01

    The new era of designing in architecture and civil engineering applications lies in the Building Information Modeling (BIM) approach, based on a 3D geometric model including a 3D database. This is easier for new constructions whereas, when dealing with existing buildings, the creation of the BIM is based on the accurate knowledge of the as-built construction. Such a condition is allowed by a 3D survey, often carried out with laser scanning technology or modern photogrammetry, which are able to guarantee an adequate points cloud in terms of resolution and completeness by balancing both time consuming and costs with respect to the request of final accuracy. The BIM approach for existing buildings and even more for historical buildings is not yet a well known and deeply discussed process. There are still several choices to be addressed in the process from the survey to the model and critical issues to be discussed in the modeling step, particularly when dealing with unconventional elements such as deformed geometries or historical elements. The paper describes a comprehensive workflow that goes through the survey and the modeling, allowing to focus on critical issues and key points to obtain a reliable BIM of an existing monument. The case study employed to illustrate the workflow is the Basilica of St. Stefano in Bologna (Italy), a large monumental complex with great religious, historical and architectural assets.

  19. Identifying key features of effective active learning: the effects of writing and peer discussion.

    PubMed

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  20. Efficient quantitative assessment of facial paralysis using iris segmentation and active contour-based key points detection with hybrid classifier.

    PubMed

    Barbosa, Jocelyn; Lee, Kyubum; Lee, Sunwon; Lodhi, Bilal; Cho, Jae-Gu; Seo, Woo-Keun; Kang, Jaewoo

    2016-03-12

    Facial palsy or paralysis (FP) is a symptom that loses voluntary muscles movement in one side of the human face, which could be very devastating in the part of the patients. Traditional methods are solely dependent to clinician's judgment and therefore time consuming and subjective in nature. Hence, a quantitative assessment system becomes apparently invaluable for physicians to begin the rehabilitation process; and to produce a reliable and robust method is challenging and still underway. We introduce a novel approach for a quantitative assessment of facial paralysis that tackles classification problem for FP type and degree of severity. Specifically, a novel method of quantitative assessment is presented: an algorithm that extracts the human iris and detects facial landmarks; and a hybrid approach combining the rule-based and machine learning algorithm to analyze and prognosticate facial paralysis using the captured images. A method combining the optimized Daugman's algorithm and Localized Active Contour (LAC) model is proposed to efficiently extract the iris and facial landmark or key points. To improve the performance of LAC, appropriate parameters of initial evolving curve for facial features' segmentation are automatically selected. The symmetry score is measured by the ratio between features extracted from the two sides of the face. Hybrid classifiers (i.e. rule-based with regularized logistic regression) were employed for discriminating healthy and unhealthy subjects, FP type classification, and for facial paralysis grading based on House-Brackmann (H-B) scale. Quantitative analysis was performed to evaluate the performance of the proposed approach. Experiments show that the proposed method demonstrates its efficiency. Facial movement feature extraction on facial images based on iris segmentation and LAC-based key point detection along with a hybrid classifier provides a more efficient way of addressing classification problem on facial palsy type and degree

  1. Coherent one-way quantum key distribution

    NASA Astrophysics Data System (ADS)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  2. The Key Practice, Discuss and Debate Ideas: Conceptual Framework, Literature Review, and Provisional Learning Progressions for Argumentation. Research Report. ETS RR-15-33

    ERIC Educational Resources Information Center

    Deane, Paul; Song, Yi

    2015-01-01

    In this paper, we provide a comprehensive literature review on the development of key argumentation skills to lay a foundation for a framework of the key practice, discuss and debate ideas, which is centrally involved in the expectations for academic reading and writing. Specifically, the framework includes 5 phases of core activities and related…

  3. EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments (Volume 1) (Interagency Science Discussion Draft)

    EPA Science Inventory

    EPA is releasing the draft report, EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments (Volume 1), that was distributed to Federal agencies and White House Offices for comment during the Science Discussion step of the Small Group Discussion as a Key Component in Online Assessment Training for Enhanced Student Learning in Web-Based Peer Assessment

    ERIC Educational Resources Information Center

    Liu, Xiongyi; Li, Lan; Zhang, Zhihong

    2018-01-01

    The purpose of this study is to examine the effect of online assessment training, with synchronous group discussion as a key component, on subsequent web-based peer assessment results. Participants included 81 college students, mostly women, taking a business writing class. After initial submission of a draft counter-offer letter, they completed…

  4. Critical Point Cancellation in 3D Vector Fields: Robustness and Discussion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Skraba, Primoz; Rosen, Paul; Wang, Bei

    Vector field topology has been successfully applied to represent the structure of steady vector fields. Critical points, one of the essential components of vector field topology, play an important role in describing the complexity of the extracted structure. Simplifying vector fields via critical point cancellation has practical merit for interpreting the behaviors of complex vector fields such as turbulence. However, there is no effective technique that allows direct cancellation of critical points in 3D. This work fills this gap and introduces the first framework to directly cancel pairs or groups of 3D critical points in a hierarchical manner with amore » guaranteed minimum amount of perturbation based on their robustness, a quantitative measure of their stability. In addition, our framework does not require the extraction of the entire 3D topology, which contains non-trivial separation structures, and thus is computationally effective. Furthermore, our algorithm can remove critical points in any subregion of the domain whose degree is zero and handle complex boundary configurations, making it capable of addressing challenging scenarios that may not be resolved otherwise. Here, we apply our method to synthetic and simulation datasets to demonstrate its effectiveness.« less

  5. Critical Point Cancellation in 3D Vector Fields: Robustness and Discussion.

    PubMed

    Skraba, Primoz; Rosen, Paul; Wang, Bei; Chen, Guoning; Bhatia, Harsh; Pascucci, Valerio

    2016-02-29

    Vector field topology has been successfully applied to represent the structure of steady vector fields. Critical points, one of the essential components of vector field topology, play an important role in describing the complexity of the extracted structure. Simplifying vector fields via critical point cancellation has practical merit for interpreting the behaviors of complex vector fields such as turbulence. However, there is no effective technique that allows direct cancellation of critical points in 3D. This work fills this gap and introduces the first framework to directly cancel pairs or groups of 3D critical points in a hierarchical manner with a guaranteed minimum amount of perturbation based on their robustness, a quantitative measure of their stability. In addition, our framework does not require the extraction of the entire 3D topology, which contains non-trivial separation structures, and thus is computationally effective. Furthermore, our algorithm can remove critical points in any subregion of the domain whose degree is zero and handle complex boundary configurations, making it capable of addressing challenging scenarios that may not be resolved otherwise. We apply our method to synthetic and simulation datasets to demonstrate its effectiveness.

  6. Critical Point Cancellation in 3D Vector Fields: Robustness and Discussion

    DOE PAGES

    Skraba, Primoz; Rosen, Paul; Wang, Bei; ...

    2016-02-29

    Vector field topology has been successfully applied to represent the structure of steady vector fields. Critical points, one of the essential components of vector field topology, play an important role in describing the complexity of the extracted structure. Simplifying vector fields via critical point cancellation has practical merit for interpreting the behaviors of complex vector fields such as turbulence. However, there is no effective technique that allows direct cancellation of critical points in 3D. This work fills this gap and introduces the first framework to directly cancel pairs or groups of 3D critical points in a hierarchical manner with amore » guaranteed minimum amount of perturbation based on their robustness, a quantitative measure of their stability. In addition, our framework does not require the extraction of the entire 3D topology, which contains non-trivial separation structures, and thus is computationally effective. Furthermore, our algorithm can remove critical points in any subregion of the domain whose degree is zero and handle complex boundary configurations, making it capable of addressing challenging scenarios that may not be resolved otherwise. Here, we apply our method to synthetic and simulation datasets to demonstrate its effectiveness.« less

  7. Response to the DIAC Discussion Paper: "Review of the General Skilled Migration Points Test". Go8 Position Paper

    ERIC Educational Resources Information Center

    Group of Eight (NJ1), 2010

    2010-01-01

    The Group of Eight (Go8) applauds the government's intention to comprehensively reform the skilled migration program, and it welcomes the opportunity to submit this response to the General Skilled Migration (GSM) Points Test Discussion Paper. The Go8 has argued for some time that it is inappropriate to link international education to the skilled…

  8. How to engage in a reflective discussion for revalidation.

    PubMed

    Middleton, Lyn; Llewellyn, Denise

    2016-07-20

    Rationale and key points This is the sixth in a series of eight articles providing information about the Nursing and Midwifery Council (NMC) revalidation process. This article focuses on the requirement for nurses and midwives to engage in a reflective discussion with an NMC registrant. The purpose of the reflective discussion is to encourage a culture of sharing information to support professional development and improve practice. » The reflective discussion must be undertaken with an NMC registrant. » The reflective discussion should cover the five written reflective accounts required to renew registration. Reflective activity 'How to' revalidate articles can help to update your practice and provide information about the revalidation process, including how you can engage in a reflective discussion. Reflect on and write a short account of: 1. How engaging in a reflective discussion with an NMC registrant helps you to view a situation from another person's perspective. 2. How you could use this article to educate your colleagues. Subscribers can upload their reflective accounts at: rcni.com/portfolio.

  9. A Qualitative Study of Turning Points or Aha! Moments in Older Adults' Discussions About Organ Donation.

    PubMed

    Downing, Kimberly; Jones, Linda L

    2018-01-01

    Older adults (50-70 years old) have lower organ donor registration rates than younger adults. Older adults have different informational needs and donor registration behavior than younger age groups. The objective of this qualitative study was to understand insights of older adults about organ donation to effectively address the barriers to becoming an organ donor. This study identified turning points as "Aha!" moments that occurred during a dialogue intervention where older adults discussed benefits, barriers, and process to organ donation. Dialogues were held with small groups of older adults in 11 communities in a Midwestern organ procurement organization service area. Participants were positive to organ donation, but not registered as an organ donor. Methods/Approach: Qualitative analysis of verbatim comments from the dialogue and a follow-up survey were used to examine turning points or "Aha!" moments of participants' decision-making about organ donation and organ donor registration. Twenty-one separate in-depth dialogues were conducted with 198 participants, with mean age of 60.57 years. There were 2757 separate comments coded with 465 of the comments (17%) identified as providing Aha! moments during the dialogue. Three themes include benefits of organ donation (30%), barriers about organ donation (39%), and organ donation process (31%). The research identified moments in the dialogue where possible learning about organ donation may have occurred. After participation in the dialogue process, there was an increase in intent to register to be an organ donor, organ donation discussion with family and friends, and organ donor registration.

  10. Final report on APMP.T-K7 key comparison of water triple point cells

    NASA Astrophysics Data System (ADS)

    Tsai, S. F.; White, R.; Tamba, J.; Yamazawa, K.; Ho, M. K.; Tsui, C. M.; Zaid, G.; Achmadi, A.; Gam, K. S.; Othman, H.; Ali, N. M.; Yuan, K. H.; Shaochun, Y.; Liedberg, H.; Yaokulbodee, C.

    2016-01-01

    APMP.T-K7, was held from February 2008 to September 2009 to compare the national realizations of the water triple point among eleven NMIs. To reach the objective, each participating laboratory sent a transfer cell to CMS and stated a value for the temperature difference of the transfer cell, relative to the corresponding national standard, representing 273.16 K. CMS (Taiwan) organized the comparison, with the support from co-pilot institutes MSL (New Zealand) and NMIJ (Japan). The other eight participating laboratories included NMIA, SCL, KIM-LIPI, KRISS, NMIM/SIRIM, NMC, NMISA, and NIMT. This report presents the results of the TPW comparison, gives detailed information about the measurements made at the CMS and at the participating laboratories, and aims to link the results of APMP.T-K7 to CCT-K7. The results of this key comparison are also represented in the form of degrees of equivalence for the purposes of the MRA. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  11. [Key-point investigation list of traditional Chinese medicinal materials for national survey of Chinese material medica resources].

    PubMed

    Zhang, Xiao-Bo; Guo, Lan-Ping; Zhang, Yan; Zhou, Liang-Yun; Huang, Lu-Qi

    2014-04-01

    Base on the traditional Chinese medicinal materials list that include Pharmacopoeia of the People's Republic of China, Dao-di Herbs, the common used herbs, endangered species, to analyze the key-point investigation traditional Chinese medicinal materials list was analysed. Results displayed that the variety number of traditional Chinese medicinal materials in Pharmacopoeia of the People's Republic of China is 894, the variety number of Dao-di Herbs is 495, the variety number of the common use is 326, the variety number of traditional Chinese medicinal materials from endangered species is 280, and during the third national survey of Chinese material medica resources the variety number of traditional Chinese medicinal materials that were analysed is 360. In the list of Dao-di Herbs and common used herbs over 85% are in the list of Pharmacopoeia of the People's Republic of China, in the list of the common used herbs over 80% are in the list of Dao-di Herbs, in the list of Pharmacopoeia of the People's Republic of China and Dao-di Herbs over 10% are in the list of endangered species. The key-point investigation traditional Chinese medicinal materials list includes three part, the first part includes 563 variery traditional Chinese medicinal materials that need to statistics quantity of resource by field investigation, the second part includes 457 variery that need to monitor the changing situation, the third part includes 280 variery that need to estimated endangered situation.

  12. Is it time to include point-of-care ultrasound in general surgery training? A review to stimulate discussion.

    PubMed

    Mollenkopf, Maximilian; Tait, Noel

    2013-12-01

    Point-of-care ultrasound scanning or POCUS is a focused ultrasound (US) scan, performed by non-imaging clinicians during physical examination, an invasive procedure or surgery. As this technology becomes cheaper, smaller and easier to use, its scope for use by surgeons grows, a trend that may generate a gap between use and training. Opportunities for enhanced general surgery skill sets may be reduced unless consideration is given to inclusion of POCUS in general surgery training. To stimulate discussion regarding inclusion of POCUS in the general surgery curriculum; to resource this discussion with an overview of current trends and issues around POCUS; and to discuss concerns and controversies that may arise if POCUS was adopted into general surgery training. A literature search was performed using PUBMED, MEDLINE, Google and Google Scholar, using the terms 'ultrasound', 'point-of-care-ultrasound', 'bedside ultrasound', 'portable ultrasound' and 'hand-held ultrasound'. Literature, references and non-literature resources found were reviewed for relevance to US education in general surgery. Increasingly, medical students are graduating with basic POCUS skills. Specialty-specific uses of POCUS are proliferating. Training and assessment resources are not keeping up, in accessibility or standardization. A learned surgical college led training and accreditation process would require aligned education in anatomy and US technology and collaboration with the specialist imaging community to ensure appropriate standards are clarified and met. Research is also required into how general surgery trainees can best achieve and maintain POCUS competence. © 2013 Royal Australasian College of Surgeons.

  13. Implementation of Point-of-Care Diagnostics in Rural Primary Healthcare Clinics in South Africa: Perspectives of Key Stakeholders.

    PubMed

    Mashamba-Thompson, Tivani P; Jama, Ngcwalisa A; Sartorius, Benn; Drain, Paul K; Thompson, Rowan M

    2017-01-08

    Key stakeholders' involvement is crucial to the sustainability of quality point-of-care (POC) diagnostics services in low-and-middle income countries. The aim of this study was to explore key stakeholder perceptions on the implementation of POC diagnostics in rural primary healthcare (PHC) clinics in South Africa. We conducted a qualitative study encompassing in-depth interviews with multiple key stakeholders of POC diagnostic services for rural and resource-limited PHC clinics. Interviews were digitally recorded and transcribed verbatim prior to thematic content analysis. Thematic content analysis was conducted using themes guided by the World Health Organisation (WHO) quality-ASSURED (Affordable, Sensitive, Specific, User friendly, Rapid and to enable treatment at first visit and Robust, Equipment free and Delivered to those who need it) criteria for POC diagnostic services in resource-limited settings. 11 key stakeholders participated in the study. All stakeholders perceived the main advantage of POC diagnostics as enabling access to healthcare for rural patients. Stakeholders perceived the current POC diagnostic services to have an ability to meet patients' needs, but recommended further improvement of the following areas: research on cost-effectiveness; improved quality management systems; development of affordable POC diagnostic and clinic-based monitoring and evaluation. Key stakeholders of POC diagnostics in rural PHC clinics in South Africa highlighted the need to assess affordability and ensure quality assurance of current services before adopting new POC diagnostics and scaling up current POC diagnostics.

  14. Implementation of Point-of-Care Diagnostics in Rural Primary Healthcare Clinics in South Africa: Perspectives of Key Stakeholders

    PubMed Central

    Mashamba-Thompson, Tivani P.; Jama, Ngcwalisa A.; Sartorius, Benn; Drain, Paul K.; Thompson, Rowan M.

    2017-01-01

    Introduction: Key stakeholders’ involvement is crucial to the sustainability of quality point-of-care (POC) diagnostics services in low-and-middle income countries. The aim of this study was to explore key stakeholder perceptions on the implementation of POC diagnostics in rural primary healthcare (PHC) clinics in South Africa. Method: We conducted a qualitative study encompassing in-depth interviews with multiple key stakeholders of POC diagnostic services for rural and resource-limited PHC clinics. Interviews were digitally recorded and transcribed verbatim prior to thematic content analysis. Thematic content analysis was conducted using themes guided by the World Health Organisation (WHO) quality-ASSURED (Affordable, Sensitive, Specific, User friendly, Rapid and to enable treatment at first visit and Robust, Equipment free and Delivered to those who need it) criteria for POC diagnostic services in resource-limited settings. Results: 11 key stakeholders participated in the study. All stakeholders perceived the main advantage of POC diagnostics as enabling access to healthcare for rural patients. Stakeholders perceived the current POC diagnostic services to have an ability to meet patients’ needs, but recommended further improvement of the following areas: research on cost-effectiveness; improved quality management systems; development of affordable POC diagnostic and clinic-based monitoring and evaluation. Conclusions: Key stakeholders of POC diagnostics in rural PHC clinics in South Africa highlighted the need to assess affordability and ensure quality assurance of current services before adopting new POC diagnostics and scaling up current POC diagnostics. PMID:28075337

  15. Implementation of control point form of algebraic grid-generation technique

    NASA Technical Reports Server (NTRS)

    Choo, Yung K.; Miller, David P.; Reno, Charles J.

    1991-01-01

    The control point form (CPF) provides explicit control of physical grid shape and grid spacing through the movement of the control points. The control point array, called a control net, is a space grid type arrangement of locations in physical space with an index for each direction. As an algebraic method CPF is efficient and works well with interactive computer graphics. A family of menu-driven, interactive grid-generation computer codes (TURBO) is being developed by using CPF. Key features of TurboI (a TURBO member) are discussed and typical results are presented. TurboI runs on any IRIS 4D series workstation.

  16. A research protocol for developing a Point-Of-Care Key Evidence Tool 'POCKET': a checklist for multidimensional evidence reporting on point-of-care in vitro diagnostics.

    PubMed

    Huddy, Jeremy R; Ni, Melody; Mavroveli, Stella; Barlow, James; Williams, Doris-Ann; Hanna, George B

    2015-07-10

    Point-of-care in vitro diagnostics (POC-IVD) are increasingly becoming widespread as an acceptable means of providing rapid diagnostic results to facilitate decision-making in many clinical pathways. Evidence in utility, usability and cost-effectiveness is currently provided in a fragmented and detached manner that is fraught with methodological challenges given the disruptive nature these tests have on the clinical pathway. The Point-of-care Key Evidence Tool (POCKET) checklist aims to provide an integrated evidence-based framework that incorporates all required evidence to guide the evaluation of POC-IVD to meet the needs of policy and decisionmakers in the National Health Service (NHS). A multimethod approach will be applied in order to develop the POCKET. A thorough literature review has formed the basis of a robust Delphi process and validation study. Semistructured interviews are being undertaken with POC-IVD stakeholders, including industry, regulators, commissioners, clinicians and patients to understand what evidence is required to facilitate decision-making. Emergent themes will be translated into a series of statements to form a survey questionnaire that aims to reach a consensus in each stakeholder group to what needs to be included in the tool. Results will be presented to a workshop to discuss the statements brought forward and the optimal format for the tool. Once assembled, the tool will be field-tested through case studies to ensure validity and usability and inform refinement, if required. The final version will be published online with a call for comments. Limitations include unpredictable sample representation, development of compromise position rather than consensus, and absence of blinding in validation exercise. The Imperial College Joint Research Compliance Office and the Imperial College Hospitals NHS Trust R&D department have approved the protocol. The checklist tool will be disseminated through a PhD thesis, a website, peer

  17. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  18. Global analysis of plasticity in turgor loss point, a key drought tolerance trait.

    PubMed

    Bartlett, Megan K; Zhang, Ya; Kreidler, Nissa; Sun, Shanwen; Ardy, Rico; Cao, Kunfang; Sack, Lawren

    2014-12-01

    Many species face increasing drought under climate change. Plasticity has been predicted to strongly influence species' drought responses, but broad patterns in plasticity have not been examined for key drought tolerance traits, including turgor loss or 'wilting' point (πtlp ). As soil dries, plants shift πtlp by accumulating solutes (i.e. 'osmotic adjustment'). We conducted the first global analysis of plasticity in Δπtlp and related traits for 283 wild and crop species in ecosystems worldwide. Δπtlp was widely prevalent but moderate (-0.44 MPa), accounting for 16% of post-drought πtlp. Thus, pre-drought πtlp was a considerably stronger predictor of post-drought πtlp across species of wild plants. For cultivars of certain crops Δπtlp accounted for major differences in post-drought πtlp. Climate was correlated with pre- and post-drought πtlp, but not Δπtlp. Thus, despite the wide prevalence of plasticity, πtlp measured in one season can reliably characterise most species' constitutive drought tolerances and distributions relative to water supply. © 2014 John Wiley & Sons Ltd/CNRS.

  19. Multiplicity: discussion points from the Statisticians in the Pharmaceutical Industry multiplicity expert group.

    PubMed

    Phillips, Alan; Fletcher, Chrissie; Atkinson, Gary; Channon, Eddie; Douiri, Abdel; Jaki, Thomas; Maca, Jeff; Morgan, David; Roger, James Henry; Terrill, Paul

    2013-01-01

    In May 2012, the Committee of Health and Medicinal Products issued a concept paper on the need to review the points to consider document on multiplicity issues in clinical trials. In preparation for the release of the updated guidance document, Statisticians in the Pharmaceutical Industry held a one-day expert group meeting in January 2013. Topics debated included multiplicity and the drug development process, the usefulness and limitations of newly developed strategies to deal with multiplicity, multiplicity issues arising from interim decisions and multiregional development, and the need for simultaneous confidence intervals (CIs) corresponding to multiple test procedures. A clear message from the meeting was that multiplicity adjustments need to be considered when the intention is to make a formal statement about efficacy or safety based on hypothesis tests. Statisticians have a key role when designing studies to assess what adjustment really means in the context of the research being conducted. More thought during the planning phase needs to be given to multiplicity adjustments for secondary endpoints given these are increasing in importance in differentiating products in the market place. No consensus was reached on the role of simultaneous CIs in the context of superiority trials. It was argued that unadjusted intervals should be employed as the primary purpose of the intervals is estimation, while the purpose of hypothesis testing is to formally establish an effect. The opposing view was that CIs should correspond to the test decision whenever possible. Copyright © 2013 John Wiley & Sons, Ltd.

  1. [Key ethic discussions in hospice/palliative care].

    PubMed

    Jusić, Anica

    2008-12-01

    The goal of palliative care is to provide the best possible quality of life for patients and their families in the process of dying as well as before, during the course of illness. Emphasis is on the role of team approach in every aspect of patient care. The moral principles of sacredness of life and the right of personal autonomy may occasionally come in conflict. The basic principle of the respect of life prohibits killing, which has been accepted in one way or another by all societies - for the reasons of survival. Similar to this, modern morality supports the principle of respecting autonomy and self-management based on informed, conscious personality of an individual. Still, if the needs of another person appear to be more important or desirable than reaching certain individual goals, then the right of an individual regarding autonomy may be legitimately limited. Decisions on not applying or terminating certain procedures must be based on thorough discussion and consideration of the nature and expected result of treatment. If the patient is not competent, then the discussion should involve a team providing care for the patient and a representative of the patient. When the physician and the team can clearly see that unfavorable effects of treatment will outweigh therapeutic benefits, then, according to medical ethics of the respecting beneficiary, the team is not obliged to provide that form of treatment. Except for palliative care, there is no medical treatment that is always obligatory. A physician that does not accept the patient's request to be killed does not limit the patient's autonomy. Autonomy is self-management and capability of the patient to kill him/herself is not limited by the physician's refusal to do so. Even in those cases when patients for various reasons say that death will be a relief, it does not mean that the physician is obliged to terminate life. The superior obligation of physicians is to alleviate pain. If euthanasia would be legal

  2. Synthesis of Key Points from the OSEP Early Childhood Transition FAQ (SPP/APR Indicators C-8, B-11 and B-12)

    ERIC Educational Resources Information Center

    Diefendorf, M.; Henson, J.; Lucas, A.; Whaley, K.

    2010-01-01

    This document is a synthesis of the key points provided in the Office of Special Education Programs (OSEP) Early Childhood Transition FAQs: SPP/APR indicators C-8 and B-12 released on December 1, 2009. It was developed to assist states with the implementation of effective transition policies and practices. The following is included: (1) Transition…

  3. Modeling the contribution of point sources and non-point sources to Thachin River water pollution.

    PubMed

    Schaffner, Monika; Bader, Hans-Peter; Scheidegger, Ruth

    2009-08-15

    Major rivers in developing and emerging countries suffer increasingly of severe degradation of water quality. The current study uses a mathematical Material Flow Analysis (MMFA) as a complementary approach to address the degradation of river water quality due to nutrient pollution in the Thachin River Basin in Central Thailand. This paper gives an overview of the origins and flow paths of the various point- and non-point pollution sources in the Thachin River Basin (in terms of nitrogen and phosphorus) and quantifies their relative importance within the system. The key parameters influencing the main nutrient flows are determined and possible mitigation measures discussed. The results show that aquaculture (as a point source) and rice farming (as a non-point source) are the key nutrient sources in the Thachin River Basin. Other point sources such as pig farms, households and industries, which were previously cited as the most relevant pollution sources in terms of organic pollution, play less significant roles in comparison. This order of importance shifts when considering the model results for the provincial level. Crosschecks with secondary data and field studies confirm the plausibility of our simulations. Specific nutrient loads for the pollution sources are derived; these can be used for a first broad quantification of nutrient pollution in comparable river basins. Based on an identification of the sensitive model parameters, possible mitigation scenarios are determined and their potential to reduce the nutrient load evaluated. A comparison of simulated nutrient loads with measured nutrient concentrations shows that nutrient retention in the river system may be significant. Sedimentation in the slow flowing surface water network as well as nitrogen emission to the air from the warm oxygen deficient waters are certainly partly responsible, but also wetlands along the river banks could play an important role as nutrient sinks.

  4. Key Ethical Issues Discussed at CDC-Sponsored International, Regional Meetings to Explore Cultural Perspectives and Contexts on Pandemic Influenza Preparedness and Response

    PubMed Central

    Lor, Aun; Thomas, James C.; Barrett, Drue H.; Ortmann, Leonard W.; Herrera Guibert, Dionisio J.

    2016-01-01

    ethical principles discussed in the WHO’s guidance. Most significantly the input gathered from these regional meetings pointed to the important role that procedural ethics can play in bringing people and countries together to respond to the shared health threat posed by a pandemic influenza despite the existence of cultural differences. PMID:27801360

  5. Evaluation of the first seizure patient: Key points in the history and physical examination.

    PubMed

    Nowacki, Tomasz A; Jirsch, Jeffrey D

    2017-07-01

    This review will present the history and physical examination as the launching point of the first seizure evaluation, from the initial characterization of the event, to the exclusion of alternative diagnoses, and then to the determination of specific acute or remote causes. Clinical features that may distinguish seizures from alternative diagnoses are discussed in detail, followed by a discussion of acute and remote first seizure etiologies. This review article is based on a discretionary selection of English language articles retrieved by a literature search in the PubMed database, and the authors' clinical experience. The first seizure is a dramatic event with often profound implications for patients and family members. The initial clinical evaluation focuses on an accurate description of the spell to confirm the diagnosis, along with careful scrutiny for previously unrecognized seizures that would change the diagnosis more definitively to one of epilepsy. The first seizure evaluation rests primarily on the clinical history, and to a lesser extent, the physical examination. Even in the era of digital EEG recording and neuroimaging, the initial clinical evaluation remains essential for the diagnosis, treatment, and prognostication of the first seizure. Copyright © 2016. Published by Elsevier Ltd.

  6. Limits in point to point resolution of MOS based pixels detector arrays

    NASA Astrophysics Data System (ADS)

    Fourches, N.; Desforge, D.; Kebbiri, M.; Kumar, V.; Serruys, Y.; Gutierrez, G.; Leprêtre, F.; Jomard, F.

    2018-01-01

    In high energy physics point-to-point resolution is a key prerequisite for particle detector pixel arrays. Current and future experiments require the development of inner-detectors able to resolve the tracks of particles down to the micron range. Present-day technologies, although not fully implemented in actual detectors, can reach a 5-μm limit, this limit being based on statistical measurements, with a pixel-pitch in the 10 μm range. This paper is devoted to the evaluation of the building blocks for use in pixel arrays enabling accurate tracking of charged particles. Basing us on simulations we will make here a quantitative evaluation of the physical and technological limits in pixel size. Attempts to design small pixels based on SOI technology will be briefly recalled here. A design based on CMOS compatible technologies that allow a reduction of the pixel size below the micrometer is introduced here. Its physical principle relies on a buried carrier-localizing collecting gate. The fabrication process needed by this pixel design can be based on existing process steps used in silicon microelectronics. The pixel characteristics will be discussed as well as the design of pixel arrays. The existing bottlenecks and how to overcome them will be discussed in the light of recent ion implantation and material characterization experiments.

  7. Image encryption based on nonlinear encryption system and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Chi, Yingying

    2015-03-01

    Recently, optical asymmetric cryptosystem (OACS) has became the focus of discussion and concern of researchers. Some researchers pointed out that OACS was not tenable because of misunderstanding the concept of asymmetric cryptosystem (ACS). We propose an improved cryptosystem using RSA public-key algorithm based on existing OACS and the new system conforms to the basic agreement of public key cryptosystem. At the beginning of the encryption process, the system will produce an independent phase matrix and allocate the input image, which also conforms to one-time pad cryptosystem. The simulation results show that the validity of the improved cryptosystem and the high robustness against attack scheme using phase retrieval technique.

  8. Connecting the Dots: A Discussion on Key Concepts in Contemporary Entrepreneurship Education

    ERIC Educational Resources Information Center

    Hägg, Gustav; Kurczewska, Agnieszka

    2016-01-01

    Purpose: The purpose of this paper is to justify, elaborate and elucidate the concepts of action, experience and reflection, and how they are intertwined when discussing contemporary entrepreneurship education. These concepts have been given a meaning in entrepreneurship education, but have not been discussed in-depth, and by that have been…

  9. Lagrange Point Missions: the Key to Next-Generation Integrated Earth Observations. DSCOVR Innovation

    NASA Astrophysics Data System (ADS)

    Valero, F. P. J.

    2016-12-01

    From L-1 DSCOVR is capable of new, unique observations potentially conducive to a deeper scientific understanding of the Earth sciences. At L-1 and L-2 the net gravitational pull of the Earth and Sun equals the centripetal force required to orbit the Sun with the same period as the Earth. Satellites at or near L-1 and L-2 keep the same position relative to the Sun and the Earth. DSCOVR does not orbit the Earth but the Sun in synchronism with Earth, acts like a planetoid (orbits the Sun in the ecliptic plane) while acquiring integrated plus spatially and time resolved scientific data as Earth rotates around its axis. Because of the planet's axial tilt relative to the ecliptic plane, the Polar Regions are visible during local summer from L-1 and local winter from L-2 (Fig. 1). DSCOVR's synoptic and continuous observations solve most of the temporal and spatial limitations associated with low Earth (LEO) and Geostationary (GEO) orbits. Two observatories, one at L-1 (daytime) and one at L-2 (nighttime), would acquire minute-by-minute climate quality data for essentially every point on Earth. The integration of L-1, L-2, LEO, and GEO satellites plus the Moon offers new scientific tools and enriched data sets for Earth sciences. Lagrange points observatories are key to next-generation integrated Earth observations. For example, DSCOVR at L-1 views the Earth plus the Moon (a reference) and simultaneously, at one time or another, all LEO and GEO satellites. The L-1 and L-2 satellites would be the link between the Moon, LEO and GEO satellites while providing the data needed to build an integrated Earth observational system. The above properties are the bases for DSCOVR's innovation and scientific approach that systematically observes climate drivers (radiation, aerosols, ozone, clouds, water vapor, vegetation) from L-1 in a way not possible but synergistic with other satellites. Next step: more capable L-1 plus L-2 satellites. The way of the future.

  10. Key Ethical Issues Discussed at CDC-Sponsored International, Regional Meetings to Explore Cultural Perspectives and Contexts on Pandemic Influenza Preparedness and Response.

    PubMed

    Lor, Aun; Thomas, James C; Barrett, Drue H; Ortmann, Leonard W; Herrera Guibert, Dionisio J

    2016-05-17

    Recognizing the importance of having a broad exploration of how cultural perspectives may shape thinking about ethical considerations, the Centers for Disease Control and Prevention (CDC) funded four regional meetings in Africa, Asia, Latin America, and the Eastern Mediterranean to explore these perspectives relevant to pandemic influenza preparedness and response. The meetings were attended by 168 health professionals, scientists, academics, ethicists, religious leaders, and other community members representing 40 countries in these regions. We reviewed the meeting reports, notes and stories and mapped outcomes to the key ethical challenges for pandemic influenza response described in the World Health Organization's (WHO's) guidance, Ethical Considerations in Developing a Public Health Response to Pandemic Influenza: transparency and public engagement, allocation of resources, social distancing, obligations to and of healthcare workers, and international collaboration. The important role of transparency and public engagement were widely accepted among participants. However, there was general agreement that no "one size fits all" approach to allocating resources can address the variety of economic, cultural and other contextual factors that must be taken into account. The importance of social distancing as a tool to limit disease transmission was also recognized, but the difficulties associated with this measure were acknowledged. There was agreement that healthcare workers often have competing obligations and that government has a responsibility to assist healthcare workers in doing their job by providing appropriate training and equipment. Finally, there was agreement about the importance of international collaboration for combating global health threats. Although some cultural differences in the values that frame pandemic preparedness and response efforts were observed, participants generally agreed on the key ethical principles discussed in the WHO's guidance

  11. [Process and key points of clinical literature evaluation of post-marketing traditional Chinese medicine].

    PubMed

    Liu, Huan; Xie, Yanming

    2011-10-01

    The clinical literature evaluation of the post-marketing traditional Chinese medicine is a comprehensive evaluation by the comprehensive gain, analysis of the drug, literature of drug efficacy, safety, economy, based on the literature evidence and is part of the evaluation of evidence-based medicine. The literature evaluation in the post-marketing Chinese medicine clinical evaluation is in the foundation and the key position. Through the literature evaluation, it can fully grasp the information, grasp listed drug variety of traditional Chinese medicines second development orientation, make clear further clinical indications, perfect the medicines, etc. This paper discusses the main steps and emphasis of the clinical literature evaluation. Emphasizing security literature evaluation should attach importance to the security of a comprehensive collection drug information. Safety assessment should notice traditional Chinese medicine validity evaluation in improving syndrome, improveing the living quality of patients with special advantage. The economics literature evaluation should pay attention to reliability, sensitivity and practicability of the conclusion.

  12. "State of the Nation": A Discussion of Some of the Project's Key Findings

    ERIC Educational Resources Information Center

    Earley, Peter

    2010-01-01

    This paper considers several of the key findings of the State of the Nation research. Specific reference is made to three areas--impact evaluation, strategic leadership of professional development, and barriers and constraints to effective CPD practice--which are considered with reference to findings from the other TDA-funded projects conducted at…

  13. Final report on APMP.T-K7.1 key comparison of water triple point cells, bilateral NMIJ-VMI

    NASA Astrophysics Data System (ADS)

    Yamazawa, Kazuaki; Nakano, Tohru; Thanh Binh, Pham

    2018-01-01

    APMP.T-K7.1, was held from July 2014 to May 2015 to compare the national realizations of the water triple point between NMIJ (Japan) and VMI (Vietnam). To reach the objective, VMI sent a transfer cell to NMIJ and stated a value for the temperature difference of the transfer cell, relative to the corresponding national standard, representing 273.16 K. This report presents the results of the TPW comparison, gives detailed information about the measurements made at the NMIJ and at the VMI, and aims to link the results of APMP.T-K7.1 to APMP.T-K7 and CCT-K7. The results of this key comparison are also represented in the form of degrees of equivalence for the purposes of the MRA. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  14. KEY COMPARISON Report to the CCT on key comparison EUROMET.T-K6 (EUROMET Project no. 621): Comparison of the realizations of local dew/frost-point temperature scales in the range -50 °C to +20 °C

    NASA Astrophysics Data System (ADS)

    Heinonen, Martti

    2010-01-01

    The first humidity CIPM key comparison, CCT-K6, will be completed in 2010. The corresponding European regional key comparison, EUROMET.T-K6, was carried out in 2004 to 2008. National metrology institutes from 24 countries participated in the comparison. The comparison covered the dew-point temperature range from -50 °C to +20 °C. It was organized as three parallel loops with two specially manufactured precision chilled mirror hygrometers as transfer standards in each loop. The comparison scheme was designed to ensure high quality results with evenly spread workload for the participants. MIKES was coordinating the project. This report presents the results of the comparison and provides detailed information on the measurements performed by all participating laboratories and the analysis of the results. Conclusions on the equivalence of the dew-point temperature standards are drawn on the basis of calculated bilateral degrees of equivalence and deviations from EURAMET comparison reference values (ERV). Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  15. KEY COMPARISON: Final report of APMP.T-K6 (original name APMP-IC-1-97): Comparison of humidity measurements using a dew point meter as a transfer standard

    NASA Astrophysics Data System (ADS)

    Li, Wang; Takahashi, C.; Hussain, F.; Hong, Yi; Nham, H. S.; Chan, K. H.; Lee, L. T.; Chahine, K.

    2007-01-01

    This APMP key comparison of humidity measurements using a dew point meter as a transfer standard was carried out among eight national metrology institutes from February 1999 to January 2001. The NMC/SPRING, Singapore was the pilot laboratory and a chilled mirror dew point meter offered by NMIJ was used as a transfer standard. The transfer standard was calibrated by each participating institute against local humidity standards in terms of frost and dew point temperature. Each institute selected its frost/dew point temperature calibration points within the range from -70 °C to 20 °C frost/dew point with 5 °C step. The majority of participating institutes measured from -60 °C to 20 °C frost/dew point and a simple mean evaluation was performed in this range. The differences between the institute values and the simple means for all participating institutes are within two standard deviations from the mean values. Bilateral equivalence was analysed in terms of pair difference and single parameter Quantified Demonstrated Equivalence. The results are presented in the report. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  16. Registration algorithm of point clouds based on multiscale normal features

    NASA Astrophysics Data System (ADS)

    Lu, Jun; Peng, Zhongtao; Su, Hang; Xia, GuiHua

    2015-01-01

    The point cloud registration technology for obtaining a three-dimensional digital model is widely applied in many areas. To improve the accuracy and speed of point cloud registration, a registration method based on multiscale normal vectors is proposed. The proposed registration method mainly includes three parts: the selection of key points, the calculation of feature descriptors, and the determining and optimization of correspondences. First, key points are selected from the point cloud based on the changes of magnitude of multiscale curvatures obtained by using principal components analysis. Then the feature descriptor of each key point is proposed, which consists of 21 elements based on multiscale normal vectors and curvatures. The correspondences in a pair of two point clouds are determined according to the descriptor's similarity of key points in the source point cloud and target point cloud. Correspondences are optimized by using a random sampling consistency algorithm and clustering technology. Finally, singular value decomposition is applied to optimized correspondences so that the rigid transformation matrix between two point clouds is obtained. Experimental results show that the proposed point cloud registration algorithm has a faster calculation speed, higher registration accuracy, and better antinoise performance.

  17. Development of Fixed-Point Cells at the SMU

    NASA Astrophysics Data System (ADS)

    Ďuriš, S.; Ranostaj, J.; Palenčár, R.

    2008-06-01

    One of the research programs realized at the thermometry laboratory of the Slovak Institute of Metrology (SMU) in recent years has focused on the development of fixed-point cells. In the frame of this research, several primary cells for realization of the International Temperature Scale of 1990 (ITS-90) and several secondary cells for industrial thermometer calibrations were built and studied. This article discusses primary cells for the gallium and mercury fixed points and miniature cells for the zinc point that were developed at the SMU. Information about the cell designs is provided, the materials that were used are specified, and the procedures for their manufacture are described. Briefly, the realization of the fixed points of mercury, gallium, and zinc by using these cells is also described. Many experiments were carried out to study the characteristics of these cells. One of the gallium cells was compared with the circulating transfer cell during the key comparison CCT-K3, and it and the mercury cell were used for the EUROMET Project No. 552. The results of the experiments together with the results of the comparisons show the high quality of these cells. Secondary zinc-point cells were compared against SMU primary zinc-point cells. The comparison shows agreement within 0.12 mK.

  18. [Efficacy on hemiplegic spasticity treated with plum blossom needle tapping therapy at the key points and Bobath therapy: a randomized controlled trial].

    PubMed

    Wang, Fei; Zhang, Lijuan; Wang, Jianhua; Shi, Yan; Zheng, Liya

    2015-08-01

    To evaluate the efficacy on hemiplegic spasticity after cerebral infarction treated with plum blossom needle tapping therapy at the key points and Bobath therapy. Eighty patients were collected, in compliance with the inclusive criteria of hemiplegic spasticity after cerebral infarction, and randomized into an observation group and a control group, 40 cases in each one. In the control group, Bobath manipulation therapy was adopted to relieve spasticity and the treatment of 8 weeks was required. In the observation group, on the basis of the treatment as the control group, the tapping therapy with plum blossom needle was applied to the key points, named Jianyu (LI 15), Jianliao (LI 14), Jianzhen (SI 9), Hegu (LI 4), Chengfu (BL 36), Zusanli (ST 36), Xiyangguan (GB 33), etc. The treatment was given for 15 min each time, once a day. Before treatment, after 4 and 8 weeks of treatment, the Fugl-Meyer assessment (FMA) and Barthel index (BI) were adopted to evaluate the motor function of the extremity and the activity of daily life in the patients of the two groups separately. The modified Ashworth scale was used to evaluate the effect of anti-spasticity. In 4 and 8 weeks of treatment, FMA: scores and BI scores were all significantly increased as compared with those before treatment in the two groups: (both P<0. 05). The results in 8 weeks of treatment in the observation group were significantly better than those in the control group (all P<0. 05). In 4 and 8 weeks of treatment, the scores of spasticity state were improved as compared with those before treatment in the patients of the two groups (all P<0. 05). The result in 8 weeks of treatment in the observation group was significantly better than that in the control group (P<0. 05). In 8 weeks of treatment, the total effective rate of anti-spasticity was 90. 0% (36/40) in the observation group, better than 75. 0% (30/40) in the control group (P<0. 05). The tapping therapy with plum blossom needle at the key points

  19. Report to the CCT on COOMET comparison COOMET.T-K3.1 (previously COOMET.T-S1): Key regional comparison of the national standards of temperature in the range from the triple point of water to the freezing point of zinc

    NASA Astrophysics Data System (ADS)

    Pokhodun, A. I.

    2010-01-01

    In the framework of the CIPM MRA, a first COOMET comparison "Comparison of the ITS-90 realizations in the range from 0.01 °C to 429.7485 °C (from the triple point of water to the freezing point of zinc)", registered in the KCDB under the identifier "COOMET.T-K3", was carried out in 2005-2007. Four national metrology institutes took part in this comparison: VNIIM (Russian Federation), SMU (Slovakia), BelGIM (Republic of Belarus) and NSC IM (Ukraine), and two of them (VNIIM and SMU) ensured the linkage with key comparisons CCT-K3 and CCT-K4, in order to disseminate the metrological equivalence to the measurement standards of NSC IM and BelGIM. NSC IM, however, had to withdraw its results, and at the meeting of Technical Committee T-10 of COOMET it was decided to carry out a supplementary bilateral comparison between VNIIM and the NSC IM for realization of the ITS-90 in the same range of temperature. This was registered in the KCDB under the identifier COOMET.T-S1 and measurements were performed in 2008-2009. From the results presented in this report, it is possible to draw the conclusion that the COOMET supplementary comparison COOMET.T-S1 demonstrates the CMC uncertainties claimed by the NSC IM for the melting point of gallium 0.236 mK (k = 2), and the freezing points of indium 1.040 mK (k = 2), tin 0.858 mK (k = 2) and zinc 0.944 mK (k = 2). In September 2012 the Working Group on key Comparisons (WG 7) of the CCT upgraded this comparison to a COOMET key comparison of the 'CCT-K3' type. It is now identified as COOMET.T-K3.1. In April 2013 this report was superseded by item 03006 in the Technical Supplement of 2013. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  20. Four Key Keys to Powerful Presentations in PowerPoint: Take Your Presentations to the Next Level

    ERIC Educational Resources Information Center

    Howell, Dusti D.

    2008-01-01

    If a person is on a presentation and he/she does not know how to go back to a previous PowerPoint slide, his/her credibility will be clouded and the audience will become frustrated. More sophisticated presenters use handheld remotes to control the basic navigation of slides. Even in this case, keyboard shortcuts can be an added benefit. For those…

  1. Bilateral key comparison SIM.T-K6.5 on humidity standards in the dew/frost-point temperature range from -30 °C to +20 °C

    NASA Astrophysics Data System (ADS)

    Meyer, C.; Solano, A.

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica) between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and LACOMET. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  2. Bilateral key comparison SIM.T-K6.2 on humidity standards in the dew/frost-point temperature range from -20 °c to 20 °c

    NASA Astrophysics Data System (ADS)

    Huang, P. H.; Meyer, C. W.; Martines-López, E.; Dávila Pacheco, J. A.; Méndez-Lango, E.

    2014-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Centro Nacional de Metrologia (CENAM, Mexico) between July 2008 and December 2008. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and CENAM and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and CENAM. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  3. Methods and considerations to determine sphere center from terrestrial laser scanner point cloud data

    NASA Astrophysics Data System (ADS)

    Rachakonda, Prem; Muralikrishnan, Bala; Cournoyer, Luc; Cheok, Geraldine; Lee, Vincent; Shilling, Meghan; Sawyer, Daniel

    2017-10-01

    The Dimensional Metrology Group at the National Institute of Standards and Technology is performing research to support the development of documentary standards within the ASTM E57 committee. This committee is addressing the point-to-point performance evaluation of a subclass of 3D imaging systems called terrestrial laser scanners (TLSs), which are laser-based and use a spherical coordinate system. This paper discusses the usage of sphere targets for this effort, and methods to minimize the errors due to the determination of their centers. The key contributions of this paper include methods to segment sphere data from a TLS point cloud, and the study of some of the factors that influence the determination of sphere centers.

  4. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  5. A Discussion of Oxygen Recovery Definitions and Key Performance Parameters for Closed-Loop Atmosphere Revitalization Life Support Technology Development

    NASA Technical Reports Server (NTRS)

    Abney, Morgan B.; Perry, Jay L.

    2016-01-01

    Over the last 55 years, NASA has evolved life support for crewed space exploration vehicles from simple resupply during Project Mercury to the complex and highly integrated system of systems aboard the International Space Station. As NASA targets exploration destinations farther from low Earth orbit and mission durations of 500 to 1000 days, life support systems must evolve to meet new requirements. In addition to having more robust, reliable, and maintainable hardware, limiting resupply becomes critical for managing mission logistics and cost. Supplying a crew with the basics of food, water, and oxygen become more challenging as the destination ventures further from Earth. Aboard ISS the Atmosphere Revitalization Subsystem (ARS) supplies the crew's oxygen demand by electrolyzing water. This approach makes water a primary logistics commodity that must be managed carefully. Chemical reduction of metabolic carbon dioxide (CO2) provides a method of recycling oxygen thereby reducing the net ARS water demand and therefore minimizing logistics needs. Multiple methods have been proposed to achieve this recovery and have been reported in the literature. However, depending on the architecture and the technology approach, "oxygen recovery" can be defined in various ways. This discontinuity makes it difficult to compare technologies directly. In an effort to clarify community discussions of Oxygen Recovery, we propose specific definitions and describe the methodology used to arrive at those definitions. Additionally, we discuss key performance parameters for Oxygen Recovery technology development including challenges with comparisons to state-of-the-art.

  6. An exergame system based on force platforms and body key-point detection for balance training.

    PubMed

    Lavarda, Marcos D; de Borba, Pedro A; Oliveira, Matheus R; Borba, Gustavo B; de Souza, Mauren A; Gamba, Humberto R

    2016-08-01

    Postural instability affects a large number of people and can compromise even simple activities of the daily routine. Therapies for balance training can strongly benefit from auxiliary devices specially designed for this purpose. In this paper, we present a system for balance training that uses the metaphor of a game, what contributes to the motivation and engagement of the patients during a treatment. Such approach is usually named exergame, in which input devices for posturographic assessment and a visual output perform the interaction with the subject. The proposed system uses two force platforms, one positioned under the feet and the other under the hip of the subject. The force platforms employ regular load cells and a microcontroller-based signal acquisition module to capture and transmit the samples to a computer. Moreover, a computer vision module performs body key-point detection, based on real time segmentation of markers attached to the subject. For the validation of the system, we conducted experiments with 20 neurologically intact volunteers during two tests: comparison of the stabilometric parameters obtained from the system with those obtained from a commercial baropodometer and the practice of several exergames. Results show that the proposed system is completely functional and can be used as a versatile tool for balance training.

  7. BILATERAL KEY COMPARISON SIM.T-K6.1 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM -25 °C TO +20 °C.

    PubMed

    Meyer, C W; Hill, K D

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April, 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC.

  8. Bilateral key comparison SIM.T-K6.1 on humidity standards in the dew/frost-point temperature range from -25 °C to +20 °C

    NASA Astrophysics Data System (ADS)

    Meyer, C. W.; Hill, K. D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC. This paper is the final report of the comparison including analysis of the uncertainty of measurement results. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT WG-KC, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  9. Pointing to others: How the target gender influences pointing performance.

    PubMed

    Cleret de Langavant, Laurent; Jacquemot, Charlotte; Cruveiller, Virginie; Dupoux, Emmanuel; Bachoud-Lévi, Anne-Catherine

    2016-01-01

    Pointing is a communicative gesture that allows individuals to share information about surrounding objects with other humans. Patients with heterotopagnosia are specifically impaired in pointing to other humans' body parts but not in pointing to themselves or to objects. Here, we describe a female patient with heterotopagnosia who was more accurate in pointing to men's body parts than to women's body parts. We replicated this gender effect in healthy participants with faster reaction times for pointing to men's body parts than to women's body parts. We discuss the role of gender stereotypes in explaining why it is more difficult to point to women than to men.

  10. Key Nutrients.

    ERIC Educational Resources Information Center

    Federal Extension Service (USDA), Washington, DC.

    Lessons written to help trainer agents prepare aides for work with families in the Food and Nutrition Program are presented in this booklet. The key nutrients discussed in the 10 lessons are protein, carbohydrates, fat, calcium, iron, iodine, and Vitamins A, B, C, and D. the format of each lesson is as follows: Purpose, Presentation, Application…

  11. Final report: Bilateral key comparison SIM.T-K6.3 on humidity standards in the dew/frost-point temperature range from -30°C to 20°C

    NASA Astrophysics Data System (ADS)

    Huang, Peter; Meyer, Christopher; Brionizio, Julio D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Instituto Nacional de Metrologia, Qualidade e Tecnologia (INMETRO, Brazil) between October 2009 and March 2010. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and INMETRO and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and INMETRO. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  12. New drugs and patient-centred end-points in old age: setting the wheels in motion.

    PubMed

    Mangoni, Arduino A; Pilotto, Alberto

    2016-01-01

    Older patients with various degrees of frailty and disability, a key population target of pharmacological interventions in acute and chronic disease states, are virtually neglected in pre-marketing studies assessing the efficacy and safety of investigational drugs. Moreover, aggressively pursuing established therapeutic targets in old age, e.g. blood pressure, serum glucose or cholesterol concentrations, is not necessarily associated with the beneficial effects, and the acceptable safety, reported in younger patient cohorts. Measures of self-reported health and functional status might represent additional, more meaningful, therapeutic end-points in the older population, particularly in patients with significant frailty and relatively short life expectancy, e.g. in the presence of cancer and/or neurodegenerative disease conditions. Strategies enhancing early knowledge about key pharmacological characteristics of investigational drugs targeting older adults are discussed, together with the rationale for incorporating non-traditional, patient-centred, end-points in this ever-increasing group.

  13. BILATERAL KEY COMPARISON SIM.T-K6.1 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM −25 °C TO +20 °C

    PubMed Central

    Meyer, C.W.; Hill, K.D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April, 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC. PMID:26663952

  14. Employee Spotlight: Baris Key

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Key, Baris

    2014-05-29

    Baris Key, an employee at Argonne National Laboratory, discusses the importance of national lab researchers and how they merge basic science, analyze and process in a way that the industry can benefit from.

  15. Employee Spotlight: Baris Key

    ScienceCinema

    Key, Baris

    2018-04-16

    Baris Key, an employee at Argonne National Laboratory, discusses the importance of national lab researchers and how they merge basic science, analyze and process in a way that the industry can benefit from.

  16. Entropy driven key-lock assembly.

    PubMed

    Odriozola, G; Jiménez-Angeles, F; Lozada-Cassou, M

    2008-09-21

    The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism: There exists trajectories through which the key-lock pair could assemble avoiding trespassing potential barriers. Hence, solely the entropic contribution can induce their self-assembling even in the absence of attractive forces. This study points out the solvent contribution within the underlying mechanisms of substrate-protein assemblydisassembly processes, which are important steps of the enzyme catalysis and protein mediated transport.

  17. Entropy driven key-lock assembly

    NASA Astrophysics Data System (ADS)

    Odriozola, G.; Jiménez-Ángeles, F.; Lozada-Cassou, M.

    2008-09-01

    The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism: There exists trajectories through which the key-lock pair could assemble avoiding trespassing potential barriers. Hence, solely the entropic contribution can induce their self-assembling even in the absence of attractive forces. This study points out the solvent contribution within the underlying mechanisms of substrate-protein assembly/disassembly processes, which are important steps of the enzyme catalysis and protein mediated transport.

  18. Feasibility of satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.

    2009-04-01

    In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).

  19. Quasisaddles as relevant points of the potential energy surface in the dynamics of supercooled liquids

    NASA Astrophysics Data System (ADS)

    Angelani, L.; Di Leonardo, R.; Ruocco, G.; Scala, A.; Sciortino, F.

    2002-06-01

    The supercooled dynamics of a Lennard-Jones model liquid is numerically investigated studying relevant points of the potential energy surface, i.e., the minima of the square gradient of total potential energy V. The main findings are (i) the number of negative curvatures n of these sampled points appears to extrapolate to zero at the mode coupling critical temperature Tc; (ii) the temperature behavior of n(T) has a close relationship with the temperature behavior of the diffusivity; (iii) the potential energy landscape shows a high regularity in the distances among the relevant points and in their energy location. Finally we discuss a model of the landscape, previously introduced by Madan and Keyes [J. Chem. Phys. 98, 3342 (1993)], able to reproduce the previous findings.

  20. The registration of non-cooperative moving targets laser point cloud in different view point

    NASA Astrophysics Data System (ADS)

    Wang, Shuai; Sun, Huayan; Guo, Huichao

    2018-01-01

    Non-cooperative moving target multi-view cloud registration is the key technology of 3D reconstruction of laser threedimension imaging. The main problem is that the density changes greatly and noise exists under different acquisition conditions of point cloud. In this paper, firstly, the feature descriptor is used to find the most similar point cloud, and then based on the registration algorithm of region segmentation, the geometric structure of the point is extracted by the geometric similarity between point and point, The point cloud is divided into regions based on spectral clustering, feature descriptors are created for each region, searching to find the most similar regions in the most similar point of view cloud, and then aligning the pair of point clouds by aligning their minimum bounding boxes. Repeat the above steps again until registration of all point clouds is completed. Experiments show that this method is insensitive to the density of point clouds and performs well on the noise of laser three-dimension imaging.

  1. Comparison is key.

    PubMed

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  2. Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit

    NASA Astrophysics Data System (ADS)

    Chan, Chung

    2017-10-01

    The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated components for generating a common secret key. The objective is to maximize the achievable key rate as a function of the joint entropy of the compressed sources. Since the maximum achievable key rate captures the total amount of information mutual to the compressed sources, an optimal compression scheme essentially maximizes the multivariate mutual information per bit of randomness of the private sources, and can therefore be viewed more generally as a dimension reduction technique. Single-letter lower and upper bounds on the maximum achievable key rate are derived for the general source model, and an explicit polynomial-time computable formula is obtained for the pairwise independent network model. In particular, the converse results and the upper bounds are obtained from those of the related secret key agreement problem with rate-limited discussion. A precise duality is shown for the two-user case with one-way discussion, and such duality is extended to obtain the desired converse results in the multi-user case. In addition to posing new challenges in information processing and dimension reduction, the compressed secret key agreement problem helps shed new light on resolving the difficult problem of secret key agreement with rate-limited discussion, by offering a more structured achieving scheme and some simpler conjectures to prove.

  3. Education for Judgment: The Artistry of Discussion Leadership.

    ERIC Educational Resources Information Center

    Christensen, C. Roland, Ed.; And Others

    This book offers a collection of essays on teaching, written by teachers who, though they represent high school to professional school levels and diverse fields of interest, favor teaching by discussion. Part I introduces key principles in "Barriers and Gateways to Learning" (David A. Garvin) and "Premises and Practices of Discussion Teaching" (C.…

  4. Single Event Effects and Total Dose Testing of the Intersil ISL 70003SEH Integrated Point of Load Converter

    NASA Astrophysics Data System (ADS)

    van Vonno, N. W.; White, J. D.; Pearce, L. G.; Thomson, E. J.; Gill, J. S.; Mansilla, O. E.

    2014-08-01

    Single-event transient (SET) phenomena in power management applications has evolved into a key issue, particularly in point of load (POL) buck regulators, as the loads driven by these devices are sensitive to even short-term overvoltage conditions. We preface this paper by a discussion of earlier destructive and nondestructive SEE testing of Intersil integrated point of load regulators, with emphasis on SET phenomena and some of the lessons learned in this work. We then report recent results of SET and destructive SEE testing of the ISL70003SEH POL converter, together with a brief discussion of the part's electrical and radiation hardness specifications. We conclude with a brief overview of low and high dose rate total dose testing of the part.

  5. Barriers and decisions when answering clinical questions at the point of care: a grounded theory study.

    PubMed

    Cook, David A; Sorensen, Kristi J; Wilkinson, John M; Berger, Richard A

    2013-11-25

    Answering clinical questions affects patient-care decisions and is important to continuous professional development. The process of point-of-care learning is incompletely understood. To understand what barriers and enabling factors influence physician point-of-care learning and what decisions physicians face during this process. Focus groups with grounded theory analysis. Focus group discussions were transcribed and then analyzed using a constant comparative approach to identify barriers, enabling factors, and key decisions related to physician information-seeking activities. Academic medical center and outlying community sites. Purposive sample of 50 primary care and subspecialist internal medicine and family medicine physicians, interviewed in 11 focus groups. Insufficient time was the main barrier to point-of-care learning. Other barriers included the patient comorbidities and contexts, the volume of available information, not knowing which resource to search, doubt that the search would yield an answer, difficulty remembering questions for later study, and inconvenient access to computers. Key decisions were whether to search (reasons to search included infrequently seen conditions, practice updates, complex questions, and patient education), when to search (before, during, or after the clinical encounter), where to search (with the patient present or in a separate room), what type of resource to use (colleague or computer), what specific resource to use (influenced first by efficiency and second by credibility), and when to stop. Participants noted that key features of efficiency (completeness, brevity, and searchability) are often in conflict. Physicians perceive that insufficient time is the greatest barrier to point-of-care learning, and efficiency is the most important determinant in selecting an information source. Designing knowledge resources and systems to target key decisions may improve learning and patient care.

  6. BILATERAL KEY COMPARISON SIM.T-K6.5 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM -30 °C TO +20 °C.

    PubMed

    Meyer, C W; Solano, A

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures over the range -30 °C TO +20 °C was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica), between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining the degree of equivalence between the dew/frost-point standards of NIST and LACOMET.

  7. The SECOQC quantum key distribution network in Vienna

    NASA Astrophysics Data System (ADS)

    Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J. F.; Fasel, S.; Fossier, S.; Fürst, M.; Gautier, J.-D.; Gay, O.; Gisin, N.; Grangier, P.; Happe, A.; Hasani, Y.; Hentschel, M.; Hübel, H.; Humer, G.; Länger, T.; Legré, M.; Lieger, R.; Lodewyck, J.; Lorünser, T.; Lütkenhaus, N.; Marhold, A.; Matyus, T.; Maurhart, O.; Monat, L.; Nauerth, S.; Page, J.-B.; Poppe, A.; Querasser, E.; Ribordy, G.; Robyr, S.; Salvail, L.; Sharpe, A. W.; Shields, A. J.; Stucki, D.; Suda, M.; Tamas, C.; Themel, T.; Thew, R. T.; Thoma, Y.; Treiber, A.; Trinkler, P.; Tualle-Brouri, R.; Vannel, F.; Walenta, N.; Weier, H.; Weinfurter, H.; Wimberger, I.; Yuan, Z. L.; Zbinden, H.; Zeilinger, A.

    2009-07-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARCAustrian Research Centers GmbH—ARC is now operating under the new name AIT Austrian Institute of Technology GmbH following a restructuring initiative.), an entangled photons system by the University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Université Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic

  8. Field test of wavelength-saving quantum key distribution network.

    PubMed

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Zhang, Yang; Zhang, Tao; Li, Hong-Wei; Xu, Fang-Xing; Zhou, Zheng; Yang, Yang; Huang, Da-Jun; Zhang, Li-Jun; Li, Fang-Yi; Liu, Dong; Wang, Yong-Gang; Guo, Guang-Can; Han, Zheng-Fu

    2010-07-15

    We propose a wavelength-saving topology of a quantum key distribution (QKD) network based on passive optical elements, and we report on the field test of this network on commercial telecom optical fiber at the frequency of 20 MHz. In this network, five nodes are supported with two wavelengths, and every two nodes can share secure keys directly at the same time. We also characterized the insertion loss and cross talk effects on the point-to-point QKD system after introducing this QKD network.

  9. A Discussion of Future Time Perspective

    ERIC Educational Resources Information Center

    McInerney, Dennis M.

    2004-01-01

    A growing area of research in educational psychology is future time perspective and its relationship to desired educational outcomes. This article discusses and critiques five reviews of current research on future time perspective. Key questions addressed are when do individuals begin to articulate a future, how far into the future does this…

  10. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  11. KEY ITEMS OF INNOVATION MANAGEMENT IN THE PRIMARY HEALTHCARE CENTRES CASE STUDY: FINLAND.

    PubMed

    Aslani, Alireza; Zolfagharzadeh, Mohammad Mahdi; Naaranoja, Marja

    2015-09-01

    Trends such as aging populations, excess costs, rising public expectations, and progress in medical science and technologies point out the necessity of adaptation and development of innovation in the healthcare systems particularly in developed countries. The main objective of this article is to review diffusion of innovation in the healthcare sector. Different types of innovation, diffusion characteristics, and adoption mechanisms are the subjects that are discussed in the selected case study, Finland. Finally, the key items of innovation management in the Finnish health system are introduced. The results can be implemented in other countries as well.

  12. Teachers' Professional Practice Conducting Mathematical Discussions

    ERIC Educational Resources Information Center

    da Ponte, João Pedro; Quaresma, Marisa

    2016-01-01

    This paper seeks to identify actions that can be regarded as building elements of teachers' classroom practice in mathematical discussion and how these actions may be combined to provide fruitful learning opportunities for students. It stands on a framework that focuses on two key elements of teaching practice: the tasks that teachers propose to…

  13. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  14. Field test of classical symmetric encryption with continuous variables quantum key distribution.

    PubMed

    Jouguet, Paul; Kunz-Jacques, Sébastien; Debuisschert, Thierry; Fossier, Simon; Diamanti, Eleni; Alléaume, Romain; Tualle-Brouri, Rosa; Grangier, Philippe; Leverrier, Anthony; Pache, Philippe; Painchault, Philippe

    2012-06-18

    We report on the design and performance of a point-to-point classical symmetric encryption link with fast key renewal provided by a Continuous Variable Quantum Key Distribution (CVQKD) system. Our system was operational and able to encrypt point-to-point communications during more than six months, from the end of July 2010 until the beginning of February 2011. This field test was the first demonstration of the reliability of a CVQKD system over a long period of time in a server room environment. This strengthens the potential of CVQKD for information technology security infrastructure deployments.

  15. Key Stage 4 and GCSE: An Update from the Association's Key Stage 4 Working Group.

    ERIC Educational Resources Information Center

    Davies, Peter

    1991-01-01

    Examines plans and proposals for the "Key Stage 4" portion of the United Kingdom's General Certificate for Secondary Education (GCSE) program. Explains the development of a 10-point assessment scale and plans for combined subject courses. Argues that, although economics instruction should be encouraged, it should not be the sole emphasis…

  16. Induced CMB quadrupole from pointing offsets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moss, Adam; Scott, Douglas; Sigurdson, Kris, E-mail: adammoss@phas.ubc.ca, E-mail: dscott@phas.ubc.ca, E-mail: krs@phas.ubc.ca

    2011-01-01

    Recent claims in the literature have suggested that the WMAP quadrupole is not primordial in origin, and arises from an aliasing of the much larger dipole field because of incorrect satellite pointing. We attempt to reproduce this result and delineate the key physics leading to the effect. We find that, even if real, the induced quadrupole would be smaller than the WMAP value. We discuss reasons why the WMAP data are unlikely to suffer from this particular systematic effect, including the implications for observations of point sources. Given this evidence against the reality of the effect, the similarity between themore » pointing-offset-induced signal and the actual quadrupole then appears to be quite puzzling. However, we find that the effect arises from a convolution between the gradient of the dipole field and anisotropic coverage of the scan direction at each pixel. There is something of a directional conspiracy here — the dipole signal lies close to the Ecliptic Plane, and its direction, together with the WMAP scan strategy, results in a strong coupling to the Y{sub 2,−1} component in Ecliptic co-ordinates. The dominant strength of this component in the measured quadrupole suggests that one should exercise increased caution in interpreting its estimated amplitude. The Planck satellite has a different scan strategy which does not so directly couple the dipole and quadrupole in this way and will soon provide an independent measurement.« less

  17. BILATERAL KEY COMPARISON SIM.T-K6.5 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM −30 °C TO +20 °C

    PubMed Central

    Meyer, C.W.; Solano, A.

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures over the range −30 °C TO +20 °C was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica), between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining the degree of equivalence between the dew/frost-point standards of NIST and LACOMET. PMID:28066029

  18. Automatic markerless registration of point clouds with semantic-keypoint-based 4-points congruent sets

    NASA Astrophysics Data System (ADS)

    Ge, Xuming

    2017-08-01

    The coarse registration of point clouds from urban building scenes has become a key topic in applications of terrestrial laser scanning technology. Sampling-based algorithms in the random sample consensus (RANSAC) model have emerged as mainstream solutions to address coarse registration problems. In this paper, we propose a novel combined solution to automatically align two markerless point clouds from building scenes. Firstly, the method segments non-ground points from ground points. Secondly, the proposed method detects feature points from each cross section and then obtains semantic keypoints by connecting feature points with specific rules. Finally, the detected semantic keypoints from two point clouds act as inputs to a modified 4PCS algorithm. Examples are presented and the results compared with those of K-4PCS to demonstrate the main contributions of the proposed method, which are the extension of the original 4PCS to handle heavy datasets and the use of semantic keypoints to improve K-4PCS in relation to registration accuracy and computational efficiency.

  19. Key Competencies, Assessment and Learning Stories

    ERIC Educational Resources Information Center

    Davis, Keryn; Wright, Jocelyn; Carr, Margaret; Peters, Sally

    2013-01-01

    Developed in response to a strong interest in the use of Learning Stories in schools, this resource is designed to answer some common questions asked by teachers. The assessment of Key Competencies is a topic that deserves a lot of discussion. A Key Competency is complex: it includes social, emotional, cognitive and cultural aspects, and is…

  20. Discontinuities in University Student Experiences of Learning through Discussions

    ERIC Educational Resources Information Center

    Ellis, Robert A.; Calvo, Rafael A.

    2006-01-01

    This article reports on research into the student experience of learning through discussions in a third-year undergraduate engineering subject. Information engineering students studying e-commerce were required to engage in face-to-face and online discussions as a key aspect of their learning experience. This study investigates the quality of the…

  1. Field demonstration of a continuous-variable quantum key distribution network.

    PubMed

    Huang, Duan; Huang, Peng; Li, Huasheng; Wang, Tao; Zhou, Yingming; Zeng, Guihua

    2016-08-01

    We report on what we believe is the first field implementation of a continuous-variable quantum key distribution (CV-QKD) network with point-to-point configuration. Four QKD nodes are deployed on standard communication infrastructures connected with commercial telecom optical fiber. Reliable key exchange is achieved in the wavelength-division-multiplexing CV-QKD network. The impact of a complex and volatile field environment on the excess noise is investigated, since excess noise controlling and reduction is arguably the major issue pertaining to distance and the secure key rate. We confirm the applicability and verify the maturity of the CV-QKD network in a metropolitan area, thus paving the way for a next-generation global secure communication network.

  2. National GAP Conference 2007-Discussion Groups Report

    USGS Publications Warehouse

    Ratz, Joan M.; Lamb, Berton Lee

    2010-01-01

    We led two discussion groups during the 2007 National GAP Conference. These discussion groups provided information to help develop a survey of National Gap Analysis Program (GAP) data users. One group discussed technical issues, and the second group discussed the use of GAP data for decisionmaking. Themes emerging from the technical issues group included concerns about data quality, need for information on how to use data, and passive data distribution. The decisionmaking discussion included a wide range of topics including the need to understand presentation of information, the need to connect with and understand users of data, the revision of GAP's mission, and the adaptability of products and data. The decisionmaking group also raised concerns regarding technical issues. One conclusion is that a deep commitment to ongoing information transfer and support is a key component of success for the GAP program.

  3. A Probe into Key Points in the Planning and Design of Integrated Corridor at Large Civil Airports

    NASA Astrophysics Data System (ADS)

    Zhao, Qing

    2018-05-01

    If we compare an airport to our human body, all sorts of specialized pipelines and wires are to an airport as the vascular system and nervous system etc. to the human body, where each functional zone connecting the airport serves each major system of airport and provides “throughput like the function of driving out the processed for the new” and “central control and transmission function”. Guided by the master plan and the concept of progressive development of airports, it is critical to map out a plan to link near-term and long-term development of supporting utilities. The role and effect of integrated corridor is of significance to the construction of multi-runway large-sized new airports or to the expansion of an airport costing tens of billions. In view of the features of the fast growing civil aviation sector in China, this thesis argues for the necessity to plan for and build integrated corridor at large airports, suggests doing research on integrated corridor at the project consulting stage by drawing upon available airport design experiences and case studies and combining the plan for public utilities (or special plan), and analyzes and outlines key points in integrated corridor design based on special requirements and industrial standards for civil airport management.

  4. Reconceptualising Moderation in Asynchronous Online Discussions Using Grounded Theory

    ERIC Educational Resources Information Center

    Vlachopoulos, Panos; Cowan, John

    2010-01-01

    This article reports a grounded theory study of the moderation of asynchronous online discussions, to explore the processes by which tutors in higher education decide when and how to moderate. It aims to construct a theory of e-moderation based on some key factors which appear to influence e-moderation. It discusses previous research on the…

  5. Free Energy, Enthalpy and Entropy from Implicit Solvent End-Point Simulations.

    PubMed

    Fogolari, Federico; Corazza, Alessandra; Esposito, Gennaro

    2018-01-01

    Free energy is the key quantity to describe the thermodynamics of biological systems. In this perspective we consider the calculation of free energy, enthalpy and entropy from end-point molecular dynamics simulations. Since the enthalpy may be calculated as the ensemble average over equilibrated simulation snapshots the difficulties related to free energy calculation are ultimately related to the calculation of the entropy of the system and in particular of the solvent entropy. In the last two decades implicit solvent models have been used to circumvent the problem and to take into account solvent entropy implicitly in the solvation terms. More recently outstanding advancement in both implicit solvent models and in entropy calculations are making the goal of free energy estimation from end-point simulations more feasible than ever before. We review briefly the basic theory and discuss the advancements in light of practical applications.

  6. Floating point arithmetic in future supercomputers

    NASA Technical Reports Server (NTRS)

    Bailey, David H.; Barton, John T.; Simon, Horst D.; Fouts, Martin J.

    1989-01-01

    Considerations in the floating-point design of a supercomputer are discussed. Particular attention is given to word size, hardware support for extended precision, format, and accuracy characteristics. These issues are discussed from the perspective of the Numerical Aerodynamic Simulation Systems Division at NASA Ames. The features believed to be most important for a future supercomputer floating-point design include: (1) a 64-bit IEEE floating-point format with 11 exponent bits, 52 mantissa bits, and one sign bit and (2) hardware support for reasonably fast double-precision arithmetic.

  7. PowerPoint Workshop for Teachers[TM].

    ERIC Educational Resources Information Center

    Caughlin, Janet

    This guide for teachers to the Microsoft PowerPoint multimedia presentation program begins with a section that introduces what PowerPoint is and why teachers should use it, Windows 95/98 basics, Macintosh basics, getting started, PowerPoint toolbars, and presentation tips. The next section discusses learning PowerPoint, including creating a…

  8. The quiet revolution: continuous glider monitoring at ocean 'choke' points as a key component of new cross-platform ocean observation systems

    NASA Astrophysics Data System (ADS)

    Heslop, E. E.; Tintore, J.; Ruiz, S.; Allen, J.; López-Jurado, J. L.

    2014-12-01

    A quiet revolution is taking place in ocean observations; in the last decade new multi-platform, integrated ocean observatories have been progressively implemented by forward looking countries with ocean borders of economic and strategic importance. These systems are designed to fill significant gaps in our knowledge of the ocean state and ocean variability, through long-term, science and society-led, ocean monitoring. These ocean observatories are now delivering results, not the headline results of a single issue experiment, but carefully and systematically improving our knowledge of ocean variability, and thereby, increasing model forecast skill and our ability to link physical processes to ecosystem response. Here we present the results from a 3-year quasi-continuous glider monitoring of a key circulation 'choke' point in the Western Mediterranean, undertaken by SOCIB (Balearic Islands Coastal Ocean Observing and Forecasting System). For the first time data from the high frequency glider sampling show variations in the transport volumes of water over timescales of days to weeks, as large as those previously only identifiable as seasonal or eddy driven. Although previous surveys noted high cruise-to-cruise variability, they were insufficient to show that in fact water volumes exchanged through this narrow 'choke' point fluctuate on 'weather' timescales. Using the glider data to leverage an 18-year record of ship missions, we define new seasonal cycles for the exchange of watermasses, challenging generally held assumptions. The pattern of the exchange is further simplified through the characterisation of 5 circulation modes and the defining of a new seasonal cycle for the interplay between mesoscale and basin scale dynamics. Restricted 'choke points' between our ocean basins are critical locations to monitor water transport variability, as they constrain the inter-basin exchange of heat, salt and nutrients. At the Ibiza Channel 'choke' point, the exchange of

  9. Analysis of counterfactual quantum key distribution using error-correcting theory

    NASA Astrophysics Data System (ADS)

    Li, Yan-Bing

    2014-10-01

    Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.

  10. [The key points of prevention for special surgical complications after radical operation of gastric cancer].

    PubMed

    Xu, Hao; Wang, Weizhi; Li, Panyuan; Zhang, Diancai; Yang, Li; Xu, Zekuan

    2017-02-25

    Incidence of gastric cancer is high in China and standard radical operation is currently the main treatment for gastric cancer. Postoperative complications, especially some special complications, can directly affect the prognosis of patients, even result in the increase of mortality. But the incidences of these special complications are low, so these complications are often misdiagnosed and delayed in treatment owing to insufficient recognition of medical staff. These special complications include (1) Peterson hernia: It is an abdominal hernia developed in the space between Roux loop and transverse colon mesentery after Roux-Y reconstruction of digestive tract. Peterson hernia is rare and can quickly result in gangrenous ileus. Because of low incidence and without specific clinical symptoms, this hernia does not attract enough attention in clinical practice, so the outcome will be very serious. Once the diagnosis is made, an emergent operation must be performed immediately. Peterson space should be closed routinely in order to avoid the development of hernia. (2) Lymphatic leakage: It is also called chyle leakage. Cisterna chylus is formed by gradual concentration of extensive lymphatic net to diaphragm angle within abdominal cavity. Lymphadenectomy during operation may easily damage lymphatic net and result in leakage. The use of ultrasonic scalpel can decrease the risk of lymphatic leakage in certain degree. If lymphatic leakage is found during operation, transfixion should be performed in time. Treatment includes total parenteral nutrition, maintenance of internal environment, supplement of protein, and observation by clamp as an attempt. (3)Duodenal stump leakage: It is one of serious complications affecting the recovery and leading to death after subtotal gastrectomy. Correct management of duodenal stump during operation is one of key points of the prevention of duodenal stump leakage. Routine purse embedding of duodenal stump is recommend during operation

  11. Human action recognition based on spatial-temporal descriptors using key poses

    NASA Astrophysics Data System (ADS)

    Hu, Shuo; Chen, Yuxin; Wang, Huaibao; Zuo, Yaqing

    2014-11-01

    Human action recognition is an important area of pattern recognition today due to its direct application and need in various occasions like surveillance and virtual reality. In this paper, a simple and effective human action recognition method is presented based on the key poses of human silhouette and the spatio-temporal feature. Firstly, the contour points of human silhouette have been gotten, and the key poses are learned by means of K-means clustering based on the Euclidean distance between each contour point and the centre point of the human silhouette, and then the type of each action is labeled for further match. Secondly, we obtain the trajectories of centre point of each frame, and create a spatio-temporal feature value represented by W to describe the motion direction and speed of each action. The value W contains the information of location and temporal order of each point on the trajectories. Finally, the matching stage is performed by comparing the key poses and W between training sequences and test sequences, the nearest neighbor sequences is found and its label supplied the final result. Experiments on the public available Weizmann datasets show the proposed method can improve accuracy by distinguishing amphibious poses and increase suitability for real-time applications by reducing the computational cost.

  12. Point-of-care testing: applications of 3D printing.

    PubMed

    Chan, Ho Nam; Tan, Ming Jun Andrew; Wu, Hongkai

    2017-08-08

    Point-of-care testing (POCT) devices fulfil a critical need in the modern healthcare ecosystem, enabling the decentralized delivery of imperative clinical strategies in both developed and developing worlds. To achieve diagnostic utility and clinical impact, POCT technologies are immensely dependent on effective translation from academic laboratories out to real-world deployment. However, the current research and development pipeline is highly bottlenecked owing to multiple restraints in material, cost, and complexity of conventionally available fabrication techniques. Recently, 3D printing technology has emerged as a revolutionary, industry-compatible method enabling cost-effective, facile, and rapid manufacturing of objects. This has allowed iterative design-build-test cycles of various things, from microfluidic chips to smartphone interfaces, that are geared towards point-of-care applications. In this review, we focus on highlighting recent works that exploit 3D printing in developing POCT devices, underscoring its utility in all analytical steps. Moreover, we also discuss key advantages of adopting 3D printing in the device development pipeline and identify promising opportunities in 3D printing technology that can benefit global health applications.

  13. Corruptness in Education: A Tentative Discussion

    ERIC Educational Resources Information Center

    Dongping, Yang

    2004-01-01

    With more and more instances of corruptness coming to light in the field of education, corruptness in education has become an intense "hot point" of concern in society. This article is a tentative exploration into this matter. In this article, the author discusses the categories of the corruptness in education that has found widespread…

  14. Progress in the development of paper-based diagnostics for low-resource point-of-care settings

    PubMed Central

    Byrnes, Samantha; Thiessen, Gregory; Fu, Elain

    2014-01-01

    This Review focuses on recent work in the field of paper microfluidics that specifically addresses the goal of translating the multistep processes that are characteristic of gold-standard laboratory tests to low-resource point-of-care settings. A major challenge is to implement multistep processes with the robust fluid control required to achieve the necessary sensitivity and specificity of a given application in a user-friendly package that minimizes equipment. We review key work in the areas of fluidic controls for automation in paper-based devices, readout methods that minimize dedicated equipment, and power and heating methods that are compatible with low-resource point-of-care settings. We also highlight a focused set of recent applications and discuss future challenges. PMID:24256361

  15. The Francis Scott Key School, Locust Point, Baltimore, Maryland. Bulletin, 1920, No. 41

    ERIC Educational Resources Information Center

    Bennett, Charles A.

    1921-01-01

    Some time ago the Commissioner of Education was requested to offer advice in regard to the reorganization of the Francis Scott Key School, to meet more effectively the needs of its children and the adult population of that section, and to suggest plans for a building to be so constructed as to adapt it to the use of the school so reorganized. In…

  16. Genetic interaction analysis of point mutations enables interrogation of gene function at a residue-level resolution

    PubMed Central

    Braberg, Hannes; Moehle, Erica A.; Shales, Michael; Guthrie, Christine; Krogan, Nevan J.

    2014-01-01

    We have achieved a residue-level resolution of genetic interaction mapping – a technique that measures how the function of one gene is affected by the alteration of a second gene – by analyzing point mutations. Here, we describe how to interpret point mutant genetic interactions, and outline key applications for the approach, including interrogation of protein interaction interfaces and active sites, and examination of post-translational modifications. Genetic interaction analysis has proven effective for characterizing cellular processes; however, to date, systematic high-throughput genetic interaction screens have relied on gene deletions or knockdowns, which limits the resolution of gene function analysis and poses problems for multifunctional genes. Our point mutant approach addresses these issues, and further provides a tool for in vivo structure-function analysis that complements traditional biophysical methods. We also discuss the potential for genetic interaction mapping of point mutations in human cells and its application to personalized medicine. PMID:24842270

  17. Anatomy of point-contact Andreev reflection spectroscopy from the experimental point of view

    NASA Astrophysics Data System (ADS)

    Naidyuk, Yu. G.; Gloos, K.

    2018-04-01

    We review applications of point-contact Andreev-reflection spectroscopy to study elemental superconductors, where theoretical conditions for the smallness of the point-contact size with respect to the characteristic lengths in the superconductor can be satisfied. We discuss existing theoretical models and identify new issues that have to be solved, especially when applying this method to investigate more complex superconductors. We will also demonstrate that some aspects of point-contact Andreev-reflection spectroscopy still need to be addressed even when investigating ordinary metals.

  18. Musicking, embodiment and participatory enaction of music: outline and key points

    NASA Astrophysics Data System (ADS)

    Loaiza, Juan M.

    2016-10-01

    This paper proposes a way of understanding the confluence of the enactive approach to cognition and musicology in a wider sense. The implication is that existing socio-cultural approaches to meaning in music - whereby music is seen as a total social phenomenon, and the naturalistic view of music cognition may be articulated via the life-mind continuum proposed by enactivism. On the one hand, discussions on embodied music cognition are presented with the opportunity to overcome their de facto individualism in a principled, naturalistic way. On the other hand, for the socio-cultural-historical approaches the opportunity seems to be to move beyond the biology-culture divide without submitting to reductionism. A wider explanatory unit is presented. The explanatory utility of embodiment is examined in relation to the wider frame of social-life in dialectical fashion. A definition of musicking is sketched considering it as an instance of processes of social-life. This paper signals a direction to take, yet methodologies, results, and homologies with other disciplines are left open to further discussion.

  19. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  20. Quantitative structure-property relationships for prediction of boiling point, vapor pressure, and melting point.

    PubMed

    Dearden, John C

    2003-08-01

    Boiling point, vapor pressure, and melting point are important physicochemical properties in the modeling of the distribution and fate of chemicals in the environment. However, such data often are not available, and therefore must be estimated. Over the years, many attempts have been made to calculate boiling points, vapor pressures, and melting points by using quantitative structure-property relationships, and this review examines and discusses the work published in this area, and concentrates particularly on recent studies. A number of software programs are commercially available for the calculation of boiling point, vapor pressure, and melting point, and these have been tested for their predictive ability with a test set of 100 organic chemicals.

  1. The Analysis and Discussion in the Effective Application of the Dispatcher Training Based on Case Teaching Method with the Cause from the Action of the Gap Protection of Main Transformer

    NASA Astrophysics Data System (ADS)

    Yuanyuan, Xu; Zhengmao, Zhang; Xiang, Fang; Yuanshuai, Xu; Xinxin, Song

    2018-03-01

    The combination of theory and practice is a difficult problem on dispatcher training. Through a typical example of case, this paper provides an effective case teaching method for dispatcher training, and combines the theoretical discussion of the rule of experience with cases and achieves vividness. It helps students to understand and catch the key points of the theory, and improve their practical skills.

  2. Preoperative Surgical Discussion and Information Retention by Patients.

    PubMed

    Feiner, David E; Rayan, Ghazi M

    2016-10-01

    To assess how much information communicated to patients is understood and retained after preoperative discussion of upper extremity procedures. A prospective study was designed by recruiting patients prior to undergoing upper extremity surgical procedures after a detailed discussion of their operative technique, postoperative care and treatment outcomes. Patients were given the same 20-item questionnaire to fill out twice, at two pre operative visits. An independent evaluator filled out a third questionnaire as a control. Various discussion points of the survey were compared among the 3 questionnaires and retained information and perceived comprehension were evaluated. The average patients' age was 50.3 (27-75) years The average time between the two surveys preoperative 1 and preoperative 2 was 40.7 (7-75) days,. The average patient had approximately 2 years of college or an associate's degree. Patients initially retained 73% (52-90%) of discussion points presented during preoperative 1 and 61% (36-85%) of the information at preoperative 2 p = .002. 50% of patients felt they understood 100% of the discussion, this dropped to only 10% at their preoperative 2 visit. 15% of our patients did not know what type of anesthesia they were having at preoperative 2. A communication barrier between patients and physicians exists when patients are informed about their preoperative surgical discussion. The retention of information presented is worsened with elapsing time from the initial preoperative discussion to the second preoperative visit immediately prior to surgery. Methods to enhance patients' retention of information prior to surgery must be sought and implemented which will improve patients' treatment outcome.

  3. [Computer mediated discussion and attitude polarization].

    PubMed

    Shiraishi, Takashi; Endo, Kimihisa; Yoshida, Fujio

    2002-10-01

    This study examined the hypothesis that computer mediated discussions lead to more extreme decisions than face-to-face (FTF) meeting. Kiesler, Siegel, & McGuire (1984) claimed that computer mediated communication (CMC) tended to be relatively uninhibited, as seen in 'flaming', and that group decisions under CMC using Choice Dilemma Questionnaire tended to be more extreme and riskier than FTF meetings. However, for the same reason, CMC discussions on controversial social issues for which participants initially hold strongly opposing views, might be less likely to reach a consensus, and no polarization should occur. Fifteen 4-member groups discussed a controversial social issue under one of three conditions: FTF, CMC, and partition. After discussion, participants rated their position as a group on a 9-point bipolar scale ranging from strong disagreement to strong agreement. A stronger polarization effect was observed for FTF groups than those where members were separated with partitions. However, no extreme shift from their original, individual positions was found for CMC participants. There results were discussed in terms of 'expertise and status equalization' and 'absence of social context cues' under CMC.

  4. Point-to-point sub-orbital space tourism: Some initial considerations

    NASA Astrophysics Data System (ADS)

    Webber, Derek

    2010-06-01

    Several public statements have been made about the possible, or even likely, extension of initial sub-orbital space tourism operations to encompass point-to-point travel. It is the purpose of this paper to explore some of the basic considerations for such a plan, in order to understand both its merits and its problems. The paper will discuss a range of perspectives, from basic physics to market segmentation, from ground segment logistics to spacecraft design considerations. It is important that these initial considerations are grasped before more detailed planning and design takes place.

  5. Point Defects in Oxides: Tailoring Materials Through Defect Engineering

    NASA Astrophysics Data System (ADS)

    Tuller, Harry L.; Bishop, Sean R.

    2011-08-01

    Optimization of electrical, optical, mechanical, and other properties of many advanced, functional materials today relies on precise control of point defects. This article illustrates the progress that has been made in elucidating the often complex equilibria exhibited by many materials by examining two recently well-characterized model systems, TlBr for radiation detection and PrxCe1-xO2-δ, of potential interest in solid-oxide fuel cells. The interplay between material composition, electrical conductivity, and mechanical properties (electrochemomechanics) is discussed, and implications in these relations, for example, enhancing electrical properties through large mechanical strains, are described. The impact of space charge and strain fields at interfaces, particularly important in nanostructure materials, is also emphasized. Key experimental techniques useful in characterizing bulk and surface defects are summarized and reviewed.

  6. Pointing control for the International Comet Mission

    NASA Technical Reports Server (NTRS)

    Leblanc, D. R.; Schumacher, L. L.

    1980-01-01

    The design of the pointing control system for the proposed International Comet Mission, intended to fly by Comet Halley and rendezvous with Comet Tempel-2 is presented. Following a review of mission objectives and the spacecraft configuration, design constraints on the pointing control system controlling the two-axis gimballed scan platform supporting the science instruments are discussed in relation to the scientific requirements of the mission. The primary design options considered for the pointing control system design for the baseline spacecraft are summarized, and the design selected, which employs a target-referenced, inertially stabilized control system, is described in detail. The four basic modes of operation of the pointing control subsystem (target acquisition, inertial hold, target track and slew) are discussed as they relate to operations at Halley and Tempel-2. It is pointed that the pointing control system design represents a significant advance in the state of the art of pointing controls for planetary missions.

  7. Resolving key drivers of variability through an important circulation choke point in the western Mediterranean Sea; using gliders, models & satellite remote sensing

    NASA Astrophysics Data System (ADS)

    Heslop, Emma; Aguiar, Eva; Mourre, Baptiste; Juza, Mélanie; Escudier, Romain; Tintoré, Joaquín

    2017-04-01

    The Ibiza Channel plays an important role in the circulation of the Western Mediterranean Sea, it governs the north/south exchange of different water masses that are known to affect regional ecosystems and is influenced by variability in the different drivers that affect sub-basins to the north (N) and south (S). A complex system. In this study we use a multi-platform approach to resolve the key drivers of this variability, and gain insight into the inter-connection between the N and S of the Western Mediterranean Sea through this choke point. The 6-year glider time series from the quasi-continuous glider endurance line monitoring of the Ibiza Channel, undertaken by SOCIB (Balearic Coastal Ocean observing and Forecasting System), is used as the base from which to identify key sub-seasonal to inter-annual patterns and shifts in water mass properties and transport volumes. The glider data indicates the following key components in the variability of the N/S flow of different water mass through the channel; regional winter mode water production, change in intermediate water mass properties, northward flows of a fresher water mass and the basin-scale circulation. To resolve the drivers of these components of variability, the strength of combining datasets from different sources, glider, modeling, altimetry and moorings, is harnessed. To the north atmospheric forcing in the Gulf of Lions is a dominant driver, while to the south the mesoscale circulation patterns of the Atlantic Jet and Alboran gyres dominate the variability but do not appear to influence the fresher inflows. Evidence of a connection between the northern and southern sub-basins is however indicated. The study highlights importance of sub-seasonal variability and the scale of rapid change possible in the Mediterranean, as well as the benefits of leveraging high resolution glider datasets within a multi-platform and modelling study.

  8. Key recovery factors for the August 24, 2014, South Napa Earthquake

    USGS Publications Warehouse

    Hudnut, Kenneth W.; Brocher, Thomas M.; Prentice, Carol S.; Boatwright, John; Brooks, Benjamin A.; Aagaard, Brad T.; Blair, James Luke; Fletcher, Jon Peter B.; Erdem, Jemile; Wicks, Chuck; Murray, Jessica R.; Pollitz, Fred F.; Langbein, John O.; Svarc, Jerry L.; Schwartz, David P.; Ponti, Daniel J.; Hecker, Suzanne; DeLong, Stephen B.; Rosa, Carla M.; Jones, Brenda; Lamb, Rynn M.; Rosinski, Anne M.; McCrink, Timothy P.; Dawson, Timothy E.; Seitz, Gordon G.; Glennie, Craig; Hauser, Darren; Ericksen, Todd; Mardock, Dan; Hoirup, Don F.; Bray, Jonathan D.; Rubin, Ron S.

    2014-01-01

    Through discussions between the Federal Emergency Management Agency (FEMA) and the U.S. Geological Survey (USGS) following the South Napa earthquake, it was determined that several key decision points would be faced by FEMA for which additional information should be sought and provided by USGS and its partners. This report addresses the four tasks that were agreed to. These tasks are (1) assessment of ongoing fault movement (called afterslip) especially in the Browns Valley residential neighborhood, (2) assessment of the shaking pattern in the downtown area of the City of Napa, (3) improvement of information on the fault hazards posed by the West Napa Fault System (record of past earthquakes and slip rate, for example), and (4) imagery acquisition and data processing to provide overall geospatial information support to FEMA.

  9. Continental Drift: A Discussion Strategy for Secondary School

    ERIC Educational Resources Information Center

    Paixao, Isabel; Calado, Silvia; Ferreira, Silvia; Salves, Vanda; Smorais, Ana M.

    2004-01-01

    The paper describes a discussion strategy for secondary school students. The strategy focus the various dimensions of Science, especially the internal sociological and philosophical dimensions. Students are expected to learn more about Science, namely the role of controversy for scientific progress. The article contains key questions for the…

  10. Mesoscale Circulation Variability from Five years of Quasi-continuous Glider Observations and Numerical Simulation at a Key Sub-basin 'Choke' Point.

    NASA Astrophysics Data System (ADS)

    Heslop, E. E.; Mourre, B.; Juza, M.; Troupin, C.; Escudier, R.; Torner, M.; Tintore, J.

    2016-02-01

    Quasi-continuous glider observations over 5 years have uniquely characterised a high frequency variability in the circulation through the Ibiza Channel, an important `choke' point in the Western Mediterranean Sea. This `choke' point governs the basin/sub-basin scale circulation and the north/south exchanges of different water masses. The resulting multi-scale variability impacts the regional shelf and open ocean ecosystems, including the spawning grounds of Atlantic bluefin tuna. Through the unique glider record we show the relevance of the weekly/mesoscale variability, which is of same order as the previously established seasonal and inter-annual variability. To understand the drivers of this variability we combine the glider data with numerical simulations (WMOP) and altimetry. Two key drivers are identified; extreme winter events, which cause the formation of a cold winter mode water (Winter Intermediate Water) in the shelf areas to the north of the Ibiza Channel, and mesoscale activity, which to the north produce channel `blocking' eddies and to the south intermittent and vigorous flows of fresher `Atlantic' waters through the Ibiza Channel. Results from the 2 km resolution WMOP are compared with the high-resolution (2 - 3 km.) glider data, giving insight into model validation across different scales, for both circulation and water masses. There is an emerging consensus that gliders can uniquely access critical time and length scales and in this study gliders complement existing satellite measurements and models, while opening up new capabilities for multidisciplinary, autonomous and high-resolution ocean observation.

  11. Teaching Strategies in Online Discussion Board: A Framework in Higher Education

    ERIC Educational Resources Information Center

    Chou, Pao-Nan

    2012-01-01

    In order to promote meaningful learning in the online discussion board, this study attempted to identify key factors that affect the online discussion by a literature review and propose an innovative instructional framework to deal with those factors. Through the literature review, five factors were identified. An innovative instructional…

  12. Small group discussion: Students perspectives.

    PubMed

    Annamalai, Nachal; Manivel, Rajajeyakumar; Palanisamy, Rajendran

    2015-08-01

    Various alternative methods are being used in many medical colleges to reinforce didactic lectures in physiology. Small group teaching can take on a variety of different tasks such as problem-solving, role play, discussions, brainstorming, and debate. Research has demonstrated that group discussion promotes greater synthesis and retention of materials. The aims of this study were to adopt a problem-solving approach by relating basic sciences with the clinical scenario through self-learning. To develop soft skills, to understand principles of group dynamics, and adopt a new teaching learning methodology. Experimental study design was conducted in Phase I 1(st) year medical students of 2014-2015 batch (n = 120). On the day of the session, the students were grouped into small groups (15 each). The session started with the facilitator starting off the discussion. Feedback forms from five students in each group was taken (n = 40). A five point Likert scale was used ranging from strongly agree to strongly disagree. Data were analyzed using IBM SPSS Statistics for Windows, Version 21.0. Armonk, NY: IBM Corp. Our results show that 70% of the students opined that small group discussion were interactive, friendly, innovative, built interaction between teacher and student. Small group discussion increased their thought process and helped them in better communication. The small group discussion was interactive, friendly, and bridged the gap between the teacher and student. The student's communication skills are also improved. In conclusion, small group discussion is more effective than the traditional teaching methods.

  13. Naïve Point Estimation

    ERIC Educational Resources Information Center

    Lindskog, Marcus; Winman, Anders; Juslin, Peter

    2013-01-01

    The capacity of short-term memory is a key constraint when people make online judgments requiring them to rely on samples retrieved from memory (e.g., Dougherty & Hunter, 2003). In this article, the authors compare 2 accounts of how people use knowledge of statistical distributions to make point estimates: either by retrieving precomputed…

  14. Octopuses use a human-like strategy to control precise point-to-point arm movements.

    PubMed

    Sumbre, Germán; Fiorito, Graziano; Flash, Tamar; Hochner, Binyamin

    2006-04-18

    One of the key problems in motor control is mastering or reducing the number of degrees of freedom (DOFs) through coordination. This problem is especially prominent with hyper-redundant limbs such as the extremely flexible arm of the octopus. Several strategies for simplifying these control problems have been suggested for human point-to-point arm movements. Despite the evolutionary gap and morphological differences, humans and octopuses evolved similar strategies when fetching food to the mouth. To achieve this precise point-to-point-task, octopus arms generate a quasi-articulated structure based on three dynamic joints. A rotational movement around these joints brings the object to the mouth . Here, we describe a peripheral neural mechanism-two waves of muscle activation propagate toward each other, and their collision point sets the medial-joint location. This is a remarkably simple mechanism for adjusting the length of the segments according to where the object is grasped. Furthermore, similar to certain human arm movements, kinematic invariants were observed at the joint level rather than at the end-effector level, suggesting intrinsic control coordination. The evolutionary convergence to similar geometrical and kinematic features suggests that a kinematically constrained articulated limb controlled at the level of joint space is the optimal solution for precise point-to-point movements.

  15. Genomic cloud computing: legal and ethical points to consider

    PubMed Central

    Dove, Edward S; Joly, Yann; Tassé, Anne-Marie; Burton, Paul; Chisholm, Rex; Fortier, Isabel; Goodwin, Pat; Harris, Jennifer; Hveem, Kristian; Kaye, Jane; Kent, Alistair; Knoppers, Bartha Maria; Lindpaintner, Klaus; Little, Julian; Riegman, Peter; Ripatti, Samuli; Stolk, Ronald; Bobrow, Martin; Cambon-Thomsen, Anne; Dressler, Lynn; Joly, Yann; Kato, Kazuto; Knoppers, Bartha Maria; Rodriguez, Laura Lyman; McPherson, Treasa; Nicolás, Pilar; Ouellette, Francis; Romeo-Casabona, Carlos; Sarin, Rajiv; Wallace, Susan; Wiesner, Georgia; Wilson, Julia; Zeps, Nikolajs; Simkevitz, Howard; De Rienzo, Assunta; Knoppers, Bartha M

    2015-01-01

    The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three keypoints to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These ‘points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure. PMID:25248396

  16. Genomic cloud computing: legal and ethical points to consider.

    PubMed

    Dove, Edward S; Joly, Yann; Tassé, Anne-Marie; Knoppers, Bartha M

    2015-10-01

    The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three key 'points to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These 'points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure.

  17. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  18. Curated Collections for Educators: Five Key Papers about Program Evaluation.

    PubMed

    Thoma, Brent; Gottlieb, Michael; Boysen-Osborn, Megan; King, Andrew; Quinn, Antonia; Krzyzaniak, Sara; Pineda, Nicolas; Yarris, Lalena M; Chan, Teresa

    2017-05-04

    The evaluation of educational programs has become an expected part of medical education. At some point, all medical educators will need to critically evaluate the programs that they deliver. However, the evaluation of educational programs requires a very different skillset than teaching. In this article, we aim to identify and summarize key papers that would be helpful for faculty members interested in exploring program evaluation. In November of 2016, the 2015-2016 Academic life in emergency medicine (ALiEM) Faculty Incubator program highlighted key papers in a discussion of program evaluation. This list of papers was augmented with suggestions by guest experts and by an open call on Twitter. This resulted in a list of 30 papers on program evaluation. Our authorship group then engaged in a process akin to a Delphi study to build consensus on the most important papers about program evaluation for medical education faculty. We present our group's top five most highly rated papers on program evaluation. We also summarize these papers with respect to their relevance to junior medical education faculty members and faculty developers. Program evaluation is challenging. The described papers will be informative for junior faculty members as they aim to design literature-informed evaluations for their educational programs.

  19. Curated Collections for Educators: Five Key Papers about Program Evaluation

    PubMed Central

    Gottlieb, Michael; Boysen-Osborn, Megan; King, Andrew; Quinn, Antonia; Krzyzaniak, Sara; Pineda, Nicolas; Yarris, Lalena M; Chan, Teresa

    2017-01-01

    The evaluation of educational programs has become an expected part of medical education. At some point, all medical educators will need to critically evaluate the programs that they deliver. However, the evaluation of educational programs requires a very different skillset than teaching. In this article, we aim to identify and summarize key papers that would be helpful for faculty members interested in exploring program evaluation. In November of 2016, the 2015-2016 Academic life in emergency medicine (ALiEM) Faculty Incubator program highlighted key papers in a discussion of program evaluation. This list of papers was augmented with suggestions by guest experts and by an open call on Twitter. This resulted in a list of 30 papers on program evaluation. Our authorship group then engaged in a process akin to a Delphi study to build consensus on the most important papers about program evaluation for medical education faculty. We present our group’s top five most highly rated papers on program evaluation. We also summarize these papers with respect to their relevance to junior medical education faculty members and faculty developers. Program evaluation is challenging. The described papers will be informative for junior faculty members as they aim to design literature-informed evaluations for their educational programs. PMID:28589073

  20. Quantum key distribution in a multi-user network at gigahertz clock rates

    NASA Astrophysics Data System (ADS)

    Fernandez, Veronica; Gordon, Karen J.; Collins, Robert J.; Townsend, Paul D.; Cova, Sergio D.; Rech, Ivan; Buller, Gerald S.

    2005-07-01

    In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws. Such potentially disruptive security technologies could be of high strategic and economic value in the future. Two major issues confronting researchers in this field are the transmission range (typically <100km) and the key exchange rate, which can be as low as a few bits per second at long optical fiber distances. This paper describes further research of an approach to significantly enhance the key exchange rate in an optical fiber system at distances in the range of 1-20km. We will present results on a number of application scenarios, including point-to-point links and multi-user networks. Quantum key distribution systems have been developed, which use standard telecommunications optical fiber, and which are capable of operating at clock rates of up to 2GHz. They implement a polarization-encoded version of the B92 protocol and employ vertical-cavity surface-emitting lasers with emission wavelengths of 850 nm as weak coherent light sources, as well as silicon single-photon avalanche diodes as the single photon detectors. The point-to-point quantum key distribution system exhibited a quantum bit error rate of 1.4%, and an estimated net bit rate greater than 100,000 bits-1 for a 4.2 km transmission range.

  1. Poor commissioning discussed in depth.

    PubMed

    Towse, Bob; Whitby, Robin; Wignall, Stephen; Barrass, Chris; Newman, Alan; Shaw, Christopher; Johnston-Stuart, Chris; James, Chris

    2014-05-01

    Last October's Healthcare Estates 2013 conference saw one of the first day's 'Engineering' sessions debate the topic, 'Why do so many buildings disappoint their owners and occupants?' Much of the discussion centered on the problems caused by 'inadequate management of the commissioning process'. A roundtable debate jointly staged recently in London by IHEEM and the B&ES, the leading U.K. trade association for building services engineering contractors, took the debate forward. As HEJ editor, Jonathan Baillie reports, the discussions confirmed that one of the key contributors to poor commissioning is a failure to involve specialist building services contractors sufficiently early. It was also agreed that finding a really effective 'client-side' project manager, with the panoply of skills and experience the role requires, can be 'a tough ask'. In this issue of HEJ we report on the debate's first 'half'; in June's edition, we will cover 'part two' of a lively, forthright, and positive debate.

  2. Redescription of four species of Mehdiella from Testudinidae, with a key to the species and discussion on the relationships among the species of this genus.

    PubMed

    Bouamer, S; Morand, S; Kara, M

    2003-12-01

    Four species of the genus Mehdiella Seurat, 1918 are redescribed: M. cristata Petter, 1966 and M. stylosa dollfusi Petter, 1966, parasite of Pyxix arachnoides Bell, 1827 from Madagascar, M. s. stylosa (Thapar, 1925) and M. uncinata (Drasche, 1884), parasite of Testudo graeca Linneaus, 1758, Testudo hermanni Gmelin, 1789 and Testudo horsfieldii (Gray, 1844) from Palaearctic region. Light microscopy and scanning electron microscopy (SEM) studies revealed new informations on the morphology of these species. On the basis of this morphological study, the sub-species Mehdiella stylosa dollfusi and M. s. stylosa are raised to level of species. The position of Mehdiella cristata among the species of the genus Mehdiella and the relationships among the species of the genus Mehdiella are discussed. A key to the eight valid species Mehdiella is given.

  3. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    ERIC Educational Resources Information Center

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  4. Keys and the crisis in taxonomy: extinction or reinvention?

    PubMed

    Walter, David Evans; Winterton, Shaun

    2007-01-01

    Dichotomous keys that follow a single pathway of character state choices to an end point have been the primary tools for the identification of unknown organisms for more than two centuries. However, a revolution in computer diagnostics is now under way that may result in the replacement of traditional keys by matrix-based computer interactive keys that have many paths to a correct identification and make extensive use of hypertext to link to images, glossaries, and other support material. Progress is also being made on replacing keys entirely by optical matching of specimens to digital databases and DNA sequences. These new tools may go some way toward alleviating the taxonomic impediment to biodiversity studies and other ecological and evolutionary research, especially with better coordination between those who produce keys and those who use them and by integrating interactive keys into larger biological Web sites.

  5. Wall shear stress fixed points in blood flow

    NASA Astrophysics Data System (ADS)

    Arzani, Amirhossein; Shadden, Shawn

    2017-11-01

    Patient-specific computational fluid dynamics produces large datasets, and wall shear stress (WSS) is one of the most important parameters due to its close connection with the biological processes at the wall. While some studies have investigated WSS vectorial features, the WSS fixed points have not received much attention. In this talk, we will discuss the importance of WSS fixed points from three viewpoints. First, we will review how WSS fixed points relate to the flow physics away from the wall. Second, we will discuss how certain types of WSS fixed points lead to high biochemical surface concentration in cardiovascular mass transport problems. Finally, we will introduce a new measure to track the exposure of endothelial cells to WSS fixed points.

  6. Public-key encryption with chaos.

    PubMed

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  7. Public-key encryption with chaos

    NASA Astrophysics Data System (ADS)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  8. Miniature near-infrared spectrometer for point-of-use chemical analysis

    NASA Astrophysics Data System (ADS)

    Friedrich, Donald M.; Hulse, Charles A.; von Gunten, Marc; Williamson, Eric P.; Pederson, Christopher G.; O'Brien, Nada A.

    2014-03-01

    Point-of-use chemical analysis holds tremendous promise for a number of industries, including agriculture, recycling, pharmaceuticals and homeland security. Near infrared (NIR) spectroscopy is an excellent candidate for these applications, with minimal sample preparation for real-time decision-making. We will detail the development of a golf ball-sized NIR spectrometer developed specifically for this purpose. The instrument is based upon a thin-film dispersive element that is very stable over time and temperature, with less than 2 nm change expected over the operating temperature range and lifetime of the instrument. This filter is coupled with an uncooled InGaAs detector array in a small, rugged, environmentally stable optical bench ideally suited to unpredictable environments. The resulting instrument weighs less than 60 grams, includes onboard illumination and collection optics for diffuse reflectance applications in the 900-1700 nm wavelength range, and is USB-powered. It can be driven in the field by a laptop, tablet or even a smartphone. The software design includes the potential for both on-board and cloud-based storage, analysis and decision-making. The key attributes of the instrument and the underlying design tradeoffs will be discussed, focusing on miniaturization, ruggedization, power consumption and cost. The optical performance of the instrument, as well as its fit-for purpose will be detailed. Finally, we will show that our manufacturing process has enabled us to build instruments with excellent unit-to-unit reproducibility. We will show that this is a key enabler for instrumentindependent chemical analysis models, a requirement for mass point-of-use deployment.

  9. Workshop Report: International Workshop to Explore Synergies between Nuclear and Renewable Energy Sources as a Key Component in Developing Pathways to Decarbonization of the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bragg-Sitton, Shannon M.; Boardman, Richard; Ruth, Mark

    2016-08-01

    An international workshop was organized in June 2016 to explore synergies between nuclear and renewable energy sources. Synergies crossing electricity, transportation, and industrial sectors were the focus of the workshop, recognizing that deep decarbonization will require efforts that go far beyond the electricity sector alone. This report summarizes the key points made within each presentation and highlights outcomes that were arrived at in the discussions.

  10. On identity: from a philosophical point of view

    PubMed Central

    2013-01-01

    Background The term “identity” has a much longer tradition in Western philosophy than in psychology. However, the philosophical discourse addresses very different meanings of the term, which should be distinguished to avoid misunderstandings, but also to sharpen the key meanings of the term in psychological contexts. These crucial points in the philosophical concepts of identity in the sense of singularity, individuality, or self-sameness may structure the ongoing discussion on identity in psychiatric diagnoses (as in DSM-5, Child Adolesc Psychiatry Ment, this issue, 2013), in psychology, psychoanalysis, but also neuroscience and neurophilosophy (Child Adolesc Psychiatry Ment, this issue, 2013). Method The concept of identity is subjected to a systematic philosophical analysis following some milestones in its history to provide a background for recent discussions on identity in psychiatry and psychology. Results The article focuses first on the philosophical core distinctions of identity in the different meanings to be addressed, second, briefly on some of the diverse psychological histories of the concept in the second half of the 20th century. Finally some reflections are presented on borderline personality disorder, considered as a mental disorder with a disturbance or diffusion of identity as core feature, and briefly on a newly developed instrument assessing identity development and identity diffusion in adolescence, the AIDA that is also presented in the special issue of this journal (Child Adolesc Psychiatry Ment, this issue, 2013). Conclusion As a conclusion, different points of view concerning identity are summarized in respect to treatment planning, and different levels of description of identity in phenomenology, philosophy of mind, cognitive science, and social science and personality psychology are outlined. PMID:23902741

  11. Human Health Effects of Trichloroethylene: Key Findings and Scientific Issues

    PubMed Central

    Jinot, Jennifer; Scott, Cheryl Siegel; Makris, Susan L.; Cooper, Glinda S.; Dzubow, Rebecca C.; Bale, Ambuja S.; Evans, Marina V.; Guyton, Kathryn Z.; Keshava, Nagalakshmi; Lipscomb, John C.; Barone, Stanley; Fox, John F.; Gwinn, Maureen R.; Schaum, John; Caldwell, Jane C.

    2012-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) completed a toxicological review of trichloroethylene (TCE) in September 2011, which was the result of an effort spanning > 20 years. Objectives: We summarized the key findings and scientific issues regarding the human health effects of TCE in the U.S. EPA’s toxicological review. Methods: In this assessment we synthesized and characterized thousands of epidemiologic, experimental animal, and mechanistic studies, and addressed several key scientific issues through modeling of TCE toxicokinetics, meta-analyses of epidemiologic studies, and analyses of mechanistic data. Discussion: Toxicokinetic modeling aided in characterizing the toxicological role of the complex metabolism and multiple metabolites of TCE. Meta-analyses of the epidemiologic data strongly supported the conclusions that TCE causes kidney cancer in humans and that TCE may also cause liver cancer and non-Hodgkin lymphoma. Mechanistic analyses support a key role for mutagenicity in TCE-induced kidney carcinogenicity. Recent evidence from studies in both humans and experimental animals point to the involvement of TCE exposure in autoimmune disease and hypersensitivity. Recent avian and in vitro mechanistic studies provided biological plausibility that TCE plays a role in developmental cardiac toxicity, the subject of substantial debate due to mixed results from epidemiologic and rodent studies. Conclusions: TCE is carcinogenic to humans by all routes of exposure and poses a potential human health hazard for noncancer toxicity to the central nervous system, kidney, liver, immune system, male reproductive system, and the developing embryo/fetus. PMID:23249866

  12. Ten Keys to the Portal

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  13. Key interventions and quality indicators for quality improvement of STEMI care: a RAND Delphi survey.

    PubMed

    Aeyels, Daan; Sinnaeve, Peter R; Claeys, Marc J; Gevaert, Sofie; Schoors, Danny; Sermeus, Walter; Panella, Massimiliano; Coeckelberghs, Ellen; Bruyneel, Luk; Vanhaecht, Kris

    2017-12-13

    Identification, selection and validation of key interventions and quality indicators for improvement of in hospital quality of care for ST-elevated myocardial infarction (STEMI) patients. A structured literature review was followed by a RAND Delphi Survey. A purposively selected multidisciplinary expert panel of cardiologists, nurse managers and quality managers selected and validated key interventions and quality indicators prior for quality improvement for STEMI. First, 34 experts (76% response rate) individually assessed the appropriateness of items to quality improvement on a nine point Likert scale. Twenty-seven key interventions, 16 quality indicators at patient level and 27 quality indicators at STEMI care programme level were selected. Eighteen additional items were suggested. Experts received personal feedback, benchmarking their score with group results (response rate, mean, median and content validity index). Consequently, 32 experts (71% response rate) openly discussed items with an item-content validity index above 75%. By consensus, the expert panel validated a final set of 25 key interventions, 13 quality indicators at patient level and 20 quality indicators at care programme level prior for improvement of in hospital care for STEMI. A structured literature review and multidisciplinary expertise was combined to validate a set of key interventions and quality indicators prior for improvement of care for STEMI. The results allow researchers and hospital staff to evaluate and support quality improvement interventions in a large cohort within the context of a health care system.

  14. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  15. [Research progress on breeding standard of medicinal animals and discussion on several key problems].

    PubMed

    Zhou, Yi-Quan; Qu, Xian-You; Yang, Guang; Li, Jun-de; Su, Yan; Li, Ying

    2016-12-01

    Medicinal animal breeding standards is regarded as the law to normalize relevant production that can guarantee the quality of traditional Chinese medicine of animal category. The article summarized the medicinal animal resources in our country and the present condition of medicinal animal breeding standards. It considered the current animal breeding standards system was in adequate, not only the quantity of breeding standards, the standard content and index were also uncomprehensive, which is not conducive to the scientific and orderly development and utilization of medicinal animal resources. The article pointed out that the development of the basic standards, environmental control, feed quality, raising management, inspection and quarantine should be included into the medicinal animal breeding standards, and the medicinal animal breeding standards content framework was introduced. Meanwhile, animal welfare, biological safety and file management should be concerned during the process of research. Hope the article has good reference value to medicinal animal breeding standards establishment and production management. Copyright© by the Chinese Pharmaceutical Association.

  16. The Lagrange Points

    ERIC Educational Resources Information Center

    Lovell, M.S.

    2007-01-01

    This paper presents a derivation of all five Lagrange points by methods accessible to sixth-form students, and provides a further opportunity to match Newtonian gravity with centripetal force. The predictive powers of good scientific theories are also discussed with regard to the philosophy of science. Methods for calculating the positions of the…

  17. Survey of Key Concepts in Enactivist Theory and Methodology

    ERIC Educational Resources Information Center

    Reid, David A.; Mgombelo, Joyce

    2015-01-01

    This article discusses key concepts within enactivist writing, focussing especially on concepts involved in the enactivist description of cognition as embodied action: perceptually guided action, embodiment, and structural coupling through recurrent sensorimotor patterns. Other concepts on which these concepts depend are also discussed, including…

  18. Multiple Paths to Mathematics Practice in Al-Kashi's Key to Arithmetic

    NASA Astrophysics Data System (ADS)

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his Key to Arithmetic, a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life and his contributions to mathematics and astronomy. Section 2 starts with a brief discussion of the contents and pedagogy of the Key to Arithmetic. Al-Kashi's multiple approaches are discussed through four different examples of his versatility in presenting a topic from multiple perspectives. These examples are multiple definitions, multiple algorithms, multiple formulas, and multiple methods for solving word problems. Section 3 is devoted to some benefits that can be gained by implementing al-Kashi's multiple paths approach in modern curricula. For this discussion, examples from two teaching modules taken from the Key to Arithmetic and implemented in Pre-Calculus and mathematics courses for preservice teachers are discussed. Also, the conclusions are supported by some aspects of these modules. This paper is an attempt to help mathematics educators explore more benefits from reading from original sources.

  19. Key components of financial-analysis education for clinical nurses.

    PubMed

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  20. High-stability Shuttle pointing system

    NASA Technical Reports Server (NTRS)

    Van Riper, R.

    1981-01-01

    It was recognized that precision pointing provided by the Orbiter's attitude control system would not be good enough for Shuttle payload scientific experiments or certain Defense department payloads. The Annular Suspension Pointing System (ASPS) is being developed to satisfy these more exacting pointing requirements. The ASPS is a modular pointing system which consists of two principal parts, including an ASPS Gimbal System (AGS) which provides three conventional ball-bearing gimbals and an ASPS Vernier System (AVS) which magnetically isolates the payload. AGS performance requirements are discussed and an AGS system description is given. The overall AGS system consists of the mechanical hardware, sensors, electronics, and software. Attention is also given to system simulation and performance prediction, and support facilities.

  1. A Novel Real-Time Reference Key Frame Scan Matching Method

    PubMed Central

    Mohamed, Haytham; Moussa, Adel; Elhabiby, Mohamed; El-Sheimy, Naser; Sesay, Abu

    2017-01-01

    Unmanned aerial vehicles represent an effective technology for indoor search and rescue operations. Typically, most indoor missions’ environments would be unknown, unstructured, and/or dynamic. Navigation of UAVs in such environments is addressed by simultaneous localization and mapping approach using either local or global approaches. Both approaches suffer from accumulated errors and high processing time due to the iterative nature of the scan matching method. Moreover, point-to-point scan matching is prone to outlier association processes. This paper proposes a low-cost novel method for 2D real-time scan matching based on a reference key frame (RKF). RKF is a hybrid scan matching technique comprised of feature-to-feature and point-to-point approaches. This algorithm aims at mitigating errors accumulation using the key frame technique, which is inspired from video streaming broadcast process. The algorithm depends on the iterative closest point algorithm during the lack of linear features which is typically exhibited in unstructured environments. The algorithm switches back to the RKF once linear features are detected. To validate and evaluate the algorithm, the mapping performance and time consumption are compared with various algorithms in static and dynamic environments. The performance of the algorithm exhibits promising navigational, mapping results and very short computational time, that indicates the potential use of the new algorithm with real-time systems. PMID:28481285

  2. A Novel Real-Time Reference Key Frame Scan Matching Method.

    PubMed

    Mohamed, Haytham; Moussa, Adel; Elhabiby, Mohamed; El-Sheimy, Naser; Sesay, Abu

    2017-05-07

    Unmanned aerial vehicles represent an effective technology for indoor search and rescue operations. Typically, most indoor missions' environments would be unknown, unstructured, and/or dynamic. Navigation of UAVs in such environments is addressed by simultaneous localization and mapping approach using either local or global approaches. Both approaches suffer from accumulated errors and high processing time due to the iterative nature of the scan matching method. Moreover, point-to-point scan matching is prone to outlier association processes. This paper proposes a low-cost novel method for 2D real-time scan matching based on a reference key frame (RKF). RKF is a hybrid scan matching technique comprised of feature-to-feature and point-to-point approaches. This algorithm aims at mitigating errors accumulation using the key frame technique, which is inspired from video streaming broadcast process. The algorithm depends on the iterative closest point algorithm during the lack of linear features which is typically exhibited in unstructured environments. The algorithm switches back to the RKF once linear features are detected. To validate and evaluate the algorithm, the mapping performance and time consumption are compared with various algorithms in static and dynamic environments. The performance of the algorithm exhibits promising navigational, mapping results and very short computational time, that indicates the potential use of the new algorithm with real-time systems.

  3. Geology and hydrogeology of the Florida Keys

    USGS Publications Warehouse

    Halley, Robert B.; Vacher, H. L.; Shinn,

    1997-01-01

    This chapter discusses the geology and hydrogeology of the Florida Keys, and focuses on the islands formed of Pleistocene limestone. These islands, which are crossed when driving from Miami to Key West, are typically regarded as "the Florida Keys." The outstanding and fragile character of ecosystems on and around the Florida Keys has prompted State and Federal efforts to protect and preserve the remaining public portions of the region. The Florida Keys were largely ignored during the sixteenth, seventeenth, and eighteenth centuries, although the waters just offshore provided a major shipping thoroughfare to and from the New World. The Florida Keys are now recognized as one of the great recreational and environmental resources of the United States. The islands are outposts of a laid-back, tropical resort culture that has as its foundation warmth and clear water. A significant part of the attraction is fishing, diving, and boating around the area's coral reefs, which the islands protect. But the reefs were not always so highly valued. The Florida Keys that have protected the reefs for millennia, may now be the source of the agents that may accomplish what Agassiz thought was beyond man's power a century ago.

  4. Points of attention in designing tools for regional brownfield prioritization.

    PubMed

    Limasset, Elsa; Pizzol, Lisa; Merly, Corinne; Gatchett, Annette M; Le Guern, Cécile; Martinát, Stanislav; Klusáček, Petr; Bartke, Stephan

    2018-05-01

    The regeneration of brownfields has been increasingly recognized as a key instrument in sustainable land management, since free developable land (or so called "greenfields") has become a scare and more expensive resource, especially in densely populated areas. However, the complexity of these sites requires considerable efforts to successfully complete their revitalization projects, thus requiring the development and application of appropriate tools to support decision makers in the selection of promising sites where efficiently allocate the limited financial resources. The design of effective prioritization tools is a complex process, which requires the analysis and consideration of critical points of attention (PoAs) which has been identified considering the state of the art in literature, and lessons learned from previous developments of regional brownfield (BF) prioritization processes, frameworks and tools. Accordingly, we identified 5 PoAs, namely 1) Assessing end user needs and orientation discussions, 2) Availability and quality of the data needed for the BF prioritization tool, 3) Communication and stakeholder engagement 4) Drivers of regeneration success, and 5) Financing and application costs. To deepen and collate the most recent knowledge on the topics from scientists and practitioners, we organized a focus group discussion within a special session at the AquaConSoil (ACS) conference 2017, where participants were asked to add their experience and thoughts to the discussion in order to identify the most significant and urgent points of attention in BF prioritization tool design. The result of this assessment is a comprehensive table (Table 2), which can support problem owners, investors, service providers, regulators, public and private land managers, decision makers etc. in the identification of the main aspects (sub-topics) to be considered and their relative influences and in the comprehension of the general patterns and challenges to be faced when

  5. Points of View: Stories of Psychopathology.

    ERIC Educational Resources Information Center

    Mitchell, James E.

    This book is designed to provide students, at differing levels of experience and training, with examples that illustrate the problems individuals have with various psychopathologies. Stories are included to illustrate the key elements of psychopathology for these disorders, and are written from the point of view of both the individual who has the…

  6. Liquidus slopes of impurities in ITS-90 fixed points from the mercury point to the copper point in the low concentration limit

    NASA Astrophysics Data System (ADS)

    Pearce, Jonathan V.; Gisby, John A.; Steur, Peter P. M.

    2016-08-01

    A knowledge of the effect of impurities at the level of parts per million on the freezing temperature of very pure metals is essential for realisation of ITS-90 fixed points. New information has become available for use with the thermodynamic modelling software MTDATA, permitting calculation of liquidus slopes, in the low concentration limit, of a wider range of binary alloy systems than was previously possible. In total, calculated values for 536 binary systems are given. In addition, new experimental determinations of phase diagrams, in the low impurity concentration limit, have recently appeared. All available data have been combined to provide a comprehensive set of liquidus slopes for impurities in ITS-90 metal fixed points. In total, liquidus slopes for 838 systems are tabulated for the fixed points Hg, Ga, In, Sn, Zn, Al, Ag, Au, and Cu. It is shown that the value of the liquidus slope as a function of impurity element atomic number can be approximated using a simple formula, and good qualitative agreement with the existing data is observed for the fixed points Al, Ag, Au and Cu, but curiously the formula is not applicable to the fixed points Hg, Ga, In, Sn, and Zn. Some discussion is made concerning the influence of oxygen on the liquidus slopes, and some calculations using MTDATA are discussed. The BIPM’s consultative committee for thermometry has long recognised that the sum of individual estimates method is the ideal approach for assessing uncertainties due to impurities, but the community has been largely powerless to use the model due to lack of data. Here, not only is data provided, but a simple model is given to enable known thermophysical data to be used directly to estimate impurity effects for a large fraction of the ITS-90 fixed points.

  7. Ecological thresholds: The key to successful enviromental management or an important concept with no practical application?

    USGS Publications Warehouse

    Groffman, P.M.; Baron, Jill S.; Blett, T.; Gold, A.J.; Goodman, I.; Gunderson, L.H.; Levinson, B.M.; Palmer, Margaret A.; Paerl, H.W.; Peterson, G.D.; Poff, N.L.; Rejeski, D.W.; Reynolds, J.F.; Turner, M.G.; Weathers, K.C.; Wiens, J.

    2006-01-01

    An ecological threshold is the point at which there is an abrupt change in an ecosystem quality, property or phenomenon, or where small changes in an environmental driver produce large responses in the ecosystem. Analysis of thresholds is complicated by nonlinear dynamics and by multiple factor controls that operate at diverse spatial and temporal scales. These complexities have challenged the use and utility of threshold concepts in environmental management despite great concern about preventing dramatic state changes in valued ecosystems, the need for determining critical pollutant loads and the ubiquity of other threshold-based environmental problems. In this paper we define the scope of the thresholds concept in ecological science and discuss methods for identifying and investigating thresholds using a variety of examples from terrestrial and aquatic environments, at ecosystem, landscape and regional scales. We end with a discussion of key research needs in this area.

  8. Ifcwall Reconstruction from Unstructured Point Clouds

    NASA Astrophysics Data System (ADS)

    Bassier, M.; Klein, R.; Van Genechten, B.; Vergauwen, M.

    2018-05-01

    The automated reconstruction of Building Information Modeling (BIM) objects from point cloud data is still ongoing research. A key aspect is the creation of accurate wall geometry as it forms the basis for further reconstruction of objects in a BIM. After segmenting and classifying the initial point cloud, the labelled segments are processed and the wall topology is reconstructed. However, the preocedure is challenging due to noise, occlusions and the complexity of the input data.In this work, a method is presented to automatically reconstruct consistent wall geometry from point clouds. More specifically, the use of room information is proposed to aid the wall topology creation. First, a set of partial walls is constructed based on classified planar primitives. Next, the rooms are identified using the retrieved wall information along with the floors and ceilings. The wall topology is computed by the intersection of the partial walls conditioned on the room information. The final wall geometry is defined by creating IfcWallStandardCase objects conform the IFC4 standard. The result is a set of walls according to the as-built conditions of a building. The experiments prove that the used method is a reliable framework for wall reconstruction from unstructured point cloud data. Also, the implementation of room information reduces the rate of false positives for the wall topology. Given the walls, ceilings and floors, 94% of the rooms is correctly identified. A key advantage of the proposed method is that it deals with complex rooms and is not bound to single storeys.

  9. Key Informants' Perspectives on Teacher Learning in Scotland

    ERIC Educational Resources Information Center

    Kennedy, Aileen; Christie, Donald; Fraser, Christine; Reid, Lesley; McKinney, Stephen; Welsh, Mary; Wilson, Alastair; Griffiths, Morwenna

    2008-01-01

    This article outlines the policy context for teachers' learning and continuing professional development in Scotland and considers this in relation to the perspectives of key informants gained through interview. The analysis draws on a triple-lens conceptual framework and points to some interesting contradictions between the policy text and the…

  10. Coordinating Council. Sixth Meeting: Who Are Our Key Users?

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This NASA Scientific and Technical Information Program Coordinating Council meeting deals with the topic 'Who are our key users?' Presentations were made on the following subtopics: Key users: Who uses the system the most, Who orders the most documents, Users: What do we know about them?, NASA/DOD Aerospace Knowledge Diffusion research project on 'Potential key users', How we meet the user's needs, and STI Council user requirements update. Summaries of discussions after the presentations are included along with visuals for the presentations.

  11. Collaborative Reasoning: Language-Rich Discussions for English Learners

    ERIC Educational Resources Information Center

    Zhang, Jie; Dougherty Stahl, Katherine A.

    2012-01-01

    Collaborative Reasoning (CR) is a peer-led, small group discussion approach that aims to promote intellectual and personal engagement in elementary school classrooms. In CR, students read a text that raises an unresolved issue with multiple and competing points of view. Students are expected to take positions on a big question, support the…

  12. Deducing trapdoor primitives in public key encryption schemes

    NASA Astrophysics Data System (ADS)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  13. Keys to Transition: The California Model.

    ERIC Educational Resources Information Center

    Kearly, Patt

    This publication addresses basic issues related to the concept of transition as it is applied to students with disabilities in California. Following a pretest (and its answer key), the document uses a question and answer format to discuss common concerns about transition, normalization, the school role, the "Bridges" model developed by…

  14. A Key to the New Library.

    ERIC Educational Resources Information Center

    Gerryts, Egbert; Pienaar, Heila

    This paper discusses finding the key to a new library in order to ensure its future, stressing the importance of alignment between strategy and people. The first section addresses management philosophy for renewal, including replacing the inflexible hierarchical pyramidal structure by a network organization with a service and competency management…

  15. Fixed point theorems and dissipative processes

    NASA Technical Reports Server (NTRS)

    Hale, J. K.; Lopes, O.

    1972-01-01

    The deficiencies of the theories that characterize the maximal compact invariant set of T as asymptotically stable, and that some iterate of T has a fixed point are discussed. It is shown that this fixed point condition is always satisfied for condensing and local dissipative T. Applications are given to a class of neutral functional differential equations.

  16. Facilitated versus Non-Facilitated Online Case Discussions: Comparing Differences in Problem Space Coverage

    ERIC Educational Resources Information Center

    Ertmer, Peggy A.; Koehler, Adrie A.

    2015-01-01

    The facilitator plays a key role in guiding students' efforts during case discussions. However, few studies have compared differences in learning outcomes for students participating in facilitated versus non-facilitated discussions. In this research, we used "problem space coverage" as a learning measure to compare outcomes between…

  17. Discovering Genres of Online Discussion Threads via Text Mining

    ERIC Educational Resources Information Center

    Lin, Fu-Ren; Hsieh, Lu-Shih; Chuang, Fu-Tai

    2009-01-01

    As course management systems (CMS) gain popularity in facilitating teaching. A forum is a key component to facilitate the interactions among students and teachers. Content analysis is the most popular way to study a discussion forum. But content analysis is a human labor intensity process; for example, the coding process relies heavily on manual…

  18. Substrate specificities and intracellular distributions of three N-glycan processing enzymes functioning at a key branch point in the insect N-glycosylation pathway.

    PubMed

    Geisler, Christoph; Jarvis, Donald L

    2012-03-02

    Man(α1-6)[GlcNAc(β1-2)Man(α1-3)]ManGlcNAc(2) is a key branch point intermediate in the insect N-glycosylation pathway because it can be either trimmed by a processing β-N-acetylglucosaminidase (FDL) to produce paucimannosidic N-glycans or elongated by N-acetylglucosaminyltransferase II (GNT-II) to produce complex N-glycans. N-acetylglucosaminyltransferase I (GNT-I) contributes to branch point intermediate production and can potentially reverse the FDL trimming reaction. However, there has been no concerted effort to evaluate the relationships among these three enzymes in any single insect system. Hence, we extended our previous studies on Spodoptera frugiperda (Sf) FDL to include GNT-I and -II. Sf-GNT-I and -II cDNAs were isolated, the predicted protein sequences were analyzed, and both gene products were expressed and their acceptor substrate specificities and intracellular localizations were determined. Sf-GNT-I transferred N-acetylglucosamine to Man(5)GlcNAc(2), Man(3)GlcNAc(2), and GlcNAc(β1-2)Man(α1-6)[Man(α1-3)]ManGlcNAc(2), demonstrating its role in branch point intermediate production and its ability to reverse FDL trimming. Sf-GNT-II only transferred N-acetylglucosamine to Man(α1-6)[GlcNAc(β1-2)Man(α1-3)]ManGlcNAc(2), demonstrating that it initiates complex N-glycan production, but cannot use Man(3)GlcNAc(2) to produce hybrid or complex structures. Fluorescently tagged Sf-GNT-I and -II co-localized with an endogenous Sf Golgi marker and Sf-FDL co-localized with Sf-GNT-I and -II, indicating that all three enzymes are Golgi resident proteins. Unexpectedly, fluorescently tagged Drosophila melanogaster FDL also co-localized with Sf-GNT-I and an endogenous Drosophila Golgi marker, indicating that it is a Golgi resident enzyme in insect cells. Thus, the substrate specificities and physical juxtapositioning of GNT-I, GNT-II, and FDL support the idea that these enzymes function at the N-glycan processing branch point and are major factors determining the

  19. New Perspectives of Point Clouds Color Management - the Development of Tool in Matlab for Applications in Cultural Heritage

    NASA Astrophysics Data System (ADS)

    Pepe, M.; Ackermann, S.; Fregonese, L.; Achille, C.

    2017-02-01

    The paper describes a method for Point Clouds Color management and Integration obtained from Terrestrial Laser Scanner (TLS) and Image Based (IB) survey techniques. Especially in the Cultural Heritage (CH) environment, methods and techniques to improve the color quality of Point Clouds have a key role because a homogenous texture brings to a more accurate reconstruction of the investigated object and to a more pleasant perception of the color object as well. A color management method for point clouds can be useful in case of single data set acquired by TLS or IB technique as well as in case of chromatic heterogeneity resulting by merging different datasets. The latter condition can occur when the scans are acquired in different moments of the same day or when scans of the same object are performed in a period of weeks or months, and consequently with a different environment/lighting condition. In this paper, a procedure to balance the point cloud color in order to uniform the different data sets, to improve the chromatic quality and to highlight further details will be presented and discussed.

  20. A Systematic Exploration of the Local and Remote Climate Effects of Anthropogenic Aerosol Emissions from Key Regions

    NASA Astrophysics Data System (ADS)

    Voulgarakis, A.; Kasoar, M.; Shawki, D.; Lamarque, J. F.; Shindell, D. T.; Faluvegi, G.; Bellouin, N.; Collins, W.; Tsigaridis, K.

    2016-12-01

    The radiative forcing of short-lived pollutants such as aerosols and tropospheric ozone is highly inhomogeneous and can therefore affect regional temperature, circulation and precipitation in a much more complicated way than the forcing of well-mixed greenhouse gases. Such effects have only recently started to be examined thoroughly and systematically from a global point of view, to understand regional interactions. Here, after outlining some key past work in this area, results from recent simulations with the UK Met Office's HadGEM3 global composition-climate model will be presented in which anthropogenic emissions of sulfur dioxide (SO2) and black carbon in key regions (East Asia, South Asia, Europe, the US, and the northern mid-latitudes as a whole) have been removed. The linkages between emissions, concentrations, radiative forcing, temperature and precipitation responses will be discussed. A particular emphasis will be placed on non-local effects, i.e. how emissions over a certain region can affect other areas remotely. Finally, we will contrast our results with those from similar experiments pursued using the NASA GISS-E2 and the NCAR CESM1 models for US and East Asian SO2 emissions, and will discuss the large differences in the models' behaviour.

  1. Inclusive Assessment at Point-of-Design

    ERIC Educational Resources Information Center

    Keating, Neil; Zybutz, Tanya; Rouse, Karl

    2012-01-01

    Recognising assessment as a driver for learning and a key part of the student learning experience, this case study considers the impact of opening the assessment process to active student engagement as well as placing inclusivity at the heart of the assessment task at point-of-design. This case study presents an approach to assessment that both…

  2. Measuring and Visualizing Group Knowledge Elaboration in Online Collaborative Discussions

    ERIC Educational Resources Information Center

    Zheng, Yafeng; Xu, Chang; Li, Yanyan; Su, You

    2018-01-01

    Knowledge elaboration plays a critical role in promoting knowledge acquisition and facilitating the retention of target knowledge in online collaborative discussions. Adopting a key-term-based automated analysis approach, we proposed an indicator framework to measure the level of knowledge elaboration in terms of coverage, activation, and…

  3. Implosive Collapse about Magnetic Null Points: A Quantitative Comparison between 2D and 3D Nulls

    NASA Astrophysics Data System (ADS)

    Thurgood, Jonathan O.; Pontin, David I.; McLaughlin, James A.

    2018-03-01

    Null collapse is an implosive process whereby MHD waves focus their energy in the vicinity of a null point, forming a current sheet and initiating magnetic reconnection. We consider, for the first time, the case of collapsing 3D magnetic null points in nonlinear, resistive MHD using numerical simulation, exploring key physical aspects of the system as well as performing a detailed parameter study. We find that within a particular plane containing the 3D null, the plasma and current density enhancements resulting from the collapse are quantitatively and qualitatively as per the 2D case in both the linear and nonlinear collapse regimes. However, the scaling with resistivity of the 3D reconnection rate—which is a global quantity—is found to be less favorable when the magnetic null point is more rotationally symmetric, due to the action of increased magnetic back-pressure. Furthermore, we find that, with increasing ambient plasma pressure, the collapse can be throttled, as is the case for 2D nulls. We discuss this pressure-limiting in the context of fast reconnection in the solar atmosphere and suggest mechanisms by which it may be overcome. We also discuss the implications of the results in the context of null collapse as a trigger mechanism of Oscillatory Reconnection, a time-dependent reconnection mechanism, and also within the wider subject of wave–null point interactions. We conclude that, in general, increasingly rotationally asymmetric nulls will be more favorable in terms of magnetic energy release via null collapse than their more symmetric counterparts.

  4. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  5. Youth Physical Fitness: Ten Key Concepts

    ERIC Educational Resources Information Center

    Corbin, Charles B.; Welk, Gregory J.; Richardson, Cheryl; Vowell, Catherine; Lambdin, Dolly; Wikgren, Scott

    2014-01-01

    The promotion of physical fitness has been a key objective of physical education for more than a century. During this period, physical education has evolved to accommodate changing views on fitness and health. The purpose of this article is to discuss issues with fitness assessment and fitness education central to the new Presidential Youth…

  6. NSDC Policy Points. Volume 1, Number 4

    ERIC Educational Resources Information Center

    National Staff Development Council, 2009

    2009-01-01

    "NSDC Policy Points" is a newsletter published by the National Staff Development Council (NSDC). This issue of "NSDC Policy Points" discusses why collaborative learning is critical to professional development. Included in this newsletter is an article about team learning in Cedar Rapids, Iowa. [For Volume 1, Number 3 of…

  7. MoKey: A versatile exergame creator for everyday usage.

    PubMed

    Eckert, Martina; López, Marcos; Lázaro, Carlos; Meneses, Juan

    2017-11-27

    Currently, virtual applications for physical exercises are highly appreciated as rehabilitation instruments. This article presents a middleware called "MoKey" (Motion Keyboard), which converts standard off-the-shelf software into exergames (exercise games). A configurable set of gestures, captured by a motion capture camera, is translated into the key strokes required by the chosen software. The present study assesses the tool regarding usability and viability on a heterogeneous group of 11 participants, aged 5 to 51, with moderate to severe disabilities, and mostly bound to a wheelchair. In comparison with FAAST (The Flexible Action and Articulated Skeleton Toolkit), MoKey achieved better results in terms of ease of use and computational load. The viability as an exergame creator tool was proven with help of four applications (PowerPoint®, e-book reader, Skype®, and Tetris). Success rates of up to 91% have been achieved, subjective perception was rated with 4.5 points (from 0-5). The middleware provides increased motivation due to the use of favorite software and the advantage of exploiting it for exercise. Used together with communication software or online games, social inclusion can be stimulated. The therapists can employ the tool to monitor the correctness and progress of the exercises.

  8. The Science of Drug Use: Discussion Points

    MedlinePlus

    Skip to main content En español Researchers Medical & Health Professionals Patients & ... Medicines Prescription Medicines Steroids (Anabolic) Synthetic Cannabinoids (K2/Spice) Synthetic Cathinones (Bath Salts) Tobacco/Nicotine ...

  9. Discussion point: should governments buy drug patents?

    PubMed

    del Llano, Juan

    2007-06-01

    Between just 1995 and 2003, the number of new chemical entities fell from 45 to 25, while the costs increased by two and a half times in the same period. Firms in the USA accounted for more than half of biotech drugs from 1982 to 2003. European firms are losing competitiveness. In this hostile environment for investment in pharmaceutical R&D, providing quick access to market for real innovations is the main challenge for regulatory agencies. More initiatives, more entrepreneurial spirit and easier work regulation are needed to facilitate the growth of firms in this field, especially in emerging economies like the Spanish. A new open source model proposes the use of pre-competitive public platforms formed by young and qualified human capital carrying out research in areas not sufficiently attractive for private initiatives, followed by the introduction of pharmaceutical companies to carry out the clinical research. The last step would be fast and effective approval by assessment agencies. Governments should, therefore, facilitate the regulation of socially effective innovations, bringing in manufacturers to take part in the post-clinical trial period after entering the market. The gathering of incentives between regulatory agencies and pharmaceutical industry must be approached through innovation and authorization stimulating systems.

  10. Pretest online discussion groups to augment teaching and learning.

    PubMed

    Kuhn, Jonathan; Hasbargen, Barbara; Miziniak, Halina

    2010-01-01

    Tests and final examination scores of three semesters of control students in a nursing foundation course were compared with tests and final examination scores of three semesters of participating students. Participating students were offered access to an asynchronous pretest online discussion activity with a faculty e-moderator. While the simplified Bloom's revised taxonomy assisted in creating appropriate preparatory test and final examination questions for pretest online discussion, Salmon's five-stage online method provided direction to the e-moderator on how to encourage students to achieve Bloom's higher-order thinking skills during the pretest online discussions. Statistical analysis showed the pretest online discussion activity had a generally positive impact on tests and final examination scores, when controlling for a number of possible confounding variables, including instructor, cumulative grade point average, age, and credit hours.

  11. Parents' views on childhood obesity: qualitative analysis of discussion board postings.

    PubMed

    Appleton, Jessica; Fowler, Cathrine; Brown, Nicola

    2017-08-01

    Childhood obesity is an increasing concern for parents and health professionals alike. Parents' perception of obesity as a current health issue for their children is important for the everyday parenting and health choices parents make. As parents are frequently going online to seek and exchange information about parenting and child health, asynchronous online discussion forums provide an opportunity to investigate their perceptions and concerns. Understanding parents' perceptions, beliefs and attitudes is important in any childhood obesity prevention and intervention. To explore parents' perceptions, perspectives and concerns regarding childhood obesity expressed on asynchronous online discussion forums. A qualitative descriptive approach using template analysis to analyse a novel data collection strategy of 34 purposefully sampled threads from two Australian-based asynchronous online discussion forums. Parents on the discussion forum displayed an understanding of childhood obesity as a public health concern, the discussion incorporated issues such as providing a healthy diet and lifestyle for children. Parents shared their own opinions and experiences that challenged or conceded to the status quo of the discussion. Parents discussed the role of health professionals in obesity prevention. There were varied opinions on the relevance of health professionals, particularly nurses, monitoring of growth and risk of obesity. This exploratory study highlights that parents perceive childhood obesity as an important public health concern, and that they understand the key public health messages of prevention and intervention. Yet, for many it is difficult to successfully implement these messages into their everyday lives. Health professionals need to play a key role in providing non-judgemental, innovative support and advice to parents to successfully implement prevention and intervention strategies.

  12. Key Decision Points in the Careers of Geoscientists: The Role of the YES Network in Facilitating Successful Career Transitions for Early Career Geoscientists (Invited)

    NASA Astrophysics Data System (ADS)

    Venus, J. H.; Gonzales, L. M.; Yes Network

    2010-12-01

    The external influences on the decisions that geoscientists make pertaining to their careers are often assumed but not quantified. The YES Network is conducting an international study to determine the Key Decision points in the career pathways of early career geoscientists. The study aims to identify factors contributing to individual career decisions and to monitor these over a ten year period. The Initial phase of the study is now underway enabling preliminary conclusions to be drawn and will identify a group of individuals that will be tracked over the 10 year programme. The Survey will highlight reoccurring areas where Early Career Geoscientists are experiencing progression difficulties and, importantly, provide respondents with an opportunity to suggest solutions whilst also allowing general resource needs to be identified from the results as a whole. Early results show an overwhelming majority expressing job satisfaction most or all of the time (only 2 candidates reporting none). Respondents rate job satisfaction and respect highly, returning more responses than good salaries. A general frustration with administration, paper work and bureaucracy is particularly evident in those employed by government organisations. Early Career geoscientists express a frustration concerning a lack of involvement in decision making processes; interestingly several later career respondents also acknowledge a need to properly train, nurture and encourage new recruits to retain good graduates who may otherwise become disillusioned and leave the profession. The role of family in career choices has been highlighted both in survey and general feedback responses particularly by female geoscientists and those working in jobs with high levels of fieldwork; we aim to determine, to some extent, to what point these decisions are controlled by family as opposed to normal career progression. Flexible working conditions and agreed time away from field duty have been independently suggested

  13. Point prevalence of neurosis in the Lundby Study 1947-1997.

    PubMed

    Nilsson, Erik; Bogren, Mats; Mattisson, Cecilia; Nettelbladt, Per

    2007-01-01

    The objective of this article is to report and discuss the changing point prevalence rate of neurosis 1947-1997 in the Lundby cohort. The Lundby Study is a prospective longitudinal study of a geographically defined total population in the south of Sweden. Field investigations were performed in 1947, 1957, 1972 and in 1997, with psychiatrists interviewing the probands in a semi-structured way. Additional information was gathered from registers, case notes and key informants. Throughout the period of 50 years, the Lundby Study used its own diagnostic system with neurosis referring to non-psychotic mental illness in the absence of an organic brain disease. After 1957, no newcomers were included, and therefore only probands 40 years of age or older at the cross-sectional surveys are included in the present paper. For men aged 40-59 and 60 years or older, respectively, the age-specific point prevalence of neurosis increased from 2.5% and 0.5% in 1947, to 8.3% and 8.4% in 1972. The corresponding figures for women were 8.0% and 1.3% in 1947, and 24.2% and 20.1% in 1972. The increase could be seen in all degrees of impairment, but it was most pronounced in the mild and medium impairment groups. Except for a slight decrease in point prevalence in the female group 40-59 years of age, there were no significant changes from 1972 to 1997. A large increase in the point prevalence rate of neurosis could be seen 1947-1972, but not 1972-1997. Because of the many biases inherent in longitudinal psychiatric studies, our results must be interpreted with caution.

  14. A discussion of key values to inform the design and delivery of services for HIV-affected women and couples attempting pregnancy in resource-constrained settings

    PubMed Central

    Heffron, Renee; Davies, Natasha; Cooke, Ian; Kaida, Angela; Mergler, Reid; van der Poel, Sheryl; Cohen, Craig R; Mmeje, Okeoma

    2015-01-01

    Introduction HIV-affected women and couples often desire children and many accept HIV risk in order to attempt pregnancy and satisfy goals for a family. Risk reduction strategies to mitigate sexual and perinatal HIV transmission include biomedical and behavioural approaches. Current efforts to integrate HIV and reproductive health services offer prime opportunities to incorporate strategies for HIV risk reduction during pregnancy attempts. Key client and provider values about services to optimize pregnancy in the context of HIV risk provide insights for the design and implementation of large-scale “safer conception” programmes. Discussion Through our collective experience and discussions at a multi-disciplinary international World Health Organization–convened workshop to initiate the development of guidelines and an algorithm of care to support the delivery of services for HIV-affected women and couples attempting pregnancy, we identified four values that are key to the implementation of these programmes: (1) understanding fertility care and an ability to identify potential fertility problems; (2) providing equity of access to resources enabling informed decision-making about reproductive choices; (3) creating enabling environments that reduce stigma associated with HIV and infertility; and (4) creating enabling environments that encourage disclosure of HIV status and fertility status to partners. Based on these values, recommendations for programmes serving HIV-affected women and couples attempting pregnancy include the following: incorporation of comprehensive reproductive health counselling; training to support the transfer and exchange of knowledge between providers and clients; care environments that reduce the stigma of childbearing among HIV-affected women and couples; support for safe and voluntary disclosure of HIV and fertility status; and increased efforts to engage men in reproductive decision-making at times that align with women's desires

  15. Subsequent bilateral comparison to CCT-K3, CIPM key comparison CCT-K3.1: Comparison of standard platinum resistance thermometers at the triple point of water (T = 273.16 K) and at the melting point of gallium (T = 302.9146 K)

    NASA Astrophysics Data System (ADS)

    Picard, S.; Nonis, M.; Solve, S.; Allisy-Roberts, P. J.; Renaot, E.; Martin, C.

    2011-01-01

    A comparison of standard platinum resistance thermometers (SPRTs) has been carried out between the BIPM and the Laboratoire commun de métrologie LNE-CNAM using the melting point of gallium and the triple point of water. The temperature difference at Ga between the BIPM and the LNE-CNAM was determined as 108 µK with an associated combined standard uncertainty of 223 µK. This outcome indicates a present temperature difference of the BIPM of -65 µK with respect to an Average Reference Value from an earlier comparison, with an associated uncertainty of uc = 262 µK. It should be noted that the present BIPM scale is not independent, but traceable to cells used in KC7. The comparison results validate the re-establishment of thermometer calibrations at the BIPM for internal use. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  16. High Points of Human Genetics

    ERIC Educational Resources Information Center

    Stern, Curt

    1975-01-01

    Discusses such high points of human genetics as the study of chromosomes, somatic cell hybrids, the population formula: the Hardy-Weinberg Law, biochemical genetics, the single-active X Theory, behavioral genetics and finally how genetics can serve humanity. (BR)

  17. Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Li, Jun-Lin; Wang, Chuan

    2010-11-01

    A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.

  18. Inferring Models of Bacterial Dynamics toward Point Sources

    PubMed Central

    Jashnsaz, Hossein; Nguyen, Tyler; Petrache, Horia I.; Pressé, Steve

    2015-01-01

    Experiments have shown that bacteria can be sensitive to small variations in chemoattractant (CA) concentrations. Motivated by these findings, our focus here is on a regime rarely studied in experiments: bacteria tracking point CA sources (such as food patches or even prey). In tracking point sources, the CA detected by bacteria may show very large spatiotemporal fluctuations which vary with distance from the source. We present a general statistical model to describe how bacteria locate point sources of food on the basis of stochastic event detection, rather than CA gradient information. We show how all model parameters can be directly inferred from single cell tracking data even in the limit of high detection noise. Once parameterized, our model recapitulates bacterial behavior around point sources such as the “volcano effect”. In addition, while the search by bacteria for point sources such as prey may appear random, our model identifies key statistical signatures of a targeted search for a point source given any arbitrary source configuration. PMID:26466373

  19. Holographic definition of points and distances

    NASA Astrophysics Data System (ADS)

    Czech, Bartłomiej; Lamprou, Lampros

    2014-11-01

    We discuss the way in which field theory quantities assemble the spatial geometry of three-dimensional anti-de Sitter space (AdS3). The field theory ingredients are the entanglement entropies of boundary intervals. A point in AdS3 corresponds to a collection of boundary intervals which is selected by a variational principle we discuss. Coordinates in AdS3 are integration constants of the resulting equation of motion. We propose a distance function for this collection of points, which obeys the triangle inequality as a consequence of the strong subadditivity of entropy. Our construction correctly reproduces the static slice of AdS3 and the Ryu-Takayanagi relation between geodesics and entanglement entropies. We discuss how these results extend to quotients of AdS3 —the conical defect and the BTZ geometries. In these cases, the set of entanglement entropies must be supplemented by other field theory quantities, which can carry the information about lengths of nonminimal geodesics.

  20. Progress in satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bedington, Robert; Arrazola, Juan Miguel; Ling, Alexander

    2017-08-01

    Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world.

  1. The Presidential Image: Key to Effective Leadership.

    ERIC Educational Resources Information Center

    Whisnant, W. Terry

    1990-01-01

    Discusses the use of the community college president's image (e.g., behavior, dress, and mannerisms) to enhance leadership in times of limited resources and declining enrollments. Describes the qualities of trust, good judgement, and expertise as keys to an image that effectively involves followers and constituents in implementing presidential…

  2. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  3. Non-unique key B-Tree implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ries, D.R.

    1980-12-23

    The B-Trees are an indexed method to allow fast retrieval and order preserving updates to a FRAMIS relation based on a designated set of keys in the relation. A B-Tree access method is being implemented to provide indexed and sequential (in index order) access to FRAMIS relations. The implementation modifies the basic B-Tree structure to correctly allow multiple key values and still maintain the balanced page fill property of B-Trees. The data structures of the B-Tree are presented first, including the FRAMIS solution to the duplicate key value problem. Then the access level routines and utilities are presented. These routinesmore » include the original B-Tree creation; searching the B-Tree; and inserting, deleting, and replacing tuples on the B-Tree. In conclusion, the uses of the B-Tree access structures at the semantic level to enhance the FRAMIS performance are discussed. 10 figures.« less

  4. Pilot points method for conditioning multiple-point statistical facies simulation on flow data

    NASA Astrophysics Data System (ADS)

    Ma, Wei; Jafarpour, Behnam

    2018-05-01

    We propose a new pilot points method for conditioning discrete multiple-point statistical (MPS) facies simulation on dynamic flow data. While conditioning MPS simulation on static hard data is straightforward, their calibration against nonlinear flow data is nontrivial. The proposed method generates conditional models from a conceptual model of geologic connectivity, known as a training image (TI), by strategically placing and estimating pilot points. To place pilot points, a score map is generated based on three sources of information: (i) the uncertainty in facies distribution, (ii) the model response sensitivity information, and (iii) the observed flow data. Once the pilot points are placed, the facies values at these points are inferred from production data and then are used, along with available hard data at well locations, to simulate a new set of conditional facies realizations. While facies estimation at the pilot points can be performed using different inversion algorithms, in this study the ensemble smoother (ES) is adopted to update permeability maps from production data, which are then used to statistically infer facies types at the pilot point locations. The developed method combines the information in the flow data and the TI by using the former to infer facies values at selected locations away from the wells and the latter to ensure consistent facies structure and connectivity where away from measurement locations. Several numerical experiments are used to evaluate the performance of the developed method and to discuss its important properties.

  5. Low-cost manufacturing of the point focus concentrating module and its key component, the Fresnel lens. Final subcontract report, 31 January 1991--6 May 1991

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saifee, T.; Konnerth, A. III

    1991-11-01

    Solar Kinetics, Inc. (SKI) has been developing point-focus concentrating PV modules since 1986. SKI is currently in position to manufacture between 200 to 600 kilowatts annually of the current design by a combination of manual and semi-automated methods. This report reviews the current status of module manufacture and specifies the required approach to achieve a high-volume manufacturing capability and low cost. The approach taken will include process development concurrent with module design for automated manufacturing. The current effort reviews the major manufacturing costs and identifies components and processes whose improvements would produce the greatest effect on manufacturability and cost reduction.more » The Fresnel lens is one such key component. Investigating specific alternative manufacturing methods and sources has substantially reduced the lens costs and has exceeded the DOE cost-reduction goals. 15 refs.« less

  6. Autoshaping and automaintenance of a key-press response in squirrel monkeys.

    PubMed

    Gamzu, E; Schwam, E

    1974-03-01

    Following exposure for a minimum of 500 to 600 trials, three of four naive squirrel monkeys eventually pressed a response key, illumination of which always preceded delivery of a food pellet. Three other naive monkeys did not press the key when the pellets were delivered randomly with respect to key illumination. Despite some similarities to autoshaping using pigeons, the data indicate many points of difference when squirrel monkeys are used as subjects. Although key-food pairings were shown to be important in the acquisition of the key-press response, they were ineffective in maintaining the response when either a negative response-reinforcer dependency was introduced, or when there was no scheduled response-reinforcer dependency (fixed trial). Not all demonstrations of autoshaping can be considered to be under the control of those processes that are primarily responsible for the phenomena obtained in pigeons.

  7. Halfway point of the one year mission on This Week @NASA – September 18, 2015

    NASA Image and Video Library

    2015-09-18

    Sept. 15 marked the halfway point in the yearlong mission on the International Space Station with NASA astronaut Scott Kelly and Russian cosmonaut Mikhail Kornienko. An event the day before at the National Press Club in Washington included a discussion about the biomedical research conducted on the station, to help formulate future human missions to Mars. Kelly participated from the space station. His identical twin, retired NASA astronaut Mark Kelly, and NASA astronaut Terry Virts, who served as commander of Expedition 43, participated from the press club. Also, I spy the space station: Live!, Expedition 43 post-flight visit, Key milestone for Orion spacecraft, Global ocean on Enceladus, Connecting space to village and more!

  8. Panel Discussion Vi: Cosmology

    NASA Astrophysics Data System (ADS)

    Anderson, E.; Dolgov, A.; Crothers, S.; Mitra, A.; Rubakov, V.; Zakharov, A.

    2014-03-01

    Questions to discuss: * To what extent are Dark Matter and Dark Energy necessary to explain the observed properties of the Universe? * Why are the Dark matter profiles so universal at the galactic scales? * Are there viable candidates of modified gravitational dynamics to exclude the dark components of Universe? * Do we have any perspectives to distinguish the Dark Energy from the cosmological constant? * Are there any certain indications for sterile neutrinos in the cosmos? * How does the Planck data change the view of inflation in the early Universe? What could be the origin of the inflaton plateau? So far, what else is interesting about the Planck data? * What are the nearest crucial points in cosmological observations? * Can we be more decisive discriminating between the anthropic principle, the superstringy landscape, fine tuning or dynamics as reasons for the cosmological coincidences?

  9. The Artist's View of Points and Lines.

    ERIC Educational Resources Information Center

    Millman, Richard S.; Speranza, Ramona R.

    1991-01-01

    Presented is the idea that art can be used to present early concepts of geometry, including the notion of the infinite. Discussed is the symbiosis that exists between the artistic and mathematical views of points, lines, and planes. Geometric models in art and using art in the classroom are discussed. (KR)

  10. Fundamental quantitative security in quantum key generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less

  11. Genetic data and electronic health records: a discussion of ethical, logistical and technological considerations

    PubMed Central

    Shoenbill, Kimberly; Fost, Norman; Tachinardi, Umberto; Mendonca, Eneida A

    2014-01-01

    Objective The completion of sequencing the human genome in 2003 has spurred the production and collection of genetic data at ever increasing rates. Genetic data obtained for clinical purposes, as is true for all results of clinical tests, are expected to be included in patients’ medical records. With this explosion of information, questions of what, when, where and how to incorporate genetic data into electronic health records (EHRs) have reached a critical point. In order to answer these questions fully, this paper addresses the ethical, logistical and technological issues involved in incorporating these data into EHRs. Materials and methods This paper reviews journal articles, government documents and websites relevant to the ethics, genetics and informatics domains as they pertain to EHRs. Results and discussion The authors explore concerns and tasks facing health information technology (HIT) developers at the intersection of ethics, genetics, and technology as applied to EHR development. Conclusions By ensuring the efficient and effective incorporation of genetic data into EHRs, HIT developers will play a key role in facilitating the delivery of personalized medicine. PMID:23771953

  12. A Point System Approach to Secondary Classroom Management

    ERIC Educational Resources Information Center

    Xenos, Anthony J.

    2012-01-01

    This article presents guiding principles governing the design, implementation, and management of a point system to promote discipline and academic rigor in a secondary classroom. Four considerations are discussed: (1) assigning appropriate point values to integral classroom behaviors and tasks; (2) determining the relationship among consequences,…

  13. A new approach for automatic matching of ground control points in urban areas from heterogeneous images

    NASA Astrophysics Data System (ADS)

    Cong, Chao; Liu, Dingsheng; Zhao, Lingjun

    2008-12-01

    This paper discusses a new method for the automatic matching of ground control points (GCPs) between satellite remote sensing Image and digital raster graphic (DRG) in urban areas. The key of this method is to automatically extract tie point pairs according to geographic characters from such heterogeneous images. Since there are big differences between such heterogeneous images respect to texture and corner features, more detail analyzations are performed to find similarities and differences between high resolution remote sensing Image and (DRG). Furthermore a new algorithms based on the fuzzy-c means (FCM) method is proposed to extract linear feature in remote sensing Image. Based on linear feature, crossings and corners extracted from these features are chosen as GCPs. On the other hand, similar method was used to find same features from DRGs. Finally, Hausdorff Distance was adopted to pick matching GCPs from above two GCP groups. Experiences shown the method can extract GCPs from such images with a reasonable RMS error.

  14. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  15. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    NASA Astrophysics Data System (ADS)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  16. JGME-ALiEM Hot Topics in Medical Education Online Journal Club: An Analysis of a Virtual Discussion About Resident Teachers.

    PubMed

    Sherbino, Jonathan; Joshi, Nikita; Lin, Michelle

    2015-09-01

    In health professionals' education, senior learners play a key role in the teaching of junior colleagues. We describe an online discussion about residents as teachers to highlight the topic and the online journal club medium. In January 2015, the Journal of Graduate Medical Education (JGME) and the Academic Life in Emergency Medicine blog facilitated an open-access, online, weeklong journal club on the JGME article "What Makes a Great Resident Teacher? A Multicenter Survey of Medical Students Attending an Internal Medicine Conference." Social media platforms used to promote asynchronous discussions included a blog, a video discussion via Google Hangouts on Air, and Twitter. We performed a thematic analysis of the discussion. Web analytics were captured as a measure of impact. The blog post garnered 1324 page views from 372 cities in 42 countries. Twitter was used to endorse discussion points, while blog comments provided opinions or responded to an issue. The discussion focused on why resident feedback was devalued by medical students. Proposed explanations included feedback not being labeled as such, the process of giving delivery, the source of feedback, discrepancies with self-assessment, and threats to medical student self-image. The blog post resulted in a crowd-sourced repository of resident teacher resources. An online journal club provides a novel discussion forum across multiple social media platforms to engage authors, content experts, and the education community. Crowd-sourced analysis of the resident teacher role suggests that resident feedback to medical students is important, and barriers to student acceptance of feedback can be overcome.

  17. JGME-ALiEM Hot Topics in Medical Education Online Journal Club: An Analysis of a Virtual Discussion About Resident Teachers

    PubMed Central

    Sherbino, Jonathan; Joshi, Nikita; Lin, Michelle

    2015-01-01

    Background  In health professionals' education, senior learners play a key role in the teaching of junior colleagues. Objective  We describe an online discussion about residents as teachers to highlight the topic and the online journal club medium. Methods  In January 2015, the Journal of Graduate Medical Education (JGME) and the Academic Life in Emergency Medicine blog facilitated an open-access, online, weeklong journal club on the JGME article “What Makes a Great Resident Teacher? A Multicenter Survey of Medical Students Attending an Internal Medicine Conference.” Social media platforms used to promote asynchronous discussions included a blog, a video discussion via Google Hangouts on Air, and Twitter. We performed a thematic analysis of the discussion. Web analytics were captured as a measure of impact. Results  The blog post garnered 1324 page views from 372 cities in 42 countries. Twitter was used to endorse discussion points, while blog comments provided opinions or responded to an issue. The discussion focused on why resident feedback was devalued by medical students. Proposed explanations included feedback not being labeled as such, the process of giving delivery, the source of feedback, discrepancies with self-assessment, and threats to medical student self-image. The blog post resulted in a crowd-sourced repository of resident teacher resources. Conclusions  An online journal club provides a novel discussion forum across multiple social media platforms to engage authors, content experts, and the education community. Crowd-sourced analysis of the resident teacher role suggests that resident feedback to medical students is important, and barriers to student acceptance of feedback can be overcome. PMID:26457152

  18. The High/Scope Preschool Key Experiences: Essential Elements of Young Children's Learning.

    ERIC Educational Resources Information Center

    Hohmann, Mary

    2002-01-01

    Discusses High/Scope's preschool key experiences (a set of 58 statements that describe young children's social, cognitive, and physical development). The key experiences are grouped into 10 major developmental areas (creative representation, language and literacy, social relations, movement, music, classification, seriation, number, space, and…

  19. Autoshaping and automaintenance of a key-press response in squirrel monkeys

    PubMed Central

    Gamzu, Elkan; Schwam, Elias

    1974-01-01

    Following exposure for a minimum of 500 to 600 trials, three of four naive squirrel monkeys eventually pressed a response key, illumination of which always preceded delivery of a food pellet. Three other naive monkeys did not press the key when the pellets were delivered randomly with respect to key illumination. Despite some similarities to autoshaping using pigeons, the data indicate many points of difference when squirrel monkeys are used as subjects. Although key-food pairings were shown to be important in the acquisition of the key-press response, they were ineffective in maintaining the response when either a negative response-reinforcer dependency was introduced, or when there was no scheduled response-reinforcer dependency (fixed trial). Not all demonstrations of autoshaping can be considered to be under the control of those processes that are primarily responsible for the phenomena obtained in pigeons. PMID:16811749

  20. Graphene Dirac point tuned by ferroelectric polarization field

    NASA Astrophysics Data System (ADS)

    Wang, Xudong; Chen, Yan; Wu, Guangjian; Wang, Jianlu; Tian, Bobo; Sun, Shuo; Shen, Hong; Lin, Tie; Hu, Weida; Kang, Tingting; Tang, Minghua; Xiao, Yongguang; Sun, Jinglan; Meng, Xiangjian; Chu, Junhao

    2018-04-01

    Graphene has received numerous attention for future nanoelectronics and optoelectronics. The Dirac point is a key parameter of graphene that provides information about its carrier properties. There are lots of methods to tune the Dirac point of graphene, such as chemical doping, impurities, defects, and disorder. In this study, we report a different approach to tune the Dirac point of graphene using a ferroelectric polarization field. The Dirac point can be adjusted to near the ferroelectric coercive voltage regardless its original position. We have ensured this phenomenon by temperature-dependent experiments, and analyzed its mechanism with the theory of impurity correlation in graphene. Additionally, with the modulation of ferroelectric polymer, the current on/off ratio and mobility of graphene transistor both have been improved. This work provides an effective method to tune the Dirac point of graphene, which can be readily used to configure functional devices such as p-n junctions and inverters.

  1. The power of PowerPoint.

    PubMed

    Niamtu , J

    2001-08-01

    Carousel slide presentations have been used for academic and clinical presentations since the late 1950s. However, advances in computer technology have caused a paradigm shift, and digital presentations are quickly becoming standard for clinical presentations. The advantages of digital presentations include cost savings; portability; easy updating capability; Internet access; multimedia functions, such as animation, pictures, video, and sound; and customization to augment audience interest and attention. Microsoft PowerPoint has emerged as the most popular digital presentation software and is currently used by many practitioners with and without significant computer expertise. The user-friendly platform of PowerPoint enables even the novice presenter to incorporate digital presentations into his or her profession. PowerPoint offers many advanced options that, with a minimal investment of time, can be used to create more interactive and professional presentations for lectures, patient education, and marketing. Examples of advanced PowerPoint applications are presented in a stepwise manner to unveil the full power of PowerPoint. By incorporating these techniques, medical practitioners can easily personalize, customize, and enhance their PowerPoint presentations. Complications, pitfalls, and caveats are discussed to detour and prevent misadventures in digital presentations. Relevant Web sites are listed to further update, customize, and communicate PowerPoint techniques.

  2. Adaptive spatial filtering of daytime sky noise in a satellite quantum key distribution downlink receiver

    NASA Astrophysics Data System (ADS)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2016-02-01

    Spatial filtering is an important technique for reducing sky background noise in a satellite quantum key distribution downlink receiver. Atmospheric turbulence limits the extent to which spatial filtering can reduce sky noise without introducing signal losses. Using atmospheric propagation and compensation simulations, the potential benefit of adaptive optics (AO) to secure key generation (SKG) is quantified. Simulations are performed assuming optical propagation from a low-Earth-orbit satellite to a terrestrial receiver that includes AO. Higher-order AO correction is modeled assuming a Shack-Hartmann wavefront sensor and a continuous-face-sheet deformable mirror. The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain wave-optics hardware emulator. SKG rates are calculated for a decoy-state protocol as a function of the receiver field of view for various strengths of turbulence, sky radiances, and pointing angles. The results show that at fields of view smaller than those discussed by others, AO technologies can enhance SKG rates in daylight and enable SKG where it would otherwise be prohibited as a consequence of background optical noise and signal loss due to propagation and turbulence effects.

  3. Interior-Point Methods for Linear Programming: A Review

    ERIC Educational Resources Information Center

    Singh, J. N.; Singh, D.

    2002-01-01

    The paper reviews some recent advances in interior-point methods for linear programming and indicates directions in which future progress can be made. Most of the interior-point methods belong to any of three categories: affine-scaling methods, potential reduction methods and central path methods. These methods are discussed together with…

  4. Key papers in prostate cancer.

    PubMed

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  5. Data publication and dissemination of interactive keys under the open access model

    USDA-ARS?s Scientific Manuscript database

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  6. Discussion and a new method of optical cryptosystem based on interference

    NASA Astrophysics Data System (ADS)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A discussion and an objective security analysis of the well-known optical image encryption based on interference are presented in this paper. A new method is also proposed to eliminate the security risk of the original cryptosystem. For a possible practical application, we expand this new method into a hierarchical authentication scheme. In this authentication system, with a pre-generated and fixed random phase lock, different target images indicating different authentication levels are analytically encoded into corresponding phase-only masks (phase keys) and amplitude-only masks (amplitude keys). For the authentication process, a legal user can obtain a specified target image at the output plane if his/her phase key, and amplitude key, which should be settled close against the fixed internal phase lock, are respectively illuminated by two coherent beams. By comparing the target image with all the standard certification images in the database, the system can thus verify the user's legality even his/her identity level. Moreover, in despite of the internal phase lock of this system being fixed, the crosstalk between different pairs of keys held by different users is low. Theoretical analysis and numerical simulation are both provided to demonstrate the validity of this method.

  7. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  8. Reflections on Documentation: A Discussion with Thought Leaders from Reggio Emilia

    ERIC Educational Resources Information Center

    Turner, Terri; Wilson, Daniel Gray

    2010-01-01

    This article presents the voices of three central thinkers in the documentation movement in a round-table discussion that explores the key questions regarding the definition of documentation, common misunderstandings of the strategy, lessons that have emerged over decades of documenting in various contexts, and puzzles that are emerging for the…

  9. Seeking fixed points in multiple coupling scalar theories in the ɛ expansion

    NASA Astrophysics Data System (ADS)

    Osborn, Hugh; Stergiou, Andreas

    2018-05-01

    Fixed points for scalar theories in 4 - ɛ, 6 - ɛ and 3 - ɛ dimensions are discussed. It is shown how a large range of known fixed points for the four dimensional case can be obtained by using a general framework with two couplings. The original maximal symmetry, O( N), is broken to various subgroups, both discrete and continuous. A similar discussion is applied to the six dimensional case. Perturbative applications of the a-theorem are used to help classify potential fixed points. At lowest order in the ɛ-expansion it is shown that at fixed points there is a lower bound for a which is saturated at bifurcation points.

  10. Point-of-Care Diagnostics for Niche Applications

    PubMed Central

    Cummins, Brian M.; Ligler, Frances S.; Walker, Glenn M.

    2016-01-01

    Point-of-care or point-of-use diagnostics are analytical devices that provide clinically relevant information without the need for a core clinical laboratory. In this review we define point-of-care diagnostics as portable versions of assays performed in a traditional clinical chemistry laboratory. This review discusses five areas relevant to human and animal health where increased attention could produce significant impact: veterinary medicine, space travel, sports medicine, emergency medicine, and operating room efficiency. For each of these areas, clinical need, available commercial products, and ongoing research into new devices are highlighted. PMID:26837054

  11. Discussing disease progression and end-of-life decisions.

    PubMed

    Baile, W F; Glober, G A; Lenzi, R; Beale, E A; Kudelka, A P

    1999-07-01

    Because most patients now want to know the truth about their diagnosis and prognosis, the ability to discuss the cancer diagnosis, disease recurrence, or treatment failure, and to solicit patients' views about resuscitation or hospice care, are important verbal skills for oncologists and other oncology health care providers. Moreover, the ability to clearly articulate a treatment plan or elicit patient preferences for treatment are a prerequisite to informed consent. Despite these imperatives, clinicians do not routinely receive training in key communication skills that could enable them to accomplish these tasks. A body of literature is available, however, that identifies communication strategies that can (1) facilitate the establishment of a close rapport with the patient, (2) identify the patient's information preferences, (3) ensure comprehension of key knowledge and information, (4) address the patient's emotions in a supportive fashion, (5) elicit the patient's key concerns, and (6) involve the patient in the treatment plan. In this article, we use dialogues between a physician and a hypothetical patient with advanced ovarian cancer to illustrate how communication techniques can be applied to accomplish these goals. We identify important benefits of the use of these techniques for both the physician and patient, and pose several questions regarding the training of physicians in this area.

  12. Institutional Research: The Key to Successful Enrollment Management.

    ERIC Educational Resources Information Center

    Clagett, Craig A.

    Enrollment management includes the processes and activities that influence the size, shape, and characteristics of a student body by directing institutional efforts in marketing, recruitment, admissions, pricing, and financial aid. Institutional research plays an essential, if not the key, role in enrollment management. This report discusses the…

  13. Entropy Driven Self-Assembly in Charged Lock-Key Particles.

    PubMed

    Odriozola, Gerardo; Lozada-Cassou, Marcelo

    2016-07-07

    In this work we study the lock-key model successfully used in supramolecular chemistry and particles self-assembly and gain further insight into the infinite diluted limit of the lock and key, depletant mediated, effective attraction. We discuss the depletant forces and entropy approaches to self-assembly and give details on the different contributions to the net force for a charged lock and key pair immersed in a solvent plus a primitive model electrolyte. We show a strong correlation of the force components behavior and the underlying processes of co-ion and solvent release from the cavity. In addition, we put into context the universal behavior observed for the energy-distance curves when changing the lock and key to solvent size ratio. Basically, we now show that this behavior is not always achieved and depends on the particular system geometry. Finally, we present a qualitative good agreement with experiments when changing the electrolyte concentration, valence, and cavity-key size ratio.

  14. The Future of Government Funding for Persons with Disabilities: Some Key Factors.

    ERIC Educational Resources Information Center

    Ross, E. Clarke

    1980-01-01

    The paper identifies and discusses key factors associated with government funding for disabled individuals. An introductory section traces the growth of public expenditures in recent years. Five key factors affecting government funding are examined (sample subtopics in parentheses): state government tax and spending limits (Proposition 13 and the…

  15. X-ray Point Source Populations in Spiral and Elliptical Galaxies

    NASA Astrophysics Data System (ADS)

    Colbert, E.; Heckman, T.; Weaver, K.; Ptak, A.; Strickland, D.

    2001-12-01

    In the years of the Einstein and ASCA satellites, it was known that the total hard X-ray luminosity from non-AGN galaxies was fairly well correlated with the total blue luminosity. However, the origin of this hard component was not well understood. Some possibilities that were considered included X-ray binaries, extended upscattered far-infrared light via the inverse-Compton process, extended hot 107 K gas (especially in ellipitical galaxies), or even an active nucleus. Now, for the first time, we know from Chandra images that a significant amount of the total hard X-ray emission comes from individual X-ray point sources. We present here spatial and spectral analyses of Chandra data for X-ray point sources in a sample of ~40 galaxies, including both spiral galaxies (starbursts and non-starbursts) and elliptical galaxies. We shall discuss the relationship between the X-ray point source population and the properties of the host galaxies. We show that the slopes of the point-source X-ray luminosity functions are different for different host galaxy types and discuss possible reasons why. We also present detailed X-ray spectral analyses of several of the most luminous X-ray point sources (i.e., IXOs, a.k.a. ULXs), and discuss various scenarios for the origin of the X-ray point sources.

  16. Points of Equilibrium in Electrostatic Fields.

    ERIC Educational Resources Information Center

    Rogers, Peter J.

    1979-01-01

    Discusses the electric field line pattern for four equal charges of the same sign placed at the corners of a square. The electric field intensity and the point of equilibrium are interpreted, taking into account three dimensions. (HM)

  17. Present and future free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.; Peterson, C. Glen; Wipf, Christopher C.

    2002-04-01

    Free-space quantum key distribution (QKD), more popularly know as quantum cryptography, uses single-photon free-space optical communications to distribute the secret keys required for secure communications. At Los Alamos National Laboratory we have demonstrated a fully automated system that is capable of operations at any time of day over a horizontal range of several kilometers. This has proven the technology is capable of operation from a spacecraft to the ground, opening up the possibility of QKD between any group of users anywhere on Earth. This system, the prototyping of a new system for use on a spacecraft, and the techniques required for world-wide quantum key distribution will be described. The operational parameters and performance of a system designed to operate between low earth orbit (LEO) and the ground will also be discussed.

  18. Food-packaging migration models: A critical discussion.

    PubMed

    Gavriil, Gavriil; Kanavouras, Antonis; Coutelieris, Frank A

    2017-06-14

    The widely accepted and used migration models that describe the mass transport from polymeric packaging material to food and food simulants are confirmed here. A critical review of the most accepted models is presented in detail. Their main advantages and weak points, regarding their predictive accuracy, are discussed and weighted toward their usage extensiveness. By identifying the specific areas where using such models may not provide a strong correlation between theoretical and actual results, this work also aims in outlining some particular directions regarding further research on food - packaging interactions.

  19. Best interests of adults who lack capacity part 2: key considerations.

    PubMed

    Griffith, Richard

    Last month's article discussed the key concepts underpinning the notion of best interests. In this article the author discusses the requirements for determining the best interests of an adult who lacks capacity under the provisions of the Mental Capacity Act 2005 and its code of practice (Department for Constitutional Affairs 2007).

  20. What Is the Boiling Point and Heat of Vaporization of Sulfuric Acid?

    ERIC Educational Resources Information Center

    Myers, R. Thomas

    1983-01-01

    Discusses the values presented in various handbooks for the boiling point and heat of vaporization of sulfuric acid, noting discrepencies. Analyzes various approaches to data presentation, discussing the data on sulfuric acid in light of the Trouton constant. Points out the need for a more critical use of tables. (JM)

  1. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  2. Russian Quality Assessment System in Education: Key Lessons

    ERIC Educational Resources Information Center

    Bolotov, V.; Valdman, I.; Kovaleva, G.; Pinskaya, M.

    2015-01-01

    This article examines key lessons learned by Russia while developing national assessment system in education. It shows that reforms are more likely to succeed backed with sustained political support, clearly defined goals or priorities, gradual introduction, and open discussion with stakeholders. [This article was translated by Lucy Gunderson.

  3. N-point functions in rolling tachyon background

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jokela, Niko; Keski-Vakkuri, Esko; Department of Physics, P.O. Box 64, FIN-00014, University of Helsinki

    2009-04-15

    We study n-point boundary correlation functions in timelike boundary Liouville theory, relevant for open string multiproduction by a decaying unstable D brane. We give an exact result for the one-point function of the tachyon vertex operator and show that it is consistent with a previously proposed relation to a conserved charge in string theory. We also discuss when the one-point amplitude vanishes. Using a straightforward perturbative expansion, we find an explicit expression for a tachyon n-point amplitude for all n, however the result is still a toy model. The calculation uses a new asymptotic approximation for Toeplitz determinants, derived bymore » relating the system to a Dyson gas at finite temperature.« less

  4. Beaconless Pointing for Deep-Space Optical Communication

    NASA Technical Reports Server (NTRS)

    Swank, Aaron J.; Aretskin-Hariton, Eliot; Le, Dzu K.; Sands, Obed S.; Wroblewski, Adam

    2016-01-01

    Free space optical communication is of interest to NASA as a complement to existing radio frequency communication methods. The potential for an increase in science data return capability over current radio-frequency communications is the primary objective. Deep space optical communication requires laser beam pointing accuracy on the order of a few microradians. The laser beam pointing approach discussed here operates without the aid of a terrestrial uplink beacon. Precision pointing is obtained from an on-board star tracker in combination with inertial rate sensors and an outgoing beam reference vector. The beaconless optical pointing system presented in this work is the current approach for the Integrated Radio and Optical Communication (iROC) project.

  5. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan

    Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.

  6. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following:more » 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.« less

  7. Fermion-induced quantum critical points.

    PubMed

    Li, Zi-Xiang; Jiang, Yi-Fan; Jian, Shao-Kai; Yao, Hong

    2017-08-22

    A unified theory of quantum critical points beyond the conventional Landau-Ginzburg-Wilson paradigm remains unknown. According to Landau cubic criterion, phase transitions should be first-order when cubic terms of order parameters are allowed by symmetry in the Landau-Ginzburg free energy. Here, from renormalization group analysis, we show that second-order quantum phase transitions can occur at such putatively first-order transitions in interacting two-dimensional Dirac semimetals. As such type of Landau-forbidden quantum critical points are induced by gapless fermions, we call them fermion-induced quantum critical points. We further introduce a microscopic model of SU(N) fermions on the honeycomb lattice featuring a transition between Dirac semimetals and Kekule valence bond solids. Remarkably, our large-scale sign-problem-free Majorana quantum Monte Carlo simulations show convincing evidences of a fermion-induced quantum critical points for N = 2, 3, 4, 5 and 6, consistent with the renormalization group analysis. We finally discuss possible experimental realizations of the fermion-induced quantum critical points in graphene and graphene-like materials.Quantum phase transitions are governed by Landau-Ginzburg theory and the exceptions are rare. Here, Li et al. propose a type of Landau-forbidden quantum critical points induced by gapless fermions in two-dimensional Dirac semimetals.

  8. Ubiquitous Discussion Forum: Introducing Mobile Phones and Voice Discussion into a Web Discussion Forum

    ERIC Educational Resources Information Center

    Wei, Fu-Hsiang; Chen, Gwo-Dong; Wang, Chin-Yeh; Li, Liang-Yi

    2007-01-01

    Web-based discussion forums enable users to share knowledge in straightforward and popular platforms. However, discussion forums have several problems, such as the lack of immediate delivery and response, the heavily text-based medium, inability to hear expressions of voice and the heuristically created discussion topics which can impede the…

  9. Assimilating Flow Data into Complex Multiple-Point Statistical Facies Models Using Pilot Points Method

    NASA Astrophysics Data System (ADS)

    Ma, W.; Jafarpour, B.

    2017-12-01

    We develop a new pilot points method for conditioning discrete multiple-point statistical (MPS) facies simulation on dynamic flow data. While conditioning MPS simulation on static hard data is straightforward, their calibration against nonlinear flow data is nontrivial. The proposed method generates conditional models from a conceptual model of geologic connectivity, known as a training image (TI), by strategically placing and estimating pilot points. To place pilot points, a score map is generated based on three sources of information:: (i) the uncertainty in facies distribution, (ii) the model response sensitivity information, and (iii) the observed flow data. Once the pilot points are placed, the facies values at these points are inferred from production data and are used, along with available hard data at well locations, to simulate a new set of conditional facies realizations. While facies estimation at the pilot points can be performed using different inversion algorithms, in this study the ensemble smoother (ES) and its multiple data assimilation variant (ES-MDA) are adopted to update permeability maps from production data, which are then used to statistically infer facies types at the pilot point locations. The developed method combines the information in the flow data and the TI by using the former to infer facies values at select locations away from the wells and the latter to ensure consistent facies structure and connectivity where away from measurement locations. Several numerical experiments are used to evaluate the performance of the developed method and to discuss its important properties.

  10. Data Linkage in VET Research: Opportunities, Challenges and Principles. Discussion Paper

    ERIC Educational Resources Information Center

    Osborne, Kristen; Fowler, Craig; Circelli, Michelle

    2018-01-01

    This discussion paper explores the possibilities and risks that data linkage presents for the vocational education and training (VET) sector. Along with a broad overview of the nature of data linkage, it highlights possible applications for data linkage in the VET sector and examines the key challenges associated with its use. A number of case…

  11. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  12. Using Google Blogs and Discussions to Recommend Biomedical Resources: A Case Study

    PubMed Central

    Reed, Robyn B.; Chattopadhyay, Ansuman; Iwema, Carrie L.

    2013-01-01

    This case study investigated whether data gathered from discussions within the social media provide a reliable basis for a biomedical resources recommendation system. Using a search query to mine text from Google Blogs and Discussions, a ranking of biomedical resources was determined based on those most frequently mentioned. To establish quality, these results were compared to rankings by subject experts. An overall agreement between the frequency of social media discussions and subject expert recommendations was observed when identifying key bioinformatics and consumer health resources. Testing the method in more than one biomedical area implies this procedure could be employed across different subjects. PMID:24180648

  13. Focus in Grade 8: Teaching with Curriculum Focal Points

    ERIC Educational Resources Information Center

    Schielack, Jane

    2010-01-01

    This book describes and illustrates learning paths for the mathematical concepts and skills of each grade 8 Focal Point as presented in Curriculum Focal Points for Prekindergarten through Grade 8 Mathematics. It includes representational supports for teaching and learning that can facilitate understanding, stimulate productive discussions about…

  14. Point-cloud-to-point-cloud technique on tool calibration for dental implant surgical path tracking

    NASA Astrophysics Data System (ADS)

    Lorsakul, Auranuch; Suthakorn, Jackrit; Sinthanayothin, Chanjira

    2008-03-01

    Dental implant is one of the most popular methods of tooth root replacement used in prosthetic dentistry. Computerize navigation system on a pre-surgical plan is offered to minimize potential risk of damage to critical anatomic structures of patients. Dental tool tip calibrating is basically an important procedure of intraoperative surgery to determine the relation between the hand-piece tool tip and hand-piece's markers. With the transferring coordinates from preoperative CT data to reality, this parameter is a part of components in typical registration problem. It is a part of navigation system which will be developed for further integration. A high accuracy is required, and this relation is arranged by point-cloud-to-point-cloud rigid transformations and singular value decomposition (SVD) for minimizing rigid registration errors. In earlier studies, commercial surgical navigation systems from, such as, BrainLAB and Materialize, have flexibility problem on tool tip calibration. Their systems either require a special tool tip calibration device or are unable to change the different tool. The proposed procedure is to use the pointing device or hand-piece to touch on the pivot and the transformation matrix. This matrix is calculated every time when it moves to the new position while the tool tip stays at the same point. The experiment acquired on the information of tracking device, image acquisition and image processing algorithms. The key success is that point-to-point-cloud requires only 3 post images of tool to be able to converge to the minimum errors 0.77%, and the obtained result is correct in using the tool holder to track the path simulation line displayed in graphic animation.

  15. Point-of-care diagnostics for niche applications.

    PubMed

    Cummins, Brian M; Ligler, Frances S; Walker, Glenn M

    2016-01-01

    Point-of-care or point-of-use diagnostics are analytical devices that provide clinically relevant information without the need for a core clinical laboratory. In this review we define point-of-care diagnostics as portable versions of assays performed in a traditional clinical chemistry laboratory. This review discusses five areas relevant to human and animal health where increased attention could produce significant impact: veterinary medicine, space travel, sports medicine, emergency medicine, and operating room efficiency. For each of these areas, clinical need, available commercial products, and ongoing research into new devices are highlighted. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Aerospace laser communications technology as enabler for worldwide quantum key distribution

    NASA Astrophysics Data System (ADS)

    Moll, Florian; Weinfurter, Harald; Rau, Markus; Schmidt, Christopher; Melén, Gwen; Vogl, Tobias; Nauerth, Sebastian; Fuchs, Christian

    2016-04-01

    A worldwide growing interest in fast and secure data communications pushes technology development along two lines. While fast communications can be realized using laser communications in fiber and free-space, inherently secure communications can be achieved using quantum key distribution (QKD). By combining both technologies in a single device, many synergies can be exploited, therefore reducing size, weight and power of future systems. In recent experiments we demonstrated quantum communications over large distances as well as between an aircraft and a ground station which proved the feasibility of QKD between moving partners. Satellites thus may be used as trusted nodes in combination with QKD receiver stations on ground, thereby enabling fast and secure communications on a global scale. We discuss the previous experiment with emphasis on necessary developments to be done and corresponding ongoing research work of German Aerospace Center (DLR) and Ludwig Maximilians University Munich (LMU). DLR is performing research on satellite and ground terminals for the high-rate laser communication component, which are enabling technologies for the QKD link. We describe the concept and hardware of three generations of OSIRIS (Optical High Speed Infrared Link System) laser communication terminals for low Earth orbiting satellites. The first type applies laser beam pointing solely based on classical satellite control, the second uses an optical feedback to the satellite bus and the third, currently being in design phase, comprises of a special coarse pointing assembly to control beam direction independent of satellite orientation. Ongoing work also targets optical terminals for CubeSats. A further increase of beam pointing accuracy can be achieved with a fine pointing assembly. Two ground stations will be available for future testing, an advanced stationary ground station and a transportable ground station. In parallel the LMU QKD source size will be reduced by more than an

  17. The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)

    NASA Astrophysics Data System (ADS)

    Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele

    2018-04-01

    Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.

  18. L1 libration point manned space habitat

    NASA Technical Reports Server (NTRS)

    Luttges, Marvin; Johnson, Steve; Banks, Gary; Johnson, Richard; Meyer, Christian; Pepin, Scott; Macelroy, Robert

    1989-01-01

    Second generation stations or Manned Space Habitats (MSHs) are discussed for an Earth-Moon libration point and in lunar orbit. The conceptual design of such a station is outlined. Systems and subsystems described reflect anticipation of moderate technology growth. The evolution of the L1 environments is discussed, several selected subsystems are outlined, and how the L1 MSH will complete some of its activities is described.

  19. The Humanities and the Art of Public Discussion. Volume 2.

    ERIC Educational Resources Information Center

    Federation of State Humanities Councils, Washington, DC.

    The marriage of the humanities to public discussion of major current issues is an invitation to understand how various points of view are embedded in one's history, values, visions of the future, and an understanding of what is right, wrong, and necessary. The essays in this volume examine three issues: abortion, economic competition, and racial…

  20. Effective Communication: A Key to Successful Collaboration.

    ERIC Educational Resources Information Center

    Price, Joseph P.

    1991-01-01

    This paper points out the importance of special educators' communication skills in effective collaboration. The basic components of face-to-face communication are discussed, emphasizing the role of the speaker and listener. An explanation of the process of active listening is also included, noting possible verbal and nonverbal listener responses.…

  1. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  2. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  3. Exact Identification of a Quantum Change Point

    NASA Astrophysics Data System (ADS)

    Sentís, Gael; Calsamiglia, John; Muñoz-Tapia, Ramon

    2017-10-01

    The detection of change points is a pivotal task in statistical analysis. In the quantum realm, it is a new primitive where one aims at identifying the point where a source that supposedly prepares a sequence of particles in identical quantum states starts preparing a mutated one. We obtain the optimal procedure to identify the change point with certainty—naturally at the price of having a certain probability of getting an inconclusive answer. We obtain the analytical form of the optimal probability of successful identification for any length of the particle sequence. We show that the conditional success probabilities of identifying each possible change point show an unexpected oscillatory behavior. We also discuss local (online) protocols and compare them with the optimal procedure.

  4. Exact Identification of a Quantum Change Point.

    PubMed

    Sentís, Gael; Calsamiglia, John; Muñoz-Tapia, Ramon

    2017-10-06

    The detection of change points is a pivotal task in statistical analysis. In the quantum realm, it is a new primitive where one aims at identifying the point where a source that supposedly prepares a sequence of particles in identical quantum states starts preparing a mutated one. We obtain the optimal procedure to identify the change point with certainty-naturally at the price of having a certain probability of getting an inconclusive answer. We obtain the analytical form of the optimal probability of successful identification for any length of the particle sequence. We show that the conditional success probabilities of identifying each possible change point show an unexpected oscillatory behavior. We also discuss local (online) protocols and compare them with the optimal procedure.

  5. Smooth random change point models.

    PubMed

    van den Hout, Ardo; Muniz-Terrera, Graciela; Matthews, Fiona E

    2011-03-15

    Change point models are used to describe processes over time that show a change in direction. An example of such a process is cognitive ability, where a decline a few years before death is sometimes observed. A broken-stick model consists of two linear parts and a breakpoint where the two lines intersect. Alternatively, models can be formulated that imply a smooth change between the two linear parts. Change point models can be extended by adding random effects to account for variability between subjects. A new smooth change point model is introduced and examples are presented that show how change point models can be estimated using functions in R for mixed-effects models. The Bayesian inference using WinBUGS is also discussed. The methods are illustrated using data from a population-based longitudinal study of ageing, the Cambridge City over 75 Cohort Study. The aim is to identify how many years before death individuals experience a change in the rate of decline of their cognitive ability. Copyright © 2010 John Wiley & Sons, Ltd.

  6. Good Research and Faculty Buy-in: 2 Keys to Effective Marketing

    ERIC Educational Resources Information Center

    Blumenstyk, Goldie

    2008-01-01

    Effective marketing requires more than a sleek new logo. This article presents excerpts of an online discussion on the dos and don'ts of college marketing with Mary R. Stagaman, associate vice president for external relations at the University of Cincinnati. In this discussion, she noted that good research and faculty buy-in are the two keys to…

  7. DIME Students Discuss Final Drop Tower Experiment Design

    NASA Technical Reports Server (NTRS)

    2002-01-01

    Students discuss fine points of their final design for the Drop Tower experiment during the second Dropping in a Microgravity Environment (DIME) competition held April 23-25, 2002, at NASA's Glenn Research Center. Competitors included two teams from Sycamore High School, Cincinnati, OH, and one each from Bay High School, Bay Village, OH, and COSI Academy, Columbus, OH. DIME is part of NASA's education and outreach activities. Details are on line at http://microgravity.grc.nasa.gov/DIME_2002.html.

  8. Methodological challenges in qualitative content analysis: A discussion paper.

    PubMed

    Graneheim, Ulla H; Lindgren, Britt-Marie; Lundman, Berit

    2017-09-01

    This discussion paper is aimed to map content analysis in the qualitative paradigm and explore common methodological challenges. We discuss phenomenological descriptions of manifest content and hermeneutical interpretations of latent content. We demonstrate inductive, deductive, and abductive approaches to qualitative content analysis, and elaborate on the level of abstraction and degree of interpretation used in constructing categories, descriptive themes, and themes of meaning. With increased abstraction and interpretation comes an increased challenge to demonstrate the credibility and authenticity of the analysis. A key issue is to show the logic in how categories and themes are abstracted, interpreted, and connected to the aim and to each other. Qualitative content analysis is an autonomous method and can be used at varying levels of abstraction and interpretation. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Ares Knowledge Capture: Summary and Key Themes Presentation

    NASA Technical Reports Server (NTRS)

    Coates, Ralph H.

    2011-01-01

    This report has been developed by the National Aeronautics and Space Administration (NASA) Human Exploration and Operations Mission Directorate (HEOMD) Risk Management team in close coordination with the MSFC Chief Engineers Office. This document provides a point-in-time, cumulative, summary of actionable key lessons learned derived from the design project. Lessons learned invariably address challenges and risks and the way in which these areas have been addressed. Accordingly the risk management thread is woven throughout the document.

  10. Foreign Languages: Key Links in the Chain of Learning.

    ERIC Educational Resources Information Center

    Mead, Robert G., Jr., Ed.

    The articles discuss the necessity of including foreign language as an integral part of the curriculum at all levels of instruction. The following chapters are included: "Elementary School Foreign Language: Key Link in the Chain of Learning" (rationale, innovations, immersion programs, and interdisciplinary approaches); "Foreign…

  11. A Well-Clear Volume Based on Time to Entry Point

    NASA Technical Reports Server (NTRS)

    Narkawicz, Anthony J.; Munoz, Cesar A.; Upchurch, Jason M.; Chamberlain, James P.; Consiglio, Maria C.

    2014-01-01

    A well-clear volume is a key component of NASA's Separation Assurance concept for the integration of UAS in the NAS. This paper proposes a mathematical definition of the well-clear volume that uses, in addition to distance thresholds, a time threshold based on time to entry point (TEP). The mathematical model that results from this definition is more conservative than other candidate definitions of the wellclear volume that are based on range over closure rate and time to closest point of approach.

  12. Key Factors that Influence Recruiting Young Chinese Students

    ERIC Educational Resources Information Center

    Wang, Zhenmin

    2007-01-01

    The discussion in this paper is based on the assumption that international education is equated to recruiting and educating international students, even though its true concept goes far beyond this narrow understanding. The purpose of this research is to look at the key factors that influence recruiting young Chinese students, and make sure all…

  13. How can clinical practice guidelines be adapted to facilitate shared decision making? A qualitative key-informant study.

    PubMed

    van der Weijden, Trudy; Pieterse, Arwen H; Koelewijn-van Loon, Marije S; Knaapen, Loes; Légaré, France; Boivin, Antoine; Burgers, Jako S; Stiggelbout, Anne M; Faber, Marjan; Elwyn, Glyn

    2013-10-01

    To explore how clinical practice guidelines can be adapted to facilitate shared decision making. This was a qualitative key-informant study with group discussions and semi-structured interviews. First, 75 experts in guideline development or shared decision making participated in group discussions at two international conferences. Next, health professionals known as experts in depression or breast cancer, experts on clinical practice guidelines and/or shared decision making, and patient representatives were interviewed (N=20). Using illustrative treatment decisions on depression or breast cancer, we asked the interviewees to indicate as specifically as they could how guidelines could be used to facilitate shared decision making. Interviewees suggested some generic strategies, namely to include a separate chapter on the importance of shared decision making, to use language that encourages patient involvement, and to develop patient versions of guidelines. Recommendation-specific strategies, related to specific decision points in the guideline, were also suggested: These include structuring the presentation of healthcare options to increase professionals' option awareness; structuring the deliberation process between professionals and patients; and providing relevant patient support tools embedded at important decision points in the guideline. This study resulted in an overview of strategies to adapt clinical practice guidelines to facilitate shared decision making. Some strategies seemed more contentious than others. Future research should assess the feasibility and impact of these strategies to make clinical practice guidelines more conducive to facilitate shared decision making.

  14. Application of inertial instruments for DSN antenna pointing and tracking

    NASA Technical Reports Server (NTRS)

    Eldred, D. B.; Nerheim, N. M.; Holmes, K. G.

    1990-01-01

    The feasibility of using inertial instruments to determine the pointing attitude of the NASA Deep Space Network antennas is examined. The objective is to obtain 1 mdeg pointing knowledge in both blind pointing and tracking modes to facilitate operation of the Deep Space Network 70 m antennas at 32 GHz. A measurement system employing accelerometers, an inclinometer, and optical gyroscopes is proposed. The initial pointing attitude is established by determining the direction of the local gravity vector using the accelerometers and the inclinometer, and the Earth's spin axis using the gyroscopes. Pointing during long-term tracking is maintained by integrating the gyroscope rates and augmenting these measurements with knowledge of the local gravity vector. A minimum-variance estimator is used to combine measurements to obtain the antenna pointing attitude. A key feature of the algorithm is its ability to recalibrate accelerometer parameters during operation. A survey of available inertial instrument technologies is also given.

  15. Key Working for Families with Young Disabled Children

    PubMed Central

    Carter, Bernie; Thomas, Megan

    2011-01-01

    For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other

  16. Libration-point staging concepts for Earth-Mars transportation

    NASA Technical Reports Server (NTRS)

    Farquhar, Robert; Dunham, David

    1986-01-01

    The use of libration points as transfer nodes for an Earth-Mars transportation system is briefly described. It is assumed that a reusable Interplanetary Shuttle Vehicle (ISV) operates between the libration point and Mars orbit. Propellant for the round-trip journey to Mars and other supplies would be carried from low Earth orbit (LEO) to the ISV by additional shuttle vehicles. Different types of trajectories between LEO and libration points are presented, and approximate delta-V estimates for these transfers are given. The possible use of lunar gravity-assist maneuvers is also discussed.

  17. Key enablers to facilitate healthy behavior change: workshop summary.

    PubMed

    Teyhen, Deydre S; Aldag, Matt; Centola, Damon; Edinborough, Elton; Ghannadian, Jason D; Haught, Andrea; Jackson, Theresa; Kinn, Julie; Kunkler, Kevin J; Levine, Betty; Martindale, Valerie E; Neal, David; Snyder, Leslie B; Styn, Mindi A; Thorndike, Frances; Trabosh, Valerie; Parramore, David J

    2014-05-01

    The increases in preventable chronic diseases and the rising costs of health care are unsustainable. The US Army Surgeon General's vision to transition from a health care system to a system of health requires the identification of key health enablers to facilitate the adoption of healthy behaviors. In support of this vision, the US Army Telemedicine and Advanced Technology Research Center hosted a workshop in April 2013 titled "Incentives to Create and Sustain Change for Health." Members of government and academia participated to identify key health enablers that could ultimately be leveraged by technology. The key health enablers discussed included (1) public health messaging, (2) changing health habits and the environmental influence on health, (3) goal setting and tracking, (4) the role of incentives in behavior-change intervention, and (5) the role of peer and social networks on change. This report summarizes leading evidence and the group consensus on evidence-based practices with respect to the key enablers in creating healthy behavior change.

  18. Improving Study Habits of Junior High School Students Through Self-Management versus Group Discussion

    ERIC Educational Resources Information Center

    Harris, Mary B.; Trujillo, Amaryllis E.

    1975-01-01

    Both a self-management approach, teaching the principles of behavior modification and self-control (n=36), and a group-discussion technique, involving discussion of study habits and problems (n=41), led to improvements in grade point averages compared with a no-treatment control group (n=36) for low-achieving junior high school students. (Author)

  19. Method of and apparatus for generating an interstitial point in a data stream having an even number of data points

    NASA Technical Reports Server (NTRS)

    Edwards, T. R. (Inventor)

    1985-01-01

    Apparatus for doubling the data density rate of an analog to digital converter or doubling the data density storage capacity of a memory deviced is discussed. An interstitial data point midway between adjacent data points in a data stream having an even number of equal interval data points is generated by applying a set of predetermined one-dimensional convolute integer coefficients which can include a set of multiplier coefficients and a normalizer coefficient. Interpolator means apply the coefficients to the data points by weighting equally on each side of the center of the even number of equal interval data points to obtain an interstital point value at the center of the data points. A one-dimensional output data set, which is twice as dense as a one-dimensional equal interval input data set, can be generated where the output data set includes interstitial points interdigitated between adjacent data points in the input data set. The method for generating the set of interstital points is a weighted, nearest-neighbor, non-recursive, moving, smoothing averaging technique, equivalent to applying a polynomial regression calculation to the data set.

  20. Controlling Continuous-Variable Quantum Key Distribution with Entanglement in the Middle Using Tunable Linear Optics Cloning Machines

    NASA Astrophysics Data System (ADS)

    Wu, Xiao Dong; Chen, Feng; Wu, Xiang Hua; Guo, Ying

    2017-02-01

    Continuous-variable quantum key distribution (CVQKD) can provide detection efficiency, as compared to discrete-variable quantum key distribution (DVQKD). In this paper, we demonstrate a controllable CVQKD with the entangled source in the middle, contrast to the traditional point-to-point CVQKD where the entanglement source is usually created by one honest party and the Gaussian noise added on the reference partner of the reconciliation is uncontrollable. In order to harmonize the additive noise that originates in the middle to resist the effect of malicious eavesdropper, we propose a controllable CVQKD protocol by performing a tunable linear optics cloning machine (LOCM) at one participant's side, say Alice. Simulation results show that we can achieve the optimal secret key rates by selecting the parameters of the tuned LOCM in the derived regions.

  1. Navigable points estimation for mobile robots using binary image skeletonization

    NASA Astrophysics Data System (ADS)

    Martinez S., Fernando; Jacinto G., Edwar; Montiel A., Holman

    2017-02-01

    This paper describes the use of image skeletonization for the estimation of all the navigable points, inside a scene of mobile robots navigation. Those points are used for computing a valid navigation path, using standard methods. The main idea is to find the middle and the extreme points of the obstacles in the scene, taking into account the robot size, and create a map of navigable points, in order to reduce the amount of information for the planning algorithm. Those points are located by means of the skeletonization of a binary image of the obstacles and the scene background, along with some other digital image processing algorithms. The proposed algorithm automatically gives a variable number of navigable points per obstacle, depending on the complexity of its shape. As well as, the way how the algorithm can change some of their parameters in order to change the final number of the resultant key points is shown. The results shown here were obtained applying different kinds of digital image processing algorithms on static scenes.

  2. Continuous Variable Quantum Key Distribution Using Polarized Coherent States

    NASA Astrophysics Data System (ADS)

    Vidiella-Barranco, A.; Borelli, L. F. M.

    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators Ŝi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.

  3. From conflict to partnership: growing collaboration between police and NGOs in countries with concentrated epidemics among key populations

    PubMed Central

    Thomson, Nicholas; Riley, Diane; Bergenstrom, Anne; Carpenter, Jenae; Zelitchenko, Alex

    2016-01-01

    Introduction Between September 2012 and December 2015, a series of national and regional consultations, aimed at resolving a persistent dynamic of conflict between law enforcement agencies (LEAs) and civil society organizations (CSOs) working on issues of access to HIV services in high-priority countries for people who use drugs have been organized by the HIV/AIDS Section of the United Nations Office on Drugs and Crime, the Joint United Nations Programme on HIV/AIDS, the Law Enforcement and HIV Network (LEAHN) and other international organizations. The aim of these consultations has been to understand, at a national and regional level, the key points of tension between police and CSOs and how to overcome these tensions to enhance access to and uptake of services by key populations, including people who inject drugs, sex workers, men who have sex with men and transgenders. This commentary briefly describes the methods, process, content and key outcomes of these consultations held across diverse number of countries and regions, including Africa, South East Asia, South Asia, Central Asia, Eastern Europe and Latin America. Discussion While the context varies, this paper highlights that there are commonalities that drive a persistent dynamic of conflict and therefore also common methods for resolution of conflict and forging partnerships. Both policing and CSOs have key sectoral responsibilities and reform agendas to implement to ensure that as an individual agency they are able to meet their obligations as partners in the HIV response. Using the key outcomes of discussions and recommendations from these consultations and drawing on existing literature, the objective of this paper is to present a preliminary model that roadmaps the critical path from resolution of conflict to partnership between LEAs and CSOs. Conclusions This paper seeks to highlight that critical resources are required to support ongoing development and harnessing of partnerships between LEAs and CSOs

  4. Use of three-point taper systems in timber cruising

    Treesearch

    James W. Flewelling; Richard L. Ernst; Lawrence M. Raynes

    2000-01-01

    Tree volumes and profiles are often estimated as functions of total height and DBH. Alternative estimators include form-class methods, importance sampling, the centroid method, and multi-point profile (taper) estimation systems; all of these require some measurement or estimate of upper stem diameters. The multi-point profile system discussed here allows for upper stem...

  5. Challenges for achieving safe and effective radical cure of Plasmodium vivax: a round table discussion of the APMEN Vivax Working Group.

    PubMed

    Thriemer, Kamala; Ley, Benedikt; Bobogare, Albino; Dysoley, Lek; Alam, Mohammad Shafiul; Pasaribu, Ayodhia P; Sattabongkot, Jetsumon; Jambert, Elodie; Domingo, Gonzalo J; Commons, Robert; Auburn, Sarah; Marfurt, Jutta; Devine, Angela; Aktaruzzaman, Mohammad M; Sohel, Nayeem; Namgay, Rinzin; Drukpa, Tobgyel; Sharma, Surender Nath; Sarawati, Elvieda; Samad, Iriani; Theodora, Minerva; Nambanya, Simone; Ounekham, Sonesay; Mudin, Rose Nanti Binti; Da Thakur, Garib; Makita, Leo Sora; Deray, Raffy; Lee, Sang-Eun; Boaz, Leonard; Danansuriya, Manjula N; Mudiyanselage, Santha D; Chinanonwait, Nipon; Kitchakarn, Suravadee; Nausien, Johnny; Naket, Esau; Duc, Thang Ngo; Do Manh, Ha; Hong, Young S; Cheng, Qin; Richards, Jack S; Kusriastuti, Rita; Satyagraha, Ari; Noviyanti, Rintis; Ding, Xavier C; Khan, Wasif Ali; Swe Phru, Ching; Guoding, Zhu; Qi, Gao; Kaneko, Akira; Miotto, Olivo; Nguitragool, Wang; Roobsoong, Wanlapa; Battle, Katherine; Howes, Rosalind E; Roca-Feltrer, Arantxa; Duparc, Stephan; Bhowmick, Ipsita Pal; Kenangalem, Enny; Bibit, Jo-Anne; Barry, Alyssa; Sintasath, David; Abeyasinghe, Rabindra; Sibley, Carol H; McCarthy, James; von Seidlein, Lorenz; Baird, J Kevin; Price, Ric N

    2017-04-05

    The delivery of safe and effective radical cure for Plasmodium vivax is one of the greatest challenges for achieving malaria elimination from the Asia-Pacific by 2030. During the annual meeting of the Asia Pacific Malaria Elimination Network Vivax Working Group in October 2016, a round table discussion was held to discuss the programmatic issues hindering the widespread use of primaquine (PQ) radical cure. Participants included 73 representatives from 16 partner countries and 33 institutional partners and other research institutes. In this meeting report, the key discussion points are presented and grouped into five themes: (i) current barriers for glucose-6-phosphate deficiency (G6PD) testing prior to PQ radical cure, (ii) necessary properties of G6PD tests for wide scale deployment, (iii) the promotion of G6PD testing, (iv) improving adherence to PQ regimens and (v) the challenges for future tafenoquine (TQ) roll out. Robust point of care (PoC) G6PD tests are needed, which are suitable and cost-effective for clinical settings with limited infrastructure. An affordable and competitive test price is needed, accompanied by sustainable funding for the product with appropriate training of healthcare staff, and robust quality control and assurance processes. In the absence of quantitative PoC G6PD tests, G6PD status can be gauged with qualitative diagnostics, however none of the available tests is currently sensitive enough to guide TQ treatment. TQ introduction will require overcoming additional challenges including the management of severely and intermediately G6PD deficient individuals. Robust strategies are needed to ensure that effective treatment practices can be deployed widely, and these should ensure that the caveats are outweighed by  the benefits of radical cure for both the patients and the community. Widespread access to quality controlled G6PD testing will be critical.

  6. Digest of Key Science and Engineering Indicators, 2008. NSB-08-2

    ERIC Educational Resources Information Center

    National Science Foundation, 2008

    2008-01-01

    This digest of key science and engineering indicators draws primarily from the National Science Board's two-volume "Science and Engineering Indicators, 2008" report. The digest serves two purposes: (1) to draw attention to important trends and data points from across the chapters and volumes of "Science and Engineering Indicators, 2008," and (2)…

  7. Defining disaster resilience: comparisons from key stakeholders involved in emergency management in Victoria, Australia.

    PubMed

    Goode, Natassia; Salmon, Paul M; Spencer, Caroline; McArdle, Dudley; Archer, Frank

    2017-01-01

    Three years after the introduction of the National Strategy for Disaster Resilience there remains no unanimously adopted definition of disaster resilience within Australia's emergency management sector. The aim of this study is to determine what the concept means to key stakeholders in the emergency management sector in the Australian State of Victoria, and how these conceptualisations overlap and diverge. Via an online survey, 113 people were asked how they define disaster resilience in their work in the emergency management sector. A data mining software tool, Leximancer, was employed to uncover the relationships between the definitions provided. The findings show that stakeholders see resilience as an 'ability' that encompasses emergency management activities and personal responsibility. However, the findings also highlight some possible points of conflict between stakeholders. In addition, the paper outlines and discusses a number of potential consequences for the implementation and the success of the resilience-based approach in Australia. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  8. Historical Research in Comparative Education: A Discussion of Some Methodological Issues

    ERIC Educational Resources Information Center

    Li, Aisi

    2013-01-01

    In this article the author discusses some issues with conducting historical research, rooted in her own experiences. She focuses on four main points: minimising one's own biases, choosing a suitable research question, evaluating the quality of the sources and providing a balanced interpretation of events. She argues that using a historical…

  9. 78 FR 70901 - Safety Zone; Bone Island Triathlon, Atlantic Ocean; Key West, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-27

    ... 1625-AA00 Safety Zone; Bone Island Triathlon, Atlantic Ocean; Key West, FL AGENCY: Coast Guard, DHS... zone on the waters of the Atlantic Ocean in Key West, Florida, during the Bone Island Triathlon on... event. C. Discussion of Proposed Rule On January 25, 2014, Questor Multisport, LLC. is hosting the Bone...

  10. The change of steel surface chemistry regarding oxygen partial pressure and dew point

    NASA Astrophysics Data System (ADS)

    Norden, Martin; Blumenau, Marc; Wuttke, Thiemo; Peters, Klaus-Josef

    2013-04-01

    By investigating the surface state of a Ti-IF, TiNb-IF and a MnCr-DP after several series of intercritical annealing, the impact of the annealing gas composition on the selective oxidation process is discussed. On behalf of the presented results, it can be concluded that not the general oxygen partial pressure in the annealing furnace, which is a result of the equilibrium reaction of water and hydrogen, is the main driving force for the selective oxidation process. It is shown that the amounts of adsorbed gases at the strip surface and the effective oxygen partial pressure resulting from the adsorbed gases, which is mainly dependent on the water content of the annealing furnace, is driving the selective oxidation processes occurring during intercritical annealing. Thus it is concluded, that for industrial applications the dew point must be the key parameter value for process control.

  11. Doing Education Policy Enactment Research in a Minor Key

    ERIC Educational Resources Information Center

    Heimans, Stephen; Singh, Parlo; Glasswell, Kathryn

    2017-01-01

    This article discusses "minor key research" and doing this kind of research as "response-ability". We explore the possibilities that education policy enactment research might hold for theorising and doing research, not just for work on "how schools do policy", but also for how researchers do policy research with…

  12. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  13. Science motivation by discussion and controversy (SMDC) model

    NASA Astrophysics Data System (ADS)

    Izadi, Dina; Mora Ley, César Eduardo; Ramírez Díaz, Mario Humberto

    2017-05-01

    Succeeding theories and empirical investigations have often been built over conceptual understanding to develop talent education. Opportunities provided by society are crucial at every point in the talent-development process. Abilities differ and can vary among boys and girls. Although they have some responsibility for their own growth and development, the educational system and psychosocial variables influence on the successful development of high levels of education. This research explores students’ attitudes to science education to establish why many disengage with the subject in class and what can be done to reverse this trend to produce unimaginable scientific and practical benefits to society. The control group is students from several schools with traditional education in Iran and the experimental group is teams who have taken part in several activities such as national and international tournaments (2005-2013). This research has two parts: 1—how innovation in teaching and 2—discussion and controversy in class can improve science education and cause motivation. The average scores are divided into 5 ranges in both experimental and traditional groups. As shown by Spearman’s correlation rank (ρ) the difference between boys’ and girls’ average scores is about (2.71) in the control group but it has decreased to (0.29) in the experimental group. The main point of discussion is on problems in class which advance a set of interrelated scientific arguments for outstanding achievement.

  14. Transient simulation of coolant peak temperature due to prolonged fan and/or water pump operation after the vehicle is keyed-off

    NASA Astrophysics Data System (ADS)

    Pang, Suh Chyn; Masjuki, Haji Hassan; Kalam, Md. Abul; Hazrat, Md. Ali

    2014-01-01

    Automotive designers should design a robust engine cooling system which works well in both normal and severe driving conditions. When vehicles are keyed-off suddenly after some distance of hill-climbing driving, the coolant temperature tends to increase drastically. This is because heat soak in the engine could not be transferred away in a timely manner, as both the water pump and cooling fan stop working after the vehicle is keyed-off. In this research, we aimed to visualize the coolant temperature trend over time before and after the vehicles were keyed-off. In order to prevent coolant temperature from exceeding its boiling point and jeopardizing engine life, a numerical model was further tested with prolonged fan and/or water pump operation after keying-off. One dimensional thermal-fluid simulation was exploited to model the vehicle's cooling system. The behaviour of engine heat, air flow, and coolant flow over time were varied to observe the corresponding transient coolant temperatures. The robustness of this model was proven by validation with industry field test data. The numerical results provided sensible insights into the proposed solution. In short, prolonging fan operation for 500 s and prolonging both fan and water pump operation for 300 s could reduce coolant peak temperature efficiently. The physical implementation plan and benefits yielded from implementation of the electrical fan and electrical water pump are discussed.

  15. Making Practical Work Work: Using Discussion to Enhance Pupils' Understanding of Physics

    ERIC Educational Resources Information Center

    Harrison, Mark

    2016-01-01

    Background: Practical work is widely seen as a necessary part of a good physics education, but convincing evidence that it impacts positively on pupils' learning is scarce. Recent work suggests the use of talk and discussion might hold the key to making practical work more educationally productive. Purpose: The research question that this study…

  16. Fast Semantic Segmentation of 3d Point Clouds with Strongly Varying Density

    NASA Astrophysics Data System (ADS)

    Hackel, Timo; Wegner, Jan D.; Schindler, Konrad

    2016-06-01

    We describe an effective and efficient method for point-wise semantic classification of 3D point clouds. The method can handle unstructured and inhomogeneous point clouds such as those derived from static terrestrial LiDAR or photogammetric reconstruction; and it is computationally efficient, making it possible to process point clouds with many millions of points in a matter of minutes. The key issue, both to cope with strong variations in point density and to bring down computation time, turns out to be careful handling of neighborhood relations. By choosing appropriate definitions of a point's (multi-scale) neighborhood, we obtain a feature set that is both expressive and fast to compute. We evaluate our classification method both on benchmark data from a mobile mapping platform and on a variety of large, terrestrial laser scans with greatly varying point density. The proposed feature set outperforms the state of the art with respect to per-point classification accuracy, while at the same time being much faster to compute.

  17. [Key content and formulation of national Chinese materia medica resources survey at county level].

    PubMed

    Lu, Jian-Wei; Zhang, Xiao-Bo; Li, Hai-Tao; Guo, Lan-Ping; Zhao, Run-Huai; Zhang, Ben-Gang; Sun, Li-Ying; Huang, Lu-Qi

    2013-08-01

    According to National Census for Water, National Population Census, National Land and Resources Survey, and work experience of experimental measures for national Chinese materia medica resources(CMMR) survey,the national CMMR survey at the county level is the key point of whole survey, that includes organization and management, field survey, sorting data three key links. Organization and management works of national CMMR survey needs to finish four key contents, there are definite goals and tasks, practicable crew, preparation directory, and security assurance. Field survey works of the national CMMR survey needs to finish five key contents, there are preparation works for field survey, the choice of the key survey area (samples), fill in the questionnaire, video data collection, specimen and other physical collection. Sorting data works of the national CMMR survey needs to finish tree key contents, there are data, specimen and census results.

  18. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues.

    PubMed

    Edwards, Rhiannon Tudor; Charles, Joanna Mary; Lloyd-Williams, Huw

    2013-10-24

    If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Electronic databases and organisation websites were searched using a 22 year time horizon (1990-2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may find it useful to think in this broader

  19. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  20. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  1. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  2. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  3. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE PAGES

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; ...

    2016-08-09

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  4. Application of ANFIS to Phase Estimation for Multiple Phase Shift Keying

    NASA Technical Reports Server (NTRS)

    Drake, Jeffrey T.; Prasad, Nadipuram R.

    2000-01-01

    The paper discusses a novel use of Adaptive Neuro-Fuzzy Inference Systems (ANFIS) for estimating phase in Multiple Phase Shift Keying (M-PSK) modulation. A brief overview of communications phase estimation is provided. The modeling of both general open-loop, and closed-loop phase estimation schemes for M-PSK symbols with unknown structure are discussed. Preliminary performance results from simulation of the above schemes are presented.

  5. Three MSC officials hold discussion in Mission Control room during Gemini 11

    NASA Image and Video Library

    1966-09-12

    S66-52754 (12 Sept. 1966) --- Three key Manned Spacecraft Center (MSC) officials hold discussion in the Mission Control room during Gemini-11 activity. Left to right, are Donald K. Slayton, MSC Director of Flight Crew Operations; astronaut Alan B. Shepard Jr., Chief, MSC Astronaut Office; and George M. Low, MSC Deputy Director. Photo credit: NASA

  6. A hardware-oriented algorithm for floating-point function generation

    NASA Technical Reports Server (NTRS)

    O'Grady, E. Pearse; Young, Baek-Kyu

    1991-01-01

    An algorithm is presented for performing accurate, high-speed, floating-point function generation for univariate functions defined at arbitrary breakpoints. Rapid identification of the breakpoint interval, which includes the input argument, is shown to be the key operation in the algorithm. A hardware implementation which makes extensive use of read/write memories is used to illustrate the algorithm.

  7. High-Precision Registration of Point Clouds Based on Sphere Feature Constraints.

    PubMed

    Huang, Junhui; Wang, Zhao; Gao, Jianmin; Huang, Youping; Towers, David Peter

    2016-12-30

    Point cloud registration is a key process in multi-view 3D measurements. Its precision affects the measurement precision directly. However, in the case of the point clouds with non-overlapping areas or curvature invariant surface, it is difficult to achieve a high precision. A high precision registration method based on sphere feature constraint is presented to overcome the difficulty in the paper. Some known sphere features with constraints are used to construct virtual overlapping areas. The virtual overlapping areas provide more accurate corresponding point pairs and reduce the influence of noise. Then the transformation parameters between the registered point clouds are solved by an optimization method with weight function. In that case, the impact of large noise in point clouds can be reduced and a high precision registration is achieved. Simulation and experiments validate the proposed method.

  8. High-Precision Registration of Point Clouds Based on Sphere Feature Constraints

    PubMed Central

    Huang, Junhui; Wang, Zhao; Gao, Jianmin; Huang, Youping; Towers, David Peter

    2016-01-01

    Point cloud registration is a key process in multi-view 3D measurements. Its precision affects the measurement precision directly. However, in the case of the point clouds with non-overlapping areas or curvature invariant surface, it is difficult to achieve a high precision. A high precision registration method based on sphere feature constraint is presented to overcome the difficulty in the paper. Some known sphere features with constraints are used to construct virtual overlapping areas. The virtual overlapping areas provide more accurate corresponding point pairs and reduce the influence of noise. Then the transformation parameters between the registered point clouds are solved by an optimization method with weight function. In that case, the impact of large noise in point clouds can be reduced and a high precision registration is achieved. Simulation and experiments validate the proposed method. PMID:28042846

  9. [Discussion on developing a data management plan and its key factors in clinical study based on electronic data capture system].

    PubMed

    Li, Qing-na; Huang, Xiu-ling; Gao, Rui; Lu, Fang

    2012-08-01

    Data management has significant impact on the quality control of clinical studies. Every clinical study should have a data management plan to provide overall work instructions and ensure that all of these tasks are completed according to the Good Clinical Data Management Practice (GCDMP). Meanwhile, the data management plan (DMP) is an auditable document requested by regulatory inspectors and must be written in a manner that is realistic and of high quality. The significance of DMP, the minimum standards and the best practices provided by GCDMP, the main contents of DMP based on electronic data capture (EDC) and some key factors of DMP influencing the quality of clinical study were elaborated in this paper. Specifically, DMP generally consists of 15 parts, namely, the approval page, the protocol summary, role and training, timelines, database design, creation, maintenance and security, data entry, data validation, quality control and quality assurance, the management of external data, serious adverse event data reconciliation, coding, database lock, data management reports, the communication plan and the abbreviated terms. Among them, the following three parts are regarded as the key factors: designing a standardized database of the clinical study, entering data in time and cleansing data efficiently. In the last part of this article, the authors also analyzed the problems in clinical research of traditional Chinese medicine using the EDC system and put forward some suggestions for improvement.

  10. Case-based discussion supporting learning and practice in optometry.

    PubMed

    Bullock, Alison; Barnes, Emma; Ryan, Barbara; Sheen, Nik

    2014-09-01

    To enhance continuing professional development and address the risk that professional isolation poses, the UK General Optical Council introduced a requirement for all optometrists to engage in at least one case-based discussion per 3 year cycle of continuing education. In this paper, we explore participants' impression of the acceptability, effectiveness and long-term impact-on-practice of case-based discussion as a mode of continuing education. Case-based discussion participants attended an evening session comprising a lecture and a group discussion. They completed three questionnaires: prior to the session, immediately post-session and 3-4 months post-session. We coded the questionnaires to allow matching. Seventy-five case-based discussion groups were held with 379 participants; 377 completed both pre- and post-questionnaires and 331 (88%) returned a follow-up questionnaire. Case-based discussions were an acceptable method of learning, with many preferring it to distance-learning. Prior to the event, women, employees and part-time workers were more likely to have concerns about participating. In terms of learning, gaps in knowledge were more likely to be revealed in those who work in isolation. The respondents highlighted social aspects, reassurance of practice as well as new learning. Participants significantly improved self-confidence ratings in all key learning areas. At three months post-session, the majority (75%) self-reported that they had implemented their intended changes to practice. The evaluation showed that participants felt that case-based discussion developed their knowledge, notably for sole practitioners, and influenced later workplace practice. The peer interaction of this mode of continuing education can combat professional isolation. © 2014 The Authors Ophthalmic & Physiological Optics © 2014 The College of Optometrists.

  11. Estimation of Melting Points of Organics.

    PubMed

    Yalkowsky, Samuel H; Alantary, Doaa

    2018-05-01

    Unified physicochemical property estimation relationships is a system of empirical and theoretical relationships that relate 20 physicochemical properties of organic molecules to each other and to chemical structure. Melting point is a key parameter in the unified physicochemical property estimation relationships scheme because it is a determinant of several other properties including vapor pressure, and solubility. This review describes the first-principals calculation of the melting points of organic compounds from structure. The calculation is based on the fact that the melting point, T m , is equal to the ratio of the heat of melting, ΔH m , to the entropy of melting, ΔS m . The heat of melting is shown to be an additive constitutive property. However, the entropy of melting is not entirely group additive. It is primarily dependent on molecular geometry, including parameters which reflect the degree of restriction of molecular motion in the crystal to that of the liquid. Symmetry, eccentricity, chirality, flexibility, and hydrogen bonding, each affect molecular freedom in different ways and thus make different contributions to the total entropy of fusion. The relationships of these entropy determining parameters to chemical structure are used to develop a reasonably accurate means of predicting the melting points over 2000 compounds. Copyright © 2018 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  12. Semantic Segmentation of Building Elements Using Point Cloud Hashing

    NASA Astrophysics Data System (ADS)

    Chizhova, M.; Gurianov, A.; Hess, M.; Luhmann, T.; Brunn, A.; Stilla, U.

    2018-05-01

    For the interpretation of point clouds, the semantic definition of extracted segments from point clouds or images is a common problem. Usually, the semantic of geometrical pre-segmented point cloud elements are determined using probabilistic networks and scene databases. The proposed semantic segmentation method is based on the psychological human interpretation of geometric objects, especially on fundamental rules of primary comprehension. Starting from these rules the buildings could be quite well and simply classified by a human operator (e.g. architect) into different building types and structural elements (dome, nave, transept etc.), including particular building parts which are visually detected. The key part of the procedure is a novel method based on hashing where point cloud projections are transformed into binary pixel representations. A segmentation approach released on the example of classical Orthodox churches is suitable for other buildings and objects characterized through a particular typology in its construction (e.g. industrial objects in standardized enviroments with strict component design allowing clear semantic modelling).

  13. Viral metagenomics, protein structure, and reverse genetics: Key strategies for investigating coronaviruses.

    PubMed

    Johnson, Bryan A; Graham, Rachel L; Menachery, Vineet D

    2018-04-01

    Viral metagenomics, modeling of protein structure, and manipulation of viral genetics are key approaches that have laid the foundations of our understanding of coronavirus biology. In this review, we discuss the major advances each method has provided and discuss how future studies should leverage these strategies synergistically to answer novel questions. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. An Agenda for Improving Perioperative Code Status Discussion.

    PubMed

    Hickey, Thomas R; Cooper, Zara; Urman, Richard D; Hepner, David L; Bader, Angela M

    2016-06-15

    Code status discussions (CSDs) clarify patient preferences for cardiopulmonary resuscitation in the event of cardiac or respiratory arrest. CSDs are a key component of perioperative care, particularly at the end of life, and must be both patient-centered and shared. Physicians at all levels of training are insufficiently trained in and inappropriately perform CSD; this may be particularly true of perioperative physicians. In this article, we describe the difficulty of achieving a patient-centered, shared perioperative CSD in the case of a medical professional with a do-not-resuscitate order. We provide a brief background in cardiopulmonary resuscitation, do-not-resuscitate, and CSD before proposing an agenda for improving perioperative CSD.

  15. Unconstrained Capacities of Quantum Key Distribution and Entanglement Distillation for Pure-Loss Bosonic Broadcast Channels.

    PubMed

    Takeoka, Masahiro; Seshadreesan, Kaushik P; Wilde, Mark M

    2017-10-13

    We consider quantum key distribution (QKD) and entanglement distribution using a single-sender multiple-receiver pure-loss bosonic broadcast channel. We determine the unconstrained capacity region for the distillation of bipartite entanglement and secret key between the sender and each receiver, whenever they are allowed arbitrary public classical communication. A practical implication of our result is that the capacity region demonstrated drastically improves upon rates achievable using a naive time-sharing strategy, which has been employed in previously demonstrated network QKD systems. We show a simple example of a broadcast QKD protocol overcoming the limit of the point-to-point strategy. Our result is thus an important step toward opening a new framework of network channel-based quantum communication technology.

  16. Assessing health system interventions: key points when considering the value of randomization

    PubMed Central

    Schellenberg, Joanna; Todd, Jim

    2011-01-01

    Abstract Research is needed to help identify interventions that will improve the capacity or functioning of health systems and thereby contribute to achieving global health goals. Well conducted, randomized controlled trials (RCTs), insofar as they reduce bias and confounding, provide the strongest evidence for identifying which interventions delivered directly to individuals are safe and effective. When ethically feasible, they can also help reduce bias and confounding when assessing interventions targeting entire health systems. However, additional challenges emerge when research focuses on interventions that target the multiple units of organization found within health systems. Hence, one cannot complacently assume that randomization can reduce or eliminate bias and confounding to the same degree in every instance. While others have articulated arguments in favour of alternative designs, this paper is intended to help people understand why the potential value afforded by RCTs may be threatened. Specifically, it suggests six points to be borne in mind when exploring the challenges entailed in designing or evaluating RCTs on health system interventions: (i) the number of units available for randomization; (ii) the complexity of the organizational unit under study; (iii) the complexity of the intervention; (iv) the complexity of the cause–effect pathway, (v) contamination; and (vi) outcome heterogeneity. The authors suggest that the latter may be informative and that the reasons behind it should be explored and not ignored. Based on improved understanding of the value and possible limitations of RCTs on health system interventions, the authors show why we need broader platforms of research to complement RCTs. PMID:22271948

  17. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  18. [Key vessels assessment and operation highlights in laparoscopic extended right hemicolectomy].

    PubMed

    Wang, Hao; Zhao, Quanquan

    2018-03-25

    Laparoscopic radical colectomies have been more widely used gradually, among which laparoscopic extended right hemicolectomy is considered as the most difficult procedure. The difficulty of extended right hemicolectomy lies in the need to dissect lymph nodes along the superior mesenteric vein (SMV) and disconnect numerous and possible aberrant vessels. To address this problem, we emphasize two points in key vessel assessment: getting familiar with the anatomy along the medial-to-lateral approach and having a good understanding about the preoperative imaging presentations. An accurately preoperative imaging assessment by abdominal enhanced CT can help the surgeon understand the relative position of the key vessels to be dealt with during operation and the situation of the possible aberrant vessels so as to guide the procedure more effectively and facilitate the prevention and management of the intraoperative complications. During operation, the operator should pay special attention to the management of the vessels in the ileocolic vessel region, Henle's trunk and middle colon vessels. The operation highlights of the key vessels are as follows: (1) The ileocolic vessels: identifying the Toldt's gap correctly and opening the vascular sheath of the SMV securely; making sure that the duodenum is well protected. (2) Henle's trunk: dissecting along the surface of the Henle's trunk; preserving the anterior superior pancreaticoduodenal vein (ASPDV) and main trunk of the Henle's trunk; disconnecting the roots of the right colic vein (RCV) and right gastroepiploic vein (RGEV), and then dissecting lymph nodes along the surface of the pancreas. (3) The middle colon vessels: identifying the root of the middle colon vessel along the lower edge of the pancreas; avoiding entering behind the pancreas; mobilizing the transverse mesocolon sufficiently along the surface of the pancreas. Finally, we discuss and analyze the disputes currently existing in laparoscopic extended right

  19. Scaling-up HIV responses with key populations in West Africa.

    PubMed

    Wheeler, Tisha; Wolf, R Cameron; Kapesa, Laurent; Cheng Surdo, Alison; Dallabetta, Gina

    2015-03-01

    Despite decades of HIV responses in pockets of West and Central Africa (WCA), the HIV response with key populations remains an understudied area. Recently, there has been a proliferation of studies highlighting epidemiologic and behavioral data that challenge attitudes of complacency among donors and country governments uncomfortable in addressing key populations. The articles in this series highlight new studies that provide a better understanding of the epidemiologic and structural burden facing key populations in the WCA region and how to improve responses through more effective targeting. Key populations face pervasive structural barriers including institutional and sexual violence and an intersection of stigma, criminalization, and marginalization as sexual minorities. Despite decades of smaller interventions that have shown the importance of integrated services for key populations, there remains incongruent provision of outreach or testing or family planning pointing to sustained risk. There remains an incongruent resource provision for key populations where they shoulder the burden of HIV and their access to services alone could turn around HIV epidemics within the region. These proximal and distal determinants must be addressed in regional efforts, led by the community, and resourced for scale, targeting those most at risk for the acquisition and transmission of HIV. This special issue builds the knowledge base for the region focusing on interventions that remove barriers to service access including treatment uptake for those living with HIV. Better analysis and use of data for strategic planning are shown to lead to more effective targeting of prevention, care, and HIV treatment programs with key populations. These articles further demonstrate the immediate need for comprehensive action to address HIV among key populations throughout the WCA region.

  20. Spitzer Instrument Pointing Frame (IPF) Kalman Filter Algorithm

    NASA Technical Reports Server (NTRS)

    Bayard, David S.; Kang, Bryan H.

    2004-01-01

    This paper discusses the Spitzer Instrument Pointing Frame (IPF) Kalman Filter algorithm. The IPF Kalman filter is a high-order square-root iterated linearized Kalman filter, which is parametrized for calibrating the Spitzer Space Telescope focal plane and aligning the science instrument arrays with respect to the telescope boresight. The most stringent calibration requirement specifies knowledge of certain instrument pointing frames to an accuracy of 0.1 arcseconds, per-axis, 1-sigma relative to the Telescope Pointing Frame. In order to achieve this level of accuracy, the filter carries 37 states to estimate desired parameters while also correcting for expected systematic errors due to: (1) optical distortions, (2) scanning mirror scale-factor and misalignment, (3) frame alignment variations due to thermomechanical distortion, and (4) gyro bias and bias-drift in all axes. The resulting estimated pointing frames and calibration parameters are essential for supporting on-board precision pointing capability, in addition to end-to-end 'pixels on the sky' ground pointing reconstruction efforts.

  1. Instrument Pointing Control System for the Stellar Interferometry Mission - Planet Quest

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul B.; Kang, Bryan

    2006-01-01

    This paper describes the high precision Instrument Pointing Control System (PCS) for the Stellar Interferometry Mission (SIM) - Planet Quest. The PCS system provides front-end pointing, compensation for spacecraft motion, and feedforward stabilization, which are needed for proper interference. Optical interferometric measurements require very precise pointing (0.03 as, 1-(sigma) radial) for maximizing the interference pattern visibility. This requirement is achieved by fine pointing control of articulating pointing mirrors with feedback from angle tracking cameras. The overall pointing system design concept is presentcd. Functional requirements and an acquisition concept are given. Guide and Science pointing control loops are discussed. Simulation analyses demonstrate the feasibility of the design.

  2. Running key mapping in a quantum stream cipher by the Yuen 2000 protocol

    NASA Astrophysics Data System (ADS)

    Shimizu, Tetsuya; Hirota, Osamu; Nagasako, Yuki

    2008-03-01

    A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or αη scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M -ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.

  3. Airborne LIDAR point cloud tower inclination judgment

    NASA Astrophysics Data System (ADS)

    liang, Chen; zhengjun, Liu; jianguo, Qian

    2016-11-01

    Inclined transmission line towers for the safe operation of the line caused a great threat, how to effectively, quickly and accurately perform inclined judgment tower of power supply company safety and security of supply has played a key role. In recent years, with the development of unmanned aerial vehicles, unmanned aerial vehicles equipped with a laser scanner, GPS, inertial navigation is one of the high-precision 3D Remote Sensing System in the electricity sector more and more. By airborne radar scan point cloud to visually show the whole picture of the three-dimensional spatial information of the power line corridors, such as the line facilities and equipment, terrain and trees. Currently, LIDAR point cloud research in the field has not yet formed an algorithm to determine tower inclination, the paper through the existing power line corridor on the tower base extraction, through their own tower shape characteristic analysis, a vertical stratification the method of combining convex hull algorithm for point cloud tower scarce two cases using two different methods for the tower was Inclined to judge, and the results with high reliability.

  4. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.

    PubMed

    Hossain, Md Selim; Saeedi, Ehsan; Kong, Yinan

    2017-01-01

    In this paper, we propose a novel parallel architecture for fast hardware implementation of elliptic curve point multiplication (ECPM), which is the key operation of an elliptic curve cryptography processor. The point multiplication over binary fields is synthesized on both FPGA and ASIC technology by designing fast elliptic curve group operations in Jacobian projective coordinates. A novel combined point doubling and point addition (PDPA) architecture is proposed for group operations to achieve high speed and low hardware requirements for ECPM. It has been implemented over the binary field which is recommended by the National Institute of Standards and Technology (NIST). The proposed ECPM supports two Koblitz and random curves for the key sizes 233 and 163 bits. For group operations, a finite-field arithmetic operation, e.g. multiplication, is designed on a polynomial basis. The delay of a 233-bit point multiplication is only 3.05 and 3.56 μs, in a Xilinx Virtex-7 FPGA, for Koblitz and random curves, respectively, and 0.81 μs in an ASIC 65-nm technology, which are the fastest hardware implementation results reported in the literature to date. In addition, a 163-bit point multiplication is also implemented in FPGA and ASIC for fair comparison which takes around 0.33 and 0.46 μs, respectively. The area-time product of the proposed point multiplication is very low compared to similar designs. The performance ([Formula: see text]) and Area × Time × Energy (ATE) product of the proposed design are far better than the most significant studies found in the literature.

  5. Discussion on mass concrete construction of wind turbine generator foundation

    NASA Astrophysics Data System (ADS)

    Shang, Liang; Wu, Chaoxiang; Yin, Xiaoyong

    2018-04-01

    Wind power is one of the main power sources currently. China has rich wind power resources, wind power plants are developed faster and faster. However, China wind power construction started late, which is lack of relevant experience technology. It is easy to produce quality problems. The key to the construction quality of wind power plant is the construction quality of mass concrete construction. Therefore, construction technology and quality control of wind turbine generator foundation mass concrete are discussed and analyzed in the paper.

  6. Backward bifurcations, turning points and rich dynamics in simple disease models.

    PubMed

    Zhang, Wenjing; Wahl, Lindi M; Yu, Pei

    2016-10-01

    In this paper, dynamical systems theory and bifurcation theory are applied to investigate the rich dynamical behaviours observed in three simple disease models. The 2- and 3-dimensional models we investigate have arisen in previous investigations of epidemiology, in-host disease, and autoimmunity. These closely related models display interesting dynamical behaviors including bistability, recurrence, and regular oscillations, each of which has possible clinical or public health implications. In this contribution we elucidate the key role of backward bifurcations in the parameter regimes leading to the behaviors of interest. We demonstrate that backward bifurcations with varied positions of turning points facilitate the appearance of Hopf bifurcations, and the varied dynamical behaviors are then determined by the properties of the Hopf bifurcation(s), including their location and direction. A Maple program developed earlier is implemented to determine the stability of limit cycles bifurcating from the Hopf bifurcation. Numerical simulations are presented to illustrate phenomena of interest such as bistability, recurrence and oscillation. We also discuss the physical motivations for the models and the clinical implications of the resulting dynamics.

  7. Free-Space Quantum Key Distribution using Polarization Entangled Photons

    NASA Astrophysics Data System (ADS)

    Kurtsiefer, Christian

    2007-06-01

    We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source [1]. Based on a BB84-equivalent protocol, we generated without interruption over 10 hours a secret key free-space optical link distance of 1.5 km with a rate up to 950 bits per second after error correction and privacy amplification. Our system is based on two time stamp units and relies on no specific hardware channel for coincidence identification besides an IP link. For that, initial clock synchronization with an accuracy of better than 2 ns is achieved, based on a conventional NTP protocol and a tiered cross correlation of time tags on both sides. Time tags are used to servo a local clock, allowing a streamed measurement on correctly identified photon pairs. Contrary to the majority of quantum key distribution systems, this approach does not require a trusted large-bandwidth random number generator, but integrates that into the physical key generation process. We discuss our current progress of implementing a key distribution via an atmospherical link during daylight conditions, and possible attack scenarios on a physical timing information side channel to a entanglement-based key distribution system. [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006).

  8. Jump point detection for real estate investment success

    NASA Astrophysics Data System (ADS)

    Hui, Eddie C. M.; Yu, Carisa K. W.; Ip, Wai-Cheung

    2010-03-01

    In the literature, studies on real estate market were mainly concentrating on the relation between property price and some key factors. The trend of the real estate market is a major concern. It is believed that changes in trend are signified by some jump points in the property price series. Identifying such jump points reveals important findings that enable policy-makers to look forward. However, not all jump points are observable from the plot of the series. This paper looks into the trend and introduces a new approach to the framework for real estate investment success. The main purpose of this paper is to detect jump points in the time series of some housing price indices and stock price index in Hong Kong by applying the wavelet analysis. The detected jump points reflect to some significant political issues and economic collapse. Moreover, the relations among properties of different classes and between stocks and properties are examined. It can be shown from the empirical result that a lead-lag effect happened between the prices of large-size property and those of small/medium-size property. However, there is no apparent relation or consistent lead in terms of change point measure between property price and stock price. This may be due to the fact that globalization effect has more impact on the stock price than the property price.

  9. The Geological Grading Scale: Every million Points Counts!

    NASA Astrophysics Data System (ADS)

    Stegman, D. R.; Cooper, C. M.

    2006-12-01

    The concept of geological time, ranging from thousands to billions of years, is naturally quite difficult for students to grasp initially, as it is much longer than the timescales over which they experience everyday life. Moreover, universities operate on a few key timescales (hourly lectures, weekly assignments, mid-term examinations) to which students' maximum attention is focused, largely driven by graded assessment. The geological grading scale exploits the overwhelming interest students have in grades as an opportunity to instill familiarity with geological time. With the geological grading scale, the number of possible points/marks/grades available in the course is scaled to 4.5 billion points --- collapsing the entirety of Earth history into one semester. Alternatively, geological time can be compressed into each assignment, with scores for weekly homeworks not worth 100 points each, but 4.5 billion! Homeworks left incomplete with questions unanswered lose 100's of millions of points - equivalent to missing the Paleozoic era. The expected quality of presentation for problem sets can be established with great impact in the first week by docking assignments an insignificant amount points for handing in messy work; though likely more points than they've lost in their entire schooling history combined. Use this grading scale and your students will gradually begin to appreciate exactly how much time represents a geological blink of the eye.

  10. SeaQuaKE: Sea-optimized Quantum Key Exchange

    DTIC Science & Technology

    2014-06-01

    is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN-0004 under ONRBAA13-001...In addition, we discuss our initial progress towards the free - space quantum channel model and planning for the experimental validation effort. 15...SUBJECT TERMS Quantum communications, free - space optical communications 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as

  11. Scholarly Networking among Business Students: Structured Discussion Board Activity and Academic Outcomes

    ERIC Educational Resources Information Center

    Walker, Kristen; Curren, Mary T.; Kiesler, Tina; Lammers, H. Bruce; Goldenson, Jamie

    2013-01-01

    The authors' intent was to show the effect of student discussion board activity on academic outcomes, after accounting for past academic performance. Data were collected from 516 students enrolled in a junior-level required business course. Controlling for students' grade point average, stepwise regression showed a significant…

  12. Informal group discussion

    Treesearch

    Hans Nienstaedt; Dean W. Einspahr; J. Douglas Brodie

    1973-01-01

    Editor's note: The morning's presentations were discussed during the afternoon by three groups, each group discussing one of the morning's three topics. Summaries of the discussions, prepared by the discussion leaders, follow.

  13. Key Program Features to Enhance the School-to-Career Transition for Youth with Disabilities

    ERIC Educational Resources Information Center

    Doren, Bonnie; Yan, Min-Chi; Tu, Wei-Mo

    2013-01-01

    The purpose of the article was to identify key features within research-based school-to-career programs that were linked to positive employment outcomes for youth disabilities. Three key program features were identified and discussed that could be incorporated into the practices and programs of schools and communities to support the employment…

  14. Method for adding nodes to a quantum key distribution system

    DOEpatents

    Grice, Warren P

    2015-02-24

    An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can establish a secret key without the need for a secret meeting between the clients. The new clients perform operations on photons as they pass through nodes in the quantum channel, and participate in a non-secret protocol that is amended to include the new clients. The system and method significantly increase the number of clients that can be supported by a conventional QKD system, with only a modest increase in cost. The system and method are compatible with a variety of QKD schemes, including polarization, time-bin, continuous variable and entanglement QKD.

  15. Two Key Concepts in the Diagnosis of Learning Disabilities and the Habilitation of Learning.

    ERIC Educational Resources Information Center

    Reynolds, Cecil R.

    1992-01-01

    Two key concepts in diagnosing learning disabilities ("severe discrepancy" and "process dysfunction") are reviewed, and their relationship to the habilitation of learning is discussed. Guidelines are given for calculating a severe discrepancy, and the evaluation of processing skills is discussed. Strength models of remediation…

  16. Validation of intermediate end points in cancer research.

    PubMed

    Schatzkin, A; Freedman, L S; Schiffman, M H; Dawsey, S M

    1990-11-21

    Investigations using intermediate end points as cancer surrogates are quicker, smaller, and less expensive than studies that use malignancy as the end point. We present a strategy for determining whether a given biomarker is a valid intermediate end point between an exposure and incidence of cancer. Candidate intermediate end points may be selected from case series, ecologic studies, and animal experiments. Prospective cohort and sometimes case-control studies may be used to quantify the intermediate end point-cancer association. The most appropriate measure of this association is the attributable proportion. The intermediate end point is a valid cancer surrogate if the attributable proportion is close to 1.0, but not if it is close to 0. Usually, the attributable proportion is close to neither 1.0 nor 0; in this case, valid surrogacy requires that the intermediate end point mediate an established exposure-cancer relation. This would in turn imply that the exposure effect would vanish if adjusted for the intermediate end point. We discuss the relative advantages of intervention and observational studies for the validation of intermediate end points. This validation strategy also may be applied to intermediate end points for adverse reproductive outcomes and chronic diseases other than cancer.

  17. A maximum power point tracking algorithm for buoy-rope-drum wave energy converters

    NASA Astrophysics Data System (ADS)

    Wang, J. Q.; Zhang, X. C.; Zhou, Y.; Cui, Z. C.; Zhu, L. S.

    2016-08-01

    The maximum power point tracking control is the key link to improve the energy conversion efficiency of wave energy converters (WEC). This paper presents a novel variable step size Perturb and Observe maximum power point tracking algorithm with a power classification standard for control of a buoy-rope-drum WEC. The algorithm and simulation model of the buoy-rope-drum WEC are presented in details, as well as simulation experiment results. The results show that the algorithm tracks the maximum power point of the WEC fast and accurately.

  18. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    ERIC Educational Resources Information Center

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  19. Point-of-care HIV tests done by peers, Brazil

    PubMed Central

    Dutra de Barros, Clarissa Habckost; Lobo, Tainah Dourado de Miranda; Pasini, Elisiane Nelcina; Comparini, Regina Aparecida; Caldas de Mesquita, Fábio

    2016-01-01

    Abstract Problem Early diagnosis of infections with human immunodeficiency virus (HIV) is needed – especially among key populations such as sex workers, transgender people, men who have sex with men and people who use drugs. Approach The Brazilian Ministry of Health developed a strategy called Viva Melhor Sabendo (“live better knowing”) to increase HIV testing among key populations. In partnership with nongovernmental organizations (NGOs), a peer point-of-care testing intervention, using an oral fluid rapid test, was introduced at social venues for key populations at different times of the day. Local setting Key populations in Brazil can have 40 times higher HIV prevalence than the general population (14.8% versus 0.4%). Relevant changes Legislation was reinterpreted, so that oral fluid rapid tests could be administered by any person trained in rapid testing by the health ministry. Between January 2014 and March 2015, 29 723 oral fluid tests were administered; 791 (2.7%) were positive. Among the key populations, transgender people had the greatest proportion of positive results (10.7%; 172/1612), followed by men who declared themselves as commercial sex workers (8.7%; 165/1889) and men who have sex with men (4.8%; 292/6055). Lessons learnt The strategy improved access to HIV testing. Testing done by peers at times and locations suitable for key populations increased acceptance of testing. Working with relevant NGOs is a useful approach when reaching out to these key populations. PMID:27516641

  20. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2008-05-01

    The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

  1. Teach Your Students the Power of PowerPoint

    ERIC Educational Resources Information Center

    Shackelford, Ray; Griffis, Kurt

    2007-01-01

    People now have the tools to create presentations that use sophisticated graphics and text with vivid color, interesting animations, detailed charts, and personalized templates. Students should know how to use this new communication technology. In this article, the authors discuss keys to effective presentation. They present an activity wherein…

  2. Approaches to a global quantum key distribution network

    NASA Astrophysics Data System (ADS)

    Islam, Tanvirul; Bedington, Robert; Ling, Alexander

    2017-10-01

    Progress in realising quantum computers threatens to weaken existing public key encryption infrastructure. A global quantum key distribution (QKD) network can play a role in computational attack-resistant encryption. Such a network could use a constellation of high altitude platforms such as airships and satellites as trusted nodes to facilitate QKD between any two points on the globe on demand. This requires both space-to-ground and inter-platform links. However, the prohibitive cost of traditional satellite based development limits the experimental work demonstrating relevant technologies. To accelerate progress towards a global network, we use an emerging class of shoe-box sized spacecraft known as CubeSats. We have designed a polarization entangled photon pair source that can operate on board CubeSats. The robustness and miniature form factor of our entanglement source makes it especially suitable for performing pathfinder missions that studies QKD between two high altitude platforms. The technological outcomes of such mission would be the essential building blocks for a global QKD network.

  3. Diabolical points in multi-scatterer optomechanical systems

    PubMed Central

    Chesi, Stefano; Wang, Ying-Dan; Twamley, Jason

    2015-01-01

    Diabolical points, which originate from parameter-dependent accidental degeneracies of a system's energy levels, have played a fundamental role in the discovery of the Berry phase as well as in photonics (conical refraction), in chemical dynamics, and more recently in novel materials such as graphene, whose electronic band structure possess Dirac points. Here we discuss diabolical points in an optomechanical system formed by multiple scatterers in an optical cavity with periodic boundary conditions. Such configuration is close to experimental setups using micro-toroidal rings with indentations or near-field scatterers. We find that the optomechanical coupling is no longer an analytic function near the diabolical point and demonstrate the topological phase arising through the mechanical motion. Similar to a Fabry-Perot resonator, the optomechanical coupling can grow with the number of scatterers. We also introduce a minimal quantum model of a diabolical point, which establishes a connection to the motion of an arbitrary-spin particle in a 2D parabolic quantum dot with spin-orbit coupling. PMID:25588627

  4. Key node selection in minimum-cost control of complex networks

    NASA Astrophysics Data System (ADS)

    Ding, Jie; Wen, Changyun; Li, Guoqi

    2017-11-01

    Finding the key node set that is connected with a given number of external control sources for driving complex networks from initial state to any predefined state with minimum cost, known as minimum-cost control problem, is critically important but remains largely open. By defining an importance index for each node, we propose revisited projected gradient method extension (R-PGME) in Monte-Carlo scenario to determine key node set. It is found that the importance index of a node is strongly correlated to occurrence rate of that node to be selected as a key node in Monte-Carlo realizations for three elementary topologies, Erdős-Rényi and scale-free networks. We also discover the distribution patterns of key nodes when the control cost reaches its minimum. Specifically, the importance indices of all nodes in an elementary stem show a quasi-periodic distribution with high peak values in the beginning and end of a quasi-period while they approach to a uniform distribution in an elementary cycle. We further point out that an elementary dilation can be regarded as two elementary stems whose lengths are the closest, and the importance indices in each stem present similar distribution as in an elementary stem. Our results provide a better understanding and deep insight of locating the key nodes in different topologies with minimum control cost.

  5. X-ray Point Source Populations in Spiral and Elliptical Galaxies

    NASA Astrophysics Data System (ADS)

    Colbert, E.; Heckman, T.; Weaver, K.; Strickland, D.

    2002-01-01

    The hard-X-ray luminosity of non-active galaxies has been known to be fairly well correlated with the total blue luminosity since the days of the Einstein satellite. However, the origin of this hard component was not well understood. Some possibilities that were considered included X-ray binaries, extended upscattered far-infrared light via the inverse-Compton process, extended hot 107 K gas (especially in ellipitical galaxies), or even an active nucleus. Chandra images of normal, elliptical and starburst galaxies now show that a significant amount of the total hard X-ray emission comes from individual point sources. We present here spatial and spectral analyses of the point sources in a small sample of Chandra obervations of starburst galaxies, and compare with Chandra point source analyses from comparison galaxies (elliptical, Seyfert and normal galaxies). We discuss possible relationships between the number and total hard luminosity of the X-ray point sources and various measures of the galaxy star formation rate, and discuss possible options for the numerous compact sources that are observed.

  6. Key Concepts in Microbial Oceanography

    NASA Astrophysics Data System (ADS)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  7. a Gross Error Elimination Method for Point Cloud Data Based on Kd-Tree

    NASA Astrophysics Data System (ADS)

    Kang, Q.; Huang, G.; Yang, S.

    2018-04-01

    Point cloud data has been one type of widely used data sources in the field of remote sensing. Key steps of point cloud data's pro-processing focus on gross error elimination and quality control. Owing to the volume feature of point could data, existed gross error elimination methods need spend massive memory both in space and time. This paper employed a new method which based on Kd-tree algorithm to construct, k-nearest neighbor algorithm to search, settled appropriate threshold to determine with result turns out a judgement that whether target point is or not an outlier. Experimental results show that, our proposed algorithm will help to delete gross error in point cloud data and facilitate to decrease memory consumption, improve efficiency.

  8. Introducing Nine-Point Circle to Junior High School Students

    NASA Astrophysics Data System (ADS)

    Fiangga, S.; Azizah, M. A. N.; Rini, R. N. K.; Hidayanti, A. N.

    2018-01-01

    The concept of circles is an ancient concept that has appeared since Ancient Egypt from which this concept gives many significant contributions in mathematics’ development until now. Nevertheless, the concept of circles hides many uncover mysterious features that are of applications in mathematics. One of the mysterious features is the Nine-Point Circle. This Nine-point circle is also known as Euler’s circle, six-point circle, Feuerbach’s circle, the twelve-point circle, and many others. Because of these different names, there have been misunderstand among mathematicians about the Nine-Point Circle’s history. Besides, the discussion of Nine-Point Circle can be used to be an initial material to explain elementary geometry topic in junior high school’s level curriculum of 2013. Therefore, this concept needs to be delivered to the students as a geometry introduction. A possible form of the integration historical aspect of Nine-point circle is suggested in this paper as well as its importance in the curriculum of 2013.

  9. Libration Point Navigation Concepts Supporting the Vision for Space Exploration

    NASA Technical Reports Server (NTRS)

    Carpenter, J. Russell; Folta, David C.; Moreau, Michael C.; Quinn, David A.

    2004-01-01

    This work examines the autonomous navigation accuracy achievable for a lunar exploration trajectory from a translunar libration point lunar navigation relay satellite, augmented by signals from the Global Positioning System (GPS). We also provide a brief analysis comparing the libration point relay to lunar orbit relay architectures, and discuss some issues of GPS usage for cis-lunar trajectories.

  10. Winding numbers of nodal points in Fe-based superconductors

    NASA Astrophysics Data System (ADS)

    Chichinadze, Dmitry V.; Chubukov, Andrey V.

    2018-03-01

    We analyze the nodal points in multiorbital Fe-based superconductors from a topological perspective. We consider the s+- gap structure with accidental nodes, and the d -wave gap with nodes along the symmetry directions. In both cases, the nodal points can be moved by varying an external parameter, e.g., a degree of interpocket pairing. Eventually, the nodes merge and annihilate via a Lifshitz-type transition. We discuss the Lifshitz transition in Fe-based superconductors from a topological point of view. We show, both analytically and numerically, that the merging nodal points have winding numbers of opposite sign. This is consistent with the general reasoning that the total winding number is a conserved quantity in the Lifshitz transition.

  11. [A landscape ecological approach for urban non-point source pollution control].

    PubMed

    Guo, Qinghai; Ma, Keming; Zhao, Jingzhu; Yang, Liu; Yin, Chengqing

    2005-05-01

    Urban non-point source pollution is a new problem appeared with the speeding development of urbanization. The particularity of urban land use and the increase of impervious surface area make urban non-point source pollution differ from agricultural non-point source pollution, and more difficult to control. Best Management Practices (BMPs) are the effective practices commonly applied in controlling urban non-point source pollution, mainly adopting local repairing practices to control the pollutants in surface runoff. Because of the close relationship between urban land use patterns and non-point source pollution, it would be rational to combine the landscape ecological planning with local BMPs to control the urban non-point source pollution, which needs, firstly, analyzing and evaluating the influence of landscape structure on water-bodies, pollution sources and pollutant removal processes to define the relationships between landscape spatial pattern and non-point source pollution and to decide the key polluted fields, and secondly, adjusting inherent landscape structures or/and joining new landscape factors to form new landscape pattern, and combining landscape planning and management through applying BMPs into planning to improve urban landscape heterogeneity and to control urban non-point source pollution.

  12. An investigation into the differentiating characteristics between car key burglars and regular burglars.

    PubMed

    Chapman, Rachel; Smith, Lisa L; Bond, John W

    2012-07-01

    Car key burglary has recently become the focus of empirical investigation as offenders, no longer able to steal vehicles without first obtaining their keys, resort to "burgling" target properties. Research surrounding the modus operandi of these offenses is beginning to emerge; however, little attention has been paid to investigating the characteristics of car key burglary offenders. Challenging the assumption that car key burglary offenses are perpetrated by regular burglars, this study aims to differentiate between offenders. Logistic regression analysis of 110 car key and 110 regular burglary offenders revealed that car key burglars are more likely to have previous vehicle theft convictions and are also more likely to be detected on information supplied to the police than regular burglars. Regular burglars are more likely to have previous shoplifting convictions. It was concluded that car key burglars are a distinct sample of offenders and the implications of these findings are discussed. © 2012 American Academy of Forensic Sciences.

  13. Obesity prevention at the point of purchase.

    PubMed

    Cohen, D A; Lesser, L I

    2016-05-01

    The point of purchase is when people may make poor and impulsive decisions about what and how much to buy and consume. Because point of purchase strategies frequently work through non-cognitive processes, people are often unable to recognize and resist them. Because people lack insight into how marketing practices interfere with their ability to routinely eat healthy, balanced diets, public health entities should protect consumers from potentially harmful point of purchase strategies. We describe four point of purchase policy options including standardized portion sizes; standards for meals that are sold as a bundle, e.g. 'combo meals'; placement and marketing restrictions on highly processed low-nutrient foods; and explicit warning labels. Adoption of such policies could contribute significantly to the prevention of obesity and diet-related chronic diseases. We also discuss how the policies could be implemented, along with who might favour or oppose them. Many of the policies can be implemented locally, while preserving consumer choice. © 2016 World Obesity.

  14. Obesity Prevention at the Point of Purchase

    PubMed Central

    Cohen, Deborah A.; Lesser, Lenard I.

    2017-01-01

    The point of purchase is when people may make poor and impulsive decisions about what and how much to buy and consume. Since point of purchase strategies frequently work through non-cognitive processes, people are often unable to recognize and resist them. Because people lack insight into how marketing practices interfere with their ability to routinely eat healthy, balanced diets, public health entities should protect consumers from point of purchase strategies. We describe four point of purchase policy options including standardized portion sizes; standards for meals that are sold as a bundle, e.g. “combo meals”; placement and marketing restrictions on highly processed low-nutrient foods; and explicit warning labels. Adoption of such policies could contribute significantly to the prevention of obesity and diet-related chronic diseases. We also discuss how the policies could be implemented, along with who might favor or oppose them. Many of the policies can be implemented locally, while preserving consumer choice. PMID:26910361

  15. Making "Community" an Authentic Part of School and Community Partnerships. Chapin Hall Discussion Paper

    ERIC Educational Resources Information Center

    Walker, Lisa; Smithgall, Cheryl; Cusick, Gretchen Ruth

    2012-01-01

    With the idea that schools in low-income urban areas require stronger communities to improve educational outcomes, this discussion paper examines questions related to the authentic engagement of communities in school and community partnerships. It presents three key ideas for considering authentic engagement: place-based policy, community-based…

  16. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications

    PubMed Central

    Saeedi, Ehsan; Kong, Yinan

    2017-01-01

    In this paper, we propose a novel parallel architecture for fast hardware implementation of elliptic curve point multiplication (ECPM), which is the key operation of an elliptic curve cryptography processor. The point multiplication over binary fields is synthesized on both FPGA and ASIC technology by designing fast elliptic curve group operations in Jacobian projective coordinates. A novel combined point doubling and point addition (PDPA) architecture is proposed for group operations to achieve high speed and low hardware requirements for ECPM. It has been implemented over the binary field which is recommended by the National Institute of Standards and Technology (NIST). The proposed ECPM supports two Koblitz and random curves for the key sizes 233 and 163 bits. For group operations, a finite-field arithmetic operation, e.g. multiplication, is designed on a polynomial basis. The delay of a 233-bit point multiplication is only 3.05 and 3.56 μs, in a Xilinx Virtex-7 FPGA, for Koblitz and random curves, respectively, and 0.81 μs in an ASIC 65-nm technology, which are the fastest hardware implementation results reported in the literature to date. In addition, a 163-bit point multiplication is also implemented in FPGA and ASIC for fair comparison which takes around 0.33 and 0.46 μs, respectively. The area-time product of the proposed point multiplication is very low compared to similar designs. The performance (1Area×Time=1AT) and Area × Time × Energy (ATE) product of the proposed design are far better than the most significant studies found in the literature. PMID:28459831

  17. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues

    PubMed Central

    2013-01-01

    Background If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Methods Electronic databases and organisation websites were searched using a 22 year time horizon (1990–2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. Results We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. Conclusions In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may

  18. Do Thai parents discuss sex and AIDS with young adolescents? A qualitative study.

    PubMed

    Meechamnan, Chutima; Fongkaew, Warunee; Chotibang, Jutamas; McGrath, Barbara Burns

    2014-03-01

    This qualitative study explored parents' and young adolescents' perceptions of communication related to sex and HIV/AIDS. Focus group discussions and group discussion were conducted among 67 adolescents and 30 parents. For the adolescents, group discussion using participatory activities was conducted, followed by five focus group discussions. Group discussions using participatory activities were conducted among parents. Thematic analysis indicated that the adolescents received inadequate information about sex and AIDS from their parents, whom they feared as providing negative judgment, and this represented a key barrier to such discussions. Their parents, on the other hand, reported that they believed their children were still too young to learn about and engage in sexual activities. The parents perceived barriers to communication included a lack of confidence and feelings of embarrassment. Nevertheless, they also recognized their important role in their child's sexual education. Collectively, these results draw attention to the need for a culturally appropriate program to strengthen parent-child communication skills for the topics of sex and HIV/AIDS. © 2013 Wiley Publishing Asia Pty Ltd.

  19. Key Questions in Building Defect Prediction Models in Practice

    NASA Astrophysics Data System (ADS)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.

  20. Research on the architecture and key technologies of SIG

    NASA Astrophysics Data System (ADS)

    Fu, Zhongliang; Meng, Qingxiang; Huang, Yan; Liu, Shufan

    2007-06-01

    Along with the development of computer network, Grid has become one of the hottest issues of researches on sharing and cooperation of Internet resources throughout the world. This paper illustrates a new architecture of SIG-a five-hierarchy architecture (including Data Collecting Layer, Grid Layer, Service Layer, Application Layer and Client Layer) of SIG from the traditional three hierarchies (only including resource layer, service layer and client layer). In the paper, the author proposes a new mixed network mode of Spatial Information Grid which integrates CAG (Certificate Authority of Grid) and P2P (Peer to Peer) in the Grid Layer, besides, the author discusses some key technologies of SIG and analysis the functions of these key technologies.

  1. OECD, "Key Competencies" and the New Challenges of Educational Inequality

    ERIC Educational Resources Information Center

    Takayama, Keita

    2013-01-01

    In this paper, I develop a critique of the Organization for Economic Cooperation and Development (OECD)-based lifelong learning policy discourse with a particular focus on "key competencies" (KCs) and its equity implications for school curricular policies. First, I review the discussion of KCs in the writings by the OECD-affiliated…

  2. Keeping the Best: A Practical Guide to Retaining Key Employees.

    ERIC Educational Resources Information Center

    Bevan, Stephen; Barber, Linda; Robinson, Dilys

    This book, which is intended to assist human resource professionals and line managers in the United Kingdom, is a practical guide to retaining key employees. Discussed in the introduction are the relationship between downsizing and retention, problems that retention difficulties pose for human resource management, and the effects of retention…

  3. Fault Lines in New Labour's Education Project: Points for Intervention and Resistance

    ERIC Educational Resources Information Center

    Coles, Jane

    2006-01-01

    This article argues that New Labour's third term education policies are riddled with internal contradictions. The author explores key tension points and suggests that fractures might be opened up where the government is most vulnerable to critical scrutiny and interventions by grassroots resistance.

  4. Study on Huizhou architecture of point cloud registration based on optimized ICP algorithm

    NASA Astrophysics Data System (ADS)

    Zhang, Runmei; Wu, Yulu; Zhang, Guangbin; Zhou, Wei; Tao, Yuqian

    2018-03-01

    In view of the current point cloud registration software has high hardware requirements, heavy workload and moltiple interactive definition, the source of software with better processing effect is not open, a two--step registration method based on normal vector distribution feature and coarse feature based iterative closest point (ICP) algorithm is proposed in this paper. This method combines fast point feature histogram (FPFH) algorithm, define the adjacency region of point cloud and the calculation model of the distribution of normal vectors, setting up the local coordinate system for each key point, and obtaining the transformation matrix to finish rough registration, the rough registration results of two stations are accurately registered by using the ICP algorithm. Experimental results show that, compared with the traditional ICP algorithm, the method used in this paper has obvious time and precision advantages for large amount of point clouds.

  5. Flight performance of Skylab attitude and pointing control system

    NASA Technical Reports Server (NTRS)

    Chubb, W. B.; Kennel, H. F.; Rupp, C. C.; Seltzer, S. M.

    1975-01-01

    The Skylab attitude and pointing control system (APCS) requirements are briefly reviewed and the way in which they became altered during the prelaunch phase of development is noted. The actual flight mission (including mission alterations during flight) is described. The serious hardware failures that occurred, beginning during ascent through the atmosphere, also are described. The APCS's ability to overcome these failures and meet mission changes are presented. The large around-the-clock support effort on the ground is discussed. Salient design points and software flexibility that should afford pertinent experience for future spacecraft attitude and pointing control system designs are included.

  6. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  7. Stagnation-Point Shielding by Melting and Vaporization

    NASA Technical Reports Server (NTRS)

    Roberts, Leonard

    1959-01-01

    An approximate theoretical analysis was made of the shielding mechanism whereby the rate of heat transfer to the forward stagnation point of blunt bodies is reduced by melting and evaporation. General qualitative results are given and a numerical example, the melting and evaporation of ice, is presented and discussed in detail.

  8. Coding and decoding in a point-to-point communication using the polarization of the light beam.

    PubMed

    Kavehvash, Z; Massoumian, F

    2008-05-10

    A new technique for coding and decoding of optical signals through the use of polarization is described. In this technique the concept of coding is translated to polarization. In other words, coding is done in such a way that each code represents a unique polarization. This is done by implementing a binary pattern on a spatial light modulator in such a way that the reflected light has the required polarization. Decoding is done by the detection of the received beam's polarization. By linking the concept of coding to polarization we can use each of these concepts in measuring the other one, attaining some gains. In this paper the construction of a simple point-to-point communication where coding and decoding is done through polarization will be discussed.

  9. Maximum power point tracker for photovoltaic power plants

    NASA Astrophysics Data System (ADS)

    Arcidiacono, V.; Corsi, S.; Lambri, L.

    The paper describes two different closed-loop control criteria for the maximum power point tracking of the voltage-current characteristic of a photovoltaic generator. The two criteria are discussed and compared, inter alia, with regard to the setting-up problems that they pose. Although a detailed analysis is not embarked upon, the paper also provides some quantitative information on the energy advantages obtained by using electronic maximum power point tracking systems, as compared with the situation in which the point of operation of the photovoltaic generator is not controlled at all. Lastly, the paper presents two high-efficiency MPPT converters for experimental photovoltaic plants of the stand-alone and the grid-interconnected type.

  10. Monitoring urban subsidence based on SAR lnterferometric point target analysis

    USGS Publications Warehouse

    Zhang, Y.; Zhang, Jiahua; Gong, W.; Lu, Z.

    2009-01-01

    lnterferometric point target analysis (IPTA) is one of the latest developments in radar interferometric processing. It is achieved by analysis of the interferometric phases of some individual point targets, which are discrete and present temporarily stable backscattering characteristics, in long temporal series of interferometric SAR images. This paper analyzes the interferometric phase model of point targets, and then addresses two key issues within IPTA process. Firstly, a spatial searching method is proposed to unwrap the interferometric phase difference between two neighboring point targets. The height residual error and linear deformation rate of each point target can then be calculated, when a global reference point with known height correction and deformation history is chosen. Secondly, a spatial-temporal filtering scheme is proposed to further separate the atmosphere phase and nonlinear deformation phase from the residual interferometric phase. Finally, an experiment of the developed IPTA methodology is conducted over Suzhou urban area. Totally 38 ERS-1/2 SAR scenes are analyzed, and the deformation information over 3 546 point targets in the time span of 1992-2002 are generated. The IPTA-derived deformation shows very good agreement with the published result, which demonstrates that the IPTA technique can be developed into an operational tool to map the ground subsidence over urban area.

  11. Key concepts regarding the genetics of hypertension in humans.

    PubMed

    Williams, R R

    1991-11-01

    More and more, genetic research is being used to investigate the problem of hypertension, especially as hypertension appears to be a population-wide phenomenon. This article discusses such key concepts as phenotypic variation within the hypertensive subpopulation, the importance of a family history for hypertension in predicting hypertension, the development of hypertension in youth, environmental considerations (nature v nurture), and gene linkage.

  12. A quantitative analysis of statistical power identifies obesity end points for improved in vivo preclinical study design.

    PubMed

    Selimkhanov, J; Thompson, W C; Guo, J; Hall, K D; Musante, C J

    2017-08-01

    The design of well-powered in vivo preclinical studies is a key element in building the knowledge of disease physiology for the purpose of identifying and effectively testing potential antiobesity drug targets. However, as a result of the complexity of the obese phenotype, there is limited understanding of the variability within and between study animals of macroscopic end points such as food intake and body composition. This, combined with limitations inherent in the measurement of certain end points, presents challenges to study design that can have significant consequences for an antiobesity program. Here, we analyze a large, longitudinal study of mouse food intake and body composition during diet perturbation to quantify the variability and interaction of the key metabolic end points. To demonstrate how conclusions can change as a function of study size, we show that a simulated preclinical study properly powered for one end point may lead to false conclusions based on secondary end points. We then propose the guidelines for end point selection and study size estimation under different conditions to facilitate proper power calculation for a more successful in vivo study design.

  13. Heat-flow measurements at shot points along the 1978 Saudi Arabia seismic deep-refraction line; Part II, Discussion and interpretation

    USGS Publications Warehouse

    Gettings, M.E.

    1982-01-01

    The heat-flow profile across the Arabian Shield from Ar Riyad to Ad Darb and across the Red Sea is examined for compatibility with the lithospheric structure of the area as deduced from geologic and other geophysical data. Broad continental uplift associated with Red Sea rifting is symmetric about the Red Sea axis, and geologic and geochronologic evidence indicate that uplift has occurred mainly in the interval 25-13 Ma (mega-annum) ago. Thermal-profile changes in the upper mantle resulting from an influx of hot material associated with rifting yield the correct order of magnitude of uplift, and this mechanism is suggested as the explanation for the regional doming. A lithospheric section, constructed from seismic refraction, gravity, and regional geologic data, provides the framework for construction of thermal models. Thermal gradient measurements were made in drill holes at five shot points. Geotherms for the Shield, which assume a radiogenic heat-source distribution that decreases exponentially with depth, yield temperatures of about 450?C at a depth of 40 km (base of the crust) for shot points 2 (Sabhah) and 3. The geotherm for shot point 4 (near Bishah) yields a distinctly higher temperature (about 580?C) for the same depth. Static models used to model the heat flow in the oceanic crust of the Red Sea shelf and coastal plain either yield too small a heat flow to match the observed heat flow or give lithosphere thicknesses that are so thin as to be improbable. Dynamic (solid-state accretion) models, which account for mantle flow at the base of the lithosphere, adequately match the observed heat-flow values. In the deep-water trough of the Red Sea, which is presently undergoing active sea-floor spreading, classical models of heat flow for a moving slab with accretion at the spreading center are adequate to explain the average heat-flow level. At shot point 5 (Ad Darb), the anomalous heat flow of 2 HFU (heat-flow units) can be explained in terms of a Shield

  14. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  15. An overview of key technology thrusts at Bell Helicopter Textron

    NASA Technical Reports Server (NTRS)

    Harse, James H.; Yen, Jing G.; Taylor, Rodney S.

    1988-01-01

    Insight is provided into several key technologies at Bell. Specific topics include the results of ongoing research and development in advanced rotors, methodology development, and new configurations. The discussion on advanced rotors highlight developments on the composite, bearingless rotor, including the development and testing of full scale flight hardware as well as some of the design support analyses and verification testing. The discussion on methodology development concentrates on analytical development in aeromechanics, including correlation studies and design application. New configurations, presents the results of some advanced configuration studies including hardware development.

  16. The Role of Gender in the Socialization of Emotion: Key Concepts and Critical Issues

    ERIC Educational Resources Information Center

    Root, Amy Kennedy; Denham, Susanne A.

    2010-01-01

    Given the omnipresent role of gender in children's and adolescents' development, it seems necessary to better understand how gender affects the process of emotion socialization. In this introductory chapter, the authors discuss the overarching themes and key concepts discussed in this volume, as well as outline the distinct contribution of each…

  17. Discussion of a didactic proposal on quantum mechanics with secondary school students

    NASA Astrophysics Data System (ADS)

    Michelini, M.; Ragazzon, R.; Santi, L.; Stefanel, A.

    2004-09-01

    Within some research projects a proposal for the teaching of quantum mechanics in secondary school has been carried out, and some didactic material has been prepared in order to illustrate it, offering resources for its class experimentation (www.fisica.uniud.it/URDF/). In order to study in depth the critical points, which cause learning difficulties for the students in this field, a pilot activity was carried out for a restricted group of students with which the crucial points were discussed. Some interesting elements emerged, such as for example the fact that the major problems in understanding the concept of quantum state are linked to the meaning of incompatible observables.

  18. Tailored combination prevention packages and PrEP for young key populations

    PubMed Central

    Pettifor, Audrey; Nguyen, Nadia L; Celum, Connie; Cowan, Frances M; Go, Vivian; Hightow-Weidman, Lisa

    2015-01-01

    Introduction Young key populations, defined in this article as men who have sex with men, transgender persons, people who sell sex and people who inject drugs, are at particularly high risk for HIV. Due to the often marginalized and sometimes criminalized status of young people who identify as members of key populations, there is a need for HIV prevention packages that account for the unique and challenging circumstances they face. Pre-exposure prophylaxis (PrEP) is likely to become an important element of combination prevention for many young key populations. Objective In this paper, we discuss important challenges to HIV prevention among young key populations, identify key components of a tailored combination prevention package for this population and examine the role of PrEP in these prevention packages. Methods We conducted a comprehensive review of the evidence to date on prevention strategies, challenges to prevention and combination prevention packages for young key populations. We focused specifically on the role of PrEP in these prevention packages and on young people under the age of 24, and 18 in particular. Results and discussion Combination prevention packages that include effective, acceptable and scalable behavioural, structural and biologic interventions are needed for all key populations to prevent new HIV infections. Interventions in these packages should meaningfully involve beneficiaries in the design and implementation of the intervention, and take into account the context in which the intervention is being delivered to thoughtfully address issues of stigma and discrimination. These interventions will likely be most effective if implemented in conjunction with strategies to facilitate an enabling environment, including increasing access to HIV testing and health services for PrEP and other prevention strategies, decriminalizing key populations’ practices, increasing access to prevention and care, reducing stigma and discrimination, and

  19. Bicarbonate transporters in corals point towards a key step in the evolution of cnidarian calcification.

    PubMed

    Zoccola, Didier; Ganot, Philippe; Bertucci, Anthony; Caminiti-Segonds, Natacha; Techer, Nathalie; Voolstra, Christian R; Aranda, Manuel; Tambutté, Eric; Allemand, Denis; Casey, Joseph R; Tambutté, Sylvie

    2015-06-04

    The bicarbonate ion (HCO3(-)) is involved in two major physiological processes in corals, biomineralization and photosynthesis, yet no molecular data on bicarbonate transporters are available. Here, we characterized plasma membrane-type HCO3(-) transporters in the scleractinian coral Stylophora pistillata. Eight solute carrier (SLC) genes were found in the genome: five homologs of mammalian-type SLC4 family members, and three of mammalian-type SLC26 family members. Using relative expression analysis and immunostaining, we analyzed the cellular distribution of these transporters and conducted phylogenetic analyses to determine the extent of conservation among cnidarian model organisms. Our data suggest that the SLC4γ isoform is specific to scleractinian corals and responsible for supplying HCO3(-) to the site of calcification. Taken together, SLC4γ appears to be one of the key genes for skeleton building in corals, which bears profound implications for our understanding of coral biomineralization and the evolution of scleractinian corals within cnidarians.

  20. A discussion of key values to inform the design and delivery of services for HIV-affected women and couples attempting pregnancy in resource-constrained settings.

    PubMed

    Heffron, Renee; Davies, Natasha; Cooke, Ian; Kaida, Angela; Mergler, Reid; van der Poel, Sheryl; Cohen, Craig R; Mmeje, Okeoma

    2015-01-01

    HIV-affected women and couples often desire children and many accept HIV risk in order to attempt pregnancy and satisfy goals for a family. Risk reduction strategies to mitigate sexual and perinatal HIV transmission include biomedical and behavioural approaches. Current efforts to integrate HIV and reproductive health services offer prime opportunities to incorporate strategies for HIV risk reduction during pregnancy attempts. Key client and provider values about services to optimize pregnancy in the context of HIV risk provide insights for the design and implementation of large-scale "safer conception" programmes. Through our collective experience and discussions at a multi-disciplinary international World Health Organization-convened workshop to initiate the development of guidelines and an algorithm of care to support the delivery of services for HIV-affected women and couples attempting pregnancy, we identified four values that are key to the implementation of these programmes: (1) understanding fertility care and an ability to identify potential fertility problems; (2) providing equity of access to resources enabling informed decision-making about reproductive choices; (3) creating enabling environments that reduce stigma associated with HIV and infertility; and (4) creating enabling environments that encourage disclosure of HIV status and fertility status to partners. Based on these values, recommendations for programmes serving HIV-affected women and couples attempting pregnancy include the following: incorporation of comprehensive reproductive health counselling; training to support the transfer and exchange of knowledge between providers and clients; care environments that reduce the stigma of childbearing among HIV-affected women and couples; support for safe and voluntary disclosure of HIV and fertility status; and increased efforts to engage men in reproductive decision-making at times that align with women's desires. Programmes, policies and guidelines

  1. The use of upconverting phosphors in point-of-care (POC) testing

    NASA Astrophysics Data System (ADS)

    Tanke, Hans J.; Zuiderwijk, Michel; Wiesmeijer, Karien C.; Breedveld, Robert N.; Abrams, William R.; de Dood, Claudia J.; Tjon Kon Fat, Elisa M.; Corstjens, Paul L. A. M.

    2014-03-01

    Point-of-care (POC) testing is increasingly applied as a cost effective alternative to many diagnostic tests. Key in POC testing is to create sufficient assay sensitivity with relatively low cost reagents and equipment. For this purpose we have employed a unique reporter, upconverting phosphor (UCP) particles, in combination with lateral flow (LF) assays. UCPs, submicron ceramic particles doped with rare earth ions (lanthanides), convert infrared to visible light and do not suffer from autofluorescence which limits conventional fluorescence based assays. Low cost handheld readers and microfluidics were evaluated in various applications. Designed assays are well suited for applications outside diagnostic laboratories, in resource poor settings, and can even be used by patients at home. Using two distinctly different UCP-LF assay formats, we focussed on assays for infectious diseases based on the detection of pathogen-specific antibodies and/or antigens including nucleic acids to demonstrate active infection with HIV. Only minor adaptation of the standard UCP-LF assay format is needed to render the format suitable for applications involving low affinity capture antibodies (e.g. in the detection of neurotoxin, botulism), capture of small molecules (e.g. detection of melatonin, a key hormone in chronopharmacology) or the use of dry UCP reagents (e.g. detection of protein based fruit-ripening markers, of economic interest in agriculture). Finally, we anticipate on developments in healthcare (personalized medicine) by discussing the potential of one of the UCP-LF assay formats to measure serum trough levels of immunodrugs (e.g. infliximab or adalimumab) in patients treated for inflammatory bowel disease and rheumatoid arthritis.

  2. Sensing with Superconducting Point Contacts

    PubMed Central

    Nurbawono, Argo; Zhang, Chun

    2012-01-01

    Superconducting point contacts have been used for measuring magnetic polarizations, identifying magnetic impurities, electronic structures, and even the vibrational modes of small molecules. Due to intrinsically small energy scale in the subgap structures of the supercurrent determined by the size of the superconducting energy gap, superconductors provide ultrahigh sensitivities for high resolution spectroscopies. The so-called Andreev reflection process between normal metal and superconductor carries complex and rich information which can be utilized as powerful sensor when fully exploited. In this review, we would discuss recent experimental and theoretical developments in the supercurrent transport through superconducting point contacts and their relevance to sensing applications, and we would highlight their current issues and potentials. A true utilization of the method based on Andreev reflection analysis opens up possibilities for a new class of ultrasensitive sensors. PMID:22778630

  3. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  4. Exploring Measures to Control Road Traffic Injuries in Iran: Key Informants Points of View.

    PubMed

    Salari, Hedayat; Motevalian, Seyed Abbas; Arab, Mohammad; Esfandiari, Atefeh; Akbari Sari, Ali

    2017-05-01

    Injuries and fatalities from road traffic Injuries are global public health concerns, and a major problem in the Iran. This study aimed to explore strategies to control road traffic Injuries (RTI) in Iran. We conducted a qualitative study to explore possible ways to reduce the occurrence of road traffic Injuries in Iran in 2016. Interviewees were purposively sampled from various sectors due to multidisciplinary nature of RTIs. Participants were mainly representatives from the police, Ministry of Road, Municipal, emergency services and Ministry of Health. Besides, public health authorities, researchers, and university professors were interviewed. We conducted in-depth interviews using generic guides. Data was analyzed using MAXQDA 10 software. Through content analysis, we interpreted core themes relevant to the accomplishment of our study objectives. Themes that emerged from our study include; road traffic management, governance, education, improving accident database, enforcement, driving license restrictions, and construction of pedestrian overpass. This study revealed key informants' views regarding available and affordable solutions to reduce RTIs in Iran. Many applicable strategies are identified in the control of RTIs in Iran. Although some solutions such as highway construction and/or expanding rail transportation have been suggested as effective measures for reducing accident, but they are costly and may not be fully applied in developing countries like Iran.

  5. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  6. Strengthening Discussions

    ERIC Educational Resources Information Center

    Hintz, Allison B.

    2013-01-01

    "Strategy sharing" is a certain type of discussion that centers on students' ideas and occurs when children present different approaches to problems and provide information about how they solved the problem (Wood, Williams, and McNeal 2004). A teacher may orchestrate a strategy-sharing discussion to achieve one or more of the…

  7. Holographic Location of Distant Points (PREPRINT)

    DTIC Science & Technology

    2010-06-01

    respects and the nonimaging systems have significant advantages. This paper shows how to use holograms to construct a flat, solid, small, accurate, small... nonimaging point location system. 15. SUBJECT TERMS imagery, holographic 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18...respects and the nonimaging systems we have discussed earlier (1, 2) have significant advantages. This paper shows how to use holograms to construct a

  8. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  9. Diversity of key players in the microbial ecosystems of the human body

    PubMed Central

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-01-01

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different. PMID:26514870

  10. Diversity of key players in the microbial ecosystems of the human body.

    PubMed

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  11. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  12. Model of the Students' Key Competences Development through Interactive Whiteboard in the Subject of Technology

    ERIC Educational Resources Information Center

    Brecka, Peter; Valentová, Monika

    2017-01-01

    The basis of the submitted study are the continuously rising demands to alter the curricula with the aim to develop students' key competences in order to increase their professional versatility. The lack of scientific research and discussions show that little investigation has been done on the issue of development of key competences. Therefore,…

  13. Pivots for pointing: visually-monitored pointing has higher arm elevations than pointing blindfolded.

    PubMed

    Wnuczko, Marta; Kennedy, John M

    2011-10-01

    Observers pointing to a target viewed directly may elevate their fingertip close to the line of sight. However, pointing blindfolded, after viewing the target, they may pivot lower, from the shoulder, aligning the arm with the target as if reaching to the target. Indeed, in Experiment 1 participants elevated their arms more in visually monitored than blindfolded pointing. In Experiment 2, pointing to a visible target they elevated a short pointer more than a long one, raising its tip to the line of sight. In Experiment 3, the Experimenter aligned the participant's arm with the target. Participants judged they were pointing below a visually monitored target. In Experiment 4, participants viewing another person pointing, eyes-open or eyes-closed, judged the target was aligned with the pointing arm. In Experiment 5, participants viewed their arm and the target via a mirror and posed their arm so that it was aligned with the target. Arm elevation was higher in pointing directly.

  14. Set points, settling points and some alternative models: theoretical options to understand how genes and environments combine to regulate body adiposity

    PubMed Central

    Speakman, John R.; Levitsky, David A.; Allison, David B.; Bray, Molly S.; de Castro, John M.; Clegg, Deborah J.; Clapham, John C.; Dulloo, Abdul G.; Gruer, Laurence; Haw, Sally; Hebebrand, Johannes; Hetherington, Marion M.; Higgs, Susanne; Jebb, Susan A.; Loos, Ruth J. F.; Luckman, Simon; Luke, Amy; Mohammed-Ali, Vidya; O’Rahilly, Stephen; Pereira, Mark; Perusse, Louis; Robinson, Tom N.; Rolls, Barbara; Symonds, Michael E.; Westerterp-Plantenga, Margriet S.

    2011-01-01

    The close correspondence between energy intake and expenditure over prolonged time periods, coupled with an apparent protection of the level of body adiposity in the face of perturbations of energy balance, has led to the idea that body fatness is regulated via mechanisms that control intake and energy expenditure. Two models have dominated the discussion of how this regulation might take place. The set point model is rooted in physiology, genetics and molecular biology, and suggests that there is an active feedback mechanism linking adipose tissue (stored energy) to intake and expenditure via a set point, presumably encoded in the brain. This model is consistent with many of the biological aspects of energy balance, but struggles to explain the many significant environmental and social influences on obesity, food intake and physical activity. More importantly, the set point model does not effectively explain the ‘obesity epidemic’ – the large increase in body weight and adiposity of a large proportion of individuals in many countries since the 1980s. An alternative model, called the settling point model, is based on the idea that there is passive feedback between the size of the body stores and aspects of expenditure. This model accommodates many of the social and environmental characteristics of energy balance, but struggles to explain some of the biological and genetic aspects. The shortcomings of these two models reflect their failure to address the gene-by-environment interactions that dominate the regulation of body weight. We discuss two additional models – the general intake model and the dual intervention point model – that address this issue and might offer better ways to understand how body fatness is controlled. PMID:22065844

  15. Key Challenges and Future Directions for Educational Research on Scientific Argumentation

    ERIC Educational Resources Information Center

    Henderson, J. Bryan; McNeill, Katherine L.; González-Howard, María; Close, Kevin; Evans, Mat

    2018-01-01

    At the 2015 "NARST: A Worldwide Organization for Improving Science Teaching and Learning Through Research" Annual International Conference, a group of scholars held an extended pre-conference workshop to discuss key challenges and future directions faced by argumentation researchers around the world. This wide-ranging group of…

  16. Issues in Moderation of National Curriculum Assessment at Key Stage 3.

    ERIC Educational Resources Information Center

    Cowling, Les

    1994-01-01

    Highlights the issues of moderation of teacher judgments for accountability and moderation for achieving consistent assessments. Discusses the meaning of moderation, the need for moderating teacher judgments, approaches to moderation, methods of moderation, and most appropriate methods of moderation at Key Stage 3. Presents an approach to…

  17. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  18. Online Discussion and the Moral Pathway to Identity Politicization and Collective Action

    PubMed Central

    Alberici, Augusta Isabella; Milesi, Patrizia

    2018-01-01

    Research on the mobilizing potential of the Internet has produced some controversy between optimistic vs. skeptical perspectives. Although some attention has been paid to the effects of online discussions on collective participation, very little is known about how people’s experience of online interactions affects the key psychosocial predictors of collective action. The present research investigated whether use of the Internet as a channel for deliberation influenced the moral pathway to collective mobilization by shaping users’ politicized identity, thereby indirectly influencing collective action. Results showed that when people perceived online discussions as a constructive communication context, their politicized identity was imbued with the meaning of responding to a moral obligation, and willingness to participate in collective action was sustained. However, when participants perceived that online discussions were not constructive, their identification with the movement did not refer to moral obligation, and intention to participate in collective action was not sustained. Our discussion focuses on the need to deepen investigation of how people experience the particularities of interacting online, and on how this can affect psychosocial processes leading to collective action.

  19. Finding solid ground: law enforcement, key populations and their health and rights in South Africa

    PubMed Central

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Introduction Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. Discussion We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, “othering” and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Conclusions Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality

  20. The OPALS Plan for Operations: Use of ISS Trajectory and Attitude Models in the OPALS Pointing Strategy

    NASA Technical Reports Server (NTRS)

    Abrahamson, Matthew J.; Oaida, Bogdan; Erkmen, Baris

    2013-01-01

    This paper will discuss the OPALS pointing strategy, focusing on incorporation of ISS trajectory and attitude models to build pointing predictions. Methods to extrapolate an ISS prediction based on past data will be discussed and will be compared to periodically published ISS predictions and Two-Line Element (TLE) predictions. The prediction performance will also be measured against GPS states available in telemetry. The performance of the pointing products will be compared to the allocated values in the OPALS pointing budget to assess compliance with requirements.

  1. Fibroblasts—a key host cell type in tumor initiation, progression, and metastasis

    PubMed Central

    Strell, Carina; Rundqvist, Helene

    2012-01-01

    Tumor initiation, growth, invasion, and metastasis occur as a consequence of a complex interplay between the host environment and cancer cells. Fibroblasts are now recognized as a key host cell type involved in host–cancer signaling. This review discusses some recent studies that highlight the roles of fibroblasts in tumor initiation, early progression, invasion, and metastasis. Some clinical studies describing the prognostic significance of fibroblast-derived markers and signatures are also discussed. PMID:22509805

  2. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  3. A Method to Estimate the Probability That Any Individual Lightning Stroke Contacted the Surface Within Any Radius of Any Point

    NASA Technical Reports Server (NTRS)

    Huddleston, Lisa L.; Roeder, William; Merceret, Francis J.

    2010-01-01

    A technique has been developed to calculate the probability that any nearby lightning stroke is within any radius of any point of interest. In practice, this provides the probability that a nearby lightning stroke was within a key distance of a facility, rather than the error ellipses centered on the stroke. This process takes the current bivariate Gaussian distribution of probability density provided by the current lightning location error ellipse for the most likely location of a lightning stroke and integrates it to get the probability that the stroke is inside any specified radius. This new facility-centric technique will be much more useful to the space launch customers and may supersede the lightning error ellipse approach discussed in [5], [6].

  4. A second generation distributed point polarizable water model.

    PubMed

    Kumar, Revati; Wang, Fang-Fang; Jenness, Glen R; Jordan, Kenneth D

    2010-01-07

    A distributed point polarizable model (DPP2) for water, with explicit terms for charge penetration, induction, and charge transfer, is introduced. The DPP2 model accurately describes the interaction energies in small and large water clusters and also gives an average internal energy per molecule and radial distribution functions of liquid water in good agreement with experiment. A key to the success of the model is its accurate description of the individual terms in the n-body expansion of the interaction energies.

  5. Development and evaluation of spatial point process models for epidermal nerve fibers.

    PubMed

    Olsbo, Viktor; Myllymäki, Mari; Waller, Lance A; Särkkä, Aila

    2013-06-01

    We propose two spatial point process models for the spatial structure of epidermal nerve fibers (ENFs) across human skin. The models derive from two point processes, Φb and Φe, describing the locations of the base and end points of the fibers. Each point of Φe (the end point process) is connected to a unique point in Φb (the base point process). In the first model, both Φe and Φb are Poisson processes, yielding a null model of uniform coverage of the skin by end points and general baseline results and reference values for moments of key physiologic indicators. The second model provides a mechanistic model to generate end points for each base, and we model the branching structure more directly by defining Φe as a cluster process conditioned on the realization of Φb as its parent points. In both cases, we derive distributional properties for observable quantities of direct interest to neurologists such as the number of fibers per base, and the direction and range of fibers on the skin. We contrast both models by fitting them to data from skin blister biopsy images of ENFs and provide inference regarding physiological properties of ENFs. Copyright © 2013 Elsevier Inc. All rights reserved.

  6. Dewey's Logic as a Methodological Grounding Point for Practitioner-Based Inquiry

    ERIC Educational Resources Information Center

    Demetrion, George

    2012-01-01

    The purpose of this essay is to draw out key insights from Dewey's important text "Logic: The Theory of Inquiry" to provide theoretical and practical support for the emergent field of teacher research. The specific focal point is the argument in Cochran-Smith and Lytle's "Inside/Outside: Teacher Research and Knowledge" on the significance of…

  7. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  8. Chronic Absenteeism: A Key Indicator of Student Success. Policy Analysis

    ERIC Educational Resources Information Center

    Rafa, Alyssa

    2017-01-01

    Research shows that chronic absenteeism can affect academic performance in later grades and is a key early warning sign that a student is more likely to drop out of high school. Several states enacted legislation to address this issue, and many states are currently discussing the utility of chronic absenteeism as an indicator of school quality or…

  9. [Spatial heterogeneity and classified control of agricultural non-point source pollution in Huaihe River Basin].

    PubMed

    Zhou, Liang; Xu, Jian-Gang; Sun, Dong-Qi; Ni, Tian-Hua

    2013-02-01

    Agricultural non-point source pollution is of importance in river deterioration. Thus identifying and concentrated controlling the key source-areas are the most effective approaches for non-point source pollution control. This study adopts inventory method to analysis four kinds of pollution sources and their emissions intensity of the chemical oxygen demand (COD), total nitrogen (TN), and total phosphorus (TP) in 173 counties (cities, districts) in Huaihe River Basin. The four pollution sources include livestock breeding, rural life, farmland cultivation, aquacultures. The paper mainly addresses identification of non-point polluted sensitivity areas, key pollution sources and its spatial distribution characteristics through cluster, sensitivity evaluation and spatial analysis. A geographic information system (GIS) and SPSS were used to carry out this study. The results show that: the COD, TN and TP emissions of agricultural non-point sources were 206.74 x 10(4) t, 66.49 x 10(4) t, 8.74 x 10(4) t separately in Huaihe River Basin in 2009; the emission intensity were 7.69, 2.47, 0.32 t.hm-2; the proportions of COD, TN, TP emissions were 73%, 24%, 3%. The paper achieves that: the major pollution source of COD, TN and TP was livestock breeding and rural life; the sensitivity areas and priority pollution control areas among the river basin of non-point source pollution are some sub-basins of the upper branches in Huaihe River, such as Shahe River, Yinghe River, Beiru River, Jialu River and Qingyi River; livestock breeding is the key pollution source in the priority pollution control areas. Finally, the paper concludes that pollution type of rural life has the highest pollution contribution rate, while comprehensive pollution is one type which is hard to control.

  10. Active control on high-order coherence and statistic characterization on random phase fluctuation of two classical point sources.

    PubMed

    Hong, Peilong; Li, Liming; Liu, Jianji; Zhang, Guoquan

    2016-03-29

    Young's double-slit or two-beam interference is of fundamental importance to understand various interference effects, in which the stationary phase difference between two beams plays the key role in the first-order coherence. Different from the case of first-order coherence, in the high-order optical coherence the statistic behavior of the optical phase will play the key role. In this article, by employing a fundamental interfering configuration with two classical point sources, we showed that the high- order optical coherence between two classical point sources can be actively designed by controlling the statistic behavior of the relative phase difference between two point sources. Synchronous position Nth-order subwavelength interference with an effective wavelength of λ/M was demonstrated, in which λ is the wavelength of point sources and M is an integer not larger than N. Interestingly, we found that the synchronous position Nth-order interference fringe fingerprints the statistic trace of random phase fluctuation of two classical point sources, therefore, it provides an effective way to characterize the statistic properties of phase fluctuation for incoherent light sources.

  11. LGBT Roundtable Discussion: Meet-up and Mentoring Discussion

    NASA Astrophysics Data System (ADS)

    2014-03-01

    The LGBT+ Physicists group welcomes those who identify as gender sexual minorities, as LGBTQQIAAP+, or as allies to participate in a round-table discussion on mentoring physicists. The session will provide an opportunity to learn and discuss successful mentoring strategies at different career stages for physicists in all environments, including academia, industry, etc. Attendees are encouraged to attend a social event to follow the panel to continue to network. Allies are especially welcome at this event to learn how to support and mentor LGBT+ physicists.

  12. Developing Cognitive Control: Three Key Transitions

    PubMed Central

    Munakata, Yuko; Snyder, Hannah R.; Chatham, Christopher H.

    2012-01-01

    The ability to flexibly break out of routine behaviors develops gradually and is essential for success in life. We discuss three key developmental transitions toward more flexible behavior. First, children develop an increasing ability to overcome habits by engaging cognitive control in response to environmental signals. Second, children shift from recruiting cognitive control reactively, as needed in the moment, to recruiting cognitive control proactively, in preparation for needing it. Third, children shift from relying on environmental signals for engaging cognitive control to becoming more self-directed. All three transitions can be understood in terms of the development of increasingly active and abstract goal representations in prefrontal cortex. PMID:22711982

  13. A practical guide to assessing clinical decision-making skills using the key features approach.

    PubMed

    Farmer, Elizabeth A; Page, Gordon

    2005-12-01

    This paper in the series on professional assessment provides a practical guide to writing key features problems (KFPs). Key features problems test clinical decision-making skills in written or computer-based formats. They are based on the concept of critical steps or 'key features' in decision making and represent an advance on the older, less reliable patient management problem (PMP) formats. The practical steps in writing these problems are discussed and illustrated by examples. Steps include assembling problem-writing groups, selecting a suitable clinical scenario or problem and defining its key features, writing the questions, selecting question response formats, preparing scoring keys, reviewing item quality and item banking. The KFP format provides educators with a flexible approach to testing clinical decision-making skills with demonstrated validity and reliability when constructed according to the guidelines provided.

  14. Gradient-free determination of isoelectric points of proteins on chip.

    PubMed

    Łapińska, Urszula; Saar, Kadi L; Yates, Emma V; Herling, Therese W; Müller, Thomas; Challa, Pavan K; Dobson, Christopher M; Knowles, Tuomas P J

    2017-08-30

    The isoelectric point (pI) of a protein is a key characteristic that influences its overall electrostatic behaviour. The majority of conventional methods for the determination of the isoelectric point of a molecule rely on the use of spatial gradients in pH, although significant practical challenges are associated with such techniques, notably the difficulty in generating a stable and well controlled pH gradient. Here, we introduce a gradient-free approach, exploiting a microfluidic platform which allows us to perform rapid pH change on chip and probe the electrophoretic mobility of species in a controlled field. In particular, in this approach, the pH of the electrolyte solution is modulated in time rather than in space, as in the case for conventional determinations of the isoelectric point. To demonstrate the general approachability of this platform, we have measured the isoelectric points of representative set of seven proteins, bovine serum albumin, β-lactoglobulin, ribonuclease A, ovalbumin, human transferrin, ubiquitin and myoglobin in microlitre sample volumes. The ability to conduct measurements in free solution thus provides the basis for the rapid determination of isoelectric points of proteins under a wide variety of solution conditions and in small volumes.

  15. Using Laser Scanners to Augment the Systematic Error Pointing Model

    NASA Astrophysics Data System (ADS)

    Wernicke, D. R.

    2016-08-01

    The antennas of the Deep Space Network (DSN) rely on precise pointing algorithms to communicate with spacecraft that are billions of miles away. Although the existing systematic error pointing model is effective at reducing blind pointing errors due to static misalignments, several of its terms have a strong dependence on seasonal and even daily thermal variation and are thus not easily modeled. Changes in the thermal state of the structure create a separation from the model and introduce a varying pointing offset. Compensating for this varying offset is possible by augmenting the pointing model with laser scanners. In this approach, laser scanners mounted to the alidade measure structural displacements while a series of transformations generate correction angles. Two sets of experiments were conducted in August 2015 using commercially available laser scanners. When compared with historical monopulse corrections under similar conditions, the computed corrections are within 3 mdeg of the mean. However, although the results show promise, several key challenges relating to the sensitivity of the optical equipment to sunlight render an implementation of this approach impractical. Other measurement devices such as inclinometers may be implementable at a significantly lower cost.

  16. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.

    PubMed

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.

  17. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

    PubMed Central

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615

  18. Toward Fully in Silico Melting Point Prediction Using Molecular Simulations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Y; Maginn, EJ

    2013-03-01

    Melting point is one of the most fundamental and practically important properties of a compound. Molecular computation of melting points. However, all of these methods simulation methods have been developed for the accurate need an experimental crystal structure as input, which means that such calculations are not really predictive since the melting point can be measured easily in experiments once a crystal structure is known. On the other hand, crystal structure prediction (CSP) has become an active field and significant progress has been made, although challenges still exist. One of the main challenges is the existence of many crystal structuresmore » (polymorphs) that are very close in energy. Thermal effects and kinetic factors make the situation even more complicated, such that it is still not trivial to predict experimental crystal structures. In this work, we exploit the fact that free energy differences are often small between crystal structures. We show that accurate melting point predictions can be made by using a reasonable crystal structure from CSP as a starting point for a free energy-based melting point calculation. The key is that most crystal structures predicted by CSP have free energies that are close to that of the experimental structure. The proposed method was tested on two rigid molecules and the results suggest that a fully in silico melting point prediction method is possible.« less

  19. Image use in field guides and identification keys: review and recommendations

    PubMed Central

    Leggett, Roxanne; Kirchoff, Bruce K.

    2011-01-01

    Background and aims Although illustrations have played an important role in identification keys and guides since the 18th century, their use has varied widely. Some keys lack all illustrations, while others are heavily illustrated. Even within illustrated guides, the way in which images are used varies considerably. Here, we review image use in paper and electronic guides, and establish a set of best practices for image use in illustrated keys and guides. Scope Our review covers image use in both paper and electronic guides, though we only briefly cover apps for mobile devices. With this one exception, we cover the full range of guides, from those that consist only of species descriptions with no keys, to lavishly illustrated technical keys. Emphasis is placed on how images are used, not on the operation of the guides and key, which has been reviewed by others. We only deal with operation when it impacts image use. Main points Few illustrated keys or guides use images in optimal ways. Most include too few images to show taxonomic variation or variation in characters and character states. The use of multiple images allows easier taxon identification and facilitates the understanding of characters. Most images are usually not standardized, making comparison between images difficult. Although some electronic guides allow images to be enlarged, many do not. Conclusions The best keys and guides use standardized images, displayed at sizes that are easy to see and arranged in a standardized manner so that similar images can be compared across species. Illustrated keys and glossaries should contain multiple images for each character state so that the user can judge variation in the state. Photographic backgrounds should not distract from the subject and, where possible, should be of a standard colour. When used, drawings should be prepared by professional botanical illustrators, and clearly labelled. Electronic keys and guides should allow images to be enlarged so that

  20. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  1. Exploring Measures to Control Road Traffic Injuries in Iran: Key Informants Points of View

    PubMed Central

    SALARI, Hedayat; MOTEVALIAN, Seyed Abbas; ARAB, Mohammad; ESFANDIARI, Atefeh; AKBARI SARI, Ali

    2017-01-01

    Background: Injuries and fatalities from road traffic Injuries are global public health concerns, and a major problem in the Iran. This study aimed to explore strategies to control road traffic Injuries (RTI) in Iran. Methods: We conducted a qualitative study to explore possible ways to reduce the occurrence of road traffic Injuries in Iran in 2016. Interviewees were purposively sampled from various sectors due to multidisciplinary nature of RTIs. Participants were mainly representatives from the police, Ministry of Road, Municipal, emergency services and Ministry of Health. Besides, public health authorities, researchers, and university professors were interviewed. We conducted in-depth interviews using generic guides. Data was analyzed using MAXQDA 10 software. Through content analysis, we interpreted core themes relevant to the accomplishment of our study objectives. Results: Themes that emerged from our study include; road traffic management, governance, education, improving accident database, enforcement, driving license restrictions, and construction of pedestrian overpass. Conclusion: This study revealed key informants’ views regarding available and affordable solutions to reduce RTIs in Iran. Many applicable strategies are identified in the control of RTIs in Iran. Although some solutions such as highway construction and/or expanding rail transportation have been suggested as effective measures for reducing accident, but they are costly and may not be fully applied in developing countries like Iran. PMID:28560198

  2. Consideration of techniques to mitigate the unauthorized 3D printing production of keys

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy; Kerlin, Scott

    2016-05-01

    The illicit production of 3D printed keys based on remote-sensed imagery is problematic as it allows a would-be intruder to access a secured facility without the attack attempt being as obviously detectable as conventional techniques. This paper considers the problem from multiple perspectives. First, it looks at different attack types and considers the prospective attack from a digital information perspective. Second, based on this, techniques for securing keys are considered. Third, the design of keys is considered from the perspective of making them more difficult to duplicate using visible light sensing and 3D printing. Policy and legal considerations are discussed.

  3. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  4. ESA Astronaut Discusses Life in Space with Aspiring Students

    NASA Image and Video Library

    2017-11-29

    Aboard the International Space Station, Expedition 53 Flight Engineer Paolo Nespoli of ESA (European Space Agency) discussed how students can aspire to be astronauts and engineers during a “Mission X” competition in-flight event Nov. 29. Mission X is an international educational challenge, focusing on fitness and nutrition that encourages students to train like an astronaut. Teams of primary school-aged students (8-12 years old) learn the principles of healthy eating and exercise, compete for points by finishing training modules, and learn about the world's future in space and educational possibilities for their own future.

  5. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NASA Astrophysics Data System (ADS)

    Kelkboom, Emile J. C.; Breebaart, Jeroen; Buhan, Ileana; Veldhuis, Raymond N. J.

    2010-04-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved protection depends on the size of the key and its closeness to being random. In the literature it can be observed that there is a large variation on the reported key lengths at similar classification performance of the same template protection system, even when based on the same biometric modality and database. In this work we determine the analytical relationship between the system performance and the theoretical maximum key size given a biometric source modeled by parallel Gaussian channels. We consider the case where the source capacity is evenly distributed across all channels and the channels are independent. We also determine the effect of the parameters such as the source capacity, the number of enrolment and verification samples, and the operating point selection on the maximum key size. We show that a trade-off exists between the privacy protection of the biometric system and its convenience for its users.

  6. Fixed points of contractive mappings in b-metric-like spaces.

    PubMed

    Hussain, Nawab; Roshan, Jamal Rezaei; Parvaneh, Vahid; Kadelburg, Zoran

    2014-01-01

    We discuss topological structure of b-metric-like spaces and demonstrate a fundamental lemma for the convergence of sequences. As an application we prove certain fixed point results in the setup of such spaces for different types of contractive mappings. Finally, some periodic point results in b-metric-like spaces are obtained. Two examples are presented in order to verify the effectiveness and applicability of our main results.

  7. Fixed Points of Contractive Mappings in b-Metric-Like Spaces

    PubMed Central

    Hussain, Nawab; Roshan, Jamal Rezaei

    2014-01-01

    We discuss topological structure of b-metric-like spaces and demonstrate a fundamental lemma for the convergence of sequences. As an application we prove certain fixed point results in the setup of such spaces for different types of contractive mappings. Finally, some periodic point results in b-metric-like spaces are obtained. Two examples are presented in order to verify the effectiveness and applicability of our main results. PMID:25143980

  8. An uplifting discussion of T-duality

    NASA Astrophysics Data System (ADS)

    Harvey, Jeffrey A.; Moore, Gregory W.

    2018-05-01

    It is well known that string theory has a T-duality symmetry relating circle compactifications of large and small radius. This symmetry plays a foundational role in string theory. We note here that while T-duality is order two acting on the moduli space of compactifications, it is order four in its action on the conformal field theory state space. More generally, involutions in the Weyl group W ( G) which act at points of enhanced G symmetry have canonical lifts to order four elements of G, a phenomenon first investigated by J. Tits in the mathematical literature on Lie groups and generalized here to conformal field theory. This simple fact has a number of interesting consequences. One consequence is a reevaluation of a mod two condition appearing in asymmetric orbifold constructions. We also briefly discuss the implications for the idea that T-duality and its generalizations should be thought of as discrete gauge symmetries in spacetime.

  9. 'Do Not Attempt Cardiopulmonary Resuscitation' discussions at the point of discharge: a case note review of hospice practice following local integrated policy implementation.

    PubMed

    Hall, Charlie Christopher; Mark, Kathleen; Oxenham, David; Spiller, Juliet Anne

    2011-09-01

    An integrated 'Do Not Attempt Cardiopulmonary Resuscitation' (DNACPR) policy was implemented across Lothian in 2006 (for ease of reading the terminology 'DNACPR' has been used throughout the paper where the original Lothian Policy used 'DNAR'). Patients were, for the first time, able to be discharged home with their DNACPR form after discussion about cardiopulmonary resuscitation (CPR). To ascertain the number of patients who, following a discussion, were discharged with a DNACPR form and the reasons for not holding discussions with certain patients. Two retrospective case note reviews of 50 patients discharged over two 4-month periods (2007 and 2009). There was a high proportion (78-80%) of CPR discussions for patients discharged from the hospice. Reasons for not discussing CPR were: potential for excess distress (10-12% 2007 and 2009) and lack of time (4% both years). Of those discussing CPR on discharge, 90% took forms home in both years. The reasons patients did not take forms home were: form not taken in error (two patients in 2007); patients refusing a form at home (one and three patients in 2007 and 2009); form to be arranged by general practitioner and one incomplete discussion. The proportion of patients with forms already at home increased from 10% (2007) to 28% (2009). It is possible to discuss CPR with a high proportion of hospice patients prior to discharge from a hospice. Following the introduction of an integrated policy, more patients have DNACPR forms prior to admission. Most patients receiving specialist palliative care find DNACPR discussions acceptable and understand the benefits of having a DNACPR form.

  10. Predicting materials for sustainable energy sources: The key role of density functional theory

    NASA Astrophysics Data System (ADS)

    Galli, Giulia

    Climate change and the related need for sustainable energy sources replacing fossil fuels are pressing societal problems. The development of advanced materials is widely recognized as one of the key elements for new technologies that are required to achieve a sustainable environment and provide clean and adequate energy for our planet. We discuss the key role played by Density Functional Theory, and its implementations in high performance computer codes, in understanding, predicting and designing materials for energy applications.

  11. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  12. Space Shuttle Earth Observation sensors pointing and stabilization requirements study

    NASA Technical Reports Server (NTRS)

    1976-01-01

    The shuttle orbiter inertial measurement unit (IMU), located in the orbiter cabin, is used to supply inertial attitude reference signals; and, in conjunction with the onboard navigation system, can provide a pointing capability of the navigation base accurate to within plus or minus 0.5 deg for earth viewing missions. This pointing accuracy can degrade to approximately plus or minus 2.0 deg for payloads located in the aft bay due to structural flexure of the shuttle vehicle, payload structural and mounting misalignments, and calibration errors with respect to the navigation base. Drawbacks to obtaining pointing accuracy by using the orbiter RCS jets are discussed. Supplemental electromechanical pointing systems are developed to provide independent pointing for individual sensors, or sensor groupings. The missions considered and the sensors required for these missions and the parameters of each sensor are described. Assumptions made to derive pointing and stabilization requirements are delineated.

  13. Has Corpus-Based Instruction Reached a Tipping Point? Practical Applications and Pointers for Teachers

    ERIC Educational Resources Information Center

    Huang, Li-Shih

    2017-01-01

    This article provides an easy introduction into corpus-based instruction by explaining what the approach entails. It also presents key terms and discusses key theoretical concepts drawn from the literature; from these, practical applications and pointers are offered for those practitioners wishing to use corpus data or implement corpus-based…

  14. The Key Role of Emotions in the Schizophrenia Puzzle

    PubMed Central

    Ciompi, Luc

    2015-01-01

    The aim of this paper is to show that the dynamic effects of emotions in schizophrenia are underestimated and partly misunderstood. This may be related to an insufficient consideration for certain key properties of emotions, especially their energizing effects. After introductory remarks on current notions on emotions in schizophrenia, I present an alternative view based on my concept of affect-logic and discuss some of its therapeutic implications. PMID:25481397

  15. Task-Based Pronunciation Teaching and Research: Key Issues and Future Directions

    ERIC Educational Resources Information Center

    Mora, Joan C.; Levkina, Mayya

    2017-01-01

    This article synthesizes the conclusions of the empirical studies in this special issue and outlines key questions in future research. The research reported in this volume has identified several fundamental issues in pronunciation-focused task design that are discussed in detail and on which suggestions for further research are outlined. One…

  16. Key Issues in Sex Education: Reflecting on Teaching, Learning and Assessment

    ERIC Educational Resources Information Center

    Oerton, Sarah; Bowen, Helen

    2014-01-01

    Drawing upon critical reflections of staff and student experiences of teaching, learning and assessment on an undergraduate module entitled Key Issues in Sex Education, we discuss the strategies used to engage students in debates around sex and relationships education (SRE). To date, there is little research which evaluates how formal assessments…

  17. Key Events in Student Leaders' Lives and Lessons Learned from Them

    ERIC Educational Resources Information Center

    Sessa, Valerie I.; Morgan, Brett V.; Kalenderli, Selin; Hammond, Fanny E.

    2014-01-01

    This descriptive study used an interview protocol developed by the Center for Creative Leadership with 50 college student leaders to determine what key developmental events young college leaders experience and the leadership lessons learned from these events. Students discussed 180 events and 734 lessons learned from them. Most events defined by…

  18. Science, information, technology, and the changing character of public policy in non-point source pollution

    NASA Astrophysics Data System (ADS)

    King, John L.; Corwin, Dennis L.

    Information technologies are already delivering important new capabilities for scientists working on non-point source (NPS) pollution in the vadose zone, and more are expected. This paper focuses on the special contributions of modeling and network communications for enhancing the effectiveness of scientists in the realm of policy debates regarding NPS pollution mitigation and abatement. The discussion examines a fundamental shift from a strict regulatory strategy of pollution control characterized by a bureaucratic/technical alliance during the period through the 1970's and early 1980's, to a more recently evolving paradigm of pluralistic environmental management. The role of science and scientists in this shift is explored, with special attention to the challenges facing scientists working in NPS pollution in the vadose zone. These scientists labor under a special handicap in the evolving model because their scientific tools are often times incapable of linking NPS pollution with individuals responsible for causing it. Information can facilitate the effectiveness of these scientists in policy debates, but not under the usual assumptions in which scientific truth prevails. Instead, information technology's key role is in helping scientists shape the evolving discussion of trade-offs and in bringing citizens and policymakers closer to the routine work of scientists.

  19. C-smithing of Voyager 2 non-imaging instrument pointing information at Uranus

    NASA Technical Reports Server (NTRS)

    Wang, Tseng-Chan; Acton, Charles H.; Underwood, Ian M.; Synnott, Stephen P.

    1988-01-01

    The development of a family of techniques, collectively called C-smithing, for improving spacecraft nonimaging instrument pointing knowledge is discussed. C-smithing studies using data from the Voyager 2 Uranus Encounter show that significant improvements in pointing knowledge for nonimaging instruments can be achieved with these techniques. This improved pointing information can be used to regenerate instrument viewing geometry parameters for the encounter, which can then be made available to science investigators.

  20. Metrological challenges for measurements of key climatological observables Part 2: oceanic salinity

    NASA Astrophysics Data System (ADS)

    Pawlowicz, R.; Feistel, R.; McDougall, T. J.; Ridout, P.; Seitz, S.; Wolf, H.

    2016-02-01

    Salinity is a key variable in the modelling and observation of ocean circulation and ocean-atmosphere fluxes of heat and water. In this paper, we examine the climatological relevance of ocean salinity, noting fundamental deficiencies in the definition of this key observable, and its lack of a secure foundation in the International System of Units, the SI. The metrological history of salinity is reviewed, problems with its current definitions and measurement practices are analysed, and options for future improvements are discussed in conjunction with the recent seawater standard TEOS-10.

  1. A Retrospective Discussion of the State of the Art in Ethnography in Education.

    ERIC Educational Resources Information Center

    Gilmore, Perry; Smith, David Martin

    This article serves to introduce the papers from a colloquium on ethnography and education (1978). It points up the major themes that emerged from the conference and traces their evolution in the research efforts during the 3 years between the colloquium and the present. Four themes in particular are discussed: (1) the discontinuity between school…

  2. One-dimensional gravity in infinite point distributions.

    PubMed

    Gabrielli, A; Joyce, M; Sicard, F

    2009-10-01

    The dynamics of infinite asymptotically uniform distributions of purely self-gravitating particles in one spatial dimension provides a simple and interesting toy model for the analogous three dimensional problem treated in cosmology. In this paper we focus on a limitation of such models as they have been treated so far in the literature: the force, as it has been specified, is well defined in infinite point distributions only if there is a centre of symmetry (i.e., the definition requires explicitly the breaking of statistical translational invariance). The problem arises because naive background subtraction (due to expansion, or by "Jeans swindle" for the static case), applied as in three dimensions, leaves an unregulated contribution to the force due to surface mass fluctuations. Following a discussion by Kiessling of the Jeans swindle in three dimensions, we show that the problem may be resolved by defining the force in infinite point distributions as the limit of an exponentially screened pair interaction. We show explicitly that this prescription gives a well defined (finite) force acting on particles in a class of perturbed infinite lattices, which are the point processes relevant to cosmological N -body simulations. For identical particles the dynamics of the simplest toy model (without expansion) is equivalent to that of an infinite set of points with inverted harmonic oscillator potentials which bounce elastically when they collide. We discuss and compare with previous results in the literature and present new results for the specific case of this simplest (static) model starting from "shuffled lattice" initial conditions. These show qualitative properties of the evolution (notably its "self-similarity") like those in the analogous simulations in three dimensions, which in turn resemble those in the expanding universe.

  3. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  4. Quantum hacking on quantum key distribution using homodyne detection

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  5. Wall shear stress fixed points in cardiovascular fluid mechanics.

    PubMed

    Arzani, Amirhossein; Shadden, Shawn C

    2018-05-17

    Complex blood flow in large arteries creates rich wall shear stress (WSS) vectorial features. WSS acts as a link between blood flow dynamics and the biology of various cardiovascular diseases. WSS has been of great interest in a wide range of studies and has been the most popular measure to correlate blood flow to cardiovascular disease. Recent studies have emphasized different vectorial features of WSS. However, fixed points in the WSS vector field have not received much attention. A WSS fixed point is a point on the vessel wall where the WSS vector vanishes. In this article, WSS fixed points are classified and the aspects by which they could influence cardiovascular disease are reviewed. First, the connection between WSS fixed points and the flow topology away from the vessel wall is discussed. Second, the potential role of time-averaged WSS fixed points in biochemical mass transport is demonstrated using the recent concept of Lagrangian WSS structures. Finally, simple measures are proposed to quantify the exposure of the endothelial cells to WSS fixed points. Examples from various arterial flow applications are demonstrated. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Brute Force Matching Between Camera Shots and Synthetic Images from Point Clouds

    NASA Astrophysics Data System (ADS)

    Boerner, R.; Kröhnert, M.

    2016-06-01

    3D point clouds, acquired by state-of-the-art terrestrial laser scanning techniques (TLS), provide spatial information about accuracies up to several millimetres. Unfortunately, common TLS data has no spectral information about the covered scene. However, the matching of TLS data with images is important for monoplotting purposes and point cloud colouration. Well-established methods solve this issue by matching of close range images and point cloud data by fitting optical camera systems on top of laser scanners or rather using ground control points. The approach addressed in this paper aims for the matching of 2D image and 3D point cloud data from a freely moving camera within an environment covered by a large 3D point cloud, e.g. a 3D city model. The key advantage of the free movement affects augmented reality applications or real time measurements. Therefore, a so-called real image, captured by a smartphone camera, has to be matched with a so-called synthetic image which consists of reverse projected 3D point cloud data to a synthetic projection centre whose exterior orientation parameters match the parameters of the image, assuming an ideal distortion free camera.

  7. Two-dimensional Manifold with Point-like Defects

    NASA Astrophysics Data System (ADS)

    Gani, V. A.; Dmitriev, A. E.; Rubin, S. G.

    We study a class of two-dimensional compact extra spaces isomorphic to the sphere S 2 in the framework of multidimensional gravitation. We show that there exists a family of stationary metrics that depend on the initial (boundary) conditions. All these geometries have a singular point. We also discuss the possibility for these deformed extra spaces to be considered as dark matter candidates.

  8. Multiple-Point Temperature Gradient Algorithm for Ring Laser Gyroscope Bias Compensation

    PubMed Central

    Li, Geng; Zhang, Pengfei; Wei, Guo; Xie, Yuanping; Yu, Xudong; Long, Xingwu

    2015-01-01

    To further improve ring laser gyroscope (RLG) bias stability, a multiple-point temperature gradient algorithm is proposed for RLG bias compensation in this paper. Based on the multiple-point temperature measurement system, a complete thermo-image of the RLG block is developed. Combined with the multiple-point temperature gradients between different points of the RLG block, the particle swarm optimization algorithm is used to tune the support vector machine (SVM) parameters, and an optimized design for selecting the thermometer locations is also discussed. The experimental results validate the superiority of the introduced method and enhance the precision and generalizability in the RLG bias compensation model. PMID:26633401

  9. The Pointing Self-calibration Algorithm for Aperture Synthesis Radio Telescopes

    NASA Astrophysics Data System (ADS)

    Bhatnagar, S.; Cornwell, T. J.

    2017-11-01

    This paper is concerned with algorithms for calibration of direction-dependent effects (DDE) in aperture synthesis radio telescopes (ASRT). After correction of direction-independent effects (DIE) using self-calibration, imaging performance can be limited by the imprecise knowledge of the forward gain of the elements in the array. In general, the forward gain pattern is directionally dependent and varies with time due to a number of reasons. Some factors, such as rotation of the primary beam with Parallactic Angle for Azimuth-Elevation mount antennas are known a priori. Some, such as antenna pointing errors and structural deformation/projection effects for aperture-array elements cannot be measured a priori. Thus, in addition to algorithms to correct for DD effects known a priori, algorithms to solve for DD gains are required for high dynamic range imaging. Here, we discuss a mathematical framework for antenna-based DDE calibration algorithms and show that this framework leads to computationally efficient optimal algorithms that scale well in a parallel computing environment. As an example of an antenna-based DD calibration algorithm, we demonstrate the Pointing SelfCal (PSC) algorithm to solve for the antenna pointing errors. Our analysis show that the sensitivity of modern ASRT is sufficient to solve for antenna pointing errors and other DD effects. We also discuss the use of the PSC algorithm in real-time calibration systems and extensions for antenna Shape SelfCal algorithm for real-time tracking and corrections for pointing offsets and changes in antenna shape.

  10. Software for Verifying Image-Correlation Tie Points

    NASA Technical Reports Server (NTRS)

    Klimeck, Gerhard; Yagi, Gary

    2008-01-01

    A computer program enables assessment of the quality of tie points in the image-correlation processes of the software described in the immediately preceding article. Tie points are computed in mappings between corresponding pixels in the left and right images of a stereoscopic pair. The mappings are sometimes not perfect because image data can be noisy and parallax can cause some points to appear in one image but not the other. The present computer program relies on the availability of a left- right correlation map in addition to the usual right left correlation map. The additional map must be generated, which doubles the processing time. Such increased time can now be afforded in the data-processing pipeline, since the time for map generation is now reduced from about 60 to 3 minutes by the parallelization discussed in the previous article. Parallel cluster processing time, therefore, enabled this better science result. The first mapping is typically from a point (denoted by coordinates x,y) in the left image to a point (x',y') in the right image. The second mapping is from (x',y') in the right image to some point (x",y") in the left image. If (x,y) and(x",y") are identical, then the mapping is considered perfect. The perfect-match criterion can be relaxed by introducing an error window that admits of round-off error and a small amount of noise. The mapping procedure can be repeated until all points in each image not connected to points in the other image are eliminated, so that what remains are verified correlation data.

  11. Lab- and space-based researchers discuss plasma experiments

    NASA Astrophysics Data System (ADS)

    Baker, D. N.; Yamada, M.

    Plasma physics provides a common language and set of approaches that tie together all scientists who study the acceleration, transport, and loss processes of the plasma state. Some years ago, researchers from the laboratory and space research communities suggested a workshop to bring together the diverse researchers in the respective fields. A series of workshops on the “Interrelationship between Plasma Experiments in the Laboratory and Space” (IPELS) was established, and the third meeting was held July 24-28, 1995, in the beautiful and historic town of Pitlochry in the Scottish Highlands.The conference reestablished the critical point that plasma physics is an important but surprisingly diversified research discipline. Meetings attendees discussed a number of new approaches to plasma research, including novel diagnostic techniques for use in space, such as active antennas and electric field sounding devices. Detailed discussions covered spacecraft-plasma environment interactions, including vehicle charging and neutral gas release; fundamental aspects of industrial application of dusty plasmas and waves in dusty plasmas; a very distinctive phase transition of coulomb crystals (from solid state to liquid state) in dusty plasmas; and terrella experiments to simulate and study chaotic transport in the ionosphere.

  12. Optimizing Probability of Detection Point Estimate Demonstration

    NASA Technical Reports Server (NTRS)

    Koshti, Ajay M.

    2017-01-01

    Probability of detection (POD) analysis is used in assessing reliably detectable flaw size in nondestructive evaluation (NDE). MIL-HDBK-18231and associated mh18232POD software gives most common methods of POD analysis. Real flaws such as cracks and crack-like flaws are desired to be detected using these NDE methods. A reliably detectable crack size is required for safe life analysis of fracture critical parts. The paper provides discussion on optimizing probability of detection (POD) demonstration experiments using Point Estimate Method. POD Point estimate method is used by NASA for qualifying special NDE procedures. The point estimate method uses binomial distribution for probability density. Normally, a set of 29 flaws of same size within some tolerance are used in the demonstration. The optimization is performed to provide acceptable value for probability of passing demonstration (PPD) and achieving acceptable value for probability of false (POF) calls while keeping the flaw sizes in the set as small as possible.

  13. Effectiveness of PowerPoint Presentation on Students' Cognitive Achievement in Technical Drawing

    ERIC Educational Resources Information Center

    Gambari, Amosa Isiaka; Yusuf, Hamdalat Taiwo; Balogun, Sherifat Adepeju

    2015-01-01

    This paper discusses importance of technology education and evidence of declining performance of junior secondary school students in basic technology subject. Benefits of PowerPoint presentation in classroom instruction as a means to improve classroom teaching in the developing countries are also discussed. The effectiveness of PowerPoint…

  14. Gladwell and Group Communication: Using "The Tipping Point" as a Supplemental Text

    ERIC Educational Resources Information Center

    Browning, Blair W.

    2011-01-01

    This article describes an activity using Malcolm Gladwell's "The Tipping Point" as a supplemental text in an undergraduate group communication course. This book will help stimulate conversation and promote easy avenues for classroom discussion. In addition to weekly quizzes over each chapter to help facilitate rich classroom discussions, the…

  15. [Anatomical key points and operative principle of "two planes and four landmarks" in extralevator abdominoperineal excision].

    PubMed

    Ye, Yingjiang; Shen, Zhanlong; Wang, Shan

    2014-11-01

    Abominoperineal resection (APR) is the main approach of lower rectal cancer treatment. Recently, it was found that conventional APR had higher incidence rate of positive circumferential resection margin(CRM) and intraoperative perforation (IOP), which was the crucial reason of local recurrence and worse prognosis. Extralevator abdominoperineal excision(ELAPE) procedure was proposed by European panels including surgeons, radiologist and pathologists, and considered to lower the positive rates of CRM and IOP. Definitive surgical planes and anatomic landmarks are the cores of this procedure, which are the prerequisite for the guarantee of safety and smoothness of surgery. To realize the anatomy of muscles, fascias, blood vessels and nervous of perineal region is the base of carrying out ELAPE procedure. In this paper, we introduce the key anatomy related to ELAPE procedure and summarize the principle of ELAPE procedure as "two planes and four landmarks", which will be beneficial to the popularization and application.

  16. Social Work Practice with Latinos: Key Issues for Social Workers

    PubMed Central

    Furman, Rich; Negi, Nalini Junko; Iwamoto, Derek Kenji; Rowan, Diana; Shukraft, Allison; Gragg, Jennifer

    2010-01-01

    The Latino population is the fastest growing group in the United States; thus, it is imperative that social workers and other mental health practitioners be knowledgeable about the current literature on how to effectively serve this population. This article elucidates key issues and knowledge, such as immigration and migration concerns; discusses how to assess for levels of acculturation; examines cultural values; and highlights salient work issues and health disparities that Latinos experience. Recommendations on how agencies and universities can recruit and promote bilingual practitioners are introduced. Finally, culturally responsive strategies for professional use of self and fostering the therapeutic alliance are discussed. PMID:19366165

  17. Statistical representation of a spray as a point process

    NASA Astrophysics Data System (ADS)

    Subramaniam, S.

    2000-10-01

    The statistical representation of a spray as a finite point process is investigated. One objective is to develop a better understanding of how single-point statistical information contained in descriptions such as the droplet distribution function (ddf), relates to the probability density functions (pdfs) associated with the droplets themselves. Single-point statistical information contained in the droplet distribution function (ddf) is shown to be related to a sequence of single surrogate-droplet pdfs, which are in general different from the physical single-droplet pdfs. It is shown that the ddf contains less information than the fundamental single-point statistical representation of the spray, which is also described. The analysis shows which events associated with the ensemble of spray droplets can be characterized by the ddf, and which cannot. The implications of these findings for the ddf approach to spray modeling are discussed. The results of this study also have important consequences for the initialization and evolution of direct numerical simulations (DNS) of multiphase flows, which are usually initialized on the basis of single-point statistics such as the droplet number density in physical space. If multiphase DNS are initialized in this way, this implies that even the initial representation contains certain implicit assumptions concerning the complete ensemble of realizations, which are invalid for general multiphase flows. Also the evolution of a DNS initialized in this manner is shown to be valid only if an as yet unproven commutation hypothesis holds true. Therefore, it is questionable to what extent DNS that are initialized in this manner constitute a direct simulation of the physical droplets. Implications of these findings for large eddy simulations of multiphase flows are also discussed.

  18. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  19. Zeroing in on Number and Operations, Grades 7-8: Key Ideas and Common Misconceptions

    ERIC Educational Resources Information Center

    Collins, Anne; Dacey, Linda

    2010-01-01

    "The Zeroing in on Number and Operations" series, which aligns with the Common Core State Standards and the NCTM Standards and Focal Points, features easy-to-use tools for teaching key concepts in number and operations and for addressing common misconceptions. Sharing the insights they've gained in decades of mathematics teaching and research,…

  20. Zeroing in on Number and Operations, Grades 3-4: Key Ideas and Common Misconceptions

    ERIC Educational Resources Information Center

    Dacey, Linda; Collins, Anne

    2010-01-01

    "The Zeroing in on Number and Operations" series, which aligns with the Common Core State Standards and the NCTM Standards and Focal Points, features easy-to-use tools for teaching key concepts in number and operations and for addressing common misconceptions. Sharing the insights they've gained in decades of mathematics teaching and research,…

  1. Zeroing in on Number and Operations, Grades 5-6: Key Ideas and Common Misconceptions

    ERIC Educational Resources Information Center

    Collins, Anne; Dacey, Linda

    2010-01-01

    "The Zeroing in on Number and Operations" series, which aligns with the Common Core State Standards and the NCTM Sandards and Focal Points, features easy-to-use tools for teaching key concepts in number and operations and for addressing common misconceptions. Sharing the insights they've gained through decades of mathematics teaching and research,…

  2. Key characteristics of specular stereo

    PubMed Central

    Muryy, Alexander A.; Fleming, Roland W.; Welchman, Andrew E.

    2014-01-01

    Because specular reflection is view-dependent, shiny surfaces behave radically differently from matte, textured surfaces when viewed with two eyes. As a result, specular reflections pose substantial problems for binocular stereopsis. Here we use a combination of computer graphics and geometrical analysis to characterize the key respects in which specular stereo differs from standard stereo, to identify how and why the human visual system fails to reconstruct depths correctly from specular reflections. We describe rendering of stereoscopic images of specular surfaces in which the disparity information can be varied parametrically and independently of monocular appearance. Using the generated surfaces and images, we explain how stereo correspondence can be established with known and unknown surface geometry. We show that even with known geometry, stereo matching for specular surfaces is nontrivial because points in one eye may have zero, one, or multiple matches in the other eye. Matching features typically yield skew (nonintersecting) rays, leading to substantial ortho-epipolar components to the disparities, which makes deriving depth values from matches nontrivial. We suggest that the human visual system may base its depth estimates solely on the epipolar components of disparities while treating the ortho-epipolar components as a measure of the underlying reliability of the disparity signals. Reconstructing virtual surfaces according to these principles reveals that they are piece-wise smooth with very large discontinuities close to inflection points on the physical surface. Together, these distinctive characteristics lead to cues that the visual system could use to diagnose specular reflections from binocular information. PMID:25540263

  3. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  4. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  5. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  6. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  7. 14 CFR 437.31 - Verification of operating area containment and key flight-safety event limitations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...(a) to contain its reusable suborbital rocket's instantaneous impact point within an operating area... limits on the ability of the reusable suborbital rocket to leave the operating area; or (2) Abort... requirements of § 437.59 to conduct any key flight-safety event so that the reusable suborbital rocket's...

  8. Measuring social inclusion--a key outcome in global mental health.

    PubMed

    Baumgartner, Joy Noel; Burns, Jonathan K

    2014-04-01

    Social inclusion is increasingly recognized as a key outcome for evaluating global mental health programmes and interventions. Whereas social inclusion as an outcome is not a new concept in the field of mental health, its measurement has been hampered by varying definitions, concepts and instruments. To move the field forward, this paper reviews the currently available instruments which measure social inclusion and are reported in the literature, realizing that no single measure will be appropriate for all studies or contexts. A systematic literature search of English language peer-reviewed articles published through February 2013 was undertaken to identify scales specifically developed to measure social inclusion or social/community integration among populations with mental disorders. Five instruments were identified through the search criteria. The scales are discussed in terms of their theoretical underpinnings, domains and/or key items and their potential for use in global settings. Whereas numerous reviewed abstracts discussed mental health and social inclusion or social integration, very few were concerned with direct measurement of the construct. All identified scales were developed in high-income countries with limited attention paid to how the scale could be adapted for cross-cultural use. Social inclusion is increasingly highlighted as a key outcome for global mental health policies and programmes, yet its measurement is underdeveloped. There is need for a global cross-cultural measure that has been developed and tested in diverse settings. However, until that need is met, some of the scales presented here may be amenable to adaptation.

  9. Reviving common standards in point-count surveys for broad inference across studies

    Treesearch

    Steven M. Matsuoka; C. Lisa Mahon; Colleen M. Handel; Péter Sólymos; Erin M. Bayne; Patricia C. Fontaine; C. John Ralph

    2014-01-01

    We revisit the common standards recommended by Ralph et al. (1993, 1995a) for conducting point-count surveys to assess the relative abundance of landbirds breeding in North America. The standards originated from discussions among ornithologists in 1991 and were developed so that point-count survey data could be broadly compared and jointly analyzed by national data...

  10. Research on Key Technology and Applications for Internet of Things

    NASA Astrophysics Data System (ADS)

    Chen, Xian-Yi; Jin, Zhi-Gang

    The Internet of Things (IOT) has been paid more and more attention by the academe, industry, and government all over the world. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology, and ZigBee technology are analyzed. The framework of digital agriculture application based on IOT is proposed.

  11. Applicability Analysis of Cloth Simulation Filtering Algorithm for Mobile LIDAR Point Cloud

    NASA Astrophysics Data System (ADS)

    Cai, S.; Zhang, W.; Qi, J.; Wan, P.; Shao, J.; Shen, A.

    2018-04-01

    Classifying the original point clouds into ground and non-ground points is a key step in LiDAR (light detection and ranging) data post-processing. Cloth simulation filtering (CSF) algorithm, which based on a physical process, has been validated to be an accurate, automatic and easy-to-use algorithm for airborne LiDAR point cloud. As a new technique of three-dimensional data collection, the mobile laser scanning (MLS) has been gradually applied in various fields, such as reconstruction of digital terrain models (DTM), 3D building modeling and forest inventory and management. Compared with airborne LiDAR point cloud, there are some different features (such as point density feature, distribution feature and complexity feature) for mobile LiDAR point cloud. Some filtering algorithms for airborne LiDAR data were directly used in mobile LiDAR point cloud, but it did not give satisfactory results. In this paper, we explore the ability of the CSF algorithm for mobile LiDAR point cloud. Three samples with different shape of the terrain are selected to test the performance of this algorithm, which respectively yields total errors of 0.44 %, 0.77 % and1.20 %. Additionally, large area dataset is also tested to further validate the effectiveness of this algorithm, and results show that it can quickly and accurately separate point clouds into ground and non-ground points. In summary, this algorithm is efficient and reliable for mobile LiDAR point cloud.

  12. Speed-Discussion: Engaging Students in Class Discussions

    ERIC Educational Resources Information Center

    Kornfield, Sarah; Noack, Kristen

    2017-01-01

    Courses: Communication Criticism, Rhetorical Criticism, Family and Communication, Gender and Communication, Popular Communication, and theory-based courses. Objectives: This activity engages students in dynamic, supportive, social discussion groups; helps them to identify and review the central ideas from the reading; and creates a record of their…

  13. International and cross-cultural issues: six key challenges for our professions.

    PubMed

    Marshall, Julie

    2003-01-01

    This paper discusses a number of key challenges facing professionals who work with people who have communication disabilities. The challenges are related to working internationally and in a cross-culturally competent way. Each challenge is discussed, drawing on material from a range of sources, including the papers in the final 2003 edition of FOLIA PHONIATRICA ET LOGOPAEDICA ('International and Cross-Cultural Issues'). The challenges discussed cover how experiences from majority world countries can be used to benefit services elsewhere, 'mainstreaming' commitment to cross-cultural competence, learning from relationships with other professionals, influencing research practice, responding to requests to work internationally and finally, dealing with cultural differences that challenge working practices. Some solutions are suggested and additional questions posed. Copyright 2003 S. Karger AG, Basel

  14. New maps, new information: Coral reefs of the Florida keys

    USGS Publications Warehouse

    Lidz, B.H.; Reich, C.D.; Peterson, R.L.; Shinn, E.A.

    2006-01-01

    A highly detailed digitized map depicts 22 benthic habitats in 3140.5 km2 of the Florida Keys National Marine Sanctuary. Dominant are a seagrass/lime-mud zone (map area 27.5%) throughout Hawk Channel and seagrass/carbonate-sand (18.7%) and bare carbonate-sand (17.3%) zones on the outer shelf and in The Quicksands. A lime-mud/seagrass-covered muddy carbonate-sand zone (9.6%) abuts the keys. Hardbottom communities (13.2%) consist of bare Pleistocene coralline and oolitic limestone, coral rubble, and senile coral reefs. Smaller terrestrial (4.0%) and marine habitats, including those of live coral (patch reefs, 0.7%), account for the rest (13.7%) of the area. Derived from aerial photomosaics, the seabed dataset fits precisely when transposed onto a newly developed National Geophysical Data Center hydrographic-bathymetry map. Combined, the maps point to new information on unstudied seabed morphologies, among them an erosional nearshore rock ledge bordering the seaward side of the Florida Keys and thousands of patch-reef clusters aligned in mid-Hawk Channel. Preliminary indications are that the ledge may represent the seaward extent of the 125-ka Key Largo and Miami Limestone that form the keys, and the patch reefs colonized landward edges of two noncoralline, non-dune-ridge topographic troughs. The troughs, their substrate, and inner-shelf location along the seaward side of the Hawk Channel bedrock depression are the first of that type of nuclei to be recognized in the Florida reef record. Together, the map datasets establish the efficacy and accuracy of using aerial photographs to define in extraordinary detail the seabed features and habitats in a shallow-reef setting.

  15. Key aspects of cost effective collector and solar field design

    NASA Astrophysics Data System (ADS)

    von Reeken, Finn; Nicodemo, Dario; Keck, Thomas; Weinrebe, Gerhard; Balz, Markus

    2016-05-01

    A study has been performed where different key parameters influencing solar field cost are varied. By using levelised cost of energy as figure of merit it is shown that parameters like GoToStow wind speed, heliostat stiffness or tower height should be adapted to respective site conditions from an economical point of view. The benchmark site Redstone (Northern Cape Province, South Africa) has been compared to an alternate site close to Phoenix (AZ, USA) regarding site conditions and their effect on cost-effective collector and solar field design.

  16. Maximizing the benefits of antiretroviral therapy for key affected populations

    PubMed Central

    Grubb, Ian R; Beckham, Sarah W; Kazatchkine, Michel; Thomas, Ruth M; Albers, Eliot R; Cabral, Mauro; Lange, Joep; Vella, Stefano; Kurian, Manoj; Beyrer, Chris

    2014-01-01

    Introduction Scientific research has demonstrated the clinical benefits of earlier initiation of antiretroviral treatment (ART), and that ART can markedly reduce HIV transmission to sexual partners. Ensuring universal access to ART for those who need it has long been a core principle of the HIV response, and extending the benefits of ART to key populations is critical to increasing the impact of ART and the overall effectiveness of the HIV response. However, this can only be achieved through coordinated efforts to address political, social, legal and economic barriers that key populations face in accessing HIV services. Discussion Recent analyses show that HIV prevalence levels among key populations are far higher than among the general population, and they experience a range of biological and behavioural factors, and social, legal and economic barriers that increase their vulnerability to HIV and have resulted in alarmingly low ART coverage. World Health Organization 2014 consolidated guidance on HIV among key populations offers the potential for increased access to ART by key populations, following the same principles as for the general adult population. However, it should not be assumed that key populations will achieve greater access to ART unless stigma, discrimination and punitive laws, policies and practices that limit access to ART and other HIV interventions in many countries are addressed. Conclusions Rights-based approaches and investments in critical enablers, such as supportive legal and policy environments, are essential to enable wider access to ART and other HIV interventions for key populations. The primary objective of ART should always be to treat the person living with HIV; prevention is an important, additional benefit. ART should be provided only with informed consent. The preventive benefits of treatment must not be used as a pretext for failure to provide other necessary HIV programming for key populations, including comprehensive harm

  17. Very Luminous X-ray Point Sources in Starburst Galaxies

    NASA Astrophysics Data System (ADS)

    Colbert, E.; Heckman, T.; Ptak, A.; Weaver, K. A.; Strickland, D.

    Extranuclear X-ray point sources in external galaxies with luminosities above 1039.0 erg/s are quite common in elliptical, disk and dwarf galaxies, with an average of ~ 0.5 and dwarf galaxies, with an average of ~0.5 sources per galaxy. These objects may be a new class of object, perhaps accreting intermediate-mass black holes, or beamed stellar mass black hole binaries. Starburst galaxies tend to have a larger number of these intermediate-luminosity X-ray objects (IXOs), as well as a large number of lower-luminosity (1037 - 1039 erg/s) point sources. These point sources dominate the total hard X-ray emission in starburst galaxies. We present a review of both types of objects and discuss possible schemes for their formation.

  18. FIBER OPTICS: Role of point defects in the photosensitivity of hydrogen-loaded phosphosilicate glass

    NASA Astrophysics Data System (ADS)

    Larionov, Yu V.

    2010-08-01

    It is shown that point defect modifications in hydrogen-loaded phosphosilicate glass (PSG) do not play a central role in determining its photosensitivity. Photochemical reactions that involve a two-step point defect modification and pre-exposure effect are incapable of accounting for photoinduced refractive index changes. It seems likely that a key role in UV-induced refractive index modifications is played by structural changes in the PSG network. Experimental data are presented that demonstrate intricate network rearrangement dynamics during UV exposure of PSG.

  19. Adaptive spatial filtering for daytime satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2014-11-01

    The rate of secure key generation (SKG) in quantum key distribution (QKD) is adversely affected by optical noise and loss in the quantum channel. In a free-space atmospheric channel, the scattering of sunlight into the channel can lead to quantum bit error ratios (QBERs) sufficiently large to preclude SKG. Furthermore, atmospheric turbulence limits the degree to which spatial filtering can reduce sky noise without introducing signal losses. A system simulation quantifies the potential benefit of tracking and higher-order adaptive optics (AO) technologies to SKG rates in a daytime satellite engagement scenario. The simulations are performed assuming propagation from a low-Earth orbit (LEO) satellite to a terrestrial receiver that includes an AO system comprised of a Shack-Hartmann wave-front sensor (SHWFS) and a continuous-face-sheet deformable mirror (DM). The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain waveoptics hardware emulator. Secure key generation rates are then calculated for the decoy state QKD protocol as a function of the receiver field of view (FOV) for various pointing angles. The results show that at FOVs smaller than previously considered, AO technologies can enhance SKG rates in daylight and even enable SKG where it would otherwise be prohibited as a consequence of either background optical noise or signal loss due to turbulence effects.

  20. Secure password-based authenticated key exchange for web services

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less