Sample records for key features including

  1. Iris recognition based on key image feature extraction.

    PubMed

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  2. A practical guide to assessing clinical decision-making skills using the key features approach.

    PubMed

    Farmer, Elizabeth A; Page, Gordon

    2005-12-01

    This paper in the series on professional assessment provides a practical guide to writing key features problems (KFPs). Key features problems test clinical decision-making skills in written or computer-based formats. They are based on the concept of critical steps or 'key features' in decision making and represent an advance on the older, less reliable patient management problem (PMP) formats. The practical steps in writing these problems are discussed and illustrated by examples. Steps include assembling problem-writing groups, selecting a suitable clinical scenario or problem and defining its key features, writing the questions, selecting question response formats, preparing scoring keys, reviewing item quality and item banking. The KFP format provides educators with a flexible approach to testing clinical decision-making skills with demonstrated validity and reliability when constructed according to the guidelines provided.

  3. Key features of an EU health information system: a concept mapping study.

    PubMed

    Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut

    2016-02-01

    Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  4. Key Program Features to Enhance the School-to-Career Transition for Youth with Disabilities

    ERIC Educational Resources Information Center

    Doren, Bonnie; Yan, Min-Chi; Tu, Wei-Mo

    2013-01-01

    The purpose of the article was to identify key features within research-based school-to-career programs that were linked to positive employment outcomes for youth disabilities. Three key program features were identified and discussed that could be incorporated into the practices and programs of schools and communities to support the employment…

  5. Key clinical features to identify girls with CDKL5 mutations.

    PubMed

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydeé; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothée; Afenjar, Alexandra; Rio, Marlène; Héron, Delphine; N'guyen Morel, Marie Ange; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-10-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 (CDKL5) gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of CDKL5-associated encephalopathy. We screened the entire coding region of CDKL5 for mutations in 183 females with encephalopathy with early seizures by denaturing high liquid performance chromatography and direct sequencing, and we identified in 20 unrelated girls, 18 different mutations including 7 novel mutations. These mutations were identified in eight patients with encephalopathy with RTT-like features, five with infantile spasms and seven with encephalopathy with refractory epilepsy. Early epilepsy with normal interictal EEG and severe hypotonia are the key clinical features in identifying patients likely to have CDKL5 mutations. Our study also indicates that these patients clearly exhibit some RTT features such as deceleration of head growth, stereotypies and hand apraxia and that these RTT features become more evident in older and ambulatory patients. However, some RTT signs are clearly absent such as the so called RTT disease profile (period of nearly normal development followed by regression with loss of acquired fine finger skill in early childhood and characteristic intensive eye communication) and the characteristic evolution of the RTT electroencephalogram. Interestingly, in addition to the overall stereotypical symptomatology (age of onset and evolution of the disease) resulting from CDKL5 mutations, atypical forms of CDKL5-related conditions have also been observed. Our data suggest that phenotypic heterogeneity does not correlate with the nature or the position of the mutations or with the pattern of X-chromosome inactivation, but most probably with the functional transcriptional and/or translational consequences of CDKL5

  6. Cemento-osseous dysplasia of the jaw bones: key radiographic features

    PubMed Central

    Alsufyani, NA; Lam, EWN

    2011-01-01

    Objective The purpose of this study is to assess possible diagnostic differences between general dentists (GPs) and oral and maxillofacial radiologists (RGs) in the identification of pathognomonic radiographic features of cemento-osseous dysplasia (COD) and its interpretation. Methods Using a systematic objective survey instrument, 3 RGs and 3 GPs reviewed 50 image sets of COD and similarly appearing entities (dense bone island, cementoblastoma, cemento-ossifying fibroma, fibrous dysplasia, complex odontoma and sclerosing osteitis). Participants were asked to identify the presence or absence of radiographic features and then to make an interpretation of the images. Results RGs identified a well-defined border (odds ratio (OR) 6.67, P < 0.05); radiolucent periphery (OR 8.28, P < 0.005); bilateral occurrence (OR 10.23, P < 0.01); mixed radiolucent/radiopaque internal structure (OR 10.53, P < 0.01); the absence of non-concentric bony expansion (OR 7.63, P < 0.05); and the association with anterior and posterior teeth (OR 4.43, P < 0.05) as key features of COD. Consequently, RGs were able to correctly interpret 79.3% of COD cases. In contrast, GPs identified the absence of root resorption (OR 4.52, P < 0.05) and the association with anterior and posterior teeth (OR 3.22, P = 0.005) as the only key features of COD and were able to correctly interpret 38.7% of COD cases. Conclusions There are statistically significant differences between RGs and GPs in the identification and interpretation of the radiographic features associated with COD (P < 0.001). We conclude that COD is radiographically discernable from other similarly appearing entities only if the characteristic radiographic features are correctly identified and then correctly interpreted. PMID:21346079

  7. Cemento-osseous dysplasia of the jaw bones: key radiographic features.

    PubMed

    Alsufyani, N A; Lam, E W N

    2011-03-01

    The purpose of this study is to assess possible diagnostic differences between general dentists (GPs) and oral and maxillofacial radiologists (RGs) in the identification of pathognomonic radiographic features of cemento-osseous dysplasia (COD) and its interpretation. Using a systematic objective survey instrument, 3 RGs and 3 GPs reviewed 50 image sets of COD and similarly appearing entities (dense bone island, cementoblastoma, cemento-ossifying fibroma, fibrous dysplasia, complex odontoma and sclerosing osteitis). Participants were asked to identify the presence or absence of radiographic features and then to make an interpretation of the images. RGs identified a well-defined border (odds ratio (OR) 6.67, P < 0.05); radiolucent periphery (OR 8.28, P < 0.005); bilateral occurrence (OR 10.23, P < 0.01); mixed radiolucent/radiopaque internal structure (OR 10.53, P < 0.01); the absence of non-concentric bony expansion (OR 7.63, P < 0.05); and the association with anterior and posterior teeth (OR 4.43, P < 0.05) as key features of COD. Consequently, RGs were able to correctly interpret 79.3% of COD cases. In contrast, GPs identified the absence of root resorption (OR 4.52, P < 0.05) and the association with anterior and posterior teeth (OR 3.22, P = 0.005) as the only key features of COD and were able to correctly interpret 38.7% of COD cases. There are statistically significant differences between RGs and GPs in the identification and interpretation of the radiographic features associated with COD (P < 0.001). We conclude that COD is radiographically discernable from other similarly appearing entities only if the characteristic radiographic features are correctly identified and then correctly interpreted.

  8. Salient Key Features of Actual English Instructional Practices in Saudi Arabia

    ERIC Educational Resources Information Center

    Al-Seghayer, Khalid

    2015-01-01

    This is a comprehensive review of the salient key features of the actual English instructional practices in Saudi Arabia. The goal of this work is to gain insights into the practices and pedagogic approaches to English as a foreign language (EFL) teaching currently employed in this country. In particular, we identify the following central features…

  9. A method for data‐driven exploration to pinpoint key features in medical data and facilitate expert review

    PubMed Central

    Juhlin, Kristina; Norén, G. Niklas

    2017-01-01

    Abstract Purpose To develop a method for data‐driven exploration in pharmacovigilance and illustrate its use by identifying the key features of individual case safety reports related to medication errors. Methods We propose vigiPoint, a method that contrasts the relative frequency of covariate values in a data subset of interest to those within one or more comparators, utilizing odds ratios with adaptive statistical shrinkage. Nested analyses identify higher order patterns, and permutation analysis is employed to protect against chance findings. For illustration, a total of 164 000 adverse event reports related to medication errors were characterized and contrasted to the other 7 833 000 reports in VigiBase, the WHO global database of individual case safety reports, as of May 2013. The initial scope included 2000 features, such as patient age groups, reporter qualifications, and countries of origin. Results vigiPoint highlighted 109 key features of medication error reports. The most prominent were that the vast majority of medication error reports were from the United States (89% compared with 49% for other reports in VigiBase); that the majority of reports were sent by consumers (53% vs 17% for other reports); that pharmacists (12% vs 5.3%) and lawyers (2.9% vs 1.5%) were overrepresented; and that there were more medication error reports than expected for patients aged 2‐11 years (10% vs 5.7%), particularly in Germany (16%). Conclusions vigiPoint effectively identified key features of medication error reports in VigiBase. More generally, it reduces lead times for analysis and ensures reproducibility and transparency. An important next step is to evaluate its use in other data. PMID:28815800

  10. Global conservation outcomes depend on marine protected areas with five key features.

    PubMed

    Edgar, Graham J; Stuart-Smith, Rick D; Willis, Trevor J; Kininmonth, Stuart; Baker, Susan C; Banks, Stuart; Barrett, Neville S; Becerro, Mikel A; Bernard, Anthony T F; Berkhout, Just; Buxton, Colin D; Campbell, Stuart J; Cooper, Antonia T; Davey, Marlene; Edgar, Sophie C; Försterra, Günter; Galván, David E; Irigoyen, Alejo J; Kushner, David J; Moura, Rodrigo; Parnell, P Ed; Shears, Nick T; Soler, German; Strain, Elisabeth M A; Thomson, Russell J

    2014-02-13

    In line with global targets agreed under the Convention on Biological Diversity, the number of marine protected areas (MPAs) is increasing rapidly, yet socio-economic benefits generated by MPAs remain difficult to predict and under debate. MPAs often fail to reach their full potential as a consequence of factors such as illegal harvesting, regulations that legally allow detrimental harvesting, or emigration of animals outside boundaries because of continuous habitat or inadequate size of reserve. Here we show that the conservation benefits of 87 MPAs investigated worldwide increase exponentially with the accumulation of five key features: no take, well enforced, old (>10 years), large (>100 km(2)), and isolated by deep water or sand. Using effective MPAs with four or five key features as an unfished standard, comparisons of underwater survey data from effective MPAs with predictions based on survey data from fished coasts indicate that total fish biomass has declined about two-thirds from historical baselines as a result of fishing. Effective MPAs also had twice as many large (>250 mm total length) fish species per transect, five times more large fish biomass, and fourteen times more shark biomass than fished areas. Most (59%) of the MPAs studied had only one or two key features and were not ecologically distinguishable from fished sites. Our results show that global conservation targets based on area alone will not optimize protection of marine biodiversity. More emphasis is needed on better MPA design, durable management and compliance to ensure that MPAs achieve their desired conservation value.

  11. Global conservation outcomes depend on marine protected areas with five key features

    NASA Astrophysics Data System (ADS)

    Edgar, Graham J.; Stuart-Smith, Rick D.; Willis, Trevor J.; Kininmonth, Stuart; Baker, Susan C.; Banks, Stuart; Barrett, Neville S.; Becerro, Mikel A.; Bernard, Anthony T. F.; Berkhout, Just; Buxton, Colin D.; Campbell, Stuart J.; Cooper, Antonia T.; Davey, Marlene; Edgar, Sophie C.; Försterra, Günter; Galván, David E.; Irigoyen, Alejo J.; Kushner, David J.; Moura, Rodrigo; Parnell, P. Ed; Shears, Nick T.; Soler, German; Strain, Elisabeth M. A.; Thomson, Russell J.

    2014-02-01

    In line with global targets agreed under the Convention on Biological Diversity, the number of marine protected areas (MPAs) is increasing rapidly, yet socio-economic benefits generated by MPAs remain difficult to predict and under debate. MPAs often fail to reach their full potential as a consequence of factors such as illegal harvesting, regulations that legally allow detrimental harvesting, or emigration of animals outside boundaries because of continuous habitat or inadequate size of reserve. Here we show that the conservation benefits of 87 MPAs investigated worldwide increase exponentially with the accumulation of five key features: no take, well enforced, old (>10 years), large (>100km2), and isolated by deep water or sand. Using effective MPAs with four or five key features as an unfished standard, comparisons of underwater survey data from effective MPAs with predictions based on survey data from fished coasts indicate that total fish biomass has declined about two-thirds from historical baselines as a result of fishing. Effective MPAs also had twice as many large (>250mm total length) fish species per transect, five times more large fish biomass, and fourteen times more shark biomass than fished areas. Most (59%) of the MPAs studied had only one or two key features and were not ecologically distinguishable from fished sites. Our results show that global conservation targets based on area alone will not optimize protection of marine biodiversity. More emphasis is needed on better MPA design, durable management and compliance to ensure that MPAs achieve their desired conservation value.

  12. Key Features Of Peer Support In Chronic Disease Prevention And Management.

    PubMed

    Fisher, Edwin B; Ballesteros, Juana; Bhushan, Nivedita; Coufal, Muchieh M; Kowitt, Sarah D; McDonough, A Manuela; Parada, Humberto; Robinette, Jennifer B; Sokol, Rebeccah L; Tang, Patrick Y; Urlaub, Diana

    2015-09-01

    Peer support from community health workers, promotores de salud, and others through community and health care organizations can provide social support and other assistance that enhances health. There is substantial evidence for both the effectiveness and the cost-effectiveness of peer support, as well as for its feasibility, reach, and sustainability. We discuss findings from Peers for Progress, a program of the American Academy of Family Physicians Foundation, to examine when peer support does not work, guide dissemination of peer support programs, and help integrate approaches such as e-health into peer support. Success factors for peer support programs include proactive implementation, attention to participants' emotions, and ongoing supervision. Reaching those whom conventional clinical and preventive services too often fail to reach; reaching whole populations, such as people with diabetes, rather than selected samples; and addressing behavioral health are strengths of peer support that can help achieve health care that is efficient and of high quality. Challenges for policy makers going forward include encouraging workforce development, balancing quality control with maintaining key features of peer support, and ensuring that underresourced organizations can develop and manage peer support programs. Project HOPE—The People-to-People Health Foundation, Inc.

  13. The Abnormal vs. Normal ECG Classification Based on Key Features and Statistical Learning

    NASA Astrophysics Data System (ADS)

    Dong, Jun; Tong, Jia-Fei; Liu, Xia

    As cardiovascular diseases appear frequently in modern society, the medicine and health system should be adjusted to meet the new requirements. Chinese government has planned to establish basic community medical insurance system (BCMIS) before 2020, where remote medical service is one of core issues. Therefore, we have developed the "remote network hospital system" which includes data server and diagnosis terminal by the aid of wireless detector to sample ECG. To improve the efficiency of ECG processing, in this paper, abnormal vs. normal ECG classification approach based on key features and statistical learning is presented, and the results are analyzed. Large amount of normal ECG could be filtered by computer automatically and abnormal ECG is left to be diagnosed specially by physicians.

  14. Single Cell Mathematical Model Successfully Replicates Key Features of GBM: Go-Or-Grow Is Not Necessary.

    PubMed

    Scribner, Elizabeth; Fathallah-Shaykh, Hassan M

    2017-01-01

    Glioblastoma (GBM) is a malignant brain tumor that continues to be associated with neurological morbidity and poor survival times. Brain invasion is a fundamental property of malignant glioma cells. The Go-or-Grow (GoG) phenotype proposes that cancer cell motility and proliferation are mutually exclusive. Here, we construct and apply a single glioma cell mathematical model that includes motility and angiogenesis and lacks the GoG phenotype. Simulations replicate key features of GBM including its multilayer structure (i.e.edema, enhancement, and necrosis), its progression patterns associated with bevacizumab treatment, and replicate the survival times of GBM treated or untreated with bevacizumab. These results suggest that the GoG phenotype is not a necessary property for the formation of the multilayer structure, recurrence patterns, and the poor survival times of patients diagnosed with GBM.

  15. Some key features in the evolution of self psychology and psychoanalysis.

    PubMed

    Fosshage, James L

    2009-04-01

    Psychoanalysis, as every science and its application, has continued to evolve over the past century, especially accelerating over the last 30 years. Self psychology has played a constitutive role in that evolution and has continued to change itself. These movements have been supported and augmented by a wide range of emergent research and theory, especially that of cognitive psychology, infant and attachment research, rapid eye movement and dream research, psychotherapy research, and neuroscience. I present schematically some of what I consider to be the key features of the evolution of self psychology and their interconnection with that of psychoanalysis at large, including the revolutionary paradigm changes, the new epistemology, listening/experiencing perspectives, from narcissism to the development of the self, the new organization model of transference, the new organization model of dreams, and the implicit and explicit dimensions of analytic work. I conclude with a focus on the radical ongoing extension of the analyst's participation in the analytic relationship, using, as an example, the co-creation of analytic love, and providing several brief clinical illustrations. The leading edge question guiding my discussion is "How does analytic change occur?"

  16. PBF Control Building auxiliary features, including fire hose house and ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    PBF Control Building auxiliary features, including fire hose house and sewage system. Ebasco Services 1205 PER/PER-A-4. INEEL undex no. 760-0619-00-205-123024 - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID

  17. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  18. A step towards considering the spatial heterogeneity of urban key features in urban hydrology flood modelling

    NASA Astrophysics Data System (ADS)

    Leandro, J.; Schumann, A.; Pfister, A.

    2016-04-01

    Some of the major challenges in modelling rainfall-runoff in urbanised areas are the complex interaction between the sewer system and the overland surface, and the spatial heterogeneity of the urban key features. The former requires the sewer network and the system of surface flow paths to be solved simultaneously. The latter is still an unresolved issue because the heterogeneity of runoff formation requires high detailed information and includes a large variety of feature specific rainfall-runoff dynamics. This paper discloses a methodology for considering the variability of building types and the spatial heterogeneity of land surfaces. The former is achieved by developing a specific conceptual rainfall-runoff model and the latter by defining a fully distributed approach for infiltration processes in urban areas with limited storage capacity dependent on OpenStreetMaps (OSM). The model complexity is increased stepwise by adding components to an existing 2D overland flow model. The different steps are defined as modelling levels. The methodology is applied in a German case study. Results highlight that: (a) spatial heterogeneity of urban features has a medium to high impact on the estimated overland flood-depths, (b) the addition of multiple urban features have a higher cumulative effect due to the dynamic effects simulated by the model, (c) connecting the runoff from buildings to the sewer contributes to the non-linear effects observed on the overland flood-depths, and (d) OSM data is useful in identifying pounding areas (for which infiltration plays a decisive role) and permeable natural surface flow paths (which delay the flood propagation).

  19. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    ERIC Educational Resources Information Center

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  20. 77 FR 48550 - Technicolor Creative Services, Post Production Feature Mastering Division Including On-Site...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-14

    ... Services, Post Production Feature Mastering Division Including On-Site Leased Workers From Ajilon... Services, Post Production Feature Mastering Division, Hollywood, California (subject firm). The worker... the workers meet the eligibility requirements of the Trade Act of 1974. Conclusion After careful...

  1. Chromium picolinate does not improve key features of metabolic syndrome in obese nondiabetic adults.

    PubMed

    Iqbal, Nayyar; Cardillo, Serena; Volger, Sheri; Bloedon, LeAnne T; Anderson, Richard A; Boston, Raymond; Szapary, Philippe O

    2009-04-01

    The use of chromium-containing dietary supplements is widespread among patients with type 2 diabetes. Chromium's effects in patients at high risk for developing diabetes, especially those with metabolic syndrome, is unknown. The objective of this study was to determine the effects of chromium picolinate (CrPic) on glucose metabolism in patients with metabolic syndrome. A double-blind, placebo-controlled, randomized trial was conducted at a U.S. academic medical center. Sixty three patients with National Cholesterol Education Program (NCEP) Adult Treatment Panel III (ATP III)-defined metabolic syndrome were included. The primary end point was a change in the insulin sensitivity index derived from a frequently sampled intravenous glucose tolerance test. Prespecified secondary end points included changes in other measurements of glucose metabolism, oxidative stress, fasting serum lipids, and high sensitivity C-reactive protein. After 16 weeks of CrPic treatment, there was no significant change in insulin sensitivity index between groups (P = 0.14). However, CrPic increased acute insulin response to glucose (P 0.02). CrPic had no significant effect on other measures of glucose metabolism, body weight, serum lipids, or measures of inflammation and oxidative stress. CrPic at 1000 microg/day does not improve key features of the metabolic syndrome in obese nondiabetic patients.

  2. Features of resilience

    DOE PAGES

    Connelly, Elizabeth B.; Allen, Craig R.; Hatfield, Kirk; ...

    2017-02-20

    The National Academy of Sciences (NAS) definition of resilience is used here to organize common concepts and synthesize a set of key features of resilience that can be used across diverse application domains. The features in common include critical functions (services), thresholds, cross-scale (both space and time) interactions, and memory and adaptive management. We propose a framework for linking these features to the planning, absorbing, recovering, and adapting phases identified in the NAS definition. As a result, the proposed delineation of resilience can be important in understanding and communicating resilience concepts.

  3. Features of resilience

    USGS Publications Warehouse

    Connelly, Elizabeth B.; Allen, Craig R.; Hatfield, Kirk; Palma-Oliveira, José M.; Woods, David D.; Linkov, Igor

    2017-01-01

    The National Academy of Sciences (NAS) definition of resilience is used here to organize common concepts and synthesize a set of key features of resilience that can be used across diverse application domains. The features in common include critical functions (services), thresholds, cross-scale (both space and time) interactions, and memory and adaptive management. We propose a framework for linking these features to the planning, absorbing, recovering, and adapting phases identified in the NAS definition. The proposed delineation of resilience can be important in understanding and communicating resilience concepts.

  4. Chromium Picolinate Does Not Improve Key Features of Metabolic Syndrome in Obese Nondiabetic Adults

    PubMed Central

    Iqbal, Nayyar; Cardillo, Serena; Volger, Sheri; Bloedon, LeAnne T.; Anderson, Richard A.; Boston, Raymond

    2009-01-01

    Abstract Background The use of chromium-containing dietary supplements is widespread among patients with type 2 diabetes. Chromium's effects in patients at high risk for developing diabetes, especially those with metabolic syndrome, is unknown. The objective of this study was to determine the effects of chromium picolinate (CrPic) on glucose metabolism in patients with metabolic syndrome. Method A double-blind, placebo-controlled, randomized trial was conducted at a U.S. academic medical center. Sixty three patients with National Cholesterol Education Program (NCEP) Adult Treatment Panel III (ATP III)-defined metabolic syndrome were included. The primary end point was a change in the insulin sensitivity index derived from a frequently sampled intravenous glucose tolerance test. Prespecified secondary end points included changes in other measurements of glucose metabolism, oxidative stress, fasting serum lipids, and high sensitivity C-reactive protein. Results After 16 weeks of CrPic treatment, there was no significant change in insulin sensitivity index between groups (P = 0.14). However, CrPic increased acute insulin response to glucose (P = 0.02). CrPic had no significant effect on other measures of glucose metabolism, body weight, serum lipids, or measures of inflammation and oxidative stress. Conclusion CrPic at 1000 μg/day does not improve key features of the metabolic syndrome in obese nondiabetic patients. PMID:19422140

  5. Crafting your Elevator Pitch: Key Features of an Elevator Speech to Help You Reach the Top Floor

    EPA Science Inventory

    You never know when you will end up talking to someone who will end up helping to shape your career. Many of these chance meetings are brief and when you only get 2-3 minutes to make your case everything that you say has to count. This presentation will cover the key features o...

  6. From big data to rich data: The key features of athlete wheelchair mobility performance.

    PubMed

    van der Slikke, R M A; Berger, M A M; Bregman, D J J; Veeger, H E J

    2016-10-03

    Quantitative assessment of an athlete׳s individual wheelchair mobility performance is one prerequisite needed to evaluate game performance, improve wheelchair settings and optimize training routines. Inertial Measurement Unit (IMU) based methods can be used to perform such quantitative assessment, providing a large number of kinematic data. The goal of this research was to reduce that large amount of data to a set of key features best describing wheelchair mobility performance in match play and present them in meaningful way for both scientists and athletes. To test the discriminative power, wheelchair mobility characteristics of athletes with different performance levels were compared. The wheelchair kinematics of 29 (inter-)national level athletes were measured during a match using three inertial sensors mounted on the wheelchair. Principal component analysis was used to reduce 22 kinematic outcomes to a set of six outcomes regarding linear and rotational movement; speed and acceleration; average and best performance. In addition, it was explored whether groups of athletes with known performance differences based on their impairment classification also differed with respect to these key outcomes using univariate general linear models. For all six key outcomes classification showed to be a significant factor (p<0.05). We composed a set of six key kinematic outcomes that accurately describe wheelchair mobility performance in match play. The key kinematic outcomes were displayed in an easy to interpret way, usable for athletes, coaches and scientists. This standardized representation enables comparison of different wheelchair sports regarding wheelchair mobility, but also evaluation at the level of an individual athlete. By this means, the tool could enhance further development of wheelchair sports in general. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Improving Latino Children's Early Language and Literacy Development: Key Features of Early Childhood Education within Family Literacy Programmes

    ERIC Educational Resources Information Center

    Jung, Youngok; Zuniga, Stephen; Howes, Carollee; Jeon, Hyun-Joo; Parrish, Deborah; Quick, Heather; Manship, Karen; Hauser, Alison

    2016-01-01

    Noting the lack of research on how early childhood education (ECE) programmes within family literacy programmes influence Latino children's early language and literacy development, this study examined key features of ECE programmes, specifically teacher-child interactions and child engagement in language and literacy activities and how these…

  8. Cycling hypoxia: A key feature of the tumor microenvironment.

    PubMed

    Michiels, Carine; Tellier, Céline; Feron, Olivier

    2016-08-01

    A compelling body of evidence indicates that most human solid tumors contain hypoxic areas. Hypoxia is the consequence not only of the chaotic proliferation of cancer cells that places them at distance from the nearest capillary but also of the abnormal structure of the new vasculature network resulting in transient blood flow. Hence two types of hypoxia are observed in tumors: chronic and cycling (intermittent) hypoxia. Most of the current work aims at understanding the role of chronic hypoxia in tumor growth, response to treatment and metastasis. Only recently, cycling hypoxia, with spatial and temporal fluctuations in oxygen levels, has emerged as another key feature of the tumor environment that triggers different responses in comparison to chronic hypoxia. Either type of hypoxia is associated with distinct effects not only in cancer cells but also in stromal cells. In particular, cycling hypoxia has been demonstrated to favor, to a higher extent than chronic hypoxia, angiogenesis, resistance to anti-cancer treatments, intratumoral inflammation and tumor metastasis. These review details these effects as well as the signaling pathway it triggers to switch on specific transcriptomic programs. Understanding the signaling pathways through which cycling hypoxia induces these processes that support the development of an aggressive cancer could convey to the emergence of promising new cancer treatments. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Secure image retrieval with multiple keys

    NASA Astrophysics Data System (ADS)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  10. Quantum key distribution without the wavefunction

    NASA Astrophysics Data System (ADS)

    Niestegge, Gerd

    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.

  11. Transverse beam splitting made operational: Key features of the multiturn extraction at the CERN Proton Synchrotron

    NASA Astrophysics Data System (ADS)

    Huschauer, A.; Blas, A.; Borburgh, J.; Damjanovic, S.; Gilardoni, S.; Giovannozzi, M.; Hourican, M.; Kahle, K.; Le Godec, G.; Michels, O.; Sterbini, G.; Hernalsteens, C.

    2017-06-01

    Following a successful commissioning period, the multiturn extraction (MTE) at the CERN Proton Synchrotron (PS) has been applied for the fixed-target physics programme at the Super Proton Synchrotron (SPS) since September 2015. This exceptional extraction technique was proposed to replace the long-serving continuous transfer (CT) extraction, which has the drawback of inducing high activation in the ring. MTE exploits the principles of nonlinear beam dynamics to perform loss-free beam splitting in the horizontal phase space. Over multiple turns, the resulting beamlets are then transferred to the downstream accelerator. The operational deployment of MTE was rendered possible by the full understanding and mitigation of different hardware limitations and by redesigning the extraction trajectories and nonlinear optics, which was required due to the installation of a dummy septum to reduce the activation of the magnetic extraction septum. This paper focuses on these key features including the use of the transverse damper and the septum shadowing, which allowed a transition from the MTE study to a mature operational extraction scheme.

  12. Pulmonary nodule characterization, including computer analysis and quantitative features.

    PubMed

    Bartholmai, Brian J; Koo, Chi Wan; Johnson, Geoffrey B; White, Darin B; Raghunath, Sushravya M; Rajagopalan, Srinivasan; Moynagh, Michael R; Lindell, Rebecca M; Hartman, Thomas E

    2015-03-01

    Pulmonary nodules are commonly detected in computed tomography (CT) chest screening of a high-risk population. The specific visual or quantitative features on CT or other modalities can be used to characterize the likelihood that a nodule is benign or malignant. Visual features on CT such as size, attenuation, location, morphology, edge characteristics, and other distinctive "signs" can be highly suggestive of a specific diagnosis and, in general, be used to determine the probability that a specific nodule is benign or malignant. Change in size, attenuation, and morphology on serial follow-up CT, or features on other modalities such as nuclear medicine studies or MRI, can also contribute to the characterization of lung nodules. Imaging analytics can objectively and reproducibly quantify nodule features on CT, nuclear medicine, and magnetic resonance imaging. Some quantitative techniques show great promise in helping to differentiate benign from malignant lesions or to stratify the risk of aggressive versus indolent neoplasm. In this article, we (1) summarize the visual characteristics, descriptors, and signs that may be helpful in management of nodules identified on screening CT, (2) discuss current quantitative and multimodality techniques that aid in the differentiation of nodules, and (3) highlight the power, pitfalls, and limitations of these various techniques.

  13. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lopez, Juan; Liefer, Nathan C.; Busho, Colin R.

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML)more » and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.« less

  14. Key Features of High-Quality Policies and Guidelines to Support Social and Emotional Learning: Recommendations and Examples for the Collaborating States Initiative (CSI)

    ERIC Educational Resources Information Center

    Dusenbury, Linda; Yoder, Nick

    2017-01-01

    The current document serves two purposes. First, it provides an overview of six key features of a high-quality, comprehensive package of policies and guidance to support student social and emotional learning (SEL). These features are based on Collaborative for Academic Social, and Emotional Learning's (CASEL's) review of the research literature on…

  15. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  16. Qualitative research methods: key features and insights gained from use in infection prevention research.

    PubMed

    Forman, Jane; Creswell, John W; Damschroder, Laura; Kowalski, Christine P; Krein, Sarah L

    2008-12-01

    Infection control professionals and hospital epidemiologists are accustomed to using quantitative research. Although quantitative studies are extremely important in the field of infection control and prevention, often they cannot help us explain why certain factors affect the use of infection control practices and identify the underlying mechanisms through which they do so. Qualitative research methods, which use open-ended techniques, such as interviews, to collect data and nonstatistical techniques to analyze it, provide detailed, diverse insights of individuals, useful quotes that bring a realism to applied research, and information about how different health care settings operate. Qualitative research can illuminate the processes underlying statistical correlations, inform the development of interventions, and show how interventions work to produce observed outcomes. This article describes the key features of qualitative research and the advantages that such features add to existing quantitative research approaches in the study of infection control. We address the goal of qualitative research, the nature of the research process, sampling, data collection and analysis, validity, generalizability of findings, and presentation of findings. Health services researchers are increasingly using qualitative methods to address practical problems by uncovering interacting influences in complex health care environments. Qualitative research methods, applied with expertise and rigor, can contribute important insights to infection prevention efforts.

  17. Key Features of Academic Detailing: Development of an Expert Consensus Using the Delphi Method.

    PubMed

    Yeh, James S; Van Hoof, Thomas J; Fischer, Michael A

    2016-02-01

    Academic detailing is an outreach education technique that combines the direct social marketing traditionally used by pharmaceutical representatives with unbiased content summarizing the best evidence for a given clinical issue. Academic detailing is conducted with clinicians to encourage evidence-based practice in order to improve the quality of care and patient outcomes. The adoption of academic detailing has increased substantially since the original studies in the 1980s. However, the lack of standard agreement on its implementation makes the evaluation of academic detailing outcomes challenging. To identify consensus on the key elements of academic detailing among a group of experts with varying experiences in academic detailing. This study is based on an online survey of 20 experts with experience in academic detailing. We used the Delphi process, an iterative and systematic method of developing consensus within a group. We conducted 3 rounds of online surveys, which addressed 72 individual items derived from a previous literature review of 5 features of academic detailing, including (1) content, (2) communication process, (3) clinicians targeted, (4) change agents delivering intervention, and (5) context for intervention. Nonrespondents were removed from later rounds of the surveys. For most questions, a 4-point ordinal scale was used for responses. We defined consensus agreement as 70% of respondents for a single rating category or 80% for dichotomized ratings. The overall survey response rate was 95% (54 of 57 surveys) and nearly 92% consensus agreement on the survey items (66 of 72 items) by the end of the Delphi exercise. The experts' responses suggested that (1) focused clinician education offering support for clinical decision-making is a key component of academic detailing, (2) detailing messages need to be tailored and provide feasible strategies and solutions to challenging cases, and (3) academic detailers need to develop specific skill sets

  18. Key Features of Academic Detailing: Development of an Expert Consensus Using the Delphi Method

    PubMed Central

    Yeh, James S.; Van Hoof, Thomas J.; Fischer, Michael A.

    2016-01-01

    Background Academic detailing is an outreach education technique that combines the direct social marketing traditionally used by pharmaceutical representatives with unbiased content summarizing the best evidence for a given clinical issue. Academic detailing is conducted with clinicians to encourage evidence-based practice in order to improve the quality of care and patient outcomes. The adoption of academic detailing has increased substantially since the original studies in the 1980s. However, the lack of standard agreement on its implementation makes the evaluation of academic detailing outcomes challenging. Objective To identify consensus on the key elements of academic detailing among a group of experts with varying experiences in academic detailing. Methods This study is based on an online survey of 20 experts with experience in academic detailing. We used the Delphi process, an iterative and systematic method of developing consensus within a group. We conducted 3 rounds of online surveys, which addressed 72 individual items derived from a previous literature review of 5 features of academic detailing, including (1) content, (2) communication process, (3) clinicians targeted, (4) change agents delivering intervention, and (5) context for intervention. Nonrespondents were removed from later rounds of the surveys. For most questions, a 4-point ordinal scale was used for responses. We defined consensus agreement as 70% of respondents for a single rating category or 80% for dichotomized ratings. Results The overall survey response rate was 95% (54 of 57 surveys) and nearly 92% consensus agreement on the survey items (66 of 72 items) by the end of the Delphi exercise. The experts' responses suggested that (1) focused clinician education offering support for clinical decision-making is a key component of academic detailing, (2) detailing messages need to be tailored and provide feasible strategies and solutions to challenging cases, and (3) academic detailers need

  19. Including pride and its group-based, relational, and contextual features in theories of contempt.

    PubMed

    Sullivan, Gavin Brent

    2017-01-01

    Sentiment includes emotional and enduring attitudinal features of contempt, but explaining contempt as a mixture of basic emotion system affects does not adequately address the family resemblance structure of the concept. Adding forms of individual, group-based, and widely shared arrogance and contempt is necessary to capture the complex mixed feelings of proud superiority when "looking down upon" and acting harshly towards others.

  20. Cities and health: history, approaches, and key questions.

    PubMed

    Vlahov, David; Gibble, Emily; Freudenberg, Nicholas; Galea, Sandro

    2004-12-01

    The majority of the world's population will live in cities in the next few years, and the pace of urbanization worldwide will continue to accelerate over the coming decades. Such a dramatic demographic shift can be expected to have an impact on population health. Although there has been historic interest in how city living is associated with health, this interest has waxed and waned and a cogent framework has yet to evolve that encompasses key issues in urban health. In this article, the authors discuss three alternate approaches to the study of urban health today; these include considering urban health from the perspective of a presumed urban health penalty, from an urban sprawl perspective, and more comprehensively, considering how urban living conditions may be associated with health. The authors also propose three key questions that may help guide the study and practice of urban health in coming decades. These include considering what specific features of cities are causally related to health, the extent to which these features are unique to a particular city or are different between cities, and ultimately, to what extent these features of cities are modifiable in order to allow interventions that can improve the health of urban populations.

  1. Summary of the key features of seven biomathematical models of human fatigue and performance.

    PubMed

    Mallis, Melissa M; Mejdal, Sig; Nguyen, Tammy T; Dinges, David F

    2004-03-01

    Biomathematical models that quantify the effects of circadian and sleep/wake processes on the regulation of alertness and performance have been developed in an effort to predict the magnitude and timing of fatigue-related responses in a variety of contexts (e.g., transmeridian travel, sustained operations, shift work). This paper summarizes key features of seven biomathematical models reviewed as part of the Fatigue and Performance Modeling Workshop held in Seattle, WA, on June 13-14, 2002. The Workshop was jointly sponsored by the National Aeronautics and Space Administration, U.S. Department of Defense, U.S. Army Medical Research and Materiel Command, Office of Naval Research, Air Force Office of Scientific Research, and U.S. Department of Transportation. An invitation was sent to developers of seven biomathematical models that were commonly cited in scientific literature and/or supported by government funding. On acceptance of the invitation to attend the Workshop, developers were asked to complete a survey of the goals, capabilities, inputs, and outputs of their biomathematical models of alertness and performance. Data from the completed surveys were summarized and juxtaposed to provide a framework for comparing features of the seven models. Survey responses revealed that models varied greatly relative to their reported goals and capabilities. While all modelers reported that circadian factors were key components of their capabilities, they differed markedly with regard to the roles of sleep and work times as input factors for prediction: four of the seven models had work time as their sole input variable(s), while the other three models relied on various aspects of sleep timing for model input. Models also differed relative to outputs: five sought to predict results from laboratory experiments, field, and operational data, while two models were developed without regard to predicting laboratory experimental results. All modelers provided published papers

  2. Summary of the key features of seven biomathematical models of human fatigue and performance

    NASA Technical Reports Server (NTRS)

    Mallis, Melissa M.; Mejdal, Sig; Nguyen, Tammy T.; Dinges, David F.

    2004-01-01

    BACKGROUND: Biomathematical models that quantify the effects of circadian and sleep/wake processes on the regulation of alertness and performance have been developed in an effort to predict the magnitude and timing of fatigue-related responses in a variety of contexts (e.g., transmeridian travel, sustained operations, shift work). This paper summarizes key features of seven biomathematical models reviewed as part of the Fatigue and Performance Modeling Workshop held in Seattle, WA, on June 13-14, 2002. The Workshop was jointly sponsored by the National Aeronautics and Space Administration, U.S. Department of Defense, U.S. Army Medical Research and Materiel Command, Office of Naval Research, Air Force Office of Scientific Research, and U.S. Department of Transportation. METHODS: An invitation was sent to developers of seven biomathematical models that were commonly cited in scientific literature and/or supported by government funding. On acceptance of the invitation to attend the Workshop, developers were asked to complete a survey of the goals, capabilities, inputs, and outputs of their biomathematical models of alertness and performance. Data from the completed surveys were summarized and juxtaposed to provide a framework for comparing features of the seven models. RESULTS: Survey responses revealed that models varied greatly relative to their reported goals and capabilities. While all modelers reported that circadian factors were key components of their capabilities, they differed markedly with regard to the roles of sleep and work times as input factors for prediction: four of the seven models had work time as their sole input variable(s), while the other three models relied on various aspects of sleep timing for model input. Models also differed relative to outputs: five sought to predict results from laboratory experiments, field, and operational data, while two models were developed without regard to predicting laboratory experimental results. All modelers

  3. Feeding difficulties, a key feature of the Drosophila NDUFS4 mitochondrial disease model

    PubMed Central

    Foriel, Sarah; Eidhof, Ilse

    2018-01-01

    ABSTRACT Mitochondrial diseases are associated with a wide variety of clinical symptoms and variable degrees of severity. Patients with such diseases generally have a poor prognosis and often an early fatal disease outcome. With an incidence of 1 in 5000 live births and no curative treatments available, relevant animal models to evaluate new therapeutic regimes for mitochondrial diseases are urgently needed. By knocking down ND-18, the unique Drosophila ortholog of NDUFS4, an accessory subunit of the NADH:ubiquinone oxidoreductase (Complex I), we developed and characterized several dNDUFS4 models that recapitulate key features of mitochondrial disease. Like in humans, the dNDUFS4 KD flies display severe feeding difficulties, an aspect of mitochondrial disorders that has so far been largely ignored in animal models. The impact of this finding, and an approach to overcome it, will be discussed in the context of interpreting disease model characterization and intervention studies. This article has an associated First Person interview with the first author of the paper. PMID:29590638

  4. Oropharyngeal Dysphagia in Dermatomyositis: Associations with Clinical and Laboratory Features Including Autoantibodies

    PubMed Central

    Mugii, Naoki; Hasegawa, Minoru; Matsushita, Takashi; Hamaguchi, Yasuhito; Oohata, Sacihe; Okita, Hirokazu; Yahata, Tetsutarou; Someya, Fujiko; Inoue, Katsumi; Murono, Shigeyuki; Fujimoto, Manabu; Takehara, Kazuhiko

    2016-01-01

    Objective Dysphagia develops with low frequency in patients with dermatomyositis. Our objective was to determine the clinical and laboratory features that can estimate the development of dysphagia in dermatomyositis. Methods This study included 92 Japanese patients with adult-onset dermatomyositis. The associations between dysphagia and clinical and laboratory features including disease-specific autoantibodies determined by immunoprecipitation assays were analyzed. Results Videofluoroscopy swallow study (VFSS) was performed for all patients with clinical dysphagia (n = 13, 14.1%) but not for patients without clinical dysphagia. Typical findings of dysphagia (pharyngeal pooling, n = 11 and/or nasal regurgitation, n = 4) was detected by VFSS in all patients with clinical dysphagia. Eleven patients with dysphagia (84.6%) had anti-transcription intermediary factor 1γ (TIF-1γ) antibody. By univariate analysis, the average age and the male to female ratio, internal malignancy, and anti-TIF-1γ antibody were significantly higher and the frequency of interstitial lung diseases and manual muscle testing (MMT) scores of sternomastoid and dertoid muscles were significantly lower in patients with dysphagia than in patients without dysphagia. Among patients with anti-TIF-1γ antibody, the mean age, the ratios of male to female and internal malignancy were significantly higher and mean MMT scores of sternomastoid muscle were significantly lower in patients with dysphagia compared with patients without dysphagia. By multivariable analysis, the risk of dysphagia was strongly associated with the existence of internal malignancy and ant-TIF-1γ antibody and was also associated with reduced scores of manual muscle test of sternomastoid muscle. Dysphagia was markedly improved after the treatment against myositis in all 13 patients. Conclusion These findings indicate that dysphagia can develop frequently in patients with internal malignancy, anti-TIF-1γ antibody, or severe muscle

  5. Oropharyngeal Dysphagia in Dermatomyositis: Associations with Clinical and Laboratory Features Including Autoantibodies.

    PubMed

    Mugii, Naoki; Hasegawa, Minoru; Matsushita, Takashi; Hamaguchi, Yasuhito; Oohata, Sacihe; Okita, Hirokazu; Yahata, Tetsutarou; Someya, Fujiko; Inoue, Katsumi; Murono, Shigeyuki; Fujimoto, Manabu; Takehara, Kazuhiko

    2016-01-01

    Dysphagia develops with low frequency in patients with dermatomyositis. Our objective was to determine the clinical and laboratory features that can estimate the development of dysphagia in dermatomyositis. This study included 92 Japanese patients with adult-onset dermatomyositis. The associations between dysphagia and clinical and laboratory features including disease-specific autoantibodies determined by immunoprecipitation assays were analyzed. Videofluoroscopy swallow study (VFSS) was performed for all patients with clinical dysphagia (n = 13, 14.1%) but not for patients without clinical dysphagia. Typical findings of dysphagia (pharyngeal pooling, n = 11 and/or nasal regurgitation, n = 4) was detected by VFSS in all patients with clinical dysphagia. Eleven patients with dysphagia (84.6%) had anti-transcription intermediary factor 1γ (TIF-1γ) antibody. By univariate analysis, the average age and the male to female ratio, internal malignancy, and anti-TIF-1γ antibody were significantly higher and the frequency of interstitial lung diseases and manual muscle testing (MMT) scores of sternomastoid and dertoid muscles were significantly lower in patients with dysphagia than in patients without dysphagia. Among patients with anti-TIF-1γ antibody, the mean age, the ratios of male to female and internal malignancy were significantly higher and mean MMT scores of sternomastoid muscle were significantly lower in patients with dysphagia compared with patients without dysphagia. By multivariable analysis, the risk of dysphagia was strongly associated with the existence of internal malignancy and ant-TIF-1γ antibody and was also associated with reduced scores of manual muscle test of sternomastoid muscle. Dysphagia was markedly improved after the treatment against myositis in all 13 patients. These findings indicate that dysphagia can develop frequently in patients with internal malignancy, anti-TIF-1γ antibody, or severe muscle weakness of sternomastoid muscle.

  6. Bile Routing Modification Reproduces Key Features of Gastric Bypass in Rat.

    PubMed

    Goncalves, Daisy; Barataud, Aude; De Vadder, Filipe; Vinera, Jennifer; Zitoun, Carine; Duchampt, Adeline; Mithieux, Gilles

    2015-12-01

    To evaluate the role of bile routing modification on the beneficial effects of gastric bypass surgery on glucose and energy metabolism. Gastric bypass surgery (GBP) promotes early improvements in glucose and energy homeostasis in obese diabetic patients. A suggested mechanism associates a decrease in hepatic glucose production to an enhanced intestinal gluconeogenesis. Moreover, plasma bile acids are elevated after GBP and bile acids are inhibitors of gluconeogenesis. In male Sprague-Dawley rats, we performed bile diversions from the bile duct to the midjejunum or the mid-ileum to match the modified bile delivery in the gut occurring in GBP. Body weight, food intake, glucose tolerance, insulin sensitivity, and food preference were analyzed. The expression of gluconeogenesis genes was evaluated in both the liver and the intestine. Bile diversions mimicking GBP promote an increase in plasma bile acids and a marked improvement in glucose control. Bile bioavailability modification is causal because a bile acid sequestrant suppresses the beneficial effects of bile diversions on glucose control. In agreement with the inhibitory role of bile acids on gluconeogenesis, bile diversions promote a blunting in hepatic glucose production, whereas intestinal gluconeogenesis is increased in the gut segments devoid of bile. In rats fed a high-fat-high-sucrose diet, bile diversions improve glucose control and dramatically decrease food intake because of an acquired disinterest in fatty food. This study shows that bile routing modification is a key mechanistic feature in the beneficial outcomes of GBP.

  7. Cranial dystonia, blepharospasm and hemifacial spasm: clinical features and treatment, including the use of botulinum toxin.

    PubMed Central

    Kraft, S P; Lang, A E

    1988-01-01

    Blepharospasm, the most frequent feature of cranial dystonia, and hemifacial spasm are two involuntary movement disorders that affect facial muscles. The cause of blepharospasm and other forms of cranial dystonia is not known. Hemifacial spasm is usually due to compression of the seventh cranial nerve at its exit from the brain stem. Cranial dystonia may result in severe disability. Hemifacial spasm tends to be much less disabling but may cause considerable distress and embarrassment. Patients affected with these disorders are often mistakenly considered to have psychiatric problems. Although the two disorders are quite distinct pathophysiologically, therapy with botulinum toxin has proven very effective in both. We review the clinical features, proposed pathophysiologic features, differential diagnosis and treatment, including the use of botulinum toxin, of cranial dystonia and hemifacial spasm. Images Fig. 2 Fig. 3 PMID:3052771

  8. How we developed and piloted an electronic key features examination for the internal medicine clerkship based on a US national curriculum.

    PubMed

    Bronander, Kirk A; Lang, Valerie J; Nixon, L James; Harrell, Heather E; Kovach, Regina; Hingle, Susan; Berman, Norman

    2015-01-01

    Key features examinations (KFEs) have been used to assess clinical decision making in medical education, yet there are no reports of an online KFE-based on a national curriculum for the internal medicine clerkship. What we did: The authors developed and pilot tested an electronic KFE based on the US Clerkship Directors in Internal Medicine core curriculum. Teams, with expert oversight and peer review, developed key features (KFs) and cases. The exam was pilot tested at eight medical schools with 162 third and fourth year medical students, of whom 96 (59.3%) responded to a survey. While most students reported that the exam was more difficult than a multiple choice question exam, 61 (83.3%) students agreed that it reflected problems seen in clinical practice and 51 (69.9%) students reported that it more accurately assessed the ability to make clinical decisions. The development of an electronic KFs exam is a time-intensive process. A team approach offers built-in peer review and accountability. Students, although not familiar with this format in the US, recognized it as authentically assessing clinical decision-making for problems commonly seen in the clerkship.

  9. Bile Routing Modification Reproduces Key Features of Gastric Bypass in Rat

    PubMed Central

    Goncalves, Daisy; Barataud, Aude; De Vadder, Filipe; Vinera, Jennifer; Zitoun, Carine; Duchampt, Adeline; Mithieux, Gilles

    2015-01-01

    STRUCTURED ABSTRACT Objective To evaluate the role of bile routing modification on the beneficial effects of gastric bypass surgery on glucose and energy metabolism. Summary background data Gastric bypass surgery (GBP) promotes early improvements in glucose and energy homeostasis in obese diabetic patients. A suggested mechanism associates a decrease in hepatic glucose production (HGP) to an enhanced intestinal gluconeogenesis (IGN). Moreover, plasma bile acids are elevated after GBP and bile acids are inhibitors of gluconeogenesis. Methods In male Sprague-Dawley rats, we performed bile diversions from the bile duct to the mid-jejunum or the mid-ileum to match the modified bile delivery in the gut occurring in GBP. Body weight, food intake, glucose tolerance, insulin sensitivity and food preference were analyzed. The expression of gluconeogenesis genes was evaluated in both the liver and the intestine. Results Bile diversions mimicking GBP promote an increase in plasma bile acids and a marked improvement in glucose control. Bile bioavailability modification is causal since a bile acid sequestrant suppresses the beneficial effects of bile diversions on glucose control. In agreement with the inhibitory role of bile acids on gluconeogenesis, bile diversions promote a blunting in HGP, whereas IGN is increased in the gut segments devoid of bile. In rats fed a high fat-high sucrose diet, bile diversions improve glucose control and dramatically decrease food intake due to an acquired disinterest in fatty food. Conclusion This study shows that bile routing modification is a key mechanistic feature in the beneficial outcomes of GBP. PMID:25575265

  10. How Task Features Impact Evidence from Assessments Embedded in Simulations and Games

    ERIC Educational Resources Information Center

    Almond, Russell G.; Kim, Yoon Jeon; Velasquez, Gertrudes; Shute, Valerie J.

    2014-01-01

    One of the key ideas of evidence-centered assessment design (ECD) is that task features can be deliberately manipulated to change the psychometric properties of items. ECD identifies a number of roles that task-feature variables can play, including determining the focus of evidence, guiding form creation, determining item difficulty and…

  11. Multiple Paths to Mathematics Practice in Al-Kashi's "Key to Arithmetic"

    ERIC Educational Resources Information Center

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his "Key to Arithmetic", a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life…

  12. Characterizing Feature Matching Performance Over Long Time Periods (Author’s Manuscript)

    DTIC Science & Technology

    2015-01-05

    older imagery. These applications, including approaches to geo-location, geo- orientation [13], geo-tagging [16], landmark recognition [23], image... orientation between features is less than 10 degrees. We calculate the percent of features from the reference image that fit into each of these three...always because the key point detection algorithm did not find feature points at the same locations and orientation . 5. Conclusions In this paper, we offer

  13. Biologically Inspired Model for Visual Cognition Achieving Unsupervised Episodic and Semantic Feature Learning.

    PubMed

    Qiao, Hong; Li, Yinlin; Li, Fengfu; Xi, Xuanyang; Wu, Wei

    2016-10-01

    Recently, many biologically inspired visual computational models have been proposed. The design of these models follows the related biological mechanisms and structures, and these models provide new solutions for visual recognition tasks. In this paper, based on the recent biological evidence, we propose a framework to mimic the active and dynamic learning and recognition process of the primate visual cortex. From principle point of view, the main contributions are that the framework can achieve unsupervised learning of episodic features (including key components and their spatial relations) and semantic features (semantic descriptions of the key components), which support higher level cognition of an object. From performance point of view, the advantages of the framework are as follows: 1) learning episodic features without supervision-for a class of objects without a prior knowledge, the key components, their spatial relations and cover regions can be learned automatically through a deep neural network (DNN); 2) learning semantic features based on episodic features-within the cover regions of the key components, the semantic geometrical values of these components can be computed based on contour detection; 3) forming the general knowledge of a class of objects-the general knowledge of a class of objects can be formed, mainly including the key components, their spatial relations and average semantic values, which is a concise description of the class; and 4) achieving higher level cognition and dynamic updating-for a test image, the model can achieve classification and subclass semantic descriptions. And the test samples with high confidence are selected to dynamically update the whole model. Experiments are conducted on face images, and a good performance is achieved in each layer of the DNN and the semantic description learning process. Furthermore, the model can be generalized to recognition tasks of other objects with learning ability.

  14. Simple dynamical models capturing the key features of the Central Pacific El Niño.

    PubMed

    Chen, Nan; Majda, Andrew J

    2016-10-18

    The Central Pacific El Niño (CP El Niño) has been frequently observed in recent decades. The phenomenon is characterized by an anomalous warm sea surface temperature (SST) confined to the central Pacific and has different teleconnections from the traditional El Niño. Here, simple models are developed and shown to capture the key mechanisms of the CP El Niño. The starting model involves coupled atmosphere-ocean processes that are deterministic, linear, and stable. Then, systematic strategies are developed for incorporating several major mechanisms of the CP El Niño into the coupled system. First, simple nonlinear zonal advection with no ad hoc parameterization of the background SST gradient is introduced that creates coupled nonlinear advective modes of the SST. Secondly, due to the recent multidecadal strengthening of the easterly trade wind, a stochastic parameterization of the wind bursts including a mean easterly trade wind anomaly is coupled to the simple atmosphere-ocean processes. Effective stochastic noise in the wind burst model facilitates the intermittent occurrence of the CP El Niño with realistic amplitude and duration. In addition to the anomalous warm SST in the central Pacific, other major features of the CP El Niño such as the rising branch of the anomalous Walker circulation being shifted to the central Pacific and the eastern Pacific cooling with a shallow thermocline are all captured by this simple coupled model. Importantly, the coupled model succeeds in simulating a series of CP El Niño that lasts for 5 y, which resembles the two CP El Niño episodes during 1990-1995 and 2002-2006.

  15. "Key Concepts in ELT": Taking Stock

    ERIC Educational Resources Information Center

    Hall, Graham

    2012-01-01

    This article identifies patterns and trends within "Key Concepts in ELT", both since the inception of the feature in ELT Journal in 1993 and during the 17 years of the current editorship. After outlining the aims of the series, the article identifies key themes that have emerged over time, exploring the links between "Key Concepts" pieces and the…

  16. The key-features approach to assess clinical decisions: validity evidence to date.

    PubMed

    Bordage, G; Page, G

    2018-05-17

    The key-features (KFs) approach to assessment was initially proposed during the First Cambridge Conference on Medical Education in 1984 as a more efficient and effective means of assessing clinical decision-making skills. Over three decades later, we conducted a comprehensive, systematic review of the validity evidence gathered since then. The evidence was compiled according to the Standards for Educational and Psychological Testing's five sources of validity evidence, namely, Content, Response process, Internal structure, Relations to other variables, and Consequences, to which we added two other types related to Cost-feasibility and Acceptability. Of the 457 publications that referred to the KFs approach between 1984 and October 2017, 164 are cited here; the remaining 293 were either redundant or the authors simply mentioned the KFs concept in relation to their work. While one set of articles reported meeting the validity standards, another set examined KFs test development choices and score interpretation. The accumulated validity evidence for the KFs approach since its inception supports the decision-making construct measured and its use to assess clinical decision-making skills at all levels of training and practice and with various types of exam formats. Recognizing that gathering validity evidence is an ongoing process, areas with limited evidence, such as item factor analyses or consequences of testing, are identified as well as new topics needing further clarification, such as the use of the KFs approach for formative assessment and its place within a program of assessment.

  17. ClinicalKey 2.0: Upgrades in a Point-of-Care Search Engine.

    PubMed

    Huslig, Mary Ann; Vardell, Emily

    2015-01-01

    ClinicalKey 2.0, launched September 23, 2014, offers a mobile-friendly design with a search history feature for targeting point-of-care resources for health care professionals. Browsing is improved with searchable, filterable listings of sources highlighting new resources. ClinicalKey 2.0 improvements include more than 1,400 new Topic Pages for quick access to point-of-care content. A sample search details some of the upgrades and content options.

  18. A fast image matching algorithm based on key points

    NASA Astrophysics Data System (ADS)

    Wang, Huilin; Wang, Ying; An, Ru; Yan, Peng

    2014-05-01

    Image matching is a very important technique in image processing. It has been widely used for object recognition and tracking, image retrieval, three-dimensional vision, change detection, aircraft position estimation, and multi-image registration. Based on the requirements of matching algorithm for craft navigation, such as speed, accuracy and adaptability, a fast key point image matching method is investigated and developed. The main research tasks includes: (1) Developing an improved celerity key point detection approach using self-adapting threshold of Features from Accelerated Segment Test (FAST). A method of calculating self-adapting threshold was introduced for images with different contrast. Hessian matrix was adopted to eliminate insecure edge points in order to obtain key points with higher stability. This approach in detecting key points has characteristics of small amount of computation, high positioning accuracy and strong anti-noise ability; (2) PCA-SIFT is utilized to describe key point. 128 dimensional vector are formed based on the SIFT method for the key points extracted. A low dimensional feature space was established by eigenvectors of all the key points, and each eigenvector was projected onto the feature space to form a low dimensional eigenvector. These key points were re-described by dimension-reduced eigenvectors. After reducing the dimension by the PCA, the descriptor was reduced to 20 dimensions from the original 128. This method can reduce dimensions of searching approximately near neighbors thereby increasing overall speed; (3) Distance ratio between the nearest neighbour and second nearest neighbour searching is regarded as the measurement criterion for initial matching points from which the original point pairs matched are obtained. Based on the analysis of the common methods (e.g. RANSAC (random sample consensus) and Hough transform cluster) used for elimination false matching point pairs, a heuristic local geometric restriction

  19. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  20. Childhood Ataxia: Clinical Features, Pathogenesis, Key Unanswered Questions, and Future Directions

    PubMed Central

    Ashley, Claire N.; Hoang, Kelly D.; Lynch, David R.; Perlman, Susan L.; Maria, Bernard L.

    2013-01-01

    Childhood ataxia is characterized by impaired balance and coordination primarily due to cerebellar dysfunction. Friedreich ataxia, a form of childhood ataxia, is the most common multisystem autosomal recessive disease. Most of these patients are homozygous for the GAA repeat expansion located on the first intron of the frataxin gene on chromosome 9. Mutations in the frataxin gene impair mitochondrial function, increase reactive oxygen species, and trigger redistribution of iron in the mitochondria and cytosol. Targeted therapies for Friedreich ataxia are undergoing testing. In addition, a centralized database, patient registry, and natural history study have been launched to support clinical trials in Friedreich ataxia. The 2011 Neurobiology of Disease in Children symposium, held in conjunction with the 40th annual Child Neurology Society meeting, aimed to (1) describe clinical features surrounding Friedreich ataxia, including cardiomyopathy and genetics; (2) discuss recent advances in the understanding of the pathogenesis of Friedreich ataxia and developments of clinical trials; (3) review new investigations of characteristic symptoms; (4) establish clinical and biochemical overlaps in neurodegenerative diseases and possible directions for future basic, translational, and clinical studies. PMID:22859693

  1. Larvae of five horticulturally important species of Chrysopodes (Neuroptera, Chrysopidae): shared generic features, descriptions and keys

    PubMed Central

    Silva, Patrícia S.; Tauber, Catherine A.; Albuquerque, Gilberto S.; Tauber, Maurice J.

    2013-01-01

    Abstract An expanded list of generic level larval characteristics is presented for Chrysopodes; it includes a reinterpretation of the mesothoracic and metathoracic structure and setation. Keys, descriptions and images of Semaphoront A (first instar) and Semaphoront B (second and third instars) are offered for identifying five species of Chrysopodes (Chrysopodes) that are commonly reported from horticultural habitats in the Neotropical region. PMID:23653514

  2. What is included with your online e-cigarette order? An analysis of e-cigarette shipping, product and packaging features

    PubMed Central

    Kong, Amanda Y; Derrick, Jason C; Abrantes, Anthony S

    2016-01-01

    Background The electronic cigarette industry is growing, with youth using e-cigarettes at higher rates than they are using cigarettes, and retail and online sales projected to reach $10 billion in 2017. Minimal regulation of the production and marketing of e-cigarettes exists to date, which has allowed companies to promote unsupported claims. We assessed the shipping, product features and packaging of a wide variety of e-cigarettes purchased online by adults and youth. Methods The most popular internet e-cigarette vendors were identified from a larger study of internet tobacco vendors. Between August 2013 and June 2014, adults made 56 purchase attempts from online vendors, and youth made 98 attempts. Packages received were assessed for exterior and internal packaging features, including product information, health warnings and additional materials. Results We analysed a total of 125 orders featuring 86 unique brands of e-cigarettes. The contents were rarely indicated on package exteriors. Product information came with just 60% of orders and just 38.4% included an instruction manual. Only 44.6% of products included a health warning, and some had unsupported claims, such as lack of secondhand smoke exposure. Additionally, some products were leaking e-liquid and battery fluid on arrival. Conclusions A large variety of e-cigarette products are manufactured and marketed to consumers. Many products do not include instructions for use, and unsupported claims are being presented to consumers. Effective federal regulation of the manufacturing, packaging, product information and health claims surrounding e-cigarettes is necessary to ensure consumers are presented with accurate e-cigarette use information. PMID:27357936

  3. Tumors of the Testis: Morphologic Features and Molecular Alterations.

    PubMed

    Howitt, Brooke E; Berney, Daniel M

    2015-12-01

    This article reviews the most frequently encountered tumor of the testis; pure and mixed malignant testicular germ cell tumors (TGCT), with emphasis on adult (postpubertal) TGCTs and their differential diagnoses. We additionally review TGCT in the postchemotherapy setting, and findings to be integrated into the surgical pathology report, including staging of testicular tumors and other problematic issues. The clinical features, gross pathologic findings, key histologic features, common differential diagnoses, the use of immunohistochemistry, and molecular alterations in TGCTs are discussed. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    PubMed Central

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  5. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  6. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  7. Artistic shaping of key facial features in children and adolescents.

    PubMed

    Sullivan, P K; Singer, D P

    2001-12-01

    Facial aesthetics can be enhanced by otoplasty, rhinoplasty and genioplasty. Excellent outcomes can be obtained given appropriate timing, patient selection, preoperative planning, and artistic sculpting of the region with the appropriate surgical technique. Choosing a patient with mature psychological, developmental, and anatomic features that are amenable to treatment in the pediatric population can be challenging, yet rewarding.

  8. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    ERIC Educational Resources Information Center

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  9. Registration algorithm of point clouds based on multiscale normal features

    NASA Astrophysics Data System (ADS)

    Lu, Jun; Peng, Zhongtao; Su, Hang; Xia, GuiHua

    2015-01-01

    The point cloud registration technology for obtaining a three-dimensional digital model is widely applied in many areas. To improve the accuracy and speed of point cloud registration, a registration method based on multiscale normal vectors is proposed. The proposed registration method mainly includes three parts: the selection of key points, the calculation of feature descriptors, and the determining and optimization of correspondences. First, key points are selected from the point cloud based on the changes of magnitude of multiscale curvatures obtained by using principal components analysis. Then the feature descriptor of each key point is proposed, which consists of 21 elements based on multiscale normal vectors and curvatures. The correspondences in a pair of two point clouds are determined according to the descriptor's similarity of key points in the source point cloud and target point cloud. Correspondences are optimized by using a random sampling consistency algorithm and clustering technology. Finally, singular value decomposition is applied to optimized correspondences so that the rigid transformation matrix between two point clouds is obtained. Experimental results show that the proposed point cloud registration algorithm has a faster calculation speed, higher registration accuracy, and better antinoise performance.

  10. Shielding voices: The modulation of binding processes between voice features and response features by task representations.

    PubMed

    Bogon, Johanna; Eisenbarth, Hedwig; Landgraf, Steffen; Dreisbach, Gesine

    2017-09-01

    Vocal events offer not only semantic-linguistic content but also information about the identity and the emotional-motivational state of the speaker. Furthermore, most vocal events have implications for our actions and therefore include action-related features. But the relevance and irrelevance of vocal features varies from task to task. The present study investigates binding processes for perceptual and action-related features of spoken words and their modulation by the task representation of the listener. Participants reacted with two response keys to eight different words spoken by a male or a female voice (Experiment 1) or spoken by an angry or neutral male voice (Experiment 2). There were two instruction conditions: half of participants learned eight stimulus-response mappings by rote (SR), and half of participants applied a binary task rule (TR). In both experiments, SR instructed participants showed clear evidence for binding processes between voice and response features indicated by an interaction between the irrelevant voice feature and the response. By contrast, as indicated by a three-way interaction with instruction, no such binding was found in the TR instructed group. These results are suggestive of binding and shielding as two adaptive mechanisms that ensure successful communication and action in a dynamic social environment.

  11. What is included with your online e-cigarette order? An analysis of e-cigarette shipping, product and packaging features.

    PubMed

    Kong, Amanda Y; Derrick, Jason C; Abrantes, Anthony S; Williams, Rebecca S

    2016-06-29

    The electronic cigarette industry is growing, with youth using e-cigarettes at higher rates than they are using cigarettes, and retail and online sales projected to reach $10 billion in 2017. Minimal regulation of the production and marketing of e-cigarettes exists to date, which has allowed companies to promote unsupported claims. We assessed the shipping, product features and packaging of a wide variety of e-cigarettes purchased online by adults and youth. The most popular internet e-cigarette vendors were identified from a larger study of internet tobacco vendors. Between August 2013 and June 2014, adults made 56 purchase attempts from online vendors, and youth made 98 attempts. Packages received were assessed for exterior and internal packaging features, including product information, health warnings and additional materials. We analysed a total of 125 orders featuring 86 unique brands of e-cigarettes. The contents were rarely indicated on package exteriors. Product information came with just 60% of orders and just 38.4% included an instruction manual. Only 44.6% of products included a health warning, and some had unsupported claims, such as lack of secondhand smoke exposure. Additionally, some products were leaking e-liquid and battery fluid on arrival. A large variety of e-cigarette products are manufactured and marketed to consumers. Many products do not include instructions for use, and unsupported claims are being presented to consumers. Effective federal regulation of the manufacturing, packaging, product information and health claims surrounding e-cigarettes is necessary to ensure consumers are presented with accurate e-cigarette use information. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  12. Multiple Paths to Mathematics Practice in Al-Kashi's Key to Arithmetic

    NASA Astrophysics Data System (ADS)

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his Key to Arithmetic, a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life and his contributions to mathematics and astronomy. Section 2 starts with a brief discussion of the contents and pedagogy of the Key to Arithmetic. Al-Kashi's multiple approaches are discussed through four different examples of his versatility in presenting a topic from multiple perspectives. These examples are multiple definitions, multiple algorithms, multiple formulas, and multiple methods for solving word problems. Section 3 is devoted to some benefits that can be gained by implementing al-Kashi's multiple paths approach in modern curricula. For this discussion, examples from two teaching modules taken from the Key to Arithmetic and implemented in Pre-Calculus and mathematics courses for preservice teachers are discussed. Also, the conclusions are supported by some aspects of these modules. This paper is an attempt to help mathematics educators explore more benefits from reading from original sources.

  13. Cross-Domain Semi-Supervised Learning Using Feature Formulation.

    PubMed

    Xingquan Zhu

    2011-12-01

    Semi-Supervised Learning (SSL) traditionally makes use of unlabeled samples by including them into the training set through an automated labeling process. Such a primitive Semi-Supervised Learning (pSSL) approach suffers from a number of disadvantages including false labeling and incapable of utilizing out-of-domain samples. In this paper, we propose a formative Semi-Supervised Learning (fSSL) framework which explores hidden features between labeled and unlabeled samples to achieve semi-supervised learning. fSSL regards that both labeled and unlabeled samples are generated from some hidden concepts with labeling information partially observable for some samples. The key of the fSSL is to recover the hidden concepts, and take them as new features to link labeled and unlabeled samples for semi-supervised learning. Because unlabeled samples are only used to generate new features, but not to be explicitly included in the training set like pSSL does, fSSL overcomes the inherent disadvantages of the traditional pSSL methods, especially for samples not within the same domain as the labeled instances. Experimental results and comparisons demonstrate that fSSL significantly outperforms pSSL-based methods for both within-domain and cross-domain semi-supervised learning.

  14. a Performance Comparison of Feature Detectors for Planetary Rover Mapping and Localization

    NASA Astrophysics Data System (ADS)

    Wan, W.; Peng, M.; Xing, Y.; Wang, Y.; Liu, Z.; Di, K.; Teng, B.; Mao, X.; Zhao, Q.; Xin, X.; Jia, M.

    2017-07-01

    Feature detection and matching are key techniques in computer vision and robotics, and have been successfully implemented in many fields. So far there is no performance comparison of feature detectors and matching methods for planetary mapping and rover localization using rover stereo images. In this research, we present a comprehensive evaluation and comparison of six feature detectors, including Moravec, Förstner, Harris, FAST, SIFT and SURF, aiming for optimal implementation of feature-based matching in planetary surface environment. To facilitate quantitative analysis, a series of evaluation criteria, including distribution evenness of matched points, coverage of detected points, and feature matching accuracy, are developed in the research. In order to perform exhaustive evaluation, stereo images, simulated under different baseline, pitch angle, and interval of adjacent rover locations, are taken as experimental data source. The comparison results show that SIFT offers the best overall performance, especially it is less sensitive to changes of image taken at adjacent locations.

  15. Predicting Key Events in the Popularity Evolution of Online Information.

    PubMed

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  16. Predicting Key Events in the Popularity Evolution of Online Information

    PubMed Central

    Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121

  17. RSA Key Development Using Fingerprint Image on Text Message

    NASA Astrophysics Data System (ADS)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  18. Online feature selection with streaming features.

    PubMed

    Wu, Xindong; Yu, Kui; Ding, Wei; Wang, Hao; Zhu, Xingquan

    2013-05-01

    We propose a new online feature selection framework for applications with streaming features where the knowledge of the full feature space is unknown in advance. We define streaming features as features that flow in one by one over time whereas the number of training examples remains fixed. This is in contrast with traditional online learning methods that only deal with sequentially added observations, with little attention being paid to streaming features. The critical challenges for Online Streaming Feature Selection (OSFS) include 1) the continuous growth of feature volumes over time, 2) a large feature space, possibly of unknown or infinite size, and 3) the unavailability of the entire feature set before learning starts. In the paper, we present a novel Online Streaming Feature Selection method to select strongly relevant and nonredundant features on the fly. An efficient Fast-OSFS algorithm is proposed to improve feature selection performance. The proposed algorithms are evaluated extensively on high-dimensional datasets and also with a real-world case study on impact crater detection. Experimental results demonstrate that the algorithms achieve better compactness and higher prediction accuracy than existing streaming feature selection algorithms.

  19. A Detailed Data-Driven Network Model of Prefrontal Cortex Reproduces Key Features of In Vivo Activity

    PubMed Central

    Hass, Joachim; Hertäg, Loreen; Durstewitz, Daniel

    2016-01-01

    The prefrontal cortex is centrally involved in a wide range of cognitive functions and their impairment in psychiatric disorders. Yet, the computational principles that govern the dynamics of prefrontal neural networks, and link their physiological, biochemical and anatomical properties to cognitive functions, are not well understood. Computational models can help to bridge the gap between these different levels of description, provided they are sufficiently constrained by experimental data and capable of predicting key properties of the intact cortex. Here, we present a detailed network model of the prefrontal cortex, based on a simple computationally efficient single neuron model (simpAdEx), with all parameters derived from in vitro electrophysiological and anatomical data. Without additional tuning, this model could be shown to quantitatively reproduce a wide range of measures from in vivo electrophysiological recordings, to a degree where simulated and experimentally observed activities were statistically indistinguishable. These measures include spike train statistics, membrane potential fluctuations, local field potentials, and the transmission of transient stimulus information across layers. We further demonstrate that model predictions are robust against moderate changes in key parameters, and that synaptic heterogeneity is a crucial ingredient to the quantitative reproduction of in vivo-like electrophysiological behavior. Thus, we have produced a physiologically highly valid, in a quantitative sense, yet computationally efficient PFC network model, which helped to identify key properties underlying spike time dynamics as observed in vivo, and can be harvested for in-depth investigation of the links between physiology and cognition. PMID:27203563

  20. CT Features of Ovarian Tumors: Defining Key Differences Between Serous Borderline Tumors and Low-Grade Serous Carcinomas.

    PubMed

    Nougaret, Stephanie; Lakhman, Yulia; Molinari, Nicolas; Feier, Diana; Scelzo, Chiara; Vargas, Hebert A; Sosa, Ramon E; Hricak, Hedvig; Soslow, Robert A; Grisham, Rachel N; Sala, Evis

    2018-04-01

    The objective of our study was to investigate whether the CT features of serous borderline tumors (SBTs) differ from those of low-grade serous carcinomas (LGSCs) and to evaluate if mutation status is associated with distinct CT phenotypes. This retrospective study included 59 women, 37 with SBT and 22 with LGSC, who underwent CT before primary surgical resection. Thirty of 59 patients were genetically profiled. Two radiologists (readers 1 and 2) independently and retrospectively reviewed CT examinations for qualitative features and quantified total tumor volumes (TTVs), solid tumor volumes (STVs), and solid proportion of ovarian masses. Univariate and multivariate associations of the CT features with histopathologic diagnoses and mutations were evaluated, and interreader agreement was determined. At multivariate analysis, the presence of bilateral ovarian masses (p = 0.03), the presence of peritoneal disease (PD) (p = 0.002), and higher STV of ovarian masses (p = 0.002) were associated with LGSC. The presence of nodular PD pattern (p < 0.001 each reader) and the presence of PD calcifications (reader 1, p = 0.02; reader 2, p = 0.003) were associated with invasive peritoneal lesions (i.e., LGSC). The presence of bilateral ovarian masses (p = 0.04 each reader), PD (reader 1, p = 0.01; reader 2, p = 0.004), and higher STV (p = 0.03 for each reader) were associated with the absence of BRAF mutation (i.e., wild type [wt]-BRAF). The CT features of LGSCs were distinct from those of SBTs. The CT manifestations of LGSC and the wt-BRAF phenotype were similar.

  1. Key structural features of nonsteroidal ligands for binding and activation of the androgen receptor.

    PubMed

    Yin, Donghua; He, Yali; Perera, Minoli A; Hong, Seoung Soo; Marhefka, Craig; Stourman, Nina; Kirkovsky, Leonid; Miller, Duane D; Dalton, James T

    2003-01-01

    The purposes of the present studies were to examine the androgen receptor (AR) binding ability and in vitro functional activity of multiple series of nonsteroidal compounds derived from known antiandrogen pharmacophores and to investigate the structure-activity relationships (SARs) of these nonsteroidal compounds. The AR binding properties of sixty-five nonsteroidal compounds were assessed by a radioligand competitive binding assay with the use of cytosolic AR prepared from rat prostates. The AR agonist and antagonist activities of high-affinity ligands were determined by the ability of the ligand to regulate AR-mediated transcriptional activation in cultured CV-1 cells, using a cotransfection assay. Nonsteroidal compounds with diverse structural features demonstrated a wide range of binding affinity for the AR. Ten compounds, mainly from the bicalutamide-related series, showed a binding affinity superior to the structural pharmacophore from which they were derived. Several SARs regarding nonsteroidal AR binding were revealed from the binding data, including stereoisomeric conformation, steric effect, and electronic effect. The functional activity of high-affinity ligands ranged from antagonist to full agonist for the AR. Several structural features were found to be determinative of agonist and antagonist activities. The nonsteroidal AR agonists identified from the present studies provided a pool of candidates for further development of selective androgen receptor modulators (SARMs) for androgen therapy. Also, these studies uncovered or confirmed numerous important SARs governing AR binding and functional properties by nonsteroidal molecules, which would be valuable in the future structural optimization of SARMs.

  2. Identifying significant environmental features using feature recognition.

    DOT National Transportation Integrated Search

    2015-10-01

    The Department of Environmental Analysis at the Kentucky Transportation Cabinet has expressed an interest in feature-recognition capability because it may help analysts identify environmentally sensitive features in the landscape, : including those r...

  3. Identifying key features of effective active learning: the effects of writing and peer discussion.

    PubMed

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  4. The Genus Cerion (Gastropoda: Cerionidae) in the Florida Keys

    PubMed Central

    2015-01-01

    The systematic relationships and phylogeography of Cerion incanum, the only species of Cerion native to the Florida Keys, are reviewed based on partial sequences of the mitochondrial COI and 16S genes derived from 18 populations spanning the range of this species and including the type localities of all four described subspecies. Our samples included specimens of Cerion casablancae, a species introduced to Indian Key in 1912, and a population of C. incanum x C. casablancae hybrids descended from a population of C. casablancae introduced onto Bahia Honda Key in the same year. Molecular data did not support the partition of C. incanum into subspecies, nor could populations be apportioned reliably into subspecies based on morphological features used to define the subspecies. Phylogenetic analyses affirmed the derived relationship of C. incanum relative to other cerionids, and indicated a Bahamian origin for the Cerion fauna of southern Florida. Relationships among the populations throughout the Keys indicate that the northernmost populations, closest to the Tomeu paleoislands that had been inhabited by Cerion petuchi during the Calabrian Pleistocene, are the oldest. The range of Cerion incanum expanded as the archipelago that is the Florida Keys was formed since the lower Tarantian Pleistocene by extension from the northeast to the southwest, with new islands populated as they were formed. The faunas of the High Coral Keys in the northeast and the Oölite Keys in the southwest, both with large islands that host multiple discontinuous populations of Cerion, are each composed of well supported clades that are characterized by distinctive haplotypes. In contrast, the fauna of the intervening Low Coral Keys consist of a heterogeneous series of populations, some with haplotypes derived from the High Coral Keys, others from the Oölite Keys. Individuals from the C. incanum x C. casablancae hybrid population inhabiting the southeastern coast of Bahia Honda Key were readily

  5. The Genus Cerion (Gastropoda: Cerionidae) in the Florida Keys.

    PubMed

    Shrestha, Yesha; Wirshing, Herman H; Harasewych, M G

    2015-01-01

    The systematic relationships and phylogeography of Cerion incanum, the only species of Cerion native to the Florida Keys, are reviewed based on partial sequences of the mitochondrial COI and 16S genes derived from 18 populations spanning the range of this species and including the type localities of all four described subspecies. Our samples included specimens of Cerion casablancae, a species introduced to Indian Key in 1912, and a population of C. incanum x C. casablancae hybrids descended from a population of C. casablancae introduced onto Bahia Honda Key in the same year. Molecular data did not support the partition of C. incanum into subspecies, nor could populations be apportioned reliably into subspecies based on morphological features used to define the subspecies. Phylogenetic analyses affirmed the derived relationship of C. incanum relative to other cerionids, and indicated a Bahamian origin for the Cerion fauna of southern Florida. Relationships among the populations throughout the Keys indicate that the northernmost populations, closest to the Tomeu paleoislands that had been inhabited by Cerion petuchi during the Calabrian Pleistocene, are the oldest. The range of Cerion incanum expanded as the archipelago that is the Florida Keys was formed since the lower Tarantian Pleistocene by extension from the northeast to the southwest, with new islands populated as they were formed. The faunas of the High Coral Keys in the northeast and the Oölite Keys in the southwest, both with large islands that host multiple discontinuous populations of Cerion, are each composed of well supported clades that are characterized by distinctive haplotypes. In contrast, the fauna of the intervening Low Coral Keys consist of a heterogeneous series of populations, some with haplotypes derived from the High Coral Keys, others from the Oölite Keys. Individuals from the C. incanum x C. casablancae hybrid population inhabiting the southeastern coast of Bahia Honda Key were readily

  6. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  7. ClinicalKey: a point-of-care search engine.

    PubMed

    Vardell, Emily

    2013-01-01

    ClinicalKey is a new point-of-care resource for health care professionals. Through controlled vocabulary, ClinicalKey offers a cross section of resources on diseases and procedures, from journals to e-books and practice guidelines to patient education. A sample search was conducted to demonstrate the features of the database, and a comparison with similar tools is presented.

  8. Chimeric Mice with Competent Hematopoietic Immunity Reproduce Key Features of Severe Lassa Fever.

    PubMed

    Oestereich, Lisa; Lüdtke, Anja; Ruibal, Paula; Pallasch, Elisa; Kerber, Romy; Rieger, Toni; Wurr, Stephanie; Bockholt, Sabrina; Pérez-Girón, José V; Krasemann, Susanne; Günther, Stephan; Muñoz-Fontela, César

    2016-05-01

    Lassa fever (LASF) is a highly severe viral syndrome endemic to West African countries. Despite the annual high morbidity and mortality caused by LASF, very little is known about the pathophysiology of the disease. Basic research on LASF has been precluded due to the lack of relevant small animal models that reproduce the human disease. Immunocompetent laboratory mice are resistant to infection with Lassa virus (LASV) and, to date, only immunodeficient mice, or mice expressing human HLA, have shown some degree of susceptibility to experimental infection. Here, transplantation of wild-type bone marrow cells into irradiated type I interferon receptor knockout mice (IFNAR-/-) was used to generate chimeric mice that reproduced important features of severe LASF in humans. This included high lethality, liver damage, vascular leakage and systemic virus dissemination. In addition, this model indicated that T cell-mediated immunopathology was an important component of LASF pathogenesis that was directly correlated with vascular leakage. Our strategy allows easy generation of a suitable small animal model to test new vaccines and antivirals and to dissect the basic components of LASF pathophysiology.

  9. A new UKIDSS proper motion survey and key early results, including new benchmark systems

    NASA Astrophysics Data System (ADS)

    Smith, L.; Lucas, P.; Burningham, B.; Jones, H.; Pinfield, D.; Smart, R.; Andrei, A.

    We present a proper motion catalogue for the 1500 deg2 of 2 epoch J-band UKIDSS Large Area Survey (LAS) data, which includes 120,000 stellar sources with motions detected above the 5sigma level. Our upper limit on proper motion detection is 3\\farcs3 yr-1 and typical uncertainties are of order 10 mas yr-1 for bright sources from data with a modest 1.8-7.0 year epoch baseline. We developed a bespoke proper motion pipeline which applies a source-unique second order polynomial transformation to UKIDSS array coordinates to counter potential local non-uniformity in the focal plane. Our catalogue agrees well with the proper motion data supplied in the current WFCAM Science Archive (WSA) tenth data release (DR10) catalogue where there is overlap, and in various optical catalogues, but it benefits from some improvements, such as a larger matching radius and relative to absolute proper motion correction. We present proper motion results for 128 T dwarfs in the UKIDSS LAS and key early results of projects utilising our catalogue, in particular searches for brown dwarf benchmark systems through cross matches with existing proper motion catalogues. We report the discovery of two new T dwarf benchmark systems.

  10. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  11. Efficient iris recognition by characterizing key local variations.

    PubMed

    Ma, Li; Tan, Tieniu; Wang, Yunhong; Zhang, Dexin

    2004-06-01

    Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification, and at the same time, the difficulty in effectively representing such details in an image. This paper describes an efficient algorithm for iris recognition by characterizing key local variations. The basic idea is that local sharp variation points, denoting the appearing or vanishing of an important image structure, are utilized to represent the characteristics of the iris. The whole procedure of feature extraction includes two steps: 1) a set of one-dimensional intensity signals is constructed to effectively characterize the most important information of the original two-dimensional image; 2) using a particular class of wavelets, a position sequence of local sharp variation points in such signals is recorded as features. We also present a fast matching scheme based on exclusive OR operation to compute the similarity between a pair of position sequences. Experimental results on 2255 iris images show that the performance of the proposed method is encouraging and comparable to the best iris recognition algorithm found in the current literature.

  12. Generic decoding of seen and imagined objects using hierarchical visual features.

    PubMed

    Horikawa, Tomoyasu; Kamitani, Yukiyasu

    2017-05-22

    Object recognition is a key function in both human and machine vision. While brain decoding of seen and imagined objects has been achieved, the prediction is limited to training examples. We present a decoding approach for arbitrary objects using the machine vision principle that an object category is represented by a set of features rendered invariant through hierarchical processing. We show that visual features, including those derived from a deep convolutional neural network, can be predicted from fMRI patterns, and that greater accuracy is achieved for low-/high-level features with lower-/higher-level visual areas, respectively. Predicted features are used to identify seen/imagined object categories (extending beyond decoder training) from a set of computed features for numerous object images. Furthermore, decoding of imagined objects reveals progressive recruitment of higher-to-lower visual representations. Our results demonstrate a homology between human and machine vision and its utility for brain-based information retrieval.

  13. Fast Localization in Large-Scale Environments Using Supervised Indexing of Binary Features.

    PubMed

    Youji Feng; Lixin Fan; Yihong Wu

    2016-01-01

    The essence of image-based localization lies in matching 2D key points in the query image and 3D points in the database. State-of-the-art methods mostly employ sophisticated key point detectors and feature descriptors, e.g., Difference of Gaussian (DoG) and Scale Invariant Feature Transform (SIFT), to ensure robust matching. While a high registration rate is attained, the registration speed is impeded by the expensive key point detection and the descriptor extraction. In this paper, we propose to use efficient key point detectors along with binary feature descriptors, since the extraction of such binary features is extremely fast. The naive usage of binary features, however, does not lend itself to significant speedup of localization, since existing indexing approaches, such as hierarchical clustering trees and locality sensitive hashing, are not efficient enough in indexing binary features and matching binary features turns out to be much slower than matching SIFT features. To overcome this, we propose a much more efficient indexing approach for approximate nearest neighbor search of binary features. This approach resorts to randomized trees that are constructed in a supervised training process by exploiting the label information derived from that multiple features correspond to a common 3D point. In the tree construction process, node tests are selected in a way such that trees have uniform leaf sizes and low error rates, which are two desired properties for efficient approximate nearest neighbor search. To further improve the search efficiency, a probabilistic priority search strategy is adopted. Apart from the label information, this strategy also uses non-binary pixel intensity differences available in descriptor extraction. By using the proposed indexing approach, matching binary features is no longer much slower but slightly faster than matching SIFT features. Consequently, the overall localization speed is significantly improved due to the much faster key

  14. A free-access online key to identify Amazonian ferns.

    PubMed

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp.

  15. A free-access online key to identify Amazonian ferns

    PubMed Central

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    Abstract There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp. PMID:28781548

  16. Key design features of a new smokefree law to help achieve the Smokefree Aotearoa.

    PubMed

    Delany, Louise; Thomson, George; Wilson, Nick; Edwards, Richard

    2016-08-05

    To design new tobacco control legislation to achieve the New Zealand Government's 2025 smokefree goal. An original analysis of the legislative options for New Zealand tobacco control. 'Business as usual' is most unlikely to achieve smoking prevalence that is less than 5% by 2025. Key components of a new Act would ideally include plans and targets with teeth, a focus on the industry, a focus on the product, reduction of supply, and a whole-of-society approach to promote consistency in policy implementation through: i) a public duty on government agencies to act consistently with smokefree law; ii) a general duty on those associated with the tobacco/nicotine industry in relation to tobacco control objectives; and iii) a principle requiring international treaties to be interpreted consistently with tobacco control objectives. Strategies such as those identified in this Viewpoint should be explored further as part of urgently needed planning to achieve the New Zealand Government's goal for Smokefree Aotearoa by 2025.

  17. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  18. Semantic image segmentation with fused CNN features

    NASA Astrophysics Data System (ADS)

    Geng, Hui-qiang; Zhang, Hua; Xue, Yan-bing; Zhou, Mian; Xu, Guang-ping; Gao, Zan

    2017-09-01

    Semantic image segmentation is a task to predict a category label for every image pixel. The key challenge of it is to design a strong feature representation. In this paper, we fuse the hierarchical convolutional neural network (CNN) features and the region-based features as the feature representation. The hierarchical features contain more global information, while the region-based features contain more local information. The combination of these two kinds of features significantly enhances the feature representation. Then the fused features are used to train a softmax classifier to produce per-pixel label assignment probability. And a fully connected conditional random field (CRF) is used as a post-processing method to improve the labeling consistency. We conduct experiments on SIFT flow dataset. The pixel accuracy and class accuracy are 84.4% and 34.86%, respectively.

  19. A new species of Monstrilla Dana, 1849 (Copepoda: Monstrilloida: Monstrillidae) from Korea, including a key to species from the north-west Pacific.

    PubMed

    Lee, Jimin; Chang, Cheon Young

    2016-10-11

    A new species of monstrilloid copepod belonging to the genus Monstrilla Dana, 1849 is recorded from South Korea. Specimens were obtained between May of 2012 and January of 2014 from inshore waters along the coasts of the East Sea, South Sea, and Jeju Island, using a light trap installed at quays and wharves overnight. Monstrilla ilhoii sp. nov. is characterized by a remarkable combination of a large body size (females about 3.8 mm long, males about 2.8 mm long), a polygonal ridge pattern (cuticular reticulation) over the entire body surface, and an antennule armature featuring a supernumerary spiniform seta (4d3) in females and a dagger-shaped distal spine (62) in both sexes. In other respects M. ilhoii sp. nov. most closely resembles M. lata Desai & Bal, 1963; both species have one and three setae on the endopodal and exopodal lobes, respectively, of female leg 5, a horseshoe-shaped male genital apparatus with marked undulations along the whole distal margin, and six setae on each caudal ramus in both sexes. This paper provides a description of the new species, taxonomic remarks on its morphological features, and differential diagnoses with respect to its allies. Scanning electron microscopy was used to document significant morphological microcharacters. The species of Monstrilla known from five sub-regions of the north-west Pacific are enumerated with the source references, and keys to the females and males of these species are provided.

  20. Cockayne syndrome: Clinical features, model systems and pathways

    PubMed Central

    Karikkineth, Ajoy C.; Scheibye-Knudsen, Morten; Fivenson, Elayne; Croteau, Deborah L.; Bohr, Vilhelm A.

    2016-01-01

    Cockayne syndrome (CS) is a disorder characterized by a variety of clinical features including cachectic dwarfism, severe neurological manifestations including microcephaly and cognitive deficits, pigmentary retinopathy, cataracts, sensorineural deafness, and ambulatory and feeding difficulties, leading to death by 12 years of age on average. It is an autosomal recessive disorder, with a prevalence of approximately 2.5 per million. There are several phenotypes (1, 2 and 3) and complementation groups (CSA and CSB), and overlaps with xeroderma pigmentosum (XP). It has been considered a progeria, and many of the clinical features resemble accelerated aging. As such, the study of CS affords an opportunity to better understand the underlying mechanisms of aging. The molecular basis of CS has traditionally been considered to be due to defects in transcription and transcription-coupled nucleotide excision repair (TC-NER). However, recent work suggests that defects in base excision DNA repair and mitochondrial functions may also play key roles. This opens up the possibility of molecular interventions in CS, and by extrapolation, possibly in aging. PMID:27507608

  1. Which ante mortem clinical features predict progressive supranuclear palsy pathology?

    PubMed

    Respondek, Gesine; Kurz, Carolin; Arzberger, Thomas; Compta, Yaroslau; Englund, Elisabet; Ferguson, Leslie W; Gelpi, Ellen; Giese, Armin; Irwin, David J; Meissner, Wassilios G; Nilsson, Christer; Pantelyat, Alexander; Rajput, Alex; van Swieten, John C; Troakes, Claire; Josephs, Keith A; Lang, Anthony E; Mollenhauer, Brit; Müller, Ulrich; Whitwell, Jennifer L; Antonini, Angelo; Bhatia, Kailash P; Bordelon, Yvette; Corvol, Jean-Christophe; Colosimo, Carlo; Dodel, Richard; Grossman, Murray; Kassubek, Jan; Krismer, Florian; Levin, Johannes; Lorenzl, Stefan; Morris, Huw; Nestor, Peter; Oertel, Wolfgang H; Rabinovici, Gil D; Rowe, James B; van Eimeren, Thilo; Wenning, Gregor K; Boxer, Adam; Golbe, Lawrence I; Litvan, Irene; Stamelou, Maria; Höglinger, Günter U

    2017-07-01

    Progressive supranuclear palsy (PSP) is a neuropathologically defined disease presenting with a broad spectrum of clinical phenotypes. To identify clinical features and investigations that predict or exclude PSP pathology during life, aiming at an optimization of the clinical diagnostic criteria for PSP. We performed a systematic review of the literature published since 1996 to identify clinical features and investigations that may predict or exclude PSP pathology. We then extracted standardized data from clinical charts of patients with pathologically diagnosed PSP and relevant disease controls and calculated the sensitivity, specificity, and positive predictive value of key clinical features for PSP in this cohort. Of 4166 articles identified by the database inquiry, 269 met predefined standards. The literature review identified clinical features predictive of PSP, including features of the following 4 functional domains: ocular motor dysfunction, postural instability, akinesia, and cognitive dysfunction. No biomarker or genetic feature was found reliably validated to predict definite PSP. High-quality original natural history data were available from 206 patients with pathologically diagnosed PSP and from 231 pathologically diagnosed disease controls (54 corticobasal degeneration, 51 multiple system atrophy with predominant parkinsonism, 53 Parkinson's disease, 73 behavioral variant frontotemporal dementia). We identified clinical features that predicted PSP pathology, including phenotypes other than Richardson's syndrome, with varying sensitivity and specificity. Our results highlight the clinical variability of PSP and the high prevalence of phenotypes other than Richardson's syndrome. The features of variant phenotypes with high specificity and sensitivity should serve to optimize clinical diagnosis of PSP. © 2017 International Parkinson and Movement Disorder Society. © 2017 International Parkinson and Movement Disorder Society.

  2. The genomes of two key bumblebee species with primitive eusocial organization.

    PubMed

    Sadd, Ben M; Barribeau, Seth M; Bloch, Guy; de Graaf, Dirk C; Dearden, Peter; Elsik, Christine G; Gadau, Jürgen; Grimmelikhuijzen, Cornelis J P; Hasselmann, Martin; Lozier, Jeffrey D; Robertson, Hugh M; Smagghe, Guy; Stolle, Eckart; Van Vaerenbergh, Matthias; Waterhouse, Robert M; Bornberg-Bauer, Erich; Klasberg, Steffen; Bennett, Anna K; Câmara, Francisco; Guigó, Roderic; Hoff, Katharina; Mariotti, Marco; Munoz-Torres, Monica; Murphy, Terence; Santesmasses, Didac; Amdam, Gro V; Beckers, Matthew; Beye, Martin; Biewer, Matthias; Bitondi, Márcia M G; Blaxter, Mark L; Bourke, Andrew F G; Brown, Mark J F; Buechel, Severine D; Cameron, Rossanah; Cappelle, Kaat; Carolan, James C; Christiaens, Olivier; Ciborowski, Kate L; Clarke, David F; Colgan, Thomas J; Collins, David H; Cridge, Andrew G; Dalmay, Tamas; Dreier, Stephanie; du Plessis, Louis; Duncan, Elizabeth; Erler, Silvio; Evans, Jay; Falcon, Tiago; Flores, Kevin; Freitas, Flávia C P; Fuchikawa, Taro; Gempe, Tanja; Hartfelder, Klaus; Hauser, Frank; Helbing, Sophie; Humann, Fernanda C; Irvine, Frano; Jermiin, Lars S; Johnson, Claire E; Johnson, Reed M; Jones, Andrew K; Kadowaki, Tatsuhiko; Kidner, Jonathan H; Koch, Vasco; Köhler, Arian; Kraus, F Bernhard; Lattorff, H Michael G; Leask, Megan; Lockett, Gabrielle A; Mallon, Eamonn B; Antonio, David S Marco; Marxer, Monika; Meeus, Ivan; Moritz, Robin F A; Nair, Ajay; Näpflin, Kathrin; Nissen, Inga; Niu, Jinzhi; Nunes, Francis M F; Oakeshott, John G; Osborne, Amy; Otte, Marianne; Pinheiro, Daniel G; Rossié, Nina; Rueppell, Olav; Santos, Carolina G; Schmid-Hempel, Regula; Schmitt, Björn D; Schulte, Christina; Simões, Zilá L P; Soares, Michelle P M; Swevers, Luc; Winnebeck, Eva C; Wolschin, Florian; Yu, Na; Zdobnov, Evgeny M; Aqrawi, Peshtewani K; Blankenburg, Kerstin P; Coyle, Marcus; Francisco, Liezl; Hernandez, Alvaro G; Holder, Michael; Hudson, Matthew E; Jackson, LaRonda; Jayaseelan, Joy; Joshi, Vandita; Kovar, Christie; Lee, Sandra L; Mata, Robert; Mathew, Tittu; Newsham, Irene F; Ngo, Robin; Okwuonu, Geoffrey; Pham, Christopher; Pu, Ling-Ling; Saada, Nehad; Santibanez, Jireh; Simmons, DeNard; Thornton, Rebecca; Venkat, Aarti; Walden, Kimberly K O; Wu, Yuan-Qing; Debyser, Griet; Devreese, Bart; Asher, Claire; Blommaert, Julie; Chipman, Ariel D; Chittka, Lars; Fouks, Bertrand; Liu, Jisheng; O'Neill, Meaghan P; Sumner, Seirian; Puiu, Daniela; Qu, Jiaxin; Salzberg, Steven L; Scherer, Steven E; Muzny, Donna M; Richards, Stephen; Robinson, Gene E; Gibbs, Richard A; Schmid-Hempel, Paul; Worley, Kim C

    2015-04-24

    The shift from solitary to social behavior is one of the major evolutionary transitions. Primitively eusocial bumblebees are uniquely placed to illuminate the evolution of highly eusocial insect societies. Bumblebees are also invaluable natural and agricultural pollinators, and there is widespread concern over recent population declines in some species. High-quality genomic data will inform key aspects of bumblebee biology, including susceptibility to implicated population viability threats. We report the high quality draft genome sequences of Bombus terrestris and Bombus impatiens, two ecologically dominant bumblebees and widely utilized study species. Comparing these new genomes to those of the highly eusocial honeybee Apis mellifera and other Hymenoptera, we identify deeply conserved similarities, as well as novelties key to the biology of these organisms. Some honeybee genome features thought to underpin advanced eusociality are also present in bumblebees, indicating an earlier evolution in the bee lineage. Xenobiotic detoxification and immune genes are similarly depauperate in bumblebees and honeybees, and multiple categories of genes linked to social organization, including development and behavior, show high conservation. Key differences identified include a bias in bumblebee chemoreception towards gustation from olfaction, and striking differences in microRNAs, potentially responsible for gene regulation underlying social and other traits. These two bumblebee genomes provide a foundation for post-genomic research on these key pollinators and insect societies. Overall, gene repertoires suggest that the route to advanced eusociality in bees was mediated by many small changes in many genes and processes, and not by notable expansion or depauperation.

  3. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  4. Feature Masking in Computer Game Promotes Visual Imagery

    ERIC Educational Resources Information Center

    Smith, Glenn Gordon; Morey, Jim; Tjoe, Edwin

    2007-01-01

    Can learning of mental imagery skills for visualizing shapes be accelerated with feature masking? Chemistry, physics fine arts, military tactics, and laparoscopic surgery often depend on mentally visualizing shapes in their absence. Does working with "spatial feature-masks" (skeletal shapes, missing key identifying portions) encourage people to…

  5. Strong nonadditivity as a key structure-activity relationship feature: distinguishing structural changes from assay artifacts.

    PubMed

    Kramer, Christian; Fuchs, Julian E; Liedl, Klaus R

    2015-03-23

    Nonadditivity in protein-ligand affinity data represents highly instructive structure-activity relationship (SAR) features that indicate structural changes and have the potential to guide rational drug design. At the same time, nonadditivity is a challenge for both basic SAR analysis as well as many ligand-based data analysis techniques such as Free-Wilson Analysis and Matched Molecular Pair analysis, since linear substituent contribution models inherently assume additivity and thus do not work in such cases. While structural causes for nonadditivity have been analyzed anecdotally, no systematic approaches to interpret and use nonadditivity prospectively have been developed yet. In this contribution, we lay the statistical framework for systematic analysis of nonadditivity in a SAR series. First, we develop a general metric to quantify nonadditivity. Then, we demonstrate the non-negligible impact of experimental uncertainty that creates apparent nonadditivity, and we introduce techniques to handle experimental uncertainty. Finally, we analyze public SAR data sets for strong nonadditivity and use recourse to the original publications and available X-ray structures to find structural explanations for the nonadditivity observed. We find that all cases of strong nonadditivity (ΔΔpKi and ΔΔpIC50 > 2.0 log units) with sufficient structural information to generate reasonable hypothesis involve changes in binding mode. With the appropriate statistical basis, nonadditivity analysis offers a variety of new attempts for various areas in computer-aided drug design, including the validation of scoring functions and free energy perturbation approaches, binding pocket classification, and novel features in SAR analysis tools.

  6. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  7. AP1000{sup R} severe accident features and post-Fukushima considerations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scobel, J. H.; Schulz, T. L.; Williams, M. G.

    2012-07-01

    The AP1000{sup R} passive nuclear power plant is uniquely equipped to withstand an extended station blackout scenario such as the events following the earthquake and tsunami at Fukushima without compromising core and containment integrity. The AP1000 plant shuts down the reactor, cools the core, containment and spent fuel pool for more than 3 days using passive systems that do not require AC or DC power or operator actions. Following this passive coping period, minimal operator actions are needed to extend the operation of the passive features to 7 days using installed equipment. To provide defense-in-depth for design extension conditions, themore » AP1000 plant has engineered features that mitigate the effects of core damage. Engineered features retain damaged core debris within the reactor vessel as a key feature. Other aspects of the design protect containment integrity during severe accidents, including unique features of the AP1000 design relative to passive containment cooling with water and air, and hydrogen management. (authors)« less

  8. Handwriting: Feature Correlation Analysis for Biometric Hashes

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Steinmetz, Ralf

    2004-12-01

    In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  9. Key Features of the Deployed NPP/NPOESS Ground System

    NASA Astrophysics Data System (ADS)

    Heckmann, G.; Grant, K. D.; Mulligan, J. E.

    2010-12-01

    operations for NPP. C3S transitioned to operations at the NOAA Satellite Operations Facility (NSOF) in Suitland Maryland in August 2007 and IDPS transitioned in July 2009. Both segments were involved with several compatibility tests with the NPP Satellite at the Ball Aerospace Technology Corporation (BATC) factory. The compatibility tests involved the spacecraft bus, the four sensors (VIIRS, ATMS, CrIS and OMPS), and both ground segments flowing data between the NSOF and BATC factory and flowing data from the polar ground station (Svalbard) over high-speed links back to the NSOF and the two IDP locations (NESDIS & AFWA). This presentation will describe the NPP/NPOESS ground architecture features & enhancements for the NPOESS era. These will include C3S-provided space-to-ground connectivity, reliable and secure data delivery and insight & oversight of the total operation. For NPOESS the ground architecture is extended to provide additional ground receptor sites to reduce data product delivery times to users and delivery of additional sensor data products from sensors similar to NPP and more NPOESS sensors. This architecture is also extended from two Centrals (NESDIS & AFWA) to two additional Centrals (FNMOC & NAVO). IDPS acts as a buffer minimizing changes in how users request and receive data products.

  10. Moving target feature phenomenology data collection at China Lake

    NASA Astrophysics Data System (ADS)

    Gross, David C.; Hill, Jeff; Schmitz, James L.

    2002-08-01

    This paper describes the DARPA Moving Target Feature Phenomenology (MTFP) data collection conducted at the China Lake Naval Weapons Center's Junction Ranch in July 2001. The collection featured both X-band and Ku-band radars positioned on top of Junction Ranch's Parrot Peak. The test included seven targets used in eleven configurations with vehicle motion consisting of circular, straight-line, and 90-degree turning motion. Data was collected at 10-degree and 17-degree depression angles. Key parameters in the collection were polarization, vehicle speed, and road roughness. The collection also included a canonical target positioned at Junction Ranch's tilt-deck turntable. The canonical target included rotating wheels (military truck tire and civilian pick-up truck tire) and a flat plate with variable positioned corner reflectors. The canonical target was also used to simulate a rotating antenna and a vibrating plate. The target vehicles were instrumented with ARDS pods for differential GPS and roll, pitch and yaw measurements. Target motion was also documented using a video camera slaved to the X-band radar antenna and by a video camera operated near the target site.

  11. Experience improves feature extraction in Drosophila.

    PubMed

    Peng, Yueqing; Xi, Wang; Zhang, Wei; Zhang, Ke; Guo, Aike

    2007-05-09

    Previous exposure to a pattern in the visual scene can enhance subsequent recognition of that pattern in many species from honeybees to humans. However, whether previous experience with a visual feature of an object, such as color or shape, can also facilitate later recognition of that particular feature from multiple visual features is largely unknown. Visual feature extraction is the ability to select the key component from multiple visual features. Using a visual flight simulator, we designed a novel protocol for visual feature extraction to investigate the effects of previous experience on visual reinforcement learning in Drosophila. We found that, after conditioning with a visual feature of objects among combinatorial shape-color features, wild-type flies exhibited poor ability to extract the correct visual feature. However, the ability for visual feature extraction was greatly enhanced in flies trained previously with that visual feature alone. Moreover, we demonstrated that flies might possess the ability to extract the abstract category of "shape" but not a particular shape. Finally, this experience-dependent feature extraction is absent in flies with defective MBs, one of the central brain structures in Drosophila. Our results indicate that previous experience can enhance visual feature extraction in Drosophila and that MBs are required for this experience-dependent visual cognition.

  12. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    PubMed

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  13. A Web-Based Data Collection Platform for Multisite Randomized Behavioral Intervention Trials: Development, Key Software Features, and Results of a User Survey.

    PubMed

    Modi, Riddhi A; Mugavero, Michael J; Amico, Rivet K; Keruly, Jeanne; Quinlivan, Evelyn Byrd; Crane, Heidi M; Guzman, Alfredo; Zinski, Anne; Montue, Solange; Roytburd, Katya; Church, Anna; Willig, James H

    2017-06-16

    Meticulous tracking of study data must begin early in the study recruitment phase and must account for regulatory compliance, minimize missing data, and provide high information integrity and/or reduction of errors. In behavioral intervention trials, participants typically complete several study procedures at different time points. Among HIV-infected patients, behavioral interventions can favorably affect health outcomes. In order to empower newly diagnosed HIV positive individuals to learn skills to enhance retention in HIV care, we developed the behavioral health intervention Integrating ENGagement and Adherence Goals upon Entry (iENGAGE) funded by the National Institute of Allergy and Infectious Diseases (NIAID), where we deployed an in-clinic behavioral health intervention in 4 urban HIV outpatient clinics in the United States. To scale our intervention strategy homogenously across sites, we developed software that would function as a behavioral sciences research platform. This manuscript aimed to: (1) describe the design and implementation of a Web-based software application to facilitate deployment of a multisite behavioral science intervention; and (2) report on results of a survey to capture end-user perspectives of the impact of this platform on the conduct of a behavioral intervention trial. In order to support the implementation of the NIAID-funded trial iENGAGE, we developed software to deploy a 4-site behavioral intervention for new clinic patients with HIV/AIDS. We integrated the study coordinator into the informatics team to participate in the software development process. Here, we report the key software features and the results of the 25-item survey to evaluate user perspectives on research and intervention activities specific to the iENGAGE trial (N=13). The key features addressed are study enrollment, participant randomization, real-time data collection, facilitation of longitudinal workflow, reporting, and reusability. We found 100% user

  14. Topological numbering of features on a mesh

    NASA Technical Reports Server (NTRS)

    Atallah, Mikhail J.; Hambrusch, Susanne E.; Tewinkel, Lynn E.

    1988-01-01

    Assume a nxn binary image is given containing horizontally convex features; i.e., for each feature, each of its row's pixels form an interval on that row. The problem of assigning topological numbers to such features is considered; i.e., assign a number to every feature f so that all features to the left of f have a smaller number assigned to them. This problem arises in solutions to the stereo matching problem. A parallel algorithm to solve the topological numbering problem in O(n) time on an nxn mesh of processors is presented. The key idea of the solution is to create a tree from which the topological numbers can be obtained even though the tree does not uniquely represent the to the left of relationship of the features.

  15. The Main Features and the Key Challenges of the Education System in Taiwan

    ERIC Educational Resources Information Center

    Chien, Chiu-Kuei Chang; Lin, Lung-Chi; Chen, Chun-Fu

    2013-01-01

    Taiwan has undergone radical innovation of its educational system in the wake of political liberalization and democratization, with a request for a change in the idea which diverts from "de-centralization" to "individualization." The reforms have led to two main features of pluralism and generalization of education in our…

  16. Photo interpretation key to Michigan land cover/use

    NASA Technical Reports Server (NTRS)

    Enslin, W. R.; Hudson, W. D.; Lusch, D. P.

    1983-01-01

    A set of photo interpretation keys is presented to provide a structured approach to the identification of land cover/use categories as specified in the Michigan Resource Inventory Act. The designated categories are urban and; built up lands; agricultural lands; forest land; nonforested land; water bodies; wetlands; and barren land. The keys were developed for use with medium scale (1:20,000 to 1:24,000) color infrared aerial photography. Although each key is generalized in that it relies only upon the most distinguishing photo characteristics in separating the various land cover/use categories, additional interpretation characteristics, distinguishing features and background material are given.

  17. Key Data on Education in Europe 2009

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; de Coster, Isabelle; Forsthuber, Bernadette; Noorani, Sogol; Ruffio, Philippe

    2009-01-01

    This seventh edition of "Key Data on Education in Europe" retains its main special feature which is the combination of statistical data and qualitative information to describe the organisation and functioning of education systems in Europe. The present 2009 edition maintains the subject-based structure defined by the previous one but…

  18. Mining the key predictors for event outbreaks in social networks

    NASA Astrophysics Data System (ADS)

    Yi, Chengqi; Bao, Yuanyuan; Xue, Yibo

    2016-04-01

    It will be beneficial to devise a method to predict a so-called event outbreak. Existing works mainly focus on exploring effective methods for improving the accuracy of predictions, while ignoring the underlying causes: What makes event go viral? What factors that significantly influence the prediction of an event outbreak in social networks? In this paper, we proposed a novel definition for an event outbreak, taking into account the structural changes to a network during the propagation of content. In addition, we investigated features that were sensitive to predicting an event outbreak. In order to investigate the universality of these features at different stages of an event, we split the entire lifecycle of an event into 20 equal segments according to the proportion of the propagation time. We extracted 44 features, including features related to content, users, structure, and time, from each segment of the event. Based on these features, we proposed a prediction method using supervised classification algorithms to predict event outbreaks. Experimental results indicate that, as time goes by, our method is highly accurate, with a precision rate ranging from 79% to 97% and a recall rate ranging from 74% to 97%. In addition, after applying a feature-selection algorithm, the top five selected features can considerably improve the accuracy of the prediction. Data-driven experimental results show that the entropy of the eigenvector centrality, the entropy of the PageRank, the standard deviation of the betweenness centrality, the proportion of re-shares without content, and the average path length are the key predictors for an event outbreak. Our findings are especially useful for further exploring the intrinsic characteristics of outbreak prediction.

  19. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  20. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  1. Confirming the key role of Ar+ ion bombardment in the growth feature of nanostructured carbon materials by PECVD

    NASA Astrophysics Data System (ADS)

    Liu, Yulin; Lin, Jinghuang; Jia, Henan; Chen, Shulin; Qi, Junlei; Qu, Chaoqun; Cao, Jian; Feng, Jicai; Fei, Weidong

    2017-11-01

    In order to confirm the key role of Ar+ ion bombardment in the growth feature of nanostructured carbon materials (NCMs), here we report a novel strategy to create different Ar+ ion states in situ in plasma enhanced chemical vapor deposition (PECVD) by separating catalyst film from the substrate. Different bombardment environments on either side of the catalyst film were created simultaneously to achieve multi-layered structural NCMs. Results showed that Ar+ ion bombardment is crucial and complex for the growth of NCMs. Firstly, Ar+ ion bombardment has both positive and negative effects on carbon nanotubes (CNTs). On one hand, Ar+ ions can break up the graphic structure of CNTs and suppress thin CNT nucleation and growth. On the other hand, Ar+ ion bombardment can remove redundant carbon layers on the surface of large catalyst particles which is essential for thick CNTs. As a result, the diameter of the CNTs depends on the Ar+ ion state. As for vertically oriented few-layer graphene (VFG), Ar+ ions are essential and can even convert the CNTs into VFG. Therefore, by combining with the catalyst separation method, specific or multi-layered structural NCMs can be obtained by PECVD only by changing the intensity of Ar+ ion bombardment, and these special NCMs are promising in many fields.

  2. Confirming the key role of Ar+ ion bombardment in the growth feature of nanostructured carbon materials by PECVD.

    PubMed

    Liu, Yulin; Lin, Jinghuang; Jia, Henan; Chen, Shulin; Qi, Junlei; Qu, Chaoqun; Cao, Jian; Feng, Jicai; Fei, Weidong

    2017-11-24

    In order to confirm the key role of Ar + ion bombardment in the growth feature of nanostructured carbon materials (NCMs), here we report a novel strategy to create different Ar + ion states in situ in plasma enhanced chemical vapor deposition (PECVD) by separating catalyst film from the substrate. Different bombardment environments on either side of the catalyst film were created simultaneously to achieve multi-layered structural NCMs. Results showed that Ar + ion bombardment is crucial and complex for the growth of NCMs. Firstly, Ar + ion bombardment has both positive and negative effects on carbon nanotubes (CNTs). On one hand, Ar + ions can break up the graphic structure of CNTs and suppress thin CNT nucleation and growth. On the other hand, Ar + ion bombardment can remove redundant carbon layers on the surface of large catalyst particles which is essential for thick CNTs. As a result, the diameter of the CNTs depends on the Ar + ion state. As for vertically oriented few-layer graphene (VFG), Ar + ions are essential and can even convert the CNTs into VFG. Therefore, by combining with the catalyst separation method, specific or multi-layered structural NCMs can be obtained by PECVD only by changing the intensity of Ar + ion bombardment, and these special NCMs are promising in many fields.

  3. Spatial features register: toward standardization of spatial features

    USGS Publications Warehouse

    Cascio, Janette

    1994-01-01

    As the need to share spatial data increases, more than agreement on a common format is needed to ensure that the data is meaningful to both the importer and the exporter. Effective data transfer also requires common definitions of spatial features. To achieve this, part 2 of the Spatial Data Transfer Standard (SDTS) provides a model for a spatial features data content specification and a glossary of features and attributes that fit this model. The model provides a foundation for standardizing spatial features. The glossary now contains only a limited subset of hydrographic and topographic features. For it to be useful, terms and definitions must be included for other categories, such as base cartographic, bathymetric, cadastral, cultural and demographic, geodetic, geologic, ground transportation, international boundaries, soils, vegetation, water, and wetlands, and the set of hydrographic and topographic features must be expanded. This paper will review the philosophy of the SDTS part 2 and the current plans for creating a national spatial features register as one mechanism for maintaining part 2.

  4. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  5. Key facilitators and best practices of hotel-style room service in hospitals.

    PubMed

    Sheehan-Smith, Lisa

    2006-04-01

    This qualitative study sought to identify the features, advantages, and disadvantages of hotel-style room service; the barriers to, and facilitators for, implementing the process; and "best practices." The study took place in four heterogeneous hospitals. Participants included hospital administrators, managers, and room-service employees. Data-collection methods included semi-structured interviews, observations, and document analysis. Common features of hotel-style room service were meal delivery within 30 to 45 minutes, a restaurant-style menu, procedures to feed ineligible patients, tray assembly on demand, scripting, and waitstaff uniforms for room-service employees. The major barrier to implementing room service was obtaining nursing support. The key facilitators were the hospital's service-oriented culture, using a multidisciplinary planning team, engaging nursing departments early in the planning stages, and intense customer-service training of room-service employees. The overwhelming advantage was patients' control over their food choices. The main disadvantage was cost. Initial best practices in hotel-style room service include: (a) taking a multidisciplinary team approach for developing and implementing the process, (b) customer-service training, (c) using a customer-driven menu, (d) wearing waitstaff uniforms, and (e) using carts with airpots for dispensing hot beverages.

  6. KENNEDY SPACE CENTER, FLA. - The Rocket Garden at the KSC Visitor Complex features eight authentic rockets from the past, including a Mercury-Atlas rocket. The garden also features a climb-in Mercury, Gemino and Apollo capsule replicas, seating pods and informative graphic elements.

    NASA Image and Video Library

    2003-07-22

    KENNEDY SPACE CENTER, FLA. - The Rocket Garden at the KSC Visitor Complex features eight authentic rockets from the past, including a Mercury-Atlas rocket. The garden also features a climb-in Mercury, Gemino and Apollo capsule replicas, seating pods and informative graphic elements.

  7. Careful assessment key in managing prostatitis.

    PubMed

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  8. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    NASA Astrophysics Data System (ADS)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  9. Combining Feature Selection and Integration—A Neural Model for MT Motion Selectivity

    PubMed Central

    Beck, Cornelia; Neumann, Heiko

    2011-01-01

    Background The computation of pattern motion in visual area MT based on motion input from area V1 has been investigated in many experiments and models attempting to replicate the main mechanisms. Two different core conceptual approaches were developed to explain the findings. In integrationist models the key mechanism to achieve pattern selectivity is the nonlinear integration of V1 motion activity. In contrast, selectionist models focus on the motion computation at positions with 2D features. Methodology/Principal Findings Recent experiments revealed that neither of the two concepts alone is sufficient to explain all experimental data and that most of the existing models cannot account for the complex behaviour found. MT pattern selectivity changes over time for stimuli like type II plaids from vector average to the direction computed with an intersection of constraint rule or by feature tracking. Also, the spatial arrangement of the stimulus within the receptive field of a MT cell plays a crucial role. We propose a recurrent neural model showing how feature integration and selection can be combined into one common architecture to explain these findings. The key features of the model are the computation of 1D and 2D motion in model area V1 subpopulations that are integrated in model MT cells using feedforward and feedback processing. Our results are also in line with findings concerning the solution of the aperture problem. Conclusions/Significance We propose a new neural model for MT pattern computation and motion disambiguation that is based on a combination of feature selection and integration. The model can explain a range of recent neurophysiological findings including temporally dynamic behaviour. PMID:21814543

  10. Remote health monitoring: predicting outcome success based on contextual features for cardiovascular disease.

    PubMed

    Alshurafa, Nabil; Eastwood, Jo-Ann; Pourhomayoun, Mohammad; Liu, Jason J; Sarrafzadeh, Majid

    2014-01-01

    Current studies have produced a plethora of remote health monitoring (RHM) systems designed to enhance the care of patients with chronic diseases. Many RHM systems are designed to improve patient risk factors for cardiovascular disease, including physiological parameters such as body mass index (BMI) and waist circumference, and lipid profiles such as low density lipoprotein (LDL) and high density lipoprotein (HDL). There are several patient characteristics that could be determining factors for a patient's RHM outcome success, but these characteristics have been largely unidentified. In this paper, we analyze results from an RHM system deployed in a six month Women's Heart Health study of 90 patients, and apply advanced feature selection and machine learning algorithms to identify patients' key baseline contextual features and build effective prediction models that help determine RHM outcome success. We introduce Wanda-CVD, a smartphone-based RHM system designed to help participants with cardiovascular disease risk factors by motivating participants through wireless coaching using feedback and prompts as social support. We analyze key contextual features that secure positive patient outcomes in both physiological parameters and lipid profiles. Results from the Women's Heart Health study show that health threat of heart disease, quality of life, family history, stress factors, social support, and anxiety at baseline all help predict patient RHM outcome success.

  11. Narrative review of yoga intervention clinical trials including weight-related outcomes.

    PubMed

    Rioux, Jennifer Grace; Ritenbaugh, Cheryl

    2013-01-01

    Medical authorities have identified obesity as a causal factor in the development of diabetes, hypertension, and cardiovascular disease (CVD), and more broadly, of metabolic syndrome/insulin resistance syndrome. To provide solutions that can modify this risk factor, researchers need to identify methods of effective risk reduction and primary prevention of obesity. Research on the effectiveness of yoga as a treatment for obesity is limited, and studies vary in overall quality and methodological rigor. This narrative review assessed the quantity and quality of clinical trials of yoga as an intervention for weight loss or as a means of risk reduction or treatment for obesity and diseases in which obesity is a causal factor. This review summarized the studies' research designs and evaluated the efficacy of yoga for weight loss via the current evidence base. The research team evaluated published studies to determine the appropriateness of research designs, comparability of programs' intervention elements, and standardization of outcome measures. The research team's literature search used the key terms yoga and obesity or yoga and weight loss in three primary medical-literature databases (PubMed, PsychInfo, and Web of Science). The study excluded clinical trials with no quantitative obesity related measure. Extracted data included each study's (1) design; (2) setting and population; (3) nature, duration, and frequency of interventions; (4) comparison groups; (5) recruitment strategies; (6) outcome measures; (7) data analysis and presentation; and (8) results and conclusions. The research team developed an overall evaluation parameter to compare disparate trials. The research team reviewed each study to determine its key features, each worth a specified number of points, with a maximum total of 20 points. The features included a study's (1) duration, (2) frequency of yoga practice, (3) intensity of (length of) each practice, (4) number of yogic elements, (5) inclusion of

  12. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  13. Identifying key features of early stressful experiences that produce stress vulnerability and resilience in primates

    PubMed Central

    Parker, Karen J.; Maestripieri, Dario

    2010-01-01

    This article examines the complex role of early stressful experiences in producing both vulnerability and resilience to later stress-related psychopathology in a variety of primate models of human development. Two types of models are reviewed: Parental Separation Models (e.g., isolate-rearing, peer-rearing, parental separations, and stress inoculation) and Maternal Behavior Models (e.g., foraging demands, variation in maternal style, and maternal abuse). Based on empirical evidence, it is argued that early life stress exposure does not increase adult vulnerability to stress-related psychopathology as a linear function, as is generally believed, but instead reflects a quadratic function. Features of early stress exposure including the type, duration, frequency, ecological validity, sensory modality, and developmental timing, within and between species, are identified to better understand how early stressful experiences alter neurobiological systems to produce such diverse developmental outcomes. This article concludes by identifying gaps in our current knowledge, providing directions for future research, and discussing the translational implications of these primate models for human development and psychopathology. PMID:20851145

  14. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  15. Examining key design decisions involved in developing a serious game for child sexual abuse prevention.

    PubMed

    Stieler-Hunt, Colleen; Jones, Christian M; Rolfe, Ben; Pozzebon, Kay

    2014-01-01

    This paper presents a case study of the key decisions made in the design of Orbit, a child sexual abuse prevention computer game targeted at school students between 8 and 10 years of age. Key decisions include providing supported delivery for the target age group, featuring adults in the program, not over-sanitizing game content, having a focus on building healthy self-concept of players, making the game engaging and relatable for all players and evaluating the program. This case study has implications for the design of Serious Games more generally, including that research should underpin game design decisions, game designers should consider ways of bridging the game to real life, the learning that arises from the game should go beyond rote-learning, designers should consider how the player can make the game-world their own and comprehensive evaluations of Serious Games should be undertaken.

  16. Examining key design decisions involved in developing a serious game for child sexual abuse prevention

    PubMed Central

    Stieler-Hunt, Colleen; Jones, Christian M.; Rolfe, Ben; Pozzebon, Kay

    2014-01-01

    This paper presents a case study of the key decisions made in the design of Orbit, a child sexual abuse prevention computer game targeted at school students between 8 and 10 years of age. Key decisions include providing supported delivery for the target age group, featuring adults in the program, not over-sanitizing game content, having a focus on building healthy self-concept of players, making the game engaging and relatable for all players and evaluating the program. This case study has implications for the design of Serious Games more generally, including that research should underpin game design decisions, game designers should consider ways of bridging the game to real life, the learning that arises from the game should go beyond rote-learning, designers should consider how the player can make the game-world their own and comprehensive evaluations of Serious Games should be undertaken. PMID:24550880

  17. Key lessons for designing health literacy professional development courses.

    PubMed

    Naccarella, Lucio; Murphy, Bernice

    2018-02-01

    Health literacy courses for health professionals have emerged in response to health professionals' perceived lack of understanding of health literacy issues, and their failure to routinely adopt health literacy practices. Since 2013 in Victoria, Australia, the Centre for Culture, Ethnicity and Health has delivered an annual health literacy demonstration training course that it developed. Course development and delivery partners included HealthWest Partnership and cohealth. The courses are designed to develop the health literacy knowledge, skills and organisational capacity of the health and community services sector in the western metropolitan region of Melbourne. This study presents key learnings from evaluation data from three health literacy courses using Wenger's professional educational learning design framework. The framework has three educational learning architecture components (engagement, imagination and alignment) and four educational learning architecture dimensions (participation, emergent, local/global, identification). Participatory realist evaluation approaches and qualitative methods were used. The evaluations revealed that the health literacy courses are developing leadership in health literacy, building partnerships among course participants, developing health literacy workforce knowledge and skills, developing ways to use and apply health literacy resources and are serving as a catalyst for building organisational infrastructure. Although the courses were not explicitly developed or implemented using Wenger's educational learning design pedagogic features, the course structure (i.e. facilitation role of course coordinators, providing safe learning environments, encouraging small group work amongst participants, requiring participants to conduct mini-projects and sponsor organisation buy-in) provided opportunities for engagement, imagination and alignment. Wenger's educational learning design framework can inform the design of future key

  18. Ocean Commission Report Includes Key Recommendations for Science and Governance

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2004-05-01

    The preliminary report of the U.S. Commission on Ocean Policy, released on 20 April, calls for ecosystem-based management of the oceans, dramatically restructuring federal governance oversight of ocean issues, and doubling the federal ocean and coastal research budget over the next five years to $1.3 billion per year. The report by the congressionally-mandated and presidentially-appointed commission includes nearly 200 recommendations for establishing a coordinated and comprehensive national ocean policy framework.

  19. A giant sediment trap in the Florida keys

    USGS Publications Warehouse

    Shinn, E.A.; Reich, C.D.; Locker, S.D.; Hine, A.C.

    1996-01-01

    Aerial photography, high-resolution seismic profiling, coring and jet probing have revealed a large sediment-filled sinkhole in the Key Largo National Marine Sanctuary off Key Largo, Florida. The 600-m-diameter feature straddles coral reef and carbonate-sand facies and contains >55 m of marine lime sand and aragonite mud. Bulk 14C age determinations of mud from a 30- m sediment core indicate infilling rates exceeding 20 m/ka between 3 and 5.6 ka. The total thickness and nature of the sediment near the base of the sinkhole are not known.

  20. Updated Mars Mission Architectures Featuring Nuclear Thermal Propulsion

    NASA Technical Reports Server (NTRS)

    Rodriguez, Mitchell A.; Percy, Thomas K.

    2017-01-01

    Nuclear thermal propulsion (NTP) can potentially enable routine human exploration of Mars and the solar system. By using nuclear fission instead of a chemical combustion process, and using hydrogen as the propellant, NTP systems promise rocket efficiencies roughly twice that of the best chemical rocket engines currently available. The most recent major Mars architecture study featuring NTP was the Design Reference Architecture 5.0 (DRA 5.0), performed in 2009. Currently, the predominant transportation options being considered are solar electric propulsion (SEP) and chemical propulsion; however, given NTP's capabilities, an updated architectural analysis is needed. This paper provides a top-level overview of several different architectures featuring updated NTP performance data. New architectures presented include a proposed update to the DRA 5.0 as well as an investigation of architectures based on the current Evolvable Mars Campaign, which is the focus of NASA's current analyses for the Journey to Mars. Architectures investigated leverage the latest information relating to NTP performance and design considerations and address new support elements not available at the time of DRA 5.0, most notably the Orion crew module and the Space Launch System (SLS). The paper provides a top level quantitative comparison of key performance metrics as well as a qualitative discussion of improvements and key challenges still to be addressed. Preliminary results indicate that the updated NTP architectures can significantly reduce the campaign mass and subsequently the costs for assembly and number of launches.

  1. The Geology of the Florida Keys.

    ERIC Educational Resources Information Center

    Shinn, Eugene A.

    1988-01-01

    Describes some of the ancient geologic history of the Florida Keys from Key Largo to Key West including the effects of glaciers, sea level rise, reef distribution, spurs and grooves, backstepping and ecological zonation, growth rates and erosion. Predicts future changes in this area. (CW)

  2. The feature-weighted receptive field: an interpretable encoding model for complex feature spaces.

    PubMed

    St-Yves, Ghislain; Naselaris, Thomas

    2017-06-20

    We introduce the feature-weighted receptive field (fwRF), an encoding model designed to balance expressiveness, interpretability and scalability. The fwRF is organized around the notion of a feature map-a transformation of visual stimuli into visual features that preserves the topology of visual space (but not necessarily the native resolution of the stimulus). The key assumption of the fwRF model is that activity in each voxel encodes variation in a spatially localized region across multiple feature maps. This region is fixed for all feature maps; however, the contribution of each feature map to voxel activity is weighted. Thus, the model has two separable sets of parameters: "where" parameters that characterize the location and extent of pooling over visual features, and "what" parameters that characterize tuning to visual features. The "where" parameters are analogous to classical receptive fields, while "what" parameters are analogous to classical tuning functions. By treating these as separable parameters, the fwRF model complexity is independent of the resolution of the underlying feature maps. This makes it possible to estimate models with thousands of high-resolution feature maps from relatively small amounts of data. Once a fwRF model has been estimated from data, spatial pooling and feature tuning can be read-off directly with no (or very little) additional post-processing or in-silico experimentation. We describe an optimization algorithm for estimating fwRF models from data acquired during standard visual neuroimaging experiments. We then demonstrate the model's application to two distinct sets of features: Gabor wavelets and features supplied by a deep convolutional neural network. We show that when Gabor feature maps are used, the fwRF model recovers receptive fields and spatial frequency tuning functions consistent with known organizational principles of the visual cortex. We also show that a fwRF model can be used to regress entire deep

  3. LC-IMS-MS Feature Finder

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2013-03-07

    LC-IMS-MS Feature Finder is a command line software application which searches for possible molecular ion signatures in multidimensional liquid chromatography, ion mobility spectrometry, and mass spectrometry data by clustering deisotoped peaks with similar monoisotopic mass values, charge states, elution times, and drift times. The software application includes an algorithm for detecting multiple conformations and co-eluting species in the ion mobility dimension. LC-IMS-MS Feature Finder is designed to create an output file with detected features that includes associated information about the detected features.

  4. Putative Indigenous Carbon-Bearing Alteration Features in Martian Meteorite Yamato 000593

    PubMed Central

    Gibson, Everett K.; Thomas-Keprta, Kathie L.; Clemett, Simon J.; McKay, David S.

    2014-01-01

    Abstract We report the first observation of indigenous carbonaceous matter in the martian meteorite Yamato 000593. The carbonaceous phases are heterogeneously distributed within secondary iddingsite alteration veins and present in a range of morphologies including areas composed of carbon-rich spheroidal assemblages encased in multiple layers of iddingsite. We also observed microtubular features emanating from iddingsite veins penetrating into the host olivine comparable in shape to those interpreted to have formed by bioerosion in terrestrial basalts. Key Words: Meteorite—Yamato 000593—Mars—Carbon. Astrobiology 14, 170–181. PMID:24552234

  5. Tip Characterization Method using Multi-feature Characterizer for CD-AFM

    PubMed Central

    Orji, Ndubuisi G.; Itoh, Hiroshi; Wang, Chumei; Dixson, Ronald G.; Walecki, Peter S.; Schmidt, Sebastian W.; Irmer, Bernd

    2016-01-01

    In atomic force microscopy (AFM) metrology, the tip is a key source of uncertainty. Images taken with an AFM show a change in feature width and shape that depends on tip geometry. This geometric dilation is more pronounced when measuring features with high aspect ratios, and makes it difficult to obtain absolute dimensions. In order to accurately measure nanoscale features using an AFM, the tip dimensions should be known with a high degree of precision. We evaluate a new AFM tip characterizer, and apply it to critical dimension AFM (CD-AFM) tips used for high aspect ratio features. The characterizer is made up of comb-shaped lines and spaces, and includes a series of gratings that could be used as an integrated nanoscale length reference. We also demonstrate a simulation method that could be used to specify what range of tip sizes and shapes the characterizer can measure. Our experiments show that for non re-entrant features, the results obtained with this characterizer are consistent to 1 nm with the results obtained by using widely accepted but slower methods that are common practice in CD-AFM metrology. A validation of the integrated length standard using displacement interferometry indicates a uniformity of better than 0.75%, suggesting that the sample could be used as highly accurate and SI traceable lateral scale for the whole evaluation process. PMID:26720439

  6. Feature Extraction for Track Section Status Classification Based on UGW Signals

    PubMed Central

    Yang, Yuan; Shi, Lin

    2018-01-01

    Track status classification is essential for the stability and safety of railway operations nowadays, when railway networks are becoming more and more complex and broad. In this situation, monitoring systems are already a key element in applications dedicated to evaluating the status of a certain track section, often determining whether it is free or occupied by a train. Different technologies have already been involved in the design of monitoring systems, including ultrasonic guided waves (UGW). This work proposes the use of the UGW signals captured by a track monitoring system to extract the features that are relevant for determining the corresponding track section status. For that purpose, three features of UGW signals have been considered: the root mean square value, the energy, and the main frequency components. Experimental results successfully validated how these features can be used to classify the track section status into free, occupied and broken. Furthermore, spatial and temporal dependencies among these features were analysed in order to show how they can improve the final classification performance. Finally, a preliminary high-level classification system based on deep learning networks has been envisaged for future works. PMID:29673156

  7. JCE Feature Columns

    NASA Astrophysics Data System (ADS)

    Holmes, Jon L.

    1999-05-01

    The Features area of JCE Online is now readily accessible through a single click from our home page. In the Features area each column is linked to its own home page. These column home pages also have links to them from the online Journal Table of Contents pages or from any article published as part of that feature column. Using these links you can easily find abstracts of additional articles that are related by topic. Of course, JCE Online+ subscribers are then just one click away from the entire article. Finding related articles is easy because each feature column "site" contains links to the online abstracts of all the articles that have appeared in the column. In addition, you can find the mission statement for the column and the email link to the column editor that I mentioned above. At the discretion of its editor, a feature column site may contain additional resources. As an example, the Chemical Information Instructor column edited by Arleen Somerville will have a periodically updated bibliography of resources for teaching and using chemical information. Due to the increase in the number of these resources available on the WWW, it only makes sense to publish this information online so that you can get to these resources with a simple click of the mouse. We expect that there will soon be additional information and resources at several other feature column sites. Following in the footsteps of the Chemical Information Instructor, up-to-date bibliographies and links to related online resources can be made available. We hope to extend the online component of our feature columns with moderated online discussion forums. If you have a suggestion for an online resource you would like to see included, let the feature editor or JCE Online (jceonline@chem.wisc.edu) know about it. JCE Internet Features JCE Internet also has several feature columns: Chemical Education Resource Shelf, Conceptual Questions and Challenge Problems, Equipment Buyers Guide, Hal's Picks, Mathcad

  8. Image feature extraction based on the camouflage effectiveness evaluation

    NASA Astrophysics Data System (ADS)

    Yuan, Xin; Lv, Xuliang; Li, Ling; Wang, Xinzhu; Zhang, Zhi

    2018-04-01

    The key step of camouflage effectiveness evaluation is how to combine the human visual physiological features, psychological features to select effectively evaluation indexes. Based on the predecessors' camo comprehensive evaluation method, this paper chooses the suitable indexes combining with the image quality awareness, and optimizes those indexes combining with human subjective perception. Thus, it perfects the theory of index extraction.

  9. Classification of focal liver lesions on ultrasound images by extracting hybrid textural features and using an artificial neural network.

    PubMed

    Hwang, Yoo Na; Lee, Ju Hwan; Kim, Ga Young; Jiang, Yuan Yuan; Kim, Sung Min

    2015-01-01

    This paper focuses on the improvement of the diagnostic accuracy of focal liver lesions by quantifying the key features of cysts, hemangiomas, and malignant lesions on ultrasound images. The focal liver lesions were divided into 29 cysts, 37 hemangiomas, and 33 malignancies. A total of 42 hybrid textural features that composed of 5 first order statistics, 18 gray level co-occurrence matrices, 18 Law's, and echogenicity were extracted. A total of 29 key features that were selected by principal component analysis were used as a set of inputs for a feed-forward neural network. For each lesion, the performance of the diagnosis was evaluated by using the positive predictive value, negative predictive value, sensitivity, specificity, and accuracy. The results of the experiment indicate that the proposed method exhibits great performance, a high diagnosis accuracy of over 96% among all focal liver lesion groups (cyst vs. hemangioma, cyst vs. malignant, and hemangioma vs. malignant) on ultrasound images. The accuracy was slightly increased when echogenicity was included in the optimal feature set. These results indicate that it is possible for the proposed method to be applied clinically.

  10. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  11. New maps, new information: Coral reefs of the Florida keys

    USGS Publications Warehouse

    Lidz, B.H.; Reich, C.D.; Peterson, R.L.; Shinn, E.A.

    2006-01-01

    A highly detailed digitized map depicts 22 benthic habitats in 3140.5 km2 of the Florida Keys National Marine Sanctuary. Dominant are a seagrass/lime-mud zone (map area 27.5%) throughout Hawk Channel and seagrass/carbonate-sand (18.7%) and bare carbonate-sand (17.3%) zones on the outer shelf and in The Quicksands. A lime-mud/seagrass-covered muddy carbonate-sand zone (9.6%) abuts the keys. Hardbottom communities (13.2%) consist of bare Pleistocene coralline and oolitic limestone, coral rubble, and senile coral reefs. Smaller terrestrial (4.0%) and marine habitats, including those of live coral (patch reefs, 0.7%), account for the rest (13.7%) of the area. Derived from aerial photomosaics, the seabed dataset fits precisely when transposed onto a newly developed National Geophysical Data Center hydrographic-bathymetry map. Combined, the maps point to new information on unstudied seabed morphologies, among them an erosional nearshore rock ledge bordering the seaward side of the Florida Keys and thousands of patch-reef clusters aligned in mid-Hawk Channel. Preliminary indications are that the ledge may represent the seaward extent of the 125-ka Key Largo and Miami Limestone that form the keys, and the patch reefs colonized landward edges of two noncoralline, non-dune-ridge topographic troughs. The troughs, their substrate, and inner-shelf location along the seaward side of the Hawk Channel bedrock depression are the first of that type of nuclei to be recognized in the Florida reef record. Together, the map datasets establish the efficacy and accuracy of using aerial photographs to define in extraordinary detail the seabed features and habitats in a shallow-reef setting.

  12. Keys and seats: Spatial response coding underlying the joint spatial compatibility effect.

    PubMed

    Dittrich, Kerstin; Dolk, Thomas; Rothe-Wulf, Annelie; Klauer, Karl Christoph; Prinz, Wolfgang

    2013-11-01

    Spatial compatibility effects (SCEs) are typically observed when participants have to execute spatially defined responses to nonspatial stimulus features (e.g., the color red or green) that randomly appear to the left and the right. Whereas a spatial correspondence of stimulus and response features facilitates response execution, a noncorrespondence impairs task performance. Interestingly, the SCE is drastically reduced when a single participant responds to one stimulus feature (e.g., green) by operating only one response key (individual go/no-go task), whereas a full-blown SCE is observed when the task is distributed between two participants (joint go/no-go task). This joint SCE (a.k.a. the social Simon effect) has previously been explained by action/task co-representation, whereas alternative accounts ascribe joint SCEs to spatial components inherent in joint go/no-go tasks that allow participants to code their responses spatially. Although increasing evidence supports the idea that spatial rather than social aspects are responsible for joint SCEs emerging, it is still unclear to which component(s) the spatial coding refers to: the spatial orientation of response keys, the spatial orientation of responding agents, or both. By varying the spatial orientation of the responding agents (Exp. 1) and of the response keys (Exp. 2), independent of the spatial orientation of the stimuli, in the present study we found joint SCEs only when both the seating and the response key alignment matched the stimulus alignment. These results provide evidence that spatial response coding refers not only to the response key arrangement, but also to the-often neglected-spatial orientation of the responding agents.

  13. Captured key electrical safety lockout system

    DOEpatents

    Darimont, Daniel E.

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  14. Captured key electrical safety lockout system

    DOEpatents

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  15. Automatic extraction of planetary image features

    NASA Technical Reports Server (NTRS)

    LeMoigne-Stewart, Jacqueline J. (Inventor); Troglio, Giulia (Inventor); Benediktsson, Jon A. (Inventor); Serpico, Sebastiano B. (Inventor); Moser, Gabriele (Inventor)

    2013-01-01

    A method for the extraction of Lunar data and/or planetary features is provided. The feature extraction method can include one or more image processing techniques, including, but not limited to, a watershed segmentation and/or the generalized Hough Transform. According to some embodiments, the feature extraction method can include extracting features, such as, small rocks. According to some embodiments, small rocks can be extracted by applying a watershed segmentation algorithm to the Canny gradient. According to some embodiments, applying a watershed segmentation algorithm to the Canny gradient can allow regions that appear as close contours in the gradient to be segmented.

  16. SVGenes: a library for rendering genomic features in scalable vector graphic format.

    PubMed

    Etherington, Graham J; MacLean, Daniel

    2013-08-01

    Drawing genomic features in attractive and informative ways is a key task in visualization of genomics data. Scalable Vector Graphics (SVG) format is a modern and flexible open standard that provides advanced features including modular graphic design, advanced web interactivity and animation within a suitable client. SVGs do not suffer from loss of image quality on re-scaling and provide the ability to edit individual elements of a graphic on the whole object level independent of the whole image. These features make SVG a potentially useful format for the preparation of publication quality figures including genomic objects such as genes or sequencing coverage and for web applications that require rich user-interaction with the graphical elements. SVGenes is a Ruby-language library that uses SVG primitives to render typical genomic glyphs through a simple and flexible Ruby interface. The library implements a simple Page object that spaces and contains horizontal Track objects that in turn style, colour and positions features within them. Tracks are the level at which visual information is supplied providing the full styling capability of the SVG standard. Genomic entities like genes, transcripts and histograms are modelled in Glyph objects that are attached to a track and take advantage of SVG primitives to render the genomic features in a track as any of a selection of defined glyphs. The feature model within SVGenes is simple but flexible and not dependent on particular existing gene feature formats meaning graphics for any existing datasets can easily be created without need for conversion. The library is provided as a Ruby Gem from https://rubygems.org/gems/bio-svgenes under the MIT license, and open source code is available at https://github.com/danmaclean/bioruby-svgenes also under the MIT License. dan.maclean@tsl.ac.uk.

  17. Complex Topographic Feature Ontology Patterns

    USGS Publications Warehouse

    Varanka, Dalia E.; Jerris, Thomas J.

    2015-01-01

    Semantic ontologies are examined as effective data models for the representation of complex topographic feature types. Complex feature types are viewed as integrated relations between basic features for a basic purpose. In the context of topographic science, such component assemblages are supported by resource systems and found on the local landscape. Ontologies are organized within six thematic modules of a domain ontology called Topography that includes within its sphere basic feature types, resource systems, and landscape types. Context is constructed not only as a spatial and temporal setting, but a setting also based on environmental processes. Types of spatial relations that exist between components include location, generative processes, and description. An example is offered in a complex feature type ‘mine.’ The identification and extraction of complex feature types are an area for future research.

  18. Attentional Selection of Feature Conjunctions Is Accomplished by Parallel and Independent Selection of Single Features.

    PubMed

    Andersen, Søren K; Müller, Matthias M; Hillyard, Steven A

    2015-07-08

    features separately. This result is key to understanding attentional selection in complex (natural) scenes, where relevant stimuli are likely to be defined by a combination of stimulus features. Copyright © 2015 the authors 0270-6474/15/359912-08$15.00/0.

  19. Provably secure and high-rate quantum key distribution with time-bin qudits

    PubMed Central

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2017-01-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028

  20. Provably secure and high-rate quantum key distribution with time-bin qudits.

    PubMed

    Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J

    2017-11-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.

  1. Key aspects of the biology of snail-killing Sciomyzidae flies.

    PubMed

    Murphy, William L; Knutson, Lloyd V; Chapman, Eric G; Mc Donnell, Rory J; Williams, Christopher D; Foote, Benjamin A; Vala, Jean-Claude

    2012-01-01

    The biology of snail-killing flies (Diptera: Sciomyzidae) has been studied intensively over the past half-century, especially over the past decade. Today, sciomyzids are biologically the best-known group of higher Diptera. The overarching research objectives are evaluation of sciomyzids as biocontrols of disease-carrying or agriculturally important snails and slugs and as a paradigm group for the study of the evolution of diverse feeding and associated behaviors in flies. We present reviews and analyses of some key features of particular scientific and societal interest, including behavioral and phenological groups; laboratory experimental studies on behavior and development; population biology, bioindicators, ecosystem service provision, and conservation; phylogenetics, molecular studies, and evolutionary biology; and biocontrol. Copyright © 2012 by Annual Reviews. All rights reserved.

  2. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    PubMed

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  3. A Novel Real-Time Reference Key Frame Scan Matching Method

    PubMed Central

    Mohamed, Haytham; Moussa, Adel; Elhabiby, Mohamed; El-Sheimy, Naser; Sesay, Abu

    2017-01-01

    Unmanned aerial vehicles represent an effective technology for indoor search and rescue operations. Typically, most indoor missions’ environments would be unknown, unstructured, and/or dynamic. Navigation of UAVs in such environments is addressed by simultaneous localization and mapping approach using either local or global approaches. Both approaches suffer from accumulated errors and high processing time due to the iterative nature of the scan matching method. Moreover, point-to-point scan matching is prone to outlier association processes. This paper proposes a low-cost novel method for 2D real-time scan matching based on a reference key frame (RKF). RKF is a hybrid scan matching technique comprised of feature-to-feature and point-to-point approaches. This algorithm aims at mitigating errors accumulation using the key frame technique, which is inspired from video streaming broadcast process. The algorithm depends on the iterative closest point algorithm during the lack of linear features which is typically exhibited in unstructured environments. The algorithm switches back to the RKF once linear features are detected. To validate and evaluate the algorithm, the mapping performance and time consumption are compared with various algorithms in static and dynamic environments. The performance of the algorithm exhibits promising navigational, mapping results and very short computational time, that indicates the potential use of the new algorithm with real-time systems. PMID:28481285

  4. A Novel Real-Time Reference Key Frame Scan Matching Method.

    PubMed

    Mohamed, Haytham; Moussa, Adel; Elhabiby, Mohamed; El-Sheimy, Naser; Sesay, Abu

    2017-05-07

    Unmanned aerial vehicles represent an effective technology for indoor search and rescue operations. Typically, most indoor missions' environments would be unknown, unstructured, and/or dynamic. Navigation of UAVs in such environments is addressed by simultaneous localization and mapping approach using either local or global approaches. Both approaches suffer from accumulated errors and high processing time due to the iterative nature of the scan matching method. Moreover, point-to-point scan matching is prone to outlier association processes. This paper proposes a low-cost novel method for 2D real-time scan matching based on a reference key frame (RKF). RKF is a hybrid scan matching technique comprised of feature-to-feature and point-to-point approaches. This algorithm aims at mitigating errors accumulation using the key frame technique, which is inspired from video streaming broadcast process. The algorithm depends on the iterative closest point algorithm during the lack of linear features which is typically exhibited in unstructured environments. The algorithm switches back to the RKF once linear features are detected. To validate and evaluate the algorithm, the mapping performance and time consumption are compared with various algorithms in static and dynamic environments. The performance of the algorithm exhibits promising navigational, mapping results and very short computational time, that indicates the potential use of the new algorithm with real-time systems.

  5. Ecological Understanding 2: Transformation--A Key to Ecological Understanding.

    ERIC Educational Resources Information Center

    Carlsson, Britta

    2002-01-01

    Describes the structure and general features of the phenomenon of ecological understanding. Presents qualitatively different ways of experiencing cycling of matter and the flow of energy in the context of ecosystems. The idea of transformation is key to the development of ecological understanding. (Contains 17 references.) (Author/YDS)

  6. Experimental quantum key distribution with source flaws

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  7. Feature Binding in Visual Working Memory Evaluated by Type Identification Paradigm

    ERIC Educational Resources Information Center

    Saiki, Jun; Miyatsuji, Hirofumi

    2007-01-01

    Memory for feature binding comprises a key ingredient in coherent object representations. Previous studies have been equivocal about human capacity for objects in the visual working memory. To evaluate memory for feature binding, a type identification paradigm was devised and used with a multiple-object permanence tracking task. Using objects…

  8. For Dr. Nancy Snyderman's Parents, Staying Close to Family Is Key

    MedlinePlus

    ... Issues Feature: Senior Living For Dr. Nancy Snyderman's Parents, Staying Close to Family Is Key Past Issues / ... home. "Watching my children grow closer to my parents has been a blessing, and having us nearby ...

  9. Osteonic organization of limb bones in mammals, including humans, and birds: a preliminary study.

    PubMed

    Castrogiovanni, Paola; Imbesi, Rosa; Fisichella, Marco; Mazzone, Venera

    2011-01-01

    As it is well known, bone tissue is characterized by a calcified extracellular matrix which makes this tissue suitable to support the body and protect the inner organs. Lamellar bone tissue is organized in lamellae, 3-7 microm in thickness, and arranged concentrically around vascular channels: the basic structure in this type of organization is called Haversian system or osteon and the diameter of osteons depends on the number of lamellae. Shape and regional density of osteons are related to the bone segment and the specific functional requirements to meet. Aim of this study is to correlate the compact bone tissue microstructure in various classes of mammals, including humans, and birds in order to find an adequate identification key. The results of our study show that in bone tissue samples from various classes of mammals, including humans, and birds the osteonic structure shows peculiar features, often depending on the rate of bone remodelling, different in different animal species. We conclude that a careful microscopic analysis of bone tissue and the characterization of distinctive osteonic features could give a major contribution to forensic medicine to obtain a more reliable recognition of bone findings.

  10. Key Practices of the Capability Maturity Model, Version 1.1

    DTIC Science & Technology

    1993-02-01

    0-W31 4 Interpreting the CMM ............................................................ 0-35 4.1 Interpreting the Key...Practices............................................. 0-35 4.2 Interpreting the Common Features ..................................... 0-w35 4.2.1...4.2.5 Verifying Implementation ....................................... 0-47 4.3 Interpreting Software Process Definition

  11. Clinical and cytogenetic features of a Potocki-Lupski syndrome with the shortest 0.25Mb microduplication in 17p11.2 including RAI1.

    PubMed

    Lee, Cha Gon; Park, Sang-Jin; Yim, Shin-Young; Sohn, Young Bae

    2013-08-01

    Potocki-Lupski syndrome (PTLS [MIM 610883]) is a recently recognized microduplication syndrome associated with 17p11.2. It is characterized by mild facial dysmorphic features, hypermetropia, infantile hypotonia, failure to thrive, mental retardation, autistic spectrum disorders, behavioral abnormalities, sleep apnea, and cardiovascular anomalies. In several studies, the critical PTLS region was deduced to be 1.3Mb in length, and included RAI1 and 17 other genes. We report a 3-year-old Korean boy with the smallest duplication in 17p11.2 and a milder phenotype. He had no family history of neurologic disease or developmental delay and no history of seizure, autistic features, or behavior problems. He showed subtle facial dysmorphic features (dolichocephaly and a mildly asymmetric smile) and flat feet. All laboratory tests were normal and he had no evidence of internal organ anomalies. He was found to have mild intellectual disabilities (full scale IQ 65 on K-WPPSI) and language developmental delay (age of 2.2year-old on PRESS). Array comparative genomic hybridization (CGH) showed about a 0.25Mb microduplication on chromosome 17p11.2 containing four Refseq (NCBI reference sequence) genes, including RAI1 [arr 17p11.2(17,575,978-17,824,623)×3]. When compared with previously reported cases, the milder phenotype of our patient may be associated with the smallest duplication in 17p11.2, 0.25Mb in length. Copyright © 2012 The Japanese Society of Child Neurology. Published by Elsevier B.V. All rights reserved.

  12. District-Wide Involvement: The Key to Successful School Improvement.

    ERIC Educational Resources Information Center

    Mundell, Scott; Babich, George

    1989-01-01

    Describes the self-study process used by the Marana Unified School District to meet accreditation requirements with minimal expense, to emphasize curriculum development, and to improve the school. Considers the key feature of the cyclical review model to be the personal involvement of nearly every faculty member in the 10-school district. (DMM)

  13. [Elucidation of key genes in sex determination in genetics teaching].

    PubMed

    Li, Meng; He, Zhumei

    2014-06-01

    Sex is an important and complex feature of organisms, which is controlled by the genetic and environmental factors. The genetic factors, i.e., genes, are vital in sex determination. However, not all the related genes play the same roles, and some key genes play a vital role in the sex determination and differentiation. With the development of the modern genetics, a great progress on the key genes has been made in sex determination. In this review, we summarize the mechanism of sex determination and the strategy of how to study the key genes in sex determination. It will help us to understand the mechanism of sex determination better in the teaching of genetics.

  14. Evaluation of features to support safety and quality in general practice clinical software

    PubMed Central

    2011-01-01

    Background Electronic prescribing is now the norm in many countries. We wished to find out if clinical software systems used by general practitioners in Australia include features (functional capabilities and other characteristics) that facilitate improved patient safety and care, with a focus on quality use of medicines. Methods Seven clinical software systems used in general practice were evaluated. Fifty software features that were previously rated as likely to have a high impact on safety and/or quality of care in general practice were tested and are reported here. Results The range of results for the implementation of 50 features across the 7 clinical software systems was as follows: 17-31 features (34-62%) were fully implemented, 9-13 (18-26%) partially implemented, and 9-20 (18-40%) not implemented. Key findings included: Access to evidence based drug and therapeutic information was limited. Decision support for prescribing was available but varied markedly between systems. During prescribing there was potential for medicine mis-selection in some systems, and linking a medicine with its indication was optional. The definition of 'current medicines' versus 'past medicines' was not always clear. There were limited resources for patients, and some medicines lists for patients were suboptimal. Results were provided to the software vendors, who were keen to improve their systems. Conclusions The clinical systems tested lack some of the features expected to support patient safety and quality of care. Standards and certification for clinical software would ensure that safety features are present and that there is a minimum level of clinical functionality that clinicians could expect to find in any system.

  15. Provably secure and high-rate quantum key distribution with time-bin qudits

    DOE PAGES

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...

    2017-11-24

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  16. Provably secure and high-rate quantum key distribution with time-bin qudits

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  17. Key features of wave energy.

    PubMed

    Rainey, R C T

    2012-01-28

    For a weak point source or dipole, or a small body operating as either, we show that the power from a wave energy converter (WEC) is the product of the particle velocity in the waves, and the wave force (suitably defined). There is a thus a strong analogy with a wind or tidal turbine, where the power is the product of the fluid velocity through the turbine, and the force on it. As a first approximation, the cost of a structure is controlled by the force it has to carry, which governs its strength, and the distance it has to be carried, which governs its size. Thus, WECs are at a disadvantage compared with wind and tidal turbines because the fluid velocities are lower, and hence the forces are higher. On the other hand, the distances involved are lower. As with turbines, the implication is also that a WEC must make the most of its force-carrying ability-ideally, to carry its maximum force all the time, the '100% sweating WEC'. It must be able to limit the wave force on it in larger waves, ultimately becoming near-transparent to them in the survival condition-just like a turbine in extreme conditions, which can stop and feather its blades. A turbine of any force rating can achieve its maximum force in low wind speeds, if its diameter is sufficiently large. This is not possible with a simple monopole or dipole WEC, however, because of the 'nλ/2π' capture width limits. To achieve reasonable 'sweating' in typical wave climates, the force is limited to about 1 MN for a monopole device, or 2 MN for a dipole. The conclusion is that the future of wave energy is in devices that are not simple monopoles or dipoles, but multi-body devices or other shapes equivalent to arrays.

  18. Osteopoikilosis, short stature and mental retardation as key features of a new microdeletion syndrome on 12q14.

    PubMed

    Menten, Björn; Buysse, Karen; Zahir, Farah; Hellemans, Jan; Hamilton, Sara J; Costa, Teresa; Fagerstrom, Carrie; Anadiotis, George; Kingsbury, Daniel; McGillivray, Barbara C; Marra, Marco A; Friedman, Jan M; Speleman, Frank; Mortier, Geert

    2007-04-01

    This report presents the detection of a heterozygous deletion at chromosome 12q14 in three unrelated patients with a similar phenotype consisting of mild mental retardation, failure to thrive in infancy, proportionate short stature and osteopoikilosis as the most characteristic features. In each case, this interstitial deletion was found using molecular karyotyping. The deletion occurred as a de novo event and varied between 3.44 and 6 megabases (Mb) in size with a 3.44 Mb common deleted region. The deleted interval was not flanked by low-copy repeats or segmental duplications. It contains 13 RefSeq genes, including LEMD3, which was previously shown to be the causal gene for osteopoikilosis. The observation of osteopoikilosis lesions should facilitate recognition of this new microdeletion syndrome among children with failure to thrive, short stature and learning disabilities.

  19. Feature-to-Feature Inference Under Conditions of Cue Restriction and Dimensional Correlation.

    PubMed

    Lancaster, Matthew E; Homa, Donald

    2017-01-01

    The present study explored feature-to-feature and label-to-feature inference in a category task for different category structures. In the correlated condition, each of the 4 dimensions comprising the category was positively correlated to each other and to the category label. In the uncorrelated condition, no correlation existed between the 4 dimensions comprising the category, although the dimension to category label correlation matched that of the correlated condition. After learning, participants made inference judgments of a missing feature, given 1, 2, or 3 feature cues; on half the trials, the category label was also included as a cue. The results showed superior inference of features following training on the correlated structure, with accurate inference when only a single feature was presented. In contrast, a single-feature cue resulted in chance levels of inference for the uncorrelated structure. Feature inference systematically improved with number of cues after training on the correlated structure. Surprisingly, a similar outcome was obtained for the uncorrelated structure, an outcome that must have reflected mediation via the category label. A descriptive model is briefly introduced to explain the results, with a suggestion that this paradigm might be profitably extended to hierarchical structures where the levels of feature-to-feature inference might vary with the depth of the hierarchy.

  20. A Solution to the Cosmic Conundrum including Cosmological Constant and Dark Energy Problems

    NASA Astrophysics Data System (ADS)

    Singh, A.

    2009-12-01

    A comprehensive solution to the cosmic conundrum is presented that also resolves key paradoxes of quantum mechanics and relativity. A simple mathematical model, the Gravity Nullification model (GNM), is proposed that integrates the missing physics of the spontaneous relativistic conversion of mass to energy into the existing physics theories, specifically a simplified general theory of relativity. Mechanistic mathematical expressions are derived for a relativistic universe expansion, which predict both the observed linear Hubble expansion in the nearby universe and the accelerating expansion exhibited by the supernova observations. The integrated model addresses the key questions haunting physics and Big Bang cosmology. It also provides a fresh perspective on the misconceived birth and evolution of the universe, especially the creation and dissolution of matter. The proposed model eliminates singularities from existing models and the need for the incredible and unverifiable assumptions including the superluminous inflation scenario, multiple universes, multiple dimensions, Anthropic principle, and quantum gravity. GNM predicts the observed features of the universe without any explicit consideration of time as a governing parameter.

  1. Feature weight estimation for gene selection: a local hyperlinear learning approach

    PubMed Central

    2014-01-01

    Background Modeling high-dimensional data involving thousands of variables is particularly important for gene expression profiling experiments, nevertheless,it remains a challenging task. One of the challenges is to implement an effective method for selecting a small set of relevant genes, buried in high-dimensional irrelevant noises. RELIEF is a popular and widely used approach for feature selection owing to its low computational cost and high accuracy. However, RELIEF based methods suffer from instability, especially in the presence of noisy and/or high-dimensional outliers. Results We propose an innovative feature weighting algorithm, called LHR, to select informative genes from highly noisy data. LHR is based on RELIEF for feature weighting using classical margin maximization. The key idea of LHR is to estimate the feature weights through local approximation rather than global measurement, which is typically used in existing methods. The weights obtained by our method are very robust in terms of degradation of noisy features, even those with vast dimensions. To demonstrate the performance of our method, extensive experiments involving classification tests have been carried out on both synthetic and real microarray benchmark datasets by combining the proposed technique with standard classifiers, including the support vector machine (SVM), k-nearest neighbor (KNN), hyperplane k-nearest neighbor (HKNN), linear discriminant analysis (LDA) and naive Bayes (NB). Conclusion Experiments on both synthetic and real-world datasets demonstrate the superior performance of the proposed feature selection method combined with supervised learning in three aspects: 1) high classification accuracy, 2) excellent robustness to noise and 3) good stability using to various classification algorithms. PMID:24625071

  2. Metacatalog of Planetary Surface Features for Multicriteria Evaluation of Surface Evolution: the Integrated Planetary Feature Database

    NASA Astrophysics Data System (ADS)

    Hargitai, Henrik

    2016-10-01

    We have created a metacatalog, or catalog or catalogs, of surface features of Mars that also includes the actual data in the catalogs listed. The goal is to make mesoscale surface feature databases available in one place, in a GIS-ready format. The databases can be directly imported to ArcGIS or other GIS platforms, like Google Mars. Some of the catalogs in our database are also ingested into the JMARS platform.All catalogs have been previously published in a peer-reviewed journal, but they may contain updates of the published catalogs. Many of the catalogs are "integrated", i.e. they merge databases or information from various papers on the same topic, including references to each individual features listed.Where available, we have included shapefiles with polygon or linear features, however, most of the catalogs only contain point data of their center points and morphological data.One of the unexpected results of the planetary feature metacatalog is that some features have been described by several papers, using different, i.e., conflicting designations. This shows the need for the development of an identification system suitable for mesoscale (100s m to km sized) features that tracks papers and thus prevents multiple naming of the same feature.The feature database can be used for multicriteria analysis of a terrain, thus enables easy distribution pattern analysis and the correlation of the distribution of different landforms and features on Mars. Such catalog makes a scientific evaluation of potential landing sites easier and more effective during the selection process and also supports automated landing site selections.The catalog is accessible at https://planetarydatabase.wordpress.com/.

  3. Distinguishing obsessive features and worries: the role of thought-action fusion.

    PubMed

    Coles, M E; Mennin, D S; Heimberg, R G

    2001-08-01

    Obsessions are a key feature of obsessive-compulsive disorder (OCD), and chronic worry is the cardinal feature of generalized anxiety disorder (GAD). However, these two cognitive processes are conceptually very similar, and there is a need to determine how they differ. Recent studies have attempted to identify cognitive processes that may be differentially related to obsessive features and worry. In the current study we proposed that (1) obsessive features and worry could be differentiated and that (2) a measure of the cognitive process thought-action fusion would distinguish between obsessive features and worry, being strongly related to obsessive features after controlling for the effects of worry. These hypotheses were supported in a sample of 173 undergraduate students. Thought-action fusion may be a valuable construct in differentiating between obsessive features and worry.

  4. Prediction of active sites of enzymes by maximum relevance minimum redundancy (mRMR) feature selection.

    PubMed

    Gao, Yu-Fei; Li, Bi-Qing; Cai, Yu-Dong; Feng, Kai-Yan; Li, Zhan-Dong; Jiang, Yang

    2013-01-27

    Identification of catalytic residues plays a key role in understanding how enzymes work. Although numerous computational methods have been developed to predict catalytic residues and active sites, the prediction accuracy remains relatively low with high false positives. In this work, we developed a novel predictor based on the Random Forest algorithm (RF) aided by the maximum relevance minimum redundancy (mRMR) method and incremental feature selection (IFS). We incorporated features of physicochemical/biochemical properties, sequence conservation, residual disorder, secondary structure and solvent accessibility to predict active sites of enzymes and achieved an overall accuracy of 0.885687 and MCC of 0.689226 on an independent test dataset. Feature analysis showed that every category of the features except disorder contributed to the identification of active sites. It was also shown via the site-specific feature analysis that the features derived from the active site itself contributed most to the active site determination. Our prediction method may become a useful tool for identifying the active sites and the key features identified by the paper may provide valuable insights into the mechanism of catalysis.

  5. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  6. Hepatic Inflammation and Fibrosis: Functional Links and Key Pathways

    PubMed Central

    Seki, Ekihiro; Schwabe, Robert F.

    2014-01-01

    Inflammation is one of the most characteristic features of chronic liver disease of viral, alcoholic, fatty and autoimmune origin. Inflammation is typically present in all disease stages, and associated with the development of fibrosis, cirrhosis and hepatocellular carcinoma. In the past decade, numerous studies have contributed to improved understanding of the links between hepatic inflammation and fibrosis. Here, we review mechanisms that link inflammation with the development of liver fibrosis, focusing on the role of inflammatory mediators in hepatic stellate cell (HSC) activation and HSC survival during fibrogenesis and fibrosis regression. We will summarize the contributions of different inflammatory cells, including hepatic macrophages, T- and B-lymphocytes, NK cells and platelets, as well as key effectors such as cytokines, chemokines, and damage-associated molecular patterns. Furthermore, we will discuss the relevance of inflammatory signaling pathways for clinical liver disease and for the development of anti-fibrogenic strategies. PMID:25066777

  7. Poly(A) code analyses reveal key determinants for tissue-specific mRNA alternative polyadenylation

    PubMed Central

    Weng, Lingjie; Li, Yi; Xie, Xiaohui; Shi, Yongsheng

    2016-01-01

    mRNA alternative polyadenylation (APA) is a critical mechanism for post-transcriptional gene regulation and is often regulated in a tissue- and/or developmental stage-specific manner. An ultimate goal for the APA field has been to be able to computationally predict APA profiles under different physiological or pathological conditions. As a first step toward this goal, we have assembled a poly(A) code for predicting tissue-specific poly(A) sites (PASs). Based on a compendium of over 600 features that have known or potential roles in PAS selection, we have generated and refined a machine-learning algorithm using multiple high-throughput sequencing-based data sets of tissue-specific and constitutive PASs. This code can predict tissue-specific PASs with >85% accuracy. Importantly, by analyzing the prediction performance based on different RNA features, we found that PAS context, including the distance between alternative PASs and the relative position of a PAS within the gene, is a key feature for determining the susceptibility of a PAS to tissue-specific regulation. Our poly(A) code provides a useful tool for not only predicting tissue-specific APA regulation, but also for studying its underlying molecular mechanisms. PMID:27095026

  8. The AP1000{sup R} nuclear power plant innovative features for extended station blackout mitigation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vereb, F.; Winters, J.; Schulz, T.

    2012-07-01

    Station Blackout (SBO) is defined as 'a condition wherein a nuclear power plant sustains a loss of all offsite electric power system concurrent with turbine trip and unavailability of all onsite emergency alternating current (AC) power system. Station blackout does not include the loss of available AC power to buses fed by station batteries through inverters or by alternate AC sources as defined in this section, nor does it assume a concurrent single failure or design basis accident...' in accordance with Reference 1. In this paper, the innovative features of the AP1000 plant design are described with their operation inmore » the scenario of an extended station blackout event. General operation of the passive safety systems are described as well as the unique features which allow the AP1000 plant to cope for at least 7 days during station blackout. Points of emphasis will include: - Passive safety system operation during SBO - 'Fail-safe' nature of key passive safety system valves; automatically places the valve in a conservatively safe alignment even in case of multiple failures in all power supply systems, including normal AC and battery backup - Passive Spent Fuel Pool cooling and makeup water supply during SBO - Robustness of AP1000 plant due to the location of key systems, structures and components required for Safe Shutdown - Diverse means of supplying makeup water to the Passive Containment Cooling System (PCS) and the Spent Fuel Pool (SFP) through use of an engineered, safety-related piping interface and portable equipment, as well as with permanently installed onsite ancillary equipment. (authors)« less

  9. Compact cancer biomarkers discovery using a swarm intelligence feature selection algorithm.

    PubMed

    Martinez, Emmanuel; Alvarez, Mario Moises; Trevino, Victor

    2010-08-01

    Biomarker discovery is a typical application from functional genomics. Due to the large number of genes studied simultaneously in microarray data, feature selection is a key step. Swarm intelligence has emerged as a solution for the feature selection problem. However, swarm intelligence settings for feature selection fail to select small features subsets. We have proposed a swarm intelligence feature selection algorithm based on the initialization and update of only a subset of particles in the swarm. In this study, we tested our algorithm in 11 microarray datasets for brain, leukemia, lung, prostate, and others. We show that the proposed swarm intelligence algorithm successfully increase the classification accuracy and decrease the number of selected features compared to other swarm intelligence methods. Copyright © 2010 Elsevier Ltd. All rights reserved.

  10. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  11. The Progressive BSSG Rat Model of Parkinson's: Recapitulating Multiple Key Features of the Human Disease

    PubMed Central

    Van Kampen, Jackalina M.; Baranowski, David C.; Robertson, Harold A.; Shaw, Christopher A.; Kay, Denis G.

    2015-01-01

    The development of effective neuroprotective therapies for Parkinson's disease (PD) has been severely hindered by the notable lack of an appropriate animal model for preclinical screening. Indeed, most models currently available are either acute in nature or fail to recapitulate all characteristic features of the disease. Here, we present a novel progressive model of PD, with behavioural and cellular features that closely approximate those observed in patients. Chronic exposure to dietary phytosterol glucosides has been found to be neurotoxic. When fed to rats, β-sitosterol β-d-glucoside (BSSG) triggers the progressive development of parkinsonism, with clinical signs and histopathology beginning to appear following cessation of exposure to the neurotoxic insult and continuing to develop over several months. Here, we characterize the progressive nature of this model, its non-motor features, the anatomical spread of synucleinopathy, and response to levodopa administration. In Sprague Dawley rats, chronic BSSG feeding for 4 months triggered the progressive development of a parkinsonian phenotype and pathological events that evolved slowly over time, with neuronal loss beginning only after toxin exposure was terminated. At approximately 3 months following initiation of BSSG exposure, animals displayed the early emergence of an olfactory deficit, in the absence of significant dopaminergic nigral cell loss or locomotor deficits. Locomotor deficits developed gradually over time, initially appearing as locomotor asymmetry and developing into akinesia/bradykinesia, which was reversed by levodopa treatment. Late-stage cognitive impairment was observed in the form of spatial working memory deficits, as assessed by the radial arm maze. In addition to the progressive loss of TH+ cells in the substantia nigra, the appearance of proteinase K-resistant intracellular α-synuclein aggregates was also observed to develop progressively, appearing first in the olfactory bulb, then

  12. Features of CRISPR-Cas Regulation Key to Highly Efficient and Temporally-Specific crRNA Production.

    PubMed

    Rodic, Andjela; Blagojevic, Bojana; Djordjevic, Magdalena; Severinov, Konstantin; Djordjevic, Marko

    2017-01-01

    Bacterial immune systems, such as CRISPR-Cas or restriction-modification (R-M) systems, affect bacterial pathogenicity and antibiotic resistance by modulating horizontal gene flow. A model system for CRISPR-Cas regulation, the Type I-E system from Escherichia coli , is silent under standard laboratory conditions and experimentally observing the dynamics of CRISPR-Cas activation is challenging. Two characteristic features of CRISPR-Cas regulation in E. coli are cooperative transcription repression of cas gene and CRISPR array promoters, and fast non-specific degradation of full length CRISPR transcripts (pre-crRNA). In this work, we use computational modeling to understand how these features affect the system expression dynamics. Signaling which leads to CRISPR-Cas activation is currently unknown, so to bypass this step, we here propose a conceptual setup for cas expression activation, where cas genes are put under transcription control typical for a restriction-modification (R-M) system and then introduced into a cell. Known transcription regulation of an R-M system is used as a proxy for currently unknown CRISPR-Cas transcription control, as both systems are characterized by high cooperativity, which is likely related to similar dynamical constraints of their function. We find that the two characteristic CRISPR-Cas control features are responsible for its temporally-specific dynamical response, so that the system makes a steep (switch-like) transition from OFF to ON state with a time-delay controlled by pre-crRNA degradation rate. We furthermore find that cooperative transcription regulation qualitatively leads to a cross-over to a regime where, at higher pre-crRNA processing rates, crRNA generation approaches the limit of an infinitely abrupt system induction. We propose that these dynamical properties are associated with rapid expression of CRISPR-Cas components and efficient protection of bacterial cells against foreign DNA. In terms of synthetic applications

  13. External facial features modify the representation of internal facial features in the fusiform face area.

    PubMed

    Axelrod, Vadim; Yovel, Galit

    2010-08-15

    Most studies of face identity have excluded external facial features by either removing them or covering them with a hat. However, external facial features may modify the representation of internal facial features. Here we assessed whether the representation of face identity in the fusiform face area (FFA), which has been primarily studied for internal facial features, is modified by differences in external facial features. We presented faces in which external and internal facial features were manipulated independently. Our findings show that the FFA was sensitive to differences in external facial features, but this effect was significantly larger when the external and internal features were aligned than misaligned. We conclude that the FFA generates a holistic representation in which the internal and the external facial features are integrated. These results indicate that to better understand real-life face recognition both external and internal features should be included. Copyright (c) 2010 Elsevier Inc. All rights reserved.

  14. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  15. Key Elements for Judging the Quality of a Risk Assessment

    PubMed Central

    Fenner-Crisp, Penelope A.; Dellarco, Vicki L.

    2016-01-01

    Background: Many reports have been published that contain recommendations for improving the quality, transparency, and usefulness of decision making for risk assessments prepared by agencies of the U.S. federal government. A substantial measure of consensus has emerged regarding the characteristics that high-quality assessments should possess. Objective: The goal was to summarize the key characteristics of a high-quality assessment as identified in the consensus-building process and to integrate them into a guide for use by decision makers, risk assessors, peer reviewers and other interested stakeholders to determine if an assessment meets the criteria for high quality. Discussion: Most of the features cited in the guide are applicable to any type of assessment, whether it encompasses one, two, or all four phases of the risk-assessment paradigm; whether it is qualitative or quantitative; and whether it is screening level or highly sophisticated and complex. Other features are tailored to specific elements of an assessment. Just as agencies at all levels of government are responsible for determining the effectiveness of their programs, so too should they determine the effectiveness of their assessments used in support of their regulatory decisions. Furthermore, if a nongovernmental entity wishes to have its assessments considered in the governmental regulatory decision-making process, then these assessments should be judged in the same rigorous manner and be held to similar standards. Conclusions: The key characteristics of a high-quality assessment can be summarized and integrated into a guide for judging whether an assessment possesses the desired features of high quality, transparency, and usefulness. Citation: Fenner-Crisp PA, Dellarco VL. 2016. Key elements for judging the quality of a risk assessment. Environ Health Perspect 124:1127–1135; http://dx.doi.org/10.1289/ehp.1510483 PMID:26862984

  16. Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Li, Jun-Lin; Wang, Chuan

    2010-11-01

    A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.

  17. Hypertrophic Osteoarthropathy: Clinical and Imaging Features.

    PubMed

    Yap, Felix Y; Skalski, Matthew R; Patel, Dakshesh B; Schein, Aaron J; White, Eric A; Tomasian, Anderanik; Masih, Sulabha; Matcuk, George R

    2017-01-01

    Hypertrophic osteoarthropathy (HOA) is a medical condition characterized by abnormal proliferation of skin and periosteal tissues involving the extremities and characterized by three clinical features: digital clubbing (also termed Hippocratic fingers), periostosis of tubular bones, and synovial effusions. HOA can be a primary entity, known as pachydermoperiostosis, or can be secondary to extraskeletal conditions, with different prognoses and management implications for each. There is a high association between secondary HOA and malignancy, especially non-small cell lung cancer. In such cases, it can be considered a form of paraneoplastic syndrome. The most prevalent secondary causes of HOA are pulmonary in origin, which is why this condition was formerly referred to as hypertrophic pulmonary osteoarthropathy. HOA can also be associated with pleural, mediastinal, and cardiovascular causes, as well as extrathoracic conditions such as gastrointestinal tumors and infections, cirrhosis, and inflammatory bowel disease. Although the skeletal manifestations of HOA are most commonly detected with radiography, abnormalities can also be identified with other modalities such as computed tomography, magnetic resonance imaging, and bone scintigraphy. The authors summarize the pathogenesis, classification, causes, and symptoms and signs of HOA, including the genetics underlying the primary form (pachydermoperiostosis); describe key findings of HOA found at various imaging modalities, with examples of underlying causative conditions; and discuss features differentiating HOA from other causes of multifocal periostitis, such as thyroid acropachy, hypervitaminosis A, chronic venous insufficiency, voriconazole-induced periostitis, progressive diaphyseal dysplasia, and neoplastic causes such as lymphoma. © RSNA, 2016.

  18. Key Competencies, Assessment and Learning Stories

    ERIC Educational Resources Information Center

    Davis, Keryn; Wright, Jocelyn; Carr, Margaret; Peters, Sally

    2013-01-01

    Developed in response to a strong interest in the use of Learning Stories in schools, this resource is designed to answer some common questions asked by teachers. The assessment of Key Competencies is a topic that deserves a lot of discussion. A Key Competency is complex: it includes social, emotional, cognitive and cultural aspects, and is…

  19. The method for froth floatation condition recognition based on adaptive feature weighted

    NASA Astrophysics Data System (ADS)

    Wang, Jieran; Zhang, Jun; Tian, Jinwen; Zhang, Daimeng; Liu, Xiaomao

    2018-03-01

    The fusion of foam characteristics can play a complementary role in expressing the content of foam image. The weight of foam characteristics is the key to make full use of the relationship between the different features. In this paper, an Adaptive Feature Weighted Method For Froth Floatation Condition Recognition is proposed. Foam features without and with weights are both classified by using support vector machine (SVM).The classification accuracy and optimal equaling algorithm under the each ore grade are regarded as the result of the adaptive feature weighting algorithm. At the same time the effectiveness of adaptive weighted method is demonstrated.

  20. Human action recognition based on spatial-temporal descriptors using key poses

    NASA Astrophysics Data System (ADS)

    Hu, Shuo; Chen, Yuxin; Wang, Huaibao; Zuo, Yaqing

    2014-11-01

    Human action recognition is an important area of pattern recognition today due to its direct application and need in various occasions like surveillance and virtual reality. In this paper, a simple and effective human action recognition method is presented based on the key poses of human silhouette and the spatio-temporal feature. Firstly, the contour points of human silhouette have been gotten, and the key poses are learned by means of K-means clustering based on the Euclidean distance between each contour point and the centre point of the human silhouette, and then the type of each action is labeled for further match. Secondly, we obtain the trajectories of centre point of each frame, and create a spatio-temporal feature value represented by W to describe the motion direction and speed of each action. The value W contains the information of location and temporal order of each point on the trajectories. Finally, the matching stage is performed by comparing the key poses and W between training sequences and test sequences, the nearest neighbor sequences is found and its label supplied the final result. Experiments on the public available Weizmann datasets show the proposed method can improve accuracy by distinguishing amphibious poses and increase suitability for real-time applications by reducing the computational cost.

  1. Interplay of multiple synaptic plasticity features in filamentary memristive devices for neuromorphic computing

    NASA Astrophysics Data System (ADS)

    La Barbera, Selina; Vincent, Adrien F.; Vuillaume, Dominique; Querlioz, Damien; Alibart, Fabien

    2016-12-01

    Bio-inspired computing represents today a major challenge at different levels ranging from material science for the design of innovative devices and circuits to computer science for the understanding of the key features required for processing of natural data. In this paper, we propose a detail analysis of resistive switching dynamics in electrochemical metallization cells for synaptic plasticity implementation. We show how filament stability associated to joule effect during switching can be used to emulate key synaptic features such as short term to long term plasticity transition and spike timing dependent plasticity. Furthermore, an interplay between these different synaptic features is demonstrated for object motion detection in a spike-based neuromorphic circuit. System level simulation presents robust learning and promising synaptic operation paving the way to complex bio-inspired computing systems composed of innovative memory devices.

  2. Desertification treaty includes key role for scientists

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    When Lois Barber, executive director of the non-profit group EarthAction, began efforts to press for U.S. Senate ratification of the United Nations Convention to Combat Desertification several years ago, the treaty's purpose tripped up some people, she said. They wondered whether it might be a treaty related to military personnel who had abandoned their service, de-certification of something or other, or even an overabundance of after-dinner treats. While the issue may not yet rate highly on the U.S. radar screen, U.S. Senate ratification of the Convention to Combat Desertification (CCD) on November 17, 2000 and entry into force of the treaty in the United States on February 2, 2001, could bring additional focus on desertification from the scientific community and policy-makers, according to a number of experts involved with the issue. The treaty now has been ratified by 174 countries.

  3. Conserved and Divergent Features of Human and Mouse Kidney Organogenesis.

    PubMed

    Lindström, Nils O; McMahon, Jill A; Guo, Jinjin; Tran, Tracy; Guo, Qiuyu; Rutledge, Elisabeth; Parvez, Riana K; Saribekyan, Gohar; Schuler, Robert E; Liao, Christopher; Kim, Albert D; Abdelhalim, Ahmed; Ruffins, Seth W; Thornton, Matthew E; Basking, Laurence; Grubbs, Brendan; Kesselman, Carl; McMahon, Andrew P

    2018-03-01

    Human kidney function is underpinned by approximately 1,000,000 nephrons, although the number varies substantially, and low nephron number is linked to disease. Human kidney development initiates around 4 weeks of gestation and ends around 34-37 weeks of gestation. Over this period, a reiterative inductive process establishes the nephron complement. Studies have provided insightful anatomic descriptions of human kidney development, but the limited histologic views are not readily accessible to a broad audience. In this first paper in a series providing comprehensive insight into human kidney formation, we examined human kidney development in 135 anonymously donated human kidney specimens. We documented kidney development at a macroscopic and cellular level through histologic analysis, RNA in situ hybridization, immunofluorescence studies, and transcriptional profiling, contrasting human development (4-23 weeks) with mouse development at selected stages (embryonic day 15.5 and postnatal day 2). The high-resolution histologic interactive atlas of human kidney organogenesis generated can be viewed at the GUDMAP database (www.gudmap.org) together with three-dimensional reconstructions of key components of the data herein. At the anatomic level, human and mouse kidney development differ in timing, scale, and global features such as lobe formation and progenitor niche organization. The data also highlight differences in molecular and cellular features, including the expression and cellular distribution of anchor gene markers used to identify key cell types in mouse kidney studies. These data will facilitate and inform in vitro efforts to generate human kidney structures and comparative functional analyses across mammalian species. Copyright © 2018 by the American Society of Nephrology.

  4. Occupational methaemoglobinaemia. Mechanisms of production, features, diagnosis and management including the use of methylene blue.

    PubMed

    Bradberry, Sally M

    2003-01-01

    Methaemoglobin is formed by oxidation of ferrous (FeII) haem to the ferric (FeIII) state and the mechanisms by which this occurs are complex. Most cases are due to one of three processes. Firstly, direct oxidation of ferrohaemoglobin, which involves the transfer of electrons from ferrous haem to the oxidising compound. This mechanism proceeds most readily in the absence of oxygen. Secondly, indirect oxidation, a process of co-oxidation which requires haemoglobin-bound oxygen and is involved, for example, in nitrite-induced methaemoglobinaemia. Thirdly, biotransformation of a chemical to an active intermediate that initiates methaemoglobin formation by a variety of mechanisms. This is the means by which most aromatic compounds, such as amino- and nitro-derivatives of benzene, produce methaemoglobin. Methaemoglobinaemia is an uncommon occupational occurrence. Aromatic compounds are responsible for most cases, their lipophilic nature and volatility facilitating absorption during dermal and inhalational exposure, the principal routes implicated in the workplace. Methaemoglobinaemia presents clinically with symptoms and signs of tissue hypoxia. Concentrations around 80% are life-threatening. Features of toxicity may develop over hours or even days when exposure, whether by inhalation or repeated skin contact, is to relatively low concentrations of inducing chemical(s). Not all features observed in patients with methaemoglobinaemia are due to methaemoglobin formation. For example, the intravascular haemolysis caused by oxidising chemicals such as chlorates poses more risk to life than the methaemoglobinaemia that such chemicals induce. If an occupational history is taken, the diagnosis of methaemoglobinaemia should be relatively straightforward. In addition, two clinical observations may help: firstly, the victim is often less unwell than one would expect from the severity of 'cyanosis' and, secondly, the 'cyanosis' is unresponsive to oxygen therapy. Pulse oximetry is

  5. Economic contribution of recreating visitors to the Florida Keys/Key West

    Treesearch

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  6. Deep Restricted Kernel Machines Using Conjugate Feature Duality.

    PubMed

    Suykens, Johan A K

    2017-08-01

    The aim of this letter is to propose a theory of deep restricted kernel machines offering new foundations for deep learning with kernel machines. From the viewpoint of deep learning, it is partially related to restricted Boltzmann machines, which are characterized by visible and hidden units in a bipartite graph without hidden-to-hidden connections and deep learning extensions as deep belief networks and deep Boltzmann machines. From the viewpoint of kernel machines, it includes least squares support vector machines for classification and regression, kernel principal component analysis (PCA), matrix singular value decomposition, and Parzen-type models. A key element is to first characterize these kernel machines in terms of so-called conjugate feature duality, yielding a representation with visible and hidden units. It is shown how this is related to the energy form in restricted Boltzmann machines, with continuous variables in a nonprobabilistic setting. In this new framework of so-called restricted kernel machine (RKM) representations, the dual variables correspond to hidden features. Deep RKM are obtained by coupling the RKMs. The method is illustrated for deep RKM, consisting of three levels with a least squares support vector machine regression level and two kernel PCA levels. In its primal form also deep feedforward neural networks can be trained within this framework.

  7. Effective Moment Feature Vectors for Protein Domain Structures

    PubMed Central

    Shi, Jian-Yu; Yiu, Siu-Ming; Zhang, Yan-Ning; Chin, Francis Yuk-Lun

    2013-01-01

    Imaging processing techniques have been shown to be useful in studying protein domain structures. The idea is to represent the pairwise distances of any two residues of the structure in a 2D distance matrix (DM). Features and/or submatrices are extracted from this DM to represent a domain. Existing approaches, however, may involve a large number of features (100–400) or complicated mathematical operations. Finding fewer but more effective features is always desirable. In this paper, based on some key observations on DMs, we are able to decompose a DM image into four basic binary images, each representing the structural characteristics of a fundamental secondary structure element (SSE) or a motif in the domain. Using the concept of moments in image processing, we further derive 45 structural features based on the four binary images. Together with 4 features extracted from the basic images, we represent the structure of a domain using 49 features. We show that our feature vectors can represent domain structures effectively in terms of the following. (1) We show a higher accuracy for domain classification. (2) We show a clear and consistent distribution of domains using our proposed structural vector space. (3) We are able to cluster the domains according to our moment features and demonstrate a relationship between structural variation and functional diversity. PMID:24391828

  8. Identifying key radiogenomic associations between DCE-MRI and micro-RNA expressions for breast cancer

    NASA Astrophysics Data System (ADS)

    Samala, Ravi K.; Chan, Heang-Ping; Hadjiiski, Lubomir; Helvie, Mark A.; Kim, Renaid

    2017-03-01

    Understanding the key radiogenomic associations for breast cancer between DCE-MRI and micro-RNA expressions is the foundation for the discovery of radiomic features as biomarkers for assessing tumor progression and prognosis. We conducted a study to analyze the radiogenomic associations for breast cancer using the TCGA-TCIA data set. The core idea that tumor etiology is a function of the behavior of miRNAs is used to build the regression models. The associations based on regression are analyzed for three study outcomes: diagnosis, prognosis, and treatment. The diagnosis group consists of miRNAs associated with clinicopathologic features of breast cancer and significant aberration of expression in breast cancer patients. The prognosis group consists of miRNAs which are closely associated with tumor suppression and regulation of cell proliferation and differentiation. The treatment group consists of miRNAs that contribute significantly to the regulation of metastasis thereby having the potential to be part of therapeutic mechanisms. As a first step, important miRNA expressions were identified and their ability to classify the clinical phenotypes based on the study outcomes was evaluated using the area under the ROC curve (AUC) as a figure-of-merit. The key mapping between the selected miRNAs and radiomic features were determined using least absolute shrinkage and selection operator (LASSO) regression analysis within a two-loop leave-one-out cross-validation strategy. These key associations indicated a number of radiomic features from DCE-MRI to be potential biomarkers for the three study outcomes.

  9. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  10. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    NASA Astrophysics Data System (ADS)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  11. Computational Identification of Genomic Features That Influence 3D Chromatin Domain Formation.

    PubMed

    Mourad, Raphaël; Cuvier, Olivier

    2016-05-01

    Recent advances in long-range Hi-C contact mapping have revealed the importance of the 3D structure of chromosomes in gene expression. A current challenge is to identify the key molecular drivers of this 3D structure. Several genomic features, such as architectural proteins and functional elements, were shown to be enriched at topological domain borders using classical enrichment tests. Here we propose multiple logistic regression to identify those genomic features that positively or negatively influence domain border establishment or maintenance. The model is flexible, and can account for statistical interactions among multiple genomic features. Using both simulated and real data, we show that our model outperforms enrichment test and non-parametric models, such as random forests, for the identification of genomic features that influence domain borders. Using Drosophila Hi-C data at a very high resolution of 1 kb, our model suggests that, among architectural proteins, BEAF-32 and CP190 are the main positive drivers of 3D domain borders. In humans, our model identifies well-known architectural proteins CTCF and cohesin, as well as ZNF143 and Polycomb group proteins as positive drivers of domain borders. The model also reveals the existence of several negative drivers that counteract the presence of domain borders including P300, RXRA, BCL11A and ELK1.

  12. Computational Identification of Genomic Features That Influence 3D Chromatin Domain Formation

    PubMed Central

    Mourad, Raphaël; Cuvier, Olivier

    2016-01-01

    Recent advances in long-range Hi-C contact mapping have revealed the importance of the 3D structure of chromosomes in gene expression. A current challenge is to identify the key molecular drivers of this 3D structure. Several genomic features, such as architectural proteins and functional elements, were shown to be enriched at topological domain borders using classical enrichment tests. Here we propose multiple logistic regression to identify those genomic features that positively or negatively influence domain border establishment or maintenance. The model is flexible, and can account for statistical interactions among multiple genomic features. Using both simulated and real data, we show that our model outperforms enrichment test and non-parametric models, such as random forests, for the identification of genomic features that influence domain borders. Using Drosophila Hi-C data at a very high resolution of 1 kb, our model suggests that, among architectural proteins, BEAF-32 and CP190 are the main positive drivers of 3D domain borders. In humans, our model identifies well-known architectural proteins CTCF and cohesin, as well as ZNF143 and Polycomb group proteins as positive drivers of domain borders. The model also reveals the existence of several negative drivers that counteract the presence of domain borders including P300, RXRA, BCL11A and ELK1. PMID:27203237

  13. Multi-tube fuel nozzle with mixing features

    DOEpatents

    Hughes, Michael John

    2014-04-22

    A system includes a multi-tube fuel nozzle having an inlet plate and a plurality of tubes adjacent the inlet plate. The inlet plate includes a plurality of apertures, and each aperture includes an inlet feature. Each tube of the plurality of tubes is coupled to an aperture of the plurality of apertures. The multi-tube fuel nozzle includes a differential configuration of inlet features among the plurality of tubes.

  14. Quality control, analysis and secure sharing of Luminex® immunoassay data using the open source LabKey Server platform

    PubMed Central

    2013-01-01

    Background Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists’ capacity to use these immunoassays to evaluate human clinical trials. Results The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose–response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Conclusions Unlike other tools tailored for

  15. Quality control, analysis and secure sharing of Luminex® immunoassay data using the open source LabKey Server platform.

    PubMed

    Eckels, Josh; Nathe, Cory; Nelson, Elizabeth K; Shoemaker, Sara G; Nostrand, Elizabeth Van; Yates, Nicole L; Ashley, Vicki C; Harris, Linda J; Bollenbeck, Mark; Fong, Youyi; Tomaras, Georgia D; Piehler, Britt

    2013-04-30

    Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists' capacity to use these immunoassays to evaluate human clinical trials. The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose-response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Unlike other tools tailored for Luminex immunoassays, LabKey Server

  16. An Eye-Tracking Study of Multiple Feature Value Category Structure Learning: The Role of Unique Features

    PubMed Central

    Liu, Zhiya; Song, Xiaohong; Seger, Carol A.

    2015-01-01

    We examined whether the degree to which a feature is uniquely characteristic of a category can affect categorization above and beyond the typicality of the feature. We developed a multiple feature value category structure with different dimensions within which feature uniqueness and typicality could be manipulated independently. Using eye tracking, we found that the highest attentional weighting (operationalized as number of fixations, mean fixation time, and the first fixation of the trial) was given to a dimension that included a feature that was both unique and highly typical of the category. Dimensions that included features that were highly typical but not unique, or were unique but not highly typical, received less attention. A dimension with neither a unique nor a highly typical feature received least attention. On the basis of these results we hypothesized that subjects categorized via a rule learning procedure in which they performed an ordered evaluation of dimensions, beginning with unique and strongly typical dimensions, and in which earlier dimensions received higher weighting in the decision. This hypothesis accounted for performance on transfer stimuli better than simple implementations of two other common theories of category learning, exemplar models and prototype models, in which all dimensions were evaluated in parallel and received equal weighting. PMID:26274332

  17. An Eye-Tracking Study of Multiple Feature Value Category Structure Learning: The Role of Unique Features.

    PubMed

    Liu, Zhiya; Song, Xiaohong; Seger, Carol A

    2015-01-01

    We examined whether the degree to which a feature is uniquely characteristic of a category can affect categorization above and beyond the typicality of the feature. We developed a multiple feature value category structure with different dimensions within which feature uniqueness and typicality could be manipulated independently. Using eye tracking, we found that the highest attentional weighting (operationalized as number of fixations, mean fixation time, and the first fixation of the trial) was given to a dimension that included a feature that was both unique and highly typical of the category. Dimensions that included features that were highly typical but not unique, or were unique but not highly typical, received less attention. A dimension with neither a unique nor a highly typical feature received least attention. On the basis of these results we hypothesized that subjects categorized via a rule learning procedure in which they performed an ordered evaluation of dimensions, beginning with unique and strongly typical dimensions, and in which earlier dimensions received higher weighting in the decision. This hypothesis accounted for performance on transfer stimuli better than simple implementations of two other common theories of category learning, exemplar models and prototype models, in which all dimensions were evaluated in parallel and received equal weighting.

  18. The role of emotion in musical improvisation: an analysis of structural features.

    PubMed

    McPherson, Malinda J; Lopez-Gonzalez, Monica; Rankin, Summer K; Limb, Charles J

    2014-01-01

    One of the primary functions of music is to convey emotion, yet how music accomplishes this task remains unclear. For example, simple correlations between mode (major vs. minor) and emotion (happy vs. sad) do not adequately explain the enormous range, subtlety or complexity of musically induced emotions. In this study, we examined the structural features of unconstrained musical improvisations generated by jazz pianists in response to emotional cues. We hypothesized that musicians would not utilize any universal rules to convey emotions, but would instead combine heterogeneous musical elements together in order to depict positive and negative emotions. Our findings demonstrate a lack of simple correspondence between emotions and musical features of spontaneous musical improvisation. While improvisations in response to positive emotional cues were more likely to be in major keys, have faster tempos, faster key press velocities and more staccato notes when compared to negative improvisations, there was a wide distribution for each emotion with components that directly violated these primary associations. The finding that musicians often combine disparate features together in order to convey emotion during improvisation suggests that structural diversity may be an essential feature of the ability of music to express a wide range of emotion.

  19. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  20. Formation and evolution of valley-bottom and channel features, Lower Deschutes River, Oregon

    USGS Publications Warehouse

    Curran, Janet H.; O'Conner, Jim E.; O'Conner, Jim E.; Grant, Gordon E.

    2003-01-01

    Primary geologic and geomorphic processes that formed valley-bottom and channel features downstream from the Pelton-Round Butte dam complex are inferred from a canyon-long analysis of feature morphology, composition, location, and spatial distribution. Major controls on valley-bottom morphology are regional tectonics, large landslides, and outsized floods (floods with return periods greater than 1000 yrs), which include the late Holocene Outhouse Flood and several Quaternary landslide dam failures. Floods with a return period on the order of 100 yrs, including historical floods in 1996, 1964, and 1861, contribute to fan building and flood plain formation only within the resistant framework established by the major controls. Key processes in the formation of channel features, in particular the 153 islands and 23 large rapids, include long-term bedrock erosion, outsized floods, and century-scale floods. Historical analysis of channel conditions since 1911 indicates that the largest islands, which are cored by outsized-flood deposits, locally control channel location, although their margins are substantially modified during annual- to century-scale floods. Islands cored by bedrock have changed little. Islands formed by annual- to century-scale floods are more susceptible to dynamic interactions between tributary sediment inputs, mainstem flow hydraulics, and perhaps riparian vegetation. Temporal patterns of island change in response to the sequence of 20th century flooding indicate that many islands accreted sediment during annual- to decadal-scale floods, but eroded during larger century-scale floods. There is, however, no clear trend of long-term changes in patterns of island growth, movement, or erosion either spatially or temporally within the lower Deschutes River.

  1. Key-Node-Separated Graph Clustering and Layouts for Human Relationship Graph Visualization.

    PubMed

    Itoh, Takayuki; Klein, Karsten

    2015-01-01

    Many graph-drawing methods apply node-clustering techniques based on the density of edges to find tightly connected subgraphs and then hierarchically visualize the clustered graphs. However, users may want to focus on important nodes and their connections to groups of other nodes for some applications. For this purpose, it is effective to separately visualize the key nodes detected based on adjacency and attributes of the nodes. This article presents a graph visualization technique for attribute-embedded graphs that applies a graph-clustering algorithm that accounts for the combination of connections and attributes. The graph clustering step divides the nodes according to the commonality of connected nodes and similarity of feature value vectors. It then calculates the distances between arbitrary pairs of clusters according to the number of connecting edges and the similarity of feature value vectors and finally places the clusters based on the distances. Consequently, the technique separates important nodes that have connections to multiple large clusters and improves the visibility of such nodes' connections. To test this technique, this article presents examples with human relationship graph datasets, including a coauthorship and Twitter communication network dataset.

  2. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  3. From Shell Midden to Midden-Mound: The Geoarchaeology of Mound Key, an Anthropogenic Island in Southwest Florida, USA

    PubMed Central

    Cherkinsky, Alexander; Roberts Thompson, Amanda D.; Walker, Karen J.; Newsom, Lee A.; Savarese, Michael

    2016-01-01

    Mound Key was once the capital of the Calusa Kingdom, a large Pre-Hispanic polity that controlled much of southern Florida. Mound Key, like other archaeological sites along the southwest Gulf Coast, is a large expanse of shell and other anthropogenic sediments. The challenges that these sites pose are largely due to the size and areal extent of the deposits, some of which begin up to a meter below and exceed nine meters above modern sea levels. Additionally, the complex depositional sequences at these sites present difficulties in determining their chronology. Here, we examine the development of Mound Key as an anthropogenic island through systematic coring of the deposits, excavations, and intensive radiocarbon dating. The resulting data, which include the reversals of radiocarbon dates from cores and dates from mound-top features, lend insight into the temporality of site formation. We use these insights to discuss the nature and scale of human activities that worked to form this large island in the context of its dynamic, environmental setting. We present the case that deposits within Mound Key’s central area accumulated through complex processes that represent a diversity of human action including midden accumulation and the redeposition of older sediments as mound fill. PMID:27123928

  4. PyEEG: an open source Python module for EEG/MEG feature extraction.

    PubMed

    Bao, Forrest Sheng; Liu, Xin; Zhang, Christina

    2011-01-01

    Computer-aided diagnosis of neural diseases from EEG signals (or other physiological signals that can be treated as time series, e.g., MEG) is an emerging field that has gained much attention in past years. Extracting features is a key component in the analysis of EEG signals. In our previous works, we have implemented many EEG feature extraction functions in the Python programming language. As Python is gaining more ground in scientific computing, an open source Python module for extracting EEG features has the potential to save much time for computational neuroscientists. In this paper, we introduce PyEEG, an open source Python module for EEG feature extraction.

  5. PyEEG: An Open Source Python Module for EEG/MEG Feature Extraction

    PubMed Central

    Bao, Forrest Sheng; Liu, Xin; Zhang, Christina

    2011-01-01

    Computer-aided diagnosis of neural diseases from EEG signals (or other physiological signals that can be treated as time series, e.g., MEG) is an emerging field that has gained much attention in past years. Extracting features is a key component in the analysis of EEG signals. In our previous works, we have implemented many EEG feature extraction functions in the Python programming language. As Python is gaining more ground in scientific computing, an open source Python module for extracting EEG features has the potential to save much time for computational neuroscientists. In this paper, we introduce PyEEG, an open source Python module for EEG feature extraction. PMID:21512582

  6. Confidence-Based Feature Acquisition

    NASA Technical Reports Server (NTRS)

    Wagstaff, Kiri L.; desJardins, Marie; MacGlashan, James

    2010-01-01

    Confidence-based Feature Acquisition (CFA) is a novel, supervised learning method for acquiring missing feature values when there is missing data at both training (learning) and test (deployment) time. To train a machine learning classifier, data is encoded with a series of input features describing each item. In some applications, the training data may have missing values for some of the features, which can be acquired at a given cost. A relevant JPL example is that of the Mars rover exploration in which the features are obtained from a variety of different instruments, with different power consumption and integration time costs. The challenge is to decide which features will lead to increased classification performance and are therefore worth acquiring (paying the cost). To solve this problem, CFA, which is made up of two algorithms (CFA-train and CFA-predict), has been designed to greedily minimize total acquisition cost (during training and testing) while aiming for a specific accuracy level (specified as a confidence threshold). With this method, it is assumed that there is a nonempty subset of features that are free; that is, every instance in the data set includes these features initially for zero cost. It is also assumed that the feature acquisition (FA) cost associated with each feature is known in advance, and that the FA cost for a given feature is the same for all instances. Finally, CFA requires that the base-level classifiers produce not only a classification, but also a confidence (or posterior probability).

  7. FEX: A Knowledge-Based System For Planimetric Feature Extraction

    NASA Astrophysics Data System (ADS)

    Zelek, John S.

    1988-10-01

    Topographical planimetric features include natural surfaces (rivers, lakes) and man-made surfaces (roads, railways, bridges). In conventional planimetric feature extraction, a photointerpreter manually interprets and extracts features from imagery on a stereoplotter. Visual planimetric feature extraction is a very labour intensive operation. The advantages of automating feature extraction include: time and labour savings; accuracy improvements; and planimetric data consistency. FEX (Feature EXtraction) combines techniques from image processing, remote sensing and artificial intelligence for automatic feature extraction. The feature extraction process co-ordinates the information and knowledge in a hierarchical data structure. The system simulates the reasoning of a photointerpreter in determining the planimetric features. Present efforts have concentrated on the extraction of road-like features in SPOT imagery. Keywords: Remote Sensing, Artificial Intelligence (AI), SPOT, image understanding, knowledge base, apars.

  8. Proteomic analysis of cell cycle progression in asynchronous cultures, including mitotic subphases, using PRIMMUS

    PubMed Central

    Whigham, Arlene; Clarke, Rosemary; Brenes-Murillo, Alejandro J; Estes, Brett; Madhessian, Diana; Lundberg, Emma; Wadsworth, Patricia

    2017-01-01

    The temporal regulation of protein abundance and post-translational modifications is a key feature of cell division. Recently, we analysed gene expression and protein abundance changes during interphase under minimally perturbed conditions (Ly et al., 2014, 2015). Here, we show that by using specific intracellular immunolabelling protocols, FACS separation of interphase and mitotic cells, including mitotic subphases, can be combined with proteomic analysis by mass spectrometry. Using this PRIMMUS (PRoteomic analysis of Intracellular iMMUnolabelled cell Subsets) approach, we now compare protein abundance and phosphorylation changes in interphase and mitotic fractions from asynchronously growing human cells. We identify a set of 115 phosphorylation sites increased during G2, termed ‘early risers’. This set includes phosphorylation of S738 on TPX2, which we show is important for TPX2 function and mitotic progression. Further, we use PRIMMUS to provide the first a proteome-wide analysis of protein abundance remodeling between prophase, prometaphase and anaphase. PMID:29052541

  9. Non-unique key B-Tree implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ries, D.R.

    1980-12-23

    The B-Trees are an indexed method to allow fast retrieval and order preserving updates to a FRAMIS relation based on a designated set of keys in the relation. A B-Tree access method is being implemented to provide indexed and sequential (in index order) access to FRAMIS relations. The implementation modifies the basic B-Tree structure to correctly allow multiple key values and still maintain the balanced page fill property of B-Trees. The data structures of the B-Tree are presented first, including the FRAMIS solution to the duplicate key value problem. Then the access level routines and utilities are presented. These routinesmore » include the original B-Tree creation; searching the B-Tree; and inserting, deleting, and replacing tuples on the B-Tree. In conclusion, the uses of the B-Tree access structures at the semantic level to enhance the FRAMIS performance are discussed. 10 figures.« less

  10. Features of computerized clinical decision support systems supportive of nursing practice: a literature review.

    PubMed

    Lee, Seonah

    2013-10-01

    This study aimed to organize the system features of decision support technologies targeted at nursing practice into assessment, problem identification, care plans, implementation, and outcome evaluation. It also aimed to identify the range of the five stage-related sequential decision supports that computerized clinical decision support systems provided. MEDLINE, CINAHL, and EMBASE were searched. A total of 27 studies were reviewed. The system features collected represented the characteristics of each category from patient assessment to outcome evaluation. Several features were common across the reviewed systems. For the sequential decision support, all of the reviewed systems provided decision support in sequence for patient assessment and care plans. Fewer than half of the systems included problem identification. There were only three systems operating in an implementation stage and four systems in outcome evaluation. Consequently, the key steps for sequential decision support functions were initial patient assessment, problem identification, care plan, and outcome evaluation. Providing decision support in such a full scope will effectively help nurses' clinical decision making. By organizing the system features, a comprehensive picture of nursing practice-oriented computerized decision support systems was obtained; however, the development of a guideline for better systems should go beyond the scope of a literature review.

  11. Image Mosaic Method Based on SIFT Features of Line Segment

    PubMed Central

    Zhu, Jun; Ren, Mingwu

    2014-01-01

    This paper proposes a novel image mosaic method based on SIFT (Scale Invariant Feature Transform) feature of line segment, aiming to resolve incident scaling, rotation, changes in lighting condition, and so on between two images in the panoramic image mosaic process. This method firstly uses Harris corner detection operator to detect key points. Secondly, it constructs directed line segments, describes them with SIFT feature, and matches those directed segments to acquire rough point matching. Finally, Ransac method is used to eliminate wrong pairs in order to accomplish image mosaic. The results from experiment based on four pairs of images show that our method has strong robustness for resolution, lighting, rotation, and scaling. PMID:24511326

  12. A Search Engine Features Comparison.

    ERIC Educational Resources Information Center

    Vorndran, Gerald

    Until recently, the World Wide Web (WWW) public access search engines have not included many of the advanced commands, options, and features commonly available with the for-profit online database user interfaces, such as DIALOG. This study evaluates the features and characteristics common to both types of search interfaces, examines the Web search…

  13. High resolution as a key feature to perform accurate ELISPOT measurements using Zeiss KS ELISPOT readers.

    PubMed

    Malkusch, Wolf

    2005-01-01

    The enzyme-linked immunospot (ELISPOT) assay was originally developed for the detection of individual antibody secreting B-cells. Since then, the method has been improved, and ELISPOT is used for the determination of the production of tumor necrosis factor (TNF)-alpha, interferon (IFN)-gamma, or various interleukins (IL)-4, IL-5. ELISPOT measurements are performed in 96-well plates with nitrocellulose membranes either visually or by means of image analysis. Image analysis offers various procedures to overcome variable background intensity problems and separate true from false spots. ELISPOT readers offer a complete solution for precise and automatic evaluation of ELISPOT assays. Number, size, and intensity of each single spot can be determined, printed, or saved for further statistical evaluation. Cytokine spots are always round, but because of floating edges with the background, they have a nonsmooth borderline. Resolution is a key feature for a precise detection of ELISPOT. In standard applications shape and edge steepness are essential parameters in addition to size and color for an accurate spot recognition. These parameters need a minimum spot diameter of 6 pixels. Collecting one single image per well with a standard color camera with 750 x 560 pixels will result in a resolution much too low to get all of the spots in a specimen. IFN-gamma spots may have only 25 microm diameters, and TNF-alpha spots just 15 microm. A 750 x 560 pixel image of a 6-mm well has a pixel size of 12 microm, resulting in only 1 or 2 pixel for a spot. Using a precise microscope optic in combination with a high resolution (1300 x 1030 pixel) integrating digital color camera, and at least 2 x 2 images per well will result in a pixel size of 2.5 microm and, as a minimum, 6 pixel diameter per spot. New approaches try to detect two cytokines per cell at the same time (i.e., IFN-gamma and IL-5). Standard staining procedures produce brownish spots (horseradish peroxidase) and blue spots

  14. Nanoscale Pore Features and Associated Fluid Behavior in Shale

    NASA Astrophysics Data System (ADS)

    Cole, D. R.; Striolo, A.

    2017-12-01

    Unconventional hydrocarbons occurring in economic abundance require greater than industry-standard levels of technology or investment to exploit. Geological formations that host unconventional oil and gas are extraordinarily heterogeneous and exhibit a wide range of physical and chemical features that can vary over many orders of magnitude in length scale. The size, distribution and connectivity of these confined geometries, the chemistry of the solid, the chemistry of the fluids and their physical properties collectively dictate how fluids migrate into and through these micro- and nano-environments, wet and ultimately react with the solid surfaces. Our current understanding of the rates and mechanisms of fluid and mass transport and interaction within these multiporosity systems at the molecular scale is far less robust than we would like. This presentation will take a two-fold approach to this topic area. First, a brief overview is provided that highlights the use of advanced electron microscopy and neutrons scattering methods to quantify the nature of the nanopore system that hosts hydrocarbons in representative gas shale formations such as the Utica, Marcellus and Eagle Ford. Second, results will be presented that leverage the application of state-of-the-art experimental, analytical and computational tools to assess key features of the fluid-matrix interaction relevant to shale settings. The multidisciplinary approaches highlighted will include neutron scattering and NMR experiments, thermodynamic measurements and molecular-level simulations to quantitatively assess molecular properties of C-O-H fluids confined to well-characterized porous media, subjected to temperatures and pressures relevant to subsurface energy systems. These studies conducted in concert are beginning to provide a fundamental understanding at the molecular level of how intrinsically different hydrocarbon-bearing fluids behave in confined geometries compared to bulk systems, and shed light

  15. MCNP4A: Features and philosophy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hendricks, J.S.

    This paper describes MCNP, states its philosophy, introduces a number of new features becoming available with version MCNP4A, and answers a number of questions asked by participants in the workshop. MCNP is a general-purpose three-dimensional neutron, photon and electron transport code. Its philosophy is ``Quality, Value and New Features.`` Quality is exemplified by new software quality assurance practices and a program of benchmarking against experiments. Value includes a strong emphasis on documentation and code portability. New features are the third priority. MCNP4A is now available at Los Alamos. New features in MCNP4A include enhanced statistical analysis, distributed processor multitasking, newmore » photon libraries, ENDF/B-VI capabilities, X-Windows graphics, dynamic memory allocation, expanded criticality output, periodic boundaries, plotting of particle tracks via SABRINA, and many other improvements. 23 refs.« less

  16. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  17. Flexible feature interface for multimedia sources

    DOEpatents

    Coffland, Douglas R [Livermore, CA

    2009-06-09

    A flexible feature interface for multimedia sources system that includes a single interface for the addition of features and functions to multimedia sources and for accessing those features and functions from remote hosts. The interface utilizes the export statement: export "C" D11Export void FunctionName(int argc, char ** argv,char * result, SecureSession *ctrl) or the binary equivalent of the export statement.

  18. Drama in the Key Stage 3 English Framework. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    Effective drama teaching improves the following student skills: speaking and listening, reading and writing through developing thinking, communication skills, and critical analysis. Drama is part of young people's core curriculum entitlement in the United Kingdom. It is included in the English Curriculum Orders and in the Key Stage 3 Framework for…

  19. Screening key candidate genes and pathways involved in insulinoma by microarray analysis.

    PubMed

    Zhou, Wuhua; Gong, Li; Li, Xuefeng; Wan, Yunyan; Wang, Xiangfei; Li, Huili; Jiang, Bin

    2018-06-01

    Insulinoma is a rare type tumor and its genetic features remain largely unknown. This study aimed to search for potential key genes and relevant enriched pathways of insulinoma.The gene expression data from GSE73338 were downloaded from Gene Expression Omnibus database. Differentially expressed genes (DEGs) were identified between insulinoma tissues and normal pancreas tissues, followed by pathway enrichment analysis, protein-protein interaction (PPI) network construction, and module analysis. The expressions of candidate key genes were validated by quantitative real-time polymerase chain reaction (RT-PCR) in insulinoma tissues.A total of 1632 DEGs were obtained, including 1117 upregulated genes and 514 downregulated genes. Pathway enrichment results showed that upregulated DEGs were significantly implicated in insulin secretion, and downregulated DEGs were mainly enriched in pancreatic secretion. PPI network analysis revealed 7 hub genes with degrees more than 10, including GCG (glucagon), GCGR (glucagon receptor), PLCB1 (phospholipase C, beta 1), CASR (calcium sensing receptor), F2R (coagulation factor II thrombin receptor), GRM1 (glutamate metabotropic receptor 1), and GRM5 (glutamate metabotropic receptor 5). DEGs involved in the significant modules were enriched in calcium signaling pathway, protein ubiquitination, and platelet degranulation. Quantitative RT-PCR data confirmed that the expression trends of these hub genes were similar to the results of bioinformatic analysis.The present study demonstrated that candidate DEGs and enriched pathways were the potential critical molecule events involved in the development of insulinoma, and these findings were useful for better understanding of insulinoma genesis.

  20. Sensor feature fusion for detecting buried objects

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clark, G.A.; Sengupta, S.K.; Sherwood, R.J.

    1993-04-01

    Given multiple registered images of the earth`s surface from dual-band sensors, our system fuses information from the sensors to reduce the effects of clutter and improve the ability to detect buried or surface target sites. The sensor suite currently includes two sensors (5 micron and 10 micron wavelengths) and one ground penetrating radar (GPR) of the wide-band pulsed synthetic aperture type. We use a supervised teaming pattern recognition approach to detect metal and plastic land mines buried in soil. The overall process consists of four main parts: Preprocessing, feature extraction, feature selection, and classification. These parts are used in amore » two step process to classify a subimage. Thee first step, referred to as feature selection, determines the features of sub-images which result in the greatest separability among the classes. The second step, image labeling, uses the selected features and the decisions from a pattern classifier to label the regions in the image which are likely to correspond to buried mines. We extract features from the images, and use feature selection algorithms to select only the most important features according to their contribution to correct detections. This allows us to save computational complexity and determine which of the sensors add value to the detection system. The most important features from the various sensors are fused using supervised teaming pattern classifiers (including neural networks). We present results of experiments to detect buried land mines from real data, and evaluate the usefulness of fusing feature information from multiple sensor types, including dual-band infrared and ground penetrating radar. The novelty of the work lies mostly in the combination of the algorithms and their application to the very important and currently unsolved operational problem of detecting buried land mines from an airborne standoff platform.« less

  1. Comparative effectiveness of instructional design features in simulation-based education: systematic review and meta-analysis.

    PubMed

    Cook, David A; Hamstra, Stanley J; Brydges, Ryan; Zendejas, Benjamin; Szostek, Jason H; Wang, Amy T; Erwin, Patricia J; Hatala, Rose

    2013-01-01

    Although technology-enhanced simulation is increasingly used in health professions education, features of effective simulation-based instructional design remain uncertain. Evaluate the effectiveness of instructional design features through a systematic review of studies comparing different simulation-based interventions. We systematically searched MEDLINE, EMBASE, CINAHL, ERIC, PsycINFO, Scopus, key journals, and previous review bibliographies through May 2011. We included original research studies that compared one simulation intervention with another and involved health professions learners. Working in duplicate, we evaluated study quality and abstracted information on learners, outcomes, and instructional design features. We pooled results using random effects meta-analysis. From a pool of 10,903 articles we identified 289 eligible studies enrolling 18,971 trainees, including 208 randomized trials. Inconsistency was usually large (I2 > 50%). For skills outcomes, pooled effect sizes (positive numbers favoring the instructional design feature) were 0.68 for range of difficulty (20 studies; p < 0.001), 0.68 for repetitive practice (7 studies; p = 0.06), 0.66 for distributed practice (6 studies; p = 0.03), 0.65 for interactivity (89 studies; p < 0.001), 0.62 for multiple learning strategies (70 studies; p < 0.001), 0.52 for individualized learning (59 studies; p < 0.001), 0.45 for mastery learning (3 studies; p = 0.57), 0.44 for feedback (80 studies; p < 0.001), 0.34 for longer time (23 studies; p = 0.005), 0.20 for clinical variation (16 studies; p = 0.24), and -0.22 for group training (8 studies; p = 0.09). These results confirm quantitatively the effectiveness of several instructional design features in simulation-based education.

  2. Face Alignment via Regressing Local Binary Features.

    PubMed

    Ren, Shaoqing; Cao, Xudong; Wei, Yichen; Sun, Jian

    2016-03-01

    This paper presents a highly efficient and accurate regression approach for face alignment. Our approach has two novel components: 1) a set of local binary features and 2) a locality principle for learning those features. The locality principle guides us to learn a set of highly discriminative local binary features for each facial landmark independently. The obtained local binary features are used to jointly learn a linear regression for the final output. This approach achieves the state-of-the-art results when tested on the most challenging benchmarks to date. Furthermore, because extracting and regressing local binary features are computationally very cheap, our system is much faster than previous methods. It achieves over 3000 frames per second (FPS) on a desktop or 300 FPS on a mobile phone for locating a few dozens of landmarks. We also study a key issue that is important but has received little attention in the previous research, which is the face detector used to initialize alignment. We investigate several face detectors and perform quantitative evaluation on how they affect alignment accuracy. We find that an alignment friendly detector can further greatly boost the accuracy of our alignment method, reducing the error up to 16% relatively. To facilitate practical usage of face detection/alignment methods, we also propose a convenient metric to measure how good a detector is for alignment initialization.

  3. Protecting Cryptographic Keys and Functions from Malware Attacks

    DTIC Science & Technology

    2010-12-01

    registers. modifies RSA private key signing in OpenSSL to use the technique. The resulting system has the following features: 1. No special hardware is...the above method based on OpenSSL , by exploiting the Streaming SIMD Extension (SSE) XMM registers of modern Intel and AMD x86-compatible CPU’s [22...one can store a 2048-bit exponent.1 Our prototype is based on OpenSSL 0.9.8e, the Ubuntu 6.06 Linux distribution with a 2.6.15 kernel, and SSE2 which

  4. E-referral Solutions: Successful Experiences, Key Features and Challenges- a Systematic Review.

    PubMed

    Naseriasl, Mansour; Adham, Davoud; Janati, Ali

    2015-06-01

    around the world health systems constantly face increasing pressures which arise from many factors, such as an ageing population, patients and providers demands for equipment's and services. In order to respond these challenges and reduction of health system's transactional costs, referral solutions are considered as a key factor. This study was carried out to identify referral solutions that have had successes. relevant studies identified using keywords of referrals, consultation, referral system, referral model, referral project, electronic referral, electronic booking, health system, healthcare, health service and medical care. These searches were conducted using PubMed, ProQuest, Google Scholar, Scopus, Emerald, Web of Knowledge, Springer, Science direct, Mosby's index, SID, Medlib and Iran Doc data bases. 4306 initial articles were obtained and refined step by step. Finally, 27 articles met the inclusion criteria. we identified seventeen e-referral systems developed in UK, Norway, Finland, Netherlands, Denmark, Scotland, New Zealand, Canada, Australia, and U.S. Implemented solutions had variant degrees of successes such as improved access to specialist care, reduced wait times, timeliness and quality of referral communication, accurate health information transfer and integration of health centers and services. each one of referral solutions has both positive and changeable aspects that should be addressed according to sociotechnical conditions. These solutions are mainly formed in a small and localized manner.

  5. The Role of Emotion in Musical Improvisation: An Analysis of Structural Features

    PubMed Central

    McPherson, Malinda J.; Lopez-Gonzalez, Monica; Rankin, Summer K.; Limb, Charles J.

    2014-01-01

    One of the primary functions of music is to convey emotion, yet how music accomplishes this task remains unclear. For example, simple correlations between mode (major vs. minor) and emotion (happy vs. sad) do not adequately explain the enormous range, subtlety or complexity of musically induced emotions. In this study, we examined the structural features of unconstrained musical improvisations generated by jazz pianists in response to emotional cues. We hypothesized that musicians would not utilize any universal rules to convey emotions, but would instead combine heterogeneous musical elements together in order to depict positive and negative emotions. Our findings demonstrate a lack of simple correspondence between emotions and musical features of spontaneous musical improvisation. While improvisations in response to positive emotional cues were more likely to be in major keys, have faster tempos, faster key press velocities and more staccato notes when compared to negative improvisations, there was a wide distribution for each emotion with components that directly violated these primary associations. The finding that musicians often combine disparate features together in order to convey emotion during improvisation suggests that structural diversity may be an essential feature of the ability of music to express a wide range of emotion. PMID:25144200

  6. Movement of feeder-using songbirds: the influence of urban features.

    PubMed

    Cox, Daniel T C; Inger, Richard; Hancock, Steven; Anderson, Karen; Gaston, Kevin J

    2016-11-23

    Private gardens provide vital opportunities for people to interact with nature. The most popular form of interaction is through garden bird feeding. Understanding how landscape features and seasons determine patterns of movement of feeder-using songbirds is key to maximising the well-being benefits they provide. To determine these patterns we established three networks of automated data loggers along a gradient of greenspace fragmentation. Over a 12-month period we tracked 452 tagged blue tits Cyantistes caeruleus and great tits Parus major moving between feeder pairs 9,848 times, to address two questions: (i) Do urban features within different forms, and season, influence structural (presence-absence of connections between feeders by birds) and functional (frequency of these connections) connectivity? (ii) Are there general patterns of structural and functional connectivity across forms? Vegetation cover increased connectivity in all three networks, whereas the presence of road gaps negatively affected functional but not structural connectivity. Across networks structural connectivity was lowest in the summer when birds maintain breeding territories, however patterns of functional connectivity appeared to vary with habitat fragmentation. Using empirical data this study shows how key urban features and season influence movement of feeder-using songbirds, and we provide evidence that this is related to greenspace fragmentation.

  7. Characterizing mammographic images by using generic texture features

    PubMed Central

    2012-01-01

    Introduction Although mammographic density is an established risk factor for breast cancer, its use is limited in clinical practice because of a lack of automated and standardized measurement methods. The aims of this study were to evaluate a variety of automated texture features in mammograms as risk factors for breast cancer and to compare them with the percentage mammographic density (PMD) by using a case-control study design. Methods A case-control study including 864 cases and 418 controls was analyzed automatically. Four hundred seventy features were explored as possible risk factors for breast cancer. These included statistical features, moment-based features, spectral-energy features, and form-based features. An elaborate variable selection process using logistic regression analyses was performed to identify those features that were associated with case-control status. In addition, PMD was assessed and included in the regression model. Results Of the 470 image-analysis features explored, 46 remained in the final logistic regression model. An area under the curve of 0.79, with an odds ratio per standard deviation change of 2.88 (95% CI, 2.28 to 3.65), was obtained with validation data. Adding the PMD did not improve the final model. Conclusions Using texture features to predict the risk of breast cancer appears feasible. PMD did not show any additional value in this study. With regard to the features assessed, most of the analysis tools appeared to reflect mammographic density, although some features did not correlate with PMD. It remains to be investigated in larger case-control studies whether these features can contribute to increased prediction accuracy. PMID:22490545

  8. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    PubMed

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  9. Key Facts about Higher Education in Washington. 2012

    ERIC Educational Resources Information Center

    Washington Higher Education Coordinating Board, 2012

    2012-01-01

    "Key Facts about Higher Education in Washington" provides vital data to chart higher education's progress and challenges. First published in 2002 by the Washington Higher Education Coordinating Board, this annual report highlights "Key Facts" about Washington's postsecondary institutions--including faculty, students, budgets,…

  10. Three featured plenary sessions

    NASA Astrophysics Data System (ADS)

    2012-07-01

    The conference included three plenary sessions. The plenary on Governance, Security, Economy, and the Ecosystem of the Changing Arctic featured Vera Alexander, president, Arctic Research Consortium of the U.S.; Alan Thornhill, chief environmental officer, U.S. Department of the Interior's Bureau of Ocean Energy Management; and Fran Ulmer, chair, U.S. Arctic Research Commission. A plenary on the U.N. Convention on the Law of the Sea featured Ambassador David Balton, deputy assistant secretary for oceans and fisheries, U.S. Department of State; and Rear Admiral Frederick Kenney Jr., judge advocate general and chief counsel, U.S. Coast Guard. The plenary on Science and the 21st Century featured Phil Keslin, chief technology officer, small lab within Google.

  11. Feature learning and change feature classification based on deep learning for ternary change detection in SAR images

    NASA Astrophysics Data System (ADS)

    Gong, Maoguo; Yang, Hailun; Zhang, Puzhao

    2017-07-01

    Ternary change detection aims to detect changes and group the changes into positive change and negative change. It is of great significance in the joint interpretation of spatial-temporal synthetic aperture radar images. In this study, sparse autoencoder, convolutional neural networks (CNN) and unsupervised clustering are combined to solve ternary change detection problem without any supervison. Firstly, sparse autoencoder is used to transform log-ratio difference image into a suitable feature space for extracting key changes and suppressing outliers and noise. And then the learned features are clustered into three classes, which are taken as the pseudo labels for training a CNN model as change feature classifier. The reliable training samples for CNN are selected from the feature maps learned by sparse autoencoder with certain selection rules. Having training samples and the corresponding pseudo labels, the CNN model can be trained by using back propagation with stochastic gradient descent. During its training procedure, CNN is driven to learn the concept of change, and more powerful model is established to distinguish different types of changes. Unlike the traditional methods, the proposed framework integrates the merits of sparse autoencoder and CNN to learn more robust difference representations and the concept of change for ternary change detection. Experimental results on real datasets validate the effectiveness and superiority of the proposed framework.

  12. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  13. Biometrics based key management of double random phase encoding scheme using error control codes

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  14. Involuntary Memories and Dissociative Amnesia: Assessing Key Assumptions in PTSD Research.

    PubMed

    Berntsen, Dorthe; Rubin, David C

    2014-03-01

    Autobiographical memories of trauma victims are often described as disturbed in two ways. First, the trauma is frequently re-experienced in the form of involuntary, intrusive recollections. Second, the trauma is difficult to recall voluntarily (strategically); important parts may be totally or partially inaccessible-a feature known as dissociative amnesia. These characteristics are often mentioned by PTSD researchers and are included as PTSD symptoms in the DSM-IV-TR (American Psychiatric Association, 2000). In contrast, we show that both involuntary and voluntary recall are enhanced by emotional stress during encoding. We also show that the PTSD symptom in the diagnosis addressing dissociative amnesia, trouble remembering important aspects of the trauma is less well correlated with the remaining PTSD symptoms than the conceptual reversal of having trouble forgetting important aspects of the trauma. Our findings contradict key assumptions that have shaped PTSD research over the last 40 years.

  15. Involuntary Memories and Dissociative Amnesia: Assessing Key Assumptions in PTSD Research

    PubMed Central

    Berntsen, Dorthe; Rubin, David C.

    2014-01-01

    Autobiographical memories of trauma victims are often described as disturbed in two ways. First, the trauma is frequently re-experienced in the form of involuntary, intrusive recollections. Second, the trauma is difficult to recall voluntarily (strategically); important parts may be totally or partially inaccessible—a feature known as dissociative amnesia. These characteristics are often mentioned by PTSD researchers and are included as PTSD symptoms in the DSM-IV-TR (American Psychiatric Association, 2000). In contrast, we show that both involuntary and voluntary recall are enhanced by emotional stress during encoding. We also show that the PTSD symptom in the diagnosis addressing dissociative amnesia, trouble remembering important aspects of the trauma is less well correlated with the remaining PTSD symptoms than the conceptual reversal of having trouble forgetting important aspects of the trauma. Our findings contradict key assumptions that have shaped PTSD research over the last 40 years. PMID:25309832

  16. Key Features of the Intragraft Microenvironment that Determine Long-Term Survival Following Transplantation

    PubMed Central

    Bruneau, Sarah; Woda, Craig Bryan; Daly, Kevin Patrick; Boneschansker, Leonard; Jain, Namrata Gargee; Kochupurakkal, Nora; Contreras, Alan Gabriel; Seto, Tatsuichiro; Briscoe, David Michael

    2012-01-01

    In this review, we discuss how changes in the intragraft microenvironment serve to promote or sustain the development of chronic allograft rejection. We propose two key elements within the microenvironment that contribute to the rejection process. The first is endothelial cell proliferation and angiogenesis that serve to create abnormal microvascular blood flow patterns as well as local tissue hypoxia, and precedes endothelial-to-mesenchymal transition. The second is the overexpression of local cytokines and growth factors that serve to sustain inflammation and, in turn, function to promote a leukocyte-induced angiogenesis reaction. Central to both events is overexpression of vascular endothelial growth factor (VEGF), which is both pro-inflammatory and pro-angiogenic, and thus drives progression of the chronic rejection microenvironment. In our discussion, we focus on how inflammation results in angiogenesis and how leukocyte-induced angiogenesis is pathological. We also discuss how VEGF is a master control factor that fosters the development of the chronic rejection microenvironment. Overall, this review provides insight into the intragraft microenvironment as an important paradigm for future direction in the field. PMID:22566935

  17. Recommended features of protocols for long-term ecological monitoring

    USGS Publications Warehouse

    Oakley, Karen L.; Boudreau, Susan L.; Humphrey, Sioux-Z

    2001-01-01

    In 1991, the National Park Service (NPS) selected seven parks to serve as prototypes for development of a long-term ecological monitoring program. Denali National Park and Preserve was one of the prototype parks selected. The principal focus of this national program was to detect and document resource changes and to understand the forces driving those changes. One of the major tasks of each prototype park was to develop monitoring protocols. In this paper, we discuss some lessons learned and what we believe to be the most important features of protocols.One of the many lessons we have learned is that monitoring protocols vary greatly in content and format. This variation leads to confusion about what information protocols should contain and how they should be formatted. Problems we have observed in existing protocols include (1) not providing enough detail, (2) omitting critical topics (such as data management), and (3) mixing explanation with instructions. Once written, protocols often sit on the shelf to collect dust, allowing methods changes to occur without being adequately considered, tested, or documented. Because a lengthy and costly research effort is often needed to develop protocols, a vision of what the final product should look like is helpful. Based on our involvement with the prototype monitoring program for Denali (Oakley and Boudreau 2000), we recommend key features of protocols, including a scheme for linking protocols to data in the data management system and for tracking protocol revisions. A protocol system is crucial for producing long-term data sets of known quality that meet program objectives.

  18. Feature engineering for drug name recognition in biomedical texts: feature conjunction and feature selection.

    PubMed

    Liu, Shengyu; Tang, Buzhou; Chen, Qingcai; Wang, Xiaolong; Fan, Xiaoming

    2015-01-01

    Drug name recognition (DNR) is a critical step for drug information extraction. Machine learning-based methods have been widely used for DNR with various types of features such as part-of-speech, word shape, and dictionary feature. Features used in current machine learning-based methods are usually singleton features which may be due to explosive features and a large number of noisy features when singleton features are combined into conjunction features. However, singleton features that can only capture one linguistic characteristic of a word are not sufficient to describe the information for DNR when multiple characteristics should be considered. In this study, we explore feature conjunction and feature selection for DNR, which have never been reported. We intuitively select 8 types of singleton features and combine them into conjunction features in two ways. Then, Chi-square, mutual information, and information gain are used to mine effective features. Experimental results show that feature conjunction and feature selection can improve the performance of the DNR system with a moderate number of features and our DNR system significantly outperforms the best system in the DDIExtraction 2013 challenge.

  19. Creating Concepts from Converging Features in Human Cortex

    PubMed Central

    Coutanche, Marc N.; Thompson-Schill, Sharon L.

    2015-01-01

    To make sense of the world around us, our brain must remember the overlapping features of millions of objects. Crucially, it must also represent each object's unique feature-convergence. Some theories propose that an integration area (or “convergence zone”) binds together separate features. We report an investigation of our knowledge of objects' features and identity, and the link between them. We used functional magnetic resonance imaging to record neural activity, as humans attempted to detect a cued fruit or vegetable in visual noise. Crucially, we analyzed brain activity before a fruit or vegetable was present, allowing us to interrogate top-down activity. We found that pattern-classification algorithms could be used to decode the detection target's identity in the left anterior temporal lobe (ATL), its shape in lateral occipital cortex, and its color in right V4. A novel decoding-dependency analysis revealed that identity information in left ATL was specifically predicted by the temporal convergence of shape and color codes in early visual regions. People with stronger feature-and-identity dependencies had more similar top-down and bottom-up activity patterns. These results fulfill three key requirements for a neural convergence zone: a convergence result (object identity), ingredients (color and shape), and the link between them. PMID:24692512

  20. node2vec: Scalable Feature Learning for Networks

    PubMed Central

    Grover, Aditya; Leskovec, Jure

    2016-01-01

    Prediction tasks over nodes and edges in networks require careful effort in engineering features used by learning algorithms. Recent research in the broader field of representation learning has led to significant progress in automating prediction by learning the features themselves. However, present feature learning approaches are not expressive enough to capture the diversity of connectivity patterns observed in networks. Here we propose node2vec, an algorithmic framework for learning continuous feature representations for nodes in networks. In node2vec, we learn a mapping of nodes to a low-dimensional space of features that maximizes the likelihood of preserving network neighborhoods of nodes. We define a flexible notion of a node’s network neighborhood and design a biased random walk procedure, which efficiently explores diverse neighborhoods. Our algorithm generalizes prior work which is based on rigid notions of network neighborhoods, and we argue that the added flexibility in exploring neighborhoods is the key to learning richer representations. We demonstrate the efficacy of node2vec over existing state-of-the-art techniques on multi-label classification and link prediction in several real-world networks from diverse domains. Taken together, our work represents a new way for efficiently learning state-of-the-art task-independent representations in complex networks. PMID:27853626

  1. Practical issues in quantum-key-distribution postprocessing

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.

    2010-01-01

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  2. Airborne electromagnetic detection of shallow seafloor topographic features, including resolution of multiple sub-parallel seafloor ridges

    NASA Astrophysics Data System (ADS)

    Vrbancich, Julian; Boyd, Graham

    2014-05-01

    The HoistEM helicopter time-domain electromagnetic (TEM) system was flown over waters in Backstairs Passage, South Australia, in 2003 to test the bathymetric accuracy and hence the ability to resolve seafloor structure in shallow and deeper waters (extending to ~40 m depth) that contain interesting seafloor topography. The topography that forms a rock peak (South Page) in the form of a mini-seamount that barely rises above the water surface was accurately delineated along its ridge from the start of its base (where the seafloor is relatively flat) in ~30 m water depth to its peak at the water surface, after an empirical correction was applied to the data to account for imperfect system calibration, consistent with earlier studies using the same HoistEM system. A much smaller submerged feature (Threshold Bank) of ~9 m peak height located in waters of 35 to 40 m depth was also accurately delineated. These observations when checked against known water depths in these two regions showed that the airborne TEM system, following empirical data correction, was effectively operating correctly. The third and most important component of the survey was flown over the Yatala Shoals region that includes a series of sub-parallel seafloor ridges (resembling large sandwaves rising up to ~20 m from the seafloor) that branch out and gradually decrease in height as the ridges spread out across the seafloor. These sub-parallel ridges provide an interesting topography because the interpreted water depths obtained from 1D inversion of TEM data highlight the limitations of the EM footprint size in resolving both the separation between the ridges (which vary up to ~300 m) and the height of individual ridges (which vary up to ~20 m), and possibly also the limitations of assuming a 1D model in areas where the topography is quasi-2D/3D.

  3. Unravelling Some of the Key Transformations in the Hydrothermal Liquefaction of Lignin.

    PubMed

    Lui, Matthew Y; Chan, Bun; Yuen, Alexander K L; Masters, Anthony F; Montoya, Alejandro; Maschmeyer, Thomas

    2017-05-22

    Using both experimental and computational methods, focusing on intermediates and model compounds, some of the main features of the reaction mechanisms that operate during the hydrothermal processing of lignin were elucidated. Key reaction pathways and their connection to different structural features of lignin were proposed. Under neutral conditions, subcritical water was demonstrated to act as a bifunctional acid/base catalyst for the dissection of lignin structures. In a complex web of mutually dependent interactions, guaiacyl units within lignin were shown to significantly affect overall lignin reactivity. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. The relationship between 2D static features and 2D dynamic features used in gait recognition

    NASA Astrophysics Data System (ADS)

    Alawar, Hamad M.; Ugail, Hassan; Kamala, Mumtaz; Connah, David

    2013-05-01

    In most gait recognition techniques, both static and dynamic features are used to define a subject's gait signature. In this study, the existence of a relationship between static and dynamic features was investigated. The correlation coefficient was used to analyse the relationship between the features extracted from the "University of Bradford Multi-Modal Gait Database". This study includes two dimensional dynamic and static features from 19 subjects. The dynamic features were compromised of Phase-Weighted Magnitudes driven by a Fourier Transform of the temporal rotational data of a subject's joints (knee, thigh, shoulder, and elbow). The results concluded that there are eleven pairs of features that are considered significantly correlated with (p<0.05). This result indicates the existence of a statistical relationship between static and dynamics features, which challenges the results of several similar studies. These results bare great potential for further research into the area, and would potentially contribute to the creation of a gait signature using latent data.

  5. AQUATOX Features and Tools

    EPA Pesticide Factsheets

    Numerous features have been included to facilitate the modeling process, from model setup and data input, presentation and analysis of results, to easy export of results to spreadsheet programs for additional analysis.

  6. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  7. Improved pulmonary nodule classification utilizing quantitative lung parenchyma features.

    PubMed

    Dilger, Samantha K N; Uthoff, Johanna; Judisch, Alexandra; Hammond, Emily; Mott, Sarah L; Smith, Brian J; Newell, John D; Hoffman, Eric A; Sieren, Jessica C

    2015-10-01

    Current computer-aided diagnosis (CAD) models for determining pulmonary nodule malignancy characterize nodule shape, density, and border in computed tomography (CT) data. Analyzing the lung parenchyma surrounding the nodule has been minimally explored. We hypothesize that improved nodule classification is achievable by including features quantified from the surrounding lung tissue. To explore this hypothesis, we have developed expanded quantitative CT feature extraction techniques, including volumetric Laws texture energy measures for the parenchyma and nodule, border descriptors using ray-casting and rubber-band straightening, histogram features characterizing densities, and global lung measurements. Using stepwise forward selection and leave-one-case-out cross-validation, a neural network was used for classification. When applied to 50 nodules (22 malignant and 28 benign) from high-resolution CT scans, 52 features (8 nodule, 39 parenchymal, and 5 global) were statistically significant. Nodule-only features yielded an area under the ROC curve of 0.918 (including nodule size) and 0.872 (excluding nodule size). Performance was improved through inclusion of parenchymal (0.938) and global features (0.932). These results show a trend toward increased performance when the parenchyma is included, coupled with the large number of significant parenchymal features that support our hypothesis: the pulmonary parenchyma is influenced differentially by malignant versus benign nodules, assisting CAD-based nodule characterizations.

  8. FaceTOON: a unified platform for feature-based cartoon expression generation

    NASA Astrophysics Data System (ADS)

    Zaharia, Titus; Marre, Olivier; Prêteux, Françoise; Monjaux, Perrine

    2008-02-01

    This paper presents the FaceTOON system, a semi-automatic platform dedicated to the creation of verbal and emotional facial expressions, within the applicative framework of 2D cartoon production. The proposed FaceTOON platform makes it possible to rapidly create 3D facial animations with a minimum amount of user interaction. In contrast with existing commercial 3D modeling softwares, which usually require from the users advanced 3D graphics skills and competences, the FaceTOON system is based exclusively on 2D interaction mechanisms, the 3D modeling stage being completely transparent for the user. The system takes as input a neutral 3D face model, free of any facial feature, and a set of 2D drawings, representing the desired facial features. A 2D/3D virtual mapping procedure makes it possible to obtain a ready-for-animation model which can be directly manipulated and deformed for generating expressions. The platform includes a complete set of dedicated tools for 2D/3D interactive deformation, pose management, key-frame interpolation and MPEG-4 compliant animation and rendering. The proposed FaceTOON system is currently considered for industrial evaluation and commercialization by the Quadraxis company.

  9. Public Key-Based Need-to-Know Authorization Engine Final Report CRADA No. TSB-1553-98

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mark, R.; Williams, R.

    The goals of this project were to develop a public key-based authentication service plug-in based on LLNL's requirements, integrate the public key-based authentication with the Intra Verse authorization service adn the LLNL NTK server by developing a full-featured version of the prototyped Intra Verse need-to-know plug in; and to test the authorization and need-to-know plug-in in a secured extranet prototype among selected national Labs.

  10. Psychological factors mediate key symptoms of fibromyalgia through their influence on stress.

    PubMed

    Malin, Katrina; Littlejohn, Geoffrey Owen

    2016-09-01

    The clinical features of fibromyalgia are associated with various psychological factors, including stress. We examined the hypothesis that the path that psychological factors follow in influencing fibromyalgia symptoms is through their direct effect on stress. Ninety-eight females with ACR 1990 classified fibromyalgia completed the following questionnaires: The Big 5 Personality Inventory, Fibromyalgia Impact Questionnaire, Perceived Stress Scale, Profile of Mood States, Mastery Scale, and Perceived Control of Internal States Scale. SPSS (PASW version 22) was used to perform basic t tests, means, and standard deviations to show difference between symptom characteristics. Pathway analysis using structural equation modelling (Laavan) examined the effect of stress on the relationships between psychological factors and the elements that define the fibromyalgia phenotype. The preferred model showed that the identified path clearly linked the psychological variables of anxiety, neuroticism and mastery, but not internal control, to the three key elements of fibromyalgia, namely pain, fatigue and sleep (p < 0.001), via the person's perceived stress. Confusion, however, did not fit the preferred model. This study confirms that stress is a necessary link in the pathway between certain identified, established and significant psychological factors and key fibromyalgia symptoms. This has implications for the understanding of contributing mechanisms and the clinical care of patients with fibromyalgia.

  11. An on-board pedestrian detection and warning system with features of side pedestrian

    NASA Astrophysics Data System (ADS)

    Cheng, Ruzhong; Zhao, Yong; Wong, ChupChung; Chan, KwokPo; Xu, Jiayao; Wang, Xin'an

    2012-01-01

    Automotive Active Safety(AAS) is the main branch of intelligence automobile study and pedestrian detection is the key problem of AAS, because it is related with the casualties of most vehicle accidents. For on-board pedestrian detection algorithms, the main problem is to balance efficiency and accuracy to make the on-board system available in real scenes, so an on-board pedestrian detection and warning system with the algorithm considered the features of side pedestrian is proposed. The system includes two modules, pedestrian detecting and warning module. Haar feature and a cascade of stage classifiers trained by Adaboost are first applied, and then HOG feature and SVM classifier are used to refine false positives. To make these time-consuming algorithms available in real-time use, a divide-window method together with operator context scanning(OCS) method are applied to increase efficiency. To merge the velocity information of the automotive, the distance of the detected pedestrian is also obtained, so the system could judge if there is a potential danger for the pedestrian in the front. With a new dataset captured in urban environment with side pedestrians on zebra, the embedded system and its algorithm perform an on-board available result on side pedestrian detection.

  12. Major features of immunesenescence, including reduced thymic output, are ameliorated by high levels of physical activity in adulthood.

    PubMed

    Duggal, Niharika Arora; Pollock, Ross D; Lazarus, Norman R; Harridge, Stephen; Lord, Janet M

    2018-04-01

    It is widely accepted that aging is accompanied by remodelling of the immune system including thymic atrophy and increased frequency of senescent T cells, leading to immune compromise. However, physical activity, which influences immunity but declines dramatically with age, is not considered in this literature. We assessed immune profiles in 125 adults (55-79 years) who had maintained a high level of physical activity (cycling) for much of their adult lives, 75 age-matched older adults and 55 young adults not involved in regular exercise. The frequency of naïve T cells and recent thymic emigrants (RTE) were both higher in cyclists compared with inactive elders, and RTE frequency in cyclists was no different to young adults. Compared with their less active counterparts, the cyclists had significantly higher serum levels of the thymoprotective cytokine IL-7 and lower IL-6, which promotes thymic atrophy. Cyclists also showed additional evidence of reduced immunesenescence, namely lower Th17 polarization and higher B regulatory cell frequency than inactive elders. Physical activity did not protect against all aspects of immunesenescence: CD28 -ve CD57 +ve senescent CD8 T-cell frequency did not differ between cyclists and inactive elders. We conclude that many features of immunesenescence may be driven by reduced physical activity with age. © 2018 The Authors. Aging Cell published by the Anatomical Society and John Wiley & Sons Ltd.

  13. Polycystic ovary syndrome: perceptions and attitudes of women and primary health care physicians on features of PCOS and renaming the syndrome.

    PubMed

    Teede, Helena; Gibson-Helm, Melanie; Norman, Robert J; Boyle, Jacqueline

    2014-01-01

    Polycystic ovary syndrome (PCOS) is an under-recognized, common, and complex endocrinopathy. The name PCOS is a misnomer, and there have been calls for a change to reflect the broader clinical syndrome. The aim of the study was to determine perceptions held by women and primary health care physicians around key clinical features of PCOS and attitudes toward current and alternative names for the syndrome. We conducted a cross-sectional study utilizing a devised questionnaire. Participants were recruited throughout Australia via professional associations, women's health organizations, and a PCOS support group. Fifty-seven women with PCOS and 105 primary care physicians participated in the study. Perceptions of key clinical PCOS features and attitudes toward current and alternative syndrome names were investigated. Irregular periods were identified as a key clinical feature of PCOS by 86% of the women with PCOS and 90% of the primary care physicians. In both groups, 60% also identified hormone imbalance as a key feature. Among women with PCOS, 47% incorrectly identified ovarian cysts as key, 48% felt the current name is confusing, and 51% supported a change. Most primary care physicians agreed that the name is confusing (74%) and needs changing (81%); however, opinions on specific alternative names were divided. The name "polycystic ovary syndrome" is perceived as confusing, and there is general support for a change to reflect the broader clinical syndrome. Engagement of primary health care physicians and consumers is strongly recommended to ensure that an alternative name enhances understanding and recognition of the syndrome and its complex features.

  14. Secure password-based authenticated key exchange for web services

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less

  15. Suppression effects in feature-based attention

    PubMed Central

    Wang, Yixue; Miller, James; Liu, Taosheng

    2015-01-01

    Attending to a feature enhances visual processing of that feature, but it is less clear what occurs to unattended features. Single-unit recording studies in middle temporal (MT) have shown that neuronal modulation is a monotonic function of the difference between the attended and neuron's preferred direction. Such a relationship should predict a monotonic suppressive effect in psychophysical performance. However, past research on suppressive effects of feature-based attention has remained inconclusive. We investigated the suppressive effect for motion direction, orientation, and color in three experiments. We asked participants to detect a weak signal among noise and provided a partially valid feature cue to manipulate attention. We measured performance as a function of the offset between the cued and signal feature. We also included neutral trials where no feature cues were presented to provide a baseline measure of performance. Across three experiments, we consistently observed enhancement effects when the target feature and cued feature coincided and suppression effects when the target feature deviated from the cued feature. The exact profile of suppression was different across feature dimensions: Whereas the profile for direction exhibited a “rebound” effect, the profiles for orientation and color were monotonic. These results demonstrate that unattended features are suppressed during feature-based attention, but the exact suppression profile depends on the specific feature. Overall, the results are largely consistent with neurophysiological data and support the feature-similarity gain model of attention. PMID:26067533

  16. Extraneuraxial Hemangioblastoma: Clinicopathologic Features and Review of the Literature.

    PubMed

    Bisceglia, Michele; Muscarella, Lucia A; Galliani, Carlos A; Zidar, Nina; Ben-Dor, David; Pasquinelli, Gianandrea; la Torre, Annamaria; Sparaneo, Angelo; Fanburg-Smith, Julie C; Lamovec, Janez; Michal, Michal; Bacchi, Carlos E

    2018-05-01

    Extraneuraxial hemangioblastoma occurs in nervous paraneuraxial structures, somatic tissues, and visceral organs, as part of von Hippel-Lindau disease (VHLD) or in sporadic cases. The VHL gene plausibly plays a key role in the initiation and tumorigenesis of both central nervous system and extraneuraxial hemangioblastoma, therefore, the underlying molecular and genetic mechanisms of the tumor growth are initially reviewed. The clinical criteria for the diagnosis of VHLD are summarized, with emphasis on the distinction of sporadic hemangioblastoma from the form fruste of VHLD (eg, hemangioblastoma-only VHLD). The world literature on the topic of extraneuraxial hemangioblastomas has been comprehensively reviewed with ∼200 cases reported to date: up to 140 paraneuraxial, mostly of proximal spinal nerve roots, and 65 peripheral, 15 of soft tissue, 6 peripheral nerve, 5 bone, and 39 of internal viscera, including 26 renal and 13 nonrenal. A handful of possible yet uncertain cases from older literature are not included in this review. The clinicopathologic features of extraneuraxial hemangioblastoma are selectively presented by anatomic site of origin, and the differential diagnosis is emphasized in these subsets. Reference is made also to 10 of the authors' personal cases of extraneuraxial hemangioblastomas, which include 4 paraneuraxial and 6 peripheral (2 soft tissue hemangioblastoma and 4 renal).

  17. Key Principles of Superfund Remedy Selection

    EPA Pesticide Factsheets

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  18. Feature highlighting enhances learning of a complex natural-science category.

    PubMed

    Miyatsu, Toshiya; Gouravajhala, Reshma; Nosofsky, Robert M; McDaniel, Mark A

    2018-04-26

    Learning naturalistic categories, which tend to have fuzzy boundaries and vary on many dimensions, can often be harder than learning well defined categories. One method for facilitating the category learning of naturalistic stimuli may be to provide explicit feature descriptions that highlight the characteristic features of each category. Although this method is commonly used in textbooks and classrooms, theoretically it remains uncertain whether feature descriptions should advantage learning complex natural-science categories. In three experiments, participants were trained on 12 categories of rocks, either without or with a brief description highlighting key features of each category. After training, they were tested on their ability to categorize both old and new rocks from each of the categories. Providing feature descriptions as a caption under a rock image failed to improve category learning relative to providing only the rock image with its category label (Experiment 1). However, when these same feature descriptions were presented such that they were explicitly linked to the relevant parts of the rock image (feature highlighting), participants showed significantly higher performance on both immediate generalization to new rocks (Experiment 2) and generalization after a 2-day delay (Experiment 3). Theoretical and practical implications are discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  19. Geomorphometric multi-scale analysis for the recognition of Moon surface features using multi-resolution DTMs

    NASA Astrophysics Data System (ADS)

    Li, Ke; Chen, Jianping; Sofia, Giulia; Tarolli, Paolo

    2014-05-01

    Moon surface features have great significance in understanding and reconstructing the lunar geological evolution. Linear structures like rilles and ridges are closely related to the internal forced tectonic movement. The craters widely distributed on the moon are also the key research targets for external forced geological evolution. The extremely rare availability of samples and the difficulty for field works make remote sensing the most important approach for planetary studies. New and advanced lunar probes launched by China, U.S., Japan and India provide nowadays a lot of high-quality data, especially in the form of high-resolution Digital Terrain Models (DTMs), bringing new opportunities and challenges for feature extraction on the moon. The aim of this study is to recognize and extract lunar features using geomorphometric analysis based on multi-scale parameters and multi-resolution DTMs. The considered digital datasets include CE1-LAM (Chang'E One, Laser AltiMeter) data with resolution of 500m/pix, LRO-WAC (Lunar Reconnaissance Orbiter, Wide Angle Camera) data with resolution of 100m/pix, LRO-LOLA (Lunar Reconnaissance Orbiter, Lunar Orbiter Laser Altimeter) data with resolution of 60m/pix, and LRO-NAC (Lunar Reconnaissance Orbiter, Narrow Angle Camera) data with resolution of 2-5m/pix. We considered surface derivatives to recognize the linear structures including Rilles and Ridges. Different window scales and thresholds for are considered for feature extraction. We also calculated the roughness index to identify the erosion/deposits area within craters. The results underline the suitability of the adopted methods for feature recognition on the moon surface. The roughness index is found to be a useful tool to distinguish new craters, with higher roughness, from the old craters, which present a smooth and less rough surface.

  20. Vertical Feature Mask Feature Classification Flag Extraction

    Atmospheric Science Data Center

    2013-03-28

      Vertical Feature Mask Feature Classification Flag Extraction This routine demonstrates extraction of the ... in a CALIPSO Lidar Level 2 Vertical Feature Mask feature classification flag value. It is written in Interactive Data Language (IDL) ...

  1. Diptera of forensic importance in the Iberian Peninsula: larval identification key.

    PubMed

    Velásquez, Y; Magaña, C; Martínez-Sánchez, A; Rojo, S

    2010-09-01

    A revision of the species and families of sarcosaprophagous flies (Diptera: Calliphoridae, Sarcophagidae, Muscidae, Fanniidae, Drosophilidae, Phoridae, Piophilidae and Stratiomyidae) suitable for forensic purposes in the Iberian Peninsula is presented. Morphological characteristics that allow the accurate identification of third instars of the species present in the Iberian Peninsula are described and presented in the form of a diagnostic key. For larval Calliphoridae, characteristics such as the spines of the body segments were useful for the genus Calliphora whereas features of the anal segment and the cephalopharyngeal skeleton were useful for larvae of Lucilia. Identification of three Chrysominae species present in the Iberian Peninsula is included. For larval Sarcophagidae, characters such as the arrangement and shape of spiracular openings, structures of the anal segment and the cephalopharyngeal skeleton were used for the first time. A new record of Sarcophaga cultellata Pandellé, from a human corpse, is also included as well as recent incursions into the European cadaveric entomofauna such as Synthesiomyia nudiseta (van der Wulp) and Hermetia illucens (Linnaeus). This work provides useful new information that could be applied to forensic investigations in the Iberian Peninsula and in southern Europe.

  2. Robust Feature Matching in Terrestrial Image Sequences

    NASA Astrophysics Data System (ADS)

    Abbas, A.; Ghuffar, S.

    2018-04-01

    From the last decade, the feature detection, description and matching techniques are most commonly exploited in various photogrammetric and computer vision applications, which includes: 3D reconstruction of scenes, image stitching for panoramic creation, image classification, or object recognition etc. However, in terrestrial imagery of urban scenes contains various issues, which include duplicate and identical structures (i.e. repeated windows and doors) that cause the problem in feature matching phase and ultimately lead to failure of results specially in case of camera pose and scene structure estimation. In this paper, we will address the issue related to ambiguous feature matching in urban environment due to repeating patterns.

  3. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  4. Extraction and representation of common feature from uncertain facial expressions with cloud model.

    PubMed

    Wang, Shuliang; Chi, Hehua; Yuan, Hanning; Geng, Jing

    2017-12-01

    Human facial expressions are key ingredient to convert an individual's innate emotion in communication. However, the variation of facial expressions affects the reliable identification of human emotions. In this paper, we present a cloud model to extract facial features for representing human emotion. First, the uncertainties in facial expression are analyzed in the context of cloud model. The feature extraction and representation algorithm is established under cloud generators. With forward cloud generator, facial expression images can be re-generated as many as we like for visually representing the extracted three features, and each feature shows different roles. The effectiveness of the computing model is tested on Japanese Female Facial Expression database. Three common features are extracted from seven facial expression images. Finally, the paper is concluded and remarked.

  5. A novel content-based medical image retrieval method based on query topic dependent image features (QTDIF)

    NASA Astrophysics Data System (ADS)

    Xiong, Wei; Qiu, Bo; Tian, Qi; Mueller, Henning; Xu, Changsheng

    2005-04-01

    Medical image retrieval is still mainly a research domain with a large variety of applications and techniques. With the ImageCLEF 2004 benchmark, an evaluation framework has been created that includes a database, query topics and ground truth data. Eleven systems (with a total of more than 50 runs) compared their performance in various configurations. The results show that there is not any one feature that performs well on all query tasks. Key to successful retrieval is rather the selection of features and feature weights based on a specific set of input features, thus on the query task. In this paper we propose a novel method based on query topic dependent image features (QTDIF) for content-based medical image retrieval. These feature sets are designed to capture both inter-category and intra-category statistical variations to achieve good retrieval performance in terms of recall and precision. We have used Gaussian Mixture Models (GMM) and blob representation to model medical images and construct the proposed novel QTDIF for CBIR. Finally, trained multi-class support vector machines (SVM) are used for image similarity ranking. The proposed methods have been tested over the Casimage database with around 9000 images, for the given 26 image topics, used for imageCLEF 2004. The retrieval performance has been compared with the medGIFT system, which is based on the GNU Image Finding Tool (GIFT). The experimental results show that the proposed QTDIF-based CBIR can provide significantly better performance than systems based general features only.

  6. A zebrafish model of PINK1 deficiency reveals key pathway dysfunction including HIF signaling.

    PubMed

    Priyadarshini, M; Tuimala, J; Chen, Y C; Panula, P

    2013-06-01

    The PTEN induced putative kinase 1 (PINK1) gene is mutated in patients with hereditary early onset Parkinson's disease (PD). The targets of PINK1 and the mechanisms in PD are still not fully understood. Here, we carried out a high-throughput and unbiased microarray study to identify novel functions and pathways for PINK1. In larval zebrafish, the function of pink1 was inhibited using splice-site morpholino oligonucleotides and the samples were hybridized on a two-color gene expression array. We found 177 significantly altered genes in pink1 morphants compared with the uninjected wildtype controls (log fold change values from -1.6 to +0.9). The five most prominent pathways based on critical biological processes and key toxicological responses were hypoxia-inducible factor (HIF) signaling, TGF-β signaling, mitochondrial dysfunction, RAR activation, and biogenesis of mitochondria. Furthermore, we verified that potentially important genes such as hif1α, catalase, SOD3, and atp1a2a were downregulated in pink1 morphants, whereas genes such as fech, pax2a, and notch1a were upregulated. Some of these genes have been found to play important roles in HIF signaling pathways. The pink1 morphants were found to have heart dysfunction, increased erythropoiesis, increased expression of vascular endothelial growth factors, and increased ROS. Our findings suggest that a lack of pink1 in zebrafish alters many vital and critical pathways in addition to the HIF signaling pathway. Copyright © 2013 Elsevier Inc. All rights reserved.

  7. A Simplified Approach to Encephalitis and Its Mimics: Key Clinical Decision Points in the Setting of Specific Imaging Abnormalities.

    PubMed

    McKnight, Colin D; Kelly, Aine M; Petrou, Myria; Nidecker, Anna E; Lorincz, Matthew T; Altaee, Duaa K; Gebarski, Stephen S; Foerster, Bradley

    2017-06-01

    Infectious encephalitis is a relatively common cause of morbidity and mortality. Treatment of infectious encephalitis with antiviral medication can be highly effective when administered promptly. Clinical mimics of encephalitis arise from a broad range of pathologic processes, including toxic, metabolic, neoplastic, autoimmune, and cardiovascular etiologies. These mimics need to be rapidly differentiated from infectious encephalitis to appropriately manage the correct etiology; however, the many overlapping signs of these various entities present a challenge to accurate diagnosis. A systematic approach that considers both the clinical manifestations and the imaging findings of infectious encephalitis and its mimics can contribute to more accurate and timely diagnosis. Following an institutional review board approval, a health insurance portability and accountability act (HIPAA)-compliant search of our institutional imaging database (teaching files) was conducted to generate a list of adult and pediatric patients who presented between January 1, 1995 and October 10, 2013 for imaging to evaluate possible cases of encephalitis. Pertinent medical records, including clinical notes as well as surgical and pathology reports, were reviewed and correlated with imaging findings. Clinical and imaging findings were combined to generate useful flowcharts designed to assist in distinguishing infectious encephalitis from its mimics. Key imaging features were reviewed and were placed in the context of the provided flowcharts. Four flowcharts were presented based on the primary anatomic site of imaging abnormality: group 1: temporal lobe; group 2: cerebral cortex; group 3: deep gray matter; and group 4: white matter. An approach that combines features on clinical presentation was then detailed. Imaging examples were used to demonstrate similarities and key differences. Early recognition of infectious encephalitis is critical, but can be quite complex due to diverse pathologies and

  8. Skin image retrieval using Gabor wavelet texture feature.

    PubMed

    Ou, X; Pan, W; Zhang, X; Xiao, P

    2016-12-01

    Skin imaging plays a key role in many clinical studies. We have used many skin imaging techniques, including the recently developed capacitive contact skin imaging based on fingerprint sensors. The aim of this study was to develop an effective skin image retrieval technique using Gabor wavelet transform, which can be used on different types of skin images, but with a special focus on skin capacitive contact images. Content-based image retrieval (CBIR) is a useful technology to retrieve stored images from database by supplying query images. In a typical CBIR, images are retrieved based on colour, shape, texture, etc. In this study, texture feature is used for retrieving skin images, and Gabor wavelet transform is used for texture feature description and extraction. The results show that the Gabor wavelet texture features can work efficiently on different types of skin images. Although Gabor wavelet transform is slower compared with other image retrieval techniques, such as principal component analysis (PCA) and grey-level co-occurrence matrix (GLCM), Gabor wavelet transform is the best for retrieving skin capacitive contact images and facial images with different orientations. Gabor wavelet transform can also work well on facial images with different expressions and skin cancer/disease images. We have developed an effective skin image retrieval method based on Gabor wavelet transform, that it is useful for retrieving different types of images, namely digital colour face images, digital colour skin cancer and skin disease images, and particularly greyscale skin capacitive contact images. Gabor wavelet transform can also be potentially useful for face recognition (with different orientation and expressions) and skin cancer/disease diagnosis. © 2016 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  9. Key to trematodes reported in waterfowl

    USGS Publications Warehouse

    McDonald, Malcolm Edwin

    1981-01-01

    The trematodes show the greatest variety of forms among the helminth parasites of waterfowl, including over half of all species reported; sometimes this group also includes the greatest part of the worms in a single bird. Over 500 species of trematodes have been reported in waterfowl. Almost all of these have been included in the present set of keys; it was not possible, however, to obtain the descriptions of a few forms (7 of 525).

  10. Low cost, small form factor, and integration as the key features for the optical component industry takeoff

    NASA Astrophysics Data System (ADS)

    Schiattone, Francesco; Bonino, Stefano; Gobbi, Luigi; Groppi, Angelamaria; Marazzi, Marco; Musio, Maurizio

    2003-04-01

    In the past the optical component market has been mainly driven by performances. Today, as the number of competitors has drastically increased, the system integrators have a wide range of possible suppliers and solutions giving them the possibility to be more focused on cost and also on footprint reduction. So, if performances are still essential, low cost and Small Form Factor issues are becoming more and more crucial in selecting components. Another evolution in the market is the current request of the optical system companies to simplify the supply chain in order to reduce the assembling and testing steps at system level. This corresponds to a growing demand in providing subassemblies, modules or hybrid integrated components: that means also Integration will be an issue in which all the optical component companies will compete to gain market shares. As we can see looking several examples offered by electronic market, to combine low cost and SFF is a very challenging task but Integration can help in achieving both features. In this work we present how these issues could be approached giving examples of some advanced solutions applied to LiNbO3 modulators. In particular we describe the progress made on automation, new materials and low cost fabrication methods for the parts. We also introduce an approach in integrating optical and electrical functionality on LiNbO3 modulators including RF driver, bias control loop, attenuator and photodiode integrated in a single device.

  11. Prediction of interface residue based on the features of residue interaction network.

    PubMed

    Jiao, Xiong; Ranganathan, Shoba

    2017-11-07

    Protein-protein interaction plays a crucial role in the cellular biological processes. Interface prediction can improve our understanding of the molecular mechanisms of the related processes and functions. In this work, we propose a classification method to recognize the interface residue based on the features of a weighted residue interaction network. The random forest algorithm is used for the prediction and 16 network parameters and the B-factor are acting as the element of the input feature vector. Compared with other similar work, the method is feasible and effective. The relative importance of these features also be analyzed to identify the key feature for the prediction. Some biological meaning of the important feature is explained. The results of this work can be used for the related work about the structure-function relationship analysis via a residue interaction network model. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Composite, ordered material having sharp surface features

    DOEpatents

    D'Urso, Brian R.; Simpson, John T.

    2006-12-19

    A composite material having sharp surface features includes a recessive phase and a protrusive phase, the recessive phase having a higher susceptibility to a preselected etchant than the protrusive phase, the composite material having an etched surface wherein the protrusive phase protrudes from the surface to form a sharp surface feature. The sharp surface features can be coated to make the surface super-hydrophobic.

  13. FSR: feature set reduction for scalable and accurate multi-class cancer subtype classification based on copy number.

    PubMed

    Wong, Gerard; Leckie, Christopher; Kowalczyk, Adam

    2012-01-15

    Feature selection is a key concept in machine learning for microarray datasets, where features represented by probesets are typically several orders of magnitude larger than the available sample size. Computational tractability is a key challenge for feature selection algorithms in handling very high-dimensional datasets beyond a hundred thousand features, such as in datasets produced on single nucleotide polymorphism microarrays. In this article, we present a novel feature set reduction approach that enables scalable feature selection on datasets with hundreds of thousands of features and beyond. Our approach enables more efficient handling of higher resolution datasets to achieve better disease subtype classification of samples for potentially more accurate diagnosis and prognosis, which allows clinicians to make more informed decisions in regards to patient treatment options. We applied our feature set reduction approach to several publicly available cancer single nucleotide polymorphism (SNP) array datasets and evaluated its performance in terms of its multiclass predictive classification accuracy over different cancer subtypes, its speedup in execution as well as its scalability with respect to sample size and array resolution. Feature Set Reduction (FSR) was able to reduce the dimensions of an SNP array dataset by more than two orders of magnitude while achieving at least equal, and in most cases superior predictive classification performance over that achieved on features selected by existing feature selection methods alone. An examination of the biological relevance of frequently selected features from FSR-reduced feature sets revealed strong enrichment in association with cancer. FSR was implemented in MATLAB R2010b and is available at http://ww2.cs.mu.oz.au/~gwong/FSR.

  14. An Analysis of the Contents and Pedagogy of Al-Kashi's 1427 "Key to Arithmetic" (Miftah Al-Hisab)

    ERIC Educational Resources Information Center

    Ta'ani, Osama Hekmat

    2011-01-01

    Al-Kashi's 1427 "Key to Arithmetic" had important use over several hundred years in mathematics teaching in Medieval Islam throughout the time of the Ottoman Empire. Its pedagogical features have never been studied before. In this dissertation I have made a close pedagogical analysis of these features and discovered several teaching…

  15. Global sustainability and key needs in future automotive design.

    PubMed

    McAuley, John W

    2003-12-01

    The number of light vehicle registrations is forecast to increase worldwide by a factor of 3-5 over the next 50 years. This will dramatically increase environmental impacts worldwide of automobiles and light trucks. If light vehicles are to be environmentally sustainable globally, the automotive industry must implement fundamental changes in future automotive design. Important factors in assessing automobile design needs include fuel economy and reduced emissions. Many design parameters can impact vehicle air emissions and energy consumption including alternative fuel or engine technologies, rolling resistance, aerodynamics, drive train design, friction, and vehicle weight. Of these, vehicle weight is key and will translate into reduced energy demand across all energy distribution elements. A new class of vehicles is needed that combines ultra-light design with a likely hybrid or fuel cell engine technology. This could increase efficiency by a factor of 3-5 and reduce air emissions as well. Advanced lightweight materials, such as plastics or composites, will need to overtake the present metal-based infrastructure. Incorporating design features to facilitate end-of-life recycling and recovery is also important. The trend will be towards fewer materials and parts in vehicle design, combined with ease of disassembly. Mono-material construction can create vehicle design with improved recyclability as well as reduced numbers of parts and weight.

  16. Quantum key distribution protocol based on contextuality monogamy

    NASA Astrophysics Data System (ADS)

    Singh, Jaskaran; Bharti, Kishor; Arvind

    2017-06-01

    The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.

  17. Benthic boundary layer processes in the Lower Florida Keys

    USGS Publications Warehouse

    Lavoie, D.L.; Richardson, M.D.; Holmes, C.

    1997-01-01

    This special issue of Geo-Marine Letters, "Benthic Boundary Layer Processes in the Lower Florida Keys," includes 12 papers that present preliminary results from the Key West Campaign. The Dry Tortugas and Marquesas Keys test sites were selected by a group of 115 scientists and technicians to study benthic boundary layer processes in a carbonate environment controlled by bioturbation and biogeochemical processes. Major activities included remote sediment classification; high-frequency acoustic scattering experiments; sediment sampling for radiological, geotechnical, biological, biogeochemical, physical, and geoacoustic studies; and hydrodynamic studies using an instrumented tetrapod. All these data are being used to improve our understanding of the effects of environmental processes on sediment structure and behavior.

  18. Use of Natural and Nature-Based Features for Coastal Resilience

    NASA Astrophysics Data System (ADS)

    Piercy, C.; Bridges, T. S.

    2017-12-01

    Natural and Nature-Based Features (NNBF) have been used for decades to support a variety of objectives in coastal systems. Beach and dune projects have been a longstanding part of flood risk reduction strategies in Europe, the United States and elsewhere. Coastal restoration projects supporting wetlands, seagrass, oysters and other habitats and communities have been undertaken around the world to restore ecosystem functions. In more recent years there has been a growing interest in developing a technically sound engineering approach for integrating NNBF, in combination with conventional flood defense systems (e.g., levees, seawalls, etc.), for more comprehensive and sustainable flood defense systems. This interest was further stimulated by the outcomes of recent storm events, including Hurricanes Katrina and Sandy in the United States, which have given rise to a range of studies and projects focused on the role of coastal landscape features in flood risk management. The global dialogue that has been underway for several years—including within the Engineering with Nature program in the United States—has revealed the demand for an authoritative guidance on the use of NNBF in shoreline management. The U.S. Army Corps of Engineers has initiated a collaborative project involving participants from several countries and organizations representing government, academia, and the private sector to develop international guidelines to inform the planning, design, construction, and operation or NNBF projects to support coastal resilience. This paper will describe the key issues and objectives informing the work of the international team that is developing the guidelines.

  19. Key Features of the National Polar-Orbiting Operational Environmental Satellite System (NPOESS) System Architecture

    NASA Astrophysics Data System (ADS)

    Pela, F.; Tsugawa, R. K.; Andreoli, L. J.

    2004-12-01

    The National Polar-Orbiting NPOESS, a tri-agency program, supports missions of the Department of Commerce (DOC)/National Oceanic and Atmospheric Administration (NOAA), the Department of Defense (DoD), and the National Aeronautics and Space Administration (NASA). NPOESS provides a critical, timely, reliable, and high quality space-based sensing capability to acquire and process global and regional environmental imagery and specialized meteorological, climatic, terrestrial, oceanographic, solar-geophysical, and other data products. These products are delivered to national weather and environmental facilities operated by NOAA and DoD, to NASA, and to environmental remote sensing science community users to support civil and military functions. These data are also provided in real time to field terminals deployed worldwide. The NPOESS architecture is built on a foundation of affordability, and the three pillars of data quality, latency, availability. Affordability refers to an over-arching awareness of cost to provide the best value to the government for implementing a converged system; some dimensions of cost include the cost for system development and implementation, the balance between development costs and operation and maintenance costs, and the fiscal year expenditure plans that meet schedule commitments. Data quality is characterized in terms of the attributes associated with Environmental Data Records (EDRs), and the products that are delivered to the four US Operational Centrals and field users. These EDRs are generated by the system using raw data from the space-borne sensors and spacecraft, in conjunction with science algorithms and calibration factors. Data latency refers to the time period between the detection of energy by a space-borne sensor to the delivery of a corresponding EDR. The system was designed to minimize data latency, and hence provide users with timely data. Availability refers to both data availability and system operational availability

  20. Getting Ready for the "School of the Future": Key Questions and Tentative Answers

    NASA Astrophysics Data System (ADS)

    Ott, Michela; Pozzi, Francesca

    This paper explores some key aspects of "today's school", as opposed to those that have characterized "yesterday's school", with the final aim of shedding light on "tomorrow's school". In this direction, the paper puts forward tentative answers to some key questions related to the new characteristics and roles of teachers and students (main actors of the learning process) and the new features/ potentialities of contemporary educational tools which, in turn, require the enactment of innovative pedagogical approaches and educational methods. The emerging picture of the present learning landscape helps in figuring out a future situation where learning possibilities are substantially increased.

  1. Parametric Human Body Reconstruction Based on Sparse Key Points.

    PubMed

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  2. What vehicle features are considered important when buying an automobile? An examination of driver preferences by age and gender.

    PubMed

    Vrkljan, Brenda H; Anaby, Dana

    2011-02-01

    Certain vehicle features can help drivers avoid collisions and/or protect occupants in the event of a crash, and therefore, might play an important role when deciding which vehicle to purchase. The objective of this study was to examine the importance attributed to key vehicle features (including safety) that drivers consider when buying a car and its association with age and gender. A sample of 2,002 Canadian drivers aged 18 years and older completed a survey that asked them to rank the importance of eight vehicle features if they were to purchase a vehicle (storage, mileage, safety, price, comfort, performance, design, and reliability). ANOVA tests were performed to: (a) determine if there were differences in the level of importance between features and; (b) examine the effect of age and gender on the importance attributed to these features. Of the features examined, safety and reliability were the most highly rated in terms of importance, whereas design and performance had the lowest rating. Differences in safety and performance across age groups were dependent on gender. This effect was most evident in the youngest and oldest age groups. Safety and reliability were considered the most important features. Age and gender play a significant role in explaining the importance of certain features. Targeted efforts for translating safety-related information to the youngest and oldest consumers should be emphasized due to their high collision, injury, and fatality rates. Copyright © 2011 National Safety Council and Elsevier Ltd. All rights reserved.

  3. Unconscious analyses of visual scenes based on feature conjunctions.

    PubMed

    Tachibana, Ryosuke; Noguchi, Yasuki

    2015-06-01

    To efficiently process a cluttered scene, the visual system analyzes statistical properties or regularities of visual elements embedded in the scene. It is controversial, however, whether those scene analyses could also work for stimuli unconsciously perceived. Here we show that our brain performs the unconscious scene analyses not only using a single featural cue (e.g., orientation) but also based on conjunctions of multiple visual features (e.g., combinations of color and orientation information). Subjects foveally viewed a stimulus array (duration: 50 ms) where 4 types of bars (red-horizontal, red-vertical, green-horizontal, and green-vertical) were intermixed. Although a conscious perception of those bars was inhibited by a subsequent mask stimulus, the brain correctly analyzed the information about color, orientation, and color-orientation conjunctions of those invisible bars. The information of those features was then used for the unconscious configuration analysis (statistical processing) of the central bars, which induced a perceptual bias and illusory feature binding in visible stimuli at peripheral locations. While statistical analyses and feature binding are normally 2 key functions of the visual system to construct coherent percepts of visual scenes, our results show that a high-level analysis combining those 2 functions is correctly performed by unconscious computations in the brain. (c) 2015 APA, all rights reserved).

  4. Stereoscopic Feature Tracking System for Retrieving Velocity of Surface Waters

    NASA Astrophysics Data System (ADS)

    Zuniga Zamalloa, C. C.; Landry, B. J.

    2017-12-01

    The present work is concerned with the surface velocity retrieval of flows using a stereoscopic setup and finding the correspondence in the images via feature tracking (FT). The feature tracking provides a key benefit of substantially reducing the level of user input. In contrast to other commonly used methods (e.g., normalized cross-correlation), FT does not require the user to prescribe interrogation window sizes and removes the need for masking when specularities are present. The results of the current FT methodology are comparable to those obtained via Large Scale Particle Image Velocimetry while requiring little to no user input which allowed for rapid, automated processing of imagery.

  5. Saliency image of feature building for image quality assessment

    NASA Astrophysics Data System (ADS)

    Ju, Xinuo; Sun, Jiyin; Wang, Peng

    2011-11-01

    The purpose and method of image quality assessment are quite different for automatic target recognition (ATR) and traditional application. Local invariant feature detectors, mainly including corner detectors, blob detectors and region detectors etc., are widely applied for ATR. A saliency model of feature was proposed to evaluate feasibility of ATR in this paper. The first step consisted of computing the first-order derivatives on horizontal orientation and vertical orientation, and computing DoG maps in different scales respectively. Next, saliency images of feature were built based auto-correlation matrix in different scale. Then, saliency images of feature of different scales amalgamated. Experiment were performed on a large test set, including infrared images and optical images, and the result showed that the salient regions computed by this model were consistent with real feature regions computed by mostly local invariant feature extraction algorithms.

  6. Seven Keys to Successful Study.

    ERIC Educational Resources Information Center

    Edwards, Peter

    Written for secondary, technical, and technical and further education (TAFE) students, this book aims to make learning easier and more enjoyable by showing students how to use a series of basic study skills called "keys." The book offers an explanation, examples, graphic illustrations, and activities for each skill. Chapters include: (1)…

  7. Featured Molecules: Ascorbic Acid and Methylene Blue

    NASA Astrophysics Data System (ADS)

    Coleman, William F.; Wildman, Randall J.

    2003-05-01

    The WebWare molecules of the month for May are featured in several articles in this issue. "Arsenic: Not So Evil After All?" discusses the pharmaceutical uses of methylene blue and its development as the first synthetic drug used against a specific disease. The JCE Classroom Activity "Out of the Blue" and the article "Greening the Blue Bottle" feature methylene blue and ascorbic acid as two key ingredients in the formulation of the blue bottle. You can also see a colorful example of these two molecules in action on the cover. "Sailing on the 'C': A Vitamin Titration with a Twist" describes an experiment to determine the vitamin C (ascorbic acid) content of citrus fruits and challenges students, as eighteenth-century sea captains, to decide the best fruit to take on a long voyage. Fully manipulable (Chime) versions of these and other molecules are available at Only@JCE Online.

  8. A new method for generating an invariant iris private key based on the fuzzy vault system.

    PubMed

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  9. The application of feature selection to the development of Gaussian process models for percutaneous absorption.

    PubMed

    Lam, Lun Tak; Sun, Yi; Davey, Neil; Adams, Rod; Prapopoulou, Maria; Brown, Marc B; Moss, Gary P

    2010-06-01

    The aim was to employ Gaussian processes to assess mathematically the nature of a skin permeability dataset and to employ these methods, particularly feature selection, to determine the key physicochemical descriptors which exert the most significant influence on percutaneous absorption, and to compare such models with established existing models. Gaussian processes, including automatic relevance detection (GPRARD) methods, were employed to develop models of percutaneous absorption that identified key physicochemical descriptors of percutaneous absorption. Using MatLab software, the statistical performance of these models was compared with single linear networks (SLN) and quantitative structure-permeability relationships (QSPRs). Feature selection methods were used to examine in more detail the physicochemical parameters used in this study. A range of statistical measures to determine model quality were used. The inherently nonlinear nature of the skin data set was confirmed. The Gaussian process regression (GPR) methods yielded predictive models that offered statistically significant improvements over SLN and QSPR models with regard to predictivity (where the rank order was: GPR > SLN > QSPR). Feature selection analysis determined that the best GPR models were those that contained log P, melting point and the number of hydrogen bond donor groups as significant descriptors. Further statistical analysis also found that great synergy existed between certain parameters. It suggested that a number of the descriptors employed were effectively interchangeable, thus questioning the use of models where discrete variables are output, usually in the form of an equation. The use of a nonlinear GPR method produced models with significantly improved predictivity, compared with SLN or QSPR models. Feature selection methods were able to provide important mechanistic information. However, it was also shown that significant synergy existed between certain parameters, and as such it

  10. Ecosystem features determine seagrass community response to sea otter foraging

    USGS Publications Warehouse

    Hessing-Lewis, Margot; Rechsteiner, Erin U.; Hughes, Brent B.; Tinker, M. Tim; Monteith, Zachary L.; Olson, Angeleen M.; Henderson, Matthew Morgan; Watson, Jane C.

    2017-01-01

    Comparing sea otter recovery in California (CA) and British Columbia (BC) reveals key ecosystem properties that shape top-down effects in seagrass communities. We review potential ecosystem drivers of sea otter foraging in CA and BC seagrass beds, including the role of coastline complexity and environmental stress on sea otter effects. In BC, we find greater species richness across seagrass trophic assemblages. Furthermore, Cancer spp. crabs, an important link in the seagrass trophic cascade observed in CA, are less common. Additionally, the more recent reintroduction of sea otters, more complex coastline, and reduced environmental stress in BC seagrass habitats supports the hypotheses that sea otter foraging pressure is currently reduced there. In order to manage the ecosystem features that lead to regional differences in top predator effects in seagrass communities, we review our findings, their spatial and temporal constraints, and present a social-ecological framework for future research.

  11. Nanoparticles for Cardiovascular Imaging and Therapeutic Delivery, Part 1: Compositions and Features.

    PubMed

    Stendahl, John C; Sinusas, Albert J

    2015-10-01

    Imaging agents made from nanoparticles are functionally versatile and have unique properties that may translate to clinical utility in several key cardiovascular imaging niches. Nanoparticles exhibit size-based circulation, biodistribution, and elimination properties different from those of small molecules and microparticles. In addition, nanoparticles provide versatile platforms that can be engineered to create both multimodal and multifunctional imaging agents with tunable properties. With these features, nanoparticulate imaging agents can facilitate fusion of high-sensitivity and high-resolution imaging modalities and selectively bind tissues for targeted molecular imaging and therapeutic delivery. Despite their intriguing attributes, nanoparticulate imaging agents have thus far achieved only limited clinical use. The reasons for this restricted advancement include an evolving scope of applications, the simplicity and effectiveness of existing small-molecule agents, pharmacokinetic limitations, safety concerns, and a complex regulatory environment. This review describes general features of nanoparticulate imaging agents and therapeutics and discusses challenges associated with clinical translation. A second, related review to appear in a subsequent issue of JNM highlights nuclear-based nanoparticulate probes in preclinical cardiovascular imaging. © 2015 by the Society of Nuclear Medicine and Molecular Imaging, Inc.

  12. An ICA-based method for the identification of optimal FMRI features and components using combined group-discriminative techniques

    PubMed Central

    Sui, Jing; Adali, Tülay; Pearlson, Godfrey D.; Calhoun, Vince D.

    2013-01-01

    Extraction of relevant features from multitask functional MRI (fMRI) data in order to identify potential biomarkers for disease, is an attractive goal. In this paper, we introduce a novel feature-based framework, which is sensitive and accurate in detecting group differences (e.g. controls vs. patients) by proposing three key ideas. First, we integrate two goal-directed techniques: coefficient-constrained independent component analysis (CC-ICA) and principal component analysis with reference (PCA-R), both of which improve sensitivity to group differences. Secondly, an automated artifact-removal method is developed for selecting components of interest derived from CC-ICA, with an average accuracy of 91%. Finally, we propose a strategy for optimal feature/component selection, aiming to identify optimal group-discriminative brain networks as well as the tasks within which these circuits are engaged. The group-discriminating performance is evaluated on 15 fMRI feature combinations (5 single features and 10 joint features) collected from 28 healthy control subjects and 25 schizophrenia patients. Results show that a feature from a sensorimotor task and a joint feature from a Sternberg working memory (probe) task and an auditory oddball (target) task are the top two feature combinations distinguishing groups. We identified three optimal features that best separate patients from controls, including brain networks consisting of temporal lobe, default mode and occipital lobe circuits, which when grouped together provide improved capability in classifying group membership. The proposed framework provides a general approach for selecting optimal brain networks which may serve as potential biomarkers of several brain diseases and thus has wide applicability in the neuroimaging research community. PMID:19457398

  13. Orientation-sensitivity to facial features explains the Thatcher illusion.

    PubMed

    Psalta, Lilia; Young, Andrew W; Thompson, Peter; Andrews, Timothy J

    2014-10-09

    The Thatcher illusion provides a compelling example of the perceptual cost of face inversion. The Thatcher illusion is often thought to result from a disruption to the processing of spatial relations between face features. Here, we show the limitations of this account and instead demonstrate that the effect of inversion in the Thatcher illusion is better explained by a disruption to the processing of purely local facial features. Using a matching task, we found that participants were able to discriminate normal and Thatcherized versions of the same face when they were presented in an upright orientation, but not when the images were inverted. Next, we showed that the effect of inversion was also apparent when only the eye region or only the mouth region was visible. These results demonstrate that a key component of the Thatcher illusion is to be found in orientation-specific encoding of the expressive features (eyes and mouth) of the face. © 2014 ARVO.

  14. An ignition key for atomic-scale engines

    NASA Astrophysics Data System (ADS)

    Dundas, Daniel; Cunningham, Brian; Buchanan, Claire; Terasawa, Asako; Paxton, Anthony T.; Todorov, Tchavdar N.

    2012-10-01

    A current-carrying resonant nanoscale device, simulated by non-adiabatic molecular dynamics, exhibits sharp activation of non-conservative current-induced forces with bias. The result, above the critical bias, is generalized rotational atomic motion with a large gain in kinetic energy. The activation exploits sharp features in the electronic structure, and constitutes, in effect, an ignition key for atomic-scale motors. A controlling factor for the effect is the non-equilibrium dynamical response matrix for small-amplitude atomic motion under current. This matrix can be found from the steady-state electronic structure by a simpler static calculation, providing a way to detect the likely appearance, or otherwise, of non-conservative dynamics, in advance of real-time modelling.

  15. World Key Information Service System Designed For EPCOT Center

    NASA Astrophysics Data System (ADS)

    Kelsey, J. A.

    1984-03-01

    An advanced Bell Laboratories and Western Electric designed electronic information retrieval system utilizing the latest Information Age technologies, and a fiber optic transmission system is featured at the Walt Disney World Resort's newest theme park - The Experimental Prototype Community of Tomorrow (EPCOT Center). The project is an interactive audio, video and text information system that is deployed at key locations within the park. The touch sensitive terminals utilizing the ARIEL (Automatic Retrieval of Information Electronically) System is interconnected by a Western Electric designed and manufactured lightwave transmission system.

  16. Exciting Action Photos, Feature Articles, Spread Designs Equal Exciting Sports Coverage.

    ERIC Educational Resources Information Center

    Konkle, Bruce E.

    1996-01-01

    Discusses what a high school yearbook sports staff should deliver to their peers in overall sports coverage. Suggests that keys to good sports coverage are quality action photos that entice readers, "featurized" sports articles, attention to the overall design of the spreads, team photos that which show faces clearly, and a scoreboard on…

  17. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  18. Key Issues in Instructional Computer Graphics.

    ERIC Educational Resources Information Center

    Wozny, Michael J.

    1981-01-01

    Addresses key issues facing universities which plan to establish instructional computer graphics facilities, including computer-aided design/computer aided manufacturing systems, role in curriculum, hardware, software, writing instructional software, faculty involvement, operations, and research. Thirty-seven references and two appendices are…

  19. The first missense mutation of NHS gene in a Tunisian family with clinical features of NHS syndrome including cardiac anomaly

    PubMed Central

    Chograni, Manèl; Rejeb, Imen; Jemaa, Lamia Ben; Châabouni, Myriam; Bouhamed, Habiba Chaabouni

    2011-01-01

    Nance-Horan Syndrome (NHS) or X-linked cataract-dental syndrome is a disease of unknown gene action mechanism, characterized by congenital cataract, dental anomalies, dysmorphic features and, in some cases, mental retardation. We performed linkage analysis in a Tunisian family with NHS in which affected males and obligate carrier female share a common haplotype in the Xp22.32-p11.21 region that contains the NHS gene. Direct sequencing of NHS coding exons and flanking intronic sequences allowed us to identify the first missense mutation (P551S) and a reported SNP-polymorphism (L1319F) in exon 6, a reported UTR–SNP (c.7422 C>T) and a novel one (c.8239 T>A) in exon 8. Both variations P551S and c.8239 T>A segregate with NHS phenotype in this family. Although truncations, frame-shift and copy number variants have been reported in this gene, no missense mutations have been found to segregate previously. This is the first report of a missense NHS mutation causing NHS phenotype (including cardiac defects). We hypothesize also that the non-reported UTR–SNP of the exon 8 (3′-UTR) is specific to the Tunisian population. PMID:21559051

  20. The first missense mutation of NHS gene in a Tunisian family with clinical features of NHS syndrome including cardiac anomaly.

    PubMed

    Chograni, Manèl; Rejeb, Imen; Jemaa, Lamia Ben; Châabouni, Myriam; Bouhamed, Habiba Chaabouni

    2011-08-01

    Nance-Horan Syndrome (NHS) or X-linked cataract-dental syndrome is a disease of unknown gene action mechanism, characterized by congenital cataract, dental anomalies, dysmorphic features and, in some cases, mental retardation. We performed linkage analysis in a Tunisian family with NHS in which affected males and obligate carrier female share a common haplotype in the Xp22.32-p11.21 region that contains the NHS gene. Direct sequencing of NHS coding exons and flanking intronic sequences allowed us to identify the first missense mutation (P551S) and a reported SNP-polymorphism (L1319F) in exon 6, a reported UTR-SNP (c.7422 C>T) and a novel one (c.8239 T>A) in exon 8. Both variations P551S and c.8239 T>A segregate with NHS phenotype in this family. Although truncations, frame-shift and copy number variants have been reported in this gene, no missense mutations have been found to segregate previously. This is the first report of a missense NHS mutation causing NHS phenotype (including cardiac defects). We hypothesize also that the non-reported UTR-SNP of the exon 8 (3'-UTR) is specific to the Tunisian population.

  1. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

    PubMed

    Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar

    2018-05-04

    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

  2. Stages of Plasma Cell Neoplasms (Including Multiple Myeloma)

    MedlinePlus

    ... Health Professional Plasma Cell Neoplasms Treatment Research Plasma Cell Neoplasms (Including Multiple Myeloma) Treatment (PDQ®)–Patient Version General Information About Plasma Cell Neoplasms Go to Health Professional Version Key Points ...

  3. Key Concepts in Microbial Oceanography

    NASA Astrophysics Data System (ADS)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  4. A Positive Deviance Approach to Understanding Key Features to Improving Diabetes Care in the Medical Home

    PubMed Central

    Gabbay, Robert A.; Friedberg, Mark W.; Miller-Day, Michelle; Cronholm, Peter F.; Adelman, Alan; Schneider, Eric C.

    2013-01-01

    PURPOSE The medical home has gained national attention as a model to reorganize primary care to improve health outcomes. Pennsylvania has undertaken one of the largest state-based, multipayer medical home pilot projects. We used a positive deviance approach to identify and compare factors driving the care models of practices showing the greatest and least improvement in diabetes care in a sample of 25 primary care practices in southeast Pennsylvania. METHODS We ranked practices into improvement quintiles on the basis of the average absolute percentage point improvement from baseline to 18 months in 3 registry-based measures of performance related to diabetes care: glycated hemoglobin concentration, blood pressure, and low-density lipoprotein cholesterol level. We then conducted surveys and key informant interviews with leaders and staff in the 5 most and least improved practices, and compared their responses. RESULTS The most improved/higher-performing practices tended to have greater structural capabilities (eg, electronic health records) than the least improved/lower-performing practices at baseline. Interviews revealed striking differences between the groups in terms of leadership styles and shared vision; sense, use, and development of teams; processes for monitoring progress and obtaining feedback; and presence of technologic and financial distractions. CONCLUSIONS Positive deviance analysis suggests that primary care practices’ baseline structural capabilities and abilities to buffer the stresses of change may be key facilitators of performance improvement in medical home transformations. Attention to the practices’ structural capabilities and factors shaping successful change, especially early in the process, will be necessary to improve the likelihood of successful medical home transformation and better care. PMID:23690393

  5. Shell anomalies observed in a population of Archaias angulatus (Foraminifera) from the Florida Keys (USA) sampled in 1982-83 and 2006-07

    USGS Publications Warehouse

    Souder, H.C.; McCloskey, B.; Hallock, P.; Byrne, R.

    2010-01-01

    Archived specimens of Archaias angulatus collected live at a depth of < 2. m in John Pennekamp Coral Reef State Park, Key Largo, Florida, in June, September and December 1982, and March 1983, were compared to specimens collected live from the same site and months in 2006-07. Shells were examined using light microscopy for anomalous features, which were then documented using scanning electron microscopy. Seven different types of morphological abnormalities and five different surface texture anomalies were observed. Physical abnormalities included profoundly deformed, curled, asymmetrical, and uncoiled shells, irregular suture lines, surface protrusions, and breakage/repair. Textural anomalies observed were surface pits, dissolution features, microborings, microbial biofilms, and the presence of epibionts including bryzoans, cyanobacteria and foraminifers. The same kinds of features were found in this A. angulatus population in both 1982-83 collections and 2006-07 collections. Within-date variability was higher in specimens collected in 1982-83, while between-date variability was higher in 2006-07; overall the range of variability was similar. Given that the site was originally chosen for study because these foraminifers were so abundant, the lack of significant change indicates that the variability of the geochemical habitat is still within the range that A. angulatus can thrive. ?? 2010.

  6. Paucity of CD4+CCR5+ T cells is a typical feature of natural SIV hosts

    PubMed Central

    Pandrea, Ivona; Apetrei, Cristian; Gordon, Shari; Barbercheck, Joseph; Dufour, Jason; Bohm, Rudolf; Sumpter, Beth; Roques, Pierre; Marx, Preston A.; Hirsch, Vanessa M.; Kaur, Amitinder; Lackner, Andrew A.; Veazey, Ronald S.; Silvestri, Guido

    2007-01-01

    In contrast to lentiviral infections of humans and macaques, simian immunodeficiency virus (SIV) infection of natural hosts is nonpathogenic despite high levels of viral replication. However, the mechanisms underlying this absence of disease are unknown. Here we report that natural hosts for SIV infection express remarkably low levels of CCR5 on CD4+ T cells isolated from blood, lymph nodes, and mucosal tissues. Given that this immunologic feature is found in 5 different species of natural SIV hosts (sooty mangabeys, African green monkeys, mandrills, sun-tailed monkeys, and chimpanzees) but is absent in 5 nonnatural/recent hosts (humans, rhesus, pigtail, cynomolgus macaques, and baboons), it may represent a key feature of the coevolution between the virus and its natural hosts that led to a nonpathogenic infection. Beneficial effects of low CCR5 expression on CD4+ T cells may include the reduction of target cells for viral replication and a decreased homing of activated CD4+ T cells to inflamed tissue. PMID:17003371

  7. Investigating lignin key features in maize lignocelluloses using infrared spectroscopy.

    PubMed

    Chazal, Richard; Robert, Paul; Durand, Sylvie; Devaux, Marie-Françoise; Saulnier, Luc; Lapierre, Catherine; Guillon, Fabienne

    2014-01-01

    Lignins and their cross-linking to hemicelluloses detrimentally affect the cellulose-to-ethanol conversion of grass lignocelluloses. Screening appropriate grass cell walls and their compositional changes during the various steps of the process calls for a high-throughput analytical technique. Such a performance can be fulfilled by Fourier transform mid-infrared (FT-MIR) spectroscopy. In the present paper, a set of maize cell walls from mature stems were selected, including brown midrib samples. Lignin fractions were isolated by mild acidolysis to obtain a set of purified maize lignin standards. The lignin content and the percentage of lignin-derived p-hydroxyphenyl (H), guaiacyl (G), and syringyl (S) thioacidolysis monomers were determined. In addition, the composition of cell wall polysaccharides, as well as the amount of ester-linked p-coumaric (CA) and ferulic (FA) acids, was measured by wet chemistry. Partial least square (PLS) analyses were applied to infrared and chemical data of cell walls. The resulting models showed a good predictive ability with regard to the lignin content, to the frequency of S (or G) thioacidolysis monomers, and to the level of ester-linked CA of maize cell walls. The loading plots and regression coefficients revealed relevant infrared absorption bands.

  8. A computational analysis of the three isoforms of glutamate dehydrogenase reveals structural features of the isoform EC 1.4.1.4 supporting a key role in ammonium assimilation by plants

    PubMed Central

    Jaspard, Emmanuel

    2006-01-01

    Background There are three isoforms of glutamate dehydrogenase. The isoform EC 1.4.1.4 (GDH4) catalyses glutamate synthesis from 2-oxoglutarate and ammonium, using NAD(P)H. Ammonium assimilation is critical for plant growth. Although GDH4 from animals and prokaryotes are well characterized, there are few data concerning plant GDH4, even from those whose genomes are well annotated. Results A large set of the three GDH isoforms was built resulting in 116 non-redundant full polypeptide sequences. A computational analysis was made to gain more information concerning the structure – function relationship of GDH4 from plants (Eukaryota, Viridiplantae). The tested plant GDH4 sequences were the two ones known to date, those of Chlorella sorokiniana. This analysis revealed several structural features specific of plant GDH4: (i) the lack of a structure called "antenna"; (ii) the NAD(P)-binding motif GAGNVA; and (iii) a second putative coenzyme-binding motif GVLTGKG together with four residues involved in the binding of the reduced form of NADP. Conclusion A number of structural features specific of plant GDH4 have been found. The results reinforce the probable key role of GDH4 in ammonium assimilation by plants. Reviewers This article was reviewed by Tina Bakolitsa (nominated by Eugene Koonin), Martin Jambon (nominated by Laura Landweber), Sandor Pangor and Franck Eisenhaber. PMID:17173671

  9. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  10. Research on Radar Micro-Doppler Feature Parameter Estimation of Propeller Aircraft

    NASA Astrophysics Data System (ADS)

    He, Zhihua; Tao, Feixiang; Duan, Jia; Luo, Jingsheng

    2018-01-01

    The micro-motion modulation effect of the rotated propellers to radar echo can be a steady feature for aircraft target recognition. Thus, micro-Doppler feature parameter estimation is a key to accurate target recognition. In this paper, the radar echo of rotated propellers is modelled and simulated. Based on which, the distribution characteristics of the micro-motion modulation energy in time, frequency and time-frequency domain are analyzed. The micro-motion modulation energy produced by the scattering points of rotating propellers is accumulated using the Inverse-Radon (I-Radon) transform, which can be used to accomplish the estimation of micro-modulation parameter. Finally, it is proved that the proposed parameter estimation method is effective with measured data. The micro-motion parameters of aircraft can be used as the features of radar target recognition.

  11. Legacy persistent organic pollutants including PBDEs in the trophic web of the Ross Sea (Antarctica).

    PubMed

    Corsolini, Simonetta; Ademollo, Nicoletta; Martellini, Tania; Randazzo, Demetrio; Vacchi, Marino; Cincinelli, Alessandra

    2017-10-01

    The ecological features of the Ross Sea trophic web are peculiar and different from other polar food webs, with respect to the use of habitat and species interactions; due to its ecosystem integrity, it is the world's largest Marine Protected Area, established in 2016. Polar organisms are reported to bioaccumulate lipophilic contaminant, viz persistent organic pollutants (POPs). Legacy POPs and flame retardants (polybrominated diphenyl ethers, PBDEs) were studied in key species of the Ross Sea (Euphausia superba, Pleuragramma antarctica) and their predators (Dissostichus mawsoni, Pygoscelis adeliae, Aptenodytes forsteri, Catharacta maccormicki, Leptonychotes weddellii). Gaschromatography revealed the presence of PCBs, HCB, DDTs, PBDEs in most of the samples; HCHs, dieldrin, Eldrin, non-ortho PCBs, PCDDs, PCDFs were detected only in some species. The average ∑PBDEs was 0.19-1.35 pg/g wet wt in the key-species and one-two order of magnitude higher in the predators. Penguins and skuas from an area where a long-term field camp is located showed higher BDE concentrations. The ΣDDTs was higher in the Antarctic toothfish (20 ± 6.73 ng/g wet wt) and in the South Polar skua (5.911 ± 3.425 ng/g wet wt). The TEQs were evaluated and the highest concentration was found in the Weddell seal, due to PCB169, 1,2,3,4,7,8-HxCDF, and 2,3,4,6,7,8-HxCDF. There was no significant relationship between the trophic level and the POP concentrations. Although low concentrations, organisms of the Ross Sea trophic web should be further studied: lack of information on some ecotoxicological features and human impacts including global change may distress the ecosystem with unpredictable effects. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Intrinsic feature-based pose measurement for imaging motion compensation

    DOEpatents

    Baba, Justin S.; Goddard, Jr., James Samuel

    2014-08-19

    Systems and methods for generating motion corrected tomographic images are provided. A method includes obtaining first images of a region of interest (ROI) to be imaged and associated with a first time, where the first images are associated with different positions and orientations with respect to the ROI. The method also includes defining an active region in the each of the first images and selecting intrinsic features in each of the first images based on the active region. Second, identifying a portion of the intrinsic features temporally and spatially matching intrinsic features in corresponding ones of second images of the ROI associated with a second time prior to the first time and computing three-dimensional (3D) coordinates for the portion of the intrinsic features. Finally, the method includes computing a relative pose for the first images based on the 3D coordinates.

  13. Terrain feature recognition for synthetic aperture radar (SAR) imagery employing spatial attributes of targets

    NASA Astrophysics Data System (ADS)

    Iisaka, Joji; Sakurai-Amano, Takako

    1994-08-01

    This paper describes an integrated approach to terrain feature detection and several methods to estimate spatial information from SAR (synthetic aperture radar) imagery. Spatial information of image features as well as spatial association are key elements in terrain feature detection. After applying a small feature preserving despeckling operation, spatial information such as edginess, texture (smoothness), region-likeliness and line-likeness of objects, target sizes, and target shapes were estimated. Then a trapezoid shape fuzzy membership function was assigned to each spatial feature attribute. Fuzzy classification logic was employed to detect terrain features. Terrain features such as urban areas, mountain ridges, lakes and other water bodies as well as vegetated areas were successfully identified from a sub-image of a JERS-1 SAR image. In the course of shape analysis, a quantitative method was developed to classify spatial patterns by expanding a spatial pattern through the use of a series of pattern primitives.

  14. Key to nematodes reported in waterfowl

    USGS Publications Warehouse

    McDonald, Malcolm E.

    1974-01-01

    This key, covering 171 species and subspecies of nematodes in 49 genera, is based on the the listings in the author's "Catalogue of Helminths of Waterfowl" (McDonald, 1969b), but includes 19 additional forms from his continuing survey of new literature.

  15. Which Book and Why: Using Book Bands and Book Levels for Guided Reading in Key Stage 1 [Includes CD-ROM

    ERIC Educational Resources Information Center

    Bodman, Sue, Ed.; Franklin, Glen, Ed.

    2014-01-01

    We want all children to love reading, and Which Book and Why demonstrates how effective guided reading for children in Foundation Stage and Key Stage 1 can help teachers make this happen. Balancing theory and practice, this book explores how schools and teachers can implement guided reading more confidently and more effectively. Which Book and Why…

  16. Intelligent Fault Diagnosis of HVCB with Feature Space Optimization-Based Random Forest

    PubMed Central

    Ma, Suliang; Wu, Jianwen; Wang, Yuhao; Jia, Bowen; Jiang, Yuan

    2018-01-01

    Mechanical faults of high-voltage circuit breakers (HVCBs) always happen over long-term operation, so extracting the fault features and identifying the fault type have become a key issue for ensuring the security and reliability of power supply. Based on wavelet packet decomposition technology and random forest algorithm, an effective identification system was developed in this paper. First, compared with the incomplete description of Shannon entropy, the wavelet packet time-frequency energy rate (WTFER) was adopted as the input vector for the classifier model in the feature selection procedure. Then, a random forest classifier was used to diagnose the HVCB fault, assess the importance of the feature variable and optimize the feature space. Finally, the approach was verified based on actual HVCB vibration signals by considering six typical fault classes. The comparative experiment results show that the classification accuracy of the proposed method with the origin feature space reached 93.33% and reached up to 95.56% with optimized input feature vector of classifier. This indicates that feature optimization procedure is successful, and the proposed diagnosis algorithm has higher efficiency and robustness than traditional methods. PMID:29659548

  17. Microbiota, a key player in alcoholic liver disease.

    PubMed

    Cassard, Anne-Marie; Ciocan, Dragos

    2017-12-22

    Alcoholic liver disease (ALD) is a major cause of morbidity and mortality worldwide. Only 20% of heavy alcohol consumers develop alcoholic liver cirrhosis. The intestinal microbiota (IM) has been recently identified as a key player in the severity of liver injury in ALD. Common features of ALD include a decrease of gut epithelial tight junction protein expression, mucin production, and antimicrobial peptide levels. This disruption of the gut barrier, which is a prerequisite for ALD, leads to the passage of bacterial products into the blood stream (endotoxemia). Moreover, metabolites produced by bacteria, such as short chain fatty acids, volatile organic compounds (VOS), and bile acids (BA), are involved in ALD pathology. Probiotic treatment, IM transplantation, or the consumption of dietary fiber, such as pectin, which all alter the ratio of bacterial species, have been shown to improve liver injury in animal models of ALD and to be associated with an improvement in gut barrier function. Although the connections between the microbiota and the host in ALD are well established, the underlying mechanisms are still an active area of research. Targeting the microbiome through the use of prebiotic, probiotic, and postbiotic modalities could be an attractive new approach to manage ALD.

  18. Ceramic substrate including thin film multilayer surface conductor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wolf, Joseph Ambrose; Peterson, Kenneth A.

    2017-05-09

    A ceramic substrate comprises a plurality of ceramic sheets, a plurality of inner conductive layers, a plurality of vias, and an upper conductive layer. The ceramic sheets are stacked one on top of another and include a top ceramic sheet. The inner conductive layers include electrically conductive material that forms electrically conductive features on an upper surface of each ceramic sheet excluding the top ceramic sheet. The vias are formed in each of the ceramic sheets with each via being filled with electrically conductive material. The upper conductive layer includes electrically conductive material that forms electrically conductive features on anmore » upper surface of the top ceramic sheet. The upper conductive layer is constructed from a stack of four sublayers. A first sublayer is formed from titanium. A second sublayer is formed from copper. A third sublayer is formed from platinum. A fourth sublayer is formed from gold.« less

  19. Tensor-driven extraction of developmental features from varying paediatric EEG datasets.

    PubMed

    Kinney-Lang, Eli; Spyrou, Loukianos; Ebied, Ahmed; Chin, Richard Fm; Escudero, Javier

    2018-05-21

    Constant changes in developing children's brains can pose a challenge in EEG dependant technologies. Advancing signal processing methods to identify developmental differences in paediatric populations could help improve function and usability of such technologies. Taking advantage of the multi-dimensional structure of EEG data through tensor analysis may offer a framework for extracting relevant developmental features of paediatric datasets. A proof of concept is demonstrated through identifying latent developmental features in resting-state EEG. Approach. Three paediatric datasets (n = 50, 17, 44) were analyzed using a two-step constrained parallel factor (PARAFAC) tensor decomposition. Subject age was used as a proxy measure of development. Classification used support vector machines (SVM) to test if PARAFAC identified features could predict subject age. The results were cross-validated within each dataset. Classification analysis was complemented by visualization of the high-dimensional feature structures using t-distributed Stochastic Neighbour Embedding (t-SNE) maps. Main Results. Development-related features were successfully identified for the developmental conditions of each dataset. SVM classification showed the identified features could accurately predict subject at a significant level above chance for both healthy and impaired populations. t-SNE maps revealed suitable tensor factorization was key in extracting the developmental features. Significance. The described methods are a promising tool for identifying latent developmental features occurring throughout childhood EEG. © 2018 IOP Publishing Ltd.

  20. First species of Leptochelia Dana, 1849 (Crustacea: Tanaidacea) from the Eastern Pacific, with an annotated checklist and identification keys for the genus.

    PubMed

    Jarquín-González, Jani; García-Madrigal, María Del Socorro; Carrera-Parra, Luis Fernando

    2015-02-24

    Forty three species of leptocheliids are known worldwide. In the American region only eight species have been described from the Western Atlantic, while for the Eastern Pacific none have been described, suggesting that the diversity of this family has been severely underestimated in this region. Here we describe the first species of Leptochelia from the Eastern Pacific, Leptochelia mexicana n. sp., which is characterized by the males having a spiniform seta on the second segment of uropodal endopod, a novel feature for the genus. In addition, the first annotated checklist and a taxonomic key with illustrations for Leptochelia species are included. The list includes the type locality, type depository, distribution, habitat and, in some cases, remarks.

  1. SU-E-J-237: Image Feature Based DRR and Portal Image Registration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, X; Chang, J

    Purpose: Two-dimensional (2D) matching of the kV X-ray and digitally reconstructed radiography (DRR) images is an important setup technique for image-guided radiotherapy (IGRT). In our clinics, mutual information based methods are used for this purpose on commercial linear accelerators, but with often needs for manual corrections. This work proved the feasibility that feature based image transform can be used to register kV and DRR images. Methods: The scale invariant feature transform (SIFT) method was implemented to detect the matching image details (or key points) between the kV and DRR images. These key points represent high image intensity gradients, and thusmore » the scale invariant features. Due to the poor image contrast from our kV image, direct application of the SIFT method yielded many detection errors. To assist the finding of key points, the center coordinates of the kV and DRR images were read from the DICOM header, and the two groups of key points with similar relative positions to their corresponding centers were paired up. Using these points, a rigid transform (with scaling, horizontal and vertical shifts) was estimated. We also artificially introduced vertical and horizontal shifts to test the accuracy of our registration method on anterior-posterior (AP) and lateral pelvic images. Results: The results provided a satisfactory overlay of the transformed kV onto the DRR image. The introduced vs. detected shifts were fit into a linear regression. In the AP image experiments, linear regression analysis showed a slope of 1.15 and 0.98 with an R2 of 0.89 and 0.99 for the horizontal and vertical shifts, respectively. The results are 1.2 and 1.3 with R2 of 0.72 and 0.82 for the lateral image shifts. Conclusion: This work provided an alternative technique for kV to DRR alignment. Further improvements in the estimation accuracy and image contrast tolerance are underway.« less

  2. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    PubMed

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  3. qFeature

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2015-09-14

    This package contains statistical routines for extracting features from multivariate time-series data which can then be used for subsequent multivariate statistical analysis to identify patterns and anomalous behavior. It calculates local linear or quadratic regression model fits to moving windows for each series and then summarizes the model coefficients across user-defined time intervals for each series. These methods are domain agnostic-but they have been successfully applied to a variety of domains, including commercial aviation and electric power grid data.

  4. Key Performance Indicators for Primary Schools.

    ERIC Educational Resources Information Center

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  5. [Key informers. When and How?].

    PubMed

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  6. Tunable features of magnetoelectric transformers.

    PubMed

    Dong, Shuxiang; Zhai, Junyi; Priya, Shashank; Li, Jie-Fang; Viehland, Dwight

    2009-06-01

    We have found that magnetostrictive FeBSiC alloy ribbons laminated with piezoelectric Pb(Zr,Ti)O(3) fiber can act as a tunable transformer when driven under resonant conditions. These composites were also found to exhibit the strongest resonant magnetoelectric voltage coefficient of 750 V/cm-Oe. The tunable features were achieved by applying small dc magnetic biases of -5 features include 1) a high voltage gain of -55 features can be attributed to large changes in the piezomagnetic coefficient and permeability of the magnetostrictive phase under H(dc).

  7. Comprehensive evaluation of untargeted metabolomics data processing software in feature detection, quantification and discriminating marker selection.

    PubMed

    Li, Zhucui; Lu, Yan; Guo, Yufeng; Cao, Haijie; Wang, Qinhong; Shui, Wenqing

    2018-10-31

    Data analysis represents a key challenge for untargeted metabolomics studies and it commonly requires extensive processing of more than thousands of metabolite peaks included in raw high-resolution MS data. Although a number of software packages have been developed to facilitate untargeted data processing, they have not been comprehensively scrutinized in the capability of feature detection, quantification and marker selection using a well-defined benchmark sample set. In this study, we acquired a benchmark dataset from standard mixtures consisting of 1100 compounds with specified concentration ratios including 130 compounds with significant variation of concentrations. Five software evaluated here (MS-Dial, MZmine 2, XCMS, MarkerView, and Compound Discoverer) showed similar performance in detection of true features derived from compounds in the mixtures. However, significant differences between untargeted metabolomics software were observed in relative quantification of true features in the benchmark dataset. MZmine 2 outperformed the other software in terms of quantification accuracy and it reported the most true discriminating markers together with the fewest false markers. Furthermore, we assessed selection of discriminating markers by different software using both the benchmark dataset and a real-case metabolomics dataset to propose combined usage of two software for increasing confidence of biomarker identification. Our findings from comprehensive evaluation of untargeted metabolomics software would help guide future improvements of these widely used bioinformatics tools and enable users to properly interpret their metabolomics results. Copyright © 2018 Elsevier B.V. All rights reserved.

  8. Structural Features of Algebraic Quantum Notations

    ERIC Educational Resources Information Center

    Gire, Elizabeth; Price, Edward

    2015-01-01

    The formalism of quantum mechanics includes a rich collection of representations for describing quantum systems, including functions, graphs, matrices, histograms of probabilities, and Dirac notation. The varied features of these representations affect how computations are performed. For example, identifying probabilities of measurement outcomes…

  9. Coordinating Council. Sixth Meeting: Who Are Our Key Users?

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This NASA Scientific and Technical Information Program Coordinating Council meeting deals with the topic 'Who are our key users?' Presentations were made on the following subtopics: Key users: Who uses the system the most, Who orders the most documents, Users: What do we know about them?, NASA/DOD Aerospace Knowledge Diffusion research project on 'Potential key users', How we meet the user's needs, and STI Council user requirements update. Summaries of discussions after the presentations are included along with visuals for the presentations.

  10. Discriminative and informative features for biomolecular text mining with ensemble feature selection.

    PubMed

    Van Landeghem, Sofie; Abeel, Thomas; Saeys, Yvan; Van de Peer, Yves

    2010-09-15

    In the field of biomolecular text mining, black box behavior of machine learning systems currently limits understanding of the true nature of the predictions. However, feature selection (FS) is capable of identifying the most relevant features in any supervised learning setting, providing insight into the specific properties of the classification algorithm. This allows us to build more accurate classifiers while at the same time bridging the gap between the black box behavior and the end-user who has to interpret the results. We show that our FS methodology successfully discards a large fraction of machine-generated features, improving classification performance of state-of-the-art text mining algorithms. Furthermore, we illustrate how FS can be applied to gain understanding in the predictions of a framework for biomolecular event extraction from text. We include numerous examples of highly discriminative features that model either biological reality or common linguistic constructs. Finally, we discuss a number of insights from our FS analyses that will provide the opportunity to considerably improve upon current text mining tools. The FS algorithms and classifiers are available in Java-ML (http://java-ml.sf.net). The datasets are publicly available from the BioNLP'09 Shared Task web site (http://www-tsujii.is.s.u-tokyo.ac.jp/GENIA/SharedTask/).

  11. Optical detection of random features for high security applications

    NASA Astrophysics Data System (ADS)

    Haist, T.; Tiziani, H. J.

    1998-02-01

    Optical detection of random features in combination with digital signatures based on public key codes in order to recognize counterfeit objects will be discussed. Without applying expensive production techniques objects are protected against counterfeiting. Verification is done off-line by optical means without a central authority. The method is applied for protecting banknotes. Experimental results for this application are presented. The method is also applicable for identity verification of a credit- or chip-card holder.

  12. Transformation of Learning in Education and Training: Key Qualifications Revisited. CEDEFOP Reference Series.

    ERIC Educational Resources Information Center

    Kamarainen, Pekka, Ed.; Attwell, Graham, Ed.; Brown, Alan, Ed.

    This book contains 15 papers examining European approaches to the theme of key qualifications. The following papers are included: "Key Qualifications Revisited: An Introduction" (Pekka Kamarainen); "Exploring Key Qualifications: Context, Theory, and Practice in Europe" (Pekka Kamarainen); "Rethinking Key Qualifications:…

  13. LC-IMS-MS Feature Finder: detecting multidimensional liquid chromatography, ion mobility and mass spectrometry features in complex datasets.

    PubMed

    Crowell, Kevin L; Slysz, Gordon W; Baker, Erin S; LaMarche, Brian L; Monroe, Matthew E; Ibrahim, Yehia M; Payne, Samuel H; Anderson, Gordon A; Smith, Richard D

    2013-11-01

    The addition of ion mobility spectrometry to liquid chromatography-mass spectrometry experiments requires new, or updated, software tools to facilitate data processing. We introduce a command line software application LC-IMS-MS Feature Finder that searches for molecular ion signatures in multidimensional liquid chromatography-ion mobility spectrometry-mass spectrometry (LC-IMS-MS) data by clustering deisotoped peaks with similar monoisotopic mass, charge state, LC elution time and ion mobility drift time values. The software application includes an algorithm for detecting and quantifying co-eluting chemical species, including species that exist in multiple conformations that may have been separated in the IMS dimension. LC-IMS-MS Feature Finder is available as a command-line tool for download at http://omics.pnl.gov/software/LC-IMS-MS_Feature_Finder.php. The Microsoft.NET Framework 4.0 is required to run the software. All other dependencies are included with the software package. Usage of this software is limited to non-profit research to use (see README). rds@pnnl.gov. Supplementary data are available at Bioinformatics online.

  14. Visualizing complex hydrodynamic features

    NASA Astrophysics Data System (ADS)

    Kempf, Jill L.; Marshall, Robert E.; Yen, Chieh-Cheng

    1990-08-01

    The Lake Erie Forecasting System is a cooperative project by university, private and governmental institutions to provide continuous forecasting of three-dimensional structure within the lake. The forecasts will include water velocity and temperature distributions throughout the body of water, as well as water level and wind-wave distributions at the lake's surface. Many hydrodynamic features can be extracted from this data, including coastal jets, large-scale thermocline motion and zones of upwelling and downwelling. A visualization system is being developed that will aid in understanding these features and their interactions. Because of the wide variety of features, they cannot all be adequately represented by a single rendering technique. Particle tracing, surface rendering, and volumetric techniques are all necessary. This visualization effortis aimed towards creating a system that will provide meaningful forecasts for those using the lake for recreational and commercial purposes. For example, the fishing industry needs to know about large-scale thermocline motion in order to find the best fishing areas and power plants need to know water intAke temperatures. The visualization system must convey this information in a manner that is easily understood by these users. Scientists must also be able to use this system to verify their hydrodynamic simulation. The focus of the system, therefore, is to provide the information to serve these diverse interests, without overwhelming any single user with unnecessary data.

  15. Features in visual search combine linearly

    PubMed Central

    Pramod, R. T.; Arun, S. P.

    2014-01-01

    Single features such as line orientation and length are known to guide visual search, but relatively little is known about how multiple features combine in search. To address this question, we investigated how search for targets differing in multiple features (intensity, length, orientation) from the distracters is related to searches for targets differing in each of the individual features. We tested race models (based on reaction times) and co-activation models (based on reciprocal of reaction times) for their ability to predict multiple feature searches. Multiple feature searches were best accounted for by a co-activation model in which feature information combined linearly (r = 0.95). This result agrees with the classic finding that these features are separable i.e., subjective dissimilarity ratings sum linearly. We then replicated the classical finding that the length and width of a rectangle are integral features—in other words, they combine nonlinearly in visual search. However, to our surprise, upon including aspect ratio as an additional feature, length and width combined linearly and this model outperformed all other models. Thus, length and width of a rectangle became separable when considered together with aspect ratio. This finding predicts that searches involving shapes with identical aspect ratio should be more difficult than searches where shapes differ in aspect ratio. We confirmed this prediction on a variety of shapes. We conclude that features in visual search co-activate linearly and demonstrate for the first time that aspect ratio is a novel feature that guides visual search. PMID:24715328

  16. Improving mass candidate detection in mammograms via feature maxima propagation and local feature selection.

    PubMed

    Melendez, Jaime; Sánchez, Clara I; van Ginneken, Bram; Karssemeijer, Nico

    2014-08-01

    Mass candidate detection is a crucial component of multistep computer-aided detection (CAD) systems. It is usually performed by combining several local features by means of a classifier. When these features are processed on a per-image-location basis (e.g., for each pixel), mismatching problems may arise while constructing feature vectors for classification, which is especially true when the behavior expected from the evaluated features is a peaked response due to the presence of a mass. In this study, two of these problems, consisting of maxima misalignment and differences of maxima spread, are identified and two solutions are proposed. The first proposed method, feature maxima propagation, reproduces feature maxima through their neighboring locations. The second method, local feature selection, combines different subsets of features for different feature vectors associated with image locations. Both methods are applied independently and together. The proposed methods are included in a mammogram-based CAD system intended for mass detection in screening. Experiments are carried out with a database of 382 digital cases. Sensitivity is assessed at two sets of operating points. The first one is the interval of 3.5-15 false positives per image (FPs/image), which is typical for mass candidate detection. The second one is 1 FP/image, which allows to estimate the quality of the mass candidate detector's output for use in subsequent steps of the CAD system. The best results are obtained when the proposed methods are applied together. In that case, the mean sensitivity in the interval of 3.5-15 FPs/image significantly increases from 0.926 to 0.958 (p < 0.0002). At the lower rate of 1 FP/image, the mean sensitivity improves from 0.628 to 0.734 (p < 0.0002). Given the improved detection performance, the authors believe that the strategies proposed in this paper can render mass candidate detection approaches based on image location classification more robust to feature

  17. Single swim sessions in C. elegans induce key features of mammalian exercise.

    PubMed

    Laranjeiro, Ricardo; Harinath, Girish; Burke, Daniel; Braeckman, Bart P; Driscoll, Monica

    2017-04-10

    Exercise exerts remarkably powerful effects on metabolism and health, with anti-disease and anti-aging outcomes. Pharmacological manipulation of exercise benefit circuits might improve the health of the sedentary and the aging populations. Still, how exercised muscle signals to induce system-wide health improvement remains poorly understood. With a long-term interest in interventions that promote animal-wide health improvement, we sought to define exercise options for Caenorhabditis elegans. Here, we report on the impact of single swim sessions on C. elegans physiology. We used microcalorimetry to show that C. elegans swimming has a greater energy cost than crawling. Animals that swam continuously for 90 min specifically consumed muscle fat supplies and exhibited post-swim locomotory fatigue, with both muscle fat depletion and fatigue indicators recovering within 1 hour of exercise cessation. Quantitative polymerase chain reaction (qPCR) transcript analyses also suggested an increase in fat metabolism during the swim, followed by the downregulation of specific carbohydrate metabolism transcripts in the hours post-exercise. During a 90 min swim, muscle mitochondria matrix environments became more oxidized, as visualized by a localized mitochondrial reduction-oxidation-sensitive green fluorescent protein reporter. qPCR data supported specific transcriptional changes in oxidative stress defense genes during and immediately after a swim. Consistent with potential antioxidant defense induction, we found that a single swim session sufficed to confer protection against juglone-induced oxidative stress inflicted 4 hours post-exercise. In addition to showing that even a single swim exercise bout confers physiological changes that increase robustness, our data reveal that acute swimming-induced changes share common features with some acute exercise responses reported in humans. Overall, our data validate an easily implemented swim experience as C. elegans exercise

  18. Ameloblastomas: Clinicopathological features from 70 cases diagnosed in a single Oral Pathology service in an 8-year period

    PubMed Central

    Filizzola, Andressa-Incerte; Bartholomeu-dos-Santos, Teresa-Cristina-Ribeiro

    2014-01-01

    Ameloblastomas are odontogenic tumors that can present some distinct clinicopathological profiles when comparing different populations and studies. Objectives: The aim of the present study was to analyze the clinicopathological features from a series of ameloblastomas diagnosed in a single Oral Pathology service in Brazil in an 8-year period. Study Design: The files were revised and all cases diagnosed as ameloblastomas in the period were retrieved. All hematoxylin and eosin stained histological slides were reviewed and all clinical and radiological information were obtained through a review of the laboratory forms. Data were descriptively analyzed and a comparison was performed with the different ameloblastomas subtypes. Results: Seventy ameloblastomas composed the final sample, including 57 (81%) solid/multicystic, 9 (13%) unicystic, 2 (3%) desmoplastic and 2 (3%) peripheral ameloblastomas. Mean age of the affected patients was in the forth decade of life and there was a slight male predominance. Most tumors presented as multilocular radiolucencies, were located in the posterior mandible and showed the follicular and plexiform histological patterns. There was no difference on the mean age of the patients affected by solid and unicystic ameloblastomas. Conclusions: The present results showed that the clinicopathological features of the ameloblastomas included in this Brazilian sample were similar to the features described in most other worldwide populations. Key words:Ameloblastoma, solid, unicystic, review, epidemiology, histology. PMID:25129244

  19. Zeroing in on Number and Operations, Grades 7-8: Key Ideas and Common Misconceptions

    ERIC Educational Resources Information Center

    Collins, Anne; Dacey, Linda

    2010-01-01

    "The Zeroing in on Number and Operations" series, which aligns with the Common Core State Standards and the NCTM Standards and Focal Points, features easy-to-use tools for teaching key concepts in number and operations and for addressing common misconceptions. Sharing the insights they've gained in decades of mathematics teaching and research,…

  20. Zeroing in on Number and Operations, Grades 3-4: Key Ideas and Common Misconceptions

    ERIC Educational Resources Information Center

    Dacey, Linda; Collins, Anne

    2010-01-01

    "The Zeroing in on Number and Operations" series, which aligns with the Common Core State Standards and the NCTM Standards and Focal Points, features easy-to-use tools for teaching key concepts in number and operations and for addressing common misconceptions. Sharing the insights they've gained in decades of mathematics teaching and research,…

  1. Zeroing in on Number and Operations, Grades 5-6: Key Ideas and Common Misconceptions

    ERIC Educational Resources Information Center

    Collins, Anne; Dacey, Linda

    2010-01-01

    "The Zeroing in on Number and Operations" series, which aligns with the Common Core State Standards and the NCTM Sandards and Focal Points, features easy-to-use tools for teaching key concepts in number and operations and for addressing common misconceptions. Sharing the insights they've gained through decades of mathematics teaching and research,…

  2. Prostatic adenocarcinoma with glomeruloid features.

    PubMed

    Pacelli, A; Lopez-Beltran, A; Egan, A J; Bostwick, D G

    1998-05-01

    A wide variety of architectural patterns of adenocarcinoma may be seen in the prostate. We have recently encountered a hitherto-undescribed pattern of growth characterized by intraluminal ball-like clusters of cancer cells reminiscent of renal glomeruli, which we refer to as prostatic adenocarcinoma with glomeruloid features. To define the architectural features, frequency, and distribution of prostatic adenocarcinoma with glomeruloid features, we reviewed 202 totally embedded radical prostatectomy specimens obtained between October 1992 and April 1994 from the files of the Mayo Clinic. This series was supplemented by 100 consecutive needle biopsies with prostatic cancer from January to February 1996. Prostatic adenocarcinoma with glomeruloid features was characterized by round to oval epithelial tufts growing within malignant acini, often supported by a fibrovascular core. The epithelial cells were sometimes arranged in semicircular concentric rows separated by clefted spaces. In the radical prostatectomy specimens, nine cases (4.5%) had glomeruloid features. The glomeruloid pattern constituted 5% to 20% of each cancer (mean, 8.33%) and was usually located at the apex or in the peripheral zone of the prostate. Seven cases were associated with a high Gleason score (7 or 8), one with a score of 6, and one with a score of 5. All cases were associated with high-grade prostatic intraepithelial neoplasia and extensive perineural invasion. Pathological stages included T2c (three cases), T3b (four cases), and T3c (two cases); one of the T3b cases had lymph node metastases (N1). Three (3%) of 100 consecutive routine needle biopsy specimens with cancer showed glomeruloid features, and this pattern constituted 5% to 10% of each cancer (mean, 6.7%). The Gleason score was 6 for two cases and 8 for one case. Two cases were associated with high-grade prostatic intraepithelial neoplasia, and one case had perineural invasion. Glomeruloid features were not observed in any benign or

  3. A prototype feature system for feature retrieval using relationships

    USGS Publications Warehouse

    Choi, J.; Usery, E.L.

    2009-01-01

    Using a feature data model, geographic phenomena can be represented effectively by integrating space, theme, and time. This paper extends and implements a feature data model that supports query and visualization of geographic features using their non-spatial and temporal relationships. A prototype feature-oriented geographic information system (FOGIS) is then developed and storage of features named Feature Database is designed. Buildings from the U.S. Marine Corps Base, Camp Lejeune, North Carolina and subways in Chicago, Illinois are used to test the developed system. The results of the applications show the strength of the feature data model and the developed system 'FOGIS' when they utilize non-spatial and temporal relationships in order to retrieve and visualize individual features.

  4. Ontology patterns for complex topographic feature yypes

    USGS Publications Warehouse

    Varanka, Dalia E.

    2011-01-01

    Complex feature types are defined as integrated relations between basic features for a shared meaning or concept. The shared semantic concept is difficult to define in commonly used geographic information systems (GIS) and remote sensing technologies. The role of spatial relations between complex feature parts was recognized in early GIS literature, but had limited representation in the feature or coverage data models of GIS. Spatial relations are more explicitly specified in semantic technology. In this paper, semantics for topographic feature ontology design patterns (ODP) are developed as data models for the representation of complex features. In the context of topographic processes, component assemblages are supported by resource systems and are found on local landscapes. The topographic ontology is organized across six thematic modules that can account for basic feature types, resource systems, and landscape types. Types of complex feature attributes include location, generative processes and physical description. Node/edge networks model standard spatial relations and relations specific to topographic science to represent complex features. To demonstrate these concepts, data from The National Map of the U. S. Geological Survey was converted and assembled into ODP.

  5. Regression-Based Approach For Feature Selection In Classification Issues. Application To Breast Cancer Detection And Recurrence

    NASA Astrophysics Data System (ADS)

    Belciug, Smaranda; Serbanescu, Mircea-Sebastian

    2015-09-01

    Feature selection is considered a key factor in classifications/decision problems. It is currently used in designing intelligent decision systems to choose the best features which allow the best performance. This paper proposes a regression-based approach to select the most important predictors to significantly increase the classification performance. Application to breast cancer detection and recurrence using publically available datasets proved the efficiency of this technique.

  6. Classification of epileptic EEG signals based on simple random sampling and sequential feature selection.

    PubMed

    Ghayab, Hadi Ratham Al; Li, Yan; Abdulla, Shahab; Diykh, Mohammed; Wan, Xiangkui

    2016-06-01

    Electroencephalogram (EEG) signals are used broadly in the medical fields. The main applications of EEG signals are the diagnosis and treatment of diseases such as epilepsy, Alzheimer, sleep problems and so on. This paper presents a new method which extracts and selects features from multi-channel EEG signals. This research focuses on three main points. Firstly, simple random sampling (SRS) technique is used to extract features from the time domain of EEG signals. Secondly, the sequential feature selection (SFS) algorithm is applied to select the key features and to reduce the dimensionality of the data. Finally, the selected features are forwarded to a least square support vector machine (LS_SVM) classifier to classify the EEG signals. The LS_SVM classifier classified the features which are extracted and selected from the SRS and the SFS. The experimental results show that the method achieves 99.90, 99.80 and 100 % for classification accuracy, sensitivity and specificity, respectively.

  7. Spatial and Time Domain Feature of ERP Speller System Extracted via Convolutional Neural Network.

    PubMed

    Yoon, Jaehong; Lee, Jungnyun; Whang, Mincheol

    2018-01-01

    Feature of event-related potential (ERP) has not been completely understood and illiteracy problem remains unsolved. To this end, P300 peak has been used as the feature of ERP in most brain-computer interface applications, but subjects who do not show such peak are common. Recent development of convolutional neural network provides a way to analyze spatial and temporal features of ERP. Here, we train the convolutional neural network with 2 convolutional layers whose feature maps represented spatial and temporal features of event-related potential. We have found that nonilliterate subjects' ERP show high correlation between occipital lobe and parietal lobe, whereas illiterate subjects only show correlation between neural activities from frontal lobe and central lobe. The nonilliterates showed peaks in P300, P500, and P700, whereas illiterates mostly showed peaks in around P700. P700 was strong in both subjects. We found that P700 peak may be the key feature of ERP as it appears in both illiterate and nonilliterate subjects.

  8. Spatial and Time Domain Feature of ERP Speller System Extracted via Convolutional Neural Network

    PubMed Central

    2018-01-01

    Feature of event-related potential (ERP) has not been completely understood and illiteracy problem remains unsolved. To this end, P300 peak has been used as the feature of ERP in most brain–computer interface applications, but subjects who do not show such peak are common. Recent development of convolutional neural network provides a way to analyze spatial and temporal features of ERP. Here, we train the convolutional neural network with 2 convolutional layers whose feature maps represented spatial and temporal features of event-related potential. We have found that nonilliterate subjects' ERP show high correlation between occipital lobe and parietal lobe, whereas illiterate subjects only show correlation between neural activities from frontal lobe and central lobe. The nonilliterates showed peaks in P300, P500, and P700, whereas illiterates mostly showed peaks in around P700. P700 was strong in both subjects. We found that P700 peak may be the key feature of ERP as it appears in both illiterate and nonilliterate subjects.

  9. Feature selection in feature network models: finding predictive subsets of features with the Positive Lasso.

    PubMed

    Frank, Laurence E; Heiser, Willem J

    2008-05-01

    A set of features is the basis for the network representation of proximity data achieved by feature network models (FNMs). Features are binary variables that characterize the objects in an experiment, with some measure of proximity as response variable. Sometimes features are provided by theory and play an important role in the construction of the experimental conditions. In some research settings, the features are not known a priori. This paper shows how to generate features in this situation and how to select an adequate subset of features that takes into account a good compromise between model fit and model complexity, using a new version of least angle regression that restricts coefficients to be non-negative, called the Positive Lasso. It will be shown that features can be generated efficiently with Gray codes that are naturally linked to the FNMs. The model selection strategy makes use of the fact that FNM can be considered as univariate multiple regression model. A simulation study shows that the proposed strategy leads to satisfactory results if the number of objects is less than or equal to 22. If the number of objects is larger than 22, the number of features selected by our method exceeds the true number of features in some conditions.

  10. CONTRASTIVE CULTURAL FEATURES IN FL TEACHING.

    ERIC Educational Resources Information Center

    FISCHER, MILLA

    CONTRASTIVE CULTURAL FEATURES SHOULD BE INCLUDED WITHIN THE FRAMEWORK OF THE GRAMMATICAL LESSON AS A MEANS OF COUNTERBALANCING THE GENERALLY UNSATISFACTORY MATERIAL USED FOR RUSSIAN TEXTS. LESSONS FOR AMERICAN STUDENTS LEARNING RUSSIAN SHOULD INCLUDE PHONOLOGICAL DRILLS ON VOWEL LENGTHS, DISTRIBUTION OF VOICED OBSTRUENTS, AND OBSTRUENT CLUSTERS,…

  11. A feature selection approach towards progressive vector transmission over the Internet

    NASA Astrophysics Data System (ADS)

    Miao, Ru; Song, Jia; Feng, Min

    2017-09-01

    WebGIS has been applied for visualizing and sharing geospatial information popularly over the Internet. In order to improve the efficiency of the client applications, the web-based progressive vector transmission approach is proposed. Important features should be selected and transferred firstly, and the methods for measuring the importance of features should be further considered in the progressive transmission. However, studies on progressive transmission for large-volume vector data have mostly focused on map generalization in the field of cartography, but rarely discussed on the selection of geographic features quantitatively. This paper applies information theory for measuring the feature importance of vector maps. A measurement model for the amount of information of vector features is defined based upon the amount of information for dealing with feature selection issues. The measurement model involves geometry factor, spatial distribution factor and thematic attribute factor. Moreover, a real-time transport protocol (RTP)-based progressive transmission method is then presented to improve the transmission of vector data. To clearly demonstrate the essential methodology and key techniques, a prototype for web-based progressive vector transmission is presented, and an experiment of progressive selection and transmission for vector features is conducted. The experimental results indicate that our approach clearly improves the performance and end-user experience of delivering and manipulating large vector data over the Internet.

  12. Integrated Education. Feature Issue.

    ERIC Educational Resources Information Center

    York, Jennifer, Ed.; Vandercook, Terri, Ed.

    1988-01-01

    This "feature issue" provides various perspectives on a number of integrated education topics, including successful integration practices and strategies, the changing roles of teachers, the appropriate role of research, the history and future of integrated education, and the realization of dreams of life in the mainstream for children with severe…

  13. Illustrated key for identification of the species included in the genus Leptoglossus (Hemiptera: Heteroptera: Coreidae: Coreinae: Anisoscelini), and descriptions of five new species and new synonyms.

    PubMed

    Brailovsky, Harry

    2014-05-05

    Five new species of Leptoglossus are described: L.caicosensis from Turks and Caicos Island, L. egeri and L. impensus from Bolivia, L. franckei from Costa Rica, and L. polychromus from Ecuador, Cooperative Republic of Guiana (British Guiana), and French Guiana. Leptoglossus argentinus Bergroth is synonymized under L. chilensis chilensis (Spinola) and Narnia anaticula Brailovsky & Barrera under Leptoglossus occidentalis Heidemann. Dorsal view drawings and key to the 61 known species and 1 subspecies are included; a complete checklist, and the position of each species within the species-group defined herein, are given except for two species L. macrophylus Stål and L. polychromus sp.nov., that are insertae-sedis. The pronotal disk, hind legs, and male genital capsule of the new species here described are illustrated.

  14. Establishing Chinese medicine characteristic tumor response evaluation system is the key to promote internationalization of Chinese medicine oncology.

    PubMed

    Li, Jie; Li, Lei; Liu, Rui; Lin, Hong-sheng

    2012-10-01

    The features and advantages of Chinese medicine (CM) in cancer comprehensive treatment have been in the spotlight of experts both at home and abroad. However, how to evaluate the effect of CM more objectively, scientifically and systematically is still the key problem of clinical trial, and also a limitation to the development and internationalization of CM oncology. The change of tumor response evaluation system in conventional medicine is gradually consistent with the features of CM clinical effect, such as they both focus on a combination of soft endpoints (i.e. quality of life, clinical benefit, etc.) and hard endpoints (i.e. tumor remission rate, time to progress, etc.). Although experts have proposed protocols of CM tumor response evaluation criteria and come to an agreement in general, divergences still exist in the importance, quantification and CM feature of the potential endpoints. Thus, establishing a CM characteristic and wildly accepted tumor response evaluation system is the key to promote internationalization of CM oncology, and also provides a more convenient and scientific platform for CM international cooperation and communication.

  15. Label-free visualization of ultrastructural features of artificial synapses via cryo-EM.

    PubMed

    Gopalakrishnan, Gopakumar; Yam, Patricia T; Madwar, Carolin; Bostina, Mihnea; Rouiller, Isabelle; Colman, David R; Lennox, R Bruce

    2011-12-21

    The ultrastructural details of presynapses formed between artificial substrates of submicrometer silica beads and hippocampal neurons are visualized via cryo-electron microscopy (cryo-EM). The silica beads are derivatized by poly-d-lysine or lipid bilayers. Molecular features known to exist at presynapses are clearly present at these artificial synapses, as visualized by cryo-EM. Key synaptic features such as the membrane contact area at synaptic junctions, the presynaptic bouton containing presynaptic vesicles, as well as microtubular structures can be identified. This is the first report of the direct, label-free observation of ultrastructural details of artificial synapses.

  16. Hierarchical Feature Extraction With Local Neural Response for Image Recognition.

    PubMed

    Li, Hong; Wei, Yantao; Li, Luoqing; Chen, C L P

    2013-04-01

    In this paper, a hierarchical feature extraction method is proposed for image recognition. The key idea of the proposed method is to extract an effective feature, called local neural response (LNR), of the input image with nontrivial discrimination and invariance properties by alternating between local coding and maximum pooling operation. The local coding, which is carried out on the locally linear manifold, can extract the salient feature of image patches and leads to a sparse measure matrix on which maximum pooling is carried out. The maximum pooling operation builds the translation invariance into the model. We also show that other invariant properties, such as rotation and scaling, can be induced by the proposed model. In addition, a template selection algorithm is presented to reduce computational complexity and to improve the discrimination ability of the LNR. Experimental results show that our method is robust to local distortion and clutter compared with state-of-the-art algorithms.

  17. A Co-modeling Method Based on Component Features for Mechatronic Devices in Aero-engines

    NASA Astrophysics Data System (ADS)

    Wang, Bin; Zhao, Haocen; Ye, Zhifeng

    2017-08-01

    Data-fused and user-friendly design of aero-engine accessories is required because of their structural complexity and stringent reliability. This paper gives an overview of a typical aero-engine control system and the development process of key mechatronic devices used. Several essential aspects of modeling and simulation in the process are investigated. Considering the limitations of a single theoretic model, feature-based co-modeling methodology is suggested to satisfy the design requirements and compensate for diversity of component sub-models for these devices. As an example, a stepper motor controlled Fuel Metering Unit (FMU) is modeled in view of the component physical features using two different software tools. An interface is suggested to integrate the single discipline models into the synthesized one. Performance simulation of this device using the co-model and parameter optimization for its key components are discussed. Comparison between delivery testing and the simulation shows that the co-model for the FMU has a high accuracy and the absolute superiority over a single model. Together with its compatible interface with the engine mathematical model, the feature-based co-modeling methodology is proven to be an effective technical measure in the development process of the device.

  18. Systematic review of mobile health behavioural interventions to improve uptake of HIV testing for vulnerable and key populations.

    PubMed

    Conserve, Donaldson F; Jennings, Larissa; Aguiar, Carolina; Shin, Grace; Handler, Lara; Maman, Suzanne

    2017-02-01

    Introduction This systematic narrative review examined the empirical evidence on the effectiveness of mobile health (mHealth) behavioural interventions designed to increase the uptake of HIV testing among vulnerable and key populations. Methods MEDLINE/PubMed, Embase, Web of Science, and Global Health electronic databases were searched. Studies were eligible for inclusion if they were published between 2005 and 2015, evaluated an mHealth intervention, and reported an outcome relating to HIV testing. We also reviewed the bibliographies of retrieved studies for other relevant citations. The methodological rigor of selected articles was assessed, and narrative analyses were used to synthesize findings from mixed methodologies. Results A total of seven articles met the inclusion criteria. Most mHealth interventions employed a text-messaging feature and were conducted in middle- and high-income countries. The methodological rigor was moderate among studies. The current literature suggests that mHealth interventions can have significant positive effects on HIV testing initiation among vulnerable and key populations, as well as the general public. In some cases, null results were observed. Qualitative themes relating to the use of mobile technologies to increase HIV testing included the benefits of having low-cost, confidential, and motivational communication. Reported barriers included cellular network restrictions, poor linkages with physical testing services, and limited knowledge of appropriate text-messaging dose. Discussion MHealth interventions may prove beneficial in reducing the proportion of undiagnosed persons living with HIV, particularly among vulnerable and key populations. However, more rigorous and tailored interventions are needed to assess the effectiveness of widespread use.

  19. Systematic review of mobile-health behavioral interventions to improve uptake of HIV testing for vulnerable and key populations

    PubMed Central

    Conserve, Donaldson F.; Jennings, Larissa; Aguiar, Carolina; Shin, Grace; Handler, Lara; Maman, Suzanne

    2016-01-01

    Objective This systematic narrative review examined the empirical evidence on the effectiveness of mobile health (mHealth) behavioral interventions designed to increase uptake of HIV testing among vulnerable and key populations. Methods MEDLINE/PubMed, Embase, Web of Science, and Global Health electronic databases were searched. Studies were eligible for inclusion if they were published between 2005 and 2015, evaluated an mHealth intervention, and reported an outcome relating to HIV testing. We also reviewed the bibliographies of retrieved studies for other relevant citations. The methodological rigor of selected articles was assessed, and narrative analyses were used to synthesize findings from mixed methodologies. Results A total of seven articles met the inclusion criteria. Most mHealth interventions employed a text-messaging feature and were conducted in middle- and high-income countries. The methodological rigor was moderate among studies. The current literature suggests that mHealth interventions can have significant positive effects on HIV testing initiation among vulnerable and key populations, as well as the general public. In some cases, null results were observed. Qualitative themes relating to use of mobile technologies to increase HIV testing included the benefits of having low-cost, confidential, and motivational communication. Reported barriers included cellular network restrictions, poor linkages with physical testing services, and limited knowledge of appropriate text-messaging dose. Conclusions MHealth interventions may prove beneficial in reducing the proportion of undiagnosed persons living with HIV, particularly among vulnerable and key populations. However, more rigorous and tailored intervention trials are needed to assess the effectiveness of widespread use. PMID:27056905

  20. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  1. The Development of Differential Use of Inner and Outer Face Features in Familiar Face Identification.

    ERIC Educational Resources Information Center

    Campbell, Ruth; And Others

    1995-01-01

    Studied 4- to 10-year-olds' familiarity judgments of peers. Found that, contrary to adults, external facial features were key. Also found that the switch to adult recognition pattern takes place after the ninth year. (ETB)

  2. Automated Recognition of 3D Features in GPIR Images

    NASA Technical Reports Server (NTRS)

    Park, Han; Stough, Timothy; Fijany, Amir

    2007-01-01

    A method of automated recognition of three-dimensional (3D) features in images generated by ground-penetrating imaging radar (GPIR) is undergoing development. GPIR 3D images can be analyzed to detect and identify such subsurface features as pipes and other utility conduits. Until now, much of the analysis of GPIR images has been performed manually by expert operators who must visually identify and track each feature. The present method is intended to satisfy a need for more efficient and accurate analysis by means of algorithms that can automatically identify and track subsurface features, with minimal supervision by human operators. In this method, data from multiple sources (for example, data on different features extracted by different algorithms) are fused together for identifying subsurface objects. The algorithms of this method can be classified in several different ways. In one classification, the algorithms fall into three classes: (1) image-processing algorithms, (2) feature- extraction algorithms, and (3) a multiaxis data-fusion/pattern-recognition algorithm that includes a combination of machine-learning, pattern-recognition, and object-linking algorithms. The image-processing class includes preprocessing algorithms for reducing noise and enhancing target features for pattern recognition. The feature-extraction algorithms operate on preprocessed data to extract such specific features in images as two-dimensional (2D) slices of a pipe. Then the multiaxis data-fusion/ pattern-recognition algorithm identifies, classifies, and reconstructs 3D objects from the extracted features. In this process, multiple 2D features extracted by use of different algorithms and representing views along different directions are used to identify and reconstruct 3D objects. In object linking, which is an essential part of this process, features identified in successive 2D slices and located within a threshold radius of identical features in adjacent slices are linked in a

  3. Fault-tolerant feature-based estimation of space debris rotational motion during active removal missions

    NASA Astrophysics Data System (ADS)

    Biondi, Gabriele; Mauro, Stefano; Pastorelli, Stefano; Sorli, Massimo

    2018-05-01

    One of the key functionalities required by an Active Debris Removal mission is the assessment of the target kinematics and inertial properties. Passive sensors, such as stereo cameras, are often included in the onboard instrumentation of a chaser spacecraft for capturing sequential photographs and for tracking features of the target surface. A plenty of methods, based on Kalman filtering, are available for the estimation of the target's state from feature positions; however, to guarantee the filter convergence, they typically require continuity of measurements and the capability of tracking a fixed set of pre-defined features of the object. These requirements clash with the actual tracking conditions: failures in feature detection often occur and the assumption of having some a-priori knowledge about the shape of the target could be restrictive in certain cases. The aim of the presented work is to propose a fault-tolerant alternative method for estimating the angular velocity and the relative magnitudes of the principal moments of inertia of the target. Raw data regarding the positions of the tracked features are processed to evaluate corrupted values of a 3-dimentional parameter which entirely describes the finite screw motion of the debris and which primarily is invariant on the particular set of considered features of the object. Missing values of the parameter are completely restored exploiting the typical periodicity of the rotational motion of an uncontrolled satellite: compressed sensing techniques, typically adopted for recovering images or for prognostic applications, are herein used in a completely original fashion for retrieving a kinematic signal that appears sparse in the frequency domain. Due to its invariance about the features, no assumptions are needed about the target's shape and continuity of the tracking. The obtained signal is useful for the indirect evaluation of an attitude signal that feeds an unscented Kalman filter for the estimation of

  4. Speech-feature discrimination in children with Asperger syndrome as determined with the multi-feature mismatch negativity paradigm.

    PubMed

    Kujala, T; Kuuluvainen, S; Saalasti, S; Jansson-Verkasalo, E; von Wendt, L; Lepistö, T

    2010-09-01

    Asperger syndrome, belonging to the autistic spectrum of disorders, involves deficits in social interaction and prosodic use of language but normal development of formal language abilities. Auditory processing involves both hyper- and hypoactive reactivity to acoustic changes. Responses composed of mismatch negativity (MMN) and obligatory components were recorded for five types of deviations in syllables (vowel, vowel duration, consonant, syllable frequency, syllable intensity) with the multi-feature paradigm from 8-12-year old children with Asperger syndrome. Children with Asperger syndrome had larger MMNs for intensity and smaller MMNs for frequency changes than typically developing children, whereas no MMN group differences were found for the other deviant stimuli. Furthermore, children with Asperger syndrome performed more poorly than controls in Comprehension of Instructions subtest of a language test battery. Cortical speech-sound discrimination is aberrant in children with Asperger syndrome. This is evident both as hypersensitive and depressed neural reactions to speech-sound changes, and is associated with features (frequency, intensity) which are relevant for prosodic processing. The multi-feature MMN paradigm, which includes variation and thereby resembles natural speech hearing circumstances, suggests abnormal pattern of speech discrimination in Asperger syndrome, including both hypo- and hypersensitive responses for speech features. 2010 International Federation of Clinical Neurophysiology. Published by Elsevier Ireland Ltd. All rights reserved.

  5. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae)

    PubMed Central

    Hernández, Macotulio Soto; Jones, Robert W.; Castillo, Pedro Reyes

    2013-01-01

    Abstract Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included. PMID:23717181

  6. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  7. A Key to the New Library.

    ERIC Educational Resources Information Center

    Gerryts, Egbert; Pienaar, Heila

    This paper discusses finding the key to a new library in order to ensure its future, stressing the importance of alignment between strategy and people. The first section addresses management philosophy for renewal, including replacing the inflexible hierarchical pyramidal structure by a network organization with a service and competency management…

  8. Global map of eolian features on Mars.

    USGS Publications Warehouse

    Ward, A.W.; Doyle, K.B.; Helm, P.J.; Weisman, M.K.; Witbeck, N.E.

    1985-01-01

    Ten basic categories of eolian features on Mars were identified from a survey of Mariner 9 and Viking orbiter images. The ten features mapped are 1) light streaks (including frost streaks), 2) dark streaks, 3) sand sheets or splotches, 4) barchan dunes, 5) transverse dunes, 6) crescentic dunes, 7) anomalous dunes, 8) yardangs, 9) wind grooves, and 10) deflation pits. The features were mapped in groups, not as individual landforms, and recorded according to their geographic positions and orientations on maps of 1:12.5 million or 1:25 million scale. -from Authors

  9. Accelerating Biomedical Signal Processing Using GPU: A Case Study of Snore Sound Feature Extraction.

    PubMed

    Guo, Jian; Qian, Kun; Zhang, Gongxuan; Xu, Huijie; Schuller, Björn

    2017-12-01

    The advent of 'Big Data' and 'Deep Learning' offers both, a great challenge and a huge opportunity for personalised health-care. In machine learning-based biomedical data analysis, feature extraction is a key step for 'feeding' the subsequent classifiers. With increasing numbers of biomedical data, extracting features from these 'big' data is an intensive and time-consuming task. In this case study, we employ a Graphics Processing Unit (GPU) via Python to extract features from a large corpus of snore sound data. Those features can subsequently be imported into many well-known deep learning training frameworks without any format processing. The snore sound data were collected from several hospitals (20 subjects, with 770-990 MB per subject - in total 17.20 GB). Experimental results show that our GPU-based processing significantly speeds up the feature extraction phase, by up to seven times, as compared to the previous CPU system.

  10. Text feature extraction based on deep learning: a review.

    PubMed

    Liang, Hong; Sun, Xiao; Sun, Yunlei; Gao, Yuan

    2017-01-01

    Selection of text feature item is a basic and important matter for text mining and information retrieval. Traditional methods of feature extraction require handcrafted features. To hand-design, an effective feature is a lengthy process, but aiming at new applications, deep learning enables to acquire new effective feature representation from training data. As a new feature extraction method, deep learning has made achievements in text mining. The major difference between deep learning and conventional methods is that deep learning automatically learns features from big data, instead of adopting handcrafted features, which mainly depends on priori knowledge of designers and is highly impossible to take the advantage of big data. Deep learning can automatically learn feature representation from big data, including millions of parameters. This thesis outlines the common methods used in text feature extraction first, and then expands frequently used deep learning methods in text feature extraction and its applications, and forecasts the application of deep learning in feature extraction.

  11. Identification of key regulators for the migration and invasion of rheumatoid synoviocytes through a systems approach

    PubMed Central

    You, Sungyong; Yoo, Seung-Ah; Choi, Susanna; Kim, Ji-Young; Park, Su-Jung; Ji, Jong Dae; Kim, Tae-Hwan; Kim, Ki-Jo; Cho, Chul-Soo; Hwang, Daehee; Kim, Wan-Uk

    2014-01-01

    Rheumatoid synoviocytes, which consist of fibroblast-like synoviocytes (FLSs) and synovial macrophages (SMs), are crucial for the progression of rheumatoid arthritis (RA). Particularly, FLSs of RA patients (RA-FLSs) exhibit invasive characteristics reminiscent of cancer cells, destroying cartilage and bone. RA-FLSs and SMs originate differently from mesenchymal and myeloid cells, respectively, but share many pathologic functions. However, the molecular signatures and biological networks representing the distinct and shared features of the two cell types are unknown. We performed global transcriptome profiling of FLSs and SMs obtained from RA and osteoarthritis patients. By comparing the transcriptomes, we identified distinct molecular signatures and cellular processes defining invasiveness of RA-FLSs and proinflammatory properties of RA-SMs, respectively. Interestingly, under the interleukin-1β (IL-1β)–stimulated condition, the RA-FLSs newly acquired proinflammatory signature dominant in RA-SMs without losing invasive properties. We next reconstructed a network model that delineates the shared, RA-FLS–dominant (invasive), and RA-SM–dominant (inflammatory) processes. From the network model, we selected 13 genes, including periostin, osteoblast-specific factor (POSTN) and twist basic helix–loop–helix transcription factor 1 (TWIST1), as key regulator candidates responsible for FLS invasiveness. Of note, POSTN and TWIST1 expressions were elevated in independent RA-FLSs and further instigated by IL-1β. Functional assays demonstrated the requirement of POSTN and TWIST1 for migration and invasion of RA-FLSs stimulated with IL-1β. Together, our systems approach to rheumatoid synovitis provides a basis for identifying key regulators responsible for pathological features of RA-FLSs and -SMs, demonstrating how a certain type of cells acquires functional redundancy under chronic inflammatory conditions. PMID:24374632

  12. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  13. Windblown Features on Venus and Geological Mapping

    NASA Technical Reports Server (NTRS)

    Greeley, Ronald

    1999-01-01

    The objectives of this study were to: 1) develop a global data base of aeolian features by searching Magellan coverage for possible time-variable wind streaks, 2) analyze the data base to characterize aeolian features and processes on Venus, 3) apply the analysis to assessments of wind patterns near the surface and for comparisons with atmospheric circulation models, 4) analyze shuttle radar data acquired for aeolian features on Earth to determine their radar characteristics, and 5) conduct geological mapping of two quadrangles. Wind, or aeolian, features are observed on Venus and aeolian processes play a role in modifying its surface. Analysis of features resulting from aeolian processes provides insight into characteristics of both the atmosphere and the surface. Wind related features identified on Venus include erosional landforms (yardangs), depositional dune fields, and features resulting from the interaction of the atmosphere and crater ejecta at the time of impact. The most abundant aeolian features are various wind streaks. Their discovery on Venus afforded the opportunity to learn about the interaction of the atmosphere and surface, both for the identification of sediments and in mapping near-surface winds.

  14. Study for Updated Gout Classification Criteria (SUGAR): identification of features to classify gout

    PubMed Central

    Taylor, William J.; Fransen, Jaap; Jansen, Tim L.; Dalbeth, Nicola; Schumacher, H. Ralph; Brown, Melanie; Louthrenoo, Worawit; Vazquez-Mellado, Janitzia; Eliseev, Maxim; McCarthy, Geraldine; Stamp, Lisa K.; Perez-Ruiz, Fernando; Sivera, Francisca; Ea, Hang-Korng; Gerritsen, Martijn; Scire, Carlo; Cavagna, Lorenzo; Lin, Chingtsai; Chou, Yin-Yi; Tausche, Anne-Kathrin; Vargas-Santos, Ana Beatriz; Janssen, Matthijs; Chen, Jiunn-Horng; Slot, Ole; Cimmino, Marco A.; Uhlig, Till; Neogi, Tuhina

    2015-01-01

    Objective To determine which clinical, laboratory and imaging features most accurately distinguished gout from non-gout. Methods A cross-sectional study of consecutive rheumatology clinic patients with at least one swollen joint or subcutaneous tophus. Gout was defined by synovial fluid or tophus aspirate microscopy by certified examiners in all patients. The sample was randomly divided into a model development (2/3) and test sample (1/3). Univariate and multivariate association between clinical features and MSU-defined gout was determined using logistic regression modelling. Shrinkage of regression weights was performed to prevent over-fitting of the final model. Latent class analysis was conducted to identify patterns of joint involvement. Results In total, 983 patients were included. Gout was present in 509 (52%). In the development sample (n=653), these features were selected for the final model (multivariate OR) joint erythema (2.13), difficulty walking (7.34), time to maximal pain < 24 hours (1.32), resolution by 2 weeks (3.58), tophus (7.29), MTP1 ever involved (2.30), location of currently tender joints: Other foot/ankle (2.28), MTP1 (2.82), serum urate level > 6 mg/dl (0.36 mmol/l) (3.35), ultrasound double contour sign (7.23), Xray erosion or cyst (2.49). The final model performed adequately in the test set with no evidence of misfit, high discrimination and predictive ability. MTP1 involvement was the most common joint pattern (39.4%) in gout cases. Conclusion Ten key discriminating features have been identified for further evaluation for new gout classification criteria. Ultrasound findings and degree of uricemia add discriminating value, and will significantly contribute to more accurate classification criteria. PMID:25777045

  15. Progress in satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bedington, Robert; Arrazola, Juan Miguel; Ling, Alexander

    2017-08-01

    Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world.

  16. Visual Prediction Error Spreads Across Object Features in Human Visual Cortex

    PubMed Central

    Summerfield, Christopher; Egner, Tobias

    2016-01-01

    Visual cognition is thought to rely heavily on contextual expectations. Accordingly, previous studies have revealed distinct neural signatures for expected versus unexpected stimuli in visual cortex. However, it is presently unknown how the brain combines multiple concurrent stimulus expectations such as those we have for different features of a familiar object. To understand how an unexpected object feature affects the simultaneous processing of other expected feature(s), we combined human fMRI with a task that independently manipulated expectations for color and motion features of moving-dot stimuli. Behavioral data and neural signals from visual cortex were then interrogated to adjudicate between three possible ways in which prediction error (surprise) in the processing of one feature might affect the concurrent processing of another, expected feature: (1) feature processing may be independent; (2) surprise might “spread” from the unexpected to the expected feature, rendering the entire object unexpected; or (3) pairing a surprising feature with an expected feature might promote the inference that the two features are not in fact part of the same object. To formalize these rival hypotheses, we implemented them in a simple computational model of multifeature expectations. Across a range of analyses, behavior and visual neural signals consistently supported a model that assumes a mixing of prediction error signals across features: surprise in one object feature spreads to its other feature(s), thus rendering the entire object unexpected. These results reveal neurocomputational principles of multifeature expectations and indicate that objects are the unit of selection for predictive vision. SIGNIFICANCE STATEMENT We address a key question in predictive visual cognition: how does the brain combine multiple concurrent expectations for different features of a single object such as its color and motion trajectory? By combining a behavioral protocol that

  17. Enhancing facial features by using clear facial features

    NASA Astrophysics Data System (ADS)

    Rofoo, Fanar Fareed Hanna

    2017-09-01

    The similarity of features between individuals of same ethnicity motivated the idea of this project. The idea of this project is to extract features of clear facial image and impose them on blurred facial image of same ethnic origin as an approach to enhance a blurred facial image. A database of clear images containing 30 individuals equally divided to five different ethnicities which were Arab, African, Chines, European and Indian. Software was built to perform pre-processing on images in order to align the features of clear and blurred images. And the idea was to extract features of clear facial image or template built from clear facial images using wavelet transformation to impose them on blurred image by using reverse wavelet. The results of this approach did not come well as all the features did not align together as in most cases the eyes were aligned but the nose or mouth were not aligned. Then we decided in the next approach to deal with features separately but in the result in some cases a blocky effect was present on features due to not having close matching features. In general the available small database did not help to achieve the goal results, because of the number of available individuals. The color information and features similarity could be more investigated to achieve better results by having larger database as well as improving the process of enhancement by the availability of closer matches in each ethnicity.

  18. Treatment Options for Plasma Cell Neoplasms (Including Multiple Myeloma)

    MedlinePlus

    ... Health Professional Plasma Cell Neoplasms Treatment Research Plasma Cell Neoplasms (Including Multiple Myeloma) Treatment (PDQ®)–Patient Version General Information About Plasma Cell Neoplasms Go to Health Professional Version Key Points ...

  19. Treatment Option Overview (Plasma Cell Neoplasms Including Multiple Myeloma)

    MedlinePlus

    ... Health Professional Plasma Cell Neoplasms Treatment Research Plasma Cell Neoplasms (Including Multiple Myeloma) Treatment (PDQ®)–Patient Version General Information About Plasma Cell Neoplasms Go to Health Professional Version Key Points ...

  20. Faked state attacks on realistic round robin DPS quantum key distribution systems and countermeasure

    NASA Astrophysics Data System (ADS)

    Iwakoshi, T.

    2015-05-01

    In May 2014, a new quantum key distribution protocol named "Round Robin Differential-Phase-Shift Quantum Key Distribution (RR DPS QKD)" was proposed. It has a special feature that the key consumption via privacy amplification is a small constant because RR DPS QKD guarantees its security by information causality, not by information-disturbance trade-off. Therefore, the authors claimed that RR DPS QKD systems does not need to monitor the disturbance by an attacker in the quantum channel. However, this study shows that a modified Faked-State Attack (or so-called bright illumination attack) can hack a RR DPS QKD system almost perfectly if it is implemented with realistic detectors even information-causality guarantees the security of RR DPS QKD protocol. Therefore, this study also proposes a possible Measurement-Device-Independent RR DPS QKD system to avoid the modified Faked-State Attack.

  1. Charge Segregation and Low Hydrophobicity Are Key Features of Ribosomal Proteins from Different Organisms*

    PubMed Central

    Fedyukina, Daria V.; Jennaro, Theodore S.; Cavagnero, Silvia

    2014-01-01

    Ribosomes are large and highly charged macromolecular complexes consisting of RNA and proteins. Here, we address the electrostatic and nonpolar properties of ribosomal proteins that are important for ribosome assembly and interaction with other cellular components and may influence protein folding on the ribosome. We examined 50 S ribosomal subunits from 10 species and found a clear distinction between the net charge of ribosomal proteins from halophilic and non-halophilic organisms. We found that ∼67% ribosomal proteins from halophiles are negatively charged, whereas only up to ∼15% of ribosomal proteins from non-halophiles share this property. Conversely, hydrophobicity tends to be lower for ribosomal proteins from halophiles than for the corresponding proteins from non-halophiles. Importantly, the surface electrostatic potential of ribosomal proteins from all organisms, especially halophiles, has distinct positive and negative regions across all the examined species. Positively and negatively charged residues of ribosomal proteins tend to be clustered in buried and solvent-exposed regions, respectively. Hence, the majority of ribosomal proteins is characterized by a significant degree of intramolecular charge segregation, regardless of the organism of origin. This key property enables the ribosome to accommodate proteins within its complex scaffold regardless of their overall net charge. PMID:24398678

  2. Feature inference with uncertain categorization: Re-assessing Anderson's rational model.

    PubMed

    Konovalova, Elizaveta; Le Mens, Gaël

    2017-09-18

    A key function of categories is to help predictions about unobserved features of objects. At the same time, humans are often in situations where the categories of the objects they perceive are uncertain. In an influential paper, Anderson (Psychological Review, 98(3), 409-429, 1991) proposed a rational model for feature inferences with uncertain categorization. A crucial feature of this model is the conditional independence assumption-it assumes that the within category feature correlation is zero. In prior research, this model has been found to provide a poor fit to participants' inferences. This evidence is restricted to task environments inconsistent with the conditional independence assumption. Currently available evidence thus provides little information about how this model would fit participants' inferences in a setting with conditional independence. In four experiments based on a novel paradigm and one experiment based on an existing paradigm, we assess the performance of Anderson's model under conditional independence. We find that this model predicts participants' inferences better than competing models. One model assumes that inferences are based on just the most likely category. The second model is insensitive to categories but sensitive to overall feature correlation. The performance of Anderson's model is evidence that inferences were influenced not only by the more likely category but also by the other candidate category. Our findings suggest that a version of Anderson's model which relaxes the conditional independence assumption will likely perform well in environments characterized by within-category feature correlation.

  3. Features of childhood Sjögren's syndrome in comparison to adult Sjögren's syndrome: considerations in establishing child-specific diagnostic criteria.

    PubMed

    Yokogawa, Naoto; Lieberman, Scott M; Sherry, David D; Vivino, Frederick B

    2016-01-01

    To describe the clinical features of childhood Sjögren's syndrome (SS) in comparison to adult SS and to evaluate possible child-specific modifications to existing adult criteria for use in diagnosing childhood SS. We retrospectively identified children (age <18 years) with SS and compared the clinical, laboratory, and histopathological features of these children based on presence or absence of parotitis. We compared these features to adults with SS and evaluated the applicability of existing classification criteria in diagnosing childhood SS. Child-specific modifications to existing criteria were evaluated. Twenty-six children were included in our childhood SS group. Sixteen children had parotitis at or before presentation. Absence of parotitis was associated with greater degree of organ damage based on SS disease damage index. Compared to 413 adult SS patients, childhood SS was more commonly associated with parotitis, positive serologies, neurologic and nephrologic manifestations, and non-specific features (fever, lymphadenopathy) but less commonly associated with dry mouth and dry eyes. Only a minority of these children met previously established criteria for adult SS. Inclusion of child-specific features such as parotitis and the presence of any focal lymphocytic sialadenitis on minor salivary gland biopsy increased the proportion of children meeting these criteria. Childhood SS features may be different than adult SS features necessitating child-specific criteria for better diagnosis of childhood SS, a key step towards better understanding the features, prognosis, and outcomes in this disease.

  4. An Extended Normalization Model of Attention Accounts for Feature-Based Attentional Enhancement of Both Response and Coherence Gain

    PubMed Central

    Krishna, B. Suresh; Treue, Stefan

    2016-01-01

    Paying attention to a sensory feature improves its perception and impairs that of others. Recent work has shown that a Normalization Model of Attention (NMoA) can account for a wide range of physiological findings and the influence of different attentional manipulations on visual performance. A key prediction of the NMoA is that attention to a visual feature like an orientation or a motion direction will increase the response of neurons preferring the attended feature (response gain) rather than increase the sensory input strength of the attended stimulus (input gain). This effect of feature-based attention on neuronal responses should translate to similar patterns of improvement in behavioral performance, with psychometric functions showing response gain rather than input gain when attention is directed to the task-relevant feature. In contrast, we report here that when human subjects are cued to attend to one of two motion directions in a transparent motion display, attentional effects manifest as a combination of input and response gain. Further, the impact on input gain is greater when attention is directed towards a narrow range of motion directions than when it is directed towards a broad range. These results are captured by an extended NMoA, which either includes a stimulus-independent attentional contribution to normalization or utilizes direction-tuned normalization. The proposed extensions are consistent with the feature-similarity gain model of attention and the attentional modulation in extrastriate area MT, where neuronal responses are enhanced and suppressed by attention to preferred and non-preferred motion directions respectively. PMID:27977679

  5. Emotional, behavioral, and developmental features indicative of neglect or emotional abuse in preschool children: a systematic review.

    PubMed

    Naughton, Aideen Mary; Maguire, Sabine Ann; Mann, Mala Kanthi; Lumb, Rebecca Caroline; Tempest, Vanessa; Gracias, Shirley; Kemp, Alison Mary

    2013-08-01

    Early intervention for neglect or emotional abuse in preschoolers may mitigate lifelong consequences, yet practitioners lack confidence in recognizing these children. To define the emotional, behavioral, and developmental features of neglect or emotional abuse in preschoolers. A literature search of 18 databases, 6 websites, and supplementary searching performed from January 1, 1960, to February 1, 2011, identified 22 669 abstracts. Standardized critical appraisal of 164 articles was conducted by 2 independent, trained reviewers. Inclusion criteria were children aged 0 to 6 years with confirmed neglect or emotional abuse who had emotional, behavioral, and developmental features recorded or for whom the carer-child interaction was documented. Twenty-eight case-control (matched for socioeconomic, educational level, and ethnicity), 1 cross-sectional, and 13 cohort studies were included. Key features in the child included the following: aggression (11 studies) exhibited as angry, disruptive behavior, conduct problems, oppositional behavior, and low ego control; withdrawal or passivity (12 studies), including negative self-esteem, anxious or avoidant behavior, poor emotional knowledge, and difficulties in interpreting emotional expressions in others; developmental delay (17 studies), particularly delayed language, cognitive function, and overall development quotient; poor peer interaction (5 studies), showing poor social interactions, unlikely to act to relieve distress in others; and transition (6 studies) from ambivalent to avoidant insecure attachment pattern and from passive to increasingly aggressive behavior and negative self-representation. Emotional knowledge, cognitive function, and language deteriorate without intervention. Poor sensitivity, hostility, criticism, or disinterest characterize maternal-child interactions. Preschool children who have been neglected or emotionally abused exhibit a range of serious emotional and behavioral difficulties and adverse

  6. Statistical Methods for Proteomic Biomarker Discovery based on Feature Extraction or Functional Modeling Approaches.

    PubMed

    Morris, Jeffrey S

    2012-01-01

    In recent years, developments in molecular biotechnology have led to the increased promise of detecting and validating biomarkers, or molecular markers that relate to various biological or medical outcomes. Proteomics, the direct study of proteins in biological samples, plays an important role in the biomarker discovery process. These technologies produce complex, high dimensional functional and image data that present many analytical challenges that must be addressed properly for effective comparative proteomics studies that can yield potential biomarkers. Specific challenges include experimental design, preprocessing, feature extraction, and statistical analysis accounting for the inherent multiple testing issues. This paper reviews various computational aspects of comparative proteomic studies, and summarizes contributions I along with numerous collaborators have made. First, there is an overview of comparative proteomics technologies, followed by a discussion of important experimental design and preprocessing issues that must be considered before statistical analysis can be done. Next, the two key approaches to analyzing proteomics data, feature extraction and functional modeling, are described. Feature extraction involves detection and quantification of discrete features like peaks or spots that theoretically correspond to different proteins in the sample. After an overview of the feature extraction approach, specific methods for mass spectrometry ( Cromwell ) and 2D gel electrophoresis ( Pinnacle ) are described. The functional modeling approach involves modeling the proteomic data in their entirety as functions or images. A general discussion of the approach is followed by the presentation of a specific method that can be applied, wavelet-based functional mixed models, and its extensions. All methods are illustrated by application to two example proteomic data sets, one from mass spectrometry and one from 2D gel electrophoresis. While the specific methods

  7. Smart cards--the key to trustworthy health information systems.

    PubMed Central

    Neame, R.

    1997-01-01

    Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719

  8. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  9. Identification of features of electronic prescribing systems to support quality and safety in primary care using a modified Delphi process.

    PubMed

    Sweidan, Michelle; Williamson, Margaret; Reeve, James F; Harvey, Ken; O'Neill, Jennifer A; Schattner, Peter; Snowdon, Teri

    2010-04-15

    Electronic prescribing is increasingly being used in primary care and in hospitals. Studies on the effects of e-prescribing systems have found evidence for both benefit and harm. The aim of this study was to identify features of e-prescribing software systems that support patient safety and quality of care and that are useful to the clinician and the patient, with a focus on improving the quality use of medicines. Software features were identified by a literature review, key informants and an expert group. A modified Delphi process was used with a 12-member multidisciplinary expert group to reach consensus on the expected impact of the features in four domains: patient safety, quality of care, usefulness to the clinician and usefulness to the patient. The setting was electronic prescribing in general practice in Australia. A list of 114 software features was developed. Most of the features relate to the recording and use of patient data, the medication selection process, prescribing decision support, monitoring drug therapy and clinical reports. The expert group rated 78 of the features (68%) as likely to have a high positive impact in at least one domain, 36 features (32%) as medium impact, and none as low or negative impact. Twenty seven features were rated as high positive impact across 3 or 4 domains including patient safety and quality of care. Ten features were considered "aspirational" because of a lack of agreed standards and/or suitable knowledge bases. This study defines features of e-prescribing software systems that are expected to support safety and quality, especially in relation to prescribing and use of medicines in general practice. The features could be used to develop software standards, and could be adapted if necessary for use in other settings and countries.

  10. Identification of features of electronic prescribing systems to support quality and safety in primary care using a modified Delphi process

    PubMed Central

    2010-01-01

    Background Electronic prescribing is increasingly being used in primary care and in hospitals. Studies on the effects of e-prescribing systems have found evidence for both benefit and harm. The aim of this study was to identify features of e-prescribing software systems that support patient safety and quality of care and that are useful to the clinician and the patient, with a focus on improving the quality use of medicines. Methods Software features were identified by a literature review, key informants and an expert group. A modified Delphi process was used with a 12-member multidisciplinary expert group to reach consensus on the expected impact of the features in four domains: patient safety, quality of care, usefulness to the clinician and usefulness to the patient. The setting was electronic prescribing in general practice in Australia. Results A list of 114 software features was developed. Most of the features relate to the recording and use of patient data, the medication selection process, prescribing decision support, monitoring drug therapy and clinical reports. The expert group rated 78 of the features (68%) as likely to have a high positive impact in at least one domain, 36 features (32%) as medium impact, and none as low or negative impact. Twenty seven features were rated as high positive impact across 3 or 4 domains including patient safety and quality of care. Ten features were considered "aspirational" because of a lack of agreed standards and/or suitable knowledge bases. Conclusions This study defines features of e-prescribing software systems that are expected to support safety and quality, especially in relation to prescribing and use of medicines in general practice. The features could be used to develop software standards, and could be adapted if necessary for use in other settings and countries. PMID:20398294

  11. Housing Stakeholder Preferences for the "Soft" Features of Sustainable and Healthy Housing Design in the UK.

    PubMed

    Prochorskaite, Agne; Couch, Chris; Malys, Naglis; Maliene, Vida

    2016-01-07

    It is widely recognised that the quantity and sustainability of new homes in the UK need to increase. However, it is important that sustainable housing is regarded holistically, and not merely in environmental terms, and incorporates elements that enhance the quality of life, health and well-being of its users. This paper focuses on the "soft" features of sustainable housing, that is, the non-technological components of sustainable housing and neighbourhood design that can impact occupants' health and well-being. Aims of the study are to ascertain the relative level of importance that key housing stakeholders attach to these features and to investigate whether the opinions of housing users and housing providers are aligned with regards to their importance. An online survey was carried out to gauge the level of importance that the key stakeholders, such as housing users, local authorities, housing associations, and developers (n = 235), attach to these features. Results revealed that while suitable indoor space was the feature regarded as most important by all stakeholders, there were also a number of disparities in opinion between housing users and housing providers (and among the different types of providers). This implies a scope for initiatives to achieve a better alignment between housing users and providers.

  12. Space Station: Key to the Future.

    ERIC Educational Resources Information Center

    National Aeronautics and Space Administration, Washington, DC.

    The possible applications, advantages and features of an advanced space station to be developed are considered in a non-technical manner in this booklet. Some of the areas of application considered include the following: the detection of large scale dynamic earth processes such as changes in snow pack, crops, and air pollution levels; the…

  13. Citing geospatial feature inventories with XML manifests

    NASA Astrophysics Data System (ADS)

    Bose, R.; McGarva, G.

    2006-12-01

    Today published scientific papers include a growing number of citations for online information sources that either complement or replace printed journals and books. We anticipate this same trend for cartographic citations used in the geosciences, following advances in web mapping and geographic feature-based services. Instead of using traditional libraries to resolve citations for print material, the geospatial citation life cycle will include requesting inventories of objects or geographic features from distributed geospatial data repositories. Using a case study from the UK Ordnance Survey MasterMap database, which is illustrative of geographic object-based products in general, we propose citing inventories of geographic objects using XML feature manifests. These manifests: (1) serve as a portable listing of sets of versioned features; (2) could be used as citations within the identification portion of an international geospatial metadata standard; (3) could be incorporated into geospatial data transfer formats such as GML; but (4) can be resolved only with comprehensive, curated repositories of current and historic data. This work has implications for any researcher who foresees the need to make or resolve references to online geospatial databases.

  14. Space Object Classification Using Fused Features of Time Series Data

    NASA Astrophysics Data System (ADS)

    Jia, B.; Pham, K. D.; Blasch, E.; Shen, D.; Wang, Z.; Chen, G.

    In this paper, a fused feature vector consisting of raw time series and texture feature information is proposed for space object classification. The time series data includes historical orbit trajectories and asteroid light curves. The texture feature is derived from recurrence plots using Gabor filters for both unsupervised learning and supervised learning algorithms. The simulation results show that the classification algorithms using the fused feature vector achieve better performance than those using raw time series or texture features only.

  15. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  16. Salient object detection method based on multiple semantic features

    NASA Astrophysics Data System (ADS)

    Wang, Chunyang; Yu, Chunyan; Song, Meiping; Wang, Yulei

    2018-04-01

    The existing salient object detection model can only detect the approximate location of salient object, or highlight the background, to resolve the above problem, a salient object detection method was proposed based on image semantic features. First of all, three novel salient features were presented in this paper, including object edge density feature (EF), object semantic feature based on the convex hull (CF) and object lightness contrast feature (LF). Secondly, the multiple salient features were trained with random detection windows. Thirdly, Naive Bayesian model was used for combine these features for salient detection. The results on public datasets showed that our method performed well, the location of salient object can be fixed and the salient object can be accurately detected and marked by the specific window.

  17. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  18. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  19. WRKY Transcription Factors: Key Components in Abscisic Acid Signaling

    DTIC Science & Technology

    2011-01-01

    Review article WRKY transcription factors : key components in abscisic acid signalling Deena L. Rushton1, Prateek Tripathi1, Roel C. Rabara1, Jun Lin1...May 2011. *Correspondence (Tel +605 688 5749; fax +605 688 5624; email paul.rushton@sdstate.edu) Keywords: abscisic acid, WRKY transcription factor ...seed germination, drought, abiotic stress. Summary WRKY transcription factors (TFs) are key regulators of many plant processes, including the responses

  20. Visual attention to features by associative learning.

    PubMed

    Gozli, Davood G; Moskowitz, Joshua B; Pratt, Jay

    2014-11-01

    Expecting a particular stimulus can facilitate processing of that stimulus over others, but what is the fate of other stimuli that are known to co-occur with the expected stimulus? This study examined the impact of learned association on feature-based attention. The findings show that the effectiveness of an uninformative color transient in orienting attention can change by learned associations between colors and the expected target shape. In an initial acquisition phase, participants learned two distinct sequences of stimulus-response-outcome, where stimuli were defined by shape ('S' vs. 'H'), responses were localized key-presses (left vs. right), and outcomes were colors (red vs. green). Next, in a test phase, while expecting a target shape (80% probable), participants showed reliable attentional orienting to the color transient associated with the target shape, and showed no attentional orienting with the color associated with the alternative target shape. This bias seemed to be driven by learned association between shapes and colors, and not modulated by the response. In addition, the bias seemed to depend on observing target-color conjunctions, since encountering the two features disjunctively (without spatiotemporal overlap) did not replicate the findings. We conclude that associative learning - likely mediated by mechanisms underlying visual object representation - can extend the impact of goal-driven attention to features associated with a target stimulus. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. Categorizing biomedicine images using novel image features and sparse coding representation

    PubMed Central

    2013-01-01

    Background Images embedded in biomedical publications carry rich information that often concisely summarize key hypotheses adopted, methods employed, or results obtained in a published study. Therefore, they offer valuable clues for understanding main content in a biomedical publication. Prior studies have pointed out the potential of mining images embedded in biomedical publications for automatically understanding and retrieving such images' associated source documents. Within the broad area of biomedical image processing, categorizing biomedical images is a fundamental step for building many advanced image analysis, retrieval, and mining applications. Similar to any automatic categorization effort, discriminative image features can provide the most crucial aid in the process. Method We observe that many images embedded in biomedical publications carry versatile annotation text. Based on the locations of and the spatial relationships between these text elements in an image, we thus propose some novel image features for image categorization purpose, which quantitatively characterize the spatial positions and distributions of text elements inside a biomedical image. We further adopt a sparse coding representation (SCR) based technique to categorize images embedded in biomedical publications by leveraging our newly proposed image features. Results we randomly selected 990 images of the JPG format for use in our experiments where 310 images were used as training samples and the rest were used as the testing cases. We first segmented 310 sample images following the our proposed procedure. This step produced a total of 1035 sub-images. We then manually labeled all these sub-images according to the two-level hierarchical image taxonomy proposed by [1]. Among our annotation results, 316 are microscopy images, 126 are gel electrophoresis images, 135 are line charts, 156 are bar charts, 52 are spot charts, 25 are tables, 70 are flow charts, and the remaining 155 images are

  2. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  3. Scaling-up HIV responses with key populations in West Africa.

    PubMed

    Wheeler, Tisha; Wolf, R Cameron; Kapesa, Laurent; Cheng Surdo, Alison; Dallabetta, Gina

    2015-03-01

    Despite decades of HIV responses in pockets of West and Central Africa (WCA), the HIV response with key populations remains an understudied area. Recently, there has been a proliferation of studies highlighting epidemiologic and behavioral data that challenge attitudes of complacency among donors and country governments uncomfortable in addressing key populations. The articles in this series highlight new studies that provide a better understanding of the epidemiologic and structural burden facing key populations in the WCA region and how to improve responses through more effective targeting. Key populations face pervasive structural barriers including institutional and sexual violence and an intersection of stigma, criminalization, and marginalization as sexual minorities. Despite decades of smaller interventions that have shown the importance of integrated services for key populations, there remains incongruent provision of outreach or testing or family planning pointing to sustained risk. There remains an incongruent resource provision for key populations where they shoulder the burden of HIV and their access to services alone could turn around HIV epidemics within the region. These proximal and distal determinants must be addressed in regional efforts, led by the community, and resourced for scale, targeting those most at risk for the acquisition and transmission of HIV. This special issue builds the knowledge base for the region focusing on interventions that remove barriers to service access including treatment uptake for those living with HIV. Better analysis and use of data for strategic planning are shown to lead to more effective targeting of prevention, care, and HIV treatment programs with key populations. These articles further demonstrate the immediate need for comprehensive action to address HIV among key populations throughout the WCA region.

  4. Mineralogical and spectral analysis of Vesta's Gegania and Lucaria quadrangles and comparative analysis of their key features

    NASA Astrophysics Data System (ADS)

    Longobardo, Andrea; Palomba, Ernesto; De Sanctis, Maria Cristina; Zinzi, Angelo; Scully, Jennifer E. C.; Capaccioni, Fabrizio; Tosi, Federico; Zambon, Francesca; Ammannito, Eleonora; Combe, Jean-Philippe; Raymond, Carol A.; Russell, Cristopher T.

    2015-10-01

    This work is aimed at developing and interpreting infrared albedo, pyroxene and OH band depths, and pyroxene band center maps of Vesta's Gegania and Lucaria quadrangles, obtained from data provided by the Visible and InfraRed (VIR) mapper spectrometer on board NASA's Dawn spacecraft. The Gegania and Lucaria quadrangles span latitudes from 22°S to 22°N and longitudes from 0°E to 144°E. The mineralogical and spectral maps identify two large-scale units on this area of Vesta, which extend eastwards and westward of about 60°E, respectively. The two regions are not associated to large-scale geological units, which have a latitudinal distribution rather than longitudinal, but are defined by different contents of carbonaceous chondrites (CC): the eastern region, poor in CCs, is brighter and OH-depleted, whereas the western one, rich in CCs, is darker and OH-enriched. A detailed analysis of the small-scale units in these quadrangles is also performed. Almost all the units show the typical correspondence between high albedo, deep pyroxene bands, short band centers and absence of OH and vice versa. Only a few exceptions occur, such as the ejecta from the Aelia crater, where dark and bright materials are intimately mixed. The most characteristic features of these quadrangles are the equatorial troughs and the Lucaria tholus. The equatorial troughs consist of graben, i.e. a depression limited by two conjugate faults. The graben do not present their own spectral signatures, but spectral parameters similar to their surroundings, in agreement to their structural origin. This is observed also in graben outside the Gegania and Lucaria quadrangles. However, it is possible to observe other structural features, such as tectonic grooves, characterized by a changing composition and hence an albedo variation. This result is confirmed not only by mineralogical maps of Vesta, but also by analyzing the VIRTIS-Rosetta observations of Lutetia. The albedo change is instead a typical

  5. Salient features of the ciliated organ of asymmetry

    PubMed Central

    Amack, Jeffrey D.

    2014-01-01

    Many internal organs develop distinct left and right sides that are essential for their functions. In several vertebrate embryos, motile cilia generate an asymmetric fluid flow that plays an important role in establishing left-right (LR) signaling cascades. These ‘LR cilia’ are found in the ventral node and posterior notochordal plate in mammals, the gastrocoel roof plate in amphibians and Kupffer’s vesicle in teleost fish. I consider these transient ciliated structures as the ‘organ of asymmetry’ that directs LR patterning of the developing embryo. Variations in size and morphology of the organ of asymmetry in different vertebrate species have raised questions regarding the fundamental features that are required for LR determination. Here, I review current models for how LR asymmetry is established in vertebrates, discuss the cellular architecture of the ciliated organ of asymmetry and then propose key features of this organ that are critical for orienting the LR body axis. PMID:24481178

  6. Pediatric Eosinophilic Esophagitis Symptom Scores (PEESS® v2.0) identify histologic and molecular correlates of the key clinical features of disease

    PubMed Central

    Martin, Lisa J.; Franciosi, James P.; Collins, Margaret H.; Abonia, J. Pablo; Lee, James J.; Hommel, Kevin A.; Varni, James W.; Grotjan, J. Tommie; Eby, Michael; He, Hua; Marsolo, Keith; Putnam, Philip E.; Garza, Jose M.; Kaul, Ajay; Wen, Ting; Rothenberg, Marc E.

    2015-01-01

    Background The Pediatric Eosinophilic Esophagitis Symptom Score (PEESS® v2.0) measures patient-relevant outcomes. However, whether patient-identified domains (dysphagia, gastrointestinal reflux disease (GERD), nausea/vomiting, and pain) align with clinical symptomology and histopathologic and molecular features of eosinophilic esophagitis (EoE) is unclear. Objective The purpose of this study was to determine if clinical features of EoE, measured through the PEESS® v2.0, associate with histopathologic and molecular features of EoE. This represents a novel approach for analysis of allergic diseases, given the availability of allergic tissue biopsy specimens. Methods We systematically recruited treated and untreated, pediatric patients with EoE (aged 2–18 years) and examined parent proxy–reported symptoms using the PEESS® v2.0. Clinical symptomology was collected by questionnaire. Esophageal biopsy samples were quantified for levels of eosinophils, eosinophil peroxidase (EPX) immunohistochemical staining, and mast cells. Molecular features were assessed by the EoE Diagnostic Panel (94 EoE-related gene transcripts). Associations between domain scores and clinical symptoms and biologic features were analyzed using Wilcoxon Rank Sum and Spearman correlation. Results The PEESS® v2.0 domains correlated to specific parent-reported symptoms: dysphagia (p = 0.0012), GERD (p = 0.0001), and nausea/vomiting (p < 0.0001). Pain correlated with multiple symptoms (p < 0.0005). Dysphagia correlated most strongly with overall histopathology, particularly in the proximal esophagus (p ≤ 0.0049). Markers of esophageal activity (EPX) were significantly associated with dysphagia (strongest r = .37; p = 0.02). Eosinophil levels were more associated with pain (r = 0.27; p=0.06) than for dysphagia (r = 0.24; p = 0.13). The dysphagia domain correlated the most with esophageal gene transcript levels, predominantly with mast cell–specific genes. Conclusion We have 1) established a

  7. Keys To The Kansas Environment. 4-H School Enrichment Program.

    ERIC Educational Resources Information Center

    Kansas State Univ., Manhattan. Extension Service.

    The 4-H Club packet for preschool and elementary school children contains nine "keys", or short learning exercises, designed to enrich science and environmental education both in and out of the classroom. Each "key" includes the purpose of the activity, the intended audience, the best time of the year for the activity,…

  8. An algorithm for calculating minimum Euclidean distance between two geographic features

    NASA Astrophysics Data System (ADS)

    Peuquet, Donna J.

    1992-09-01

    An efficient algorithm is presented for determining the shortest Euclidean distance between two features of arbitrary shape that are represented in quadtree form. These features may be disjoint point sets, lines, or polygons. It is assumed that the features do not overlap. Features also may be intertwined and polygons may be complex (i.e. have holes). Utilizing a spatial divide-and-conquer approach inherent in the quadtree data model, the basic rationale is to narrow-in on portions of each feature quickly that are on a facing edge relative to the other feature, and to minimize the number of point-to-point Euclidean distance calculations that must be performed. Besides offering an efficient, grid-based alternative solution, another unique and useful aspect of the current algorithm is that is can be used for rapidly calculating distance approximations at coarser levels of resolution. The overall process can be viewed as a top-down parallel search. Using one list of leafcode addresses for each of the two features as input, the algorithm is implemented by successively dividing these lists into four sublists for each descendant quadrant. The algorithm consists of two primary phases. The first determines facing adjacent quadrant pairs where part or all of the two features are separated between the two quadrants, respectively. The second phase then determines the closest pixel-level subquadrant pairs within each facing quadrant pair at the lowest level. The key element of the second phase is a quick estimate distance heuristic for further elimination of locations that are not as near as neighboring locations.

  9. The analysis of image feature robustness using cometcloud

    PubMed Central

    Qi, Xin; Kim, Hyunjoo; Xing, Fuyong; Parashar, Manish; Foran, David J.; Yang, Lin

    2012-01-01

    The robustness of image features is a very important consideration in quantitative image analysis. The objective of this paper is to investigate the robustness of a range of image texture features using hematoxylin stained breast tissue microarray slides which are assessed while simulating different imaging challenges including out of focus, changes in magnification and variations in illumination, noise, compression, distortion, and rotation. We employed five texture analysis methods and tested them while introducing all of the challenges listed above. The texture features that were evaluated include co-occurrence matrix, center-symmetric auto-correlation, texture feature coding method, local binary pattern, and texton. Due to the independence of each transformation and texture descriptor, a network structured combination was proposed and deployed on the Rutgers private cloud. The experiments utilized 20 randomly selected tissue microarray cores. All the combinations of the image transformations and deformations are calculated, and the whole feature extraction procedure was completed in 70 minutes using a cloud equipped with 20 nodes. Center-symmetric auto-correlation outperforms all the other four texture descriptors but also requires the longest computational time. It is roughly 10 times slower than local binary pattern and texton. From a speed perspective, both the local binary pattern and texton features provided excellent performance for classification and content-based image retrieval. PMID:23248759

  10. Borderline personality features and implicit shame-prone self-concept in middle childhood and early adolescence.

    PubMed

    Hawes, David J; Helyer, Rebekah; Herlianto, Eugene C; Willing, Jonah

    2013-01-01

    This study tested if children and adolescents with high levels of borderline personality features (BPF) exhibit the same shame-prone self-concept previously found to characterize adults with borderline personality disorder (Rüsch et al., 2007 ). Self-concept was indexed using the Implicit Association Test, in a community sample of children/adolescents aged 10 to 14 years (48% female; M age = 12.04 years). Common domains of child and adolescent psychopathology and core components of BPF were assessed using self-reports on the Strengths and Difficulties Questionnaire and the Borderline Personality Features Scale for Children. The identity problems component of BPF was found to significantly predict implicit levels of shame-prone self-concept, but only among girls. This effect was independent of the key dimensions of child and adolescent psychopathology that overlap with BPF-including features hyperactivity/inattention, disruptive behavior problems, and anxiety/depression-none of which were associated with shame-prone self-concept at the bivariate level or otherwise. The current findings provide preliminary evidence that self-schemas related to shame are uniquely associated with a core component of BPF in middle childhood and early adolescence and suggest that this correlate may apply uniquely to female individuals. These findings point to the identity problems component of BPF as a priority for future clinical and developmental research into mechanisms associated with BPF across childhood and adolescence.

  11. A new feature detection mechanism and its application in secured ECG transmission with noise masking.

    PubMed

    Sufi, Fahim; Khalil, Ibrahim

    2009-04-01

    With cardiovascular disease as the number one killer of modern era, Electrocardiogram (ECG) is collected, stored and transmitted in greater frequency than ever before. However, in reality, ECG is rarely transmitted and stored in a secured manner. Recent research shows that eavesdropper can reveal the identity and cardiovascular condition from an intercepted ECG. Therefore, ECG data must be anonymized before transmission over the network and also stored as such in medical repositories. To achieve this, first of all, this paper presents a new ECG feature detection mechanism, which was compared against existing cross correlation (CC) based template matching algorithms. Two types of CC methods were used for comparison. Compared to the CC based approaches, which had 40% and 53% misclassification rates, the proposed detection algorithm did not perform any single misclassification. Secondly, a new ECG obfuscation method was designed and implemented on 15 subjects using added noises corresponding to each of the ECG features. This obfuscated ECG can be freely distributed over the internet without the necessity of encryption, since the original features needed to identify personal information of the patient remain concealed. Only authorized personnel possessing a secret key will be able to reconstruct the original ECG from the obfuscated ECG. Distribution of the would appear as regular ECG without encryption. Therefore, traditional decryption techniques including powerful brute force attack are useless against this obfuscation.

  12. Morphology of Labronemella major n. sp. (Nematoda: Dorylaimida), a soil-dwelling nematode from China, including a revised key to species of the genus.

    PubMed

    Wu, W J; Yan, L; Xie, H; Xu, C L; Wang, K; Jin, S Y

    2017-01-01

    One new species from Qinghai Province, China, Labronemella major n. sp., is described. The new species is characterized by a body length of 3.03-3.34 mm; lip region wide, offset by a distinct depression, disc-like with six separated inner liplets; amphid fovea funnel-shaped, distinctly bulged on body surface in scanning electron micrographs; odontostyle long (35-39 μm) with distinct lumen, aperture about 39-47% of its length; odontophore rod-like and long; guiding ring double; pharyngeal basal expansion about half of the total neck length; uterus relatively long and tripartite; vulva transverse and sclerotized; spicules 81-90 μm long; ventromedial supplements 19-23; tail short, rounded to conoid. It can be differentiated from all other species of the genus by its relatively longer body, odontostyle and spicules, and wider lip region. Due to the lip region being offset by a deep constriction, and the long (three or more times the body diameter at mid-body) tripartite uterus, the new species is close to Labronemella czernowitzensis (Micoletzky, 1922) Andrássy, 2002 and Labronemella labiata Andrássy, 1985. An improved key to the genus including the new species is provided.

  13. Defining key features of the broad autism phenotype: a comparison across parents of multiple- and single-incidence autism families.

    PubMed

    Losh, Molly; Childress, Debra; Lam, Kristen; Piven, Joseph

    2008-06-05

    This study examined the frequency of personality, language, and social-behavioral characteristics believed to comprise the broad autism phenotype (BAP), across families differing in genetic liability to autism. We hypothesized that within this unique sample comprised of multiple-incidence autism families (MIAF), single-incidence autism families (SIAF), and control Down syndrome families (DWNS), a graded expression would be observed for the principal characteristics conferring genetic susceptibility to autism, in which such features would express most profoundly among parents from MIAFs, less strongly among SIAFs, and least of all among comparison parents from DWNS families, who should display population base rates. Analyses detected linear expression of traits in line with hypotheses, and further suggested differential intrafamilial expression across family types. In the vast majority of MIAFs both parents displayed BAP characteristics, whereas within SIAFs, it was equally likely that one, both, or neither parent show BAP features. The significance of these findings is discussed in relation to etiologic mechanisms in autism and relevance to molecular genetic studies. (c) 2007 Wiley-Liss, Inc.

  14. Contextual Multi-armed Bandits under Feature Uncertainty

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yun, Seyoung; Nam, Jun Hyun; Mo, Sangwoo

    We study contextual multi-armed bandit problems under linear realizability on rewards and uncertainty (or noise) on features. For the case of identical noise on features across actions, we propose an algorithm, coined NLinRel, having O(T⁷/₈(log(dT)+K√d)) regret bound for T rounds, K actions, and d-dimensional feature vectors. Next, for the case of non-identical noise, we observe that popular linear hypotheses including NLinRel are impossible to achieve such sub-linear regret. Instead, under assumption of Gaussian feature vectors, we prove that a greedy algorithm has O(T²/₃√log d)regret bound with respect to the optimal linear hypothesis. Utilizing our theoretical understanding on the Gaussian case,more » we also design a practical variant of NLinRel, coined Universal-NLinRel, for arbitrary feature distributions. It first runs NLinRel for finding the ‘true’ coefficient vector using feature uncertainties and then adjust it to minimize its regret using the statistical feature information. We justify the performance of Universal-NLinRel on both synthetic and real-world datasets.« less

  15. Pavement crack detection combining non-negative feature with fast LoG in complex scene

    NASA Astrophysics Data System (ADS)

    Wang, Wanli; Zhang, Xiuhua; Hong, Hanyu

    2015-12-01

    Pavement crack detection is affected by much interference in the realistic situation, such as the shadow, road sign, oil stain, salt and pepper noise etc. Due to these unfavorable factors, the exist crack detection methods are difficult to distinguish the crack from background correctly. How to extract crack information effectively is the key problem to the road crack detection system. To solve this problem, a novel method for pavement crack detection based on combining non-negative feature with fast LoG is proposed. The two key novelties and benefits of this new approach are that 1) using image pixel gray value compensation to acquisit uniform image, and 2) combining non-negative feature with fast LoG to extract crack information. The image preprocessing results demonstrate that the method is indeed able to homogenize the crack image with more accurately compared to existing methods. A large number of experimental results demonstrate the proposed approach can detect the crack regions more correctly compared with traditional methods.

  16. Integrating Vocational & Academic Education. A Handbook Featuring Four Demonstration Sites Including Students from Special Populations.

    ERIC Educational Resources Information Center

    Tindall, Lloyd W.; And Others

    This handbook describes the processes and techniques used to develop, implement, and evaluate four integrated vocational and academic learning programs in Wisconsin that included students from special populations. The handbook contains seven chapters. Chapter 1 presents an overview of the project, including the request for proposal process and…

  17. Research on improving image recognition robustness by combining multiple features with associative memory

    NASA Astrophysics Data System (ADS)

    Guo, Dongwei; Wang, Zhe

    2018-05-01

    Convolutional neural networks (CNN) achieve great success in computer vision, it can learn hierarchical representation from raw pixels and has outstanding performance in various image recognition tasks [1]. However, CNN is easy to be fraudulent in terms of it is possible to produce images totally unrecognizable to human eyes that CNNs believe with near certainty are familiar objects. [2]. In this paper, an associative memory model based on multiple features is proposed. Within this model, feature extraction and classification are carried out by CNN, T-SNE and exponential bidirectional associative memory neural network (EBAM). The geometric features extracted from CNN and the digital features extracted from T-SNE are associated by EBAM. Thus we ensure the recognition of robustness by a comprehensive assessment of the two features. In our model, we can get only 8% error rate with fraudulent data. In systems that require a high safety factor or some key areas, strong robustness is extremely important, if we can ensure the image recognition robustness, network security will be greatly improved and the social production efficiency will be extremely enhanced.

  18. Key Ideas for Making and Using Virtual Fieldwork Experiences

    NASA Astrophysics Data System (ADS)

    Duggan-Haas, D.; Ross, R. M.

    2016-12-01

    Fieldwork is a signature pedagogy for the geosciences, but can be challenging to manage and challenging to bring to certain settings, like large lecture courses or K-12 classrooms. Virtual Fieldwork Experiences (VFEs) are helpful in meeting these challenges, though we do not suggest that VFEs replace actual fieldwork. In designing and using VFEs, for providing related professional development, and for designing and implementing actual fieldwork, key questions to consider are: What are the most important features and results of fieldwork? What aspects can be replicated through the use of multimedia? To what extent? How can the creation of VFEs be used to catalyze, extend, document, and share what is learned from doing actual fieldwork? A decade ago, we began developing curriculum materials and offering professional development programming in which VFEs are a key feature. Over the last ten years, both the technologies available and our pedagogical approaches have changed substantially. Technologically, things that used to take hours to create can now be done in minutes, and other things that were simply not practical have become simple for users to create. The rate of change of pedagogy is slower. Our initial goal of creating VFEs that offer a true inquiry experience by themselves has been tempered over time. While VFEs can offer inquiry experiences for students, a shorter route to inquiry is framing VFEs as models for student-created VFEs that document fieldwork done by students. The effective creation and use of VFEs is dependent upon Technological Pedagogical and Content Knowledge (TPACK), the suite of understandings and skills that educators apply to teaching scientific content with technology. Educators working with VFEs often find themselves pushing their limits in one or more of the different realms of TPACK. Pushing limits is fundamental to professional growth. Our work has led to three key ideas for VFE development and use: There are questions that can be

  19. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  20. Foreign Languages: Key Links in the Chain of Learning.

    ERIC Educational Resources Information Center

    Mead, Robert G., Jr., Ed.

    The articles discuss the necessity of including foreign language as an integral part of the curriculum at all levels of instruction. The following chapters are included: "Elementary School Foreign Language: Key Link in the Chain of Learning" (rationale, innovations, immersion programs, and interdisciplinary approaches); "Foreign…

  1. Feature reduction and payload location with WAM steganalysis

    NASA Astrophysics Data System (ADS)

    Ker, Andrew D.; Lubenko, Ivans

    2009-02-01

    WAM steganalysis is a feature-based classifier for detecting LSB matching steganography, presented in 2006 by Goljan et al. and demonstrated to be sensitive even to small payloads. This paper makes three contributions to the development of the WAM method. First, we benchmark some variants of WAM in a number of sets of cover images, and we are able to quantify the significance of differences in results between different machine learning algorithms based on WAM features. It turns out that, like many of its competitors, WAM is not effective in certain types of cover, and furthermore it is hard to predict which types of cover are suitable for WAM steganalysis. Second, we demonstrate that only a few the features used in WAM steganalysis do almost all of the work, so that a simplified WAM steganalyser can be constructed in exchange for a little less detection power. Finally, we demonstrate how the WAM method can be extended to provide forensic tools to identify the location (and potentially content) of LSB matching payload, given a number of stego images with payload placed in the same locations. Although easily evaded, this is a plausible situation if the same stego key is mistakenly re-used for embedding in multiple images.

  2. Histopathological features of Proteus syndrome.

    PubMed

    Hoey, S E H; Eastwood, D; Monsell, F; Kangesu, L; Harper, J I; Sebire, N J

    2008-05-01

    Proteus syndrome is a rare, sporadic overgrowth disorder for which the underlying genetic defect remains unknown. Although the clinical course is well-described there is no systematic histopathological description of the lesional pathology. To describe the histopathological features encountered in a series of patients with Proteus syndrome from a single centre. Patients with Proteus syndrome who had undergone therapeutic surgical resection or biopsy were identified from a database and the histopathological findings were reviewed, with particular regard to descriptive features of the underlying tissue abnormality. There were 18 surgical specimens from nine patients, median age 4 years (range 1-9), classified into four main categories: soft-tissue swellings (lipomatous lesions), vascular anomalies (vascular malformation and haemangioma), macrodactyly (hamartomatous overgrowth) and others (sebaceous naevus and nonspecific features). In all cases, the clinical features of overgrowth were due to increased amounts of disorganized tissue, indicating a hamartomatous-type defect in which normal tissue constituents were present, but with an abnormal distribution and architecture. Vascular malformations represented a prominent category of lesions, accounting for 50% of the specimens, predominantly comprising lymphatic and lymphovascular malformations. No malignancy or cytological atypia was identified in any case. The histopathological features of lesions resected from children with Proteus syndrome predominantly include hamartomatous mixed connective tissue lesions, benign neoplasms such as lipomata, and lymphatic-rich vascular malformations.

  3. Quantum key distribution with passive decoy state selection

    NASA Astrophysics Data System (ADS)

    Mauerer, Wolfgang; Silberhorn, Christine

    2007-05-01

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical postprocessing. This allows one to improve the effective signal statistics and achievable distance.

  4. Breast Cancer Detection with Reduced Feature Set.

    PubMed

    Mert, Ahmet; Kılıç, Niyazi; Bilgili, Erdem; Akan, Aydin

    2015-01-01

    This paper explores feature reduction properties of independent component analysis (ICA) on breast cancer decision support system. Wisconsin diagnostic breast cancer (WDBC) dataset is reduced to one-dimensional feature vector computing an independent component (IC). The original data with 30 features and reduced one feature (IC) are used to evaluate diagnostic accuracy of the classifiers such as k-nearest neighbor (k-NN), artificial neural network (ANN), radial basis function neural network (RBFNN), and support vector machine (SVM). The comparison of the proposed classification using the IC with original feature set is also tested on different validation (5/10-fold cross-validations) and partitioning (20%-40%) methods. These classifiers are evaluated how to effectively categorize tumors as benign and malignant in terms of specificity, sensitivity, accuracy, F-score, Youden's index, discriminant power, and the receiver operating characteristic (ROC) curve with its criterion values including area under curve (AUC) and 95% confidential interval (CI). This represents an improvement in diagnostic decision support system, while reducing computational complexity.

  5. Real-Time Lane Region Detection Using a Combination of Geometrical and Image Features

    PubMed Central

    Cáceres Hernández, Danilo; Kurnianggoro, Laksono; Filonenko, Alexander; Jo, Kang Hyun

    2016-01-01

    Over the past few decades, pavement markings have played a key role in intelligent vehicle applications such as guidance, navigation, and control. However, there are still serious issues facing the problem of lane marking detection. For example, problems include excessive processing time and false detection due to similarities in color and edges between traffic signs (channeling lines, stop lines, crosswalk, arrows, etc.). This paper proposes a strategy to extract the lane marking information taking into consideration its features such as color, edge, and width, as well as the vehicle speed. Firstly, defining the region of interest is a critical task to achieve real-time performance. In this sense, the region of interest is dependent on vehicle speed. Secondly, the lane markings are detected by using a hybrid color-edge feature method along with a probabilistic method, based on distance-color dependence and a hierarchical fitting model. Thirdly, the following lane marking information is extracted: the number of lane markings to both sides of the vehicle, the respective fitting model, and the centroid information of the lane. Using these parameters, the region is computed by using a road geometric model. To evaluate the proposed method, a set of consecutive frames was used in order to validate the performance. PMID:27869657

  6. Incomplete penetrance and phenotypic variability of 6q16 deletions including SIM1.

    PubMed

    El Khattabi, Laïla; Guimiot, Fabien; Pipiras, Eva; Andrieux, Joris; Baumann, Clarisse; Bouquillon, Sonia; Delezoide, Anne-Lise; Delobel, Bruno; Demurger, Florence; Dessuant, Hélène; Drunat, Séverine; Dubourg, Christelle; Dupont, Céline; Faivre, Laurence; Holder-Espinasse, Muriel; Jaillard, Sylvie; Journel, Hubert; Lyonnet, Stanislas; Malan, Valérie; Masurel, Alice; Marle, Nathalie; Missirian, Chantal; Moerman, Alexandre; Moncla, Anne; Odent, Sylvie; Palumbo, Orazio; Palumbo, Pietro; Ravel, Aimé; Romana, Serge; Tabet, Anne-Claude; Valduga, Mylène; Vermelle, Marie; Carella, Massimo; Dupont, Jean-Michel; Verloes, Alain; Benzacken, Brigitte; Delahaye, Andrée

    2015-08-01

    6q16 deletions have been described in patients with a Prader-Willi-like (PWS-like) phenotype. Recent studies have shown that certain rare single-minded 1 (SIM1) loss-of-function variants were associated with a high intra-familial risk for obesity with or without features of PWS-like syndrome. Although SIM1 seems to have a key role in the phenotype of patients carrying 6q16 deletions, some data support a contribution of other genes, such as GRIK2, to explain associated behavioural problems. We describe 15 new patients in whom de novo 6q16 deletions were characterised by comparative genomic hybridisation or single-nucleotide polymorphism (SNP) array analysis, including the first patient with fetopathological data. This fetus showed dysmorphic facial features, cerebellar and cerebral migration defects with neuronal heterotopias, and fusion of brain nuclei. The size of the deletion in the 14 living patients ranged from 1.73 to 7.84 Mb, and the fetus had the largest deletion (14 Mb). Genotype-phenotype correlations confirmed the major role for SIM1 haploinsufficiency in obesity and the PWS-like phenotype. Nevertheless, only 8 of 13 patients with SIM1 deletion exhibited obesity, in agreement with incomplete penetrance of SIM1 haploinsufficiency. This study in the largest series reported to date confirms that the PWS-like phenotype is strongly linked to 6q16.2q16.3 deletions and varies considerably in its clinical expression. The possible involvement of other genes in the 6q16.2q16.3-deletion phenotype is discussed.

  7. Fundamental quantitative security in quantum key generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less

  8. Desired features of smartphone applications promoting physical activity.

    PubMed

    Rabin, Carolyn; Bock, Beth

    2011-12-01

    Approximately one-third of adults in the United States are physically inactive. This is a significant public health concern as physical activity (PA) can influence the risk of cardiovascular disease, diabetes, and certain forms of cancer. To minimize these health risks, effective PA interventions must be developed and disseminated to the vast number of individuals who remain sedentary. Smartphone technology presents an exciting opportunity for delivering PA interventions remotely. Although a number of PA applications are currently available for smartphones, these "apps" are not based on established theories of health behavior change and most do not include evidence-based features (e.g., reinforcement and goal setting). Our aim was to collect formative data to develop a smartphone PA app that is empirically and theoretically-based and incorporates user preferences. We recruited 15 sedentary adults to test three currently available PA smartphone apps and provide qualitative and quantitative feedback. Findings indicate that users have a number of specific preferences with regard to PA app features, including that apps provide automatic tracking of PA (e.g., steps taken and calories burned), track progress toward PA goals, and integrate a music feature. Participants also preferred that PA apps be flexible enough to be used with several types of PA, and have well-documented features and user-friendly interfaces (e.g., a one-click main page). When queried by the researcher, most participants endorsed including goal-setting and problem-solving features. These findings provide a blue print for developing a smartphone PA app that incorporates evidence-based components and user preferences.

  9. The crystal structure of mammalian inositol 1,3,4,5,6-pentakisphosphate 2-kinase reveals a new zinc-binding site and key features for protein function

    PubMed Central

    Franco-Echevarría, Elsa; Sanz-Aparicio, Julia; Brearley, Charles A.; González-Rubio, Juana M.; González, Beatriz

    2017-01-01

    Inositol 1,3,4,5,6-pentakisphosphate 2-kinases (IP5 2-Ks) are part of a family of enzymes in charge of synthesizing inositol hexakisphosphate (IP6) in eukaryotic cells. This protein and its product IP6 present many roles in cells, participating in mRNA export, embryonic development, and apoptosis. We reported previously that the full-length IP5 2-K from Arabidopsis thaliana is a zinc metallo-enzyme, including two separated lobes (the N- and C-lobes). We have also shown conformational changes in IP5 2-K and have identified the residues involved in substrate recognition and catalysis. However, the specific features of mammalian IP5 2-Ks remain unknown. To this end, we report here the first structure for a murine IP5 2-K in complex with ATP/IP5 or IP6. Our structural findings indicated that the general folding in N- and C-lobes is conserved with A. thaliana IP5 2-K. A helical scaffold in the C-lobe constitutes the inositol phosphate-binding site, which, along with the participation of the N-lobe, endows high specificity to this protein. However, we also noted large structural differences between the orthologues from these two eukaryotic kingdoms. These differences include a novel zinc-binding site and regions unique to the mammalian IP5 2-K, as an unexpected basic patch on the protein surface. In conclusion, our findings have uncovered distinct features of a mammalian IP5 2-K and set the stage for investigations into protein-protein or protein-RNA interactions important for IP5 2-K function and activity. PMID:28450399

  10. Improving protein fold recognition by extracting fold-specific features from predicted residue-residue contacts.

    PubMed

    Zhu, Jianwei; Zhang, Haicang; Li, Shuai Cheng; Wang, Chao; Kong, Lupeng; Sun, Shiwei; Zheng, Wei-Mou; Bu, Dongbo

    2017-12-01

    Accurate recognition of protein fold types is a key step for template-based prediction of protein structures. The existing approaches to fold recognition mainly exploit the features derived from alignments of query protein against templates. These approaches have been shown to be successful for fold recognition at family level, but usually failed at superfamily/fold levels. To overcome this limitation, one of the key points is to explore more structurally informative features of proteins. Although residue-residue contacts carry abundant structural information, how to thoroughly exploit these information for fold recognition still remains a challenge. In this study, we present an approach (called DeepFR) to improve fold recognition at superfamily/fold levels. The basic idea of our approach is to extract fold-specific features from predicted residue-residue contacts of proteins using deep convolutional neural network (DCNN) technique. Based on these fold-specific features, we calculated similarity between query protein and templates, and then assigned query protein with fold type of the most similar template. DCNN has showed excellent performance in image feature extraction and image recognition; the rational underlying the application of DCNN for fold recognition is that contact likelihood maps are essentially analogy to images, as they both display compositional hierarchy. Experimental results on the LINDAHL dataset suggest that even using the extracted fold-specific features alone, our approach achieved success rate comparable to the state-of-the-art approaches. When further combining these features with traditional alignment-related features, the success rate of our approach increased to 92.3%, 82.5% and 78.8% at family, superfamily and fold levels, respectively, which is about 18% higher than the state-of-the-art approach at fold level, 6% higher at superfamily level and 1% higher at family level. An independent assessment on SCOP_TEST dataset showed consistent

  11. Key features of hip hop dance motions affect evaluation by judges.

    PubMed

    Sato, Nahoko; Nunome, Hiroyuki; Ikegami, Yasuo

    2014-06-01

    The evaluation of hip hop dancers presently lacks clearly defined criteria and is often dependent on the subjective impressions of judges. Our study objective was to extract hidden motion characteristics that could potentially distinguish the skill levels of hip hop dancers and to examine the relationship between performance kinematics and judging scores. Eleven expert, six nonexpert, and nine novice dancers participated in the study, where each performed the "wave" motion as an experimental task. The movements of their upper extremities were captured by a motion capture system, and several kinematic parameters including the propagation velocity of the wave were calculated. Twelve judges evaluated the performances of the dancers, and we compared the kinematic parameters of the three groups and examined the relationship between the judging scores and the kinematic parameters. We found the coefficient of variation of the propagation velocity to be significantly different among the groups (P < .01) and highly correlated with the judging scores (r = -0.800, P < .01). This revealed that the variation of propagation velocity was the most dominant variable representing the skill level of the dancers and that the smooth propagation of the wave was most closely related to the evaluation by judges.

  12. Housing Stakeholder Preferences for the “Soft” Features of Sustainable and Healthy Housing Design in the UK

    PubMed Central

    Prochorskaite, Agne; Couch, Chris; Malys, Naglis; Maliene, Vida

    2016-01-01

    It is widely recognised that the quantity and sustainability of new homes in the UK need to increase. However, it is important that sustainable housing is regarded holistically, and not merely in environmental terms, and incorporates elements that enhance the quality of life, health and well-being of its users. This paper focuses on the “soft” features of sustainable housing, that is, the non-technological components of sustainable housing and neighbourhood design that can impact occupants’ health and well-being. Aims of the study are to ascertain the relative level of importance that key housing stakeholders attach to these features and to investigate whether the opinions of housing users and housing providers are aligned with regards to their importance. An online survey was carried out to gauge the level of importance that the key stakeholders, such as housing users, local authorities, housing associations, and developers (n = 235), attach to these features. Results revealed that while suitable indoor space was the feature regarded as most important by all stakeholders, there were also a number of disparities in opinion between housing users and housing providers (and among the different types of providers). This implies a scope for initiatives to achieve a better alignment between housing users and providers. PMID:26751465

  13. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  14. High altitude pulmonary edema-clinical features, pathophysiology, prevention and treatment

    PubMed Central

    Paralikar, Swapnil J.

    2012-01-01

    High altitude pulmonary edema (HAPE) is a noncardiogenic pulmonary edema which typically occurs in lowlanders who ascend rapidly to altitudes greater than 2500-3000 m. Early symptoms of HAPE include a nonproductive cough, dyspnoea on exertion and reduced exercise performance. Later, dyspnoea occurs at rest. Clinical features are cyanosis, tachycardia, tachypnoea and elevated body temperature generally not exceeding 38.5°C. Rales are discrete initially and located over the middle lung fields. HAPE mainly occurs due to exaggerated hypoxic pulmonary vasoconstriction and elevated pulmonary artery pressure. It has been observed that HAPE is a high permeability type of edema occurring also due to leaks in the capillary wall (‘stress failure’). Slow descent is the most effective method for prevention; in addition, graded ascent and time for acclimatization, low sleeping altitudes, avoidance of alcohol and sleeping pills, and avoidance of exercise are the key to preventing HAPE. Treatment of HAPE consists of immediate improvement of oxygenation either by supplemental oxygen, hyperbaric treatment, or by rapid descent. PMID:23580834

  15. Nanoparticle Vaccines Adopting Virus-like Features for Enhanced Immune Potentiation

    PubMed Central

    Chattopadhyay, Saborni; Chen, Jui-Yi; Chen, Hui-Wen; Hu, Che-Ming Jack

    2017-01-01

    Synthetic nanoparticles play an increasingly significant role in vaccine design and development as many nanoparticle vaccines show improved safety and efficacy over conventional formulations. These nanoformulations are structurally similar to viruses, which are nanoscale pathogenic organisms that have served as a key selective pressure driving the evolution of our immune system. As a result, mechanisms behind the benefits of nanoparticle vaccines can often find analogue to the interaction dynamics between the immune system and viruses. This review covers the advances in vaccine nanotechnology with a perspective on the advantages of virus mimicry towards immune potentiation. It provides an overview to the different types of nanomaterials utilized for nanoparticle vaccine development, including functionalization strategies that bestow nanoparticles with virus-like features. As understanding of human immunity and vaccine mechanisms continue to evolve, recognizing the fundamental semblance between synthetic nanoparticles and viruses may offer an explanation for the superiority of nanoparticle vaccines over conventional vaccines and may spur new design rationales for future vaccine research. These nanoformulations are poised to provide solutions towards pressing and emerging human diseases. PMID:29071191

  16. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  17. Research on the architecture and key technologies of SIG

    NASA Astrophysics Data System (ADS)

    Fu, Zhongliang; Meng, Qingxiang; Huang, Yan; Liu, Shufan

    2007-06-01

    Along with the development of computer network, Grid has become one of the hottest issues of researches on sharing and cooperation of Internet resources throughout the world. This paper illustrates a new architecture of SIG-a five-hierarchy architecture (including Data Collecting Layer, Grid Layer, Service Layer, Application Layer and Client Layer) of SIG from the traditional three hierarchies (only including resource layer, service layer and client layer). In the paper, the author proposes a new mixed network mode of Spatial Information Grid which integrates CAG (Certificate Authority of Grid) and P2P (Peer to Peer) in the Grid Layer, besides, the author discusses some key technologies of SIG and analysis the functions of these key technologies.

  18. Guilt by Association: The 13 Micron Dust Emission Feature and Its Correlation to Other Gas and Dust Features

    NASA Astrophysics Data System (ADS)

    Sloan, G. C.; Kraemer, Kathleen E.; Goebel, J. H.; Price, Stephan D.

    2003-09-01

    A study of all full-scan spectra of optically thin oxygen-rich circumstellar dust shells in the database produced by the Short Wavelength Spectrometer on ISO reveals that the strength of several infrared spectral features correlates with the strength of the 13 μm dust feature. These correlated features include dust features at 19.8 and 28.1 μm and the bands produced by warm carbon dioxide molecules (the strongest of which are at 13.9, 15.0, and 16.2 μm). The database does not provide any evidence for a correlation of the 13 μm feature with a dust feature at 32 μm, and it is more likely that a weak emission feature at 16.8 μm arises from carbon dioxide gas rather than dust. The correlated dust features at 13, 20, and 28 μm tend to be stronger with respect to the total dust emission in semiregular and irregular variables associated with the asymptotic giant branch than in Mira variables or supergiants. This family of dust features also tends to be stronger in systems with lower infrared excesses and thus lower mass-loss rates. We hypothesize that the dust features arise from crystalline forms of alumina (13 μm) and silicates (20 and 28 μm). Based on observations with the ISO, a European Space Agency (ESA) project with instruments funded by ESA member states (especially the Principal Investigator countries: France, Germany, the Netherlands, and the United Kingdom) and with the participation of the Institute of Space and Astronautical Science (ISAS) and the National Aeronautics and Space Administration (NASA).

  19. Correlative feature analysis on FFDM

    PubMed Central

    Yuan, Yading; Giger, Maryellen L.; Li, Hui; Sennett, Charlene

    2008-01-01

    Identifying the corresponding images of a lesion in different views is an essential step in improving the diagnostic ability of both radiologists and computer-aided diagnosis (CAD) systems. Because of the nonrigidity of the breasts and the 2D projective property of mammograms, this task is not trivial. In this pilot study, we present a computerized framework that differentiates between corresponding images of the same lesion in different views and noncorresponding images, i.e., images of different lesions. A dual-stage segmentation method, which employs an initial radial gradient index (RGI) based segmentation and an active contour model, is applied to extract mass lesions from the surrounding parenchyma. Then various lesion features are automatically extracted from each of the two views of each lesion to quantify the characteristics of density, size, texture and the neighborhood of the lesion, as well as its distance to the nipple. A two-step scheme is employed to estimate the probability that the two lesion images from different mammographic views are of the same physical lesion. In the first step, a correspondence metric for each pairwise feature is estimated by a Bayesian artificial neural network (BANN). Then, these pairwise correspondence metrics are combined using another BANN to yield an overall probability of correspondence. Receiver operating characteristic (ROC) analysis was used to evaluate the performance of the individual features and the selected feature subset in the task of distinguishing corresponding pairs from noncorresponding pairs. Using a FFDM database with 123 corresponding image pairs and 82 noncorresponding pairs, the distance feature yielded an area under the ROC curve (AUC) of 0.81±0.02 with leave-one-out (by physical lesion) evaluation, and the feature metric subset, which included distance, gradient texture, and ROI-based correlation, yielded an AUC of 0.87±0.02. The improvement by using multiple feature metrics was statistically

  20. Correlative feature analysis of FFDM images

    NASA Astrophysics Data System (ADS)

    Yuan, Yading; Giger, Maryellen L.; Li, Hui; Sennett, Charlene

    2008-03-01

    Identifying the corresponding image pair of a lesion is an essential step for combining information from different views of the lesion to improve the diagnostic ability of both radiologists and CAD systems. Because of the non-rigidity of the breasts and the 2D projective property of mammograms, this task is not trivial. In this study, we present a computerized framework that differentiates the corresponding images from different views of a lesion from non-corresponding ones. A dual-stage segmentation method, which employs an initial radial gradient index(RGI) based segmentation and an active contour model, was initially applied to extract mass lesions from the surrounding tissues. Then various lesion features were automatically extracted from each of the two views of each lesion to quantify the characteristics of margin, shape, size, texture and context of the lesion, as well as its distance to nipple. We employed a two-step method to select an effective subset of features, and combined it with a BANN to obtain a discriminant score, which yielded an estimate of the probability that the two images are of the same physical lesion. ROC analysis was used to evaluate the performance of the individual features and the selected feature subset in the task of distinguishing between corresponding and non-corresponding pairs. By using a FFDM database with 124 corresponding image pairs and 35 non-corresponding pairs, the distance feature yielded an AUC (area under the ROC curve) of 0.8 with leave-one-out evaluation by lesion, and the feature subset, which includes distance feature, lesion size and lesion contrast, yielded an AUC of 0.86. The improvement by using multiple features was statistically significant as compared to single feature performance. (p<0.001)

  1. Dynamic features of carboxy cytoglobin distal mutants investigated by molecular dynamics simulations.

    PubMed

    Zhao, Cong; Du, Weihong

    2016-04-01

    Cytoglobin (Cgb) is a member of hemoprotein family with roles in NO metabolism, fibrosis, and tumourigenesis. Similar to other hemoproteins, Cgb structure and functions are markedly influenced by distal key residues. The sixth ligand His(81) (E7) is crucial to exogenous ligand binding, heme pocket conformation, and physiological roles of this protein. However, the effects of other key residues on heme pocket and protein biological functions are not well known. In this work, a molecular dynamics (MD) simulation study of two single mutants in CO-ligated Cgb (L46FCgbCO and L46VCgbCO) and two double mutants (L46FH81QCgbCO and L46VH81QCgbCO) was conducted to explore the effects of the key distal residues Leu(46)(B10) and His(81)(E7) on Cgb structure and functions. Results indicated that the distal mutation of B10 and E7 affected CgbCO dynamic properties on loop region fluctuation, internal cavity rearrangement, and heme motion. The distal conformation change was reflected by the distal key residues Gln(62) (CD3) and Arg(84)(E10). The hydrogen bond between heme propionates with CD3 or E10 residues were evidently influenced by B10/E7 mutation. Furthermore, heme pocket rearrangement was also observed based on the distal pocket volume and occurrence rate of inner cavities. The mutual effects of B10 and E7 residues on protein conformational rearrangement and other dynamic features were expressed in current MD studies of CgbCO and its distal mutants, suggesting their crucial role in heme pocket stabilization, ligand binding, and Cgb biological functions. The mutation of distal B10 and E7 residues affects the dynamic features of carboxy cytoglobin.

  2. Impact of feature saliency on visual category learning.

    PubMed

    Hammer, Rubi

    2015-01-01

    People have to sort numerous objects into a large number of meaningful categories while operating in varying contexts. This requires identifying the visual features that best predict the 'essence' of objects (e.g., edibility), rather than categorizing objects based on the most salient features in a given context. To gain this capacity, visual category learning (VCL) relies on multiple cognitive processes. These may include unsupervised statistical learning, that requires observing multiple objects for learning the statistics of their features. Other learning processes enable incorporating different sources of supervisory information, alongside the visual features of the categorized objects, from which the categorical relations between few objects can be deduced. These deductions enable inferring that objects from the same category may differ from one another in some high-saliency feature dimensions, whereas lower-saliency feature dimensions can best differentiate objects from distinct categories. Here I illustrate how feature saliency affects VCL, by also discussing kinds of supervisory information enabling reflective categorization. Arguably, principles debated here are often being ignored in categorization studies.

  3. Impact of feature saliency on visual category learning

    PubMed Central

    Hammer, Rubi

    2015-01-01

    People have to sort numerous objects into a large number of meaningful categories while operating in varying contexts. This requires identifying the visual features that best predict the ‘essence’ of objects (e.g., edibility), rather than categorizing objects based on the most salient features in a given context. To gain this capacity, visual category learning (VCL) relies on multiple cognitive processes. These may include unsupervised statistical learning, that requires observing multiple objects for learning the statistics of their features. Other learning processes enable incorporating different sources of supervisory information, alongside the visual features of the categorized objects, from which the categorical relations between few objects can be deduced. These deductions enable inferring that objects from the same category may differ from one another in some high-saliency feature dimensions, whereas lower-saliency feature dimensions can best differentiate objects from distinct categories. Here I illustrate how feature saliency affects VCL, by also discussing kinds of supervisory information enabling reflective categorization. Arguably, principles debated here are often being ignored in categorization studies. PMID:25954220

  4. Feature-level sentiment analysis by using comparative domain corpora

    NASA Astrophysics Data System (ADS)

    Quan, Changqin; Ren, Fuji

    2016-06-01

    Feature-level sentiment analysis (SA) is able to provide more fine-grained SA on certain opinion targets and has a wider range of applications on E-business. This study proposes an approach based on comparative domain corpora for feature-level SA. The proposed approach makes use of word associations for domain-specific feature extraction. First, we assign a similarity score for each candidate feature to denote its similarity extent to a domain. Then we identify domain features based on their similarity scores on different comparative domain corpora. After that, dependency grammar and a general sentiment lexicon are applied to extract and expand feature-oriented opinion words. Lastly, the semantic orientation of a domain-specific feature is determined based on the feature-oriented opinion lexicons. In evaluation, we compare the proposed method with several state-of-the-art methods (including unsupervised and semi-supervised) using a standard product review test collection. The experimental results demonstrate the effectiveness of using comparative domain corpora.

  5. Field keys to predators of the balsam woolly aphid in North Carolina

    Treesearch

    Gene D. Amman

    1970-01-01

    These keys will be useful for field identification of immature insect, adult mite, and slug predators of the balsam woolly aphid. The keys include, in addition to native predators, the larvae of three species introduced to North Carolina.

  6. Vaccine adverse event text mining system for extracting features from vaccine safety reports.

    PubMed

    Botsis, Taxiarchis; Buttolph, Thomas; Nguyen, Michael D; Winiecki, Scott; Woo, Emily Jane; Ball, Robert

    2012-01-01

    To develop and evaluate a text mining system for extracting key clinical features from vaccine adverse event reporting system (VAERS) narratives to aid in the automated review of adverse event reports. Based upon clinical significance to VAERS reviewing physicians, we defined the primary (diagnosis and cause of death) and secondary features (eg, symptoms) for extraction. We built a novel vaccine adverse event text mining (VaeTM) system based on a semantic text mining strategy. The performance of VaeTM was evaluated using a total of 300 VAERS reports in three sequential evaluations of 100 reports each. Moreover, we evaluated the VaeTM contribution to case classification; an information retrieval-based approach was used for the identification of anaphylaxis cases in a set of reports and was compared with two other methods: a dedicated text classifier and an online tool. The performance metrics of VaeTM were text mining metrics: recall, precision and F-measure. We also conducted a qualitative difference analysis and calculated sensitivity and specificity for classification of anaphylaxis cases based on the above three approaches. VaeTM performed best in extracting diagnosis, second level diagnosis, drug, vaccine, and lot number features (lenient F-measure in the third evaluation: 0.897, 0.817, 0.858, 0.874, and 0.914, respectively). In terms of case classification, high sensitivity was achieved (83.1%); this was equal and better compared to the text classifier (83.1%) and the online tool (40.7%), respectively. Our VaeTM implementation of a semantic text mining strategy shows promise in providing accurate and efficient extraction of key features from VAERS narratives.

  7. Curated Collection for Educators: Five Key Papers about the Flipped Classroom Methodology

    PubMed Central

    Boysen-Osborn, Megan; Cooney, Robert; Mitzman, Jennifer; Misra, Asit; Williams, Jennifer; Dulani, Tina; Gottlieb, Michael

    2017-01-01

    The flipped classroom (FC) pedagogy is becoming increasingly popular in medical education due to its appeal to the millennial learner and potential benefits in knowledge acquisition. Despite its popularity and effectiveness, the FC educational method is not without challenges. In this article, we identify and summarize several key papers relevant to medical educators interested in exploring the FC teaching methodology. The authors identified an extensive list of papers relevant to FC pedagogy via online discussions within the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. This list was augmented by an open call on Twitter (utilizing the #meded, #FOAMed, and #flippedclassroom hashtags) yielding a list of 33 papers. We then conducted a three-round modified Delphi process within the authorship group, which included both junior and senior clinician educators, to identify the most impactful papers for educators interested in FC pedagogy. The three-round modified Delphi process ranked all of the selected papers and selected the five most highly-rated papers for inclusion. The authorship group reviewed and summarized these papers with specific consideration given to their value to junior faculty educators and faculty developers interested in the flipped classroom approach. The list of papers featured in this article serves as a key reading list for junior clinician educators and faculty developers interested in the flipped classroom technique. The associated commentaries contextualize the importance of these papers for medical educators aiming to optimize their understanding and implementation of the flipped classroom methodology in their teaching and through faculty development. PMID:29282445

  8. Curated Collection for Educators: Five Key Papers about the Flipped Classroom Methodology.

    PubMed

    King, Andrew; Boysen-Osborn, Megan; Cooney, Robert; Mitzman, Jennifer; Misra, Asit; Williams, Jennifer; Dulani, Tina; Gottlieb, Michael

    2017-10-25

    The flipped classroom (FC) pedagogy is becoming increasingly popular in medical education due to its appeal to the millennial learner and potential benefits in knowledge acquisition. Despite its popularity and effectiveness, the FC educational method is not without challenges. In this article, we identify and summarize several key papers relevant to medical educators interested in exploring the FC teaching methodology. The authors identified an extensive list of papers relevant to FC pedagogy via online discussions within the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. This list was augmented by an open call on Twitter (utilizing the #meded, #FOAMed, and #flippedclassroom hashtags) yielding a list of 33 papers. We then conducted a three-round modified Delphi process within the authorship group, which included both junior and senior clinician educators, to identify the most impactful papers for educators interested in FC pedagogy. The three-round modified Delphi process ranked all of the selected papers and selected the five most highly-rated papers for inclusion. The authorship group reviewed and summarized these papers with specific consideration given to their value to junior faculty educators and faculty developers interested in the flipped classroom approach. The list of papers featured in this article serves as a key reading list for junior clinician educators and faculty developers interested in the flipped classroom technique. The associated commentaries contextualize the importance of these papers for medical educators aiming to optimize their understanding and implementation of the flipped classroom methodology in their teaching and through faculty development.

  9. Computational Prediction of Protein Epsilon Lysine Acetylation Sites Based on a Feature Selection Method.

    PubMed

    Gao, JianZhao; Tao, Xue-Wen; Zhao, Jia; Feng, Yuan-Ming; Cai, Yu-Dong; Zhang, Ning

    2017-01-01

    Lysine acetylation, as one type of post-translational modifications (PTM), plays key roles in cellular regulations and can be involved in a variety of human diseases. However, it is often high-cost and time-consuming to use traditional experimental approaches to identify the lysine acetylation sites. Therefore, effective computational methods should be developed to predict the acetylation sites. In this study, we developed a position-specific method for epsilon lysine acetylation site prediction. Sequences of acetylated proteins were retrieved from the UniProt database. Various kinds of features such as position specific scoring matrix (PSSM), amino acid factors (AAF), and disorders were incorporated. A feature selection method based on mRMR (Maximum Relevance Minimum Redundancy) and IFS (Incremental Feature Selection) was employed. Finally, 319 optimal features were selected from total 541 features. Using the 319 optimal features to encode peptides, a predictor was constructed based on dagging. As a result, an accuracy of 69.56% with MCC of 0.2792 was achieved. We analyzed the optimal features, which suggested some important factors determining the lysine acetylation sites. We developed a position-specific method for epsilon lysine acetylation site prediction. A set of optimal features was selected. Analysis of the optimal features provided insights into the mechanism of lysine acetylation sites, providing guidance of experimental validation. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  10. Continuous-variable quantum key distribution in non-Markovian channels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vasile, Ruggero; Olivares, Stefano; CNISM, Unita di Ricerca di Milano Universita, I-20133 Milano

    2011-04-15

    We address continuous-variable quantum key distribution (QKD) in non-Markovian lossy channels and show how the non-Markovian features may be exploited to enhance security and/or to detect the presence and the position of an eavesdropper along the transmission line. In particular, we suggest a coherent-state QKD protocol which is secure against Gaussian individual attacks based on optimal 1{yields}2 asymmetric cloning machines for arbitrarily low values of the overall transmission line. The scheme relies on specific non-Markovian properties, and cannot be implemented in ordinary Markovian channels characterized by uniform losses. Our results give a clear indication of the potential impact of non-Markovianmore » effects in QKD.« less

  11. Setting objectives for managing Key deer

    USGS Publications Warehouse

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  12. Selective Audiovisual Semantic Integration Enabled by Feature-Selective Attention.

    PubMed

    Li, Yuanqing; Long, Jinyi; Huang, Biao; Yu, Tianyou; Wu, Wei; Li, Peijun; Fang, Fang; Sun, Pei

    2016-01-13

    An audiovisual object may contain multiple semantic features, such as the gender and emotional features of the speaker. Feature-selective attention and audiovisual semantic integration are two brain functions involved in the recognition of audiovisual objects. Humans often selectively attend to one or several features while ignoring the other features of an audiovisual object. Meanwhile, the human brain integrates semantic information from the visual and auditory modalities. However, how these two brain functions correlate with each other remains to be elucidated. In this functional magnetic resonance imaging (fMRI) study, we explored the neural mechanism by which feature-selective attention modulates audiovisual semantic integration. During the fMRI experiment, the subjects were presented with visual-only, auditory-only, or audiovisual dynamical facial stimuli and performed several feature-selective attention tasks. Our results revealed that a distribution of areas, including heteromodal areas and brain areas encoding attended features, may be involved in audiovisual semantic integration. Through feature-selective attention, the human brain may selectively integrate audiovisual semantic information from attended features by enhancing functional connectivity and thus regulating information flows from heteromodal areas to brain areas encoding the attended features.

  13. Selective Audiovisual Semantic Integration Enabled by Feature-Selective Attention

    PubMed Central

    Li, Yuanqing; Long, Jinyi; Huang, Biao; Yu, Tianyou; Wu, Wei; Li, Peijun; Fang, Fang; Sun, Pei

    2016-01-01

    An audiovisual object may contain multiple semantic features, such as the gender and emotional features of the speaker. Feature-selective attention and audiovisual semantic integration are two brain functions involved in the recognition of audiovisual objects. Humans often selectively attend to one or several features while ignoring the other features of an audiovisual object. Meanwhile, the human brain integrates semantic information from the visual and auditory modalities. However, how these two brain functions correlate with each other remains to be elucidated. In this functional magnetic resonance imaging (fMRI) study, we explored the neural mechanism by which feature-selective attention modulates audiovisual semantic integration. During the fMRI experiment, the subjects were presented with visual-only, auditory-only, or audiovisual dynamical facial stimuli and performed several feature-selective attention tasks. Our results revealed that a distribution of areas, including heteromodal areas and brain areas encoding attended features, may be involved in audiovisual semantic integration. Through feature-selective attention, the human brain may selectively integrate audiovisual semantic information from attended features by enhancing functional connectivity and thus regulating information flows from heteromodal areas to brain areas encoding the attended features. PMID:26759193

  14. An Evaluation of Feature Learning Methods for High Resolution Image Classification

    NASA Astrophysics Data System (ADS)

    Tokarczyk, P.; Montoya, J.; Schindler, K.

    2012-07-01

    Automatic image classification is one of the fundamental problems of remote sensing research. The classification problem is even more challenging in high-resolution images of urban areas, where the objects are small and heterogeneous. Two questions arise, namely which features to extract from the raw sensor data to capture the local radiometry and image structure at each pixel or segment, and which classification method to apply to the feature vectors. While classifiers are nowadays well understood, selecting the right features remains a largely empirical process. Here we concentrate on the features. Several methods are evaluated which allow one to learn suitable features from unlabelled image data by analysing the image statistics. In a comparative study, we evaluate unsupervised feature learning with different linear and non-linear learning methods, including principal component analysis (PCA) and deep belief networks (DBN). We also compare these automatically learned features with popular choices of ad-hoc features including raw intensity values, standard combinations like the NDVI, a few PCA channels, and texture filters. The comparison is done in a unified framework using the same images, the target classes, reference data and a Random Forest classifier.

  15. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  16. Combining deep residual neural network features with supervised machine learning algorithms to classify diverse food image datasets.

    PubMed

    McAllister, Patrick; Zheng, Huiru; Bond, Raymond; Moorhead, Anne

    2018-04-01

    Obesity is increasing worldwide and can cause many chronic conditions such as type-2 diabetes, heart disease, sleep apnea, and some cancers. Monitoring dietary intake through food logging is a key method to maintain a healthy lifestyle to prevent and manage obesity. Computer vision methods have been applied to food logging to automate image classification for monitoring dietary intake. In this work we applied pretrained ResNet-152 and GoogleNet convolutional neural networks (CNNs), initially trained using ImageNet Large Scale Visual Recognition Challenge (ILSVRC) dataset with MatConvNet package, to extract features from food image datasets; Food 5K, Food-11, RawFooT-DB, and Food-101. Deep features were extracted from CNNs and used to train machine learning classifiers including artificial neural network (ANN), support vector machine (SVM), Random Forest, and Naive Bayes. Results show that using ResNet-152 deep features with SVM with RBF kernel can accurately detect food items with 99.4% accuracy using Food-5K validation food image dataset and 98.8% with Food-5K evaluation dataset using ANN, SVM-RBF, and Random Forest classifiers. Trained with ResNet-152 features, ANN can achieve 91.34%, 99.28% when applied to Food-11 and RawFooT-DB food image datasets respectively and SVM with RBF kernel can achieve 64.98% with Food-101 image dataset. From this research it is clear that using deep CNN features can be used efficiently for diverse food item image classification. The work presented in this research shows that pretrained ResNet-152 features provide sufficient generalisation power when applied to a range of food image classification tasks. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. A Low-Dimensional Radial Silhouette-Based Feature for Fast Human Action Recognition Fusing Multiple Views.

    PubMed

    Chaaraoui, Alexandros Andre; Flórez-Revuelta, Francisco

    2014-01-01

    This paper presents a novel silhouette-based feature for vision-based human action recognition, which relies on the contour of the silhouette and a radial scheme. Its low-dimensionality and ease of extraction result in an outstanding proficiency for real-time scenarios. This feature is used in a learning algorithm that by means of model fusion of multiple camera streams builds a bag of key poses, which serves as a dictionary of known poses and allows converting the training sequences into sequences of key poses. These are used in order to perform action recognition by means of a sequence matching algorithm. Experimentation on three different datasets returns high and stable recognition rates. To the best of our knowledge, this paper presents the highest results so far on the MuHAVi-MAS dataset. Real-time suitability is given, since the method easily performs above video frequency. Therefore, the related requirements that applications as ambient-assisted living services impose are successfully fulfilled.

  18. HIV epidemic among key populations in west Africa.

    PubMed

    Djomand, Gaston; Quaye, Silas; Sullivan, Patrick S

    2014-09-01

    Globally, HIV infection remains a significant issue for key populations such as men who have sex with men (MSM) and female sex workers. A review of recent articles was conducted for west African countries to assess the burden of disease among female sex workers and MSM, access to services and identify barriers to implementation of services for key populations. In west Africa, key populations engage in high-risk practices for the acquisition of HIV and other sexually transmitted infections. Available HIV prevalence data fluctuate across and within countries for both MSM and female sex workers and may be five to ten times as high as that of the general population. HIV prevalence varied from 15.9% in The Gambia to 68% in Benin among female sex workers, whereas it ranged from 9.8% in The Gambia to 34.9% in Nigeria for MSM. Yet, important data gaps exist, including key populations size estimations in several countries as well as HIV prevalence, incidence and other biomarkers of HIV risk. Because of sociocultural, legal, political and economic challenges, exacerbated by a poor health system infrastructure, the HIV response is not strategically directed toward programs for key populations in countries with concentrated epidemics. Noteworthy is the low coverage of prevention care and treatment interventions offered to key populations. Sufficient planning and political will with legal and structural frameworks that reconcile public health and human rights are needed to prioritize HIV prevention, care and treatment programming for key populations programs in west Africa.

  19. Research and Analysis on Energy Consumption Features of Civil Airports

    NASA Astrophysics Data System (ADS)

    Li, Bo; Zhang, Wen; Wang, Jianping; Xu, Junku; Su, Jixiang

    2017-11-01

    Civil aviation is an important part of China’s transportation system, and also the fastest-growing field of comprehensive transportation. Airports, as a key infrastructure of the air transportation system, are the junctions of air and ground transportation. Large airports are generally comprehensive transportation hubs that integrate various modes of transportation, serving as important functional zones of cities. Compared with other transportation hubs, airports cover a wide area, with plenty of functional sections, complex systems and strong specialization, while airport buildings represented by terminals have exhibited characteristics of large space, massive energy consumption, high requirement for safety and comfort, as well as concentrated and rapidly changing passenger flows. Through research and analysis on energy consumption features of civil airports, and analysis on energy consumption features of airports with different sizes or in different climate regions, this article has drawn conclusions therefrom.

  20. Key Factors in Development of Man-Made and Natural Ecosystems

    NASA Astrophysics Data System (ADS)

    Pechurkin, N. S.

    1999-01-01

    Key factors of ecosystem functioning are of the same nature for artificial and natural types. An hierarchical approach gives the opportunity for estimation of the quantitative behavior of both individual links and the system as a whole. At the organismic level we can use interactions of studied macroorganisms (man, animal, higher plant) with selected microorganisms as key indicating factors of the organisms immune status. The most informative factor for the population/community level is an age structure of populations and relationships of domination/elimination. The integrated key factors of the ecosystems level are productivity and rates of cycling of the limiting substances. The key factors approach is of great value for growth regulations and monitoring the state of any ecosystem, including the life support system (LSS)-type.

  1. Keys to soil taxonomy by soil survey staff (sixth edition)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1994-12-31

    This publication, Keys to Soil Taxonomy, serves two purposes. It provides the taxonomic keys necessary for the classification of soils according to Soil Taxonomy in a form that can be used easily in the field, and it also acquaints users of Soil Taxonomy with recent changes in the classification system. This volume includes all revisions of the keys that have so far been approved, replacing the original keys in Soil Taxonomy: A Basic System of Soil Classification for Making and Interpreting Soil Surveys (1975), the work on which this abridged version, first published in 1983, is based. This publication incorporatesmore » all amendments approved to date and published in National Soil Taxonomy Handbook (NSTH) Issues 1-17.« less

  2. The "Key" Method of Identifying Igneous and Metamorphic Rocks in Introductory Laboratory.

    ERIC Educational Resources Information Center

    Eves, Robert Leo; Davis, Larry Eugene

    1987-01-01

    Proposes that identification keys provide an orderly strategy for the identification of igneous and metamorphic rocks in an introductory geology course. Explains the format employed in the system and includes the actual key guides for both igneous and metamorphic rocks. (ML)

  3. KeyWare: an open wireless distributed computing environment

    NASA Astrophysics Data System (ADS)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  4. Analysis of key technologies for virtual instruments metrology

    NASA Astrophysics Data System (ADS)

    Liu, Guixiong; Xu, Qingui; Gao, Furong; Guan, Qiuju; Fang, Qiang

    2008-12-01

    Virtual instruments (VIs) require metrological verification when applied as measuring instruments. Owing to the software-centered architecture, metrological evaluation of VIs includes two aspects: measurement functions and software characteristics. Complexity of software imposes difficulties on metrological testing of VIs. Key approaches and technologies for metrology evaluation of virtual instruments are investigated and analyzed in this paper. The principal issue is evaluation of measurement uncertainty. The nature and regularity of measurement uncertainty caused by software and algorithms can be evaluated by modeling, simulation, analysis, testing and statistics with support of powerful computing capability of PC. Another concern is evaluation of software features like correctness, reliability, stability, security and real-time of VIs. Technologies from software engineering, software testing and computer security domain can be used for these purposes. For example, a variety of black-box testing, white-box testing and modeling approaches can be used to evaluate the reliability of modules, components, applications and the whole VI software. The security of a VI can be assessed by methods like vulnerability scanning and penetration analysis. In order to facilitate metrology institutions to perform metrological verification of VIs efficiently, an automatic metrological tool for the above validation is essential. Based on technologies of numerical simulation, software testing and system benchmarking, a framework for the automatic tool is proposed in this paper. Investigation on implementation of existing automatic tools that perform calculation of measurement uncertainty, software testing and security assessment demonstrates the feasibility of the automatic framework advanced.

  5. Mobilizing Communities around HIV Prevention for Youth: How Three Coalitions Applied Key Strategies to Bring about Structural Changes

    ERIC Educational Resources Information Center

    Chutuape, Kate S.; Willard, Nancy; Sanchez, Kenia; Straub, Diane M.; Ochoa, Tara N.; Howell, Kourtney; Rivera, Carmen; Ramos, Ibrahim; Ellen, Jonathan M.

    2010-01-01

    Increasingly, HIV prevention efforts must focus on altering features of the social and physical environment to reduce risks associated with HIV acquisition and transmission. Community coalitions provide a vehicle for bringing about sustainable structural changes. This article shares lessons and key strategies regarding how three community…

  6. Security of quantum key distribution with iterative sifting

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos

    2018-01-01

    Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.

  7. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  8. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  9. Major depressive disorder discrimination using vocal acoustic features.

    PubMed

    Taguchi, Takaya; Tachikawa, Hirokazu; Nemoto, Kiyotaka; Suzuki, Masayuki; Nagano, Toru; Tachibana, Ryuki; Nishimura, Masafumi; Arai, Tetsuaki

    2018-01-01

    The voice carries various information produced by vibrations of the vocal cords and the vocal tract. Though many studies have reported a relationship between vocal acoustic features and depression, including mel-frequency cepstrum coefficients (MFCCs) which applied to speech recognition, there have been few studies in which acoustic features allowed discrimination of patients with depressive disorder. Vocal acoustic features as biomarker of depression could make differential diagnosis of patients with depressive state. In order to achieve differential diagnosis of depression, in this preliminary study, we examined whether vocal acoustic features could allow discrimination between depressive patients and healthy controls. Subjects were 36 patients who met the criteria for major depressive disorder and 36 healthy controls with no current or past psychiatric disorders. Voices of reading out digits before and after verbal fluency task were recorded. Voices were analyzed using OpenSMILE. The extracted acoustic features, including MFCCs, were used for group comparison and discriminant analysis between patients and controls. The second dimension of MFCC (MFCC 2) was significantly different between groups and allowed the discrimination between patients and controls with a sensitivity of 77.8% and a specificity of 86.1%. The difference in MFCC 2 between the two groups reflected an energy difference of frequency around 2000-3000Hz. The MFCC 2 was significantly different between depressive patients and controls. This feature could be a useful biomarker to detect major depressive disorder. Sample size was relatively small. Psychotropics could have a confounding effect on voice. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  11. Sewage in ground water in the Florida Keys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shinn, E.A.

    1995-12-31

    More than 24,000 septic tanks, 5,000 cesspools, and greater than 600 shallow disposal wells introduce sewage effluents into porous and permeable limestone underlying the Florida Keys. To porous and permeable limestone underlying the Florida Keys. To assess the fate of sewage nutrients, 21 2- to 20-m-deep wells were core drilled and completed as water-monitoring wells. The wells were sampled quarterly and analyzed for 17 parameters. including nutrients and bacteria. Nutrients (mainly NH4, - which is 30 to 40 times higher than in surface sea water) were detected in ground water beneath the Keys and offshore coral reefs. Highest levels weremore » beneath reefs 5 to 8 km offshore. Ground waters were generally hypersaline and fecal bacteria (fecal coliform and streptococci) were detected in ground water beneath living coral reefs. Higher sea level on the Florida Bay side of the Keys is proposed as the mechanism for forcing ground water toward offshore coral reefs. Tidal pumping, which is more pronounced near the Keys, causes leakage of ground water where the sediment is thin. Areas lacking sediment cover consist of bare limestone bedrock or permeable coral reefs. These are the areas where coral diseases and algal growth have increased in recent years. Pollutants entering the ground water beneath the Florida Keys are likely to be transported seaward beneath impermeable Holocene sediments and may be upwelling through coral reefs and other hardbottom communities.« less

  12. Proscene: A feature-rich framework for interactive environments

    NASA Astrophysics Data System (ADS)

    Charalambos, Jean Pierre

    We introduce Proscene, a feature-rich, open-source framework for interactive environments. The design of Proscene comprises a three-layered onion-like software architecture, promoting different possible development scenarios. The framework innermost layer decouples user gesture parsing from user-defined actions. The in-between layer implements a feature-rich set of widely-used motion actions allowing the selection and manipulation of objects, including the scene viewpoint. The outermost layer exposes those features as a Processing library. The results have shown the feasibility of our approach together with the simplicity and flexibility of the Proscene framework API.

  13. Young People and Sexuality Education: Rethinking Key Debates

    ERIC Educational Resources Information Center

    Allen, Louisa

    2011-01-01

    This book innovatively re-envisions the possibilities of sexuality education. Utilizing student critiques of programs it reconfigures key debates in sexuality education including: Should pleasure be part of the curriculum? Who makes the best educators? Do students prefer single or mixed gender classes?

  14. How perception guides action: Figure-ground segmentation modulates integration of context features into S-R episodes.

    PubMed

    Frings, Christian; Rothermund, Klaus

    2017-11-01

    Perception and action are closely related. Responses are assumed to be represented in terms of their perceptual effects, allowing direct links between action and perception. In this regard, the integration of features of stimuli (S) and responses (R) into S-R bindings is a key mechanism for action control. Previous research focused on the integration of object features with response features while neglecting the context in which an object is perceived. In 3 experiments, we analyzed whether contextual features can also become integrated into S-R episodes. The data showed that a fundamental principle of visual perception, figure-ground segmentation, modulates the binding of contextual features. Only features belonging to the figure region of a context but not features forming the background were integrated with responses into S-R episodes, retrieval of which later on had an impact upon behavior. Our findings suggest that perception guides the selection of context features for integration with responses into S-R episodes. Results of our study have wide-ranging implications for an understanding of context effects in learning and behavior. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Model-based assist feature insertion for sub-40nm memory device

    NASA Astrophysics Data System (ADS)

    Suh, Sungsoo; Lee, Suk-joo; Choi, Seong-woon; Lee, Sung-Woo; Park, Chan-hoon

    2009-04-01

    Many issues need to be resolved for a production-worthy model based assist feature insertion flow for single and double exposure patterning process to extend low k1 process at 193 nm immersion technology. Model based assist feature insertion is not trivial to implement either for single and double exposure patterning compared to rule based methods. As shown in Fig. 1, pixel based mask inversion technology in itself has difficulties in mask writing and inspection although it presents as one of key technology to extend single exposure for contact layer. Thus far, inversion technology is tried as a cooptimization of target mask to simultaneously generate optimized main and sub-resolution assists features for a desired process window. Alternatively, its technology can also be used to optimize for a target feature after an assist feature types are inserted in order to simplify the mask complexity. Simplification of inversion mask is one of major issue with applying inversion technology to device development even if a smaller mask feature can be fabricated since the mask writing time is also a major factor. As shown in Figure 2, mask writing time may be a limiting factor in determining whether or not an inversion solution is viable. It can be reasoned that increased number of shot counts relates to increase in margin for inversion methodology. On the other hand, there is a limit on how complex a mask can be in order to be production worthy. There is also source and mask co-optimization which influences the final mask patterns and assist feature sizes and positions for a given target. In this study, we will discuss assist feature insertion methods for sub 40-nm technology.

  16. Radiology Aide. Instructor Key [and] Student Manual.

    ERIC Educational Resources Information Center

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  17. The Papers Printing Quality Complex Assessment Algorithm Development Taking into Account the Composition and Production Technological Features

    NASA Astrophysics Data System (ADS)

    Babakhanova, Kh A.; Varepo, L. G.; Nagornova, I. V.; Babluyk, E. B.; Kondratov, A. P.

    2018-04-01

    Paper is one of the printing system key components causing the high-quality printed products output. Providing the printing companies with the specified printing properties paper, while simultaneously increasing the paper products range and volume by means of the forecasting methods application and evaluation during the production process, is certainly a relevant problem. The paper presents the printing quality control algorithm taking into consideration the paper printing properties quality assessment depending on the manufacture technological features and composition variation. The information system including raw material and paper properties data and making possible pulp and paper enterprises to select paper composition optimal formulation is proposed taking into account the printing process procedure peculiarities of the paper manufacturing with specified printing properties.

  18. Effective, clinically feasible and sustainable: Key design features of psycho-educational and supportive care interventions to promote individualised self-management in cancer care.

    PubMed

    Schofield, Penelope; Chambers, Suzanne

    2015-05-01

    As the global burden of cancer increases healthcare services will face increasing challenges in meet the complex needs of these patients, their families and the communities in which they live. This raises the question of how to meet patient need where direct clinical contact may be constrained or not readily available. Patients and families require resources and skills to manage their illness outside of the hospital setting within their own communities. To propose a framework for the development and delivery of psycho-educational and supportive care interventions drawing on theoretical principles of behaviour change and evidence-based interventions, and based on extensive experience in developing and testing complex interventions in oncology. At the core of this intervention framework are considerations of efficiency: interventions are designed to cater for individuals' unique needs; to place minimal demands on the health system infrastructure and to be rapidly disseminated into usual care if successful. There are seven key features: 1) Targeting cancer type and stage; 2) Tailoring to unique individual needs; 3) Promotion of patient self-management of their disease and treatment side effects; 4) Efficient delivery of the intervention; 5) Training and adherence to protocol; 6) Ensuring the intervention is evidence-based; 7) Confirming stakeholder acceptability of the intervention. A case study of a randomised controlled trial which tested psycho-educational oncology interventions using this framework is presented. These interventions were designed to cater for individuals' unique needs and promote self-management while placing minimal demands on the acute health care setting. Innovative ways to realise the potentially major impact that psycho-educational and supportive care interventions can have on psychological morbidity, coping, symptoms and quality of life in serious and chronic illness are needed. This framework, which is driven by theory, evidence, and

  19. Relating interesting quantitative time series patterns with text events and text features

    NASA Astrophysics Data System (ADS)

    Wanner, Franz; Schreck, Tobias; Jentner, Wolfgang; Sharalieva, Lyubka; Keim, Daniel A.

    2013-12-01

    In many application areas, the key to successful data analysis is the integrated analysis of heterogeneous data. One example is the financial domain, where time-dependent and highly frequent quantitative data (e.g., trading volume and price information) and textual data (e.g., economic and political news reports) need to be considered jointly. Data analysis tools need to support an integrated analysis, which allows studying the relationships between textual news documents and quantitative properties of the stock market price series. In this paper, we describe a workflow and tool that allows a flexible formation of hypotheses about text features and their combinations, which reflect quantitative phenomena observed in stock data. To support such an analysis, we combine the analysis steps of frequent quantitative and text-oriented data using an existing a-priori method. First, based on heuristics we extract interesting intervals and patterns in large time series data. The visual analysis supports the analyst in exploring parameter combinations and their results. The identified time series patterns are then input for the second analysis step, in which all identified intervals of interest are analyzed for frequent patterns co-occurring with financial news. An a-priori method supports the discovery of such sequential temporal patterns. Then, various text features like the degree of sentence nesting, noun phrase complexity, the vocabulary richness, etc. are extracted from the news to obtain meta patterns. Meta patterns are defined by a specific combination of text features which significantly differ from the text features of the remaining news data. Our approach combines a portfolio of visualization and analysis techniques, including time-, cluster- and sequence visualization and analysis functionality. We provide two case studies, showing the effectiveness of our combined quantitative and textual analysis work flow. The workflow can also be generalized to other

  20. A New Three Dimensional Based Key Generation Technique in AVK

    NASA Astrophysics Data System (ADS)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2017-08-01

    In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.