Sample records for key experimental findings

  1. Human Health Effects of Biphenyl: Key Findings and Scientific Issues

    PubMed Central

    Li, Zheng; Hogan, Karen A.; Cai, Christine; Rieth, Susan

    2015-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) has evaluated the human health hazards of biphenyl exposure. Objectives: We review key findings and scientific issues regarding expected human health effects of biphenyl. Methods: Scientific literature from 1926 through September 2012 was critically evaluated to identify potential human health hazards associated with biphenyl exposure. Key issues related to the carcinogenicity and noncancer health hazards of biphenyl were examined based on evidence from experimental animal bioassays and mechanistic studies. Discussion: Systematic consideration of experimental animal studies of oral biphenyl exposure took into account the variety of study designs (e.g., study sizes, exposure levels, and exposure durations) to reconcile differing reported results. The available mechanistic and toxicokinetic evidence supports the hypothesis that male rat urinary bladder tumors arise through urinary bladder calculi formation but is insufficient to hypothesize a mode of action for liver tumors in female mice. Biphenyl and its metabolites may induce genetic damage, but a role for genotoxicity in biphenyl-induced carcinogenicity has not been established. Conclusions: The available health effects data for biphenyl provides suggestive evidence for carcinogenicity in humans, based on increased incidences of male rat urinary bladder tumors at high exposure levels and on female mouse liver tumors. Kidney toxicity is also a potential human health hazard of biphenyl exposure. Citation: Li Z, Hogan KA, Cai C, Rieth S. 2016. Human health effects of biphenyl: key findings and scientific issues. Environ Health Perspect 124:703–712; http://dx.doi.org/10.1289/ehp.1509730 PMID:26529796

  2. Human Health Effects of Biphenyl: Key Findings and Scientific Issues.

    PubMed

    Li, Zheng; Hogan, Karen A; Cai, Christine; Rieth, Susan

    2016-06-01

    In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) has evaluated the human health hazards of biphenyl exposure. We review key findings and scientific issues regarding expected human health effects of biphenyl. Scientific literature from 1926 through September 2012 was critically evaluated to identify potential human health hazards associated with biphenyl exposure. Key issues related to the carcinogenicity and noncancer health hazards of biphenyl were examined based on evidence from experimental animal bioassays and mechanistic studies. Systematic consideration of experimental animal studies of oral biphenyl exposure took into account the variety of study designs (e.g., study sizes, exposure levels, and exposure durations) to reconcile differing reported results. The available mechanistic and toxicokinetic evidence supports the hypothesis that male rat urinary bladder tumors arise through urinary bladder calculi formation but is insufficient to hypothesize a mode of action for liver tumors in female mice. Biphenyl and its metabolites may induce genetic damage, but a role for genotoxicity in biphenyl-induced carcinogenicity has not been established. The available health effects data for biphenyl provides suggestive evidence for carcinogenicity in humans, based on increased incidences of male rat urinary bladder tumors at high exposure levels and on female mouse liver tumors. Kidney toxicity is also a potential human health hazard of biphenyl exposure. Li Z, Hogan KA, Cai C, Rieth S. 2016. Human health effects of biphenyl: key findings and scientific issues. Environ Health Perspect 124:703-712; http://dx.doi.org/10.1289/ehp.1509730.

  3. Human Health Effects of Trichloroethylene: Key Findings and Scientific Issues

    PubMed Central

    Jinot, Jennifer; Scott, Cheryl Siegel; Makris, Susan L.; Cooper, Glinda S.; Dzubow, Rebecca C.; Bale, Ambuja S.; Evans, Marina V.; Guyton, Kathryn Z.; Keshava, Nagalakshmi; Lipscomb, John C.; Barone, Stanley; Fox, John F.; Gwinn, Maureen R.; Schaum, John; Caldwell, Jane C.

    2012-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) completed a toxicological review of trichloroethylene (TCE) in September 2011, which was the result of an effort spanning > 20 years. Objectives: We summarized the key findings and scientific issues regarding the human health effects of TCE in the U.S. EPA’s toxicological review. Methods: In this assessment we synthesized and characterized thousands of epidemiologic, experimental animal, and mechanistic studies, and addressed several key scientific issues through modeling of TCE toxicokinetics, meta-analyses of epidemiologic studies, and analyses of mechanistic data. Discussion: Toxicokinetic modeling aided in characterizing the toxicological role of the complex metabolism and multiple metabolites of TCE. Meta-analyses of the epidemiologic data strongly supported the conclusions that TCE causes kidney cancer in humans and that TCE may also cause liver cancer and non-Hodgkin lymphoma. Mechanistic analyses support a key role for mutagenicity in TCE-induced kidney carcinogenicity. Recent evidence from studies in both humans and experimental animals point to the involvement of TCE exposure in autoimmune disease and hypersensitivity. Recent avian and in vitro mechanistic studies provided biological plausibility that TCE plays a role in developmental cardiac toxicity, the subject of substantial debate due to mixed results from epidemiologic and rodent studies. Conclusions: TCE is carcinogenic to humans by all routes of exposure and poses a potential human health hazard for noncancer toxicity to the central nervous system, kidney, liver, immune system, male reproductive system, and the developing embryo/fetus. PMID:23249866

  4. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  5. Experimental demonstration of counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Ren, M.; Wu, G.; Wu, E.; Zeng, H.

    2011-04-01

    Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We experimentally realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 97.4%. According to the security analysis, the system was robust against the photon-number-splitting attack. The article is published in the original.

  6. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    PubMed

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  7. Experimental quantum key distribution with source flaws

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  8. Experimental interstellar organic chemistry - Preliminary findings

    NASA Technical Reports Server (NTRS)

    Khare, B. N.; Sagan, C.

    1973-01-01

    Review of the results of some explicit experimental simulation of interstellar organic chemistry consisting in low-temperature high-vacuum UV irradiation of condensed simple gases known or suspected to be present in the interstellar medium. The results include the finding that acetonitrile may be present in the interstellar medium. The implication of this and other findings are discussed.

  9. Institutional Data Management in Higher Education. ECAR Key Findings

    ERIC Educational Resources Information Center

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  10. Perceptual Tests of an Algorithm for Musical Key-Finding

    ERIC Educational Resources Information Center

    Schmuckler, Mark A.; Tomovski, Robert

    2005-01-01

    Perceiving the tonality of a musical passage is a fundamental aspect of the experience of hearing music. Models for determining tonality have thus occupied a central place in music cognition research. Three experiments investigated 1 well-known model of tonal determination: the Krumhansl-Schmuckler key-finding algorithm. In Experiment 1,…

  11. Powering Down: Green IT in Higher Education. Key Findings

    ERIC Educational Resources Information Center

    Sheehan, Mark C.

    2010-01-01

    This document presents the key findings from "Powering Down: Green IT in Higher Education," the 2010 ECAR (EDUCAUSE Center for Applied Research) study of green IT. The study examines the stance institutions and their central IT organizations are taking on environmental sustainability (ES), the progress they are making on a variety of key…

  12. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    NASA Astrophysics Data System (ADS)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  13. Key Findings and Recommendations for Technology Transfer at the ITS JPO

    DOT National Transportation Integrated Search

    2011-03-18

    This report provides key findings and recommendations for technology transfer at the Intelligent Transportation Systems Joint Program Office (ITS JPO) based upon an assessment of best practices in technology transfer in other industries, such as nati...

  14. Integrated vehicle-based safety systems : heavy-truck field operational test key findings report.

    DOT National Transportation Integrated Search

    2010-08-01

    This document presents key findings from the heavy-truck field operational test conducted as : part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of : analyses performed by the University of Michigan Transporta...

  15. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    DOT National Transportation Integrated Search

    2011-01-01

    This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportati...

  16. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    DOT National Transportation Integrated Search

    2011-01-01

    "This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportat...

  17. Experimentally feasible quantum-key-distribution scheme using qubit-like qudits and its comparison with existing qubit- and qudit-based protocols

    NASA Astrophysics Data System (ADS)

    Chau, H. F.; Wang, Qinan; Wong, Cardythy

    2017-02-01

    Recently, Chau [Phys. Rev. A 92, 062324 (2015), 10.1103/PhysRevA.92.062324] introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a 2n-dimensional Hilbert space in the form (|i > ±|j >) /√{2 } with n ≥2 . For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtained in the absence of transmission error. Here we show that by modifying the basis announcement procedure, the same experimental setup can generate n bits of raw key for each qudit prepared and measured in the same basis in the noiseless situation. The reason is that in addition to the phase information, each qudit also carries information on the Hilbert subspace used. The additional (n -1 ) bits of raw key comes from a clever utilization of this extra piece of information. We prove the unconditional security of this modified protocol and compare its performance with other existing provably secure qubit- and qudit-based protocols on market in the one-way classical communication setting. Interestingly, we find that for the case of n =2 , the secret key rate of this modified protocol using nondegenerate random quantum code to perform one-way entanglement distillation is equal to that of the six-state scheme.

  18. "State of the Nation": A Discussion of Some of the Project's Key Findings

    ERIC Educational Resources Information Center

    Earley, Peter

    2010-01-01

    This paper considers several of the key findings of the State of the Nation research. Specific reference is made to three areas--impact evaluation, strategic leadership of professional development, and barriers and constraints to effective CPD practice--which are considered with reference to findings from the other TDA-funded projects conducted at…

  19. 40 CFR 63.2831 - Where can I find definitions of key words used in this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... words used in this subpart? 63.2831 Section 63.2831 Protection of Environment ENVIRONMENTAL PROTECTION... Vegetable Oil Production What This Subpart Covers § 63.2831 Where can I find definitions of key words used in this subpart? You can find definitions of key words used in this subpart in § 63.2872. ...

  20. Language Learning at Key Stage 2: Findings from a Longitudinal Study

    ERIC Educational Resources Information Center

    Cable, Carrie; Driscoll, Patricia; Mitchell, Rosamond; Sing, Sue; Cremin, Teresa; Earl, Justine; Eyres, Ian; Holmes, Bernardette; Martin, Cynthia; Heins, Barbara

    2012-01-01

    This paper discusses some of the findings from a 3-year longitudinal study of language learning in the upper stage of English primary schools, i.e. at Key Stage 2. This largely qualitative study (commissioned by the then Department for Children, Schools and Families) was designed to explore and document developing provision and practice in a…

  1. The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings

    ERIC Educational Resources Information Center

    Smith, Shannon D.; Caruso, Judith Borreson

    2010-01-01

    This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…

  2. U of M Civil Service Wellness Survey: Finding Out Employees' Health and Wellness Needs. A Report of Key Findings.

    ERIC Educational Resources Information Center

    Matross, Ron; Roesler, Jon

    Key findings from a wellness survey conducted with University of Minnesota civil service employees are discussed. The survey was designed to provide information to guide future campus health and wellness programming. Four topics were covered: physical fitness/exercise, nutrition, self-improvement/psychological health, and general health/preventive…

  3. A key role for Pre-B cell colony-enhancing factor in experimental hepatitis.

    PubMed

    Moschen, Alexander R; Gerner, Romana; Schroll, Andrea; Fritz, Teresa; Kaser, Arthur; Tilg, Herbert

    2011-08-01

    Pre-B cell colony-enhancing factor (PBEF), also known as nicotinamide phosphoribosyltransferase or visfatin, plays an important role in metabolic, inflammatory, and malignant diseases. Recent evidence suggests that blocking its enzymatic activity using a specific small-molecule inhibitor (FK866) might be beneficial in acute experimental inflammation. We investigated the role of PBEF in human liver disease and experimental hepatitis. PBEF serum levels and hepatic expression were determined in patients with chronic liver diseases. These studies were followed by in vivo experiments using concanavalin A (ConA) and D-galactosamine/lipopolysaccharide (LPS) models of experimental hepatitis. PBEF was either overexpressed by hydrodynamic perfusion or inhibited by FK866. In vivo findings were corroborated studying inflammatory responses of lentivirally PBEF-silenced or control FL83B mouse hepatocytes. Here, we demonstrate that PBEF serum levels were increased in patients with chronic liver diseases irrespective of disease stage and etiology. In particular, we observed enhanced PBEF expression in hepatocytes. Liver-targeted overexpression of PBEF rendered mice more susceptible to ConA- and D-galactosamine/LPS-induced hepatitis compared with control animals. In contrast, inhibition of PBEF using FK866 protected mice from ConA-induced liver damage and apoptosis. Administration of FK866 resulted in depletion of liver nicotinamide adenine dinucleotide+ levels and reduced proinflammatory cytokine expression. Additionally, FK866 protected mice in the D-galactosamine/LPS model of acute hepatitis. In vitro, PBEF-silenced mouse hepatocytes showed decreased responses after stimulation with LPS, lipoteichoic acid, and tumor necrosis factor α. In primary murine Kupffer cells, FK866 suppressed LPS-induced interleukin (IL)-6 production, whereas incubation with recombinant PBEF resulted in increased IL-6 release. Our data suggest that PBEF is of key importance in experimental hepatitis

  4. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  5. Intermediate experimental vehicle, ESA program aerodynamics-aerothermodynamics key technologies for spacecraft design and successful flight

    NASA Astrophysics Data System (ADS)

    Dutheil, Sylvain; Pibarot, Julien; Tran, Dac; Vallee, Jean-Jacques; Tribot, Jean-Pierre

    2016-07-01

    With the aim of placing Europe among the world's space players in the strategic area of atmospheric re-entry, several studies on experimental vehicle concepts and improvements of critical re-entry technologies have paved the way for the flight of an experimental space craft. The successful flight of the Intermediate eXperimental Vehicle (IXV), under ESA's Future Launchers Preparatory Programme (FLPP), is definitively a significant step forward from the Atmospheric Reentry Demonstrator flight (1998), establishing Europe as a key player in this field. The IXV project objectives were the design, development, manufacture and ground and flight verification of an autonomous European lifting and aerodynamically controlled reentry system, which is highly flexible and maneuverable. The paper presents, the role of aerodynamics aerothermodynamics as part of the key technologies for designing an atmospheric re-entry spacecraft and securing a successful flight.

  6. Key Metabolites and Mechanistic Changes for Salt Tolerance in an Experimentally Evolved Sulfate-Reducing Bacterium, Desulfovibrio vulgaris.

    PubMed

    Zhou, Aifen; Lau, Rebecca; Baran, Richard; Ma, Jincai; von Netzer, Frederick; Shi, Weiling; Gorman-Lewis, Drew; Kempher, Megan L; He, Zhili; Qin, Yujia; Shi, Zhou; Zane, Grant M; Wu, Liyou; Bowen, Benjamin P; Northen, Trent R; Hillesland, Kristina L; Stahl, David A; Wall, Judy D; Arkin, Adam P; Zhou, Jizhong

    2017-11-14

    experimental evolutionary studies. Desulfovibrio vulgaris Hildenborough is a model sulfate-reducing bacterium (SRB) that is important in biogeochemical cycling of sulfur, carbon, and nitrogen, potentially for bio-corrosion, and for bioremediation of toxic heavy metals and radionuclides. The coexistence of SRB and high salinity in natural habitats and heavy metal-contaminated field sites laid the foundation for the study of salt adaptation of D. vulgaris Hildenborough with experimental evolution. Here, we analyzed a clone that evolved under salt stress for 5,000 generations and compared it to a clone evolved under the same condition for 1,200 generations. The results indicated the key roles of glutamate for osmoprotection and of i17:1ω9c for increasing membrane fluidity during salt adaptation. The findings provide valuable insights about the salt adaptation mechanism changes during long-term experimental evolution. Copyright © 2017 Zhou et al.

  7. How the World's Best Schools Stay on Top: Study's Key Findings Pinpoint Practices That Align with Learning Forward

    ERIC Educational Resources Information Center

    Killion, Joellen

    2016-01-01

    Key findings from a new study highlight how Learning Forward's long-standing position on professional learning correlates with practices in high-performing systems in Singapore, Shanghai, Hong Kong, and British Columbia. The purpose of this article is to share key findings from the study so that educators might apply them to strengthening…

  8. Alternative IT Sourcing Strategies: From the Campus to the Cloud. ECAR Key Findings

    ERIC Educational Resources Information Center

    Goldstein, Philip J.

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study, "Alternative IT Sourcing Strategies: From the Campus to the Cloud," by Philip J. Goldstein. The study explores a multitude of strategies used by colleges and university information technology organizations to deliver the breadth of technologies…

  9. Responding to Recession: IT Funding and Cost Management in Higher Education. Key Findings

    ERIC Educational Resources Information Center

    Goldstein, Philip J.

    2010-01-01

    This document presents the key findings from "Responding to Recession: IT Funding and Cost Management in Higher Education", the 2010 ECAR (EDUCAUSE Center for Applied Research) study of how the economic recession is impacting information technology (IT) organizations and operations in higher education. The study was designed to address the…

  10. Finding the Key to a Good Theatre Program: Some Comments on the ETA Survey.

    ERIC Educational Resources Information Center

    Hobgood, Burnet M.

    1991-01-01

    Offers some comments on the Educational Theatre Association's survey on the status of theater in U.S. high schools in the same issue of this journal. Discusses finding the key factors responsible for good school theater. (PRA)

  11. AN INTEGRATED SYNTHESIS OF KEY AND POLICY RELEVANT FINDINGS FROM EPA'S SUPERSITES PROGRAM AND RELATED STUDIES

    EPA Science Inventory

    This presentation provides an overview and initial insights into the findings based on results from EPA's PM Supersites Program and related studies. Many key atmospheric sciences findings have been identified through the research conducted during the last five years as part of t...

  12. Key Metabolites and Mechanistic Changes for Salt Tolerance in an Experimentally Evolved Sulfate-Reducing Bacterium, Desulfovibrio vulgaris

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou, Aifen; Lau, Rebecca; Baran, Richard

    attractive for experimental evolutionary studies.Desulfovibrio vulgarisHildenborough is a model sulfate-reducing bacterium (SRB) that is important in biogeochemical cycling of sulfur, carbon, and nitrogen, potentially for bio-corrosion, and for bioremediation of toxic heavy metals and radionuclides. The coexistence of SRB and high salinity in natural habitats and heavy metal-contaminated field sites laid the foundation for the study of salt adaptation ofD. vulgarisHildenborough with experimental evolution. Here in this paper, we analyzed a clone that evolved under salt stress for 5,000 generations and compared it to a clone evolved under the same condition for 1,200 generations. The results indicated the key roles of glutamate for osmoprotection and of i17:1ω9c for increasing membrane fluidity during salt adaptation. The findings provide valuable insights about the salt adaptation mechanism changes during long-term experimental evolution.« less

  13. Key Metabolites and Mechanistic Changes for Salt Tolerance in an Experimentally Evolved Sulfate-Reducing Bacterium, Desulfovibrio vulgaris

    DOE PAGES

    Zhou, Aifen; Lau, Rebecca; Baran, Richard; ...

    2017-11-14

    attractive for experimental evolutionary studies.Desulfovibrio vulgarisHildenborough is a model sulfate-reducing bacterium (SRB) that is important in biogeochemical cycling of sulfur, carbon, and nitrogen, potentially for bio-corrosion, and for bioremediation of toxic heavy metals and radionuclides. The coexistence of SRB and high salinity in natural habitats and heavy metal-contaminated field sites laid the foundation for the study of salt adaptation ofD. vulgarisHildenborough with experimental evolution. Here in this paper, we analyzed a clone that evolved under salt stress for 5,000 generations and compared it to a clone evolved under the same condition for 1,200 generations. The results indicated the key roles of glutamate for osmoprotection and of i17:1ω9c for increasing membrane fluidity during salt adaptation. The findings provide valuable insights about the salt adaptation mechanism changes during long-term experimental evolution.« less

  14. 40 CFR 63.1176 - Where can I find definitions of key words used in this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... words used in this subpart? 63.1176 Section 63.1176 Protection of Environment ENVIRONMENTAL PROTECTION... Production § 63.1176 Where can I find definitions of key words used in this subpart? The definitions of key words used in this subpart are in the Clean Air Act (Act), in § 63.2 of the general provisions in...

  15. Old Wine in New Skins: The Sensitivity of Established Findings to New Methods

    ERIC Educational Resources Information Center

    Foster, E. Michael; Wiley-Exley, Elizabeth; Bickman, Leonard

    2009-01-01

    Findings from an evaluation of a model system for delivering mental health services to youth were reassessed to determine the robustness of key findings to the use of methodologies unavailable to the original analysts. These analyses address a key concern about earlier findings--that the quasi-experimental design involved the comparison of two…

  16. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.

    PubMed

    Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe

    2007-01-19

    An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.

  17. Teaching Teachers for the Future (TTF) Project TPACK Survey: Summary of the Key Findings

    ERIC Educational Resources Information Center

    Finger, Glenn; Jamieson-Proctor, Romina; Cavanagh, Rob; Albion, Peter; Grimbeek, Peter; Bond, Trevor; Fitzgerald, Robert; Romeo, Geoff; Lloyd, Margaret

    2013-01-01

    This paper presents a summary of the key findings of the TTF TPACK Survey developed and administered for the Teaching the Teachers for the Future (TTF) Project implemented in 2011. The TTF Project, funded by an Australian Government ICT Innovation Fund grant, involved all 39 Australian Higher Education Institutions which provide initial teacher…

  18. Human Health Effects of Dichloromethane: Key Findings and Scientific Issues

    PubMed Central

    Schlosser, Paul M.; Bale, Ambuja S.; Gibbons, Catherine F.; Wilkins, Amina

    2014-01-01

    effects of dichloromethane: key findings and scientific issues. Environ Health Perspect 123:114–119; http://dx.doi.org/10.1289/ehp.1308030 PMID:25325283

  19. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 2001.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This report presents an overview of the key findings from the Monitoring the Future 2001 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  20. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2002.

    ERIC Educational Resources Information Center

    Michigan Univ., Ann Arbor. Inst. for Social Research.

    This report presents an overview of the key findings from the Monitoring the Future 2002 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  1. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Xuyang; Liu, Wenyuan; Wang, Pu; Li, Yongmin

    2017-06-01

    We experimentally demonstrated an all-fiber-based unidimensional continuous-variable quantum key distribution (CV QKD) protocol and analyzed its security under collective attack in realistic conditions. A pulsed balanced homodyne detector, which could not be accessed by eavesdroppers, with phase-insensitive efficiency and electronic noise, was considered. Furthermore, a modulation method and an improved relative phase-locking technique with one amplitude modulator and one phase modulator were designed. The relative phase could be locked precisely with a standard deviation of 0.5° and a mean of almost zero. Secret key bit rates of 5.4 kbps and 700 bps were achieved for transmission fiber lengths of 30 and 50 km, respectively. The protocol, which simplified the CV QKD system and reduced the cost, displayed a performance comparable to that of a symmetrical counterpart under realistic conditions. It is expected that the developed protocol can facilitate the practical application of the CV QKD.

  2. Side-channel-free quantum key distribution.

    PubMed

    Braunstein, Samuel L; Pirandola, Stefano

    2012-03-30

    Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.

  3. Experimental Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-01

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  4. Experimental measurement-device-independent quantum key distribution.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-27

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  5. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  6. Assessment of Health Effects of Exogenous Urea: Summary and Key Findings.

    PubMed

    Dickerson, Aisha S; Lee, Janice S; Keshava, Channa; Hotchkiss, Andrew; Persad, Amanda S

    2018-05-01

    Urea has been utilized as a reductant in diesel fuels to lower emission of nitrogen oxides, igniting interest in probable human health hazards associated with exposure to exogenous urea. Here, we summarize and update key findings on potential health effects of exogenous urea, including carcinogenicity. No definitive target organs for oral exposure were identified; however, results in animal studies suggest that the liver and kidney could be potential target organs of urea toxicity. The available human-subject literature suggests that the impact on lung function is minimal. Based on the literature on exogenous urea, we concluded that there was inadequate information to assess the carcinogenic potential of urea, or perform a quantitative assessment to derive reference values. Given the limited information on exogenous urea, additional research to address gaps for exogenous urea should include long-term cancer bioassays, two-generation reproductive toxicity studies, and mode-of-action investigations.

  7. Experimental realization of equiangular three-state quantum key distribution

    PubMed Central

    Schiavon, Matteo; Vallone, Giuseppe; Villoresi, Paolo

    2016-01-01

    Quantum key distribution using three states in equiangular configuration combines a security threshold comparable with the one of the Bennett-Brassard 1984 protocol and a quantum bit error rate (QBER) estimation that does not need to reveal part of the key. We implement an entanglement-based version of the Renes 2004 protocol, using only passive optic elements in a linear scheme for the positive-operator valued measure (POVM), generating an asymptotic secure key rate of more than 10 kbit/s, with a mean QBER of 1.6%. We then demonstrate its security in the case of finite key and evaluate the key rate for both collective and general attacks. PMID:27465643

  8. Socioeconomic assessment of Forest Service American Recovery and Reinvestment Act projects: key findings and lessons learned

    Treesearch

    Susan Charnley; Pamela Jakes; John Schelhas

    2012-01-01

    The American Recovery and Reinvestment Act of 2009 (the Recovery Act) aimed to create jobs and promote economic growth while addressing the Nation’s social and environmental needs. The USDA Forest Service received $1.15 billion in economic recovery funding. This report contains key findings and lessons learned from a socioeconomic assessment of Forest Service Recovery...

  9. Optimizing Experimental Designs: Finding Hidden Treasure.

    USDA-ARS?s Scientific Manuscript database

    Classical experimental design theory, the predominant treatment in most textbooks, promotes the use of blocking designs for control of spatial variability in field studies and other situations in which there is significant variation among heterogeneity among experimental units. Many blocking design...

  10. Trends in Learning Outcomes Assessment. Key Findings from a Survey among Administrators at AAC&U Member Institutions

    ERIC Educational Resources Information Center

    Association of American Colleges and Universities, 2016

    2016-01-01

    This 2016 report summarizes key findings from a national survey among chief academic officers at Association of American Colleges & Universities (AAC&U) member institutions and explores trends in learning outcomes and approaches to assessing them. It documents that many in higher education are moving away from standardized tests and…

  11. Monitoring HIV Prevention Programme Outcomes among Key Populations in Kenya: Findings from a National Survey

    PubMed Central

    Musyoki, Helgar; Anthony, John; Kioko, Japheth; Kaosa, Shem; Ogwang, Bernard E.; Githuka, George; Sirengo, Martin; Birir, Sarah; Blanchard, James F.; Muraguri, Nicholas; Isac, Shajy; Moses, Stephen

    2015-01-01

    In preparation for the implementation of the Kenya AIDS Strategic Framework 2014/15-2018/19, the Kenya National AIDS and STI Control Programme facilitated a national polling booth survey as part of a baseline assessment of HIV-related risk behaviours among FSWs, MSM, and PWID, and their utilization of existing preventive interventions, as well as structural factors that may influence KPs’ vulnerability to HIV. The survey was conducted among “key populations” (female sex workers, men who have sex with men, and people who inject drugs) to understand current HIV risk and prevention behaviours, utilization of existing programmes and services, and experiences of violence. In total, 3,448 female sex workers, 1,308 men who have sex with men, and 690 people who inject drugs were randomly selected to participate in polling booth survey sessions from seven priority sites. Survey responses were aggregated and descriptive statistics derived. In general, reported condom use among all key populations was quite high with paying clients, and lower with regular, non-paying partners. Many participants reported unavailability of condoms or clean injecting equipment within the past month. Exposure to, and utilization of, existing HIV prevention services varied significantly among the groups, and was reported least commonly by female sex workers. Encouragingly, approximately three-quarters of all key population members reported receiving an HIV test in the past three months. All key population groups reported experiencing high levels of physical and sexual violence from partners/clients, and/or arrest and violence by law enforcement officials. Although some of the findings are encouraging, there is room for improvement in HIV prevention programmes and services for key populations across Kenya. PMID:26313642

  12. G-CSF in acute myocardial infarction - experimental and clinical findings.

    PubMed

    Ince, Hüseyin; Petzsch, Michael; Rehders, Tim C; Dunkelmann, Simone; Nienaber, Christoph A

    2006-09-01

    Early data from clinical studies suggest that intracoronary injection of autologous progenitor cells may beneficially affect postinfarction remodeling and perfusion. Beyond intracoronary infusion of autologous bone marrow mononuclear CD34+ cells (MNCCD34+), mobilization of stem cells by G-CSF has recently attracted attention because of various advantages such as the noninvasive nature of MNCCD34+ mobilization by subcutaneous injections. It is the aim of the present work to give an overview about the current experimental and clinical findings of G-CSF treatment in acute myocardial infarction.

  13. Federal Initiatives and Rural School Improvement: Findings from the Experimental Schools Program.

    ERIC Educational Resources Information Center

    Herriott, Robert E.

    Abt Associates' concluding report on its research of the federally funded Experimental Schools (ES) program identifies educational needs in rural schools, introduces the substance of the ES program, and presents the major findings of the research in terms of the dynamics of rural school districts and the design and implementation of federal…

  14. Gaseous Sulfate Solubility in Glass: Experimental Method

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bliss, Mary

    2013-11-30

    Sulfate solubility in glass is a key parameter in many commercial glasses and nuclear waste glasses. This report summarizes key publications specific to sulfate solubility experimental methods and the underlying physical chemistry calculations. The published methods and experimental data are used to verify the calculations in this report and are expanded to a range of current technical interest. The calculations and experimental methods described in this report will guide several experiments on sulfate solubility and saturation for the Hanford Waste Treatment Plant Enhanced Waste Glass Models effort. There are several tables of sulfate gas equilibrium values at high temperature tomore » guide experimental gas mixing and to achieve desired SO3 levels. This report also describes the necessary equipment and best practices to perform sulfate saturation experiments for molten glasses. Results and findings will be published when experimental work is finished and this report is validated from the data obtained.« less

  15. Reflections of Girls in the Media: A Two-Part Study on Gender and Media. Summary of Key Findings.

    ERIC Educational Resources Information Center

    1997

    This pamphlet summarizes the key findings of a two-part study that investigated the messages that young women (age 10 to 17) get from the media. A content analysis examined messages to girls across a range of media most heavily used by adolescent girls: television, movies, magazines, music videos, television commercials, and magazine…

  16. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  17. Biofilms and mechanics: a review of experimental techniques and findings

    NASA Astrophysics Data System (ADS)

    Gordon, Vernita D.; Davis-Fields, Megan; Kovach, Kristin; Rodesney, Christopher A.

    2017-06-01

    Biofilms are developmentally-dynamic communities of sessile microbes that adhere to each other and, often, to other structures in their environment. The cohesive mechanical forces binding microbes to each other confer mechanical and structural stability on the biofilm and give rise to biofilm viscoelasticity. The adhesive mechanical forces binding microbes to other structures in their environment can promote biofilm initiation and mechanosensing that leads to changes in biological activity. Thus, physical mechanics is intrinsic to characteristics that distinguish biofilms from free-swimming or free-floating microbes in liquid culture. However, very little is known about the specifics of what mechanical traits characterize different types of biofilms at different stages of development. Even less is known about how mechanical inputs impact microbial biology and how microbes can adjust their mechanical coupling to, and interaction with, their environment. These knowledge gaps arise, in part, from the challenges associated with experimental measurements of microbial and biofilm biomechanics. Here, we review extant experimental techniques and their most-salient findings to date. At the end of this review we indicate areas where significant advances in the state-of-the art are heading.

  18. Hydration of calcium sulfoaluminate cements - Experimental findings and thermodynamic modelling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Winnefeld, Frank, E-mail: Frank.Winnefeld@empa.c; Lothenbach, Barbara

    Calcium sulfoaluminate cements (CSA) are a promising low-CO{sub 2} alternative to ordinary Portland cements and are as well of interest concerning their use as binder for waste encapsulation. In this study, the hydration of two CSA cements has been investigated experimentally and by thermodynamic modelling between 1 h and 28 days at w/c ratios of 0.72 and 0.80, respectively. The main hydration product of CSA is ettringite, which precipitates together with amorphous Al(OH){sub 3} until the calcium sulfate is consumed after around 1-2 days of hydration. Afterwards, monosulfate is formed. In the presence of belite, straetlingite occurs as an additionalmore » hydration product. The pore solution analysis reveals that straetlingite can bind a part of the potassium ions, which are released by the clinker minerals. The microstructure of both cements is quite dense even after 16 h of hydration, with not much pore space available at a sample age of 28 days. The pore solution of both cements is dominated during the first hours of hydration by potassium, sodium, calcium, aluminium and sulfate; the pH is around 10-11. When the calcium sulfate is depleted, the sulfate concentration drops by a factor of 10. This increases pH to around 12.5-12.8. Based on the experimental data, a thermodynamic hydration model for CSA cements based on cement composition, hydration kinetics of clinker phases and calculations of thermodynamic equilibria by geochemical speciation has been established. The modelled phase development with ongoing hydration agrees well with the experimental findings.« less

  19. Key Findings from a National Internet Survey of 400 Teachers and 95 Principals Conducted November 12-21, 2008

    ERIC Educational Resources Information Center

    McCleskey, Nicole

    2010-01-01

    This paper presents the key findings from a national Internet survey of 400 teachers and 95 principals. This survey was conducted November 12-21, 2008. The sample was based on a list provided by EMI Surveys, a custom online research sample provider with an extensive portfolio of projects. The margin of error for a sample of 495 interviews is [plus…

  20. A Mid-DESD Review: Key Findings and Ways Forward

    ERIC Educational Resources Information Center

    Wals, Arjen E. J.

    2009-01-01

    This article lists the key outcomes and recommendations of Phase I of the monitoring and evaluation of the DESD. Phase I focused on a review of the structures, provisions and conditions countries and regions have put in place in order to facilitate the development and implementation of ESD. The author also touches upon the constraints and…

  1. Sex, Gender, and Pain: A Review of Recent Clinical and Experimental Findings

    PubMed Central

    Fillingim, Roger B.; King, Christopher D.; Ribeiro-Dasilva, Margarete C.; Rahim-Williams, Bridgett; Riley, Joseph L.

    2009-01-01

    Sex-related influences on pain and analgesia have become a topic of tremendous scientific and clinical interest, especially in the last 10 to 15 years. Members of our research group published reviews of this literature more than a decade ago, and the intervening time period has witnessed robust growth in research regarding sex, gender, and pain. Therefore, it seems timely to revisit this literature. Abundant evidence from recent epidemiologic studies clearly demonstrates that women are at substantially greater risk for many clinical pain conditions, and there is some suggestion that postoperative and procedural pain may be more severe among women than men. Consistent with our previous reviews, current human findings regarding sex differences in experimental pain indicate greater pain sensitivity among females compared with males for most pain modalities, including more recently implemented clinically relevant pain models such as temporal summation of pain and intramuscular injection of algesic substances. The evidence regarding sex differences in laboratory measures of endogenous pain modulation is mixed, as are findings from studies using functional brain imaging to ascertain sex differences in pain-related cerebral activation. Also inconsistent are findings regarding sex differences in responses to pharmacologic and non-pharmacologic pain treatments. The article concludes with a discussion of potential biopsychosocial mechanisms that may underlie sex differences in pain, and considerations for future research are discussed. Perspective This article reviews the recent literature regarding sex, gender, and pain. The growing body of evidence that has accumulated in the past 10 to 15 years continues to indicate substantial sex differences in clinical and experimental pain responses, and some evidence suggests that pain treatment responses may differ for women versus men. PMID:19411059

  2. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    NASA Astrophysics Data System (ADS)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  3. Efficient key pathway mining: combining networks and OMICS data.

    PubMed

    Alcaraz, Nicolas; Friedrich, Tobias; Kötzing, Timo; Krohmer, Anton; Müller, Joachim; Pauling, Josch; Baumbach, Jan

    2012-07-01

    Systems biology has emerged over the last decade. Driven by the advances in sophisticated measurement technology the research community generated huge molecular biology data sets. These comprise rather static data on the interplay of biological entities, for instance protein-protein interaction network data, as well as quite dynamic data collected for studying the behavior of individual cells or tissues in accordance with changing environmental conditions, such as DNA microarrays or RNA sequencing. Here we bring the two different data types together in order to gain higher level knowledge. We introduce a significantly improved version of the KeyPathwayMiner software framework. Given a biological network modelled as a graph and a set of expression studies, KeyPathwayMiner efficiently finds and visualizes connected sub-networks where most components are expressed in most cases. It finds all maximal connected sub-networks where all nodes but k exceptions are expressed in all experimental studies but at most l exceptions. We demonstrate the power of the new approach by comparing it to similar approaches with gene expression data previously used to study Huntington's disease. In addition, we demonstrate KeyPathwayMiner's flexibility and applicability to non-array data by analyzing genome-scale DNA methylation profiles from colorectal tumor cancer patients. KeyPathwayMiner release 2 is available as a Cytoscape plugin and online at http://keypathwayminer.mpi-inf.mpg.de.

  4. Experimental and simulation of split semi-torus key in PVC foam core to improve the debonding resistance of composite sandwich panel

    NASA Astrophysics Data System (ADS)

    Juliyana, M.; Santhana Krishnan, R.

    2018-02-01

    The sandwich composite panels consisting of facesheet and core material are used as a primary structural member for aerospace, civil and marine areas due to its high stiffness to weight ratio. But the debonding nature of facesheet from the foam core under shear loading conditions leads to failure of the composite structure. To inhibit the debonding, an innovative methodology of introducing semi-torus key is used in the present study. The polyvinyl chloride foam core(PVC) is grooved and filled with semi-torus shaped chopped strand prepregs which are sandwiched between alternate layers of woven roven(WR) and chopped strand mat(CSM) skins by vacuum infusion process. The sandwich panel manufactured with semi-torus keys is evaluated regarding experimental and numerical simulations under shear loading conditions. The present innovative concept delays the debonding between face-sheet and foam core with enhancement the shear load carrying capability as the initial stiffness is higher than the conventional model. Also, the shear behaviour of the proposed concept is in good agreement with experimental results. The split semi-torus keys sustain the shear failure resulting in resistance to debonding capability.

  5. Communicating Experimental Findings in Single Case Design Research: How to Use Celeration Values and Celeration Multipliers to Measure Direction, Magnitude, and Change of Slope

    ERIC Educational Resources Information Center

    Datchuk, Shawn M.; Kubina, Richard M., Jr.

    2011-01-01

    The accumulation of scientific knowledge greatly depends upon the critical review of experimental findings by ones peers. In single case design research, experimenters present findings with graphical displays of data and narrative description of a visual analysis. To aid in efficient and accurate description of experimental findings, the research…

  6. Decoy-state quantum key distribution with biased basis choice

    PubMed Central

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states. PMID:23948999

  7. Decoy-state quantum key distribution with biased basis choice.

    PubMed

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states.

  8. Key Metabolites and Mechanistic Changes for Salt Tolerance in an Experimentally Evolved Sulfate-Reducing Bacterium, Desulfovibrio vulgaris

    PubMed Central

    Zhou, Aifen; Lau, Rebecca; Baran, Richard; Ma, Jincai; von Netzer, Frederick; Shi, Weiling; Gorman-Lewis, Drew; Kempher, Megan L.; He, Zhili; Qin, Yujia; Shi, Zhou; Zane, Grant M.; Wu, Liyou; Bowen, Benjamin P.; Northen, Trent R.; Hillesland, Kristina L.; Stahl, David A.; Wall, Judy D.; Arkin, Adam P.

    2017-01-01

    ABSTRACT Rapid genetic and phenotypic adaptation of the sulfate-reducing bacterium Desulfovibrio vulgaris Hildenborough to salt stress was observed during experimental evolution. In order to identify key metabolites important for salt tolerance, a clone, ES10-5, which was isolated from population ES10 and allowed to experimentally evolve under salt stress for 5,000 generations, was analyzed and compared to clone ES9-11, which was isolated from population ES9 and had evolved under the same conditions for 1,200 generations. These two clones were chosen because they represented the best-adapted clones among six independently evolved populations. ES10-5 acquired new mutations in genes potentially involved in salt tolerance, in addition to the preexisting mutations and different mutations in the same genes as in ES9-11. Most basal abundance changes of metabolites and phospholipid fatty acids (PLFAs) were lower in ES10-5 than ES9-11, but an increase of glutamate and branched PLFA i17:1ω9c under high-salinity conditions was persistent. ES9-11 had decreased cell motility compared to the ancestor; in contrast, ES10-5 showed higher cell motility under both nonstress and high-salinity conditions. Both genotypes displayed better growth energy efficiencies than the ancestor under nonstress or high-salinity conditions. Consistently, ES10-5 did not display most of the basal transcriptional changes observed in ES9-11, but it showed increased expression of genes involved in glutamate biosynthesis, cation efflux, and energy metabolism under high salinity. These results demonstrated the role of glutamate as a key osmolyte and i17:1ω9c as the major PLFA for salt tolerance in D. vulgaris. The mechanistic changes in evolved genotypes suggested that growth energy efficiency might be a key factor for selection. PMID:29138306

  9. The village/commune safety policy and HIV prevention efforts among key affected populations in Cambodia: finding a balance

    PubMed Central

    2012-01-01

    The Village/Commune Safety Policy was launched by the Ministry of Interior of the Kingdom of Cambodia in 2010 and, due to a priority focus on “cleaning the streets”, has created difficulties for HIV prevention programs attempting to implement programs that work with key affected populations including female sex workers and people who inject drugs. The implementation of the policy has forced HIV program implementers, the UN and various government counterparts to explore and develop collaborative ways of delivering HIV prevention services within this difficult environment. The following case study explores some of these efforts and highlights the promising development of a Police Community Partnership Initiative that it is hoped will find a meaningful balance between the Village/Commune Safety Policy and HIV prevention efforts with key affected populations in Cambodia. PMID:22770267

  10. Key Frame Extraction in the Summary Space.

    PubMed

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  11. Direct and full-scale experimental verifications towards ground-satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jian-Yu; Yang, Bin; Liao, Sheng-Kai; Zhang, Liang; Shen, Qi; Hu, Xiao-Fang; Wu, Jin-Cai; Yang, Shi-Ji; Jiang, Hao; Tang, Yan-Lin; Zhong, Bo; Liang, Hao; Liu, Wei-Yue; Hu, Yi-Hua; Huang, Yong-Mei; Qi, Bo; Ren, Ji-Gang; Pan, Ge-Sheng; Yin, Juan; Jia, Jian-Jun; Chen, Yu-Ao; Chen, Kai; Peng, Cheng-Zhi; Pan, Jian-Wei

    2013-05-01

    Quantum key distribution (QKD) provides the only intrinsically unconditional secure method for communication based on the principle of quantum mechanics. Compared with fibre-based demonstrations, free-space links could provide the most appealing solution for communication over much larger distances. Despite significant efforts, all realizations to date rely on stationary sites. Experimental verifications are therefore extremely crucial for applications to a typical low Earth orbit satellite. To achieve direct and full-scale verifications of our set-up, we have carried out three independent experiments with a decoy-state QKD system, and overcome all conditions. The system is operated on a moving platform (using a turntable), on a floating platform (using a hot-air balloon), and with a high-loss channel to demonstrate performances under conditions of rapid motion, attitude change, vibration, random movement of satellites, and a high-loss regime. The experiments address wide ranges of all leading parameters relevant to low Earth orbit satellites. Our results pave the way towards ground-satellite QKD and a global quantum communication network.

  12. Mast cells play a key role in neutrophil recruitment in experimental bullous pemphigoid

    PubMed Central

    Chen, Ruoyan; Ning, Gang; Zhao, Ming-Lang; Fleming, Matthew G.; Diaz, Luis A.; Werb, Zena; Liu, Zhi

    2001-01-01

    Bullous pemphigoid (BP) is an inflammatory subepidermal blistering disease associated with an IgG autoimmune response to the hemidesmosomal protein BP180. Passive transfer of antibodies to the murine BP180 (mBP180) ectodomain triggers a blistering skin disease in mice that depends on complement activation and neutrophil infiltration and closely mimics human BP. In the present study, we show that mast cells (MCs) play a crucial role in experimental BP. Wild-type mice injected intradermally with pathogenic anti-mBP180 IgG exhibited extensive MC degranulation in skin, which preceded neutrophil infiltration and subsequent subepidermal blistering. In contrast, mice genetically deficient in MCs or MC-sufficient mice pretreated with an inhibitor of MC degranulation failed to develop BP. Further, MC-deficient mice reconstituted in skin with MCs became susceptible to experimental BP. Despite the activation of complement to yield C3a and C5a, in the absence of MCs, accumulation of neutrophils at the injection site was blunted. The lack of response due to MC deficiency was overcome by intradermal administration of a neutrophil chemoattractant, IL-8, or by reconstitution of the injection sites with neutrophils. These findings provide the first direct evidence to our knowledge that MCs play an essential role in neutrophil recruitment during subepidermal blister formation in experimental BP. PMID:11602622

  13. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    NASA Astrophysics Data System (ADS)

    Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu

    2018-04-01

    In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.

  14. Luquillo Experimental Forest: Research History and Opportunities

    Treesearch

    Nancy L. Harris; Ariel E. Lugo; Sandra Brown; Tamara Heartsill-Scalley

    2012-01-01

    The goals of this Luquillo Experimental Forest: Research History and Opportunities are to synthesize the new research that has emerged from the LEF since the publication of Brown et al. (1983) into a concise summary of key research findings and to highlight opportunities for future research that will contribute to a greater understanding of the structure and function...

  15. Experimental study on discretely modulated continuous-variable quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen Yong; Zou Hongxin; Chen Pingxing

    2010-08-15

    We present a discretely modulated continuous-variable quantum key distribution system in free space by using strong coherent states. The amplitude noise in the laser source is suppressed to the shot-noise limit by using a mode cleaner combined with a frequency shift technique. Also, it is proven that the phase noise in the source has no impact on the final secret key rate. In order to increase the encoding rate, we use broadband homodyne detectors and the no-switching protocol. In a realistic model, we establish a secret key rate of 46.8 kbits/s against collective attacks at an encoding rate of 10more » MHz for a 90% channel loss when the modulation variance is optimal.« less

  16. Florida Nurse Leader Survey Findings: Key Leadership Competencies, Barriers to Leadership, and Succession Planning Needs.

    PubMed

    Denker, Ann-Lynn; Sherman, Rose O; Hutton-Woodland, Michael; Brunell, Mary Lou; Medina, Pamela

    2015-01-01

    This study examined barriers to nursing leadership and succession planning needs for nurse leaders in Florida. The Florida Action Coalition responded to the call to prepare and enable nurses to lead change to advance health, through a grant supported by the Robert Wood Johnson Foundation and Florida Blue Foundation. This is a nurse leader subset of a 56-item statewide survey of actively licensed RNs and advanced RN practitioners in Florida conducted via a cross-sectional, exploratory descriptive research design. Key findings included a description of leadership competencies, barriers, and succession planning practices. Florida nurse leaders are aging and less diverse than the general population and report limited utilization of succession planning by their organizations. In Florida, attention must be directed to resources and strategies to develop skilled nurse leaders and plan succession.

  17. Giant-Magnetoresistance(GMR) Siegel KEY FIRST Experimental Discovery Decade-Earlier PRE-``Fert"-``Gruenberg" in Nuc"el"ar ``Super"alloys: Science?;``SEANCE!!!; Ethics?; SHMETHICS!!!

    NASA Astrophysics Data System (ADS)

    Hoffman, R.; Siegel, E.

    2010-03-01

    (So MIScalled) ``Fert"-``Grunberg"[PRL(1988;1989)] GMR 2007 physics Nobel/Wolf/Japan-Prizes VS. decade-earlier(1973-1977) KEY FIRST Siegel at:Westin"kl"ouse/PSEG/IAEA/ABB[google:``Martin Ebner"(94-04) in financial media]/Vattenfall/Wallenbergs/nuc"el"ar-DoE Labs[at flickr.com, search on ``Giant- Magnotoresistance''; find: Intl.Conf.Mag.Alloys & Oxides(ICMAO), Haifa(Aug./1977); J.Mag.Mag.Mtls,(JMMM)7,312(1978)``unavailable: not yet scanned''/modified(last R(H) GMR Figs(7;8) deleted!!!) on JMMM/Reed-Elsevier website until 7/29/08 conveniently one- half-year after last (Nobel)award(12/2007); conveniently effectively deleted!!!; google: ``If Leaks Could Kill''; many APS/MRS Mtgs(1970s)<<<1988/1989] decade-earlier GMR: (1978)<<< (1988); 1988-1978 =10 years = one full decadeprecedence!!!] first experimental discovery in (so MIScalled) ``super''alloys [182/82, Hastelloy-X, 600, 690(!!!), Stainless-Steels: ANY/ALL!!!] generic endemic Wigner's[JAP,17,857(1946)]- disease/Ostwald-ripening/spinodal-decomposition/overageing- embrittlement/ thermo-mechanical-INstability!

  18. Non-resonant electromagnetic energy harvester for car-key applications

    NASA Astrophysics Data System (ADS)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  19. Ensuring Biologics Advanced Development and Manufacturing Capability for the United States Government: A Summary of Key Findings and Conclusions

    DTIC Science & Technology

    2009-10-06

    Government: A Summary of Key Findings and Conclusions. This report has passed the Department of Defense’s security review process and is approved for...manufacturing and combine advance development and production of biologics in a multi-product facility focused on satisfying USG needs. Finally, the study...MCM needs of both DoD and HHS, an extensive survey was conducted. This included a review of all published requirements, the biodefense R&D portfolio

  20. The Portevin–Le Chatelier effect: a review of experimental findings

    PubMed Central

    Yilmaz, Ahmet

    2011-01-01

    The Portevin–Le Chatelier (PLC) effect manifests itself as an unstable plastic flow during tensile tests of some dilute alloys under certain regimes of strain rate and temperature. The plastic strain becomes localized in the form of bands which move along a specimen gauge in various ways as the PLC effect occurs. Because the localization of strain causes degradation of the inherent structural properties and surface quality of materials, understanding the effect is crucial for the effective use of alloys. The characteristic behaviors of localized strain bands and techniques commonly used to study the PLC effect are summarized in this review. A brief overview of experimental findings, the effect of material properties and test parameters on the PLC effect, and some discussion on the mechanisms of the effect are included. Tests for predicting the early failure of structural materials due to embrittlement induced by the PLC effect are also discussed. PMID:27877450

  1. Finding the keys to successful adult-targeted advertisements on obesity prevention: an experimental audience testing study.

    PubMed

    Dixon, Helen; Scully, Maree; Durkin, Sarah; Brennan, Emily; Cotter, Trish; Maloney, Sarah; O'Hara, Blythe J; Wakefield, Melanie

    2015-08-20

    Mass media communications are an important component of comprehensive interventions to address population levels of overweight and obesity, yet we have little understanding of the effective characteristics of specific advertisements (ads) on this topic. This study aimed to quantitatively test audience reactions to existing adult-focused public health television ads addressing overweight and obesity to determine which ads have the highest levels of message acceptance, argument strength, personalised perceived effectiveness and negative emotional impact. 1116 Australian adults aged 21-55 years recruited from a national online panel participated in this web-based study. Quotas were applied to achieve even numbers of males and females, those aged 21-29 years and 30-55 years, and those with a healthy weight (BMI = 18.5-24.9) and overweight/obesity (BMI = 25+). Participants were randomly assigned to view and rate four of eight ads that varied in terms of message content (health consequences, supportive/encouraging or social norms/acceptability) and execution style (graphic, simulation/animation, positive or negative testimonial, or depicted scene). Toxic fat (a graphic, health consequences ad) was the top performing ad on all four outcome measures and was significantly more likely than the other ads tested to promote strong responses in terms of message acceptance, argument strength and negative emotional impact. Measure up (a negative testimonial, health consequences ad) performed comparably on personalised perceived effectiveness. Most ads produced stronger perceptions of personalised perceived effectiveness among participants with overweight/obesity compared to participants with healthy weight. Some ads were more likely to promote strong negative emotions among participants with overweight/obesity. Findings provide preliminary evidence of the most promising content and executional styles of ads that could be pursued as part of obesity prevention campaigns. Ads

  2. Male mental health problems, psychopathy, and personality traits: key findings from the first 14 years of the Pittsburgh Youth Study.

    PubMed

    Loeber, R; Farrington, D P; Stouthamer-Loeber, M; Moffitt, T E; Caspi, A; Lynam, D

    2001-12-01

    This paper reviews key findings on juvenile mental health problems in boys, psychopathy, and personality traits, obtained in the first 14 years of studies using data from the Pittsburgh Youth Study. This is a study of 3 samples, each of about 500 boys initially randomly drawn from boys in the 1st, 4th, and 7th grades of public schools in Pittsburgh. The boys have been followed regularly, initially each half year, and later at yearly intervals. Currently, the oldest boys are about 25 years old, whereas the youngest boys are about 19. Findings are presented on the prevalence and interrelation of disruptive behaviors, ADHD, and depressed mood. Results concerning risk factors for these outcomes are reviewed. Psychological factors such as psychopathy, impulsivity, and personality are described. The paper closes with findings on service delivery of boys with mental health problems.

  3. Experimental Study and Computational Simulations of Key Pebble Bed Thermo-mechanics Issues for Design and Safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tokuhiro, Akira; Potirniche, Gabriel; Cogliati, Joshua

    2014-07-08

    An experimental and computational study, consisting of modeling and simulation (M&S), of key thermal-mechanical issues affecting the design and safety of pebble-bed (PB) reactors was conducted. The objective was to broaden understanding and experimentally validate thermal-mechanic phenomena of nuclear grade graphite, specifically, spheres in frictional contact as anticipated in the bed under reactor relevant pressures and temperatures. The contact generates graphite dust particulates that can subsequently be transported into the flowing gaseous coolent. Under postulated depressurization transients and with the potential for leaked fission products to be adsorbed onto graphite 'dust', there is the potential for fission products to escapemore » from the primary volume. This is a design safety concern. Furthermore, earlier safety assessment identified the distinct possibility for the dispersed dust to combust in contact with air if sufficient conditions are met. Both of these phenomena were noted as important to design review and containing uncertainty to warrant study. The team designed and conducted two separate effects tests to study and benchmark the potential dust-generation rate, as well as study the conditions under which a dust explosion may occure in a standardized, instrumented explosion chamber.« less

  4. A natural language processing program effectively extracts key pathologic findings from radical prostatectomy reports.

    PubMed

    Kim, Brian J; Merchant, Madhur; Zheng, Chengyi; Thomas, Anil A; Contreras, Richard; Jacobsen, Steven J; Chien, Gary W

    2014-12-01

    Natural language processing (NLP) software programs have been widely developed to transform complex free text into simplified organized data. Potential applications in the field of medicine include automated report summaries, physician alerts, patient repositories, electronic medical record (EMR) billing, and quality metric reports. Despite these prospects and the recent widespread adoption of EMR, NLP has been relatively underutilized. The objective of this study was to evaluate the performance of an internally developed NLP program in extracting select pathologic findings from radical prostatectomy specimen reports in the EMR. An NLP program was generated by a software engineer to extract key variables from prostatectomy reports in the EMR within our healthcare system, which included the TNM stage, Gleason grade, presence of a tertiary Gleason pattern, histologic subtype, size of dominant tumor nodule, seminal vesicle invasion (SVI), perineural invasion (PNI), angiolymphatic invasion (ALI), extracapsular extension (ECE), and surgical margin status (SMS). The program was validated by comparing NLP results to a gold standard compiled by two blinded manual reviewers for 100 random pathology reports. NLP demonstrated 100% accuracy for identifying the Gleason grade, presence of a tertiary Gleason pattern, SVI, ALI, and ECE. It also demonstrated near-perfect accuracy for extracting histologic subtype (99.0%), PNI (98.9%), TNM stage (98.0%), SMS (97.0%), and dominant tumor size (95.7%). The overall accuracy of NLP was 98.7%. NLP generated a result in <1 second, whereas the manual reviewers averaged 3.2 minutes per report. This novel program demonstrated high accuracy and efficiency identifying key pathologic details from the prostatectomy report within an EMR system. NLP has the potential to assist urologists by summarizing and highlighting relevant information from verbose pathology reports. It may also facilitate future urologic research through the rapid and

  5. Third National Even Start Evaluation: Follow-Up Findings from the Experimental Design Study. NCEE 2005-3002

    ERIC Educational Resources Information Center

    Ricciuti, Anne E., St.Pierre, Robert G.; Lee, Wang; Parsad, Amanda

    2004-01-01

    Citation: Ricciuti, A.E., R.G. St.Pierre, W. Lee, A. Parsad & T. Rimdzius. Third National Even Start Evaluation: Follow-Up Findings From the Experimental Design Study. U.S. Department of Education, Institute of Education Sciences, National Center for Education Evaluation and Regional Assistance. Washington, D.C., 2004. Background: The Even…

  6. Securing quantum key distribution systems using fewer states

    NASA Astrophysics Data System (ADS)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  7. Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-01

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  8. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

    PubMed

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-16

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  9. Oregon Public School Drug Use Survey, 1996: Key Findings Report.

    ERIC Educational Resources Information Center

    Finigan, Michael

    Alcohol, tobacco, and other drug use among public school students continues to be a major concern in Oregon as it is across the nation. This report, the sixth of the biannual public school drug use surveys conducted in Oregon since 1986, discusses major findings. These findings are (1) marijuana use is up for both the eighth and eleventh grades;…

  10. Experimental Actinobacillus pleuropneumoniae challenge in swine: Comparison of computed tomographic and radiographic findings during disease

    PubMed Central

    2012-01-01

    Background In pigs, diseases of the respiratory tract like pleuropneumonia due to Actinobacillus pleuropneumoniae (App) infection have led to high economic losses for decades. Further research on disease pathogenesis, pathogen-host-interactions and new prophylactic and therapeutic approaches are needed. In most studies, a large number of experimental animals are required to assess lung alterations at different stages of the disease. In order to reduce the required number of animals but nevertheless gather information on the nature and extent of lung alterations in living pigs, a computed tomographic scoring system for quantifying gross pathological findings was developed. In this study, five healthy pigs served as control animals while 24 pigs were infected with App, the causative agent of pleuropneumonia in pigs, in an established model for respiratory tract disease. Results Computed tomographic (CT) findings during the course of App challenge were verified by radiological imaging, clinical, serological, gross pathology and histological examinations. Findings from clinical examinations and both CT and radiological imaging, were recorded on day 7 and day 21 after challenge. Clinical signs after experimental App challenge were indicative of acute to chronic disease. Lung CT findings of infected pigs comprised ground-glass opacities and consolidation. On day 7 and 21 the clinical scores significantly correlated with the scores of both imaging techniques. At day 21, significant correlations were found between clinical scores, CT scores and lung lesion scores. In 19 out of 22 challenged pigs the determined disease grades (not affected, slightly affected, moderately affected, severely affected) from CT and gross pathological examination were in accordance. Disease classification by radiography and gross pathology agreed in 11 out of 24 pigs. Conclusions High-resolution, high-contrast CT examination with no overlapping of organs is superior to radiography in the

  11. Porphyromonas gingivalis Peptidylarginine Deiminase, a Key Contributor in the Pathogenesis of Experimental Periodontal Disease and Experimental Arthritis

    PubMed Central

    Gully, Neville; Bright, Richard; Marino, Victor; Marchant, Ceilidh; Cantley, Melissa; Haynes, David; Butler, Catherine; Dashper, Stuart; Reynolds, Eric; Bartold, Mark

    2014-01-01

    Objectives To investigate the suggested role of Porphyromonas gingivalis peptidylarginine deiminase (PAD) in the relationship between the aetiology of periodontal disease and experimentally induced arthritis and the possible association between these two conditions. Methods A genetically modified PAD-deficient strain of P. gingivalis W50 was produced. The effect of this strain, compared to the wild type, in an established murine model for experimental periodontitis and experimental arthritis was assessed. Experimental periodontitis was induced following oral inoculation with the PAD-deficient and wild type strains of P. gingivalis. Experimental arthritis was induced via the collagen antibody induction process and was monitored by assessment of paw swelling and micro-CT analysis of the radio-carpal joints. Experimental periodontitis was monitored by micro CT scans of the mandible and histological assessment of the periodontal tissues around the mandibular molars. Serum levels of anti-citrullinated protein antibodies (ACPA) and P. gingivalis were assessed by ELISA. Results The development of experimental periodontitis was significantly reduced in the presence of the PAD-deficient P. gingivalis strain. When experimental arthritis was induced in the presence of the PAD-deficient strain there was less paw swelling, less erosive bone damage to the joints and reduced serum ACPA levels when compared to the wild type P. gingivalis inoculated group. Conclusion This study has demonstrated that a PAD-deficient strain of P. gingivalis was associated with significantly reduced periodontal inflammation. In addition the extent of experimental arthritis was significantly reduced in animals exposed to prior induction of periodontal disease through oral inoculation of the PAD-deficient strain versus the wild type. This adds further evidence to the potential role for P. gingivalis and its PAD in the pathogenesis of periodontitis and exacerbation of arthritis. Further studies are now

  12. Continuous-variable quantum key distribution with 1 Mbps secure key rate.

    PubMed

    Huang, Duan; Lin, Dakai; Wang, Chao; Liu, Weiqi; Fang, Shuanghong; Peng, Jinye; Huang, Peng; Zeng, Guihua

    2015-06-29

    We report the first continuous-variable quantum key distribution (CVQKD) experiment to enable the creation of 1 Mbps secure key rate over 25 km standard telecom fiber in a coarse wavelength division multiplexers (CWDM) environment. The result is achieved with two major technological advances: the use of a 1 GHz shot-noise-limited homodyne detector and the implementation of a 50 MHz clock system. The excess noise due to noise photons from local oscillator and classical data channels in CWDM is controlled effectively. We note that the experimental verification of high-bit-rate CVQKD in the multiplexing environment is a significant step closer toward large-scale deployment in fiber networks.

  13. The National Television Violence Study: Key Findings and Recommendations.

    ERIC Educational Resources Information Center

    Young Children, 1996

    1996-01-01

    Summarizes findings of the Television Violence Study indicating that the context of much television violence is dangerous to viewers, perpetrators go unpunished in the majority of programs, negative consequences of violence are often ignored, guns feature prominently, and presentation of violence differs greatly across networks and across…

  14. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  15. Recent Trends in General Education Design, Learning Outcomes, and Teaching Approaches. Key Findings from a Survey among Administrators at AAC&U Member Institutions

    ERIC Educational Resources Information Center

    Association of American Colleges and Universities, 2016

    2016-01-01

    This report summarizes key findings from a national survey among chief academic officers at Association of American Colleges and Universities (AAC&U) member institutions and explores how institutions are defining common learning outcomes, trends related to general education design and the use of emerging, evidence-based teach­ing and learning…

  16. Experimental measurement-device-independent quantum key distribution with uncharacterized encoding.

    PubMed

    Wang, Chao; Wang, Shuang; Yin, Zhen-Qiang; Chen, Wei; Li, Hong-Wei; Zhang, Chun-Mei; Ding, Yu-Yang; Guo, Guang-Can; Han, Zheng-Fu

    2016-12-01

    Measurement-device-independent quantum key distribution (MDI QKD) is an efficient way to share secrets using untrusted measurement devices. However, the assumption on the characterizations of encoding states is still necessary in this promising protocol, which may lead to unnecessary complexity and potential loopholes in realistic implementations. Here, by using the mismatched-basis statistics, we present the first proof-of-principle experiment of MDI QKD with uncharacterized encoding sources. In this demonstration, the encoded states are only required to be constrained in a two-dimensional Hilbert space, and two distant parties (Alice and Bob) are resistant to state preparation flaws even if they have no idea about the detailed information of their encoding states. The positive final secure key rates of our system exhibit the feasibility of this novel protocol, and demonstrate its value for the application of secure communication with uncharacterized devices.

  17. Development of an Agent-Based Model (ABM) to Simulate the Immune System and Integration of a Regression Method to Estimate the Key ABM Parameters by Fitting the Experimental Data

    PubMed Central

    Tong, Xuming; Chen, Jinghang; Miao, Hongyu; Li, Tingting; Zhang, Le

    2015-01-01

    Agent-based models (ABM) and differential equations (DE) are two commonly used methods for immune system simulation. However, it is difficult for ABM to estimate key parameters of the model by incorporating experimental data, whereas the differential equation model is incapable of describing the complicated immune system in detail. To overcome these problems, we developed an integrated ABM regression model (IABMR). It can combine the advantages of ABM and DE by employing ABM to mimic the multi-scale immune system with various phenotypes and types of cells as well as using the input and output of ABM to build up the Loess regression for key parameter estimation. Next, we employed the greedy algorithm to estimate the key parameters of the ABM with respect to the same experimental data set and used ABM to describe a 3D immune system similar to previous studies that employed the DE model. These results indicate that IABMR not only has the potential to simulate the immune system at various scales, phenotypes and cell types, but can also accurately infer the key parameters like DE model. Therefore, this study innovatively developed a complex system development mechanism that could simulate the complicated immune system in detail like ABM and validate the reliability and efficiency of model like DE by fitting the experimental data. PMID:26535589

  18. Human health effects of dichloromethane: key findings and scientific issues.

    PubMed

    Schlosser, Paul M; Bale, Ambuja S; Gibbons, Catherine F; Wilkins, Amina; Cooper, Glinda S

    2015-02-01

    The U.S. EPA's Integrated Risk Information System (IRIS) completed an updated toxicological review of dichloromethane in November 2011. In this commentary we summarize key results and issues of this review, including exposure sources, identification of potential health effects, and updated physiologically based pharmacokinetic (PBPK) modeling. We performed a comprehensive review of primary research studies and evaluation of PBPK models. Hepatotoxicity was observed in oral and inhalation exposure studies in several studies in animals; neurological effects were also identified as a potential area of concern. Dichloromethane was classified as likely to be carcinogenic in humans based primarily on evidence of carcinogenicity at two sites (liver and lung) in male and female B6C3F1 mice (inhalation exposure) and at one site (liver) in male B6C3F1 mice (drinking-water exposure). Recent epidemiologic studies of dichloromethane (seven studies of hematopoietic cancers published since 2000) provide additional data raising concerns about associations with non-Hodgkin lymphoma and multiple myeloma. Although there are gaps in the database for dichloromethane genotoxicity (i.e., DNA adduct formation and gene mutations in target tissues in vivo), the positive DNA damage assays correlated with tissue and/or species availability of functional glutathione S-transferase (GST) metabolic activity, the key activation pathway for dichloromethane-induced cancer. Innovations in the IRIS assessment include estimation of cancer risk specifically for a presumed sensitive genotype (GST-theta-1+/+), and PBPK modeling accounting for human physiological distributions based on the expected distribution for all individuals 6 months to 80 years of age. The 2011 IRIS assessment of dichloromethane provides insights into the toxicity of a commonly used solvent.

  19. A Range Finding Protocol to Support Design for Transcriptomics Experimentation: Examples of In-Vitro and In-Vivo Murine UV Exposure

    PubMed Central

    van Oostrom, Conny T.; Jonker, Martijs J.; de Jong, Mark; Dekker, Rob J.; Rauwerda, Han; Ensink, Wim A.; de Vries, Annemieke; Breit, Timo M.

    2014-01-01

    In transcriptomics research, design for experimentation by carefully considering biological, technological, practical and statistical aspects is very important, because the experimental design space is essentially limitless. Usually, the ranges of variable biological parameters of the design space are based on common practices and in turn on phenotypic endpoints. However, specific sub-cellular processes might only be partially reflected by phenotypic endpoints or outside the associated parameter range. Here, we provide a generic protocol for range finding in design for transcriptomics experimentation based on small-scale gene-expression experiments to help in the search for the right location in the design space by analyzing the activity of already known genes of relevant molecular mechanisms. Two examples illustrate the applicability: in-vitro UV-C exposure of mouse embryonic fibroblasts and in-vivo UV-B exposure of mouse skin. Our pragmatic approach is based on: framing a specific biological question and associated gene-set, performing a wide-ranged experiment without replication, eliminating potentially non-relevant genes, and determining the experimental ‘sweet spot’ by gene-set enrichment plus dose-response correlation analysis. Examination of many cellular processes that are related to UV response, such as DNA repair and cell-cycle arrest, revealed that basically each cellular (sub-) process is active at its own specific spot(s) in the experimental design space. Hence, the use of range finding, based on an affordable protocol like this, enables researchers to conveniently identify the ‘sweet spot’ for their cellular process of interest in an experimental design space and might have far-reaching implications for experimental standardization. PMID:24823911

  20. Do Disadvantaged Students Get Less Effective Teaching? Key Findings from Recent Institute of Education Sciences Studies. NCEE Evaluation Brief. Technical Appendix. NCEE 2014-4010

    ERIC Educational Resources Information Center

    Max, Jeffrey; Glazerman, Steven

    2014-01-01

    This document represents the technical appendix intended to accompany "Do Disadvantaged Students Get Less Effective Teaching? Key Findings from Recent Institute of Education Sciences Studies. NCEE Evaluation Brief. NCEE 2014-4010." Contents include: (1) Summary of Related, Non-Peer-Reviewed Studies; (2) Methods for Comparing Findings…

  1. Experimental Infections with Mycoplasma agalactiae Identify Key Factors Involved in Host-Colonization

    PubMed Central

    Baranowski, Eric; Bergonier, Dominique; Sagné, Eveline; Hygonenq, Marie-Claude; Ronsin, Patricia; Berthelot, Xavier; Citti, Christine

    2014-01-01

    Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i) the development of a specific antibody response and (ii) dynamic changes in expression of M. agalactiae surface variable proteins (Vpma), with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs. PMID:24699671

  2. Continuous variable quantum key distribution with modulated entangled states.

    PubMed

    Madsen, Lars S; Usenko, Vladyslav C; Lassen, Mikael; Filip, Radim; Andersen, Ulrik L

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising avenue for extending the distance for which secure communication is possible.

  3. Mars’ First Billion Years: Key Findings, Key Unsolved Paradoxes, and Future Exploration

    NASA Astrophysics Data System (ADS)

    Ehlmann, Bethany

    2017-10-01

    In the evolution of terrestrial planets, the first billion years are the period most shrouded in mystery: How vigorous is early atmospheric loss? How do planetary climates respond to a brightening sun? When and how are plate tectonic recycling processes initiated? How do voluminous volcanism and heavy impact bombardment influence the composition of the atmosphere? Under what conditions might life arise? Looking outward to terrestrial planets around other stars, the record from Venus, Earth and Mars in this solar system is crucial for developing models of physical can chemical processes. Of these three worlds, Mars provides the longest record of planetary evolution from the first billion years, comprising >50% of exposed geologic units, which are only lightly overprinted by later processes.Orbital observations of the last decade have revealed abundant evidence for surface waters in the form of lakes, valley networks, and evidence of chemically open-system near-surface weathering. Groundwaters at temperatures ranging from just above freezing to hydrothermal have also left a rich record of process in the mineralogical record. A rsuite of environments - similar in diversity to Earth’s - has been discovered on Mars with water pH, temperature, redox, and chemistries varying in space and time.Here, I will focus on the consequences of the aqueous alteration of the Martian crust on the composition of the atmosphere based on recent work studying aspects of the volatile budget (Usui et al., 2015; Edwards & Ehlmann, 2015; Hu et al., 2015; Jakosky et al., 2017, Wordsworth et al., 2017, and Ehlmann, in prep.). The solid crust and mantle of Mars act as volatile reservoirs and volatile sources through volcanism, mineral precipitation, and release of gases. We examine the extent to which the budget is understood or ill-understood for hydrogen and carbon, and associated phases H2O, CO2, and CH4. Additionally, I identify some key stratigraphies where a combination of focused in

  4. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  5. Title I ESEA Projects: Digest of Annual Evaluations. Supplementary Edition 1977-1978. A historical summary, by the Department of Federal Evaluation Resources, of the key findings reported in the annual evaluations of each project. Report #7827.

    ERIC Educational Resources Information Center

    Philadelphia School District, PA. Office of Research and Evaluation.

    This supplement provides a historical summary, for the Philadelphia, Pennsylvania schools, of the key findings in the Annual Evaluations of each Elementary Secondary Education Act Title I project since 1975. The 1977-1978 management information, the key findings for 1975-1976 and 1976-1977, as well as the preliminary findings for 1977-1978 are…

  6. The influence of sociocultural factors on organ donation and transplantation in Korea: findings from key informant interviews.

    PubMed

    Kim, Jung Ran; Elliott, Doug; Hyde, Cheryl

    2004-04-01

    Although brain death was formally recognized in Korea in 2000 for the purpose of organ donation, traditional Confucian-based thought still prevails. The aim of this study was to explore sociocultural perspectives that influence health professionals' attitudes and perceptions regarding organ donation. Semistructured interviews were conducted with nine key informants from three major hospitals providing transplant services in South Korea. Several themes were identified as barriers to organ donation: Confucianism, misunderstandings and myths, organs as spare for selling, lack of clarity in the definition of death in the new legislation, and limited medical insurance coverage. It remains difficult for brain death to be accepted as true death, and there is currently a poor rate of organ procurement. Findings of the study will help identify socioculturally appropriate strategies to promote acceptance and accessibility of organ transplantation among South Koreans.

  7. Improving pathways to primary health care among LGBTQ populations and health care providers: key findings from Nova Scotia, Canada.

    PubMed

    Gahagan, Jacqueline; Subirana-Malaret, Montse

    2018-06-13

    This study explores the perceived barriers to primary health care as identified among a sample of Lesbian, Gay, Bisexual, Transgender, and Queer (LGBTQ) identified individuals and health care providers in Nova Scotia, Canada. These findings, based on a province-wide anonymous online survey, suggest that additional efforts are needed to improve pathways to primary health among LGBTQ populations and in deepening our understanding of how to advance the unique primary health needs of these populations. Data were collected from the LGBTQ community through an online, closed-ended anonymous survey. Inclusion criteria for participation were self-identifying as LGBTQ, offering primary health care to LGBTQ patients, being able to understand English, being 16 years of age or older, and having lived in Nova Scotia for at least one year. A total of 283 LGBTQ respondents completed the online survey which included sociodemographic questions, perceptions of respondents' health status, and their primary health care experiences. In addition, a total of 109 health care providers completed the survey based on their experiences providing care in Nova Scotia, and in particular, their experiences and perceptions regarding LGBTQ access to primary health care and physician-patient interactions. Our results indicate that, in several key areas, the primary health care needs of LGBTQ populations in Nova Scotia are not being met and this may in turn contribute to their poor health outcomes across the life course. A framework of intersectionality and health equity was used to interpret and analyze the survey data. The key findings indicate the need to continue improving pathways to primary health care among LGBTQ populations, specifically in relation to additional training and related supports for health care providers who work with these populations.

  8. Experimental investigation of polarization insensitivity and cascadability with semiconductor optical amplifier-based differential phase-shift keyed wavelength converter

    NASA Astrophysics Data System (ADS)

    Mao, Yaya; Wu, Chongqing; Liu, Bo; Ullah, Rahat; Tian, Feng

    2017-12-01

    We experimentally investigate the polarization insensitivity and cascadability of an all-optical wavelength converter for differential phase-shift keyed (DPSK) signals for the first time. The proposed wavelength converter is composed of a one-bit delay interferometer demodulation stage followed by a single semiconductor optical amplifier. The impact of input DPSK signal polarization fluctuation on receiver sensitivity for the converted signal is carried out. It is found that this scheme is almost insensitive to the state of polarization of the input DPSK signal. Furthermore, the cascadability of the converter is demonstrated in a two-path recirculating loop. Error-free transmission is achieved with 20 stage cascaded wavelength conversions over 2800 km, where the power penalty is <3.4 dB at bit error rate of 10-9.

  9. Key Findings and Recommendations from the Coös Youth Study: Research from the First Half of the Study. Regional Issue Brief Number 41

    ERIC Educational Resources Information Center

    Staunton, Michael S.; Jaffee, Eleanor M.

    2014-01-01

    In this brief, authors Michael Staunton and Eleanor Jaffee review the key findings and recommendations from research conducted in the first half of the Coös Youth Study, which began in 2008 and is planned to continue through 2018. The study explores young people's decisions about their educational and job opportunities in rural northern New…

  10. Cognitive and affective determinants of generic drug acceptance and use: cross-sectional and experimental findings

    PubMed Central

    Dohle, Simone; Siegrist, Michael

    2013-01-01

    An increase in generic substitution could be a viable approach to reduce global healthcare expenditures. In many countries, however, generic drug use is rather low. This study examines cognitive predictors (knowledge and beliefs) and affective predictors (general affect and sacred values) to explain generic drug acceptance and use. Data for the study come from a random postal survey conducted in Switzerland (N = 668). A detailed knowledge scale about generic drugs was developed. In addition, an experimental choice task was constructed in which respondents chose between branded and generic drugs. Generic drug acceptance as well as drug choices were influenced by knowledge, beliefs, and affect. It was also found that generic substitution is chosen less frequently for a more severe illness. Key insights could be used for developing information material or interventions aimed at increasing the substitution of generic drugs in order to make health care more affordable. PMID:25632372

  11. Key Skills Influencing Student Achievement

    ERIC Educational Resources Information Center

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  12. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  13. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  14. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  15. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  16. Longitudinal evaluation of immunohistochemical findings of milk aspiration: an experimental study using a murine model.

    PubMed

    Nagai, Tomonori; Aoyagi, Miwako; Ochiai, Eriko; Sakai, Kentaro; Maruyama-Maebashi, Kyoko; Fukui, Kenji; Iwadate, Kimiharu

    2011-06-15

    To examine the longitudinal change of pathological findings of the lung and other organs in milk aspiration, an experimental study using a murine model was carried out. Either 0.5 or 1.0 ml cow's milk was instilled into the trachea of rats. From immediately after to 14 days after instillation, the animals were sacrificed, and the lungs, liver, kidneys, and spleen were removed. The results of immunostaining with anti-human α lactalbumin antibody indicated that not only the lung but also the kidney and spleen showed a positive reaction against the antibody over time. Experimentally aspirated milk was detectable in alveoli until 2 days after instillation. It was also detectable in renal tubules from 1 to 6h after instillation. Macrophages containing granules of aspirated milk were observed in splenic red pulp from 3h to 14 days after instillation. Detection of aspirated milk in other organs except the lung would be clear evidence of intravital milk aspiration and would suggest previous or recurrent milk aspiration. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  17. Space division multiplexing chip-to-chip quantum key distribution.

    PubMed

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2017-09-29

    Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.

  18. Practical issues in quantum-key-distribution postprocessing

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.

    2010-01-01

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  19. Numerical approach for unstructured quantum key distribution

    PubMed Central

    Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert

    2016-01-01

    Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown. PMID:27198739

  20. Ecological restoration experiments (1992-2007) at the G. A. Pearson Natural Area, Fort Valley Experimental Forest

    Treesearch

    Margaret M. Moore; W. Wallace Covington; Peter Z. Fule; Stephen C. Hart; Thomas E. Kolb; Joy N. Mast; Stephen S. Sackett; Michael R. Wagner

    2008-01-01

    In 1992 an experiment was initiated at the G. A. Pearson Natural Area on the Fort Valley Experimental Forest to evaluate long-term ecosystem responses to two restoration treatments: thinning only and thinning with prescribed burning. Fifteen years of key findings about tree physiology, herbaceous, and ecosystem responses are presented.

  1. Temporal dynamics and the identification of musical key.

    PubMed

    Farbood, Morwaread Mary; Marcus, Gary; Poeppel, David

    2013-08-01

    A central process in music cognition involves the identification of key; however, little is known about how listeners accomplish this task in real time. This study derives from work that suggests overlap between the neural and cognitive resources underlying the analyses of both music and speech and is the first, to our knowledge, to explore the timescales at which the brain infers musical key. We investigated the temporal psychophysics of key-finding over a wide range of tempi using melodic sequences with strong structural cues, where statistical information about overall key profile was ambiguous. Listeners were able to provide robust judgments within specific limits, at rates as high as 400 beats per minute (bpm; ∼7 Hz) and as low as 30 bpm (0.5 Hz), but not outside those bounds. These boundaries on reliable performance show that the process of key-finding is restricted to timescales that are closely aligned with beat induction and speech processing. 2013 APA, all rights reserved

  2. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  3. Fully device-independent conference key agreement

    NASA Astrophysics Data System (ADS)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  4. Design of virtual simulation experiment based on key events

    NASA Astrophysics Data System (ADS)

    Zhong, Zheng; Zhou, Dongbo; Song, Lingxiu

    2018-06-01

    Considering complex content and lacking of guidance in virtual simulation experiments, the key event technology in VR narrative theory was introduced for virtual simulation experiment to enhance fidelity and vividness process. Based on the VR narrative technology, an event transition structure was designed to meet the need of experimental operation process, and an interactive event processing model was used to generate key events in interactive scene. The experiment of" margin value of bees foraging" based on Biologic morphology was taken as an example, many objects, behaviors and other contents were reorganized. The result shows that this method can enhance the user's experience and ensure experimental process complete and effectively.

  5. Efficient hit-finding approaches for histone methyltransferases: the key parameters.

    PubMed

    Ahrens, Thomas; Bergner, Andreas; Sheppard, David; Hafenbradl, Doris

    2012-01-01

    For many novel epigenetics targets the chemical ligand space and structural information were limited until recently and are still largely unknown for some targets. Hit-finding campaigns are therefore dependent on large and chemically diverse libraries. In the specific case of the histone methyltransferase G9a, the authors have been able to apply an efficient process of intelligent selection of compounds for primary screening, rather than screening the full diverse deck of 900 000 compounds to identify hit compounds. A number of different virtual screening methods have been applied for the compound selection, and the results have been analyzed in the context of their individual success rates. For the primary screening of 2112 compounds, a FlashPlate assay format and full-length histone H3.1 substrate were employed. Validation of hit compounds was performed using the orthogonal fluorescence lifetime technology. Rated by purity and IC(50) value, 18 compounds (0.9% of compound screening deck) were finally considered validated primary G9a hits. The hit-finding approach has led to novel chemotypes being identified, which can facilitate hit-to-lead projects. This study demonstrates the power of virtual screening technologies for novel, therapeutically relevant epigenetics protein targets.

  6. Coherent one-way quantum key distribution

    NASA Astrophysics Data System (ADS)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  7. Experimental and observational studies find contrasting responses of soil nutrients to climate change.

    PubMed

    Yuan, Z Y; Jiao, F; Shi, X R; Sardans, Jordi; Maestre, Fernando T; Delgado-Baquerizo, Manuel; Reich, Peter B; Peñuelas, Josep

    2017-06-01

    Manipulative experiments and observations along environmental gradients, the two most common approaches to evaluate the impacts of climate change on nutrient cycling, are generally assumed to produce similar results, but this assumption has rarely been tested. We did so by conducting a meta-analysis and found that soil nutrients responded differentially to drivers of climate change depending on the approach considered. Soil carbon, nitrogen, and phosphorus concentrations generally decreased with water addition in manipulative experiments but increased with annual precipitation along environmental gradients. Different patterns were also observed between warming experiments and temperature gradients. Our findings provide evidence of inconsistent results and suggest that manipulative experiments may be better predictors of the causal impacts of short-term (months to years) climate change on soil nutrients but environmental gradients may provide better information for long-term correlations (centuries to millennia) between these nutrients and climatic features. Ecosystem models should consequently incorporate both experimental and observational data to properly assess the impacts of climate change on nutrient cycling.

  8. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  9. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  10. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE PAGES

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; ...

    2016-08-09

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  11. Pre-eclampsia and offspring cardiovascular health: mechanistic insights from experimental studies.

    PubMed

    Davis, Esther F; Newton, Laura; Lewandowski, Adam J; Lazdam, Merzaka; Kelly, Brenda A; Kyriakou, Theodosios; Leeson, Paul

    2012-07-01

    Pre-eclampsia is increasingly recognized as more than an isolated disease of pregnancy. Women who have had a pregnancy complicated by pre-eclampsia have a 4-fold increased risk of later cardiovascular disease. Intriguingly, the offspring of affected pregnancies also have an increased risk of higher blood pressure and almost double the risk of stroke in later life. Experimental approaches to identify the key features of pre-eclampsia responsible for this programming of offspring cardiovascular health, or the key biological pathways modified in the offspring, have the potential to highlight novel targets for early primary prevention strategies. As pre-eclampsia occurs in 2-5% of all pregnancies, the findings are relevant to the current healthcare of up to 3 million people in the U.K. and 15 million people in the U.S.A. In the present paper, we review the current literature that concerns potential mechanisms for adverse cardiovascular programming in offspring exposed to pre-eclampsia, considering two major areas of investigation: first, experimental models that mimic features of the in utero environment characteristic of pre-eclampsia, and secondly, how, in humans, offspring cardiovascular phenotype is altered after exposure to pre-eclampsia. We compare and contrast the findings from these two bodies of work to develop insights into the likely key pathways of relevance. The present review and analysis highlights the pivotal role of long-term changes in vascular function and identifies areas of growing interest, specifically, response to hypoxia, immune modification, epigenetics and the anti-angiogenic in utero milieu.

  12. Pre-eclampsia and offspring cardiovascular health: mechanistic insights from experimental studies

    PubMed Central

    Davis, Esther F.; Newton, Laura; Lewandowski, Adam J.; Lazdam, Merzaka; Kelly, Brenda A.; Kyriakou, Theodosios; Leeson, Paul

    2012-01-01

    Pre-eclampsia is increasingly recognized as more than an isolated disease of pregnancy. Women who have had a pregnancy complicated by pre-eclampsia have a 4-fold increased risk of later cardiovascular disease. Intriguingly, the offspring of affected pregnancies also have an increased risk of higher blood pressure and almost double the risk of stroke in later life. Experimental approaches to identify the key features of pre-eclampsia responsible for this programming of offspring cardiovascular health, or the key biological pathways modified in the offspring, have the potential to highlight novel targets for early primary prevention strategies. As pre-eclampsia occurs in 2–5% of all pregnancies, the findings are relevant to the current healthcare of up to 3 million people in the U.K. and 15 million people in the U.S.A. In the present paper, we review the current literature that concerns potential mechanisms for adverse cardiovascular programming in offspring exposed to pre-eclampsia, considering two major areas of investigation: first, experimental models that mimic features of the in utero environment characteristic of pre-eclampsia, and secondly, how, in humans, offspring cardiovascular phenotype is altered after exposure to pre-eclampsia. We compare and contrast the findings from these two bodies of work to develop insights into the likely key pathways of relevance. The present review and analysis highlights the pivotal role of long-term changes in vascular function and identifies areas of growing interest, specifically, response to hypoxia, immune modification, epigenetics and the anti-angiogenic in utero milieu. PMID:22455350

  13. Experimental study of the Ca-Mg-Zn system using diffusion couples and key alloys

    NASA Astrophysics Data System (ADS)

    Zhang, Yi-Nan; Kevorkov, Dmytro; Bridier, Florent; Medraj, Mamoun

    2011-03-01

    Nine diffusion couples and 32 key samples were prepared to map the phase diagram of the Ca-Mg-Zn system. Phase relations and solubility limits were determined for binary and ternary compounds using scanning electron microscopy, electron probe microanalysis and x-ray diffraction (XRD). The crystal structure of the ternary compounds was studied by XRD and electron backscatter diffraction. Four ternary intermetallic (IM) compounds were identified in this system: Ca3MgxZn15-x (4.6<=x<=12 at 335 °C, IM1), Ca14.5Mg15.8Zn69.7 (IM2), Ca2Mg5Zn13 (IM3) and Ca1.5Mg55.3Zn43.2 (IM4). Three binary compounds were found to have extended solid solubility into ternary systems: CaZn11, CaZn13 and Mg2Ca form substitutional solid solutions where Mg substitutes for Zn atoms in the first two compounds, and Zn substitutes for both Ca and Mg atoms in Mg2Ca. The isothermal section of the Ca-Mg-Zn phase diagram at 335 °C was constructed on the basis of the obtained experimental results. The morphologies of the diffusion couples in the Ca-Mg-Zn phase diagram at 335 °C were studied. Depending on the terminal compositions of the diffusion couples, the two-phase regions in the diffusion zone have either a tooth-like morphology or contain a matrix phase with isolated and/or dendritic precipitates.

  14. Development of Ocean Acidification Flow-Thru Experimental Raceway Units (OAFTERU): Simulating the Future Reefs in the Keys Today

    NASA Astrophysics Data System (ADS)

    Hall, E. R.; Vaughan, D.; Crosby, M. P.

    2011-12-01

    Ocean acidification, a consequence of anthropogenic CO2 production due to fossil fuel combustion, deforestation, and cement production, has been referred to as "the other CO2 problem" and is receiving much attention in marine science and public policy communities. Critical needs that have been identified by top climate change and marine scientists include using projected pCO2 (partial pressure of CO2 in seawater) levels in manipulative experiments to determine physiological indices of ecologically important species, such as corals. Coral reefs were one of the first ecosystems to be documented as susceptible to ocean acidification. The Florida Keys reef system has already experienced a long-term deterioration, resulting in increased calls for large scale coral reef ecosystem restoration of these critical resources. It has also been speculated that this decline in reef ecosystem health may be exacerbated by increasing atmospheric CO2 levels with resulting ocean acidification. Therefore, reef resilience to ocean acidification and the potential for successful restoration of these systems under forecasted long-term modified pH conditions in the Florida Keys is of great concern. Many studies for testing effects of ocean acidification on corals have already been established and tested. However, many employ pH modification experimental designs that include addition of acid to seawater which may not mimic conditions of climate change induced ocean acidification. It would be beneficial to develop and maintain an ocean acidification testing system more representative of climate change induced changes, and specific to organisms and ecosystems indigenous to the Florida Keys reef tract. The Mote Marine Laboratory research facility in Summerland Key, FL has an established deep well from which its supply of seawater is obtained. This unique source of seawater is 80 feet deep, "fossil" marine water. It is pumped from the on-site aquifer aerated to reduce H2S and ammonia, and passed

  15. Necroptosis is a key pathogenic event in human and experimental murine models of non-alcoholic steatohepatitis.

    PubMed

    Afonso, Marta B; Rodrigues, Pedro M; Carvalho, Tânia; Caridade, Marta; Borralho, Paula; Cortez-Pinto, Helena; Castro, Rui E; Rodrigues, Cecília M P

    2015-10-01

    Hepatocyte cell death, inflammation and oxidative stress constitute key pathogenic mechanisms underlying non-alcoholic fatty liver disease (NAFLD). We aimed to investigate the role of necroptosis in human and experimental NAFLD and its association with tumour necrosis factor α (TNF-α) and oxidative stress. Serum markers of necrosis, liver receptor-interacting protein 3 (RIP3) and phosphorylated mixed lineage kinase domain-like (MLKL) were evaluated in control individuals and patients with NAFLD. C57BL/6 wild-type (WT) or RIP3-deficient (RIP3(-/-)) mice were fed a high-fat choline-deficient (HFCD) or methionine and choline-deficient (MCD) diet, with subsequent histological and biochemical analysis of hepatic damage. In primary murine hepatocytes, necroptosis and oxidative stress were also assessed after necrostatin-1 (Nec-1) treatment or RIP3 silencing. We show that circulating markers of necrosis and TNF-α, as well as liver RIP3 and MLKL phosphorylation were increased in NAFLD. Likewise, RIP3 and MLKL protein levels and TNF-α expression were increased in the liver of HFCD and MCD diet-fed mice. Moreover, RIP3 and MLKL sequestration in the insoluble protein fraction of NASH (non-alcoholic steatohepatitis) mice liver lysates represented an early event during stetatohepatitis progression. Functional studies in primary murine hepatocytes established the association between TNF-α-induced RIP3 expression, activation of necroptosis and oxidative stress. Strikingly, RIP3 deficiency attenuated MCD diet-induced liver injury, steatosis, inflammation, fibrosis and oxidative stress. In conclusion, necroptosis is increased in the liver of NAFLD patients and in experimental models of NASH. Further, TNF-α triggers RIP3-dependent oxidative stress during hepatocyte necroptosis. As such, targeting necroptosis appears to arrest or at least impair NAFLD progression. © 2015 Authors; published by Portland Press Limited.

  16. Paths to Work in Rural Places: Key Findings and Lessons from the Impact Evaluation of the Future Steps Rural Welfare-to-Work Program. Final Report

    ERIC Educational Resources Information Center

    Meckstroth, Alicia; Burwick, Andrew; Ponza, Michael; Marsh, Shawn; Novak, Tim; Phillips, Shannon; Diaz-Tena, Nuria; Ng, Judy

    2006-01-01

    Helping low-income families in rural areas find gainful employment and achieve economic self-sufficiency is an ongoing policy concern. The Rural Welfare-to-Work Strategies demonstration is using rigorous experimental designs to build knowledge about how to help low-income families in rural areas strive toward sustained employment and…

  17. Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    NASA Astrophysics Data System (ADS)

    Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2018-04-01

    Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.

  18. An Experimental Introduction to Acoustics

    NASA Astrophysics Data System (ADS)

    Black, Andy Nicholas; Magruder, Robert H.

    2017-11-01

    Learning and understanding physics requires more than studying physics texts. It requires doing physics. Doing research is a key opportunity for students to connect physical principles with their everyday experience. A powerful way to introduce students to research and technique is through subjects in which they might find interest. Presented is an experiment that serves to introduce an advanced undergraduate or high school student to conducting research in acoustics via an experiment involving a standard dreadnought acoustic guitar, recording industry-related equipment, and relevant industrial analysis software. This experimental process is applicable to a wide range of acoustical topics including both acoustic and electric instruments. Also, the student has a hands-on experience with relevant audio engineering technology to study physical principles.

  19. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less

  20. High key rate continuous-variable quantum key distribution with a real local oscillator.

    PubMed

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Ma, Hongxin; Wang, Shiyu; Zeng, Guihua

    2018-02-05

    Continuous-variable quantum key distribution (CVQKD) with a real local oscillator (LO) has been extensively studied recently due to its security and simplicity. In this paper, we propose a novel implementation of a high-key-rate CVQKD with a real LO. Particularly, with the help of the simultaneously generated reference pulse, the phase drift of the signal is tracked in real time and then compensated. By utilizing the time and polarization multiplexing techniques to isolate the reference pulse and controlling the intensity of it, not only the contamination from it is suppressed, but also a high accuracy of the phase compensation can be guaranteed. Besides, we employ homodyne detection on the signal to ensure the high quantum efficiency and heterodyne detection on the reference pulse to acquire the complete phase information of it. In order to suppress the excess noise, a theoretical noise model for our scheme is established. According to this model, the impact of the modulation variance and the intensity of the reference pulse are both analysed theoretically and then optimized according to the experimental data. By measuring the excess noise in the 25km optical fiber transmission system, a 3.14Mbps key rate in the asymptotic regime proves to be achievable. This work verifies the feasibility of the high-key-rate CVQKD with a real LO within the metropolitan area.

  1. Quantum exhaustive key search with simplified-DES as a case study.

    PubMed

    Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N

    2016-01-01

    To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.

  2. Ecological restoration experiments (1992-2007) at the G.A. Pearson Natural Area, Fort Valley Experimental Forest (P-53)

    Treesearch

    Margaret M. Moore; Wallace Covington; Peter Z. Fulé; Stephen C. Hart; Thomas E. Kolb; Joy N. Mast; Stephen S. Sackett; Michael R. Wagner

    2008-01-01

    In 1992 an experiment was initiated at the G. A. Pearson Natural Area on the Fort Valley Experimental Forest to evaluate long-term ecosystem responses to two restoration treatments: thinning only and thinning with prescribed burning. Fifteen years of key findings about tree physiology, herbaceous, and ecosystem responses are presented.

  3. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  4. Key findings from HSC's 2010 site visits: health care markets weather economic downturn, brace for health reform.

    PubMed

    Felland, Laurie E; Grossman, Joy M; Tu, Ha T

    2011-05-01

    Lingering fallout--loss of jobs and employer coverage--from the great recession slowed demand for health care services but did little to slow aggressive competition by dominant hospital systems for well-insured patients, according to key findings from the Center for Studying Health System Change's (HSC) 2010 site visits to 12 nationally representative metropolitan communities. Hospitals with significant market clout continued to command high payment rate increases from private insurers, and tighter hospital-physician alignment heightened concerns about growing provider market power. High and rising premiums led to increasing employer adoption of consumer-driven health plans and continued increases in patient cost sharing, but the broader movement to educate and engage consumers in care decisions did not keep pace. State and local budget deficits led to some funding cuts for safety net providers, but an influx of federal stimulus funds increased support to community health centers and shored up Medicaid programs, allowing many people who lost private insurance because of job losses to remain covered. Hospitals, physicians and insurers generally viewed health reform coverage expansions favorably, but all worried about protecting revenues as reform requirements phase in.

  5. The key roles of four Experimental Forests in the LTSP International Research Program

    Treesearch

    Robert F. Powers; Robert Denner; John D. Elioff; Gary O. Fiddler; Deborah Page-Dumroese; Felix Ponder; Allan E. Tiarks; Peter E. Avers; Richard G. Cline; Nelson S. Loftus

    2014-01-01

    Four Experimental Forests were pivotal in piloting the long-term soil productivity (LTSP) cooperative research program - one of the most successful and extensive collaborative science efforts yet undertaken by the USDA Forest Service. Launched on the Palustris, Challenge, Marcell, and Priest River Experimental Forests, LTSP traces to a seminal discussion during a field...

  6. Timing the Mode Switch in a Sequential Mixed-Mode Survey: An Experimental Evaluation of the Impact on Final Response Rates, Key Estimates, and Costs

    PubMed Central

    Wagner, James; Schroeder, Heather M.; Piskorowski, Andrew; Ursano, Robert J.; Stein, Murray B.; Heeringa, Steven G.; Colpe, Lisa J.

    2017-01-01

    Mixed-mode surveys need to determine a number of design parameters that may have a strong influence on costs and errors. In a sequential mixed-mode design with web followed by telephone, one of these decisions is when to switch modes. The web mode is relatively inexpensive but produces lower response rates. The telephone mode complements the web mode in that it is relatively expensive but produces higher response rates. Among the potential negative consequences, delaying the switch from web to telephone may lead to lower response rates if the effectiveness of the prenotification contact materials is reduced by longer time lags, or if the additional e-mail reminders to complete the web survey annoy the sampled person. On the positive side, delaying the switch may decrease the costs of the survey. We evaluate these costs and errors by experimentally testing four different timings (1, 2, 3, or 4 weeks) for the mode switch in a web–telephone survey. This experiment was conducted on the fourth wave of a longitudinal study of the mental health of soldiers in the U.S. Army. We find that the different timings of the switch in the range of 1–4 weeks do not produce differences in final response rates or key estimates but longer delays before switching do lead to lower costs. PMID:28943717

  7. Experimental and observational studies find contrasting responses of soil nutrients to climate change

    PubMed Central

    Yuan, ZY; Jiao, F; Shi, XR; Sardans, Jordi; Maestre, Fernando T; Delgado-Baquerizo, Manuel; Reich, Peter B; Peñuelas, Josep

    2017-01-01

    Manipulative experiments and observations along environmental gradients, the two most common approaches to evaluate the impacts of climate change on nutrient cycling, are generally assumed to produce similar results, but this assumption has rarely been tested. We did so by conducting a meta-analysis and found that soil nutrients responded differentially to drivers of climate change depending on the approach considered. Soil carbon, nitrogen, and phosphorus concentrations generally decreased with water addition in manipulative experiments but increased with annual precipitation along environmental gradients. Different patterns were also observed between warming experiments and temperature gradients. Our findings provide evidence of inconsistent results and suggest that manipulative experiments may be better predictors of the causal impacts of short-term (months to years) climate change on soil nutrients but environmental gradients may provide better information for long-term correlations (centuries to millennia) between these nutrients and climatic features. Ecosystem models should consequently incorporate both experimental and observational data to properly assess the impacts of climate change on nutrient cycling. DOI: http://dx.doi.org/10.7554/eLife.23255.001 PMID:28570219

  8. Self-referenced continuous-variable quantum key distribution protocol

    DOE PAGES

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin; ...

    2015-10-21

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  9. Self-referenced continuous-variable quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  10. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lütkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-01

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  11. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  12. The hamster (Mesocricetus auratus) as an experimental model of toxocariasis: histopathological, immunohistochemical, and immunoelectron microscopic findings.

    PubMed

    da Silva, Ana Maria Gonçalves; Chieffi, Pedro Paulo; da Silva, Wellington Luiz Ferreira; Kanashiro, Edite Hatsumi Yamashiro; Rubinsky-Elefant, Guita; Cunha-Neto, Edécio; Mairena, Eliane Conti; De Brito, Thales

    2015-03-01

    Toxocariasis is a globally distributed parasitic infection caused by the larval stage of Toxocara spp. The typical natural hosts of the parasite are dogs and cats, but humans can be infected by the larval stage of the parasite after ingesting embryonated eggs in soil or from contaminated hands or fomites. The migrating larvae are not adapted to complete their life cycle within accidental or paratenic hosts like humans and laboratory animals, respectively, but they are capable of invading viscera or other tissues where they may survive and induce disease. In order to characterize hamsters (Mesocricetus auratus) as a model for Toxocara canis infection, histopathological and immunohistochemistry procedures were used to detect pathological lesions and the distribution of toxocaral antigens in the liver, lungs, and kidneys of experimentally infected animals. We also attempted to characterize the immunological parameters of the inflammatory response and correlate them with the histopathological findings. In the kidney, a correlation between glomerular changes and antigen deposits was evaluated using immunoelectron microscopy. The hamster is an adequate model of experimental toxocariasis for short-term investigations and has a good immunological and pathological response to the infection. Lung and liver manifestations of toxocariasis in hamsters approximated those in humans and other experimental animal models. A mixed Th2 immunological response to T. canis infection was predominant. The hamster model displayed a progressive rise of anti-toxocaral antibodies with the formation of immune complexes. Circulating antigens, immunoglobulin, and complement deposits were detected in the kidney without the development of a definite immune complex nephropathy.

  13. Key Skills and Competencies. Symposium.

    ERIC Educational Resources Information Center

    2002

    This document contains three papers on key skills and competencies and human resource development (HRD). "Career Related Competencies" (Marinka A.C.T. Kuijpers) reports findings from surveys completed by Dutch employees who identified these issues: self-reflection is more important than career control; age and gender influence attitude…

  14. The comparison and analysis of extracting video key frame

    NASA Astrophysics Data System (ADS)

    Ouyang, S. Z.; Zhong, L.; Luo, R. Q.

    2018-05-01

    Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.

  15. Secure image retrieval with multiple keys

    NASA Astrophysics Data System (ADS)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  16. Experimental findings on actinide recovery utilizing oxidation by peroxydisulfate followed by ion exchange: Fuel cycle research & development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hobbs, D. T.; Shehee, T. C.

    2015-08-31

    Our research seeks to determine if inorganic ion-exchange materials can be exploited to provide effective minor actinide (Am, Cm) separation from lanthanides. Previous work has established that a number of inorganic and UMOF ion-exchange materials exhibit varying affinities for actinides and lanthanides, which may be exploited for effective separations. During FY15, experimental work focused on investigating methods to oxidize americium in dilute nitric and perchloric acid with subsequent ion-exchange performance measurements of ion exchangers with the oxidized americium in dilute nitric acid. Ion-exchange materials tested included a variety of alkali titanates. Americium oxidation testing sought to determine the influence thatmore » other redox active components may have on the oxidation of Am III. Experimental findings indicated that Ce III, Np V, and Ru II are oxidized by peroxydisulfate, but there are no indications that the presence of Ce III, Np V, and Ru II affected the rate or extent of americium oxidation at the concentrations of peroxydisulfate being used.« less

  17. Finding solid ground: law enforcement, key populations and their health and rights in South Africa

    PubMed Central

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Introduction Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. Discussion We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, “othering” and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Conclusions Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality

  18. Finding solid ground: law enforcement, key populations and their health and rights in South Africa.

    PubMed

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, "othering" and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality. Creating opportunities to share experiences

  19. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2006

    ERIC Educational Resources Information Center

    Johnston, Lloyd D., O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2007-01-01

    This report provides a summary of drug use trends from a survey of nearly 50,000 eighth-, tenth-, and twelfth- grade students nationwide. It also includes perceived risk, personal disapproval, and perceived availability of each drug by this group. A synopsis of the methods used in the study and an overview of the key results from the 2006 survey…

  20. Key Findings from the U.S.-India Partnership for Climate Resilience Workshop on Development and Application of Downscaling Climate Projections

    NASA Astrophysics Data System (ADS)

    Kunkel, K.; Dissen, J.; Easterling, D. R.; Kulkarni, A.; Akhtar, F. H.; Hayhoe, K.; Stoner, A. M. K.; Swaminathan, R.; Thrasher, B. L.

    2017-12-01

    s part of the Department of State U.S.-India Partnership for Climate Resilience (PCR), scientists from NOAA NCEI, CICS-NC, Texas Tech University (TTU), Stanford University (SU), and the Indian Institute of Tropical Meteorology (IITM) held a workshop at IITM in Pune, India during 7-9 March 2017 on the development, techniques and applications of downscaled climate projections. Workshop participants from TTU, SU, and IITM presented state-of-the-art climate downscaling techniques using the ARRM method, NASA NEX climate products, CORDEX-South Asia and analysis tools for resilience planning and sustainable development. PCR collaborators in attendance included Indian practitioners, researchers and other NGO including the WRI Partnership for Resilience and Preparedness (PREP), The Energy and Resources Institute (TERI), and NIH. The scientific techniques were provided to workshop participants in a software package written in R by TTU scientists and several sessions were devoted to hands-on experience with the software package. The workshop further examined case studies on the use of downscaled climate data for decision making in a range of sectors, including human health, agriculture, and water resources management as well as to inform the development of the India State Action Plans. This talk will discuss key outcomes including information needs for downscaling climate projections, importance of QA/QC of the data, key findings from select case studies, and the importance of collaborations and partnerships to apply downscaling projections to help inform the development of the India State Action Plans.

  1. Quantum key distribution with passive decoy state selection

    NASA Astrophysics Data System (ADS)

    Mauerer, Wolfgang; Silberhorn, Christine

    2007-05-01

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical postprocessing. This allows one to improve the effective signal statistics and achievable distance.

  2. Why not serve an educational buffet for students? Blended learning in optics experimental education

    NASA Astrophysics Data System (ADS)

    Zhou, Ya; Hu, Yao; Dong, Liquan; Liu, Ming; Zhao, Yuejin; Kong, Lingqin; Hao, Qun; Huang, Yifan

    2017-08-01

    When talking about higher education, it's hard not to run into a discussion on what's really better for student learning: online learning or traditional learning? Of course, the key is to offer both, and potentially emphasize blended learning as the less polarizing option. Online courses are much more flexible and less expensive, but powerless while hands-on practical capacity is involved. Traditional experimental course can maintain a fluid and solid learning process but is less productive due to its scheduled time and simplex access. In this paper, a buffet-style knowledge service mode applied in a 12-week-long project-based experimental course Optoelectronic Instrument Experiments (OIE) is discussed. Our purpose is to find a blended learning mode in experimental education.

  3. Key Relation Extraction from Biomedical Publications.

    PubMed

    Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian

    2017-01-01

    Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.

  4. Universal Rate Model Selector: A Method to Quickly Find the Best-Fit Kinetic Rate Model for an Experimental Rate Profile

    DTIC Science & Technology

    2017-08-01

    as an official Department of the Army position unless so designated by other authorizing documents. REPORT DOCUMENTATION PAGE Form Approved OMB...processes to find a kinetic rate model that provides a high degree of correlation with experimental data. Furthermore, the use of kinetic rate... correlation 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Renu B

  5. Direction and Integration of Experimental Ground Test Capabilities and Computational Methods

    NASA Technical Reports Server (NTRS)

    Dunn, Steven C.

    2016-01-01

    This paper groups and summarizes the salient points and findings from two AIAA conference panels targeted at defining the direction, with associated key issues and recommendations, for the integration of experimental ground testing and computational methods. Each panel session utilized rapporteurs to capture comments from both the panel members and the audience. Additionally, a virtual panel of several experts were consulted between the two sessions and their comments were also captured. The information is organized into three time-based groupings, as well as by subject area. These panel sessions were designed to provide guidance to both researchers/developers and experimental/computational service providers in defining the future of ground testing, which will be inextricably integrated with the advancement of computational tools.

  6. Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems: Key Findings from a Roadmapping Workshop

    PubMed Central

    Weiss, Brian A.; Vogl, Gregory; Helu, Moneer; Qiao, Guixiu; Pellegrino, Joan; Justiniano, Mauricio; Raghunathan, Anand

    2017-01-01

    The National Institute of Standards and Technology (NIST) hosted the Roadmapping Workshop – Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems (PHM4SMS) in Fall 2014 to discuss the needs and priorities of stakeholders in the PHM4SMS technology area. The workshop brought together over 70 members of the PHM community. The attendees included representatives from small, medium, and large manufacturers; technology developers and integrators; academic researchers; government organizations; trade associations; and standards bodies. The attendees discussed the current and anticipated measurement science challenges to advance PHM methods and techniques for smart manufacturing systems; the associated research and development needed to implement condition monitoring, diagnostic, and prognostic technologies within manufacturing environments; and the priorities to meet the needs of PHM in manufacturing. This paper will summarize the key findings of this workshop, and present some of the critical measurement science challenges and corresponding roadmaps, i.e., suggested courses of action, to advance PHM for manufacturing. Milestones and targeted capabilities will be presented for each roadmap across three areas: PHM Manufacturing Process Techniques; PHM Performance Assessment; and PHM Infrastructure – Hardware, Software, and Integration. An analysis of these roadmaps and crosscutting themes seen across the breakout sessions is also discussed. PMID:28664163

  7. Experimental demonstration of an active phase randomization and monitor module for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Liang, Lin-Mei

    2012-08-01

    Phase randomization is a very important assumption in the BB84 quantum key distribution (QKD) system with weak coherent source; otherwise, eavesdropper may spy the final key. In this Letter, a stable and monitored active phase randomization scheme for the one-way and two-way QKD system is proposed and demonstrated in experiments. Furthermore, our scheme gives an easy way for Alice to monitor the degree of randomization in experiments. Therefore, we expect our scheme to become a standard part in future QKD systems due to its secure significance and feasibility.

  8. Experimental realization of a one-way quantum computer algorithm solving Simon's problem.

    PubMed

    Tame, M S; Bell, B A; Di Franco, C; Wadsworth, W J; Rarity, J G

    2014-11-14

    We report an experimental demonstration of a one-way implementation of a quantum algorithm solving Simon's problem-a black-box period-finding problem that has an exponential gap between the classical and quantum runtime. Using an all-optical setup and modifying the bases of single-qubit measurements on a five-qubit cluster state, key representative functions of the logical two-qubit version's black box can be queried and solved. To the best of our knowledge, this work represents the first experimental realization of the quantum algorithm solving Simon's problem. The experimental results are in excellent agreement with the theoretical model, demonstrating the successful performance of the algorithm. With a view to scaling up to larger numbers of qubits, we analyze the resource requirements for an n-qubit version. This work helps highlight how one-way quantum computing provides a practical route to experimentally investigating the quantum-classical gap in the query complexity model.

  9. Causes, consequences, and policy responses to the migration of health workers: key findings from India.

    PubMed

    Walton-Roberts, Margaret; Runnels, Vivien; Rajan, S Irudaya; Sood, Atul; Nair, Sreelekha; Thomas, Philomina; Packer, Corinne; MacKenzie, Adrian; Tomblin Murphy, Gail; Labonté, Ronald; Bourgeault, Ivy Lynn

    2017-04-05

    This study sought to better understand the drivers of skilled health professional migration, its consequences, and the various strategies countries have employed to mitigate its negative impacts. The study was conducted in four countries-Jamaica, India, the Philippines, and South Africa-that have historically been "sources" of health workers migrating to other countries. The aim of this paper is to present the findings from the Indian portion of the study. Data were collected using surveys of Indian generalist and specialist physicians, nurses, midwives, dentists, pharmacists, dieticians, and other allied health therapists. We also conducted structured interviews with key stakeholders representing government ministries, professional associations, regional health authorities, health care facilities, and educational institutions. Quantitative data were analyzed using descriptive statistics and regression models. Qualitative data were analyzed thematically. Shortages of health workers are evident in certain parts of India and in certain specialty areas, but the degree and nature of such shortages are difficult to determine due to the lack of evidence and health information. The relationship of such shortages to international migration is not clear. Policy responses to health worker migration are also similarly embedded in wider processes aimed at health workforce management, but overall, there is no clear policy agenda to manage health worker migration. Decision-makers in India present conflicting options about the need or desirability of curtailing migration. Consequences of health work migration on the Indian health care system are not easily discernable from other compounding factors. Research suggests that shortages of skilled health workers in India must be examined in relation to domestic policies on training, recruitment, and retention rather than viewed as a direct consequence of the international migration of health workers.

  10. Higher Education in England 2016: Key Facts. September 2016/20

    ERIC Educational Resources Information Center

    Higher Education Funding Council for England, 2016

    2016-01-01

    This updated edition of "Higher Education in England: Key Facts" provides a statistical overview of key sector trends and developments in 2016. Using the most recent data, it draws together key findings from a range of reports published by the Higher Education Funding Council for England (HEFCE) over the past year to provide a robust,…

  11. Key experimental information on intermediate-range atomic structures in amorphous Ge2Sb2Te5 phase change material

    NASA Astrophysics Data System (ADS)

    Hosokawa, Shinya; Pilgrim, Wolf-Christian; Höhle, Astrid; Szubrin, Daniel; Boudet, Nathalie; Bérar, Jean-François; Maruyama, Kenji

    2012-04-01

    Laser-induced crystalline-amorphous phase change of Ge-Sb-Te alloys is the key mechanism enabling the fast and stable writing/erasing processes in rewritable optical storage devices, such as digital versatile disk (DVD) or blu-ray disk. Although the structural information in the amorphous phase is essential for clarifying this fast process, as well as long lasting stabilities of both the phases, experimental works were mostly limited to the short-range order by x ray absorption fine structure. Here we show both the short and intermediate-range atomic structures of amorphous DVD material, Ge2Sb2Te5 (GST), investigated by a combination of anomalous x ray scattering and reverse Monte Carlo modeling. From the obtained atomic configurations of amorphous GST, we have found that the Sb atoms and half of the Ge atoms play roles in the fast phase change process of order-disorder transition, while the remaining Ge atoms act for the proper activation energy of barriers between the amorphous and crystalline phases.

  12. Long-distance quantum key distribution with imperfect devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-12-04

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R{sub QKD}. The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels.more » We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols.« less

  13. Teaching key use to persons with severe disabilities in congregate living settings.

    PubMed

    Ivancic, M T; Schepis, M M

    1995-01-01

    Key use remains overlooked for increasing independent material use by persons with severe mental retardation. In Experiment 1, a procedure to train key locating was evaluated in a multiple-probe withdrawal design across three groups of participants. Most participants located their keys when reinforced for doing so; however, key locating decreased when the reinforcement procedure was withdrawn. In Experiment 2, a multiple probe design across four participant groups was used to evaluate a training procedure to teach key use. Twenty of 25 participants used a key to open and lock their personal lockers as a result of training. However, only 36% of the participants were able to use their keys without prompts from experimenters.

  14. SpaceWire Tiger Team Findings and Suggestions

    NASA Technical Reports Server (NTRS)

    Ishac, Joseph A.

    2011-01-01

    This technical report intends to highlight the key findings and recommendations of the SpaceWire Tiger Team for the CoNNeCT project. It covers findings which are technical in nature, covering design concepts and approaches.

  15. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  16. Key Findings for Interpersonal Skills

    DTIC Science & Technology

    2013-12-04

    for example if you feel they use too much or too little eye contact or gesturing, stand too close or too far, or use gestures you’re unfamiliar with...IM2 RIGH[T now. 23 CM2 honestly 24 CM2 I didn’t even ((unintelligible)) 25 Would you tell him? 26 I didn’t do any fucking thing man 27 CF1 No he didn’t...that civilians whom they contact may have little or no understanding of what is happening, what they should do, or why they should do it. When

  17. An Experimental Framework for Generating Evolvable Chemical Systems in the Laboratory

    NASA Astrophysics Data System (ADS)

    Baum, David A.; Vetsigian, Kalin

    2017-12-01

    Most experimental work on the origin of life has focused on either characterizing the chemical synthesis of particular biochemicals and their precursors or on designing simple chemical systems that manifest life-like properties such as self-propagation or adaptive evolution. Here we propose a new class of experiments, analogous to artificial ecosystem selection, where we select for spontaneously forming self-propagating chemical assemblages in the lab and then seek evidence of a response to that selection as a key indicator that life-like chemical systems have arisen. Since surfaces and surface metabolism likely played an important role in the origin of life, a key experimental challenge is to find conditions that foster nucleation and spread of chemical consortia on surfaces. We propose high-throughput screening of a diverse set of conditions in order to identify combinations of "food," energy sources, and mineral surfaces that foster the emergence of surface-associated chemical consortia that are capable of adaptive evolution. Identification of such systems would greatly advance our understanding of the emergence of self-propagating entities and the onset of adaptive evolution during the origin of life.

  18. Detector-device-independent quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lim, Charles Ci Wen; Korzh, Boris; Martin, Anthony

    2014-12-01

    Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all measurement side-channel attacks. While mdiQKD is conceptually elegant and offers a supreme level of security, the experimental complexity is challenging for practical systems. For instance, it requires interference between two widely separated independent single-photon sources, and the secret key rates are dependent on detecting two photons—one from each source. Here, we demonstrate a proof-of-principle experiment of a QKD scheme that removes the need for a two-photon system and instead uses the idea of a two-qubit single-photon to significantly simplify themore » implementation and improve the efficiency of mdiQKD in several aspects.« less

  19. Microscale optical cryptography using a subdiffraction-limit optical key

    NASA Astrophysics Data System (ADS)

    Ogura, Yusuke; Aino, Masahiko; Tanida, Jun

    2018-04-01

    We present microscale optical cryptography using a subdiffraction-limit optical pattern, which is finer than the diffraction-limit size of the decrypting optical system, as a key and a substrate with a reflectance distribution as an encrypted image. Because of the subdiffraction-limit spatial coding, this method enables us to construct a secret image with the diffraction-limit resolution. Simulation and experimental results demonstrate, both qualitatively and quantitatively, that the secret image becomes recognizable when and only when the substrate is illuminated with the designed key pattern.

  20. Using Experimental Paradigms to Examine Alcohol’s Role in Men’s Sexual Aggression: Opportunities and Challenges in Proxy Development

    PubMed Central

    Abbey, Antonia; Wegner, Rhiana

    2015-01-01

    The goals of this article are to review the major findings from alcohol administration studies that use sexual aggression proxies and to encourage additional experimental research that evaluates hypotheses about the role of alcohol in the etiology of men’s sexual aggression. Experiments allow participants to be randomly assigned to drink conditions, therefore ensuring that any differences between drinkers and nondrinkers can be attributed to their alcohol consumption. One of the biggest challenges faced by experimental researchers is the identification of valid operationalizations of key constructs. The tension between internal and external validity is particularly problematic for violence researchers because they cannot allow participants to engage in the target behavior in the laboratory. The strengths and limitations associated with written vignettes, audiotapes, videotapes, and confederate proxies for sexual aggression are described. Suggestions are made for future research to broaden the generalizability of the findings from experimental research. PMID:26048214

  1. [Reversal of aging and lifespan elongation. Current biomedical key publications and the implications for geriatrics].

    PubMed

    Bollheimer, L C; Volkert, D; Bertsch, T; Sieber, C C; Büttner, R

    2013-08-01

    Biological aging means a time-dependent accumulation of changes to which a living organism is being exposed during its lifetime. Biological aging normally concurs with chronological aging the time frame of which is set by an upper limit, the lifespan (in humans approximately 120 years). New findings in experimental biogerontology are challenging both the dogma of irreversibility of biological aging and the preset species-specific limitations of life. The present overview first explains the general principle of rejuvenation and reversal of biological aging with paradigms from stem cell research. Secondly, recent key publications on artificial telomerase elongation and (alleged) lifespan enhancement by sirtuins and resveratrol will be discussed with an emphasis on the implications for (future) geriatric medicine.

  2. Editorial Decisions May Perpetuate Belief in Invalid Research Findings

    PubMed Central

    Eriksson, Kimmo; Simpson, Brent

    2013-01-01

    Social psychology and related disciplines are seeing a resurgence of interest in replication, as well as actual replication efforts. But prior work suggests that even a clear demonstration that a finding is invalid often fails to shake acceptance of the finding. This threatens the full impact of these replication efforts. Here we show that the actions of two key players – journal editors and the authors of original (invalidated) research findings – are critical to the broader public’s continued belief in an invalidated research conclusion. Across three experiments, we show that belief in an invalidated finding falls sharply when a critical failed replication is published in the same – versus different – journal as the original finding, and when the authors of the original finding acknowledge that the new findings invalidate their conclusions. We conclude by discussing policy implications of our key findings. PMID:24023863

  3. A Key to the New Library.

    ERIC Educational Resources Information Center

    Gerryts, Egbert; Pienaar, Heila

    This paper discusses finding the key to a new library in order to ensure its future, stressing the importance of alignment between strategy and people. The first section addresses management philosophy for renewal, including replacing the inflexible hierarchical pyramidal structure by a network organization with a service and competency management…

  4. Quantum key distribution using gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Grosshans, Frédéric; Van Assche, Gilles; Wenger, Jérôme; Brouri, Rosa; Cerf, Nicolas J.; Grangier, Philippe

    2003-01-01

    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

  5. A New Three Dimensional Based Key Generation Technique in AVK

    NASA Astrophysics Data System (ADS)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2017-08-01

    In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.

  6. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  7. Key factors impacting on diagnosis and treatment for vulvar cancer for Indigenous women: findings from Australia.

    PubMed

    McGrath, Pam; Rawson, Nicole

    2013-10-01

    To date, there has been limited research on the topic of vulvar cancer. This paper provides findings from a qualitative study conducted with Indigenous women in East Arnhem Land, Northern Territory, Australia on the psychosocial impact of diagnosis and treatment for vulvar cancer. The insights from the study outlined in this paper not only make a contribution to deepening our understanding of the experience of vulvar cancer for Indigenous women, but provide practical recommendations to ensure effective and early engagement for diagnosis and treatment. A qualitative research method was employed through in-depth, open-ended interviews. The participants of the study were a purposive sample of Indigenous women with the condition, health professionals, and Aboriginal health workers. There were a total of 40 participants; with twelve (n = 12) Indigenous women affected with the condition, fourteen (n = 14) Aboriginal Health Workers, ten (n = 10) nurses, three (n = 3) doctors, and one (n = 1) community member. This paper addresses three key issues highlighted by the participants which include the fact that the private nature of the disease makes the condition 'women's business', that there is a sense of shame associated with the condition, and that there is fear and worry generated by the seriousness of the condition. The private nature of the disease and the sense of shame associated with the condition impact upon the diagnosis and treatment for many Indigenous women. In addition, the limitation of resources for health service delivery for East Arnhem Land exacerbates the problems faced by these communities. This paper puts forward suggestions to facilitate early diagnosis and treatment for women affected with the condition.

  8. The RNA world in the 21st century-a systems approach to finding non-coding keys to clinical questions.

    PubMed

    Schmitz, Ulf; Naderi-Meshkin, Hojjat; Gupta, Shailendra K; Wolkenhauer, Olaf; Vera, Julio

    2016-05-01

    There was evidence that RNAs are a functionally rich class of molecules not only since the arrival of the next-generation sequencing technology. Non-coding RNAs (ncRNA) could be the key to accelerated diagnosis and enhanced prediction of disease and therapy outcomes as well as the design of advanced therapeutic strategies to overcome yet unsatisfactory approaches.In this review, we discuss the state of the art in RNA systems biology with focus on the application in the systems biomedicine field. We propose guidelines for analysing the role of microRNAs and long non-coding RNAs in human pathologies. We introduce RNA expression profiling and network approaches for the identification of stable and effective RNomics-based biomarkers, providing insights into the role of ncRNAs in disease regulation. Towards this, we discuss ways to model the dynamics of gene regulatory networks and signalling pathways that involve ncRNAs. We also describe data resources and computational methods for finding putative mechanisms of action of ncRNAs. Finally, we discuss avenues for the computer-aided design of novel RNA-based therapeutics. © The Author 2015. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  9. Tight finite-key analysis for quantum cryptography

    PubMed Central

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-01

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies. PMID:22252558

  10. Tight finite-key analysis for quantum cryptography.

    PubMed

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  11. Experimental multiplexing of quantum key distribution with classical optical communication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Liu-Jun; Chen, Luo-Kan; Ju, Lei

    2015-02-23

    We demonstrate the realization of quantum key distribution (QKD) when combined with classical optical communication, and synchronous signals within a single optical fiber. In the experiment, the classical communication sources use Fabry-Pérot (FP) lasers, which are implemented extensively in optical access networks. To perform QKD, multistage band-stop filtering techniques are developed, and a wavelength-division multiplexing scheme is designed for the multi-longitudinal-mode FP lasers. We have managed to maintain sufficient isolation among the quantum channel, the synchronous channel and the classical channels to guarantee good QKD performance. Finally, the quantum bit error rate remains below a level of 2% across themore » entire practical application range. The proposed multiplexing scheme can ensure low classical light loss, and enables QKD over fiber lengths of up to 45 km simultaneously when the fibers are populated with bidirectional FP laser communications. Our demonstration paves the way for application of QKD to current optical access networks, where FP lasers are widely used by the end users.« less

  12. Middle Term Achievements of Project 5322: Retrieval Of Key Eco-Hydrological Parameters From Remote Sensing In The Watershed Allied Telemetry Experimental Research (Water)

    NASA Astrophysics Data System (ADS)

    Li, Xin; Menenti, Massimo

    2010-10-01

    The general objective of project 5322 in the Dragon 2 programme is to quantitatively retrieve some key eco- hydrological parameters by using remote sensed data, especially from ESA, Chinese, and the Third Party Mission (TPM). To achieve this goal, a comprehensive observation experiment, Watershed Allied Telemetry Experimental Research (WATER) was carried out. WARER is a simultaneously airborne, satellite-borne, and ground-based remote sensing experiment took place in the Heihe River Basin, a typical inland river basin in the northwest of China. This paper introduces the background and implementation of WATER. Data have been obtained so far are described in details. After a period of data analysis for two years, numerous results have also been achieved. This paper presents some early results of WATER as well.

  13. Key findings on legal and regulatory barriers to HIV testing and access to care across Europe.

    PubMed

    Power, L; Hows, J; Jakobsen, S F

    2018-02-01

    The aim of this work within OptTEST by HiE has been to demonstrate the role of legal and regulatory barriers in hindering access to HIV testing, treatment and care across Europe and to produce tools to help dismantle them. An online survey to assess country-specific data on legal and regulatory barriers distributed widely across the WHO Europe region. Literature reviews conducted in January-October 2015 in English, in November 2015 in Russian, and updated in April 2017. Semi-structured interviews were conducted with 25 key actors within the HIV field to feed into case studies and tip sheets on how to dismantle legal and regulatory barriers. More than 160 individuals and organisations from 49 countries across the WHO European region provided responses which were analysed and cross checked with other data sources and a searchable database produced (legalbarriers.peoplewithhiveurope.org). The conducted literature reviews yielded 88 papers and reports which identify legal and regulatory barriers to key populations' access to HV testing and care. Based on the interviews with key actors, ranging from PLHIV activists to government officials, on lessons-learned, a series of tip sheets and ten case studies were written-up intended to inform and inspire the HIV community to address and overcome existing barriers (opttest.eu/Tools). While some of the barriers identified may require major changes to wider health systems, or long term legal reform, many are open to a simple change in regulations or custom and practice. We have the tools. Why can't we finish the job? © 2018 British HIV Association.

  14. A fingerprint key binding algorithm based on vector quantization and error correction

    NASA Astrophysics Data System (ADS)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  15. Key Understandings in School Mathematics: 1

    ERIC Educational Resources Information Center

    Watson, Anne

    2010-01-01

    This article is the first in a series which draws on findings from Nunes, Watson and Bryant (2009): "Key understandings in school mathematics: a report to the Nuffield Foundation." The Nuffield report is soundly based on research about how children learn some of the concepts involved in mathematics. In this series of articles the author takes key…

  16. Key Understandings in School Mathematics: 3

    ERIC Educational Resources Information Center

    Watson, Anne

    2010-01-01

    This article is the third in a series which draws on findings from Nunes, Watson and Bryant (2009): "Key understandings in school mathematics: a report to the Nuffield Foundation". In this article the author focuses on what learners have to understand and learn in order to do secondary mathematics well in general terms. She is assuming a…

  17. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  18. JHR Project: a future Material Testing Reactor working as an International user Facility: The key-role of instrumentation in support to the development of modern experimental capacity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bignan, G.; Gonnier, C.; Lyoussi, A.

    2015-07-01

    Research and development on fuel and material behaviour under irradiation is a key issue for sustainable nuclear energy in order to meet specific needs by keeping the best level of safety. These needs mainly deal with a constant improvement of performances and safety in order to optimize the fuel cycle and hence to reach nuclear energy sustainable objectives. A sustainable nuclear energy requires a high level of performances in order to meet specific needs such as: - Pursuing improvement of the performances and safety of present and coming water cooled reactor technologies. This will require a continuous R and Dmore » support following a long-term trend driven by the plant life management, safety demonstration, flexibility and economics improvement. Experimental irradiations of structure materials are necessary to anticipate these material behaviours and will contribute to their optimisation. - Upgrading continuously nuclear fuel technology in present and future nuclear power plants to achieve better performances and to optimise the fuel cycle keeping the best level of safety. Fuel evolution for generation II, III and III+ is a key stake requiring developments, qualification tests and safety experiments to ensure the competitiveness and safety: experimental tests exploring the full range of fuel behaviour determine fuel stability limits and safety margins, as a major input for the fuel reliability analysis. To perform such accurate and innovative progress and developments, specific and ad hoc instrumentation, irradiation devices, measurement methods are necessary to be set up inside or beside the material testing reactor (MTR) core. These experiments require beforehand in situ and on line sophisticated measurements to accurately determine different key parameters such as thermal and fast neutron fluxes and nuclear heating in order to precisely monitor and control the conducted assays. The new Material Testing Reactor JHR (Jules Horowitz Reactor) currently under

  19. Free-space quantum key distribution at night

    NASA Astrophysics Data System (ADS)

    Buttler, William T.; Hughes, Richard J.; Kwiat, Paul G.; Lamoreaux, Steve K.; Luther, Gabriel G.; Morgan, George L.; Nordholt, Jane E.; Peterson, C. Glen; Simmons, Charles M.

    1998-07-01

    An experimental free-space quantum key distribution (QKD) system has been tested over an outdoor optical path of approximately 1 km under nighttime conditions at Los Alamos National Laboratory. This system employs the Bennett 92 protocol; here we give a brief overview of this protocol, and describe our experimental implementation of it. An analysis of the system efficiency is presented as well as a description of our error detection protocol, which employs a 2D parity check scheme. Finally, the susceptibility of this system to eavesdropping by various techniques is determined, and the effectiveness of privacy amplification procedures is discussed. Our conclusions are that free-space QKD is both effective and secure; possible applications include the rekeying of satellites in low earth orbit.

  20. How to Find HIV Treatment Services

    MedlinePlus

    ... Clinical Trials Apps skip to content Living with HIV Home Understanding HIV/AIDS Fact Sheets How to ... ET) Send us an email How to Find HIV Treatment Services Last Reviewed: December 6, 2017 Key ...

  1. Efficient bit sifting scheme of post-processing in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Le, Dan; Wu, Xianyan; Niu, Xiamu; Guo, Hong

    2015-10-01

    Bit sifting is an important step in the post-processing of quantum key distribution (QKD). Its function is to sift out the undetected original keys. The communication traffic of bit sifting has essential impact on the net secure key rate of a practical QKD system. In this paper, an efficient bit sifting scheme is presented, of which the core is a lossless source coding algorithm. Both theoretical analysis and experimental results demonstrate that the performance of the scheme is approaching the Shannon limit. The proposed scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means the proposed scheme can decrease the secure key consumption for classical channel authentication and increase the net secure key rate of the QKD system, as demonstrated by analyzing the improvement on the net secure key rate. Meanwhile, some recommendations on the application of the proposed scheme to some representative practical QKD systems are also provided.

  2. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Hong-Wei; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004; Wang, Shuang

    2011-12-15

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost ofmore » only increasing the quantum bit error rate from 1.3 to 1.4%.« less

  3. Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol

    PubMed Central

    Mizutani, Akihiro; Tamaki, Kiyoshi; Ikuta, Rikizo; Yamamoto, Takashi; Imoto, Nobuyuki

    2014-01-01

    The measurement-device-independent quantum key distribution (MDI QKD) was proposed to make BB84 completely free from any side-channel in detectors. Like in prepare & measure QKD, the use of other protocols in MDI setting would be advantageous in some practical situations. In this paper, we consider SARG04 protocol in MDI setting. The prepare & measure SARG04 is proven to be able to generate a key up to two-photon emission events. In MDI setting we show that the key generation is possible from the event with single or two-photon emission by a party and single-photon emission by the other party, but the two-photon emission event by both parties cannot contribute to the key generation. On the contrary to prepare & measure SARG04 protocol where the experimental setup is exactly the same as BB84, the measurement setup for SARG04 in MDI setting cannot be the same as that for BB84 since the measurement setup for BB84 in MDI setting induces too many bit errors. To overcome this problem, we propose two alternative experimental setups, and we simulate the resulting key rate. Our study highlights the requirements that MDI QKD poses on us regarding with the implementation of a variety of QKD protocols. PMID:24913431

  4. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  5. Theoretical and experimental study of polycyclic aromatic compounds as β-tubulin inhibitors.

    PubMed

    Olazarán, Fabian E; García-Pérez, Carlos A; Bandyopadhyay, Debasish; Balderas-Rentería, Isaias; Reyes-Figueroa, Angel D; Henschke, Lars; Rivera, Gildardo

    2017-03-01

    In this work, through a docking analysis of compounds from the ZINC chemical library on human β-tubulin using high performance computer cluster, we report new polycyclic aromatic compounds that bind with high energy on the colchicine binding site of β-tubulin, suggesting three new key amino acids. However, molecular dynamic analysis showed low stability in the interaction between ligand and receptor. Results were confirmed experimentally in in vitro and in vivo models that suggest that molecular dynamics simulation is the best option to find new potential β-tubulin inhibitors. Graphical abstract Bennett's acceptance ratio (BAR) method.

  6. Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification

    DTIC Science & Technology

    2014-09-18

    and full/scale experimental verifications towards ground/ satellite quantum key distribution0 Oat Qhotonics 4235>9+7,=5;9!អ \\58^ Zin K. Dao Z. Miu T...Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification DISSERTATION Jeffrey D. Morris... QUANTUM KEY DISTRIBUTION SIMULATION FRAMEWORK USING THE DISCRETE EVENT SYSTEM SPECIFICATION DISSERTATION Presented to the Faculty Department of Systems

  7. SeaQuaKE: Sea-optimized Quantum Key Exchange

    DTIC Science & Technology

    2014-06-01

    is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN-0004 under ONRBAA13-001...In addition, we discuss our initial progress towards the free - space quantum channel model and planning for the experimental validation effort. 15...SUBJECT TERMS Quantum communications, free - space optical communications 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as

  8. A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

    PubMed Central

    Moon, Soo Young; Cho, Tae Ho

    2014-01-01

    Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥10%. PMID:25136649

  9. Generalizing Experimental Findings

    DTIC Science & Technology

    2015-06-01

    ity.” In graphical terms, these assumptions may require several d-separation tests on several sub-graphs. It is utterly unimaginable therefore that...Education) (a) (Salary)(Education) (Skill) (b) S ( Test ) YX ZZ YX Figure 1: (a) A transportability model in which a post-treatment variable Z is S-admissible...observational studies to estimate population treatment ef- fects. Journal Royal Statistical Society: Series A (Statistics in Society) Forthcoming, doi

  10. Memetic algorithms for de novo motif-finding in biomedical sequences.

    PubMed

    Bi, Chengpeng

    2012-09-01

    The objectives of this study are to design and implement a new memetic algorithm for de novo motif discovery, which is then applied to detect important signals hidden in various biomedical molecular sequences. In this paper, memetic algorithms are developed and tested in de novo motif-finding problems. Several strategies in the algorithm design are employed that are to not only efficiently explore the multiple sequence local alignment space, but also effectively uncover the molecular signals. As a result, there are a number of key features in the implementation of the memetic motif-finding algorithm (MaMotif), including a chromosome replacement operator, a chromosome alteration-aware local search operator, a truncated local search strategy, and a stochastic operation of local search imposed on individual learning. To test the new algorithm, we compare MaMotif with a few of other similar algorithms using simulated and experimental data including genomic DNA, primary microRNA sequences (let-7 family), and transmembrane protein sequences. The new memetic motif-finding algorithm is successfully implemented in C++, and exhaustively tested with various simulated and real biological sequences. In the simulation, it shows that MaMotif is the most time-efficient algorithm compared with others, that is, it runs 2 times faster than the expectation maximization (EM) method and 16 times faster than the genetic algorithm-based EM hybrid. In both simulated and experimental testing, results show that the new algorithm is compared favorably or superior to other algorithms. Notably, MaMotif is able to successfully discover the transcription factors' binding sites in the chromatin immunoprecipitation followed by massively parallel sequencing (ChIP-Seq) data, correctly uncover the RNA splicing signals in gene expression, and precisely find the highly conserved helix motif in the transmembrane protein sequences, as well as rightly detect the palindromic segments in the primary micro

  11. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  12. A novel key-frame extraction approach for both video summary and video index.

    PubMed

    Lei, Shaoshuai; Xie, Gang; Yan, Gaowei

    2014-01-01

    Existing key-frame extraction methods are basically video summary oriented; yet the index task of key-frames is ignored. This paper presents a novel key-frame extraction approach which can be available for both video summary and video index. First a dynamic distance separability algorithm is advanced to divide a shot into subshots based on semantic structure, and then appropriate key-frames are extracted in each subshot by SVD decomposition. Finally, three evaluation indicators are proposed to evaluate the performance of the new approach. Experimental results show that the proposed approach achieves good semantic structure for semantics-based video index and meanwhile produces video summary consistent with human perception.

  13. Multimodal fusion of brain imaging data: A key to finding the missing link(s) in complex mental illness.

    PubMed

    Calhoun, Vince D; Sui, Jing

    2016-05-01

    It is becoming increasingly clear that combining multi-modal brain imaging data is able to provide more information for individual subjects by exploiting the rich multimodal information that exists. However, the number of studies that do true multimodal fusion (i.e. capitalizing on joint information among modalities) is still remarkably small given the known benefits. In part, this is because multi-modal studies require broader expertise in collecting, analyzing, and interpreting the results than do unimodal studies. In this paper, we start by introducing the basic reasons why multimodal data fusion is important and what it can do, and importantly how it can help us avoid wrong conclusions and help compensate for imperfect brain imaging studies. We also discuss the challenges that need to be confronted for such approaches to be more widely applied by the community. We then provide a review of the diverse studies that have used multimodal data fusion (primarily focused on psychosis) as well as provide an introduction to some of the existing analytic approaches. Finally, we discuss some up-and-coming approaches to multi-modal fusion including deep learning and multimodal classification which show considerable promise. Our conclusion is that multimodal data fusion is rapidly growing, but it is still underutilized. The complexity of the human brain coupled with the incomplete measurement provided by existing imaging technology makes multimodal fusion essential in order to mitigate against misdirection and hopefully provide a key to finding the missing link(s) in complex mental illness.

  14. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  15. Using experimental evolution to explore natural patterns between bacterial motility and resistance to bacteriophages

    PubMed Central

    Koskella, Britt; Taylor, Tiffany B; Bates, Jennifer; Buckling, Angus

    2011-01-01

    Resistance of bacteria to phages may be gained by alteration of surface proteins to which phages bind, a mechanism that is likely to be costly as these molecules typically have critical functions such as movement or nutrient uptake. To address this potential trade-off, we combine a systematic study of natural bacteria and phage populations with an experimental evolution approach. We compare motility, growth rate and susceptibility to local phages for 80 bacteria isolated from horse chestnut leaves and, contrary to expectation, find no negative association between resistance to phages and bacterial motility or growth rate. However, because correlational patterns (and their absence) are open to numerous interpretations, we test for any causal association between resistance to phages and bacterial motility using experimental evolution of a subset of bacteria in both the presence and absence of naturally associated phages. Again, we find no clear link between the acquisition of resistance and bacterial motility, suggesting that for these natural bacterial populations, phage-mediated selection is unlikely to shape bacterial motility, a key fitness trait for many bacteria in the phyllosphere. The agreement between the observed natural pattern and the experimental evolution results presented here demonstrates the power of this combined approach for testing evolutionary trade-offs. PMID:21509046

  16. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

    PubMed

    Nellore, Vishwa; Xi, Sam; Dwyer, Chris

    2015-12-22

    Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.

  17. A mathematical model for adaptive transport network in path finding by true slime mold.

    PubMed

    Tero, Atsushi; Kobayashi, Ryo; Nakagaki, Toshiyuki

    2007-02-21

    We describe here a mathematical model of the adaptive dynamics of a transport network of the true slime mold Physarum polycephalum, an amoeboid organism that exhibits path-finding behavior in a maze. This organism possesses a network of tubular elements, by means of which nutrients and signals circulate through the plasmodium. When the organism is put in a maze, the network changes its shape to connect two exits by the shortest path. This process of path-finding is attributed to an underlying physiological mechanism: a tube thickens as the flux through it increases. The experimental evidence for this is, however, only qualitative. We constructed a mathematical model of the general form of the tube dynamics. Our model contains a key parameter corresponding to the extent of the feedback regulation between the thickness of a tube and the flux through it. We demonstrate the dependence of the behavior of the model on this parameter.

  18. Experimental demonstration on the deterministic quantum key distribution based on entangled photons.

    PubMed

    Chen, Hua; Zhou, Zhi-Yuan; Zangana, Alaa Jabbar Jumaah; Yin, Zhen-Qiang; Wu, Juan; Han, Yun-Guang; Wang, Shuang; Li, Hong-Wei; He, De-Yong; Tawfeeq, Shelan Khasro; Shi, Bao-Sen; Guo, Guang-Can; Chen, Wei; Han, Zheng-Fu

    2016-02-10

    As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified "Ping-Pong"(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications.

  19. Experimental demonstration on the deterministic quantum key distribution based on entangled photons

    PubMed Central

    Chen, Hua; Zhou, Zhi-Yuan; Zangana, Alaa Jabbar Jumaah; Yin, Zhen-Qiang; Wu, Juan; Han, Yun-Guang; Wang, Shuang; Li, Hong-Wei; He, De-Yong; Tawfeeq, Shelan Khasro; Shi, Bao-Sen; Guo, Guang-Can; Chen, Wei; Han, Zheng-Fu

    2016-01-01

    As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications. PMID:26860582

  20. ANALYSIS OF METEOROLOGICAL CONDITIONS DURING THE 1977 ANCLOTE KEYS PLUME STUDY

    EPA Science Inventory

    Meteorological conditions are described and analyzed for nine experimental observation periods of the Anclote Keys Plume Study, which was conducted near Tampa, Florida during February 1977. The primary objective of the Plume Study was to investigate both the short and long range ...

  1. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  2. Experimental quantum data locking

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Cao, Zhu; Wu, Cheng; Fukuda, Daiji; You, Lixing; Zhong, Jiaqiang; Numata, Takayuki; Chen, Sijing; Zhang, Weijun; Shi, Sheng-Cai; Lu, Chao-Yang; Wang, Zhen; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei

    2016-08-01

    Classical correlation can be locked via quantum means: quantum data locking. With a short secret key, one can lock an exponentially large amount of information in order to make it inaccessible to unauthorized users without the key. Quantum data locking presents a resource-efficient alternative to one-time pad encryption which requires a key no shorter than the message. We report experimental demonstrations of a quantum data locking scheme originally proposed by D. P. DiVincenzo et al. [Phys. Rev. Lett. 92, 067902 (2004), 10.1103/PhysRevLett.92.067902] and a loss-tolerant scheme developed by O. Fawzi et al. [J. ACM 60, 44 (2013), 10.1145/2518131]. We observe that the unlocked amount of information is larger than the key size in both experiments, exhibiting strong violation of the incremental proportionality property of classical information theory. As an application example, we show the successful transmission of a photo over a lossy channel with quantum data (un)locking and error correction.

  3. Free-Space Quantum Key Distribution using Polarization Entangled Photons

    NASA Astrophysics Data System (ADS)

    Kurtsiefer, Christian

    2007-06-01

    We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source [1]. Based on a BB84-equivalent protocol, we generated without interruption over 10 hours a secret key free-space optical link distance of 1.5 km with a rate up to 950 bits per second after error correction and privacy amplification. Our system is based on two time stamp units and relies on no specific hardware channel for coincidence identification besides an IP link. For that, initial clock synchronization with an accuracy of better than 2 ns is achieved, based on a conventional NTP protocol and a tiered cross correlation of time tags on both sides. Time tags are used to servo a local clock, allowing a streamed measurement on correctly identified photon pairs. Contrary to the majority of quantum key distribution systems, this approach does not require a trusted large-bandwidth random number generator, but integrates that into the physical key generation process. We discuss our current progress of implementing a key distribution via an atmospherical link during daylight conditions, and possible attack scenarios on a physical timing information side channel to a entanglement-based key distribution system. [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006).

  4. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  5. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  6. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    PubMed

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  7. Key Findings of AAP Store Survey

    ERIC Educational Resources Information Center

    Melendes, Bob; And Others

    1977-01-01

    Results of the Association of American Publishers "College Bookstore Marketing Survey" in the fall of 1976 are summarized. The intent was to improve college textbook publisher services to college stores in the areas of order fulfillment, publication scheduling, print quantities, shipping, billing, and processing of returns. (LBH)

  8. Effective radiology dashboards: key research findings.

    PubMed

    Karami, Mahtab; Safdari, Reza; Rahimi, Azin

    2013-01-01

    Innovative organizations have access to information for business intelligence through the objectives displayed in dashboards. In healthcare organizations, where the goal is to improve quality of care along with reducing costs, the radiology department is important from both financial and clinical aspects. Therefore, how to manage this department has critical impact on the effectiveness and efficiency of the organization. Today, since the information in this department not only has different data structure but also is gathered from different data sources, a well defined, comprehensive dashboard can be an effective tool to enhance performance.

  9. Multimodal fusion of brain imaging data: A key to finding the missing link(s) in complex mental illness

    PubMed Central

    Calhoun, Vince D; Sui, Jing

    2016-01-01

    It is becoming increasingly clear that combining multi-modal brain imaging data is able to provide more information for individual subjects by exploiting the rich multimodal information that exists. However, the number of studies that do true multimodal fusion (i.e. capitalizing on joint information among modalities) is still remarkably small given the known benefits. In part, this is because multi-modal studies require broader expertise in collecting, analyzing, and interpreting the results than do unimodal studies. In this paper, we start by introducing the basic reasons why multimodal data fusion is important and what it can do, and importantly how it can help us avoid wrong conclusions and help compensate for imperfect brain imaging studies. We also discuss the challenges that need to be confronted for such approaches to be more widely applied by the community. We then provide a review of the diverse studies that have used multimodal data fusion (primarily focused on psychosis) as well as provide an introduction to some of the existing analytic approaches. Finally, we discuss some up-and-coming approaches to multi-modal fusion including deep learning and multimodal classification which show considerable promise. Our conclusion is that multimodal data fusion is rapidly growing, but it is still underutilized. The complexity of the human brain coupled with the incomplete measurement provided by existing imaging technology makes multimodal fusion essential in order to mitigate against misdirection and hopefully provide a key to finding the missing link(s) in complex mental illness. PMID:27347565

  10. Resolving Key Uncertainties in Subsurface Energy Recovery: One Role of In Situ Experimentation and URLs (Invited)

    NASA Astrophysics Data System (ADS)

    Elsworth, D.

    2013-12-01

    Significant uncertainties remain and influence the recovery of energy from the subsurface. These uncertainties include the fate and transport of long-lived radioactive wastes that result from the generation of nuclear power and have been the focus of an active network of international underground research laboratories dating back at least 35 years. However, other nascent carbon-free energy technologies including conventional and EGS geothermal methods, carbon-neutral methods such as carbon capture and sequestration and the utilization of reduced-carbon resources such as unconventional gas reservoirs offer significant challenges in their effective deployment. We illustrate the important role that in situ experiments may play in resolving behaviors at extended length- and time-scales for issues related to chemical-mechanical interactions. Significantly, these include the evolution of transport and mechanical characteristics of stress-sensitive fractured media and their influence of the long-term behavior of the system. Importantly, these interests typically relate to either creating reservoirs (hydroshearing in EGS reservoirs, artificial fractures in shales and coals) or maintaining seals at depth where the permeating fluids may include mixed brines, CO2, methane and other hydrocarbons. Critical questions relate to the interaction of these various fluid mixtures and compositions with the fractured substrate. Important needs are in understanding the roles of key processes (transmission, dissolution, precipitation, sorption and dynamic stressing) on the modification of effective stresses and their influence on the evolution of permeability, strength and induced seismicity on the resulting development of either wanted or unwanted fluid pathways. In situ experimentation has already contributed to addressing some crucial issues of these complex interactions at field scale. Important contributions are noted in understanding the fate and transport of long-lived wastes

  11. Implementation of continuous-variable quantum key distribution with discrete modulation

    NASA Astrophysics Data System (ADS)

    Hirano, Takuya; Ichikawa, Tsubasa; Matsubara, Takuto; Ono, Motoharu; Oguri, Yusuke; Namiki, Ryo; Kasai, Kenta; Matsumoto, Ryutaroh; Tsurumaru, Toyohiro

    2017-06-01

    We have developed a continuous-variable quantum key distribution (CV-QKD) system that employs discrete quadrature-amplitude modulation and homodyne detection of coherent states of light. We experimentally demonstrated automated secure key generation with a rate of 50 kbps when a quantum channel is a 10 km optical fibre. The CV-QKD system utilises a four-state and post-selection protocol and generates a secure key against the entangling cloner attack. We used a pulsed light source of 1550 nm wavelength with a repetition rate of 10 MHz. A commercially available balanced receiver is used to realise shot-noise-limited pulsed homodyne detection. We used a non-binary LDPC code for error correction (reverse reconciliation) and the Toeplitz matrix multiplication for privacy amplification. A graphical processing unit card is used to accelerate the software-based post-processing.

  12. Framework for assessing key variable dependencies in loose-abrasive grinding and polishing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, J.S.; Aikens, D.M.; Brown, N.J.

    1995-12-01

    This memo describes a framework for identifying all key variables that determine the figuring performance of loose-abrasive lapping and polishing machines. This framework is intended as a tool for prioritizing R&D issues, assessing the completeness of process models and experimental data, and for providing a mechanism to identify any assumptions in analytical models or experimental procedures. Future plans for preparing analytical models or performing experiments can refer to this framework in establishing the context of the work.

  13. Findings in Experimental Psychology as Functioning Principles of Theatrical Design.

    ERIC Educational Resources Information Center

    Caldwell, George

    A gestalt approach to theatrical design seems to provide some ready and stable explanations for a number of issues in the scenic arts. Gestalt serves as the theoretical base for a number of experiments in psychology whose findings appear to delineate the principles of art to be used in scene design. The fundamental notion of gestalt theory…

  14. Key optoelectronic properties of Diiodo-bis(carbamide)-zinc(II): An experimental and computational investigation

    NASA Astrophysics Data System (ADS)

    Shkir, Mohd.; Irfan, Ahmad; AlFaify, S.; Ganesh, V.; Arora, M.; Muhammad, Shabbir; Al-Sehemi, Abdullah G.; Yahia, I. S.

    2018-03-01

    Large size single crystals of Diiodo-bis(carbamide)-zinc(II) [ZnI2. 2[CO(NH2)2] were grown successfully for the first time by slow evaporation techniques at room temperature within the evaporation time of two weeks. The single phase and high crystalline nature of the grown crystals was confirmed by X-ray diffraction analysis. Quantum chemically the geometrical parameters were found in good correlation with experimental values calculated at B3LYP/6-31G* (LANL2DZ), B2LYPD/6-31G* (LANL2DZ), M062X/6-31G* (LANL2DZ) and MP2/6-31G* (LANL2DZ) level of theories. Additionally, the experimental vibrational modes also have shown a good agreement with calculated ones. The optical transparency and band gap were calculated and found to be ∼80% and 4.706 eV, respectively. The calculated value of HOMO-LUMO gap was found in correlation with experimental energy gap. The electronic properties were investigated by shedding light on the frontier molecular orbitals, partial density of states (PDOS), and total density of states (TDOS). The mechanical and dielectric studies show that the grown crystals possess quite good mechanical strength and dielectric constant. The dielectric loss revealed that the grown crystal contains low defects. The total ac electrical conductivity was increased with frequency and the frequency components confirm the sudden hoping mechanism in the grown crystal.

  15. Robust shot-noise measurement for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Kunz-Jacques, Sébastien; Jouguet, Paul

    2015-02-01

    We study a practical method to measure the shot noise in real time in continuous-variable quantum key distribution systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e., noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  16. Modelling efforts needed to advance herpes simplex virus (HSV) vaccine development: Key findings from the World Health Organization Consultation on HSV Vaccine Impact Modelling.

    PubMed

    Gottlieb, Sami L; Giersing, Birgitte; Boily, Marie-Claude; Chesson, Harrell; Looker, Katharine J; Schiffer, Joshua; Spicknall, Ian; Hutubessy, Raymond; Broutet, Nathalie

    2017-06-21

    Development of a vaccine against herpes simplex virus (HSV) is an important goal for global sexual and reproductive health. In order to more precisely define the health and economic burden of HSV infection and the theoretical impact and cost-effectiveness of an HSV vaccine, in 2015 the World Health Organization convened an expert consultation meeting on HSV vaccine impact modelling. The experts reviewed existing model-based estimates and dynamic models of HSV infection to outline critical future modelling needs to inform development of a comprehensive business case and preferred product characteristics for an HSV vaccine. This article summarizes key findings and discussions from the meeting on modelling needs related to HSV burden, costs, and vaccine impact, essential data needs to carry out those models, and important model components and parameters. Copyright © 2017. Published by Elsevier Ltd.

  17. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  18. YoungStar in Wisconsin: Analysis of Data as of July 2014. Executive Summary: Key Findings and Analysis

    ERIC Educational Resources Information Center

    Wisconsin Council on Children and Families, 2014

    2014-01-01

    YoungStar is a five-star quality rating system for child care providers based on education, learning environment, business methods, and practices around child health and well-being. Through this rating system, the state is addressing several key issues in Wisconsin's child care system. The rating system will: (1) Improve the overall quality of…

  19. Practical decoy state for quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Qi Bing; Zhao Yi

    2005-07-15

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less

  20. Evaluation of a primary school drug drama project: methodological issues and key findings.

    PubMed

    Starkey, F; Orme, J

    2001-10-01

    This paper describes the impact evaluation of a primary school drug drama project developed by a health promotion service and a theatre's education department in England. The project targeted 10-11 year olds in 41 schools with an interactive drama production and workshop day on attitudes, choices, decisions and risks of alcohol, tobacco and illegal drug use. Parents were also involved in parents' evenings and watching children's performances. The research consisted of both process evaluation, consultation with pupils, teachers, parents, actors and health promotion staff on the project itself, and impact evaluation which looked at potential changes in children's knowledge, attitudes and decision-making skills. This paper reports findings of the impact evaluation, from six of the schools participating in the project. The impact evaluation consisted of pre- and post-project testing using a 'draw and write' and a problem-solving exercise. These findings suggest that the project had a significant impact on the children's knowledge of names of specific illegal drugs, and on their awareness that alcohol and cigarettes were also drugs, and secondly encouraged the children to think in less stereotypical terms about drugs and drug users. The problem-solving exercise, involving decision-making scenarios, showed small but positive trends between pre- and post-project solutions in more than half of the response categories. Methodological difficulties relating to evaluating such a project are discussed.

  1. Preliminary Airspace Operations Simulations Findings Report

    NASA Technical Reports Server (NTRS)

    2005-01-01

    Provides preliminary findings of the initial series (normal operations and contingency management) of airspace operations simulations. The key elements of this report discuss feedback from controller subjects for UAS flight above FL430. Findings provide initial evaluation of routine UAS operations above dense ARTCC airspace (ZOB), and identify areas of further research, policy direction and procedural development. This document further serves as an addendum to the detailed AOS simulation plan (Deliverable SIM001), incorporating feedback from FAA air traffic personnel and Access 5 IPTs.

  2. Eating disorders need more experimental psychopathology.

    PubMed

    Jansen, Anita

    2016-11-01

    Eating disorders are severe and disabling mental disorders. The scientific study of eating disorders has expanded dramatically over the past few decades, and provided significant understanding of eating disorders and their treatments. Those significant advances notwithstanding, there is scant knowledge about key processes that are crucial to clinical improvement. The lack of understanding mechanisms that cause, maintain and change eating disorders, currently is the biggest problem facing the science of eating disorders. It hampers the development of really effective interventions that could be fine-tuned to target the mechanisms of change and, therefore, the development of more effective treatments. It is argued here that the science of eating disorders and eating disorder treatment could benefit tremendously from pure experimental studies into its mechanisms of change, that is, experimental psychopathology (EPP). To illustrate why eating disorders need more EPP research, some key symptoms - restriction of intake, binge eating and body overvaluation - will be discussed. EPP studies challenge some generally accepted views and offer a fresh new look at key symptoms. This will, consequently, better inform eating disorder treatments. Copyright © 2016. Published by Elsevier Ltd.

  3. The scientific consensus on climate change as a gateway belief: experimental evidence.

    PubMed

    van der Linden, Sander L; Leiserowitz, Anthony A; Feinberg, Geoffrey D; Maibach, Edward W

    2015-01-01

    There is currently widespread public misunderstanding about the degree of scientific consensus on human-caused climate change, both in the US as well as internationally. Moreover, previous research has identified important associations between public perceptions of the scientific consensus, belief in climate change and support for climate policy. This paper extends this line of research by advancing and providing experimental evidence for a "gateway belief model" (GBM). Using national data (N = 1104) from a consensus-message experiment, we find that increasing public perceptions of the scientific consensus is significantly and causally associated with an increase in the belief that climate change is happening, human-caused and a worrisome threat. In turn, changes in these key beliefs are predictive of increased support for public action. In short, we find that perceived scientific agreement is an important gateway belief, ultimately influencing public responses to climate change.

  4. The Scientific Consensus on Climate Change as a Gateway Belief: Experimental Evidence

    PubMed Central

    van der Linden, Sander L.; Leiserowitz, Anthony A.; Feinberg, Geoffrey D.; Maibach, Edward W.

    2015-01-01

    There is currently widespread public misunderstanding about the degree of scientific consensus on human-caused climate change, both in the US as well as internationally. Moreover, previous research has identified important associations between public perceptions of the scientific consensus, belief in climate change and support for climate policy. This paper extends this line of research by advancing and providing experimental evidence for a “gateway belief model” (GBM). Using national data (N = 1104) from a consensus-message experiment, we find that increasing public perceptions of the scientific consensus is significantly and causally associated with an increase in the belief that climate change is happening, human-caused and a worrisome threat. In turn, changes in these key beliefs are predictive of increased support for public action. In short, we find that perceived scientific agreement is an important gateway belief, ultimately influencing public responses to climate change. PMID:25714347

  5. Quasi-experimental study designs series-paper 9: collecting data from quasi-experimental studies.

    PubMed

    Aloe, Ariel M; Becker, Betsy Jane; Duvendack, Maren; Valentine, Jeffrey C; Shemilt, Ian; Waddington, Hugh

    2017-09-01

    To identify variables that must be coded when synthesizing primary studies that use quasi-experimental designs. All quasi-experimental (QE) designs. When designing a systematic review of QE studies, potential sources of heterogeneity-both theory-based and methodological-must be identified. We outline key components of inclusion criteria for syntheses of quasi-experimental studies. We provide recommendations for coding content-relevant and methodological variables and outlined the distinction between bivariate effect sizes and partial (i.e., adjusted) effect sizes. Designs used and controls used are viewed as of greatest importance. Potential sources of bias and confounding are also addressed. Careful consideration must be given to inclusion criteria and the coding of theoretical and methodological variables during the design phase of a synthesis of quasi-experimental studies. The success of the meta-regression analysis relies on the data available to the meta-analyst. Omission of critical moderator variables (i.e., effect modifiers) will undermine the conclusions of a meta-analysis. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Public Expenditures on Children through 2008: Key Facts

    ERIC Educational Resources Information Center

    Macomber, Jennifer; Isaacs, Julia; Kent, Adam; Vericker, Tracy

    2010-01-01

    This report provides the key findings on the public spending on children through 2008. They are: (1) Spending on children increased under the American Recovery and Reinvestment Act (ARRA) and other stimulus spending, but not proportionately to other federal spending. As ARRA expires, we project that spending on children will decline, assuming no…

  7. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  8. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  9. Finding food

    PubMed Central

    Forsyth, Ann; Lytle, Leslie; Riper, David Van

    2011-01-01

    A significant amount of travel is undertaken to find food. This paper examines challenges in measuring access to food using Geographic Information Systems (GIS), important in studies of both travel and eating behavior. It compares different sources of data available including fieldwork, land use and parcel data, licensing information, commercial listings, taxation data, and online street-level photographs. It proposes methods to classify different kinds of food sales places in a way that says something about their potential for delivering healthy food options. In assessing the relationship between food access and travel behavior, analysts must clearly conceptualize key variables, document measurement processes, and be clear about the strengths and weaknesses of data. PMID:21837264

  10. Establishment of Aedes albopictus (Diptera: Culicidae) in the Florida Keys, 2001-2017.

    PubMed

    Murray, Heidi L; Pruszynski, Catherine A; Leal, Andrea L; Hribar, Lawrence J

    2018-06-23

    The presence of Aedes albopictus (Skuse) was first reported in the Florida Keys in 1993. Despite extensive surveillance, the Florida Keys Mosquito Control District (FKMCD) only collected specimens occasionally on a few islands, some years finding no evidence of the invasive species. In 2013-2017, FKMCD witnessed a sudden increase in population size and geographic extent of Ae. albopictus. Samples of Ae. albopictus have now been identified on 30 different islands in the Florida Keys. Three islands in particular (Key Largo, Big Pine Key, and Stock Island) have produced multiple positive samples during at least 4 of the last 5 yr, suggesting establishment of the invasive species. FKMCD continues to monitor Ae. albopictus throughout the Keys and make extensive efforts to reduce population abundance and geographic extent of this disease vector.

  11. The Genetics of Autism: Key Issues, Recent Findings and Clinical Implications

    PubMed Central

    El-Fishawy, Paul; State, Matthew W.

    2010-01-01

    Autism spectrum disorders (ASD’S) are highly heritable. Consequently, gene discovery promises to help illuminate the pathophysiology of these syndromes, yielding important opportunities for the development of novel treatments and a more nuanced understanding of the natural history of these disorders. Although the underlying genetic architecture of ASD’s is not yet known, the literature demonstrates that it is not, writ large, a monogenic disorder with Mendelian inheritance, but rather a group of complex genetic syndromes with risk deriving from genetic variations in multiple genes. The widely accepted “Common Disease-Common Variant” hypothesis predicts that the risk alleles in ASD’s and other complex disorders will be common in the general population. However, recent evidence from gene discovery efforts in a wide range of diseases raises important questions regarding the overall applicability of the theory and the extent of its usefulness in explaining individual genetic liability. In contrast, considerable evidence points to the importance of rare alleles both with regard to their value in providing a foothold into the molecular mechanisms of ASD and their overall contribution to the population-wide risk. This chapter reviews the origins of the common versus rare variant debate, highlights recent findings in the field, and addresses the clinical implications of both common and rare variant discoveries. PMID:20159341

  12. What to see and where to find it on the Priest River Experimental Forest Idaho

    Treesearch

    C. A. Wellner; R. F. Watt; A. E. Helmers

    1951-01-01

    Dedicated to the development of better methods of management and protection of forested lands, the Priest River Experimental Forest is maintained for research and demonstration purposes by the Northern Rocky Mountain Forest and Range Experiment Station of the Forest Service, U. S. Department of Agriculture. The chart on the opposite page shows where the Experimental...

  13. Middle Leadership: A Key Role of Numeracy Reform

    ERIC Educational Resources Information Center

    Jorgensen, Robyn

    2016-01-01

    This paper reports on a large national project that explored successful numeracy practices in remote and very remote schools. While there have been a number of significant findings, the middle leader has been identified as a key role in the development of successful numeracy/mathematics practices in schools. The middle leader plays a critical role…

  14. [Key content and formulation of national Chinese materia medica resources survey at county level].

    PubMed

    Lu, Jian-Wei; Zhang, Xiao-Bo; Li, Hai-Tao; Guo, Lan-Ping; Zhao, Run-Huai; Zhang, Ben-Gang; Sun, Li-Ying; Huang, Lu-Qi

    2013-08-01

    According to National Census for Water, National Population Census, National Land and Resources Survey, and work experience of experimental measures for national Chinese materia medica resources(CMMR) survey,the national CMMR survey at the county level is the key point of whole survey, that includes organization and management, field survey, sorting data three key links. Organization and management works of national CMMR survey needs to finish four key contents, there are definite goals and tasks, practicable crew, preparation directory, and security assurance. Field survey works of the national CMMR survey needs to finish five key contents, there are preparation works for field survey, the choice of the key survey area (samples), fill in the questionnaire, video data collection, specimen and other physical collection. Sorting data works of the national CMMR survey needs to finish tree key contents, there are data, specimen and census results.

  15. Multi-Year Leaf-Level Response to Sub-Ambient and Elevated Experimental CO2 in Betula nana

    PubMed Central

    Broere, Tom; Kürschner, Wolfram M.; Donders, Timme H.; Wagner-Cremer, Friederike

    2016-01-01

    The strong link between stomatal frequency and CO2 in woody plants is key for understanding past CO2 dynamics, predicting future change, and evaluating the significant role of vegetation in the hydrological cycle. Experimental validation is required to evaluate the long-term adaptive leaf response of C3 plants to CO2 conditions; however, studies to date have only focused on short-term single-season experiments and may not capture (1) the full ontogeny of leaves to experimental CO2 exposure or (2) the true adjustment of structural stomatal properties to CO2, which we postulate is likely to occur over several growing seasons. We conducted controlled growth chamber experiments at 150 ppmv, 450 ppmv and 800 ppmv CO2 with woody C3 shrub Betula nana (dwarf birch) over two successive annual growing seasons and evaluated the structural stomatal response to atmospheric CO2 conditions. We find that while some adjustment of leaf morphological and stomatal parameters occurred in the first growing season where plants are exposed to experimental CO2 conditions, amplified adjustment of non-plastic stomatal properties such as stomatal conductance occurred in the second year of experimental CO2 exposure. We postulate that the species response limit to CO2 of B. nana may occur around 400–450 ppmv. Our findings strongly support the necessity for multi-annual experiments in C3 perennials in order to evaluate the effects of environmental conditions and provide a likely explanation of the contradictory results between historical and palaeobotanical records and experimental data. PMID:27285314

  16. Three-particle hyper-entanglement: teleportation and quantum key distribution

    NASA Astrophysics Data System (ADS)

    Perumangatt, Chithrabhanu; Abdul Rahim, Aadhi; Salla, Gangi Reddy; Prabhakar, Shashi; Samanta, Goutam Kumar; Paul, Goutam; Singh, Ravindra Pratap

    2015-10-01

    We present a scheme to generate three-particle hyper-entanglement utilizing polarization and orbital angular momentum (OAM) of photons. We show that the generated state can be used to teleport a two-qubit state described by the polarization and the OAM. The proposed quantum system has also been used to describe a new efficient quantum key distribution (QKD) protocol. We give a sketch of the experimental arrangement to realize the proposed teleportation and the QKD.

  17. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 1999.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This booklet presents an overview of the findings pertaining to eighth, tenth, and twelfth grade students from the 1999 Monitoring the Future Study. This overview focuses on recent trends in the use of various licit and illicit drugs. It also examines trends in the levels of perceived risk and personal disapproval associated with each drug, which…

  18. A Survey of American Voter Attitudes Concerning Child Care Services: Highlights and Key Findings.

    ERIC Educational Resources Information Center

    Marttila & Kiley, Inc., Boston, MA.

    A national telephone survey of a representative sample of 901 voters was conducted to measure voter attitudes toward child care and, in particular, the Act for Better Child Care Services (ABC). The survey also explored attitudes toward parental leave. Findings indicated that: (1) a majority of Americans think of child care as an urgent need and…

  19. Quantum hacking on quantum key distribution using homodyne detection

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  20. Experimental integration of quantum key distribution and gigabit-capable passive optical network

    NASA Astrophysics Data System (ADS)

    Sun, Wei; Wang, Liu-Jun; Sun, Xiang-Xiang; Mao, Yingqiu; Yin, Hua-Lei; Wang, Bi-Xiao; Chen, Teng-Yun; Pan, Jian-Wei

    2018-01-01

    Quantum key distribution (QKD) ensures information-theoretic security for the distribution of random bits between two remote parties. To extend QKD applications to fiber-to-the-home optical communications, such as gigabit-capable passive optical networks (GPONs), an effective method is the use of wavelength-division multiplexing. However, the Raman scattering noise from intensive classical traffic and the huge loss introduced by the beam splitter in a GPON severely limits the performance of QKD. Here, we demonstrate the integration of QKD and a commercial GPON system with fiber lengths up to 14 km, in which the maximum splitting ratio of the beam splitter reaches 1:64. By placing the QKD transmitter on the optical line terminal side, we reduce the Raman noise collected at the QKD receiver. Using a bypass structure, the loss of the beam splitter is circumvented effectively. Our results pave the way to extending the applications of QKD to last-mile communications.

  1. Early-Life Nutritional Programming of Type 2 Diabetes: Experimental and Quasi-Experimental Evidence.

    PubMed

    Vaiserman, Alexander M

    2017-03-05

    Consistent evidence from both experimental and human studies suggest that inadequate nutrition in early life can contribute to risk of developing metabolic disorders including type 2 diabetes (T2D) in adult life. In human populations, most findings supporting a causative relationship between early-life malnutrition and subsequent risk of T2D were obtained from quasi-experimental studies ('natural experiments'). Prenatal and/or early postnatal exposures to famine were demonstrated to be associated with higher risk of T2D in many cohorts around the world. Recent studies have highlighted the importance of epigenetic regulation of gene expression as a possible major contributor to the link between the early-life famine exposure and T2D in adulthood. Findings from these studies suggest that prenatal exposure to the famine may result in induction of persistent epigenetic changes that have adaptive significance in postnatal development but can predispose to metabolic disorders including T2D at the late stages of life. In this review, quasi-experimental data on the developmental programming of T2D are summarized and recent research findings on changes in DNA methylation that mediate these effects are discussed.

  2. Early-Life Nutritional Programming of Type 2 Diabetes: Experimental and Quasi-Experimental Evidence

    PubMed Central

    Vaiserman, Alexander M.

    2017-01-01

    Consistent evidence from both experimental and human studies suggest that inadequate nutrition in early life can contribute to risk of developing metabolic disorders including type 2 diabetes (T2D) in adult life. In human populations, most findings supporting a causative relationship between early-life malnutrition and subsequent risk of T2D were obtained from quasi-experimental studies (‘natural experiments’). Prenatal and/or early postnatal exposures to famine were demonstrated to be associated with higher risk of T2D in many cohorts around the world. Recent studies have highlighted the importance of epigenetic regulation of gene expression as a possible major contributor to the link between the early-life famine exposure and T2D in adulthood. Findings from these studies suggest that prenatal exposure to the famine may result in induction of persistent epigenetic changes that have adaptive significance in postnatal development but can predispose to metabolic disorders including T2D at the late stages of life. In this review, quasi-experimental data on the developmental programming of T2D are summarized and recent research findings on changes in DNA methylation that mediate these effects are discussed. PMID:28273874

  3. Critical evaluation of challenges and future use of animals in experimentation for biomedical research

    PubMed Central

    Singh, Vijay Pal; Pratap, Kunal; Sinha, Juhi; Desiraju, Koundinya; Bahal, Devika; Kukreti, Ritushree

    2016-01-01

    Animal experiments that are conducted worldwide contribute to significant findings and breakthroughs in the understanding of the underlying mechanisms of various diseases, bringing up appropriate clinical interventions. However, their predictive value is often low, leading to translational failure. Problems like translational failure of animal studies and poorly designed animal experiments lead to loss of animal lives and less translatable data which affect research outcomes ethically and economically. Due to increasing complexities in animal usage with changes in public perception and stringent guidelines, it is becoming difficult to use animals for conducting studies. This review deals with challenges like poor experimental design and ethical concerns and discusses key concepts like sample size, statistics in experimental design, humane endpoints, economic assessment, species difference, housing conditions, and systematic reviews and meta-analyses that are often neglected. If practiced, these strategies can refine the procedures effectively and help translate the outcomes efficiently. PMID:27694614

  4. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  5. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this presentation is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  6. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  7. The Massabesic Experimental Forest

    Treesearch

    Thomas W. McConkey; Wendell E. Smith

    1958-01-01

    White pine and fire! These two - the tree and its destroyer, fire - are keys to the history and present make-up of the research program on the Massabesic Experimental Forest at Alfred, Maine. The Forest was established in the late 1930's to study the management of eastern white pine. During World War II, it was shut down, and reopened again in 1946. Then, in 1947...

  8. Quantum key distribution without detector vulnerabilities using optically seeded lasers

    NASA Astrophysics Data System (ADS)

    Comandar, L. C.; Lucamarini, M.; Fröhlich, B.; Dynes, J. F.; Sharpe, A. W.; Tam, S. W.-B.; Yuan, Z. L.; Penty, R. V.; Shields, A. J.

    2016-05-01

    Security in quantum cryptography is continuously challenged by inventive attacks targeting the real components of a cryptographic set-up, and duly restored by new countermeasures to foil them. Owing to their high sensitivity and complex design, detectors are the most frequently attacked components. It was recently shown that two-photon interference from independent light sources can be used to remove any vulnerability from detectors. This new form of detection-safe quantum key distribution (QKD), termed measurement-device-independent (MDI), has been experimentally demonstrated but with modest key rates. Here, we introduce a new pulsed laser seeding technique to obtain high-visibility interference from gain-switched lasers and thereby perform MDI-QKD with unprecedented key rates in excess of 1 megabit per second in the finite-size regime. This represents a two to six orders of magnitude improvement over existing implementations and supports the new scheme as a practical resource for secure quantum communications.

  9. Key Findings of the AMAP 2015 Assessment on Black Carbon and Tropospheric Ozone as Arctic Climate Forcers

    NASA Astrophysics Data System (ADS)

    Quinn, P.

    2015-12-01

    emission from each sector and region) were also calculated. Key findings from the 2015 assessment will be presented.

  10. Using findings in multimedia learning to inform technology-based behavioral health interventions.

    PubMed

    Aronson, Ian David; Marsch, Lisa A; Acosta, Michelle C

    2013-09-01

    Clinicians and researchers are increasingly using technology-based behavioral health interventions to improve intervention effectiveness and to reach underserved populations. However, these interventions are rarely informed by evidence-based findings of how technology can be optimized to promote acquisition of key skills and information. At the same time, experts in multimedia learning generally do not apply their findings to health education or conduct research in clinical contexts. This paper presents an overview of some key aspects of multimedia learning research that may allow those developing health interventions to apply informational technology with the same rigor as behavioral science content. We synthesized empirical multimedia learning literature from 1992 to 2011. We identified key findings and suggested a framework for integrating technology with educational and behavioral science theory. A scientific, evidence-driven approach to developing technology-based interventions can yield greater effectiveness, improved fidelity, increased outcomes, and better client service.

  11. Poor Families Striving to Save in Matched Children's Savings Accounts: Findings from a Randomized Experimental Design in Uganda.

    PubMed

    Karimli, Leyla; Ssewamala, Fred M; Neilands, Torsten B

    2014-12-01

    This study examines participants' savings in children's savings accounts (CSAs) set up for AIDS-orphaned children ages 10-15 in Uganda. Using a cluster randomized experimental design, we examine the extent to which families participating in a CSA program report more savings than their counterparts not participating in the program, explore the extent to which families who participate in the CSA program report using formal financial institutions compared with families who do not have a CSA, and consider whether families participating in the CSA program bring new money into the CSA or whether they reshuffle existing household assets. We find that participating in a CSA increased families' likelihood to report having saved money. However, our results show no intervention effect either on the amount of self-reported savings or on the likelihood of using formal financial institutions. Further research is needed to understand whether use of a CSA helps families generate new wealth.

  12. Opening the Implicit Leadership Theories’ Black Box: An Experimental Approach with Conjoint Analysis

    PubMed Central

    Tavares, Gustavo M.; Sobral, Filipe; Goldszmidt, Rafael; Araújo, Felipe

    2018-01-01

    Although research on implicit leadership theories (ILTs) has concentrated on determining which attributes define a leadership prototype, little attention has been paid to testing the relative importance of each of these attributes for individuals’ leadership perceptions. Building on socio-cognitive theories of impression processes, we experimentally explore the formation of leadership perceptions based on the recognition of six key attributes in a series of three experimental studies comprising 566 US-based participants recruited online via Amazon Mechanical Turk. Our results show that while certain attributes play an important role in the leader categorization process, others are less relevant. We also demonstrate that some attributes’ importance is contingent on the presence of other attributes and on the leadership schema type activated in respondents’ minds. Consistent with the Leadership Categorization Theory, our findings support the premise that individuals cognitively hold a superordinate leadership prototype, which imposes constraints on their more basic level prototypes. We discuss the implications of these results for leadership theory and practice. PMID:29467706

  13. Opening the Implicit Leadership Theories' Black Box: An Experimental Approach with Conjoint Analysis.

    PubMed

    Tavares, Gustavo M; Sobral, Filipe; Goldszmidt, Rafael; Araújo, Felipe

    2018-01-01

    Although research on implicit leadership theories (ILTs) has concentrated on determining which attributes define a leadership prototype, little attention has been paid to testing the relative importance of each of these attributes for individuals' leadership perceptions. Building on socio-cognitive theories of impression processes, we experimentally explore the formation of leadership perceptions based on the recognition of six key attributes in a series of three experimental studies comprising 566 US-based participants recruited online via Amazon Mechanical Turk. Our results show that while certain attributes play an important role in the leader categorization process, others are less relevant. We also demonstrate that some attributes' importance is contingent on the presence of other attributes and on the leadership schema type activated in respondents' minds. Consistent with the Leadership Categorization Theory, our findings support the premise that individuals cognitively hold a superordinate leadership prototype, which imposes constraints on their more basic level prototypes. We discuss the implications of these results for leadership theory and practice.

  14. Collective attacks and unconditional security in continuous variable quantum key distribution.

    PubMed

    Grosshans, Frédéric

    2005-01-21

    We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.

  15. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  16. Finding a Voice through Research

    ERIC Educational Resources Information Center

    Lobo, Jose; Vizcaino, Alida

    2006-01-01

    One question guided this experimental study: What impact does the change from teacher training to educational research have on university teachers' methodology and attitudes to teaching? To find answers to this question, the researchers selected five teachers of English as a Foreign Language (EFL) at the language centre of a private university on…

  17. IPCC Climate Change 2013: Mitigation of Climate Change - Key Findings and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Sokona, Youba

    2014-05-01

    The Working Group III contribution to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, Mitigation of Climate Change, examines the results of scientific research about mitigation, with special attention on how knowledge has evolved since the Fourth Assessment Report published in 2007. Throughout, the focus is on the implications of its findings for policy, without being prescriptive about the particular policies that governments and other important participants in the policy process should adopt. The report begins with a framing of important concepts and methods that help to contextualize the findings presented throughout the assessment. The valuation of risks and uncertainties, ethical concepts and the context of sustainable development and equity are among the guiding principles for the assessment of mitigation strategies. The report highlights past trends in stocks and flows of greenhouse gases and the factors that drive emissions at global, regional, and sectoral scales including economic growth, technology or population changes. It provides analyses of the technological, economic and institutional requirements of long-term mitigation scenarios and details on mitigation measures and policies that are applied in different economic sectors and human settlements. It then discusses interactions of mitigation policies and different policy instrument types at national, regional and global governance levels and between economic sectors, The Working Group III report comprises 16 chapters and in assembling this assessment authors were guided by the principles of the IPCC mandate: to be explicit about mitigation options, to be explicit about their costs and about their risks and opportunities vis-à-vis other development priorities, and to be explicit about the underlying criteria, concepts, and methods for evaluating alternative policies.

  18. Mind the Gap: The Effect of Keyboard Key Gap and Pitch on Typing Speed, Accuracy, and Usability, Part 3.

    PubMed

    Madison, Heather; Pereira, Anna; Korshøj, Mette; Taylor, Laura; Barr, Alan; Rempel, David

    2015-11-01

    The aim of this study was to evaluate the effects of key gap (distance between edges of keys) on computer keyboards on typing speed, percentage error, preference, and usability. In Parts 1 and 2 of this series, a small key pitch (center-to-center distance between keys) was found to reduce productivity and usability, but the findings were confounded by gap. In this study, key gap was varied while holding key pitch constant. Participants (N = 25) typed on six keyboards, which differed in gap between keys (1, 3, or 5 mm) and pitch (16 or 17 mm; distance between centers of keys), while typing speed, accuracy, usability, and preference were measured. There was no statistical interaction between gap and pitch. Accuracy was better for keyboards with a gap of 5 mm compared to a 1-mm gap (p = .04). Net typing speed (p = .02), accuracy (p = .002), and most usability measures were better for keyboards with a pitch of 17 mm compared to a 16-mm pitch. The study findings support keyboard designs with a gap between keys of 5 mm over 1 mm and a key pitch of 17 mm over 16 mm. These findings may influence keyboard standards and design, especially the design of small keyboards used with portable devices, such as tablets and laptops. © 2015, Human Factors and Ergonomics Society.

  19. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    NASA Astrophysics Data System (ADS)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  20. An overview of key silvicultural information for ponderosa pine

    Treesearch

    John Fiske; John Tappeiner

    2005-01-01

    This paper provides a selected list of classical references for the important silvicultural findings for ponderosa pine, and categorizes some of the key current literature, as well as some of the older, lesser known but important literature. The paper also provides some history of scientific developments, and sources of further information.

  1. Mining the key predictors for event outbreaks in social networks

    NASA Astrophysics Data System (ADS)

    Yi, Chengqi; Bao, Yuanyuan; Xue, Yibo

    2016-04-01

    It will be beneficial to devise a method to predict a so-called event outbreak. Existing works mainly focus on exploring effective methods for improving the accuracy of predictions, while ignoring the underlying causes: What makes event go viral? What factors that significantly influence the prediction of an event outbreak in social networks? In this paper, we proposed a novel definition for an event outbreak, taking into account the structural changes to a network during the propagation of content. In addition, we investigated features that were sensitive to predicting an event outbreak. In order to investigate the universality of these features at different stages of an event, we split the entire lifecycle of an event into 20 equal segments according to the proportion of the propagation time. We extracted 44 features, including features related to content, users, structure, and time, from each segment of the event. Based on these features, we proposed a prediction method using supervised classification algorithms to predict event outbreaks. Experimental results indicate that, as time goes by, our method is highly accurate, with a precision rate ranging from 79% to 97% and a recall rate ranging from 74% to 97%. In addition, after applying a feature-selection algorithm, the top five selected features can considerably improve the accuracy of the prediction. Data-driven experimental results show that the entropy of the eigenvector centrality, the entropy of the PageRank, the standard deviation of the betweenness centrality, the proportion of re-shares without content, and the average path length are the key predictors for an event outbreak. Our findings are especially useful for further exploring the intrinsic characteristics of outbreak prediction.

  2. Secure communications using nonlinear silicon photonic keys.

    PubMed

    Grubel, Brian C; Bosworth, Bryan T; Kossey, Michael R; Cooper, A Brinton; Foster, Mark A; Foster, Amy C

    2018-02-19

    We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities. Compared to a large, electronically stored one-time pad, our method provisions large amounts of information within the intrinsically complex nanostructure of the micro-cavities. By probing a micro-cavity with a rapid sequence of spectrally-encoded ultrafast optical pulses and measuring the lightwave responses, we experimentally demonstrate the ability to extract 2.4 Gb of key material from a single micro-cavity device. Subsequently, in a secure communication experiment with pairs of devices, we achieve bit error rates below 10 -5 at code rates of up to 0.1. The PUFs' responses are never transmitted over the channel or stored in digital memory, thus enhancing the security of the system. Additionally, the micro-cavity PUFs are extremely small, inexpensive, robust, and fully compatible with telecommunications infrastructure, components, and electronic fabrication. This approach can serve one-time pad or public key exchange applications where high security is required.

  3. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources

    PubMed Central

    Wang, Qin; Wang, Xiang-Bin

    2014-01-01

    We present a model on the simulation of the measurement-device independent quantum key distribution (MDI-QKD) with phase randomized general sources. It can be used to predict experimental observations of a MDI-QKD with linear channel loss, simulating corresponding values for the gains, the error rates in different basis, and also the final key rates. Our model can be applicable to the MDI-QKDs with arbitrary probabilistic mixture of different photon states or using any coding schemes. Therefore, it is useful in characterizing and evaluating the performance of the MDI-QKD protocol, making it a valuable tool in studying the quantum key distributions. PMID:24728000

  4. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  5. Assessing Pupils' Skills in Experimentation

    ERIC Educational Resources Information Center

    Hammann, Marcus; Phan, Thi Thanh Hoi; Ehmer, Maike; Grimm, Tobias

    2008-01-01

    This study is concerned with different forms of assessment of pupils' skills in experimentation. The findings of three studies are reported. Study 1 investigates whether it is possible to develop reliable multiple-choice tests for the skills of forming hypotheses, designing experiments and analysing experimental data. Study 2 compares scores from…

  6. Approaches to a global quantum key distribution network

    NASA Astrophysics Data System (ADS)

    Islam, Tanvirul; Bedington, Robert; Ling, Alexander

    2017-10-01

    Progress in realising quantum computers threatens to weaken existing public key encryption infrastructure. A global quantum key distribution (QKD) network can play a role in computational attack-resistant encryption. Such a network could use a constellation of high altitude platforms such as airships and satellites as trusted nodes to facilitate QKD between any two points on the globe on demand. This requires both space-to-ground and inter-platform links. However, the prohibitive cost of traditional satellite based development limits the experimental work demonstrating relevant technologies. To accelerate progress towards a global network, we use an emerging class of shoe-box sized spacecraft known as CubeSats. We have designed a polarization entangled photon pair source that can operate on board CubeSats. The robustness and miniature form factor of our entanglement source makes it especially suitable for performing pathfinder missions that studies QKD between two high altitude platforms. The technological outcomes of such mission would be the essential building blocks for a global QKD network.

  7. The experimental verification on the shear bearing capacity of exposed steel column foot

    NASA Astrophysics Data System (ADS)

    Xijin, LIU

    2017-04-01

    In terms of the shear bearing capacity of the exposed steel column foot, there are many researches both home and abroad. However, the majority of the researches are limited to the theoretical analysis sector and few of them make the experimental analysis. In accordance with the prototype of an industrial plant in Beijing, this paper designs the experimental model. The experimental model is composed of six steel structural members in two groups, with three members without shear key and three members with shear key. The paper checks the shear bearing capacity of two groups respectively under different axial forces. The experiment shows: The anchor bolt of the exposed steel column foot features relatively large shear bearing capacity which could not be neglected. The results deducted through calculation methods proposed by this paper under two situations match the experimental results in terms of the shear bearing capacity of the steel column foot. Besides, it also proposed suggestions on revising the Code for Design of Steel Structure in the aspect of setting the shear key in the steel column foot.

  8. Publication bias and the failure of replication in experimental psychology.

    PubMed

    Francis, Gregory

    2012-12-01

    Replication of empirical findings plays a fundamental role in science. Among experimental psychologists, successful replication enhances belief in a finding, while a failure to replicate is often interpreted to mean that one of the experiments is flawed. This view is wrong. Because experimental psychology uses statistics, empirical findings should appear with predictable probabilities. In a misguided effort to demonstrate successful replication of empirical findings and avoid failures to replicate, experimental psychologists sometimes report too many positive results. Rather than strengthen confidence in an effect, too much successful replication actually indicates publication bias, which invalidates entire sets of experimental findings. Researchers cannot judge the validity of a set of biased experiments because the experiment set may consist entirely of type I errors. This article shows how an investigation of the effect sizes from reported experiments can test for publication bias by looking for too much successful replication. Simulated experiments demonstrate that the publication bias test is able to discriminate biased experiment sets from unbiased experiment sets, but it is conservative about reporting bias. The test is then applied to several studies of prominent phenomena that highlight how publication bias contaminates some findings in experimental psychology. Additional simulated experiments demonstrate that using Bayesian methods of data analysis can reduce (and in some cases, eliminate) the occurrence of publication bias. Such methods should be part of a systematic process to remove publication bias from experimental psychology and reinstate the important role of replication as a final arbiter of scientific findings.

  9. Quantum key distribution session with 16-dimensional photonic states.

    PubMed

    Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  10. Quantum key distribution session with 16-dimensional photonic states

    NASA Astrophysics Data System (ADS)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-07-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  11. Key Program Findings and Insights From the Baby-Friendly Hawaii Project.

    PubMed

    Kahin, Sahra A; McGurk, Meghan; Hansen-Smith, Heidi; West, Margaret; Li, Ruowei; Melcher, Carolyn Lopez

    2017-05-01

    Breastfeeding is the optimal method for infant feeding. In the United States, 81.1% of mothers initiate breastfeeding; however, only 44.4% and 22.3% of mothers are exclusively breastfeeding at 3 and 6 months, respectively. Research aim: The Centers for Disease Control and Prevention provides guidance and funding to state health departments to support strategies to improve breastfeeding policies and practices in the hospital, community, and worksite settings. In 2010, the Hawaii State Department of Health received support from the Centers for Disease Control and Prevention to launch the Baby-Friendly Hawaii Project (BFHP) to increase the number of Hawaii hospitals that provide maternity care consistent with the Ten Steps to Successful Breastfeeding and increase the rate of women who remain exclusively breastfeeding throughout their hospital stay. For this article, we examined the BFHP's final evaluation report and Hawaii breastfeeding and maternity care data to identify the role of the BFHP in facilitating improvements in maternity care practices and breastfeeding rates. Since 2010, 52 hospital site visits, 58 trainings, and ongoing technical assistance were administered, and more than 750 staff and health professionals from BFHP hospitals were trained. Hawaii's overall quality composite Maternity Practices in Infant Nutrition and Care score increased from 65 (out of 100) in 2009 to 76 in 2011 and 80 in 2013, and Newborn Screening Data showed an increase in statewide exclusive breastfeeding from 59.7% in 2009 to 77.0% in 2014. Implementation and findings from the BFHP can inform future planning at the state and federal levels on maternity care practices that can improve breastfeeding.

  12. Key Mites Commonly Associated With the Southern Pine Beetle

    Treesearch

    D.N. Kinn

    1976-01-01

    This paper outlines a method of preparing mites for microscopic examination and contains a simple key to the 15 species of mites commonly associated with the southern pine bark beetle. Research workers wanting to identify these mites and others curious about them, but untrained in acarology, should find little difficulty in making identifications.

  13. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  14. Experimental statistics for biological sciences.

    PubMed

    Bang, Heejung; Davidian, Marie

    2010-01-01

    In this chapter, we cover basic and fundamental principles and methods in statistics - from "What are Data and Statistics?" to "ANOVA and linear regression," which are the basis of any statistical thinking and undertaking. Readers can easily find the selected topics in most introductory statistics textbooks, but we have tried to assemble and structure them in a succinct and reader-friendly manner in a stand-alone chapter. This text has long been used in real classroom settings for both undergraduate and graduate students who do or do not major in statistical sciences. We hope that from this chapter, readers would understand the key statistical concepts and terminologies, how to design a study (experimental or observational), how to analyze the data (e.g., describe the data and/or estimate the parameter(s) and make inference), and how to interpret the results. This text would be most useful if it is used as a supplemental material, while the readers take their own statistical courses or it would serve as a great reference text associated with a manual for any statistical software as a self-teaching guide.

  15. Critical evaluation of challenges and future use of animals in experimentation for biomedical research.

    PubMed

    Singh, Vijay Pal; Pratap, Kunal; Sinha, Juhi; Desiraju, Koundinya; Bahal, Devika; Kukreti, Ritushree

    2016-12-01

    Animal experiments that are conducted worldwide contribute to significant findings and breakthroughs in the understanding of the underlying mechanisms of various diseases, bringing up appropriate clinical interventions. However, their predictive value is often low, leading to translational failure. Problems like translational failure of animal studies and poorly designed animal experiments lead to loss of animal lives and less translatable data which affect research outcomes ethically and economically. Due to increasing complexities in animal usage with changes in public perception and stringent guidelines, it is becoming difficult to use animals for conducting studies. This review deals with challenges like poor experimental design and ethical concerns and discusses key concepts like sample size, statistics in experimental design, humane endpoints, economic assessment, species difference, housing conditions, and systematic reviews and meta-analyses that are often neglected. If practiced, these strategies can refine the procedures effectively and help translate the outcomes efficiently. © The Author(s) 2016.

  16. Key Program Findings and Insights From the Baby-Friendly Hawaii Project

    PubMed Central

    Kahin, Sahra A.; McGurk, Meghan; Hansen-Smith, Heidi; West, Margaret; Li, Ruowei; Melcher, Carolyn Lopez

    2017-01-01

    Background Breastfeeding is the optimal method for infant feeding. In the United States, 81.1% of mothers initiate breastfeeding; however, only 44.4% and 22.3% of mothers are exclusively breastfeeding at 3 and 6 months, respectively. Research aim The Centers for Disease Control and Prevention provides guidance and funding to state health departments to support strategies to improve breastfeeding policies and practices in the hospital, community, and worksite settings. In 2010, the Hawaii State Department of Health received support from the Centers for Disease Control and Prevention to launch the Baby-Friendly Hawaii Project (BFHP) to increase the number of Hawaii hospitals that provide maternity care consistent with the Ten Steps to Successful Breastfeeding and increase the rate of women who remain exclusively breastfeeding throughout their hospital stay. Methods For this article, we examined the BFHP’s final evaluation report and Hawaii breastfeeding and maternity care data to identify the role of the BFHP in facilitating improvements in maternity care practices and breastfeeding rates. Results Since 2010, 52 hospital site visits, 58 trainings, and ongoing technical assistance were administered, and more than 750 staff and health professionals from BFHP hospitals were trained. Hawaii’s overall quality composite Maternity Practices in Infant Nutrition and Care score increased from 65 (out of 100) in 2009 to 76 in 2011 and 80 in 2013, and Newborn Screening Data showed an increase in statewide exclusive breastfeeding from 59.7% in 2009 to 77.0% in 2014. Conclusion Implementation and findings from the BFHP can inform future planning at the state and federal levels on maternity care practices that can improve breastfeeding. PMID:28135119

  17. Experimental temporal quantum steering

    PubMed Central

    Bartkiewicz, Karol; Černoch, Antonín; Lemr, Karel; Miranowicz, Adam; Nori, Franco

    2016-01-01

    Temporal steering is a form of temporal correlation between the initial and final state of a quantum system. It is a temporal analogue of the famous Einstein-Podolsky-Rosen (spatial) steering. We demonstrate, by measuring the photon polarization, that temporal steering allows two parties to verify if they have been interacting with the same particle, even if they have no information about what happened with the particle in between the measurements. This is the first experimental study of temporal steering. We also performed experimental tests, based on the violation of temporal steering inequalities, of the security of two quantum key distribution protocols against individual attacks. Thus, these results can lead to applications for secure quantum communications and quantum engineering. PMID:27901121

  18. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  19. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  20. Academic detailing can play a key role in assessing and implementing comparative effectiveness research findings.

    PubMed

    Fischer, Michael A; Avorn, Jerry

    2012-10-01

    Comparative effectiveness research evaluates the relative effectiveness, safety, and value of competing treatment options in clinically realistic settings. Such evaluations can be methodologically complex and difficult to interpret. There will be a growing need for critical evaluation of comparative effectiveness studies to assess the adequacy of their design and to put new information into a broader context. Equally important, this knowledge will have to be communicated to clinicians in a way that will actually change practice. We identify three challenges to effective dissemination of comparative effectiveness research findings: the difficulty of interpreting comparative effectiveness research data, the need for trusted sources of information, and the challenge of turning research results into clinical action. We suggest that academic detailing-direct outreach education that gives clinicians an accurate and unbiased synthesis of the best evidence for practice in a given clinical area-can translate comparative effectiveness research findings into actions that improve health care decision making and patient outcomes.

  1. Experimental extraction of secure correlations from a noisy private state.

    PubMed

    Dobek, K; Karpiński, M; Demkowicz-Dobrzański, R; Banaszek, K; Horodecki, P

    2011-01-21

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.

  2. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  3. An investigation into the differentiating characteristics between car key burglars and regular burglars.

    PubMed

    Chapman, Rachel; Smith, Lisa L; Bond, John W

    2012-07-01

    Car key burglary has recently become the focus of empirical investigation as offenders, no longer able to steal vehicles without first obtaining their keys, resort to "burgling" target properties. Research surrounding the modus operandi of these offenses is beginning to emerge; however, little attention has been paid to investigating the characteristics of car key burglary offenders. Challenging the assumption that car key burglary offenses are perpetrated by regular burglars, this study aims to differentiate between offenders. Logistic regression analysis of 110 car key and 110 regular burglary offenders revealed that car key burglars are more likely to have previous vehicle theft convictions and are also more likely to be detected on information supplied to the police than regular burglars. Regular burglars are more likely to have previous shoplifting convictions. It was concluded that car key burglars are a distinct sample of offenders and the implications of these findings are discussed. © 2012 American Academy of Forensic Sciences.

  4. Key Themes in Mobile Learning: Prospects for Learner-Generated Learning through AR and VR

    ERIC Educational Resources Information Center

    Aguayo, Claudio; Cochrane, Thomas; Narayan, Vickel

    2017-01-01

    This paper summarises the findings from a literature review in mobile learning, developed as part of a 2-year six-institution project in New Zealand. Through the development of a key themes codebook, we address selected key themes with respect to their relevance to learner-generated learning through emerging technologies, with attention to mobile…

  5. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  6. Quantum key distribution session with 16-dimensional photonic states

    PubMed Central

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  7. PISA 2015: Findings and Some Implications for UK Science Education

    ERIC Educational Resources Information Center

    Osborne, Jonathan; Millar, Robin

    2017-01-01

    This article provides an overview of the main findings for the countries of the UK from the Organisation for Economic Co-operation and Development (OECD) Programme for International Student Assessment (PISA) in 2015, where science was the major focus. The nature of the tests, the key findings and how they might be interpreted are discussed--in…

  8. Direct Measurements of Quantum Kinetic Energy Tensor in Stable and Metastable Water near the Triple Point: An Experimental Benchmark.

    PubMed

    Andreani, Carla; Romanelli, Giovanni; Senesi, Roberto

    2016-06-16

    This study presents the first direct and quantitative measurement of the nuclear momentum distribution anisotropy and the quantum kinetic energy tensor in stable and metastable (supercooled) water near its triple point, using deep inelastic neutron scattering (DINS). From the experimental spectra, accurate line shapes of the hydrogen momentum distributions are derived using an anisotropic Gaussian and a model-independent framework. The experimental results, benchmarked with those obtained for the solid phase, provide the state of the art directional values of the hydrogen mean kinetic energy in metastable water. The determinations of the direction kinetic energies in the supercooled phase, provide accurate and quantitative measurements of these dynamical observables in metastable and stable phases, that is, key insight in the physical mechanisms of the hydrogen quantum state in both disordered and polycrystalline systems. The remarkable findings of this study establish novel insight into further expand the capacity and accuracy of DINS investigations of the nuclear quantum effects in water and represent reference experimental values for theoretical investigations.

  9. [Psychopathic personality in women. Diagnostics and experimental findings in the forensic setting and the business world].

    PubMed

    Eisenbarth, H

    2014-03-01

    Highly psychopathic women are rare in the context of forensic psychiatry; however, the concept of psychopathy plays an important role in diagnostics, for court expertises as well as for treatment. Another so far neglected yet relevant field is the business world. The so-called successful female psychopaths are characterized by highly psychopathic traits but low antisocial behavior, at least with reference to criminal behavior. The basis for investigating and interpreting gender differences is the assessment of psychopathy. Gender differences have been repeatedly demonstrated, especially in the assessment of antisocial behavior and the differentiation of borderline personality disorder and psychopathy which have to be addressed. Group comparisons based on these diagnostic methods found lower inhibitory deficits but less aggressive behavior in female participants with respect to the first main symptom category. For the second symptom category, emotional detachment, so far there are almost no findings reporting gender differences but only few direct gender comparisons have been carried out. However, highly psychopathic women from the general population demonstrate a stronger correlation between psychopathic traits and self-perception as negotiation partner compared to men: they make more use of manipulation and perceive themselves as more powerful in negotiation situations. Future studies should address the diagnostic variability, direct gender comparisons in experimental tasks and the relationship between psychopathic traits, the core symptom categories and career-related success.

  10. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  11. MotifMark: Finding regulatory motifs in DNA sequences.

    PubMed

    Hassanzadeh, Hamid Reza; Kolhe, Pushkar; Isbell, Charles L; Wang, May D

    2017-07-01

    The interaction between proteins and DNA is a key driving force in a significant number of biological processes such as transcriptional regulation, repair, recombination, splicing, and DNA modification. The identification of DNA-binding sites and the specificity of target proteins in binding to these regions are two important steps in understanding the mechanisms of these biological activities. A number of high-throughput technologies have recently emerged that try to quantify the affinity between proteins and DNA motifs. Despite their success, these technologies have their own limitations and fall short in precise characterization of motifs, and as a result, require further downstream analysis to extract useful and interpretable information from a haystack of noisy and inaccurate data. Here we propose MotifMark, a new algorithm based on graph theory and machine learning, that can find binding sites on candidate probes and rank their specificity in regard to the underlying transcription factor. We developed a pipeline to analyze experimental data derived from compact universal protein binding microarrays and benchmarked it against two of the most accurate motif search methods. Our results indicate that MotifMark can be a viable alternative technique for prediction of motif from protein binding microarrays and possibly other related high-throughput techniques.

  12. Poor Families Striving to Save in Matched Children’s Savings Accounts: Findings from a Randomized Experimental Design in Uganda

    PubMed Central

    Karimli, Leyla; Ssewamala, Fred M.; Neilands, Torsten B.

    2014-01-01

    This study examines participants’ savings in children’s savings accounts (CSAs) set up for AIDS-orphaned children ages 10–15 in Uganda. Using a cluster randomized experimental design, we examine the extent to which families participating in a CSA program report more savings than their counterparts not participating in the program, explore the extent to which families who participate in the CSA program report using formal financial institutions compared with families who do not have a CSA, and consider whether families participating in the CSA program bring new money into the CSA or whether they reshuffle existing household assets. We find that participating in a CSA increased families’ likelihood to report having saved money. However, our results show no intervention effect either on the amount of self-reported savings or on the likelihood of using formal financial institutions. Further research is needed to understand whether use of a CSA helps families generate new wealth. PMID:25525282

  13. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  14. Making the continuum of care work for mothers and infants: Does gender equity matter? Findings from a quasi-experimental study in Bihar, India

    PubMed Central

    McDougal, Lotus; Atmavilas, Yamini; Hay, Katherine; Silverman, Jay G.; Tarigopula, Usha K.; Raj, Anita

    2017-01-01

    Background Improvements in continuum of care (CoC) utilization are needed to address inadequate reductions in neonatal and infant mortality in India and elsewhere. This study examines the effect of Ananya, a health system training and community outreach intervention, on reproductive, maternal and newborn health continuum of care (RMNH CoC) utilization in Bihar, India, and explores whether that effect is moderated by gender equity factors (child marriage, restricted mobility and low decision-making control). Methods A two-armed quasi-experimental design compared districts in Bihar that did/did not implement Ananya. Cross-sections of married women aged 15–49 with a 0–5 month old child were surveyed at baseline and two year follow-up (baseline n = 7191 and follow-up n = 6143; response rates 88.9% and 90.7%, respectively). Difference-in-difference analyses assessed program impact on RMNH CoC co-coverage, defined by 9 health services/behaviors for the index pregnancy (e.g., antenatal care, skin-to-skin care). Three-way interactions assessed gender equity as a moderator of Ananya’s impact. Findings Participants reported low RMNH CoC co-coverage at baseline (on average 3.2 and 3.0 of the 9 RMNH services/behaviors for Ananya and control groups, respectively). The Ananya group showed a significantly greater increase in RMNH CoC co-coverage (.41 services) compared with the control group over time (p<0.001), with the primary drivers being increases in clean cord care, skin-to-skin care and postpartum contraceptive use. Gender equity interaction analyses revealed diminished intervention effects on antenatal care, skilled birth attendance and exclusive breastfeeding for women married as minors. Conclusion Ananya improved RMNH CoC co-coverage among these recent mothers, largely through positive health behavior changes. Child marriage attenuated Ananya’s impact on utilization of key health services and behaviors. Supporting the health system with training and community

  15. Single-Case Experimental Designs: A Systematic Review of Published Research and Current Standards

    PubMed Central

    Smith, Justin D.

    2013-01-01

    This article systematically reviews the research design and methodological characteristics of single-case experimental design (SCED) research published in peer-reviewed journals between 2000 and 2010. SCEDs provide researchers with a flexible and viable alternative to group designs with large sample sizes. However, methodological challenges have precluded widespread implementation and acceptance of the SCED as a viable complementary methodology to the predominant group design. This article includes a description of the research design, measurement, and analysis domains distinctive to the SCED; a discussion of the results within the framework of contemporary standards and guidelines in the field; and a presentation of updated benchmarks for key characteristics (e.g., baseline sampling, method of analysis), and overall, it provides researchers and reviewers with a resource for conducting and evaluating SCED research. The results of the systematic review of 409 studies suggest that recently published SCED research is largely in accordance with contemporary criteria for experimental quality. Analytic method emerged as an area of discord. Comparison of the findings of this review with historical estimates of the use of statistical analysis indicates an upward trend, but visual analysis remains the most common analytic method and also garners the most support amongst those entities providing SCED standards. Although consensus exists along key dimensions of single-case research design and researchers appear to be practicing within these parameters, there remains a need for further evaluation of assessment and sampling techniques and data analytic methods. PMID:22845874

  16. Why Does Experimentation Matter in Teaching Ecology?

    ERIC Educational Resources Information Center

    Finn, Hugh; Maxwell, Marika; Calver, Michael

    2002-01-01

    Suggests that because controlled experiments are used extensively by professional ecologists to solve both theoretical and applied problems, experimentation should be a key component of secondary school ecology curricula. Describes five teaching principles to guide secondary school biology teachers in providing a more realistic view of the…

  17. Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations

    NASA Astrophysics Data System (ADS)

    Reid, M. D.

    2000-12-01

    Correlations of the type discussed by EPR in their original 1935 paradox for continuous variables exist for the quadrature phase amplitudes of two spatially separated fields. These correlations were first experimentally reported in 1992. We propose to use such EPR beams in quantum cryptography, to transmit with high efficiency messages in such a way that the receiver and sender may later determine whether eavesdropping has occurred. The merit of the new proposal is in the possibility of transmitting a reasonably secure yet predetermined key. This would allow relay of a cryptographic key over long distances in the presence of lossy channels.

  18. Students' views about the nature of experimental physics

    NASA Astrophysics Data System (ADS)

    Wilcox, Bethany R.; Lewandowski, H. J.

    2017-12-01

    The physics community explores and explains the physical world through a blend of theoretical and experimental studies. The future of physics as a discipline depends on training of students in both the theoretical and experimental aspects of the field. However, while student learning within lecture courses has been the subject of extensive research, lab courses remain relatively under-studied. In particular, there is little, if any, data available that address the effectiveness of physics lab courses at encouraging students to recognize the nature and importance of experimental physics within the discipline as a whole. To address this gap, we present the first large-scale, national study (Ninstitutions=75 and Nstudents=7167 ) of undergraduate physics lab courses through analysis of students' responses to a research-validated assessment designed to investigate students' beliefs about the nature of experimental physics. We find that students often enter and leave physics lab courses with ideas about experimental physics as practiced in their courses that are inconsistent with the views of practicing experimental physicists, and this trend holds at both the introductory and upper-division levels. Despite this inconsistency, we find that both introductory and upper-division students are able to accurately predict the expertlike response even in cases where their views about experimentation in their lab courses disagree. These finding have implications for the recruitment, retention, and adequate preparation of students in physics.

  19. Key challenges in the development and implementation of telehealth projects.

    PubMed

    Joseph, Victor; West, Robert M; Shickle, Darren; Keen, Justin; Clamp, Susan

    2011-01-01

    A literature review was carried out to identify the key challenges in the implementation of telehealth. This was followed by a survey of organisations in England involved in telehealth projects in order to understand the challenges they faced. Ten of the 13 health or local authority organisations surveyed had telehealth projects and three were at the planning stage. The analysis revealed seven key challenges facing implementers of telehealth in England. Based on the findings from the literature review and the survey, a model was constructed and a checklist drawn up. The model contained the following elements: identifying issues, needs and partners; producing a strategy; securing funding; implementing changes; and monitoring and evaluating a telehealth project. The checklist was validated by using key informants from the organisations originally surveyed. The checklist may be useful to guide telehealth development and implementation in the future.

  20. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  1. "Jumping to conclusions" in delusion-prone participants: an experimental economics approach.

    PubMed

    van der Leer, Leslie; McKay, Ryan

    2014-01-01

    That delusional and delusion-prone individuals "jump to conclusions" on probabilistic reasoning tasks is a key finding in cognitive neuropsychiatry. Here we focused on a less frequently investigated aspect of "jumping to conclusions" (JTC): certainty judgments. We incorporated rigorous procedures from experimental economics to eliminate potential confounds of miscomprehension and motivation and systematically investigated the effect of incentives on task performance. Low- and high-delusion-prone participants (n = 109) completed a series of computerised trials; on each trial, they were shown a black or a white fish, caught from one of the two lakes containing fish of both colours in complementary ratios. In the betting condition, participants were given £4 to distribute over the two lakes as they wished; in the control condition, participants simply provided an estimate of how probable each lake was. Deviations from Bayesian probabilities were investigated. Whereas high-delusion-prone participants in both the control and betting conditions underestimated the Bayesian probabilities (i.e. were conservative), low-delusion-prone participants in the control condition underestimated but those in the betting condition provided accurate estimates. In the control condition, there was a trend for high-delusion-prone participants to give higher estimates than low-delusion-prone participants, which is consistent with previous reports of "jumping to conclusions" in delusion-prone participants. However, our findings in the betting condition, where high-delusion-prone participants provided lower estimates than low-delusion-prone participants (who were accurate), are inconsistent with the jumping-to-conclusions effect in both a relative and an absolute sense. Our findings highlight the key role of task incentives and underscore the importance of comparing the responses of delusion-prone participants to an objective rational standard as well as to the responses of non

  2. Turnaround Arts Initiative: Summary of Key Findings

    ERIC Educational Resources Information Center

    Stoelinga, Sara Ray; Silk, Yael; Reddy, Prateek; Rahman, Nadiv

    2015-01-01

    Turnaround Arts is a public-private partnership that aims to test the hypothesis that strategically implementing high-quality and integrated arts education programming in high-poverty, chronically underperforming schools adds significant value to school-wide reform. In 2014, the Turnaround Arts initiative completed an evaluation report covering…

  3. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  4. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  5. They See a Rat, We Seek a Cure for Diseases: The Current Status of Animal Experimentation in Medical Practice

    PubMed Central

    Kehinde, Elijah O.

    2013-01-01

    The objective of this review article was to examine current and prospective developments in the scientific use of laboratory animals, and to find out whether or not there are still valid scientific benefits of and justification for animal experimentation. The PubMed and Web of Science databases were searched using the following key words: animal models, basic research, pharmaceutical research, toxicity testing, experimental surgery, surgical simulation, ethics, animal welfare, benign, malignant diseases. Important relevant reviews, original articles and references from 1970 to 2012 were reviewed for data on the use of experimental animals in the study of diseases. The use of laboratory animals in scientific research continues to generate intense public debate. Their use can be justified today in the following areas of research: basic scientific research, use of animals as models for human diseases, pharmaceutical research and development, toxicity testing and teaching of new surgical techniques. This is because there are inherent limitations in the use of alternatives such as in vitro studies, human clinical trials or computer simulation. However, there are problems of transferability of results obtained from animal research to humans. Efforts are on-going to find suitable alternatives to animal experimentation like cell and tissue culture and computer simulation. For the foreseeable future, it would appear that to enable scientists to have a more precise understanding of human disease, including its diagnosis, prognosis and therapeutic intervention, there will still be enough grounds to advocate animal experimentation. However, efforts must continue to minimize or eliminate the need for animal testing in scientific research as soon as possible. PMID:24217224

  6. Finding the Key Periods for Assimilating HJ-1A/B CCD Data and the WOFOST Model to Evaluate Heavy Metal Stress in Rice.

    PubMed

    Zhao, Shuang; Qian, Xu; Liu, Xiangnan; Xu, Zhao

    2018-04-17

    Accurately monitoring heavy metal stress in crops is vital for food security and agricultural production. The assimilation of remote sensing images into the World Food Studies (WOFOST) model provides an efficient way to solve this problem. In this study, we aimed at investigating the key periods of the assimilation framework for continuous monitoring of heavy metal stress in rice. The Harris algorithm was used for the leaf area index (LAI) curves to select the key period for an optimized assimilation. To obtain accurate LAI values, the measured dry weight of rice roots (WRT), which have been proven to be the most stress-sensitive indicator of heavy metal stress, were incorporated into the improved WOFOST model. Finally, the key periods, which contain four dominant time points, were used to select remote sensing images for the RS-WOFOST model for continuous monitoring of heavy metal stress. Compared with the key period which contains all the available remote sensing images, the results showed that the optimal key period can significantly improve the time efficiency of the assimilation framework by shortening the model operation time by more than 50%, while maintaining its accuracy. This result is highly significant when monitoring heavy metals in rice on a large-scale. Furthermore, it can also offer a reference for the timing of field measurements in monitoring heavy metal stress in rice.

  7. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  8. Locally acquired Dengue--Key West, Florida, 2009-2010.

    PubMed

    2010-05-21

    Dengue is the most common vector-borne viral disease in the world, causing an estimated 50-100 million infections and 25,000 deaths each year. During 1946-1980, no cases of dengue acquired in the continental United States were reported. Since 1980, a few locally acquired U.S. cases have been confirmed along the Texas-Mexico border, temporally associated with large outbreaks in neighboring Mexican cities. On September 1, 2009, a New York physician notified the Monroe County (Florida) Health Department (MCHD) and the Florida Department of Health (FDOH) of a suspected dengue case in a New York state resident whose only recent travel was to Key West, Florida. CDC confirmed the diagnosis, and a press release was issued to notify the public and Key West physicians of the potential risk for locally acquired dengue infections. In the next 2 weeks, two dengue infections in Key West residents without recent travel were reported and confirmed. Subsequently, enhanced and active surveillance identified 24 more Key West cases during 2009. On April 13, 2010, another Key West dengue case was reported to FDOH, bringing the total to 28. This report describes the first three dengue cases reported in 2009, briefly summarizes the 2010 case, highlights preliminary findings from the ongoing investigation, and outlines measures used to mitigate and control the outbreak. Clinicians should include dengue in the differential diagnosis of acute febrile illnesses in patients who live in or have recently traveled to subtropical areas of the United States or to the tropics.

  9. EAARL Submarine Topography - Northern Florida Keys Reef Tract

    USGS Publications Warehouse

    Brock, John C.; Wright, C. Wayne; Nayegandhi, Amar; Patterson, Matt; Travers, Laurinda J.; Wilson, Iris

    2007-01-01

    This Web site contains 32 Lidar-derived bare earth topography maps and GIS files for the Northern Florida Keys Reef Tract. These lidar-derived submarine topographic maps were produced as a collaborative effort between the U.S. Geological Survey (USGS) Coastal and Marine Geology Program, FISC St. Petersburg, Florida, the National Park Service (NPS) South Florida/Caribbean Network Inventory and Monitoring Program, and the National Aeronautics and Space Administration (NASA) Wallops Flight Facility. One objective of this research is to create techniques to survey coral reefs and barrier islands for the purposes of geomorphic change studies, habitat mapping, ecological monitoring, change detection, and event assessment. As part of this project, data from an innovative instrument under development at the NASA Wallops Flight Facility, the NASA Experimental Airborne Advanced Research Lidar (EAARL) are being used. This sensor has the potential to make significant contributions in this realm for measuring subaerial and submarine topography wthin cross-environment surveys. High spectral resolution, water-column correction, and low costs were found to be key factors in providing accurate and affordable imagery to costal resource managers.

  10. Experimental determination of the key heat transfer mechanisms in pharmaceutical freeze-drying.

    PubMed

    Ganguly, Arnab; Nail, Steven L; Alexeenko, Alina

    2013-05-01

    The study is aimed at quantifying the relative contribution of key heat transfer modes in lyophilization. Measurements of vial heat transfer rates in a laboratory-scale freeze-dryer were performed using pure water, which was partially sublimed under various conditions. The separation distance between the shelf and the vial was systematically varied, and sublimation rates were determined gravimetrically. The heat transfer rates were observed to be independent of separation distance between the vial and the shelf and linearly dependent on pressure in the free molecular flow limit, realized at low pressures (<50 mTorr). However, under higher pressures (>120 mTorr), heat transfer rates were independent of pressure and inversely proportional to separation distance. Previous heat transfer studies in conventional freeze-drying cycles have attributed a dominant portion of the total heat transfer to radiation, the rest to conduction, whereas convection has been found to be insignificant. Although the measurements reported here confirm the significance of the radiative and gas conduction components, the convective component has been found to be comparable to the gas conduction contribution at pressures greater than 100 mTorr. The current investigation supports the conclusion that the convective component of the heat transfer cannot be ignored in typical laboratory-scale freeze-drying conditions. Copyright © 2013 Wiley Periodicals, Inc.

  11. World Key Information Service System Designed For EPCOT Center

    NASA Astrophysics Data System (ADS)

    Kelsey, J. A.

    1984-03-01

    An advanced Bell Laboratories and Western Electric designed electronic information retrieval system utilizing the latest Information Age technologies, and a fiber optic transmission system is featured at the Walt Disney World Resort's newest theme park - The Experimental Prototype Community of Tomorrow (EPCOT Center). The project is an interactive audio, video and text information system that is deployed at key locations within the park. The touch sensitive terminals utilizing the ARIEL (Automatic Retrieval of Information Electronically) System is interconnected by a Western Electric designed and manufactured lightwave transmission system.

  12. Experimental Implementation of a Quantum Optical State Comparison Amplifier

    NASA Astrophysics Data System (ADS)

    Donaldson, Ross J.; Collins, Robert J.; Eleftheriadou, Electra; Barnett, Stephen M.; Jeffers, John; Buller, Gerald S.

    2015-03-01

    We present an experimental demonstration of a practical nondeterministic quantum optical amplification scheme that employs two mature technologies, state comparison and photon subtraction, to achieve amplification of known sets of coherent states with high fidelity. The amplifier uses coherent states as a resource rather than single photons, which allows for a relatively simple light source, such as a diode laser, providing an increased rate of amplification. The amplifier is not restricted to low amplitude states. With respect to the two key parameters, fidelity and the amplified state production rate, we demonstrate significant improvements over previous experimental implementations, without the requirement of complex photonic components. Such a system may form the basis of trusted quantum repeaters in nonentanglement-based quantum communications systems with known phase alphabets, such as quantum key distribution or quantum digital signatures.

  13. Emotion regulation choice in female patients with borderline personality disorder: Findings from self-reports and experimental measures.

    PubMed

    Sauer, Christina; Sheppes, Gal; Lackner, Helmut Karl; Arens, Elisabeth A; Tarrasch, Ricardo; Barnow, Sven

    2016-08-30

    Emotion dysregulation is a core feature of borderline personality disorder (BPD). So far, many studies have tested the consequences of the implementation of certain emotion regulation (ER) strategies, but there have been no investigations about ER choices in BPD. Thus, the aim of this study was to investigate habitual ER choices by self-report questionnaires and experimentally by testing the preference to select between distraction and reappraisal when facing different emotional intensities (high vs. low) and contents (borderline-specific vs. unspecific negative) in patients with BPD (n=24) compared with clinical controls (patients with major depression, n=19) and a healthy control group (n=32). Additionally, heart rate (HR) responses were continuously assessed. Main results revealed that both patient groups showed maladaptive self-reported ER choice profiles compared with HC. We found, however, no differences between the groups in the choice of distraction and reappraisal on the behavioral level and in HR responses. In BPD, within-group analyses revealed a positive correlation between symptom severity and the preference for distraction under high-intensity borderline-specific stimuli. Our findings provide preliminary evidence of ER choices in BPD and show the robustness of the choice effect in patients with affective disorders. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Phylogenetic impoverishment of Amazonian tree communities in an experimentally fragmented forest landscape.

    PubMed

    Santos, Bráulio A; Tabarelli, Marcelo; Melo, Felipe P L; Camargo, José L C; Andrade, Ana; Laurance, Susan G; Laurance, William F

    2014-01-01

    Amazonian rainforests sustain some of the richest tree communities on Earth, but their ecological and evolutionary responses to human threats remain poorly known. We used one of the largest experimental datasets currently available on tree dynamics in fragmented tropical forests and a recent phylogeny of angiosperms to test whether tree communities have lost phylogenetic diversity since their isolation about two decades previously. Our findings revealed an overall trend toward phylogenetic impoverishment across the experimentally fragmented landscape, irrespective of whether tree communities were in 1-ha, 10-ha, or 100-ha forest fragments, near forest edges, or in continuous forest. The magnitude of the phylogenetic diversity loss was low (<2% relative to before-fragmentation values) but widespread throughout the study landscape, occurring in 32 of 40 1-ha plots. Consistent with this loss in phylogenetic diversity, we observed a significant decrease of 50% in phylogenetic dispersion since forest isolation, irrespective of plot location. Analyses based on tree genera that have significantly increased (28 genera) or declined (31 genera) in abundance and basal area in the landscape revealed that increasing genera are more phylogenetically related than decreasing ones. Also, the loss of phylogenetic diversity was greater in tree communities where increasing genera proliferated and decreasing genera reduced their importance values, suggesting that this taxonomic replacement is partially underlying the phylogenetic impoverishment at the landscape scale. This finding has clear implications for the current debate about the role human-modified landscapes play in sustaining biodiversity persistence and key ecosystem services, such as carbon storage. Although the generalization of our findings to other fragmented tropical forests is uncertain, it could negatively affect ecosystem productivity and stability and have broader impacts on coevolved organisms.

  15. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  16. Key Technologies of Phone Storage Forensics Based on ARM Architecture

    NASA Astrophysics Data System (ADS)

    Zhang, Jianghan; Che, Shengbing

    2018-03-01

    Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.

  17. Provably secure and high-rate quantum key distribution with time-bin qudits

    PubMed Central

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2017-01-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028

  18. Provably secure and high-rate quantum key distribution with time-bin qudits.

    PubMed

    Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J

    2017-11-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.

  19. Evaluating the mechanistic evidence and key data gaps in assessing the potential carcinogenicity of carbon nanotubes and nanofibers in humans

    PubMed Central

    Kuempel, Eileen D.; Jaurand, Marie-Claude; Møller, Peter; Morimoto, Yasuo; Kobayashi, Norihiro; Pinkerton, Kent E.; Sargent, Linda M.; Vermeulen, Roel C. H.; Fubini, Bice; Kane, Agnes B.

    2016-01-01

    In an evaluation of carbon nanotubes (CNTs) for the IARC Monograph 111, the Mechanisms Subgroup was tasked with assessing the strength of evidence on the potential carcinogenicity of CNTs in humans. The mechanistic evidence was considered to be not strong enough to alter the evaluations based on the animal data. In this paper, we provide an extended, in-depth examination of the in vivo and in vitro experimental studies according to current hypotheses on the carcinogenicity of inhaled particles and fibers. We cite additional studies of CNTs that were not available at the time of the IARC meeting in October 2014, and extend our evaluation to include carbon nanofibers (CNFs). Finally, we identify key data gaps and suggest research needs to reduce uncertainty. The focus of this review is on the cancer risk to workers exposed to airborne CNT or CNF during the production and use of these materials. The findings of this review, in general, affirm those of the original evaluation on the inadequate or limited evidence of carcinogenicity for most types of CNTs and CNFs at this time, and possible carcinogenicity of one type of CNT (MWCNT-7). The key evidence gaps to be filled by research include: investigation of possible associations between in vitro and early-stage in vivo events that may be predictive of lung cancer or mesothelioma, and systematic analysis of dose–response relationships across materials, including evaluation of the influence of physico-chemical properties and experimental factors on the observation of nonmalignant and malignant endpoints. PMID:27537422

  20. The challenge of spin–orbit-tuned ground states in iridates: a key issues review

    NASA Astrophysics Data System (ADS)

    Cao, Gang; Schlottmann, Pedro

    2018-04-01

    Effects of spin–orbit interactions in condensed matter are an important and rapidly evolving topic. Strong competition between spin–orbit, on-site Coulomb and crystalline electric field interactions in iridates drives exotic quantum states that are unique to this group of materials. In particular, the ‘J eff  =  ½’ Mott state served as an early signal that the combined effect of strong spin–orbit and Coulomb interactions in iridates has unique, intriguing consequences. In this Key Issues Review, we survey some current experimental studies of iridates. In essence, these materials tend to defy conventional wisdom: absence of conventional correlations between magnetic and insulating states, avoidance of metallization at high pressures, ‘S-shaped’ I–V characteristic, emergence of an odd-parity hidden order, etc. It is particularly intriguing that there exist conspicuous discrepancies between current experimental results and theoretical proposals that address superconducting, topological and quantum spin liquid phases. This class of materials, in which the lattice degrees of freedom play a critical role seldom seen in other materials, evidently presents some profound intellectual challenges that call for more investigations both experimentally and theoretically. Physical properties unique to these materials may help unlock a world of possibilities for functional materials and devices. We emphasize that, given the rapidly developing nature of this field, this Key Issues Review is by no means an exhaustive report of the current state of experimental studies of iridates.

  1. Experimental Mathematics and Mathematical Physics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bailey, David H.; Borwein, Jonathan M.; Broadhurst, David

    2009-06-26

    One of the most effective techniques of experimental mathematics is to compute mathematical entities such as integrals, series or limits to high precision, then attempt to recognize the resulting numerical values. Recently these techniques have been applied with great success to problems in mathematical physics. Notable among these applications are the identification of some key multi-dimensional integrals that arise in Ising theory, quantum field theory and in magnetic spin theory.

  2. Preventative and Therapeutic Probiotic Use in Allergic Skin Conditions: Experimental and Clinical Findings

    PubMed Central

    Özdemir, Öner; Göksu Erol, Azize Yasemin

    2013-01-01

    Probiotics are ingested live microbes that can modify intestinal microbial populations in a way that benefits the host. The interest in probiotic preventative/therapeutic potential in allergic diseases stemmed from the fact that probiotics have been shown to improve intestinal dysbiosis and permeability and to reduce inflammatory cytokines in human and murine experimental models. Enhanced presence of probiotic bacteria in the intestinal microbiota is found to correlate with protection against allergy. Therefore, many studies have been recently designed to examine the efficacy of probiotics, but the literature on the allergic skin disorders is still very scarce. Here, our objective is to summarize and evaluate the available knowledge from randomized or nonrandomized controlled trials of probiotic use in allergic skin conditions. Clinical improvement especially in IgE-sensitized eczema and experimental models such as atopic dermatitis-like lesions (trinitrochlorobenzene and picryl chloride sensitizations) and allergic contact dermatitis (dinitrofluorobenzene sensitization) has been reported. Although there is a very promising evidence to recommend the addition of probiotics into foods, probiotics do not have a proven role in the prevention or the therapy of allergic skin disorders. Thus, being aware of possible measures, such as probiotics use, to prevent/heal atopic diseases is essential for the practicing allergy specialist. PMID:24078929

  3. Fire in the Amazon: impact of experimental fuel addition on responses of ants and their interactions with myrmecochorous seeds.

    PubMed

    Paolucci, Lucas N; Maia, Maria L B; Solar, Ricardo R C; Campos, Ricardo I; Schoereder, José H; Andersen, Alan N

    2016-10-01

    The widespread clearing of tropical forests causes lower tree cover, drier microclimate, and higher and drier fuel loads of forest edges, increasing the risk of fire occurrence and its intensity. We used a manipulative field experiment to investigate the influence of fire and fuel loads on ant communities and their interactions with myrmecochorous seeds in the southern Amazon, a region currently undergoing extreme land-use intensification. Experimental fires and fuel addition were applied to 40 × 40-m plots in six replicated blocks, and ants were sampled between 15 and 30 days after fires in four strata: subterranean, litter, epigaeic, and arboreal. Fire had extensive negative effects on ant communities. Highly specialized cryptobiotic and predator species of the litter layer and epigaeic specialist predators were among the most sensitive, but we did not find evidence of overall biotic homogenization following fire. Fire reduced rates of location and transport of myrmecochorous seeds, and therefore the effectiveness of a key ecosystem service provided by ants, which we attribute to lower ant abundance and increased thermal stress. Experimental fuel addition had only minor effects on attributes of fire severity, and limited effects on ant responses to fire. Our findings indicate that enhanced fuel loads will not decrease ant diversity and ecosystem services through increased fire severity, at least in wetter years. However, higher fuel loads can still have a significant effect on ants from Amazonian rainforests because they increase the risk of fire occurrence, which has a detrimental impact on ant communities and a key ecosystem service they provide.

  4. Manpower Development and Training in Correctional Programs. MDTA Experimental and Demonstration Findings No. 3.

    ERIC Educational Resources Information Center

    Manpower Administration (DOL), Washington, DC.

    Four conferences on manpower development and training in correctional institutions were sponsored by the Manpower Administration to bring together the basic groups of people charged with responsibility in prisoner rehabilitation and to disseminate to them the significant results of experimental, demonstration, and research projects engaged in…

  5. Predicting Key Events in the Popularity Evolution of Online Information.

    PubMed

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  6. Special Education Law: Illustrative Basics and Nuances of Key IDEA Components

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2015-01-01

    Intended as professional development for both new and experienced special educators, this article provides both the basic requirements and nuanced issues for foundational, successive, and overlapping key components under the Individuals With Disabilities Education Act (IDEA): (a) child find, (b) eligibility, and (c) free appropriate public…

  7. Key frame extraction based on spatiotemporal motion trajectory

    NASA Astrophysics Data System (ADS)

    Zhang, Yunzuo; Tao, Ran; Zhang, Feng

    2015-05-01

    Spatiotemporal motion trajectory can accurately reflect the changes of motion state. Motivated by this observation, this letter proposes a method for key frame extraction based on motion trajectory on the spatiotemporal slice. Different from the well-known motion related methods, the proposed method utilizes the inflexions of the motion trajectory on the spatiotemporal slice of all the moving objects. Experimental results show that although a similar performance is achieved in the single-objective screen, by comparing the proposed method to that achieved with the state-of-the-art methods based on motion energy or acceleration, the proposed method shows a better performance in a multiobjective video.

  8. Psychometric properties of the Transitions from Foster Care Key Leader Survey.

    PubMed

    Salazar, Amy M; Brown, Eric C; Monahan, Kathryn C; Catalano, Richard F

    2016-04-01

    This study summarizes the development and piloting of the Transitions from Foster Care Key Leader Survey (TFC-KLS), an instrument designed to measure change in systems serving young people transitioning from foster care to adulthood. The Jim Casey Youth Opportunity Initiative's logic model was used as a basis for instrument development. The instrument was piloted with 119 key leaders in six communities. Seven of eight latent scales performed well in psychometric testing. The relationships among the 24 measures of system change were explored. A CFA testing overall model fit was satisfactory following slight modifications. Finally, a test of inter-rater reliability between two raters did not find reliable reporting of service availability in a supplemental portion of the survey. The findings were generally positive and supported the validity and utility of the instrument for measuring system change, following some adaptations. Implications for the field are discussed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Weighted Key Player Problem for Social Network Analysis

    DTIC Science & Technology

    2011-03-01

    the degree of the actor, the number of adjacent neighbors, to de - termine its centrality value. Introduced in its current form by Freeman, a node’s...identifying individuals who are key in a number of contexts. This chapter developed the WKPP-Pos measure that allows for the inclusion of actor and...Techniques were de - 44 veloped for using the p-median to find optimal solutions to the WKPP-Pos measure and for using hierarchical clustering as a

  10. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  11. Decoy-state quantum key distribution with polarized photons over 200 km.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Jian; Cai, Wen-Qi; Wan, Xu; Chen, Luo-Kan; Wang, Jin-Hong; Liu, Shu-Bin; Liang, Hao; Yang, Lin; Peng, Cheng-Zhi; Chen, Kai; Chen, Zeng-Bing; Pan, Jian-Wei

    2010-04-12

    We report an implementation of decoy-state quantum key distribution (QKD) over 200 km optical fiber cable through photon polarization encoding. This is achieved by constructing the whole QKD system operating at 320 MHz repetition rate, and developing high-speed transmitter and receiver modules. A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock. A final key rate of 15 Hz is distributed within the experimental time of 3089 seconds, by using super-conducting single photon detectors. This is longest decoy-state QKD yet demonstrated up to date. It helps to make a significant step towards practical secure communication in long-distance scope.

  12. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    NASA Astrophysics Data System (ADS)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  13. SUMMARY OF EMISSIONS MANAGEMENT STRATEGY POLICY RELEVANT FINDINGS FROM EPA'S PM SUPERSITES PROGRAM

    EPA Science Inventory

    EPA is developing an integrated synthesis of key scientific and policy-relevant findings from EPA's Particulate Matter Supersites Program. This presentation provides a summary of the program and the integrated synthesis. Since there are many examples of such findings, ranging f...

  14. Paediatric International Nursing Study: using person-centred key performance indicators to benchmark children's services.

    PubMed

    McCance, Tanya; Wilson, Val; Kornman, Kelly

    2016-07-01

    The aim of the Paediatric International Nursing Study was to explore the utility of key performance indicators in developing person-centred practice across a range of services provided to sick children. The objective addressed in this paper was evaluating the use of these indicators to benchmark services internationally. This study builds on primary research, which produced indicators that were considered novel both in terms of their positive orientation and use in generating data that privileges the patient voice. This study extends this research through wider testing on an international platform within paediatrics. The overall methodological approach was a realistic evaluation used to evaluate the implementation of the key performance indicators, which combined an integrated development and evaluation methodology. The study involved children's wards/hospitals in Australia (six sites across three states) and Europe (seven sites across four countries). Qualitative and quantitative methods were used during the implementation process, however, this paper reports the quantitative data only, which used survey, observations and documentary review. The findings demonstrate the quality of care being delivered to children and their families across different international sites. The benchmarking does, however, highlight some differences between paediatric and general hospitals, and between the different key performance indicators across all the sites. The findings support the use of the key performance indicators as a novel method to benchmark services internationally. Whilst the data collected across 20 paediatric sites suggest services are more similar than different, benchmarking illuminates variations that encourage a critical dialogue about what works and why. The transferability of the key performance indicators and measurement framework across different settings has significant implications for practice. The findings offer an approach to benchmarking and celebrating

  15. Intake of key chronic disease-related nutrients among baby boomers.

    PubMed

    King, Dana E; Xiang, Jun; Brown, Alexander

    2014-06-01

    The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease-related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease-related nutrients of the baby boomer generation with the previous generation of middle-aged adults. National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988-1994) and the NHANES for 2007-2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. The baby boomers' average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P < 0.001). The intake of vitamin C (105/89 g), water (1208/1001 g), and vegetables (199/229 g) was less than that of the previous generation (P < 0.001), and the dietary intake of fruit and fiber was unchanged. In regression analyses, dietary changes remained significant after controlling for age, race, sex, and socioeconomic status (all P < 0.01). The study findings document higher dietary intake of key chronic disease-related nutrients along with reduced vegetable intake among baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group.

  16. Intake of Key Chronic Disease–Related Nutrients among Baby Boomers

    PubMed Central

    King, Dana E.; Xiang, Jun; Brown, Alexander

    2014-01-01

    Objectives The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease–related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease–related nutrients of the baby boomer generation with the previous generation of middle-aged adults. Methods National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988–1994) and the NHANES for 2007–2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. Results The baby boomers’ average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P < 0.001). The intake of vitamin C (105/89 g), water (1208/1001 g), and vegetables (199/229 g) was less than that of the previous generation (P < 0.001), and the dietary intake of fruit and fiber was unchanged. In regression analyses, dietary changes remained significant after controlling for age, race, sex, and socioeconomic status (all P < 0.01). Conclusions The study findings document higher dietary intake of key chronic disease–related nutrients along with reduced vegetable intake among baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group. PMID:24945165

  17. Key Generation for Fast Inversion of the Paillier Encryption Function

    NASA Astrophysics Data System (ADS)

    Hirano, Takato; Tanaka, Keisuke

    We study fast inversion of the Paillier encryption function. Especially, we focus only on key generation, and do not modify the Paillier encryption function. We propose three key generation algorithms based on the speeding-up techniques for the RSA encryption function. By using our algorithms, the size of the private CRT exponent is half of that of Paillier-CRT. The first algorithm employs the extended Euclidean algorithm. The second algorithm employs factoring algorithms, and can construct the private CRT exponent with low Hamming weight. The third algorithm is a variant of the second one, and has some advantage such as compression of the private CRT exponent and no requirement for factoring algorithms. We also propose the settings of the parameters for these algorithms and analyze the security of the Paillier encryption function by these algorithms against known attacks. Finally, we give experimental results of our algorithms.

  18. LabKey Server: an open source platform for scientific data integration, analysis and collaboration.

    PubMed

    Nelson, Elizabeth K; Piehler, Britt; Eckels, Josh; Rauch, Adam; Bellew, Matthew; Hussey, Peter; Ramsay, Sarah; Nathe, Cory; Lum, Karl; Krouse, Kevin; Stearns, David; Connolly, Brian; Skillman, Tom; Igra, Mark

    2011-03-09

    Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350 organizations. It tracks

  19. LabKey Server: An open source platform for scientific data integration, analysis and collaboration

    PubMed Central

    2011-01-01

    Background Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. Results To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment. Diverse research organizations have adopted and adapted LabKey Server, including consortia within the Global HIV Enterprise. Atlas is an installation of LabKey Server that has been tailored to serve these consortia. It is in production use and demonstrates the core capabilities of LabKey Server. Atlas now has over 2,800 active user accounts originating from approximately 36 countries and 350

  20. Research Methods in Healthcare Epidemiology and Antimicrobial Stewardship-Quasi-Experimental Designs.

    PubMed

    Schweizer, Marin L; Braun, Barbara I; Milstone, Aaron M

    2016-10-01

    Quasi-experimental studies evaluate the association between an intervention and an outcome using experiments in which the intervention is not randomly assigned. Quasi-experimental studies are often used to evaluate rapid responses to outbreaks or other patient safety problems requiring prompt, nonrandomized interventions. Quasi-experimental studies can be categorized into 3 major types: interrupted time-series designs, designs with control groups, and designs without control groups. This methods paper highlights key considerations for quasi-experimental studies in healthcare epidemiology and antimicrobial stewardship, including study design and analytic approaches to avoid selection bias and other common pitfalls of quasi-experimental studies. Infect Control Hosp Epidemiol 2016;1-6.

  1. Experimental design for evaluating WWTP data by linear mass balances.

    PubMed

    Le, Quan H; Verheijen, Peter J T; van Loosdrecht, Mark C M; Volcke, Eveline I P

    2018-05-15

    A stepwise experimental design procedure to obtain reliable data from wastewater treatment plants (WWTPs) was developed. The proposed procedure aims at determining sets of additional measurements (besides available ones) that guarantee the identifiability of key process variables, which means that their value can be calculated from other, measured variables, based on available constraints in the form of linear mass balances. Among all solutions, i.e. all possible sets of additional measurements allowing the identifiability of all key process variables, the optimal solutions were found taking into account two objectives, namely the accuracy of the identified key variables and the cost of additional measurements. The results of this multi-objective optimization problem were represented in a Pareto-optimal front. The presented procedure was applied to a full-scale WWTP. Detailed analysis of the relation between measurements allowed the determination of groups of overlapping mass balances. Adding measured variables could only serve in identifying key variables that appear in the same group of mass balances. Besides, the application of the experimental design procedure to these individual groups significantly reduced the computational effort in evaluating available measurements and planning additional monitoring campaigns. The proposed procedure is straightforward and can be applied to other WWTPs with or without prior data collection. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Webinar summary: Important findings for managers [Chapter 2

    Treesearch

    Claudia Regan

    2014-01-01

    This chapter summarizes key findings and offers take-home messages of the Future Forest Webinar Series with regard to resource management planning, analyses, and project design. In the wake of the mountain pine beetle (MPB) epidemic, resource managers are especially concerned with developing more resilient forests, providing for the sustainability of wildlife and fish...

  3. Five Years of Experimental Warming Increases the Biodiversity and Productivity of Phytoplankton

    PubMed Central

    Yvon-Durocher, Gabriel; Allen, Andrew P.; Cellamare, Maria; Dossena, Matteo; Gaston, Kevin J.; Leitao, Maria; Montoya, José M.; Reuman, Daniel C.; Woodward, Guy; Trimmer, Mark

    2015-01-01

    Phytoplankton are key components of aquatic ecosystems, fixing CO2 from the atmosphere through photosynthesis and supporting secondary production, yet relatively little is known about how future global warming might alter their biodiversity and associated ecosystem functioning. Here, we explore how the structure, function, and biodiversity of a planktonic metacommunity was altered after five years of experimental warming. Our outdoor mesocosm experiment was open to natural dispersal from the regional species pool, allowing us to explore the effects of experimental warming in the context of metacommunity dynamics. Warming of 4°C led to a 67% increase in the species richness of the phytoplankton, more evenly-distributed abundance, and higher rates of gross primary productivity. Warming elevated productivity indirectly, by increasing the biodiversity and biomass of the local phytoplankton communities. Warming also systematically shifted the taxonomic and functional trait composition of the phytoplankton, favoring large, colonial, inedible phytoplankton taxa, suggesting stronger top-down control, mediated by zooplankton grazing played an important role. Overall, our findings suggest that temperature can modulate species coexistence, and through such mechanisms, global warming could, in some cases, increase the species richness and productivity of phytoplankton communities. PMID:26680314

  4. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  5. Alcohol consumers' attention to warning labels and brand information on alcohol packaging: Findings from cross-sectional and experimental studies.

    PubMed

    Kersbergen, Inge; Field, Matt

    2017-01-26

    Alcohol warning labels have a limited effect on drinking behavior, potentially because people devote minimal attention to them. We report findings from two studies in which we measured the extent to which alcohol consumers attend to warning labels on alcohol packaging, and aimed to identify if increased attention to warning labels is associated with motivation to change drinking behavior. Study 1 (N = 60) was an exploratory cross-sectional study in which we used eye-tracking to measure visual attention to brand and health information on alcohol and soda containers. In study 2 (N = 120) we manipulated motivation to reduce drinking using an alcohol brief intervention (vs control intervention) and measured heavy drinkers' attention to branding and warning labels with the same eye-tracking paradigm as in study 1. Then, in a separate task we experimentally manipulated attention by drawing a brightly colored border around health (or brand) information before measuring participants' self-reported drinking intentions for the subsequent week. Study 1 showed that participants paid minimal attention to warning labels (7% of viewing time). Participants who were motivated to reduce drinking paid less attention to alcohol branding and alcohol warning labels. Results from study 2 showed that the alcohol brief intervention decreased attention to branding compared to the control condition, but it did not affect attention to warning labels. Furthermore, the experimental manipulation of attention to health or brand information did not influence drinking intentions for the subsequent week. Alcohol consumers allocate minimal attention to warning labels on alcohol packaging and even if their attention is directed to these warning labels, this has no impact on their drinking intentions. The lack of attention to warning labels, even among people who actively want to cut down, suggests that there is room for improvement in the content of health warnings on alcohol packaging.

  6. Experimental Demonstration of Counterfactual Quantum Communication

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Ju, Lei; Liang, Xiao-Lei; Tang, Shi-Biao; Tu, Guo-Liang Shen; Zhou, Lei; Peng, Cheng-Zhi; Chen, Kai; Chen, Teng-Yun; Chen, Zeng-Bing; Pan, Jian-Wei

    2012-07-01

    Quantum effects, besides offering substantial superiority in many tasks over classical methods, are also expected to provide interesting ways to establish secret keys between remote parties. A striking scheme called “counterfactual quantum cryptography” proposed by Noh [Phys. Rev. Lett. 103, 230501 (2009).PRLTAO0031-900710.1103/PhysRevLett.103.230501] allows one to maintain secure key distributions, in which particles carrying secret information are seemingly not being transmitted through quantum channels. We have experimentally demonstrated, for the first time, a faithful implementation for such a scheme with an on-table realization operating at telecom wavelengths. To verify its feasibility for extension over a long distance, we have furthermore reported an illustration on a 1 km fiber. In both cases, high visibilities of more than 98% are achieved through active stabilization of interferometers. Our demonstration is crucial as a direct verification of such a remarkable application, and this procedure can become a key communication module for revealing fundamental physics through counterfactuals.

  7. They see a rat, we seek a cure for diseases: the current status of animal experimentation in medical practice.

    PubMed

    Kehinde, Elijah O

    2013-01-01

    The objective of this review article was to examine current and prospective developments in the scientific use of laboratory animals, and to find out whether or not there are still valid scientific benefits of and justification for animal experimentation. The PubMed and Web of Science databases were searched using the following key words: animal models, basic research, pharmaceutical research, toxicity testing, experimental surgery, surgical simulation, ethics, animal welfare, benign, malignant diseases. Important relevant reviews, original articles and references from 1970 to 2012 were reviewed for data on the use of experimental animals in the study of diseases. The use of laboratory animals in scientific research continues to generate intense public debate. Their use can be justified today in the following areas of research: basic scientific research, use of animals as models for human diseases, pharmaceutical research and development, toxicity testing and teaching of new surgical techniques. This is because there are inherent limitations in the use of alternatives such as in vitro studies, human clinical trials or computer simulation. However, there are problems of transferability of results obtained from animal research to humans. Efforts are on-going to find suitable alternatives to animal experimentation like cell and tissue culture and computer simulation. For the foreseeable future, it would appear that to enable scientists to have a more precise understanding of human disease, including its diagnosis, prognosis and therapeutic intervention, there will still be enough grounds to advocate animal experimentation. However, efforts must continue to minimize or eliminate the need for animal testing in scientific research as soon as possible. © 2013 S. Karger AG, Basel.

  8. Provably secure and high-rate quantum key distribution with time-bin qudits

    DOE PAGES

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...

    2017-11-24

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  9. Provably secure and high-rate quantum key distribution with time-bin qudits

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  10. Research Methods in Healthcare Epidemiology and Antimicrobial Stewardship – Quasi-Experimental Designs

    PubMed Central

    Schweizer, Marin L.; Braun, Barbara I.; Milstone, Aaron M.

    2016-01-01

    Quasi-experimental studies evaluate the association between an intervention and an outcome using experiments in which the intervention is not randomly assigned. Quasi-experimental studies are often used to evaluate rapid responses to outbreaks or other patient safety problems requiring prompt non-randomized interventions. Quasi-experimental studies can be categorized into three major types: interrupted time series designs, designs with control groups, and designs without control groups. This methods paper highlights key considerations for quasi-experimental studies in healthcare epidemiology and antimicrobial stewardship including study design and analytic approaches to avoid selection bias and other common pitfalls of quasi-experimental studies. PMID:27267457

  11. Key node selection in minimum-cost control of complex networks

    NASA Astrophysics Data System (ADS)

    Ding, Jie; Wen, Changyun; Li, Guoqi

    2017-11-01

    Finding the key node set that is connected with a given number of external control sources for driving complex networks from initial state to any predefined state with minimum cost, known as minimum-cost control problem, is critically important but remains largely open. By defining an importance index for each node, we propose revisited projected gradient method extension (R-PGME) in Monte-Carlo scenario to determine key node set. It is found that the importance index of a node is strongly correlated to occurrence rate of that node to be selected as a key node in Monte-Carlo realizations for three elementary topologies, Erdős-Rényi and scale-free networks. We also discover the distribution patterns of key nodes when the control cost reaches its minimum. Specifically, the importance indices of all nodes in an elementary stem show a quasi-periodic distribution with high peak values in the beginning and end of a quasi-period while they approach to a uniform distribution in an elementary cycle. We further point out that an elementary dilation can be regarded as two elementary stems whose lengths are the closest, and the importance indices in each stem present similar distribution as in an elementary stem. Our results provide a better understanding and deep insight of locating the key nodes in different topologies with minimum control cost.

  12. Epigenetic reprogramming - is deamination key to active DNA demethylation?

    PubMed Central

    Teperek-Tkacz, Marta; Pasque, Vincent; Gentsch, George; Ferguson-Smith, Anne C.

    2013-01-01

    DNA demethylation processes are important for reproduction being central in epigenetic reprogramming during embryonic and germ cell development. While the enzymes methylating DNA have been known for many years, identification of factors capable of mediating active DNA demethylation has been challenging. Recent findings suggest that cytidine deaminases may be key players in active DNA demethylation. One of the most investigated candidates is AID (activation-induced cytidine deaminase) best known for its role in generating secondary antibody diversity in B cells. We evaluate evidence for cytidine deaminases in DNA demethylation pathways in vertebrates and discuss possible models for their targeting and activity regulation. These findings are also considered alongside alternative demethylation pathways involving hydroxymethylation. PMID:21911441

  13. Honeybees Learn Odour Mixtures via a Selection of Key Odorants

    PubMed Central

    Reinhard, Judith; Sinclair, Michael; Srinivasan, Mandyam V.; Claudianos, Charles

    2010-01-01

    Background The honeybee has to detect, process and learn numerous complex odours from her natural environment on a daily basis. Most of these odours are floral scents, which are mixtures of dozens of different odorants. To date, it is still unclear how the bee brain unravels the complex information contained in scent mixtures. Methodology/Principal Findings This study investigates learning of complex odour mixtures in honeybees using a simple olfactory conditioning procedure, the Proboscis-Extension-Reflex (PER) paradigm. Restrained honeybees were trained to three scent mixtures composed of 14 floral odorants each, and then tested with the individual odorants of each mixture. Bees did not respond to all odorants of a mixture equally: They responded well to a selection of key odorants, which were unique for each of the three scent mixtures. Bees showed less or very little response to the other odorants of the mixtures. The bees' response to mixtures composed of only the key odorants was as good as to the original mixtures of 14 odorants. A mixture composed of the other, non-key-odorants elicited a significantly lower response. Neither an odorant's volatility or molecular structure, nor learning efficiencies for individual odorants affected whether an odorant became a key odorant for a particular mixture. Odorant concentration had a positive effect, with odorants at high concentration likely to become key odorants. Conclusions/Significance Our study suggests that the brain processes complex scent mixtures by predominantly learning information from selected key odorants. Our observations on key odorant learning lend significant support to previous work on olfactory learning and mixture processing in honeybees. PMID:20161714

  14. Immunological and pathological investigations in equine experimental uveitis.

    PubMed

    Simeonova, Galina P; Krastev, Svetozar Z; Simeonov, Radostin S

    2016-12-01

    The pathogenic mechanism of equine recurrent uveitis (ERU) is still poorly defined and many variations between experimental animal models and spontaneous disease exist. The aim of our study was to investigate if Th17 cell-mediated response plays role in the pathogenesis of the used experimental model in horses and to reveal its pathological findings. Experimental uveitis was induced in 6 healthy horses. The concentrations of retinal autoantigen CRALBP and IL-17 were measured using ELISA in aqueous humor and vitreous body of the 12 inflamed eyes as well as in 12 control non-inflamed eyes taken from 6 horses in slaughter house. After centrifugation of the two eye media, smears were prepared and cytological investigation was performed. Tissue specimens were taken from all eye globes and were submitted to histopathological investigation. CRALBP and IL-17 concentrations were significantly elevated in eye media of horses with experimental uveitis in comparison with controls. Cytological and histopathological findings corresponded to the changes characteristic of chronic immune-mediated inflammation with mononuclear cell infiltration of uvea, choroid, retina, and eye media as well as severe retinal destruction. Our study demonstrated the involvement of the retinal autoantigen CRALBP as well as IL-17 in the pathogenesis of experimental uveitis in horses. These findings suggests that this experimental uveitis in horses may serve as a suitable animal model for investigation of IL-17- mediated immune response during spontaneous autoimmune uveitis in horses as well as in humans.

  15. Students' views about the nature of experimental physics

    NASA Astrophysics Data System (ADS)

    Wilcox, Bethany

    2017-04-01

    The physics community explores and explains the physical world through a blend of theoretical and experimental studies. The future of physics as a discipline depends on training of students in both the theoretical and experimental aspects of the field. However, while student learning within lecture courses has been the subject of extensive research, lab courses remain relatively under-studied. In particular, there is little, if any, data available that addresses the effectiveness of physics lab courses at encouraging students to recognize the nature and importance of experimental physics within the discipline as a whole. To address this gap, we present the first large-scale, national study (Ninstitutions = 71 and Nstudents = 7167) of undergraduate physics lab courses through analysis of students' responses to a research-validated assessment designed to investigate students' beliefs about the nature of experimental physics. We find that students often enter and leave physics lab courses with ideas about experimental physics that are inconsistent with the views of practicing experimental physicists, and this trend holds at both the introductory and upper-division levels. Despite this inconsistency, we find that both introductory and upper-division students are able to accurately predict the expert-like response even in cases where their personal views disagree. These finding have implications for the recruitment, retention, and adequate preparation of students in physics. This work was funded by the NSF-IUSE Grant No. DUE-1432204 and NSF Grant No. PHY-1125844.

  16. Design of high productivity antibody capture by protein A chromatography using an integrated experimental and modeling approach.

    PubMed

    Ng, Candy K S; Osuna-Sanchez, Hector; Valéry, Eric; Sørensen, Eva; Bracewell, Daniel G

    2012-06-15

    An integrated experimental and modeling approach for the design of high productivity protein A chromatography is presented to maximize productivity in bioproduct manufacture. The approach consists of four steps: (1) small-scale experimentation, (2) model parameter estimation, (3) productivity optimization and (4) model validation with process verification. The integrated use of process experimentation and modeling enables fewer experiments to be performed, and thus minimizes the time and materials required in order to gain process understanding, which is of key importance during process development. The application of the approach is demonstrated for the capture of antibody by a novel silica-based high performance protein A adsorbent named AbSolute. In the example, a series of pulse injections and breakthrough experiments were performed to develop a lumped parameter model, which was then used to find the best design that optimizes the productivity of a batch protein A chromatographic process for human IgG capture. An optimum productivity of 2.9 kg L⁻¹ day⁻¹ for a column of 5mm diameter and 8.5 cm length was predicted, and subsequently verified experimentally, completing the whole process design approach in only 75 person-hours (or approximately 2 weeks). Copyright © 2012 Elsevier B.V. All rights reserved.

  17. Predicting Key Events in the Popularity Evolution of Online Information

    PubMed Central

    Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121

  18. A semi-automatic 2D-to-3D video conversion with adaptive key-frame selection

    NASA Astrophysics Data System (ADS)

    Ju, Kuanyu; Xiong, Hongkai

    2014-11-01

    To compensate the deficit of 3D content, 2D to 3D video conversion (2D-to-3D) has recently attracted more attention from both industrial and academic communities. The semi-automatic 2D-to-3D conversion which estimates corresponding depth of non-key-frames through key-frames is more desirable owing to its advantage of balancing labor cost and 3D effects. The location of key-frames plays a role on quality of depth propagation. This paper proposes a semi-automatic 2D-to-3D scheme with adaptive key-frame selection to keep temporal continuity more reliable and reduce the depth propagation errors caused by occlusion. The potential key-frames would be localized in terms of clustered color variation and motion intensity. The distance of key-frame interval is also taken into account to keep the accumulated propagation errors under control and guarantee minimal user interaction. Once their depth maps are aligned with user interaction, the non-key-frames depth maps would be automatically propagated by shifted bilateral filtering. Considering that depth of objects may change due to the objects motion or camera zoom in/out effect, a bi-directional depth propagation scheme is adopted where a non-key frame is interpolated from two adjacent key frames. The experimental results show that the proposed scheme has better performance than existing 2D-to-3D scheme with fixed key-frame interval.

  19. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  20. Changes in Land Cover and Terrestrial Biogeochemistry in the US: Key Findings from the Climate Science Special Report (CSSR)

    NASA Astrophysics Data System (ADS)

    Hibbard, K. A.; Hoffman, F. M.; Huntzinger, D. N.; West, T. O.

    2017-12-01

    The continual increase in annual average temperatures (1.0°C for the period 1901-2016 for the contiguous US), growing number of high temperature records, increasing intensity and frequency of heavy precipitation events in most parts of the US, and rising global mean sea level are among the key findings from the forthcoming Climate Science Special Report (CSSR) produced by the US Global Change Research Program (USGCRP). A chapter new to the climate science assessments directly addresses the feedbacks between climate change, land use and land cover change, and the carbon cycle. While the terrestrial biosphere is presently a net carbon sink, which has steadily increased since 1980, the future sign and magnitude of biosphere uptake cannot be determined because of uncertainties in the future trajectory of land cover and land use. Citing recent research, the chapter highlights that the combined effects of land use and land cover changes due to human activities account for 40% ± 16% of the human-caused global radiative forcing from 1850 to present. Moverover, plant community structure has already been altered by climate change and changes in the frequency and intensity of extreme events. Changes in temperature also have direct effects on the land surface as well as feedbacks to the atmosphere. For example, the number of consecutive frost-free days and the length of the growing season have increased across all regions in the contiguous US; however, overall plant productivity has been limited by biotic factors and seasonal limitations in water and nutrient availability. Within cities, the urban heat island (UHI) effect results in daytime temperatures 0.5°C-4.0°C higher and nighttime temperatures 1.0°C-2.5°C higher in urban areas than surrounding rural areas. We discuss terrestrial and biogeochemical forcings and feedbacks that can serve as critical evaluation and paramaterization datasets for Earth system modeling approaches with implications for management of

  1. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  2. EAARL submarine topography: Florida Keys National Marine Sanctuary

    USGS Publications Warehouse

    Brock, John C.; Wright, C. Wayne; Nayegandhi, Amar; Woolard, Jason; Patterson, Matt; Wilson, Iris; Travers, Laurinda J.

    2007-01-01

    This Web site contains 46 Lidar-derived submarine topography maps and GIS files for the Florida Keys National Marine Sanctuary. These Lidar-derived submarine topographic maps were produced as a collaborative effort between the U.S. Geological Survey (USGS) Coastal and Marine Geology Program, FISC St. Petersburg, Florida, the National Oceanic and Atmospheric Administration (NOAA), Remote Sensing Division, the National Park Service (NPS) South Florida/Caribbean Network Inventory and Monitoring Program, and the National Aeronautics and Space Administration (NASA) Wallops Flight Facility. One objective of this research is to create techniques to survey coral reefs and barrier islands for the purposes of geomorphic change studies, habitat mapping, ecological monitoring, change detection, and event assessment. As part of this project, data from an innovative instrument under development at the NASA Wallops Flight Facility, the NASA Experimental Airborne Advanced Research Lidar (EAARL) are being used. This sensor has the potential to make significant contributions in this realm for measuring subaerial and submarine topography within cross-environment surveys. High spectral resolution, water-column correction, and low costs were found to be key factors in providing accurate and affordable imagery to coastal resource managers.

  3. Exploring novel key regulators in breast cancer network.

    PubMed

    Ali, Shahnawaz; Malik, Md Zubbair; Singh, Soibam Shyamchand; Chirom, Keilash; Ishrat, Romana; Singh, R K Brojen

    2018-01-01

    The breast cancer network constructed from 70 experimentally verified genes is found to follow hierarchical scale free nature with heterogeneous modular organization and diverge leading hubs. The topological parameters (degree distributions, clustering co-efficient, connectivity and centralities) of this network obey fractal rules indicating absence of centrality lethality rule, and efficient communication among the components. From the network theoretical approach, we identified few key regulators out of large number of leading hubs, which are deeply rooted from top to down of the network, serve as backbone of the network, and possible target genes. However, p53, which is one of these key regulators, is found to be in low rank and keep itself at low profile but directly cross-talks with important genes BRCA2 and BRCA3. The popularity of these hubs gets changed in unpredictable way at various levels of organization thus showing disassortive nature. The local community paradigm approach in this network shows strong correlation of nodes in majority of modules/sub-modules (fast communication among nodes) and weak correlation of nodes only in few modules/sub-modules (slow communication among nodes) at various levels of network organization.

  4. Internally electrodynamic particle model: Its experimental basis and its predictions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng-Johansson, J. X., E-mail: jxzj@iofpr.or

    2010-03-15

    The internally electrodynamic (IED) particle model was derived based on overall experimental observations, with the IED process itself being built directly on three experimental facts: (a) electric charges present with all material particles, (b) an accelerated charge generates electromagnetic waves according to Maxwell's equations and Planck energy equation, and (c) source motion produces Doppler effect. A set of well-known basic particle equations and properties become predictable based on first principles solutions for the IED process; several key solutions achieved are outlined, including the de Broglie phase wave, de Broglie relations, Schroedinger equation, mass, Einstein mass-energy relation, Newton's law of gravity,more » single particle self interference, and electromagnetic radiation and absorption; these equations and properties have long been broadly experimentally validated or demonstrated. A conditioned solution also predicts the Doebner-Goldin equation which emerges to represent a form of long-sought quantum wave equation including gravity. A critical review of the key experiments is given which suggests that the IED process underlies the basic particle equations and properties not just sufficiently but also necessarily.« less

  5. Internally electrodynamic particle model: Its experimental basis and its predictions

    NASA Astrophysics Data System (ADS)

    Zheng-Johansson, J. X.

    2010-03-01

    The internally electrodynamic (IED) particle model was derived based on overall experimental observations, with the IED process itself being built directly on three experimental facts: (a) electric charges present with all material particles, (b) an accelerated charge generates electromagnetic waves according to Maxwell’s equations and Planck energy equation, and (c) source motion produces Doppler effect. A set of well-known basic particle equations and properties become predictable based on first principles solutions for the IED process; several key solutions achieved are outlined, including the de Broglie phase wave, de Broglie relations, Schrödinger equation, mass, Einstein mass-energy relation, Newton’s law of gravity, single particle self interference, and electromagnetic radiation and absorption; these equations and properties have long been broadly experimentally validated or demonstrated. A conditioned solution also predicts the Doebner-Goldin equation which emerges to represent a form of long-sought quantum wave equation including gravity. A critical review of the key experiments is given which suggests that the IED process underlies the basic particle equations and properties not just sufficiently but also necessarily.

  6. An Experimental Introduction to Acoustics

    ERIC Educational Resources Information Center

    Black, Andy Nicholas; Magruder, Robert H.

    2017-01-01

    Learning and understanding physics requires more than studying physics texts. It requires doing physics. Doing research is a key opportunity for students to connect physical principles with their everyday experience. A powerful way to introduce students to research and technique is through subjects in which they might find interest. Presented is…

  7. An experimental aluminum-fueled power plant

    NASA Astrophysics Data System (ADS)

    Vlaskin, M. S.; Shkolnikov, E. I.; Bersh, A. V.; Zhuk, A. Z.; Lisicyn, A. V.; Sorokovikov, A. I.; Pankina, Yu. V.

    2011-10-01

    An experimental co-generation power plant (CGPP-10) using aluminum micron powder (with average particle size up to 70 μm) as primary fuel and water as primary oxidant was developed and tested. Power plant can work in autonomous (unconnected from industrial network) nonstop regime producing hydrogen, electrical energy and heat. One of the key components of experimental plant is aluminum-water high-pressure reactor projected for hydrogen production rate of ∼10 nm3 h-1. Hydrogen from the reactor goes through condenser and dehumidifier and with -25 °C dew-point temperature enters into the air-hydrogen fuel cell 16 kW-battery. From 1 kg of aluminum the experimental plant produces 1 kWh of electrical energy and 5-7 kWh of heat. Power consumer gets about 10 kW of electrical power. Plant electrical and total efficiencies are 12% and 72%, respectively.

  8. Experimental trauma of occipital impacts.

    DOT National Transportation Integrated Search

    1974-03-01

    The paper presents clinical observations, physiological data and pathological findings that have been collected on a series of baboons exposed to controlled occipital impacts under local anesthesia. This acute experimental trauma study was accomplish...

  9. Key factors affecting dying children and their families.

    PubMed

    Hinds, Pamela S; Schum, Lisa; Baker, Justin N; Wolfe, Joanne

    2005-01-01

    The death of a child alters the life and health of others immediately and for the rest of their lives. How a child dies influences parents' abilities to continue their role functions as well as siblings' abilities to make and maintain friendships, and may be the basis for health care providers' decisions to exit direct care roles. Thus, facilitating a "good death"-an obvious care priority for all involved with the dying child-ought also to be a priority for the health of bereaved families and affected health care providers. Making this a care priority is complicated by a serious lack of data, as details of the last hours or weeks of a dying child or adolescent's life are largely unknown. The purpose of this paper is to identify key factors that affect the course of dying children and adolescents and that of their bereaved survivors, and to link those key factors to needed research that could produce clinically relevant findings to improve the care of these patients. Key factors described here include suffering (physical, psychological, and spiritual), communication, decision making, prognostic ambiguities, ability of the seriously ill child to give assent to research participation, and educational preparation of health care providers to give competent end-of-life care.

  10. TSLP: A Key Regulator of Asthma Pathogenesis.

    PubMed

    West, Erin E; Kashyap, Mohit; Leonard, Warren J

    2012-12-01

    Asthma is a complex disorder of the airways that is characterized by T helper type 2 (Th2) inflammation. The pleiotrophic cytokine TSLP has emerged as an important player involved in orchestrating the inflammation seen in asthma and other atopic diseases. Early research elucidated the role of TSLP on CD4 + T cells, and recent work has revealed the impact of TSLP on multiple cell types. Furthermore, TSLP plays an important role in the sequential progression of atopic dermatitis to asthma, clarifying the key role of TSLP in the pathogenesis of asthma, a finding with therapeutic implications.

  11. Training: Who Needs It? Research Report 1995. Key Issues for Providers.

    ERIC Educational Resources Information Center

    Hotel and Catering Training Co., London (England).

    Aimed at all those involved in the supply of training and vocational education for the hospitality industry, this report summarizes findings of the research report, "Training Who Needs It?" It draws out and explores in more detail key issues relating to the provision of training, support, and related initiatives for the industry. Section…

  12. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  13. Quality and Improvement in Scottish Education: Trends in Inspection Findings 2008-2011

    ERIC Educational Resources Information Center

    Education Scotland, 2012

    2012-01-01

    The findings of Education Scotland's sectoral programme of inspections, which sample the providers of education at every stage from the early years to adult learning, provide a key source of evidence on how effectively one of its core public services is performing. The last published summary of inspection findings was produced in 2009 when Her…

  14. Entangled-coherent-state quantum key distribution with entanglement witnessing

    NASA Astrophysics Data System (ADS)

    Simon, David S.; Jaeger, Gregg; Sergienko, Alexander V.

    2014-01-01

    An entanglement-witness approach to quantum coherent-state key distribution and a system for its practical implementation are described. In this approach, eavesdropping can be detected by a change in sign of either of two witness functions: an entanglement witness S or an eavesdropping witness W. The effects of loss and eavesdropping on system operation are evaluated as a function of distance. Although the eavesdropping witness W does not directly witness entanglement for the system, its behavior remains related to that of the true entanglement witness S. Furthermore, W is easier to implement experimentally than S. W crosses the axis at a finite distance, in a manner reminiscent of entanglement sudden death. The distance at which this occurs changes measurably when an eavesdropper is present. The distance dependence of the two witnesses due to amplitude reduction and due to increased variance resulting from both ordinary propagation losses and possible eavesdropping activity is provided. Finally, the information content and secure key rate of a continuous variable protocol using this witness approach are given.

  15. Identification of key micro-organisms involved in Douchi fermentation by statistical analysis and their use in an experimental fermentation.

    PubMed

    Chen, C; Xiang, J Y; Hu, W; Xie, Y B; Wang, T J; Cui, J W; Xu, Y; Liu, Z; Xiang, H; Xie, Q

    2015-11-01

    To screen and identify safe micro-organisms used during Douchi fermentation, and verify the feasibility of producing high-quality Douchi using these identified micro-organisms. PCR-denaturing gradient gel electrophoresis (DGGE) and automatic amino-acid analyser were used to investigate the microbial diversity and free amino acids (FAAs) content of 10 commercial Douchi samples. The correlations between microbial communities and FAAs were analysed by statistical analysis. Ten strains with significant positive correlation were identified. Then an experiment on Douchi fermentation by identified strains was carried out, and the nutritional composition in Douchi was analysed. Results showed that FAAs and relative content of isoflavone aglycones in verification Douchi samples were generally higher than those in commercial Douchi samples. Our study indicated that fungi, yeasts, Bacillus and lactic acid bacteria were the key players in Douchi fermentation, and with identified probiotic micro-organisms participating in fermentation, a higher quality Douchi product was produced. This is the first report to analyse and confirm the key micro-organisms during Douchi fermentation by statistical analysis. This work proves fermentation micro-organisms to be the key influencing factor of Douchi quality, and demonstrates the feasibility of fermenting Douchi using identified starter micro-organisms. © 2015 The Society for Applied Microbiology.

  16. Physical Cryptography: A New Approach to Key Generation and Direct Encryption

    DTIC Science & Technology

    2009-11-18

    has been  further studied theoretically and P a g e  | 4    experimentally to only a limited extent. The second is quantum cryptography [3] based on...Std Z39-18 P a g e  | 2    Abstract: The security of key generation and direct encryption in quantum and physical cryptography have been...investigated. It is found that similar to the situation of conventional mathematics based cryptography , fundamental and meaningful security levels for either

  17. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  18. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE PAGES

    Farmer, M. T.; Gerardi, C.; Bremer, N.; ...

    2016-10-31

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  19. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farmer, M. T.; Gerardi, C.; Bremer, N.

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  20. Effect of the Key Mixture Parameters on Shrinkage of Reactive Powder Concrete

    PubMed Central

    Zubair, Ahmed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 33 factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content. PMID:25050395

  1. Effect of the key mixture parameters on shrinkage of reactive powder concrete.

    PubMed

    Ahmad, Shamsad; Zubair, Ahmed; Maslehuddin, Mohammed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 3(3) factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content.

  2. Stress in hospital medicine: a problem for key hospital staff.

    PubMed

    Allen, I

    2001-08-01

    Many factors which contribute to stress in the workplace apply to both consultants and ward sisters. Both groups find that their roles have become more complex while they have increasingly lost control of their own clinical and professional territory in a managerial culture. The erosion of the key relationship between consultants and ward sisters is of concern and the need for teamworking is insufficiently recognized.

  3. Clinical decision-making and secondary findings in systems medicine.

    PubMed

    Fischer, T; Brothers, K B; Erdmann, P; Langanke, M

    2016-05-21

    Systems medicine is the name for an assemblage of scientific strategies and practices that include bioinformatics approaches to human biology (especially systems biology); "big data" statistical analysis; and medical informatics tools. Whereas personalized and precision medicine involve similar analytical methods applied to genomic and medical record data, systems medicine draws on these as well as other sources of data. Given this distinction, the clinical translation of systems medicine poses a number of important ethical and epistemological challenges for researchers working to generate systems medicine knowledge and clinicians working to apply it. This article focuses on three key challenges: First, we will discuss the conflicts in decision-making that can arise when healthcare providers committed to principles of experimental medicine or evidence-based medicine encounter individualized recommendations derived from computer algorithms. We will explore in particular whether controlled experiments, such as comparative effectiveness trials, should mediate the translation of systems medicine, or if instead individualized findings generated through "big data" approaches can be applied directly in clinical decision-making. Second, we will examine the case of the Riyadh Intensive Care Program Mortality Prediction Algorithm, pejoratively referred to as the "death computer," to demonstrate the ethical challenges that can arise when big-data-driven scoring systems are applied in clinical contexts. We argue that the uncritical use of predictive clinical algorithms, including those envisioned for systems medicine, challenge basic understandings of the doctor-patient relationship. Third, we will build on the recent discourse on secondary findings in genomics and imaging to draw attention to the important implications of secondary findings derived from the joint analysis of data from diverse sources, including data recorded by patients in an attempt to realize their

  4. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  5. The Children's Hearings Project Research Findings. A Summary Report.

    ERIC Educational Resources Information Center

    Merry, Sally E.; And Others

    Since 1980 the Children's Hearings Project (CHP) in Cambridge, Massachusetts, has offered status offenders and their families mediation as an alternative to the courts. This report describes CPH's origins and summarizes the results of an extensive research study conducted during the first 2 years of its operation. The key findings were: (1)…

  6. ChoiceKey: a real-time speech recognition program for psychology experiments with a small response set.

    PubMed

    Donkin, Christopher; Brown, Scott D; Heathcote, Andrew

    2009-02-01

    Psychological experiments often collect choice responses using buttonpresses. However, spoken responses are useful in many cases-for example, when working with special clinical populations, or when a paradigm demands vocalization, or when accurate response time measurements are desired. In these cases, spoken responses are typically collected using a voice key, which usually involves manual coding by experimenters in a tedious and error-prone manner. We describe ChoiceKey, an open-source speech recognition package for MATLAB. It can be optimized by training for small response sets and different speakers. We show ChoiceKey to be reliable with minimal training for most participants in experiments with two different responses. Problems presented by individual differences, and occasional atypical responses, are examined, and extensions to larger response sets are explored. The ChoiceKey source files and instructions may be downloaded as supplemental materials for this article from brm.psychonomic-journals.org/content/supplemental.

  7. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  8. Experimental quantum fingerprinting with weak coherent pulses.

    PubMed

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-30

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  9. Experimental quantum fingerprinting with weak coherent pulses

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  10. Upper bounds on secret-key agreement over lossy thermal bosonic channels

    NASA Astrophysics Data System (ADS)

    Kaur, Eneet; Wilde, Mark M.

    2017-12-01

    Upper bounds on the secret-key-agreement capacity of a quantum channel serve as a way to assess the performance of practical quantum-key-distribution protocols conducted over that channel. In particular, if a protocol employs a quantum repeater, achieving secret-key rates exceeding these upper bounds is evidence of having a working quantum repeater. In this paper, we extend a recent advance [Liuzzo-Scorpo et al., Phys. Rev. Lett. 119, 120503 (2017), 10.1103/PhysRevLett.119.120503] in the theory of the teleportation simulation of single-mode phase-insensitive Gaussian channels such that it now applies to the relative entropy of entanglement measure. As a consequence of this extension, we find tighter upper bounds on the nonasymptotic secret-key-agreement capacity of the lossy thermal bosonic channel than were previously known. The lossy thermal bosonic channel serves as a more realistic model of communication than the pure-loss bosonic channel, because it can model the effects of eavesdropper tampering and imperfect detectors. An implication of our result is that the previously known upper bounds on the secret-key-agreement capacity of the thermal channel are too pessimistic for the practical finite-size regime in which the channel is used a finite number of times, and so it should now be somewhat easier to witness a working quantum repeater when using secret-key-agreement capacity upper bounds as a benchmark.

  11. Geraniol, a natural monoterpene, ameliorates hyperglycemia by attenuating the key enzymes of carbohydrate metabolism in streptozotocin-induced diabetic rats.

    PubMed

    Babukumar, Sukumar; Vinothkumar, Veerasamy; Sankaranarayanan, Chandrasekaran; Srinivasan, Subramani

    2017-12-01

    Geraniol, an acyclic monoterpene alcohol is found in medicinal plants, is used traditionally for several medical purposes including diabetes. The present study evaluates the antihyperglycemic potential of geraniol on key enzymes of carbohydrate metabolism in streptozotocin (STZ)-induced diabetic rats. Diabetes was induced in experimental rats, by a single intraperitoneal (i.p) injection of STZ [40 mg/kg body weight (b.w.)]. Different doses of geraniol (100, 200 and 400 mg/kg b.w.) and glyclazide (5 mg/kg b.w.) were administrated orally to diabetic rats for 45 days. Body weight, food intake, plasma glucose, insulin, blood haemoglobin (Hb), glycosylated haemoglobin (HbA 1c ), hepatic glucose metabolic enzymes and glycogen were examined. The LD 50 value of geraniol is 3600 mg/kg b.w. at oral administration in rats. Administration of geraniol in a dose-dependent manner (100, 200, 400 mg/kg b.w.) and glyclazide (5 mg/kg b.w.) for 45 days significantly improved the levels of insulin, Hb and decreased plasma glucose, HbA 1C in diabetic-treated rats. Geraniol at its effective dose (200 mg/kg b.w.) ameliorated the altered activities of carbohydrate metabolic enzymes near normal effects compared with two other doses (100 and 400 mg/kg b.w.). Geraniol treatment to diabetic rats improved hepatic glycogen content suggesting its anti-hyperglycemic potential. Geraniol supplement was found to preserve the normal histological appearance of hepatic cells and pancreatic β-cells in diabetic rats. The present findings suggest that geraniol can potentially ameliorate key enzymes of glucose metabolism in experimental diabetes even though clinical studies used to evaluate this possibility are warranted.

  12. An experimental analysis of a doped lithium fluoride direct absorption solar receiver

    NASA Technical Reports Server (NTRS)

    Kesseli, James; Pollak, Tom; Lacy, Dovie

    1988-01-01

    An experimental analysis of two key elements of a direct absorption solar receiver for use with Brayton solar dynamic systems was conducted. Experimental data are presented on LiF crystals doped with dysprosium, samarium, and cobalt fluorides. In addition, a simulation of the cavity/window environment was performed and a posttest inspection was conducted to evaluate chemical reactivity, transmissivity, and condensation rate.

  13. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

    PubMed

    Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J

    2018-05-01

    Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.

  14. Parental and retail supply of tobacco to minors: findings from a community-based social supply intervention study.

    PubMed

    Gautam, Jeny; Glover, Marewa; Scragg, Robert; Bullen, Chris; Gentles, Dudley; Nosa, Vili; McCool, Judith

    2014-07-01

    We report on findings from a quasi-experimental community trial of a complex intervention aimed at reducing social and commercial supply of cigarettes to young people. The intervention comprised a package of school, community and home-based smokefree strategies implemented over three years from 2007 to 2009 in a low-income area of Auckland, New Zealand, with another area serving as the control population. The main outcome measures were relative change in parental and retailer behaviour and in attitudes to the provision of tobacco to youth. We analysed baseline and follow-up data from questionnaires administered to parents and children living in the intervention and control areas using PASW Statistics 18. No difference was found between groups in parents' permissiveness of smoking and in retailer compliance to the tobacco sale legislation over the course of the study, either because our intervention had no or only a limited effect, or alternatively because limitations in the study design diluted any effect. Nevertheless, a key finding was that parents and retailers persisted as important sources of cigarettes for young people. Further study is required to identify effective interventions to address this issue. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  15. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N.

    2008-07-15

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determinedmore » for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency ({eta} {approx} 20%) and dark count probability (p{sub dark} {approx} 10{sup -7})« less

  16. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2008-07-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper’s capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ≈ 20%) and dark count probability ( p dark ˜ 10-7).

  17. One-sided measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Wen-Fei; Zhen, Yi-Zheng; Zheng, Yu-Lin; Li, Li; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai

    2018-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol was proposed to remove all the detector side channel attacks, while its security relies on the trusted encoding systems. Here we propose a one-sided MDI-QKD (1SMDI-QKD) protocol, which enjoys detection loophole-free advantage, and at the same time weakens the state preparation assumption in MDI-QKD. The 1SMDI-QKD can be regarded as a modified MDI-QKD, in which Bob's encoding system is trusted, while Alice's is uncharacterized. For the practical implementation, we also provide a scheme by utilizing coherent light source with an analytical two decoy state estimation method. Simulation with realistic experimental parameters shows that the protocol has a promising performance, and thus can be applied to practical QKD applications.

  18. Experimental demonstration of polarization encoding quantum key distribution system based on intrinsically stable polarization-modulated units.

    PubMed

    Wang, Jindong; Qin, Xiaojuan; Jiang, Yinzhu; Wang, Xiaojing; Chen, Liwei; Zhao, Feng; Wei, Zhengjun; Zhang, Zhiming

    2016-04-18

    A proof-of-principle demonstration of a one-way polarization encoding quantum key distribution (QKD) system is demonstrated. This approach can automatically compensate for birefringence and phase drift. This is achieved by constructing intrinsically stable polarization-modulated units (PMUs) to perform the encoding and decoding, which can be used with four-state protocol, six-state protocol, and the measurement-device-independent (MDI) scheme. A polarization extinction ratio of about 30 dB was maintained for several hours over a 50 km optical fiber without any adjustments to our setup, which evidences its potential for use in practical applications.

  19. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  20. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  1. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  2. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  3. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  4. Using experimental design to define boundary manikins.

    PubMed

    Bertilsson, Erik; Högberg, Dan; Hanson, Lars

    2012-01-01

    When evaluating human-machine interaction it is central to consider anthropometric diversity to ensure intended accommodation levels. A well-known method is the use of boundary cases where manikins with extreme but likely measurement combinations are derived by mathematical treatment of anthropometric data. The supposition by that method is that the use of these manikins will facilitate accommodation of the expected part of the total, less extreme, population. In literature sources there are differences in how many and in what way these manikins should be defined. A similar field to the boundary case method is the use of experimental design in where relationships between affecting factors of a process is studied by a systematic approach. This paper examines the possibilities to adopt methodology used in experimental design to define a group of manikins. Different experimental designs were adopted to be used together with a confidence region and its axes. The result from the study shows that it is possible to adapt the methodology of experimental design when creating groups of manikins. The size of these groups of manikins depends heavily on the number of key measurements but also on the type of chosen experimental design.

  5. Parametric Human Body Reconstruction Based on Sparse Key Points.

    PubMed

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  6. Teacher's Guide to SERAPHIM Software I. Chemistry: Experimental Foundations.

    ERIC Educational Resources Information Center

    Bogner, Donna J.

    Designed to assist chemistry teachers in selecting appropriate software programs, this publication is the first in a series of six teacher's guides from Project SERAPHIM, a program sponsored by the National Science Foundation. This guide is keyed to the chapters of the text "Chemistry: Experimental Foundations." Program suggestions are…

  7. Perceptual awareness and its neural basis: bridging experimental and theoretical paradigms

    PubMed Central

    Raffone, Antonino; Srinivasan, Narayanan; van Leeuwen, Cees

    2014-01-01

    Understanding consciousness is a major scientific challenge of our times, and perceptual awareness is an integral part of that challenge. This Theme Issue aims to provide a timely focus on crucial insights from leading scientists on perceptual awareness and its neural basis. The issue refers to key research questions and findings in perceptual awareness research and aims to be a catalyst for further research, by bringing together the state-of-the-art. It shows how bridges are being built between empirical and theoretical research and proposes new directions for the study of multisensory awareness and the role of the states of the body therein. In this introduction, we highlight crucial problems that have characterized the development of the study of perceptual awareness. We then provide an overview of major experimental and theoretical paradigms related to perceptual awareness and its neural basis. Finally, we present an overview of the Theme Issue, with reference to the contributed articles and their relationships. PMID:24639576

  8. 48 CFR 32.410 - Findings, determination, and authorization.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... shall be supported by written findings (see 32.402(c)(1)(iii)). (b) The following is an example of the...), as applicable]. (6) The Contractor is a nonprofit (educational) (and) (research) institution, and the contract is for (experimental) (,) (research and development) work. (7) The contract is solely for the...

  9. 48 CFR 32.410 - Findings, determination, and authorization.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... shall be supported by written findings (see 32.402(c)(1)(iii)). (b) The following is an example of the...), as applicable]. (6) The Contractor is a nonprofit (educational) (and) (research) institution, and the contract is for (experimental) (,) (research and development) work. (7) The contract is solely for the...

  10. 48 CFR 32.410 - Findings, determination, and authorization.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... shall be supported by written findings (see 32.402(c)(1)(iii)). (b) The following is an example of the...), as applicable]. (6) The Contractor is a nonprofit (educational) (and) (research) institution, and the contract is for (experimental) (,) (research and development) work. (7) The contract is solely for the...

  11. 48 CFR 32.410 - Findings, determination, and authorization.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... shall be supported by written findings (see 32.402(c)(1)(iii)). (b) The following is an example of the...), as applicable]. (6) The Contractor is a nonprofit (educational) (and) (research) institution, and the contract is for (experimental) (,) (research and development) work. (7) The contract is solely for the...

  12. 48 CFR 32.410 - Findings, determination, and authorization.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... shall be supported by written findings (see 32.402(c)(1)(iii)). (b) The following is an example of the...), as applicable]. (6) The Contractor is a nonprofit (educational) (and) (research) institution, and the contract is for (experimental) (,) (research and development) work. (7) The contract is solely for the...

  13. Foundational Terminal Operations HITL: Experimental Design Slides

    NASA Technical Reports Server (NTRS)

    Rorie, Robert Conrad

    2017-01-01

    The UAS (Unmanned Aircraft Systems) in the NAS (National Airspace System) project is conducting its first investigation of UAS operations in the terminal environment. A workshop is being held to get input from key stakeholders on the experimental design and scenario development occuring for this simulation, which intends to begin data collection in September 2017. These slides cover the proposed design and methodolgy for the experiment.

  14. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  15. Security of a semi-quantum protocol where reflections contribute to the secret key

    NASA Astrophysics Data System (ADS)

    Krawec, Walter O.

    2016-05-01

    In this paper, we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using X basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work, we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key; for error rates larger than this threshold, A and B should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.

  16. The Kings River Experimental Watersheds: new findings about headwater streams of the southern Sierra Nevada

    Treesearch

    Carolyn Hunsaker

    2013-01-01

    The Kings River Experimental Watersheds (KREW) study was designed to (1) characterize the variability in watershed attributes considered important to understanding processes and health of headwater streams and forest watersheds and (2) evaluate forest restoration treatments. The KREW is a paired watershed experiment located in the headwaters of the Kings River Basin...

  17. Finding the target sites of RNA-binding proteins

    PubMed Central

    Li, Xiao; Kazan, Hilal; Lipshitz, Howard D; Morris, Quaid D

    2014-01-01

    RNA–protein interactions differ from DNA–protein interactions because of the central role of RNA secondary structure. Some RNA-binding domains (RBDs) recognize their target sites mainly by their shape and geometry and others are sequence-specific but are sensitive to secondary structure context. A number of small- and large-scale experimental approaches have been developed to measure RNAs associated in vitro and in vivo with RNA-binding proteins (RBPs). Generalizing outside of the experimental conditions tested by these assays requires computational motif finding. Often RBP motif finding is done by adapting DNA motif finding methods; but modeling secondary structure context leads to better recovery of RBP-binding preferences. Genome-wide assessment of mRNA secondary structure has recently become possible, but these data must be combined with computational predictions of secondary structure before they add value in predicting in vivo binding. There are two main approaches to incorporating structural information into motif models: supplementing primary sequence motif models with preferred secondary structure contexts (e.g., MEMERIS and RNAcontext) and directly modeling secondary structure recognized by the RBP using stochastic context-free grammars (e.g., CMfinder and RNApromo). The former better reconstruct known binding preferences for sequence-specific RBPs but are not suitable for modeling RBPs that recognize shape and geometry of RNAs. Future work in RBP motif finding should incorporate interactions between multiple RBDs and multiple RBPs in binding to RNA. WIREs RNA 2014, 5:111–130. doi: 10.1002/wrna.1201 PMID:24217996

  18. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  19. Overview of Experimental and Clinical Findings regarding the Neuroprotective Effects of Cerebral Ischemic Postconditioning.

    PubMed

    Ma, Di; Feng, Liangshu; Deng, Fang; Feng, Jia-Chun

    2017-01-01

    Research on attenuating the structural and functional deficits observed following ischemia-reperfusion has become increasingly focused on the therapeutic potential of ischemic postconditioning. In recent years, various methods and animal models of ischemic postconditioning have been utilized. The results of these numerous studies have indicated that the mechanisms underlying the neuroprotective effects of ischemic postconditioning may involve reductions in the generation of free radicals and inhibition of calcium overload, as well as the release of endogenous active substances, alterations in membrane channel function, and activation of protein kinases. Here we review the novel discovery, mechanism, key factors, and clinical application of ischemic postconditioning and discuss its implications for future research and problem of clinical practice.

  20. Problem Finding in Professional Learning Communities: A Learning Study Approach

    ERIC Educational Resources Information Center

    Tan, Yuen Sze Michelle; Caleon, Imelda Santos

    2016-01-01

    This study marries collaborative problem solving and learning study in understanding the onset of a cycle of teacher professional development process within school-based professional learning communities (PLCs). It aimed to explore how a PLC carried out collaborative problem finding--a key process involved in collaborative problem solving--that…

  1. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  2. Enhancing Coping and Supporting Protective Factors after a Disaster: Findings From a Quasi-Experimental Study

    ERIC Educational Resources Information Center

    Powell, Tara; Thompson, Sanna J.

    2016-01-01

    Objective: This article presents the Journey of Hope (JoH), a school-based intervention for children who have experienced a collective trauma such as a natural disaster. Through the use of group work, the JoH focuses on building coping skills and enhancing protective factors to help children recover. Method: This quasi-experimental research…

  3. Uncovering noisy social signals: Using optimization methods from experimental physics to study social phenomena.

    PubMed

    Kaptein, Maurits; van Emden, Robin; Iannuzzi, Davide

    2017-01-01

    Due to the ubiquitous presence of treatment heterogeneity, measurement error, and contextual confounders, numerous social phenomena are hard to study. Precise control of treatment variables and possible confounders is often key to the success of studies in the social sciences, yet often proves out of the realm of control of the experimenter. To amend this situation we propose a novel approach coined "lock-in feedback" which is based on a method that is routinely used in high-precision physics experiments to extract small signals out of a noisy environment. Here, we adapt the method to noisy social signals in multiple dimensions and evaluate it by studying an inherently noisy topic: the perception of (subjective) beauty. We show that the lock-in feedback approach allows one to select optimal treatment levels despite the presence of considerable noise. Furthermore, through the introduction of an external contextual shock we demonstrate that we can find relationships between noisy variables that were hitherto unknown. We therefore argue that lock-in methods may provide a valuable addition to the social scientist's experimental toolbox and we explicitly discuss a number of future applications.

  4. Uncovering noisy social signals: Using optimization methods from experimental physics to study social phenomena

    PubMed Central

    2017-01-01

    Due to the ubiquitous presence of treatment heterogeneity, measurement error, and contextual confounders, numerous social phenomena are hard to study. Precise control of treatment variables and possible confounders is often key to the success of studies in the social sciences, yet often proves out of the realm of control of the experimenter. To amend this situation we propose a novel approach coined “lock-in feedback” which is based on a method that is routinely used in high-precision physics experiments to extract small signals out of a noisy environment. Here, we adapt the method to noisy social signals in multiple dimensions and evaluate it by studying an inherently noisy topic: the perception of (subjective) beauty. We show that the lock-in feedback approach allows one to select optimal treatment levels despite the presence of considerable noise. Furthermore, through the introduction of an external contextual shock we demonstrate that we can find relationships between noisy variables that were hitherto unknown. We therefore argue that lock-in methods may provide a valuable addition to the social scientist’s experimental toolbox and we explicitly discuss a number of future applications. PMID:28306728

  5. Experimental quantum fingerprinting with weak coherent pulses

    PubMed Central

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-01-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity. PMID:26515586

  6. Attenuation and Enhancement of Compliance with Experimental Demand Characteristics

    ERIC Educational Resources Information Center

    Navarick, Douglas J.

    2007-01-01

    College students chose between reinforcement schedules in which a key press produced a cartoon video followed by nonreinforcement. The experimenter introduced a demand characteristic by stating a preference for choosing one schedule while indicating that the other schedule was also acceptable. With identical schedules (25 s of reinforcement, 5 s…

  7. Decoy-state quantum key distribution with more than three types of photon intensity pulses

    NASA Astrophysics Data System (ADS)

    Chau, H. F.

    2018-04-01

    The decoy-state method closes source security loopholes in quantum key distribution (QKD) using a laser source. In this method, accurate estimates of the detection rates of vacuum and single-photon events plus the error rate of single-photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which uses three types of photon intensities, is accurate up to about 1 % relative error. Here I report an experimentally feasible way that greatly improves these estimates and hence increases the one-way key rate of the BB84 QKD protocol with unbiased bases selection by at least 20% on average in realistic settings. The major tricks are the use of more than three types of photon intensities plus the fact that estimating bounds of the above detection and error rates is numerically stable, although these bounds are related to the inversion of a high condition number matrix.

  8. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  9. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  10. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  11. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  12. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  13. Gut Microbiota and Autism: Key Concepts and Findings

    ERIC Educational Resources Information Center

    Ding, Helen T.; Taur, Ying; Walkup, John T.

    2017-01-01

    There is an emerging body of evidence linking the intestinal microbiota with autism spectrum disorders (ASD). Studies have demonstrated differences in the composition of gut bacteria between children with ASD and controls. Certain intestinal bacteria have been observed in abundance and may be involved in the pathogenesis of ASD; including members…

  14. Finding the key - cell biology and science education.

    PubMed

    Miller, Kenneth R

    2010-12-01

    No international research community, cell biology included, can exist without an educational community to renew and replenish it. Unfortunately, cell biology researchers frequently regard their work as independent of the process of education and see little reason to reach out to science teachers. For cell biology to continue to prosper, I argue that researchers must support education in at least three ways. First, we must view education and research as part of a single scientific community. Second, we should take advantage of new technologies to connect the research laboratory to the classroom. Finally, we must take the initiative in defending the integrity of science teaching, particularly when education is under attack for political or religious reasons. Copyright © 2010 Elsevier Ltd. All rights reserved.

  15. Depot effect of bioactive components in experimental membrane filtrations

    NASA Astrophysics Data System (ADS)

    Mitev, D.; Peshev, D.; Peev, G.; Peeva, L.

    2017-01-01

    Depot effects were found to be accompanying phenomena of membrane separation processes. Accumulation of target species in the membrane matrix during feasibility tests can hamper proper conclusions or compromise the filtration results. Therefore, we investigated the effects of delayed membrane release of chlorogenic acid and caffeine, considered as key compounds of interest in spent coffee products’ recovery treatment. Permeate fluxes and key components release were studied in course of 24 hours via nanofiltration of pure solvent, both immediately after the mock solution filtration and after idle stay. Conclusions are drawn and recommendations advised for proper analysis of experimental data on membrane screening.

  16. Expertise finding in bibliographic network: topic dominance learning approach.

    PubMed

    Neshati, Mahmood; Hashemi, Seyyed Hadi; Beigy, Hamid

    2014-12-01

    Expert finding problem in bibliographic networks has received increased interest in recent years. This problem concerns finding relevant researchers for a given topic. Motivated by the observation that rarely do all coauthors contribute to a paper equally, in this paper, we propose two discriminative methods for realizing leading authors contributing in a scientific publication. Specifically, we cast the problem of expert finding in a bibliographic network to find leading experts in a research group, which is easier to solve. We recognize three feature groups that can discriminate relevant experts from other authors of a document. Experimental results on a real dataset, and a synthetic one that is gathered from a Microsoft academic search engine, show that the proposed model significantly improves the performance of expert finding in terms of all common information retrieval evaluation metrics.

  17. Adolescent perceptions of violence: formative research findings from a social marketing campaign to reduce violence among middle school youth.

    PubMed

    Quinn, G P; Bell-Ellison, B A; Loomis, W; Tucci, M

    2007-05-01

    To identify the specific barriers and benefits of violent behaviours as noted by middle school youth and to develop a social marketing campaign that attends to the needs and wants of the target audience. A non-experimental, qualitative study design was used to assess youth perceptions of violence in a large, southeast urban school district. Using a social marketing approach, a series of in-depth interviews were conducted with middle school youths, to gain an understanding of perceived barriers and benefits of violent behaviours. Additionally, interviews assessed youth preferences for an effective spokesperson for an anti-violence campaign. Qualitative analysis of coded transcripts revealed key themes that were incorporated into a multi-media initiative. Critical themes of the research highlighted that the majority of violence occurs at school, during school hours and most of the youths believed the use of violence was necessary to defend themselves from other peers or to protect family members. Another key finding pertained to adolescent views on violent people; although the majority of respondents reported engaging in violent acts, they did not view themselves as violent. Results were used to inform the development of a social marketing campaign designed to reduce youth violence among middle school students in a large, urban central Florida school district. Findings from the formative research led to the creation and pre-testing of five potential campaign brands. The campaign slogan that tested best with the target audience emphasized the choice youth have to either engage in violent behaviour and suffer the consequences or to 'rise above' physical conflict and reap the benefits.

  18. Demonstration of differential phase-shift keying demodulation at 10 Gbit/s optimal fiber Bragg grating filters.

    PubMed

    Gatti, Davide; Galzerano, Gianluca; Laporta, Paolo; Longhi, Stefano; Janner, Davide; Guglierame, Andrea; Belmonte, Michele

    2008-07-01

    Optimal demodulation of differential phase-shift keying signals at 10 Gbit/s is experimentally demonstrated using a specially designed structured fiber Bragg grating composed by Fabry-Perot coupled cavities. Bit-error-rate measurements show that, as compared with a conventional Gaussian-shaped filter, our demodulator gives approximately 2.8 dB performance improvement.

  19. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  20. Enhancing search efficiency by means of a search filter for finding all studies on animal experimentation in PubMed

    PubMed Central

    Hooijmans, Carlijn R; Tillema, Alice; Leenaars, Marlies; Ritskes-Hoitinga, Merel

    2010-01-01

    Collecting and analysing all available literature before starting an animal experiment is important and it is indispensable when writing a systematic review (SR) of animal research. Writing such review prevents unnecessary duplication of animal studies and thus unnecessary animal use (Reduction). One of the factors currently impeding the production of ‘high-quality’ SRs in laboratory animal science is the fact that searching for all available literature concerning animal experimentation is rather difficult. In order to diminish these difficulties, we developed a search filter for PubMed to detect all publications concerning animal studies. This filter was compared with the method most frequently used, the PubMed Limit: Animals, and validated further by performing two PubMed topic searches. Our filter performs much better than the PubMed limit: it retrieves, on average, 7% more records. Other important advantages of our filter are that it also finds the most recent records and that it is easy to use. All in all, by using our search filter in PubMed, all available literature concerning animal studies on a specific topic can easily be found and assessed, which will help in increasing the scientific quality and thereby the ethical validity of animal experiments. PMID:20551243

  1. Metabolic and hemodynamic events following changes in neuronal activity: current hypotheses, theoretical predictions and in vivo NMR experimental findings

    PubMed Central

    Mangia, Silvia; Giove, Federico; Tkáč, Ivan; Logothetis, Nikos K.; Henry, Pierre-Gilles; Olman, Cheryl A.; Maraviglia, Bruno; Di Salle, Francesco; Uğurbil, Kâmil

    2009-01-01

    Unraveling the energy metabolism and the hemodynamic outcomes of excitatory and inhibitory neuronal activity is critical not only for our basic understanding of overall brain function, but also for the understanding of many brain disorders. Methodologies of magnetic resonance spectroscopy (MRS) and magnetic resonance imaging (MRI) are powerful tools for the non-invasive investigation of brain metabolism and physiology. However, the temporal and spatial resolution of in vivo MRS and MRI is not suitable to provide direct evidence for hypotheses that involve metabolic compartmentalization between different cell types, or to untangle the complex neuronal micro-circuitry which results in changes of electrical activity. This review aims at describing how the current models of brain metabolism, mainly built on the basis of in vitro evidence, relate to experimental findings recently obtained in vivo by 1H MRS, 13C MRS and MRI. The hypotheses related to the role of different metabolic substrates, the metabolic neuron-glia interactions, along with the available theoretical predictions of the energy budget of neurotransmission, will be discussed. In addition, the cellular and network mechanisms that characterize different types of increased and suppressed neuronal activity will be considered within the sensitivity-constraints of MRS and MRI. PMID:19002199

  2. Enhancing search efficiency by means of a search filter for finding all studies on animal experimentation in PubMed.

    PubMed

    Hooijmans, Carlijn R; Tillema, Alice; Leenaars, Marlies; Ritskes-Hoitinga, Merel

    2010-07-01

    Collecting and analysing all available literature before starting an animal experiment is important and it is indispensable when writing a systematic review (SR) of animal research. Writing such review prevents unnecessary duplication of animal studies and thus unnecessary animal use (Reduction). One of the factors currently impeding the production of 'high-quality' SRs in laboratory animal science is the fact that searching for all available literature concerning animal experimentation is rather difficult. In order to diminish these difficulties, we developed a search filter for PubMed to detect all publications concerning animal studies. This filter was compared with the method most frequently used, the PubMed Limit: Animals, and validated further by performing two PubMed topic searches. Our filter performs much better than the PubMed limit: it retrieves, on average, 7% more records. Other important advantages of our filter are that it also finds the most recent records and that it is easy to use. All in all, by using our search filter in PubMed, all available literature concerning animal studies on a specific topic can easily be found and assessed, which will help in increasing the scientific quality and thereby the ethical validity of animal experiments.

  3. Identifying a key physical factor sensitive to the performance of Madden-Julian oscillation simulation in climate models

    NASA Astrophysics Data System (ADS)

    Kim, Go-Un; Seo, Kyong-Hwan

    2018-01-01

    A key physical factor in regulating the performance of Madden-Julian oscillation (MJO) simulation is examined by using 26 climate model simulations from the World Meteorological Organization's Working Group for Numerical Experimentation/Global Energy and Water Cycle Experiment Atmospheric System Study (WGNE and MJO-Task Force/GASS) global model comparison project. For this, intraseasonal moisture budget equation is analyzed and a simple, efficient physical quantity is developed. The result shows that MJO skill is most sensitive to vertically integrated intraseasonal zonal wind convergence (ZC). In particular, a specific threshold value of the strength of the ZC can be used as distinguishing between good and poor models. An additional finding is that good models exhibit the correct simultaneous convection and large-scale circulation phase relationship. In poor models, however, the peak circulation response appears 3 days after peak rainfall, suggesting unfavorable coupling between convection and circulation. For an improving simulation of the MJO in climate models, we propose that this delay of circulation in response to convection needs to be corrected in the cumulus parameterization scheme.

  4. State Legislative Leaders: Keys to Effective Legislation for Children and Families. A Report.

    ERIC Educational Resources Information Center

    State Legislative Leaders Foundation, Centerville, MA.

    In 1993, the State Legislative Leaders Foundation launched a research project, "State Legislative Leaders: Keys To Effective Legislation for Children and Families." This report documents the findings of the project involving 177 of the most influential Republican and Democratic state legislature leaders from all 50 states. For more than…

  5. Finding Meaning in Written Emotional Expression by Family Caregivers of Persons With Dementia.

    PubMed

    Butcher, Howard K; Gordon, Jean K; Ko, Ji Woon; Perkhounkova, Yelena; Cho, Jun Young; Rinner, Andrew; Lutgendorf, Susan

    2016-12-01

    This study tested the effect of written emotional expression on the ability to find meaning in caregiving and the effects of finding meaning on emotional state and psychological burden in 91 dementia family caregivers. In a pretest-posttest design, participants were randomly assigned to either an experimental or a comparison group. Experimental caregivers (n = 57) wrote about their deepest thoughts and feelings about caring for a family member with dementia, whereas those in the comparison group (n = 34) wrote about nonemotional topics. Results showed enhanced meaning-making abilities in experimental participants relative to comparison participants, particularly for those who used more positive emotion words. Improved meaning-making ability was in turn associated with psychological benefits at posttest, but experimental participants did not show significantly more benefit than comparison participants. We explore the mediating roles of the meaning-making process as well as some of the background characteristics of the individual caregivers and their caregiving environments. © The Author(s) 2016.

  6. Genetic relatedness of dengue viruses in Key West, Florida, USA, 2009-2010.

    PubMed

    Muñoz-Jordán, Jorge L; Santiago, Gilberto A; Margolis, Harold; Stark, Lillian

    2013-04-01

    Sequencing of dengue virus type 1 (DENV-1) strains isolated in Key West/Monroe County, Florida, indicate endemic transmission for >2 years of a distinct and predominant sublineage of the American-African genotype. DENV-1 strains isolated elsewhere in Florida grouped within a separate Central American lineage. Findings indicate endemic transmission of DENV into the continental United States.

  7. Spatial patch occupancy patterns of the Lower Keys marsh rabbit

    USGS Publications Warehouse

    Eaton, Mitchell J.; Hughes, Phillip T.; Nichols, James D.; Morkill, Anne; Anderson, Chad

    2011-01-01

    Reliable estimates of presence or absence of a species can provide substantial information on management questions related to distribution and habitat use but should incorporate the probability of detection to reduce bias. We surveyed for the endangered Lower Keys marsh rabbit (Sylvilagus palustris hefneri) in habitat patches on 5 Florida Key islands, USA, to estimate occupancy and detection probabilities. We derived detection probabilities using spatial replication of plots and evaluated hypotheses that patch location (coastal or interior) and patch size influence occupancy and detection. Results demonstrate that detection probability, given rabbits were present, was <0.5 and suggest that naïve estimates (i.e., estimates without consideration of imperfect detection) of patch occupancy are negatively biased. We found that patch size and location influenced probability of occupancy but not detection. Our findings will be used by Refuge managers to evaluate population trends of Lower Keys marsh rabbits from historical data and to guide management decisions for species recovery. The sampling and analytical methods we used may be useful for researchers and managers of other endangered lagomorphs and cryptic or fossorial animals occupying diverse habitats.

  8. Validation of Reference Genes for RT-qPCR Studies of Gene Expression in Preharvest and Postharvest Longan Fruits under Different Experimental Conditions

    PubMed Central

    Wu, Jianyang; Zhang, Hongna; Liu, Liqin; Li, Weicai; Wei, Yongzan; Shi, Shengyou

    2016-01-01

    Reverse transcription quantitative PCR (RT-qPCR) as the accurate and sensitive method is use for gene expression analysis, but the veracity and reliability result depends on whether select appropriate reference gene or not. To date, several reliable reference gene validations have been reported in fruits trees, but none have been done on preharvest and postharvest longan fruits. In this study, 12 candidate reference genes, namely, CYP, RPL, GAPDH, TUA, TUB, Fe-SOD, Mn-SOD, Cu/Zn-SOD, 18SrRNA, Actin, Histone H3, and EF-1a, were selected. Expression stability of these genes in 150 longan samples was evaluated and analyzed using geNorm and NormFinder algorithms. Preharvest samples consisted of seven experimental sets, including different developmental stages, organs, hormone stimuli (NAA, 2,4-D, and ethephon) and abiotic stresses (bagging and girdling with defoliation). Postharvest samples consisted of different temperature treatments (4 and 22°C) and varieties. Our findings indicate that appropriate reference gene(s) should be picked for each experimental condition. Our data further showed that the commonly used reference gene Actin does not exhibit stable expression across experimental conditions in longan. Expression levels of the DlACO gene, which is a key gene involved in regulating fruit abscission under girdling with defoliation treatment, was evaluated to validate our findings. In conclusion, our data provide a useful framework for choice of suitable reference genes across different experimental conditions for RT-qPCR analysis of preharvest and postharvest longan fruits. PMID:27375640

  9. Methodological quality of meta-analyses of single-case experimental studies.

    PubMed

    Jamshidi, Laleh; Heyvaert, Mieke; Declercq, Lies; Fernández-Castilla, Belén; Ferron, John M; Moeyaert, Mariola; Beretvas, S Natasha; Onghena, Patrick; Van den Noortgate, Wim

    2017-12-28

    Methodological rigor is a fundamental factor in the validity and credibility of the results of a meta-analysis. Following an increasing interest in single-case experimental design (SCED) meta-analyses, the current study investigates the methodological quality of SCED meta-analyses. We assessed the methodological quality of 178 SCED meta-analyses published between 1985 and 2015 through the modified Revised-Assessment of Multiple Systematic Reviews (R-AMSTAR) checklist. The main finding of the current review is that the methodological quality of the SCED meta-analyses has increased over time, but is still low according to the R-AMSTAR checklist. A remarkable percentage of the studies (93.80% of the included SCED meta-analyses) did not even reach the midpoint score (22, on a scale of 0-44). The mean and median methodological quality scores were 15.57 and 16, respectively. Relatively high scores were observed for "providing the characteristics of the included studies" and "doing comprehensive literature search". The key areas of deficiency were "reporting an assessment of the likelihood of publication bias" and "using the methods appropriately to combine the findings of studies". Although the results of the current review reveal that the methodological quality of the SCED meta-analyses has increased over time, still more efforts are needed to improve their methodological quality. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Conveying 3D shape with texture: recent advances and experimental findings

    NASA Astrophysics Data System (ADS)

    Interrante, Victoria; Kim, Sunghee; Hagh-Shenas, Haleh

    2002-06-01

    If we could design the perfect texture pattern to apply to any smooth surface in order to enable observers to more accurately perceive the surface's shape in a static monocular image taken from an arbitrary generic viewpoint under standard lighting conditions, what would the characteristics of that texture pattern be? In order to gain insight into this question, our group has developed an efficient algorithm for synthesizing a high resolution texture pattern, derived from a provided 2D sample, over an arbitrary doubly curved surface in such a way that the orientation of the texture is constrained to follow a specified underlying vector field over the surface, at a per-pixel level, without evidence of seams or projective distortion artifacts. In this paper, we report the findings of a recent experiment in which we attempt to use this new texture synthesis method to assess the shape information carrying capacity of two different types of directional texture patterns (unidirectional and bi-directional) under three different orientation conditions (following the first principal direction, following a constant uniform direction, or swirling sinusoidally in the surface). In a four alternative forced choice task, we asked participants to identify the quadrant in which two B-spline surfaces, illuminated from different random directions and simultaneously and persistently displayed, differed in their shapes. We found, after all subjects had gained sufficient training in the task, that accuracy increased fairly consistently with increasing magnitude of surface shape disparity, but that the characteristics of this increase differed under the different texture orientation conditions. Subjects were able to more reliably perceive smaller shape differences when the surfaces were textured with a pattern whose orientation followed one of the principal directions than when the surfaces were textured with a pattern that either gradually swirled in the surface or followed a constant

  11. Dissemination and Adoption of Comparative Effectiveness Research Findings When Findings Challenge Current Practices

    PubMed Central

    Schneider, Eric C.; Timbie, Justin W.; Fox, D. Steven; Van Busum, Kristin R.; Caloyeras, John P.

    2013-01-01

    Abstract Insufficient evidence regarding the effectiveness of medical treatments has been identified as a key source of inefficiency in the U.S. healthcare system. Variation in the use of diagnostic tests and treatments for patients with similar symptoms or conditions has been attributed to clinical uncertainty, since the published scientific evidence base does not provide adequate information to determine which treatments are most effective for patients with specific clinical needs. The federal government has made a dramatic investment in comparative effectiveness research (CER), with the expectation that CER will influence clinical practice and improve the efficiency of healthcare delivery. To do this, CER must provide information that supports fundamental changes in healthcare delivery and informs the choice of diagnostic and treatment strategies. This article summarizes findings from a qualitative analysis of the factors that impede the translation of CER into clinical practice and those that facilitate it. A case-study methodology is used to explore the extent to which these factors led to changes in clinical practice following five recent key CER studies. The enabling factors and barriers to translation for each study are discussed, the root causes for the failure of translation common to the studies are synthesized, and policy options that may optimize the impact of future CER—particularly CER funded through the American Recovery and Reinvestment Act of 2009—are proposed. PMID:28083277

  12. Finding minimum gene subsets with heuristic breadth-first search algorithm for robust tumor classification

    PubMed Central

    2012-01-01

    Background Previous studies on tumor classification based on gene expression profiles suggest that gene selection plays a key role in improving the classification performance. Moreover, finding important tumor-related genes with the highest accuracy is a very important task because these genes might serve as tumor biomarkers, which is of great benefit to not only tumor molecular diagnosis but also drug development. Results This paper proposes a novel gene selection method with rich biomedical meaning based on Heuristic Breadth-first Search Algorithm (HBSA) to find as many optimal gene subsets as possible. Due to the curse of dimensionality, this type of method could suffer from over-fitting and selection bias problems. To address these potential problems, a HBSA-based ensemble classifier is constructed using majority voting strategy from individual classifiers constructed by the selected gene subsets, and a novel HBSA-based gene ranking method is designed to find important tumor-related genes by measuring the significance of genes using their occurrence frequencies in the selected gene subsets. The experimental results on nine tumor datasets including three pairs of cross-platform datasets indicate that the proposed method can not only obtain better generalization performance but also find many important tumor-related genes. Conclusions It is found that the frequencies of the selected genes follow a power-law distribution, indicating that only a few top-ranked genes can be used as potential diagnosis biomarkers. Moreover, the top-ranked genes leading to very high prediction accuracy are closely related to specific tumor subtype and even hub genes. Compared with other related methods, the proposed method can achieve higher prediction accuracy with fewer genes. Moreover, they are further justified by analyzing the top-ranked genes in the context of individual gene function, biological pathway, and protein-protein interaction network. PMID:22830977

  13. Models of HIV Preconception Care and Key Elements Influencing These Services: Findings from Healthcare Providers in Seven US Cities.

    PubMed

    Simone, Joanne; Hoyt, Mary Jo; Storm, Deborah S; Finocchario-Kessler, Sarah

    2018-06-05

    Preconception care can improve maternal and infant outcomes by identifying and modifying health risks before pregnancy and reducing unplanned pregnancies. However, information about how preconception care is provided to persons living with HIV (PLWH) is lacking. This study uses qualitative interviews with HIV care providers to describe current models of preconception care and explore factors influencing services. Single, anonymous, telephone interviews were conducted with 92 purposively selected HIV healthcare providers in Atlanta, Baltimore, Houston, Kansas City, Newark, Philadelphia, and San Francisco in 2013-2014. Content analysis and a grounded theory approach were used to analyze data. Participants included 57% physicians with a median of 10 [interquartile range (IQR) = 5-17] years HIV care experience; the mean proportion of female patients was 45%. Participants described Individual Provider (48.9%), Team-based (43.2%), and Referral-only (7.6%) models of preconception care, with 63% incorporating referrals outside their clinics. Thematic analysis identified five key elements influencing the provision of preconception care within and across models: consistency of delivery, knowledge and attitudes, clinic characteristics, coordination of care, and referral accessibility. Described models of preconception care reflect the complexity of our healthcare system. Qualitative analysis offers insights about how HIV clinicians provide preconception care and how key elements influence services. However, additional research about the models and outcomes of preconception care services are needed. To improve preconception care for PLWH, research and quality improvement initiatives must utilize available strengths and tackle existing barriers, identified by our study and others, to define and implement effective models of preconception care services.

  14. Prescribed burning consumes key forest structural components: implications for landscape heterogeneity.

    PubMed

    Holland, Greg J; Clarke, Michael F; Bennett, Andrew F

    2017-04-01

    Prescribed burning to achieve management objectives is a common practice in fire-prone regions worldwide. Structural components of habitat that are combustible and slow to develop are particularly susceptible to change associated with prescribed burning. We used an experimental, "whole-landscape" approach to investigate the effect of differing patterns of prescribed burning on key habitat components (logs, stumps, dead trees, litter cover, litter depth, and understorey vegetation). Twenty-two landscapes (each ~100 ha) were selected in a dry forest ecosystem in southeast Australia. Experimental burns were conducted in 16 landscapes (stratified by burn extent) while six served as untreated controls. We measured habitat components prior to and after burning. Landscape burn extent ranged from 22% to 89% across the 16 burn treatments. With the exception of dead standing trees (no change), all measures of habitat components declined as a consequence of burning. The degree of loss increased as the extent to which a landscape was burned also increased. Prescribed burning had complex effects on the spatial heterogeneity (beta diversity) of structural components within landscapes. Landscapes that were more heterogeneous pre-fire were homogenized by burning, while those that were more homogenous pre-fire tended to display greater differentiation post-burning. Thus, the notion that patch mosaic burning enhances heterogeneity at the landscape-scale depends on prior conditions. These findings have important management implications. Where prescribed burns must be undertaken, effects on important resources can be moderated via control of burn characteristics (e.g., burn extent). Longer-term impacts of prescribed burning will be strongly influenced by the return interval, given the slow rate at which some structural components accumulate (decades to centuries). Management of habitat structural components is important given the critical role they play in (1) provision of habitat

  15. Advances in Clinical Cardiology 2016: A Summary of the Key Clinical Trials.

    PubMed

    Gray, Alastair; McQuillan, Conor; Menown, Ian B A

    2017-07-01

    The findings of many new cardiology clinical trials over the last year have been published or presented at major international meetings. This paper aims to describe and place in context a summary of the key clinical trials in cardiology presented between January and December 2016. The authors reviewed clinical trials presented at major cardiology conferences during 2016 including the American College of Cardiology (ACC), European Association for Percutaneous Cardiovascular Interventions (EuroPCR), European Society of Cardiology (ESC), European Association for the Study of Diabetes (EASD), Transcatheter Cardiovascular Therapeutics (TCT), and the American Heart Association (AHA). Selection criteria were trials with a broad relevance to the cardiology community and those with potential to change current practice. A total of 57 key cardiology clinical trials were identified for inclusion. Here we describe and place in clinical context the key findings of new data relating to interventional and structural cardiology including delayed stenting following primary angioplasty, contrast-induced nephropathy, management of jailed wires, optimal duration of dual antiplatelet therapy (DAPT), stenting vs bypass for left main disease, new generation stents (BioFreedom, Orsiro, Absorb), transcatheter aortic valve implantation (Edwards Sapien XT, transcatheter embolic protection), and closure devices (Watchman, Amplatzer). New preventative cardiology data include trials of bariatric surgery, empagliflozin, liraglutide, semaglutide, PCSK9 inhibitors (evolocumab and alirocumab), and inclisiran. Antiplatelet therapy trials include platelet function monitoring and ticagrelor vs clopidogrel for peripheral vascular disease. New data are also presented in fields of heart failure (sacubitril/valsartan, aliskiren, spironolactone), atrial fibrillation (rivaroxaban in patients undergoing coronary intervention, edoxaban in DC cardioversion), cardiac devices (implantable cardioverter

  16. Statistical Power in Experimental Audit Studies: Cautions and Calculations for Matched Tests With Nominal Outcomes

    ERIC Educational Resources Information Center

    Vuolo, Mike; Uggen, Christopher; Lageson, Sarah

    2016-01-01

    Given their capacity to identify causal relationships, experimental audit studies have grown increasingly popular in the social sciences. Typically, investigators send fictitious auditors who differ by a key factor (e.g., race) to particular experimental units (e.g., employers) and then compare treatment and control groups on a dichotomous outcome…

  17. Seven-year responses of trees to experimental hurricane effects in a tropical rainforest, Puerto Rico

    Treesearch

    Jess K. Zimmerman; James Aaron Hogan; Aaron B. Shiels; John E. Bithorn; Samuel Matta Carmona; Nicholas Brokaw

    2014-01-01

    We experimentally manipulated key components of severe hurricane disturbance, canopy openness and detritus deposition, to determine the independent and interactive effects of these components on tree recruitment, forest structure, and diversity in a wet tropical forest in the Luquillo Experimental Forest, Puerto Rico. Canopy openness was increased by trimming branches...

  18. Experimental Models to Study the Role of Microbes in Host-Parasite Interactions.

    PubMed

    Hahn, Megan A; Dheilly, Nolwenn M

    2016-01-01

    Until recently, parasitic infections have been primarily studied as interactions between the parasite and the host, leaving out crucial players: microbes. The recent realization that microbes play key roles in the biology of all living organisms is not only challenging our understanding of host-parasite evolution, but it also provides new clues to develop new therapies and remediation strategies. In this paper we provide a review of promising and advanced experimental organismal systems to examine the dynamic of host-parasite-microbe interactions. We address the benefits of developing new experimental models appropriate to this new research area and identify systems that offer the best promises considering the nature of the interactions among hosts, parasites, and microbes. Based on these systems, we identify key criteria for selecting experimental models to elucidate the fundamental principles of these complex webs of interactions. It appears that no model is ideal and that complementary studies should be performed on different systems in order to understand the driving roles of microbes in host and parasite evolution.

  19. Principles of visual key construction-with a visual identification key to the Fagaceae of the southeastern United States.

    PubMed

    Kirchoff, Bruce K; Leggett, Roxanne; Her, Va; Moua, Chue; Morrison, Jessica; Poole, Chamika

    2011-01-01

    Advances in digital imaging have made possible the creation of completely visual keys. By a visual key we mean a key based primarily on images, and that contains a minimal amount of text. Characters in visual keys are visually, not verbally defined. In this paper we create the first primarily visual key to a group of taxa, in this case the Fagaceae of the southeastern USA. We also modify our recently published set of best practices for image use in illustrated keys to make them applicable to visual keys. Photographs of the Fagaceae were obtained from internet and herbarium databases or were taken specifically for this project. The images were printed and then sorted into hierarchical groups. These hierarchical groups of images were used to create the 'couplets' in the key. A reciprocal process of key creation and testing was used to produce the final keys. Four keys were created, one for each of the parts-leaves, buds, fruits and bark. Species description pages consisting of multiple images were also created for each of the species in the key. Creation and testing of the key resulted in a modified list of best practices for image use visual keys. The inclusion of images into paper and electronic keys has greatly increased their ease of use. However, virtually all of these keys are still based upon verbally defined, atomistic characters. The creation of primarily visual keys allows us to overcome the well-known limitations of linguistic-based characters and create keys that are much easier to use, especially for botanical novices.

  20. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less

  1. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-05-01

    We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.

  2. A review of nuclear thermal propulsion carbide fuel corrosion and key issues

    NASA Technical Reports Server (NTRS)

    Pelaccio, Dennis G.; El-Genk, Mohamed S.

    1994-01-01

    Corrosion (mass loss) of carbide nuclear fuels due to their exposure to hot hydrogen in nuclear thermal propulsion engine systems greatly impacts the performance, thrust-to-weight and life of such systems. This report provides an overview of key issues and processes associated with the corrosion of carbide materials. Additionally, past pertinent development reactor test observations, as well as related experimental work and analysis modeling efforts are reviewed. At the conclusion, recommendations are presented, which provide the foundation for future corrosion modeling and verification efforts.

  3. Experimental Evaluation and Workload Characterization for High-Performance Computer Architectures

    NASA Technical Reports Server (NTRS)

    El-Ghazawi, Tarek A.

    1995-01-01

    This research is conducted in the context of the Joint NSF/NASA Initiative on Evaluation (JNNIE). JNNIE is an inter-agency research program that goes beyond typical.bencbking to provide and in-depth evaluations and understanding of the factors that limit the scalability of high-performance computing systems. Many NSF and NASA centers have participated in the effort. Our research effort was an integral part of implementing JNNIE in the NASA ESS grand challenge applications context. Our research work under this program was composed of three distinct, but related activities. They include the evaluation of NASA ESS high- performance computing testbeds using the wavelet decomposition application; evaluation of NASA ESS testbeds using astrophysical simulation applications; and developing an experimental model for workload characterization for understanding workload requirements. In this report, we provide a summary of findings that covers all three parts, a list of the publications that resulted from this effort, and three appendices with the details of each of the studies using a key publication developed under the respective work.

  4. Key Impact Factors on Dam Break Fatalities

    NASA Astrophysics Data System (ADS)

    Huang, D.; Yu, Z.; Song, Y.; Han, D.; Li, Y.

    2016-12-01

    Dam failures can lead to catastrophes on human society. However, there is a lack of research about dam break fatalities, especially on the key factors that affect fatalities. Based on the analysis of historical dam break cases, most studies have used the regression analysis to explore the correlation between those factors and fatalities, but without implementing optimization to find the dominating factors. In order to understand and reduce the risk of fatalities, this study has proposed a new method to select the impact factors on the fatality. It employs an improved ANN (Artificial Neural Network) combined with LOOCV (Leave-one-out cross-validation) and SFS (Stepwise Forward Selection) approach to explore the nonlinear relationship between impact factors and life losses. It not only considers the factors that have been widely used in the literature but also introduces new factors closely involved with fatalities. Dam break cases occurred in China from 1954 to 2013 are summarized, within which twenty-five cases are selected with a comprehensive coverage of geographic position and temporal variation. Twelve impact factors are taken into account as the inputs, i.e., severity of dam break flood (SF), population at risk (PR), public understanding of dam break (UB), warning time (TW), evacuation condition (EC), weather condition during dam break (WB), dam break mode (MB), water storage (SW), building vulnerability (VB), dam break time (TB), average distance from the affected area to the dam (DD) and preventive measures by government (PG).From those, three key factors of SF, MB and TB are chosen. The proposed method is able to extract the key factors, and the derived fatality model performs well in various types of dam break conditions.

  5. Composable security proof for continuous-variable quantum key distribution with coherent States.

    PubMed

    Leverrier, Anthony

    2015-02-20

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.

  6. Long distance measurement-device-independent quantum key distribution with entangled photon sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xu, Feihu; Qi, Bing; Liao, Zhongfa

    2013-08-05

    We present a feasible method that can make quantum key distribution (QKD), both ultra-long-distance and immune, to all attacks in the detection system. This method is called measurement-device-independent QKD (MDI-QKD) with entangled photon sources in the middle. By proposing a model and simulating a QKD experiment, we find that MDI-QKD with one entangled photon source can tolerate 77 dB loss (367 km standard fiber) in the asymptotic limit and 60 dB loss (286 km standard fiber) in the finite-key case with state-of-the-art detectors. Our general model can also be applied to other non-QKD experiments involving entanglement and Bell state measurements.

  7. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    NASA Astrophysics Data System (ADS)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  8. Problem-Based Learning Environment in Basic Computer Course: Pre-Service Teachers' Achievement and Key Factors for Learning

    ERIC Educational Resources Information Center

    Efendioglu, Akin

    2015-01-01

    This experimental study aims to determine pre-service teachers' achievements and key factors that affect the learning process with regard to problem-based learning (PBL) and lecture-based computer course (LBCC) conditions. The research results showed that the pre-service teachers in the PBL group had significantly higher achievement scores than…

  9. The effect of keyboard key spacing on typing speed, error, usability, and biomechanics, Part 2: Vertical spacing.

    PubMed

    Pereira, Anna; Hsieh, Chih-Ming; Laroche, Charles; Rempel, David

    2014-06-01

    The objective was to evaluate the effects of vertical key spacing on a conventional computer keyboard on typing speed, percentage error, usability, forearm muscle activity, and wrist posture for both females with small fingers and males with large fingers. Part I evaluated primarily horizontal key spacing and found that for male typists with large fingers, productivity and usability were similar for spacings of 17, 18, and 19 mm but were reduced for spacings of 16 mm. Few other key spacing studies are available, and the international standards that specify the spacing between keys on a keyboard have been mainly guided by design convention. Experienced female typists (n = 26) with small fingers (middle finger length < or = 7.71 cm or finger breadth of < or = 1.93 cm) and male typists (n = 26) with large fingers (middle finger length > or = 8.37 cm or finger breadth of > or = 2.24 cm) typed on five keyboards that differed primarily in vertical key spacing (17 x 18, 17 x 17, 17 x 16, 17 x 15.5, and 18 x 16 mm) while typing speed, error, fatigue, preference, forearm muscle activity, and wrist posture were recorded. Productivity and usability ratings were significantly worse for the keyboard with 15.5 mm vertical spacing compared to the other keyboards for both groups.There were few significant differences on usability ratings between the other keyboards. Reducing vertical key spacing,from 18 to 17 to 16 mm, had no significant effect on productivity or usability. The findings support the design of keyboards with vertical key spacings of 16, 17, or 18 mm. These findings may influence keyboard design and standards.

  10. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    PubMed

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  11. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  12. First- and third-party ground truth for key frame extraction from consumer video clips

    NASA Astrophysics Data System (ADS)

    Costello, Kathleen; Luo, Jiebo

    2007-02-01

    Extracting key frames (KF) from video is of great interest in many applications, such as video summary, video organization, video compression, and prints from video. KF extraction is not a new problem. However, current literature has been focused mainly on sports or news video. In the consumer video space, the biggest challenges for key frame selection from consumer videos are the unconstrained content and lack of any preimposed structure. In this study, we conduct ground truth collection of key frames from video clips taken by digital cameras (as opposed to camcorders) using both first- and third-party judges. The goals of this study are: (1) to create a reference database of video clips reasonably representative of the consumer video space; (2) to identify associated key frames by which automated algorithms can be compared and judged for effectiveness; and (3) to uncover the criteria used by both first- and thirdparty human judges so these criteria can influence algorithm design. The findings from these ground truths will be discussed.

  13. Experimental evidence of a pathogen invasion threshold

    PubMed Central

    Krkošek, Martin

    2018-01-01

    Host density thresholds to pathogen invasion separate regions of parameter space corresponding to endemic and disease-free states. The host density threshold is a central concept in theoretical epidemiology and a common target of human and wildlife disease control programmes, but there is mixed evidence supporting the existence of thresholds, especially in wildlife populations or for pathogens with complex transmission modes (e.g. environmental transmission). Here, we demonstrate the existence of a host density threshold for an environmentally transmitted pathogen by combining an epidemiological model with a microcosm experiment. Experimental epidemics consisted of replicate populations of naive crustacean zooplankton (Daphnia dentifera) hosts across a range of host densities (20–640 hosts l−1) that were exposed to an environmentally transmitted fungal pathogen (Metschnikowia bicuspidata). Epidemiological model simulations, parametrized independently of the experiment, qualitatively predicted experimental pathogen invasion thresholds. Variability in parameter estimates did not strongly influence outcomes, though systematic changes to key parameters have the potential to shift pathogen invasion thresholds. In summary, we provide one of the first clear experimental demonstrations of pathogen invasion thresholds in a replicated experimental system, and provide evidence that such thresholds may be predictable using independently constructed epidemiological models. PMID:29410876

  14. Key-Generation Algorithms for Linear Piece In Hand Matrix Method

    NASA Astrophysics Data System (ADS)

    Tadaki, Kohtaro; Tsujii, Shigeo

    The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Gröbner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.

  15. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    NASA Astrophysics Data System (ADS)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  16. 76 FR 68314 - Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ...-AA08 Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL AGENCY: Coast... World Championship, a series of high-speed boat races. The event is scheduled to take place on Wednesday... Key West World Championship, a series of high-speed boat races. The event will be held on the waters...

  17. Phosphoinositide 3-kinase (PI3K(p110alpha)) directly regulates key components of the Z-disc and cardiac structure.

    PubMed

    Waardenberg, Ashley J; Bernardo, Bianca C; Ng, Dominic C H; Shepherd, Peter R; Cemerlang, Nelly; Sbroggiò, Mauro; Wells, Christine A; Dalrymple, Brian P; Brancaccio, Mara; Lin, Ruby C Y; McMullen, Julie R

    2011-09-02

    Maintenance of cardiac structure and Z-disc signaling are key factors responsible for protecting the heart in a setting of stress, but how these processes are regulated is not well defined. We recently demonstrated that PI3K(p110α) protects the heart against myocardial infarction. The aim of this study was to determine whether PI3K(p110α) directly regulates components of the Z-disc and cardiac structure. To address this question, a unique three-dimensional virtual muscle model was applied to gene expression data from transgenic mice with increased or decreased PI3K(p110α) activity under basal conditions (sham) and in a setting of myocardial infarction to display the location of structural proteins. Key findings from this analysis were then validated experimentally. The three-dimensional virtual muscle model visually highlighted reciprocally regulated transcripts associated with PI3K activation that encoded key components of the Z-disc and costamere, including melusin. Studies were performed to assess whether PI3K and melusin interact in the heart. Here, we identify a novel melusin-PI3K interaction that generates lipid kinase activity. The direct impact of PI3K(p110α) on myocyte structure was assessed by treating neonatal rat ventricular myocytes with PI3K(p110α) inhibitors and examining the myofiber morphology of hearts from PI3K transgenic mice. Results demonstrate that PI3K is critical for myofiber maturation and Z-disc alignment. In summary, PI3K regulates the expression of genes essential for cardiac structure and Z-disc signaling, interacts with melusin, and is critical for Z-disc alignment.

  18. Phosphoinositide 3-Kinase (PI3K(p110α)) Directly Regulates Key Components of the Z-disc and Cardiac Structure*

    PubMed Central

    Waardenberg, Ashley J.; Bernardo, Bianca C.; Ng, Dominic C. H.; Shepherd, Peter R.; Cemerlang, Nelly; Sbroggiò, Mauro; Wells, Christine A.; Dalrymple, Brian P.; Brancaccio, Mara; Lin, Ruby C. Y.; McMullen, Julie R.

    2011-01-01

    Maintenance of cardiac structure and Z-disc signaling are key factors responsible for protecting the heart in a setting of stress, but how these processes are regulated is not well defined. We recently demonstrated that PI3K(p110α) protects the heart against myocardial infarction. The aim of this study was to determine whether PI3K(p110α) directly regulates components of the Z-disc and cardiac structure. To address this question, a unique three-dimensional virtual muscle model was applied to gene expression data from transgenic mice with increased or decreased PI3K(p110α) activity under basal conditions (sham) and in a setting of myocardial infarction to display the location of structural proteins. Key findings from this analysis were then validated experimentally. The three-dimensional virtual muscle model visually highlighted reciprocally regulated transcripts associated with PI3K activation that encoded key components of the Z-disc and costamere, including melusin. Studies were performed to assess whether PI3K and melusin interact in the heart. Here, we identify a novel melusin-PI3K interaction that generates lipid kinase activity. The direct impact of PI3K(p110α) on myocyte structure was assessed by treating neonatal rat ventricular myocytes with PI3K(p110α) inhibitors and examining the myofiber morphology of hearts from PI3K transgenic mice. Results demonstrate that PI3K is critical for myofiber maturation and Z-disc alignment. In summary, PI3K regulates the expression of genes essential for cardiac structure and Z-disc signaling, interacts with melusin, and is critical for Z-disc alignment. PMID:21757757

  19. Key technology issues for space robotic systems

    NASA Technical Reports Server (NTRS)

    Schappell, Roger T.

    1987-01-01

    Robotics has become a key technology consideration for the Space Station project to enable enhanced crew productivity and to maximize safety. There are many robotic functions currently being studied, including Space Station assembly, repair, and maintenance as well as satellite refurbishment, repair, and retrieval. Another area of concern is that of providing ground based experimenters with a natural interface that they might directly interact with their hardware onboard the Space Station or ancillary spacecraft. The state of the technology is such that the above functions are feasible; however, considerable development work is required for operation in this gravity-free vacuum environment. Furthermore, a program plan is evolving within NASA that will capitalize on recent government, university, and industrial robotics research and development (R and D) accomplishments. A brief summary is presented of the primary technology issues and physical examples are provided of the state of the technology for the initial operational capability (IOC) system as well as for the eventual final operational capability (FOC) Space Station.

  20. Tectonic history of Sweetgrass Arch, Montana and Alberta-key to finding new hydrocarbons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shepard, W. Shepard, B.

    1985-05-01

    The Sweetgrass arch of northwestern Montana and southern Alberta is a major ancient structural feature. Initial anticlinal emplacement occurred during the early Paleozoic and was parallel with the cratonic margin. Strong uplift followed by peneplanation occurred during the Late Jurassic and basal Cretaceous during the westward drifting of the North American plate following the breakup of Pangea. During Cretaceous and early Tertiary times, the Sweetgrass arch was quiescent, but was rejuvenated in mid to late Tertiary, upwarped by a basement flexure to its present structural configuration: a 200 mi (322 km) long, north-plunging anticline showing 10,000 ft (350 m) ofmore » structural relief. Midway down its plunge, the anticline is offset 30 mi (48 km) by a right-lateral transcurrent fault. During Late Cretaceous and early Tertiary, plutonic uplifts were emplaced on the east flank, forming traps for oil then migrating updip from the Williston and Alberta basins. Oil and gas accumulated in Mississippian, Jurassic, and basal Cretaceous reservoirs in structural and stratigraphic traps around these plutonic uplifts. Subsequent late Tertiary doming of the Sweetgrass arch tilted the earlier structural traps and drained them, resulting in remigration of much of the oil and gas to the crest of the arch. The tilting failed to destroy many of the stratigraphic traps. As a result, down the flanks of the Sweetgrass arch are many frozen stratigraphic traps including Cut Bank field, the largest single-pay stratigraphic trap in the north Rockies. On the crest are large structure accumulations of remigrated oil at Kevin Sunburst and Pondera. Evidence of remigration is recorded by live oil show tracks in the reservoirs and remnant gas caps throughout the area of earlier accumulations. A potential exists for finding new frozen traps on the flanks and remigrated oil accumulations on or near the crest of the Sweetgrass arch.« less