Sample records for key findings presented

  1. Institutional Data Management in Higher Education. ECAR Key Findings

    ERIC Educational Resources Information Center

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  2. Powering Down: Green IT in Higher Education. Key Findings

    ERIC Educational Resources Information Center

    Sheehan, Mark C.

    2010-01-01

    This document presents the key findings from "Powering Down: Green IT in Higher Education," the 2010 ECAR (EDUCAUSE Center for Applied Research) study of green IT. The study examines the stance institutions and their central IT organizations are taking on environmental sustainability (ES), the progress they are making on a variety of key…

  3. Integrated vehicle-based safety systems : heavy-truck field operational test key findings report.

    DOT National Transportation Integrated Search

    2010-08-01

    This document presents key findings from the heavy-truck field operational test conducted as : part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of : analyses performed by the University of Michigan Transporta...

  4. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    DOT National Transportation Integrated Search

    2011-01-01

    This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportati...

  5. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    DOT National Transportation Integrated Search

    2011-01-01

    "This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportat...

  6. The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings

    ERIC Educational Resources Information Center

    Smith, Shannon D.; Caruso, Judith Borreson

    2010-01-01

    This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…

  7. Alternative IT Sourcing Strategies: From the Campus to the Cloud. ECAR Key Findings

    ERIC Educational Resources Information Center

    Goldstein, Philip J.

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study, "Alternative IT Sourcing Strategies: From the Campus to the Cloud," by Philip J. Goldstein. The study explores a multitude of strategies used by colleges and university information technology organizations to deliver the breadth of technologies…

  8. Responding to Recession: IT Funding and Cost Management in Higher Education. Key Findings

    ERIC Educational Resources Information Center

    Goldstein, Philip J.

    2010-01-01

    This document presents the key findings from "Responding to Recession: IT Funding and Cost Management in Higher Education", the 2010 ECAR (EDUCAUSE Center for Applied Research) study of how the economic recession is impacting information technology (IT) organizations and operations in higher education. The study was designed to address the…

  9. AN INTEGRATED SYNTHESIS OF KEY AND POLICY RELEVANT FINDINGS FROM EPA'S SUPERSITES PROGRAM AND RELATED STUDIES

    EPA Science Inventory

    This presentation provides an overview and initial insights into the findings based on results from EPA's PM Supersites Program and related studies. Many key atmospheric sciences findings have been identified through the research conducted during the last five years as part of t...

  10. Radiographic findings in late-presenting congenital diaphragmatic hernia: helpful imaging findings.

    PubMed

    Muzzafar, Sofia; Swischuk, Leonard E; Jadhav, Siddharth P

    2012-03-01

    Imaging findings in delayed presentation of congenital diaphragmatic hernia can be confusing and misleading, resulting in a delay in diagnosis. To evaluate the often puzzling plain film findings of late-presenting CDH in an effort to determine whether any of the findings could be helpful in arriving at an early diagnosis. We reviewed and documented the plain film findings and clinical data in eight patients seen during the last 20 years with late-presenting CDH. IRB exempt status was obtained in this study. There were five boys and three girls. The age range was 4 months to 12 years with a mean of 2.4 years. Five children presented with acute respiratory problems while three presented with acute abdominal pain. Two children presented with both respiratory and abdominal findings and one also presented with hematemesis. Two children had radiographic findings that were not difficult to analyze while the remaining six had findings that posed initial diagnostic problems. Although not common, late-presenting CDH can result in confusing plain film radiographic findings and a delay in diagnosis. We found that the most important finding in analyzing these radiographs is in evaluating the location and position of the gastric bubble with the more common left-side hernias.

  11. Teaching Teachers for the Future (TTF) Project TPACK Survey: Summary of the Key Findings

    ERIC Educational Resources Information Center

    Finger, Glenn; Jamieson-Proctor, Romina; Cavanagh, Rob; Albion, Peter; Grimbeek, Peter; Bond, Trevor; Fitzgerald, Robert; Romeo, Geoff; Lloyd, Margaret

    2013-01-01

    This paper presents a summary of the key findings of the TTF TPACK Survey developed and administered for the Teaching the Teachers for the Future (TTF) Project implemented in 2011. The TTF Project, funded by an Australian Government ICT Innovation Fund grant, involved all 39 Australian Higher Education Institutions which provide initial teacher…

  12. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 2001.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This report presents an overview of the key findings from the Monitoring the Future 2001 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  13. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2002.

    ERIC Educational Resources Information Center

    Michigan Univ., Ann Arbor. Inst. for Social Research.

    This report presents an overview of the key findings from the Monitoring the Future 2002 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  14. Perceptual Tests of an Algorithm for Musical Key-Finding

    ERIC Educational Resources Information Center

    Schmuckler, Mark A.; Tomovski, Robert

    2005-01-01

    Perceiving the tonality of a musical passage is a fundamental aspect of the experience of hearing music. Models for determining tonality have thus occupied a central place in music cognition research. Three experiments investigated 1 well-known model of tonal determination: the Krumhansl-Schmuckler key-finding algorithm. In Experiment 1,…

  15. Key Findings and Recommendations for Technology Transfer at the ITS JPO

    DOT National Transportation Integrated Search

    2011-03-18

    This report provides key findings and recommendations for technology transfer at the Intelligent Transportation Systems Joint Program Office (ITS JPO) based upon an assessment of best practices in technology transfer in other industries, such as nati...

  16. Human Health Effects of Biphenyl: Key Findings and Scientific Issues

    PubMed Central

    Li, Zheng; Hogan, Karen A.; Cai, Christine; Rieth, Susan

    2015-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) has evaluated the human health hazards of biphenyl exposure. Objectives: We review key findings and scientific issues regarding expected human health effects of biphenyl. Methods: Scientific literature from 1926 through September 2012 was critically evaluated to identify potential human health hazards associated with biphenyl exposure. Key issues related to the carcinogenicity and noncancer health hazards of biphenyl were examined based on evidence from experimental animal bioassays and mechanistic studies. Discussion: Systematic consideration of experimental animal studies of oral biphenyl exposure took into account the variety of study designs (e.g., study sizes, exposure levels, and exposure durations) to reconcile differing reported results. The available mechanistic and toxicokinetic evidence supports the hypothesis that male rat urinary bladder tumors arise through urinary bladder calculi formation but is insufficient to hypothesize a mode of action for liver tumors in female mice. Biphenyl and its metabolites may induce genetic damage, but a role for genotoxicity in biphenyl-induced carcinogenicity has not been established. Conclusions: The available health effects data for biphenyl provides suggestive evidence for carcinogenicity in humans, based on increased incidences of male rat urinary bladder tumors at high exposure levels and on female mouse liver tumors. Kidney toxicity is also a potential human health hazard of biphenyl exposure. Citation: Li Z, Hogan KA, Cai C, Rieth S. 2016. Human health effects of biphenyl: key findings and scientific issues. Environ Health Perspect 124:703–712; http://dx.doi.org/10.1289/ehp.1509730 PMID:26529796

  17. Human Health Effects of Biphenyl: Key Findings and Scientific Issues.

    PubMed

    Li, Zheng; Hogan, Karen A; Cai, Christine; Rieth, Susan

    2016-06-01

    In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) has evaluated the human health hazards of biphenyl exposure. We review key findings and scientific issues regarding expected human health effects of biphenyl. Scientific literature from 1926 through September 2012 was critically evaluated to identify potential human health hazards associated with biphenyl exposure. Key issues related to the carcinogenicity and noncancer health hazards of biphenyl were examined based on evidence from experimental animal bioassays and mechanistic studies. Systematic consideration of experimental animal studies of oral biphenyl exposure took into account the variety of study designs (e.g., study sizes, exposure levels, and exposure durations) to reconcile differing reported results. The available mechanistic and toxicokinetic evidence supports the hypothesis that male rat urinary bladder tumors arise through urinary bladder calculi formation but is insufficient to hypothesize a mode of action for liver tumors in female mice. Biphenyl and its metabolites may induce genetic damage, but a role for genotoxicity in biphenyl-induced carcinogenicity has not been established. The available health effects data for biphenyl provides suggestive evidence for carcinogenicity in humans, based on increased incidences of male rat urinary bladder tumors at high exposure levels and on female mouse liver tumors. Kidney toxicity is also a potential human health hazard of biphenyl exposure. Li Z, Hogan KA, Cai C, Rieth S. 2016. Human health effects of biphenyl: key findings and scientific issues. Environ Health Perspect 124:703-712; http://dx.doi.org/10.1289/ehp.1509730.

  18. "State of the Nation": A Discussion of Some of the Project's Key Findings

    ERIC Educational Resources Information Center

    Earley, Peter

    2010-01-01

    This paper considers several of the key findings of the State of the Nation research. Specific reference is made to three areas--impact evaluation, strategic leadership of professional development, and barriers and constraints to effective CPD practice--which are considered with reference to findings from the other TDA-funded projects conducted at…

  19. 40 CFR 63.2831 - Where can I find definitions of key words used in this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... words used in this subpart? 63.2831 Section 63.2831 Protection of Environment ENVIRONMENTAL PROTECTION... Vegetable Oil Production What This Subpart Covers § 63.2831 Where can I find definitions of key words used in this subpart? You can find definitions of key words used in this subpart in § 63.2872. ...

  20. Language Learning at Key Stage 2: Findings from a Longitudinal Study

    ERIC Educational Resources Information Center

    Cable, Carrie; Driscoll, Patricia; Mitchell, Rosamond; Sing, Sue; Cremin, Teresa; Earl, Justine; Eyres, Ian; Holmes, Bernardette; Martin, Cynthia; Heins, Barbara

    2012-01-01

    This paper discusses some of the findings from a 3-year longitudinal study of language learning in the upper stage of English primary schools, i.e. at Key Stage 2. This largely qualitative study (commissioned by the then Department for Children, Schools and Families) was designed to explore and document developing provision and practice in a…

  1. Key Findings from a National Internet Survey of 400 Teachers and 95 Principals Conducted November 12-21, 2008

    ERIC Educational Resources Information Center

    McCleskey, Nicole

    2010-01-01

    This paper presents the key findings from a national Internet survey of 400 teachers and 95 principals. This survey was conducted November 12-21, 2008. The sample was based on a list provided by EMI Surveys, a custom online research sample provider with an extensive portfolio of projects. The margin of error for a sample of 495 interviews is [plus…

  2. U of M Civil Service Wellness Survey: Finding Out Employees' Health and Wellness Needs. A Report of Key Findings.

    ERIC Educational Resources Information Center

    Matross, Ron; Roesler, Jon

    Key findings from a wellness survey conducted with University of Minnesota civil service employees are discussed. The survey was designed to provide information to guide future campus health and wellness programming. Four topics were covered: physical fitness/exercise, nutrition, self-improvement/psychological health, and general health/preventive…

  3. How the World's Best Schools Stay on Top: Study's Key Findings Pinpoint Practices That Align with Learning Forward

    ERIC Educational Resources Information Center

    Killion, Joellen

    2016-01-01

    Key findings from a new study highlight how Learning Forward's long-standing position on professional learning correlates with practices in high-performing systems in Singapore, Shanghai, Hong Kong, and British Columbia. The purpose of this article is to share key findings from the study so that educators might apply them to strengthening…

  4. Finding the Key to a Good Theatre Program: Some Comments on the ETA Survey.

    ERIC Educational Resources Information Center

    Hobgood, Burnet M.

    1991-01-01

    Offers some comments on the Educational Theatre Association's survey on the status of theater in U.S. high schools in the same issue of this journal. Discusses finding the key factors responsible for good school theater. (PRA)

  5. Human Health Effects of Trichloroethylene: Key Findings and Scientific Issues

    PubMed Central

    Jinot, Jennifer; Scott, Cheryl Siegel; Makris, Susan L.; Cooper, Glinda S.; Dzubow, Rebecca C.; Bale, Ambuja S.; Evans, Marina V.; Guyton, Kathryn Z.; Keshava, Nagalakshmi; Lipscomb, John C.; Barone, Stanley; Fox, John F.; Gwinn, Maureen R.; Schaum, John; Caldwell, Jane C.

    2012-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) completed a toxicological review of trichloroethylene (TCE) in September 2011, which was the result of an effort spanning > 20 years. Objectives: We summarized the key findings and scientific issues regarding the human health effects of TCE in the U.S. EPA’s toxicological review. Methods: In this assessment we synthesized and characterized thousands of epidemiologic, experimental animal, and mechanistic studies, and addressed several key scientific issues through modeling of TCE toxicokinetics, meta-analyses of epidemiologic studies, and analyses of mechanistic data. Discussion: Toxicokinetic modeling aided in characterizing the toxicological role of the complex metabolism and multiple metabolites of TCE. Meta-analyses of the epidemiologic data strongly supported the conclusions that TCE causes kidney cancer in humans and that TCE may also cause liver cancer and non-Hodgkin lymphoma. Mechanistic analyses support a key role for mutagenicity in TCE-induced kidney carcinogenicity. Recent evidence from studies in both humans and experimental animals point to the involvement of TCE exposure in autoimmune disease and hypersensitivity. Recent avian and in vitro mechanistic studies provided biological plausibility that TCE plays a role in developmental cardiac toxicity, the subject of substantial debate due to mixed results from epidemiologic and rodent studies. Conclusions: TCE is carcinogenic to humans by all routes of exposure and poses a potential human health hazard for noncancer toxicity to the central nervous system, kidney, liver, immune system, male reproductive system, and the developing embryo/fetus. PMID:23249866

  6. 40 CFR 63.1176 - Where can I find definitions of key words used in this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... words used in this subpart? 63.1176 Section 63.1176 Protection of Environment ENVIRONMENTAL PROTECTION... Production § 63.1176 Where can I find definitions of key words used in this subpart? The definitions of key words used in this subpart are in the Clean Air Act (Act), in § 63.2 of the general provisions in...

  7. Atypically presenting kaposiform hemangioendothelioma of the knee: ultrasound findings.

    PubMed

    Erdem Toslak, Iclal; Stegman, Matthew; Reiter, Michael P; Barkan, Güliz A; Borys, Dariusz; Lim-Dunham, Jennifer E

    2018-04-10

    Kaposiform hemangioendothelioma (KHE) is a rare vascular tumor of early childhood and infancy. Kasabach-Merritt phenomenon, a common complication of KHE, is characterized by life-threatening thrombocytopenia, hemolytic anemia, and consumption coagulopathy. There may be atypical cases that do not present with Kasabach-Merritt phenomenon and do have atypical imaging findings. Knowledge of atypical imaging features may assist radiologists in identifying KHE. In this report, we present a 4-year-old case of KHE with atypical ultrasound findings.

  8. The National Television Violence Study: Key Findings and Recommendations.

    ERIC Educational Resources Information Center

    Young Children, 1996

    1996-01-01

    Summarizes findings of the Television Violence Study indicating that the context of much television violence is dangerous to viewers, perpetrators go unpunished in the majority of programs, negative consequences of violence are often ignored, guns feature prominently, and presentation of violence differs greatly across networks and across…

  9. Present and future free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.; Peterson, C. Glen; Wipf, Christopher C.

    2002-04-01

    Free-space quantum key distribution (QKD), more popularly know as quantum cryptography, uses single-photon free-space optical communications to distribute the secret keys required for secure communications. At Los Alamos National Laboratory we have demonstrated a fully automated system that is capable of operations at any time of day over a horizontal range of several kilometers. This has proven the technology is capable of operation from a spacecraft to the ground, opening up the possibility of QKD between any group of users anywhere on Earth. This system, the prototyping of a new system for use on a spacecraft, and the techniques required for world-wide quantum key distribution will be described. The operational parameters and performance of a system designed to operate between low earth orbit (LEO) and the ground will also be discussed.

  10. Endoscopic findings in patients presenting with oesophageal dysphagia.

    PubMed

    Khan, Adil Naseer; Said, Khalid; Ahmad, Mukhtar; Ali, Kishwar; Hidayat, Rania; Latif, Humera

    2014-01-01

    Dysphagia is the difficulty in swallowing and is often described by the patients as a 'perception' that there is an impediment to the normal passage of the swallowed material. It is frequently observed that there is an association of dysphagia with serious underlying disorders and warrants early evaluation. The current study aimed to determine the frequency of common endoscopic findings in patients presenting with oesophageal dysphagia. This cross-sectional descriptive study was carried out in the department of Gastroenterology, Ayub Medical College, Abbottabad, from October 2012 to April 2013. Consecutive patients with dysphagia were included in the study and were subjected to endoscopy. A total of 139 patients presenting with dysphagia were studied, 81 (58.3%) were males and 58 (41.7%) were females. The mean age was 52.41 ± 16.42. Malignant oesophageal stricture was the most common finding noted in 38 (27.3%) patients with 28 (73.7%) males and 23 (60.5%) patients among them were above the age of 50 years. It was followed by normal upper Gastrointestinal (GI) endoscopy in 29 (20.9%) patients and reflux esophagitis in 25 (18.0%) patients. Schatzki's ring was present in 14 (10.1%) patients; benign oesophageal strictures in 12 (8.6%) patients while achalasia was noted in 7 (5.0%) patients. 14(10.1%) patients had findings other than the ones mentioned above. Malignancies are a more common cause of dysphagia in our population and early diagnosis can result in proper treatment of many of these cases.

  11. Human Health Effects of Dichloromethane: Key Findings and Scientific Issues

    PubMed Central

    Schlosser, Paul M.; Bale, Ambuja S.; Gibbons, Catherine F.; Wilkins, Amina

    2014-01-01

    effects of dichloromethane: key findings and scientific issues. Environ Health Perspect 123:114–119; http://dx.doi.org/10.1289/ehp.1308030 PMID:25325283

  12. Male mental health problems, psychopathy, and personality traits: key findings from the first 14 years of the Pittsburgh Youth Study.

    PubMed

    Loeber, R; Farrington, D P; Stouthamer-Loeber, M; Moffitt, T E; Caspi, A; Lynam, D

    2001-12-01

    This paper reviews key findings on juvenile mental health problems in boys, psychopathy, and personality traits, obtained in the first 14 years of studies using data from the Pittsburgh Youth Study. This is a study of 3 samples, each of about 500 boys initially randomly drawn from boys in the 1st, 4th, and 7th grades of public schools in Pittsburgh. The boys have been followed regularly, initially each half year, and later at yearly intervals. Currently, the oldest boys are about 25 years old, whereas the youngest boys are about 19. Findings are presented on the prevalence and interrelation of disruptive behaviors, ADHD, and depressed mood. Results concerning risk factors for these outcomes are reviewed. Psychological factors such as psychopathy, impulsivity, and personality are described. The paper closes with findings on service delivery of boys with mental health problems.

  13. A pediatric renal lymphoma case presenting with central nervous system findings.

    PubMed

    Baran, Ahmet; Küpeli, Serhan; Doğru, Omer

    2013-06-01

    In pediatric patients renal lymphoma frequently presents in the form of multiple, bilateral mass lesions, infrequently as a single or retroperitoneal mass, and rarely as diffuse infiltrative lesions. In patients with apparent central nervous system involvement close attention to other physical and laboratory findings are essential for preventing a delay in the final diagnosis. Herein we present a pediatric patient with renal lymphoma that presented with central nervous system findings that caused a delay in diagnosis. None declared.

  14. Imaging findings in systemic childhood diseases presenting with dermatologic manifestations.

    PubMed

    Fink, Adam Z; Gittler, Julia K; Nakrani, Radhika N; Alis, Jonathan; Blumfield, Einat; Levin, Terry L

    Many childhood diseases often present with skin abnormalities with which radiologists are largely unfamiliar. Knowledge of associated dermatologic manifestations may aid the radiologist in confirming the diagnosis and recommending targeted imaging of affected organs. We review the imaging findings in childhood diseases associated with dermatologic manifestations. Diseases include dermatologic findings which herald underlying malignancy (Neuroblastoma, leukemia/lymphoma, Langerhans cell histiocytosis),are associated with risk of malignancy (Epidermolysis Bullosa, basal cell nevus syndrome, Cowden's syndrome, Tuberous Sclerosis),or indicate a systemic inflammatory/immune disorder (Kawasaki's disease, Henoch Schonlein Purpura, systemic lupus erythematosus, scleroderma, sarcoidosis, dermatomyositis and immune thrombocytopenic purpura). Familiarity with pertinent findings in childhood diseases presenting with dermatologic manifestations in childhood diseases aids the radiologist in confirming the diagnosis and guiding imaging workup. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Gastric schwannoma presenting as a casual ultrasonographic findings.

    PubMed

    Álvarez Higueras, Francisco Javier; Pereñíguez López, Ana; Estrella Díez, Esther; Muñoz Tornero, María; Egea Valenzuela, Juan; Bas Bernal, Águeda; Garre Sánchez, Carmen; Vargas Acosta, Ángel; Sánchez Velasco, Eduardo; Carballo Álvarez, Luis Fernando

    2016-12-01

    We present the case of a patient under study due to ascites in which a mass located on the gastric wall was observed during ultrasonography. Further studies (upper endoscopy and computed tomography) confirmed this finding. After an ultrasound-guided percutaneous biopsy, diagnosis of gastric schwannoma was made as intense S-100 expression was found. Surgery was rejected due to the bad clinical situation of the patient and because the mass was an asymptomatic benign tumor.

  16. Incidental findings on MRI scans of patients presenting with audiovestibular symptoms.

    PubMed

    Papanikolaou, Vasileios; Khan, Mohammad H; Keogh, Ivan J

    2010-06-07

    The evaluation of patients presenting with audiovestibular symptoms usually includes MRI of the internal auditory meatus, the cerebellopontine angle and the brain. A significant percentage of these scans will present unexpected, incidental findings, which could have important clinical significance. To determine the frequency and clinical significance of incidental findings on MRI scans of patients with audiovestibular symptoms. A retrospective analysis of 200 serial MRI scans. Gender distribution: equal. Age range: 17-82 years. One-hundred and four scans (52%) were normal and 1 scan (0.5%) demonstrated a unilateral vestibular schwannoma. Ninety-five scans (47.5%) demonstrated incidental findings. Sixty-six of these (33%) were considered of ishaemic origin and did not require further action. Five (2.5%) scans demonstrated significant findings which warranted appropriate referral; Two Gliomas (1%), 2 cases of extensive White Matter Lesions (1%), 1 lipoma (0.5%). The remaining scans demonstrated various other findings. Investigation of patients with audiovestibular symptoms with MRI scans revealed incidental findings in a significant percentage (47.5%). The majority of these findings were benign warranting no further action and only 2.5% required further referral. It is the responsibility of the referring Otolaryngologist to be aware of these findings, to be able to assess their significance, to inform the patient and if needed to refer for further evaluation.

  17. Assessment of Health Effects of Exogenous Urea: Summary and Key Findings.

    PubMed

    Dickerson, Aisha S; Lee, Janice S; Keshava, Channa; Hotchkiss, Andrew; Persad, Amanda S

    2018-05-01

    Urea has been utilized as a reductant in diesel fuels to lower emission of nitrogen oxides, igniting interest in probable human health hazards associated with exposure to exogenous urea. Here, we summarize and update key findings on potential health effects of exogenous urea, including carcinogenicity. No definitive target organs for oral exposure were identified; however, results in animal studies suggest that the liver and kidney could be potential target organs of urea toxicity. The available human-subject literature suggests that the impact on lung function is minimal. Based on the literature on exogenous urea, we concluded that there was inadequate information to assess the carcinogenic potential of urea, or perform a quantitative assessment to derive reference values. Given the limited information on exogenous urea, additional research to address gaps for exogenous urea should include long-term cancer bioassays, two-generation reproductive toxicity studies, and mode-of-action investigations.

  18. Socioeconomic assessment of Forest Service American Recovery and Reinvestment Act projects: key findings and lessons learned

    Treesearch

    Susan Charnley; Pamela Jakes; John Schelhas

    2012-01-01

    The American Recovery and Reinvestment Act of 2009 (the Recovery Act) aimed to create jobs and promote economic growth while addressing the Nation’s social and environmental needs. The USDA Forest Service received $1.15 billion in economic recovery funding. This report contains key findings and lessons learned from a socioeconomic assessment of Forest Service Recovery...

  19. Does Lymphocytic Colitis Always Present with Normal Endoscopic Findings?

    PubMed Central

    Park, Hye Sun; Han, Dong Soo; Ro, Youngouk; Eun, Chang Soo; Yoo, Kyo-Sang

    2015-01-01

    Background/Aims Although normal endoscopic findings are, as a rule, part of the diagnosis of microscopic colitis, several cases of macroscopic lesions (MLs) have been reported in collagenous colitis, but hardly in lymphocytic colitis (LC). The aim of this study was to investigate the endoscopic, clinical, and histopathologic features of LC with MLs. Methods A total of 14 patients with LC who were diagnosed between 2005 and 2010 were enrolled in the study. Endoscopic, clinical, and histopathologic findings were compared retrospectively according to the presence or absence of MLs. Results MLs were observed in seven of the 14 LC cases. Six of the MLs exhibited hypervascularity, three exhibited exudative bleeding and one exhibited edema. The patients with MLs had more severe diarrhea and were taking aspirin or proton pump inhibitors. More intraepithelial lymphocytes were observed during histologic examination in the patients with MLs compared to the patients without MLs, although this difference was not significant. The numbers of mononuclear cells and neutrophils in the lamina propria were independent of the presence or absence of MLs. Conclusions LC does not always present with normal endoscopic findings. Hypervascularity and exudative bleeding are frequent endoscopic findings in patients with MLs. PMID:25167800

  20. Calyceal diverticula in children: imaging findings and presentations.

    PubMed

    Ochoa Santiago, Y; Sangüesa Nebot, C; Aliaga, S Picó; Serrano Durbá, A; López, P Ortega

    2018-04-26

    A calyceal diverticulum consists of a cystic eventration in the renal parenchyma that is lined with transitional cell epithelium with a narrow infundibular connection with the calyces or pelvis of the renal collector system; thus, the term pyelocalyceal diverticulum would be more accurate. Very rare in pediatric patients, calyceal diverticula can be symptomatic and require treatment. Calyceal diverticula are underdiagnosed because they can be mistaken for simple renal cysts on ultrasonography. To determine the approach to their follow-up and management, the diagnosis must be confirmed by excretory-phase computed tomography (CT) or magnetic resonance imaging (MRI). This article aims to show the different ways that calyceal diverticula can present in pediatric patients; it emphasizes the ultrasonographic findings that enable the lesion to be suspected and the definitive findings that confirm the diagnosis on CT and MRI. It also discusses the differential diagnosis with other cystic kidney lesions and their treatment. Copyright © 2018 SERAM. Publicado por Elsevier España, S.L.U. All rights reserved.

  1. Trends in Learning Outcomes Assessment. Key Findings from a Survey among Administrators at AAC&U Member Institutions

    ERIC Educational Resources Information Center

    Association of American Colleges and Universities, 2016

    2016-01-01

    This 2016 report summarizes key findings from a national survey among chief academic officers at Association of American Colleges & Universities (AAC&U) member institutions and explores trends in learning outcomes and approaches to assessing them. It documents that many in higher education are moving away from standardized tests and…

  2. Monitoring HIV Prevention Programme Outcomes among Key Populations in Kenya: Findings from a National Survey

    PubMed Central

    Musyoki, Helgar; Anthony, John; Kioko, Japheth; Kaosa, Shem; Ogwang, Bernard E.; Githuka, George; Sirengo, Martin; Birir, Sarah; Blanchard, James F.; Muraguri, Nicholas; Isac, Shajy; Moses, Stephen

    2015-01-01

    In preparation for the implementation of the Kenya AIDS Strategic Framework 2014/15-2018/19, the Kenya National AIDS and STI Control Programme facilitated a national polling booth survey as part of a baseline assessment of HIV-related risk behaviours among FSWs, MSM, and PWID, and their utilization of existing preventive interventions, as well as structural factors that may influence KPs’ vulnerability to HIV. The survey was conducted among “key populations” (female sex workers, men who have sex with men, and people who inject drugs) to understand current HIV risk and prevention behaviours, utilization of existing programmes and services, and experiences of violence. In total, 3,448 female sex workers, 1,308 men who have sex with men, and 690 people who inject drugs were randomly selected to participate in polling booth survey sessions from seven priority sites. Survey responses were aggregated and descriptive statistics derived. In general, reported condom use among all key populations was quite high with paying clients, and lower with regular, non-paying partners. Many participants reported unavailability of condoms or clean injecting equipment within the past month. Exposure to, and utilization of, existing HIV prevention services varied significantly among the groups, and was reported least commonly by female sex workers. Encouragingly, approximately three-quarters of all key population members reported receiving an HIV test in the past three months. All key population groups reported experiencing high levels of physical and sexual violence from partners/clients, and/or arrest and violence by law enforcement officials. Although some of the findings are encouraging, there is room for improvement in HIV prevention programmes and services for key populations across Kenya. PMID:26313642

  3. Abnormal maternal echocardiographic findings in triplet pregnancies presenting with dyspnoea.

    PubMed

    Elhenicky, Marie; Distelmaier, Klaus; Mailath-Pokorny, Mariella; Worda, Christof; Langer, Martin; Worda, Katharina

    2016-03-01

    The objective of our study was to evaluate the prevalence of abnormal maternal echocardiographic findings in triplet pregnancies presenting with dyspnoea. Between 2003 and 2013, patients' records of 96 triplet pregnancies at our department were analysed including maternal and fetal outcome, echocardiographic parameters and N-terminal pro-B-type natriuretic peptide (NT-proBNP) levels. After exclusion of triplet pregnancies with fetal demise before 23 + 0 weeks, selective feticide or missing outcome data, the study population consisted of 60 triplet pregnancies. All women with dyspnoea underwent echocardiography and measurement of NT-proBNP. Dyspnoea towards the end of pregnancy was observed in 13.3% (8/60) of all women with triplet pregnancies, and all of these women underwent echocardiography. The prevalence of abnormal echocardiographic findings in women with dyspnoea was 37.5% (3/8) with peripartum cardiomyopathy in one woman. Median serum NT-proBNP was significantly higher in women with abnormal echocardiographic findings compared with those without (1779 ng/ml, range 1045-6076 ng/ml vs 172 ng/ml, range 50-311 ng/ml; p < 0.001 by Mann-Whitney-U Test). We conclude that triplet pregnancies presenting with dyspnoea show a high prevalence of abnormal echocardiographic findings. Since dyspnoea is a common sign in triplet pregnancies and is associated with a high rate of cardiac involvement, echocardiography and evaluation of maternal NT-proBNP could be considered to improve early diagnosis and perinatal management.

  4. Key Provisions of the Patient Protection and Affordable Care Act (ACA): A Systematic Review and Presentation of Early Research Findings.

    PubMed

    French, Michael T; Homer, Jenny; Gumus, Gulcin; Hickling, Lucas

    2016-10-01

    To conduct a systematic literature review of selected major provisions of the Affordable Care Act (ACA) pertaining to expanded health insurance coverage. We present and synthesize research findings from the last 5 years regarding both the immediate and long-term effects of the ACA. We conclude with a summary and offer a research agenda for future studies. We identified relevant articles from peer-reviewed scholarly journals by performing a comprehensive search of major electronic databases. We also identified reports in the "gray literature" disseminated by government agencies and other organizations. Overall, research shows that the ACA has substantially decreased the number of uninsured individuals through the dependent coverage provision, Medicaid expansion, health insurance exchanges, availability of subsidies, and other policy changes. Affordability of health insurance continues to be a concern for many people and disparities persist by geography, race/ethnicity, and income. Early evidence also indicates improvements in access to and affordability of health care. All of these changes are certain to ultimately impact state and federal budgets. The ACA will either directly or indirectly affect almost all Americans. As new and comprehensive data become available, more rigorous evaluations will provide further insights as to whether the ACA has been successful in achieving its goals. © Health Research and Educational Trust.

  5. Key Relation Extraction from Biomedical Publications.

    PubMed

    Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian

    2017-01-01

    Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.

  6. Contrast enema findings in patients presenting with poor functional outcome after primary repair for Hirschsprung disease.

    PubMed

    Garrett, Kevin M; Levitt, Marc A; Peña, Alberto; Kraus, Steven J

    2012-09-01

    The radiologic evaluation of Hirschsprung disease is well described in the literature. However, there is a paucity of literature describing the appearance of the neo-rectum and colon after repair, specifically describing findings in patients with poor functional outcome, which would suggest the need for reoperation. We describe findings on contrast enema and correlate them with surgical findings at reoperation in children with poor functional outcome after primary repair for Hirschsprung disease who suffer from bowel dysfunction that can manifest with either soiling or obstructive symptoms such as enterocolitis. Children were identified from our colorectal surgery database. At the time of abstract submission, 35 children had contrast enemas prior to reoperation. Additional children continue to present for evaluation. The majority of children included in the study had their primary repair performed elsewhere. The initial procedures included: Duhamel (n = 11), Soave (n = 20) or Swenson (n = 3). One child had undergone a primary Soave repair and subsequently had a Swenson-type reoperation but continued to have a poor outcome. One child's initial surgical repair could not be determined. Images were reviewed by a staff pediatric radiologist and a pediatric radiology fellow. Findings encountered on contrast enema in these children include a distal narrowed segment due to stricture or aganglionic/transitional zone segment (8), dilated/hypomotile distal segment (7), thickened presacral space due to compressing Soave cuff (11), dilated Duhamel pouch (8), active enterocolitis (3) and partially obstructing twist of the pull-through segment (1). Multiple anatomical and pathological complications exist that can lead to bowel dysfunction in children after repair of Hirschsprung disease. Little recent literature exists regarding the radiographic findings in children. We had the opportunity to review a substantial series of these children, describe the contrast enema

  7. Ultrasonographic findings of the various diseases presenting as calf pain.

    PubMed

    Lee, Sun Joo; Kim, Ok Hwa; Choo, Hye Jung; Park, Jun Ho; Park, Yeong-Mi; Jeong, Hae Woong; Lee, Sung Moon; Cho, Kil Ho; Choi, Jung-Ah; Jacobson, Jon A

    2016-01-01

    There are various causes of calf pain. The differential diagnoses affecting the lower leg include cystic lesions, trauma-related lesions, infection or inflammation, vascular lesions, neoplasms, and miscellaneous entities. Ultrasound (US) provide detailed anatomical information of the calf structures, and it offers the ability to confirm, other calf abnormalities, particularly when deep vein thrombosis (DVT) is ruled out. The purpose of this article is to review the causes of a painful calf presenting as DVT and incidental findings found as part of the work-up of DVT, and to provide a broad overview of US findings and clinical features of these pathologies. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Reflections of Girls in the Media: A Two-Part Study on Gender and Media. Summary of Key Findings.

    ERIC Educational Resources Information Center

    1997

    This pamphlet summarizes the key findings of a two-part study that investigated the messages that young women (age 10 to 17) get from the media. A content analysis examined messages to girls across a range of media most heavily used by adolescent girls: television, movies, magazines, music videos, television commercials, and magazine…

  9. Epidemiological findings and clinical and magnetic resonance presentations in subacute sclerosing panencephalitis.

    PubMed

    Cece, H; Tokay, L; Yildiz, S; Karakas, O; Karakas, E; Iscan, A

    2011-01-01

    Subacute sclerosing panencephalitis (SSPE) is a rare, progressive, inflammatory neurodegenerative disease. This study investigated the relationships of clinical stage with epidemiological and magnetic resonance imaging (MRI) findings in SSPE by retrospective review of 76 cases (57 male) diagnosed by typical periodic electroencephalographic features, clinical symptoms and elevated measles antibody titre in cerebrospinal fluid. Clinical stage at diagnosis was I or II in 48 patients, III in 25 and IV in three. Prominent findings at presentation were atonic/myoclonic seizures (57.9%) and mental deterioration with behaviour alteration (30.3%). Frequent MRI findings (13 - 32 patients) were subcortical, periventricular and cortical involvement and brain atrophy; the corpus callosum, basal ganglia, cerebellum and brainstem were less frequently involved. Five patients had pseudotumour cerebri. Cranial MRI at initial diagnosis was normal in 21 patients (19 stage I/II, two stage III/IV). Abnormal MRI findings were significantly more frequent in the later stages, thus a normal initial cranial MRI does not exclude SSPE, which should, therefore, be kept in mind in childhood demyelinating diseases even when the presentation is unusual.

  10. Ares Knowledge Capture: Summary and Key Themes Presentation

    NASA Technical Reports Server (NTRS)

    Coates, Ralph H.

    2011-01-01

    This report has been developed by the National Aeronautics and Space Administration (NASA) Human Exploration and Operations Mission Directorate (HEOMD) Risk Management team in close coordination with the MSFC Chief Engineers Office. This document provides a point-in-time, cumulative, summary of actionable key lessons learned derived from the design project. Lessons learned invariably address challenges and risks and the way in which these areas have been addressed. Accordingly the risk management thread is woven throughout the document.

  11. Clinical presentation, imaging findings, and prognosis of spinal dural arteriovenous fistula.

    PubMed

    Lee, Jookyung; Lim, Young-Min; Suh, Dae Chul; Rhim, Seung Chul; Kim, Sang Joon; Kim, Kwang-Kuk

    2016-04-01

    Spinal dural arteriovenous fistula (SDAVF) is a relatively common acquired vascular malformation of the spinal cord. Assessment of a SDAVF is often difficult because of non-specific findings on non-invasive imaging modalities. Diagnosis of a SDAVF is often delayed, and some patients receive unnecessary treatment and treatment delays, often resulting in a poor outcome. The aim of this study was to characterize the clinical presentation, typical imaging findings, and long-term outcome of SDAVF. Forty patients (13 women, 27 men; mean age 58.18 ± standard deviation 14.75 years) who were treated at our hospital from June 1992 to March 2014 were retrospectively reviewed. We investigated the baseline characteristics, clinical presentation, imaging findings, treatment modalities, and outcome of the patients. The most common clinical presentation was a sensory symptom (80%), followed by motor weakness (70%), and sphincter dysfunction (62.5%). Roughly one-third (32.5%) of patients had a stepwise progression of fluctuating weakness and sensory symptoms, but the most common presentation was chronic progressive myelopathic symptoms (47.5%). Thirty-four patients (85%) had T2 signal change on the spinal cord MRI, indicative of cord edema. Thirty-eight patients had typical perimedullary vessel flow voids on T2-weighted MRI. Twenty-eight patients were treated with endovascular embolization, five patients underwent surgery, and four patients underwent both. Clinical outcome was determined by severity of initial deficit (p=0.008), extent of cord edema (p=0.010), treatment failure (p=0.004), and a residual fistula (p=0.017). SDAVF causes a treatable myelopathy, so early diagnosis and intervention is essential. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems: Key Findings from a Roadmapping Workshop

    PubMed Central

    Weiss, Brian A.; Vogl, Gregory; Helu, Moneer; Qiao, Guixiu; Pellegrino, Joan; Justiniano, Mauricio; Raghunathan, Anand

    2017-01-01

    The National Institute of Standards and Technology (NIST) hosted the Roadmapping Workshop – Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems (PHM4SMS) in Fall 2014 to discuss the needs and priorities of stakeholders in the PHM4SMS technology area. The workshop brought together over 70 members of the PHM community. The attendees included representatives from small, medium, and large manufacturers; technology developers and integrators; academic researchers; government organizations; trade associations; and standards bodies. The attendees discussed the current and anticipated measurement science challenges to advance PHM methods and techniques for smart manufacturing systems; the associated research and development needed to implement condition monitoring, diagnostic, and prognostic technologies within manufacturing environments; and the priorities to meet the needs of PHM in manufacturing. This paper will summarize the key findings of this workshop, and present some of the critical measurement science challenges and corresponding roadmaps, i.e., suggested courses of action, to advance PHM for manufacturing. Milestones and targeted capabilities will be presented for each roadmap across three areas: PHM Manufacturing Process Techniques; PHM Performance Assessment; and PHM Infrastructure – Hardware, Software, and Integration. An analysis of these roadmaps and crosscutting themes seen across the breakout sessions is also discussed. PMID:28664163

  13. Four Key Keys to Powerful Presentations in PowerPoint: Take Your Presentations to the Next Level

    ERIC Educational Resources Information Center

    Howell, Dusti D.

    2008-01-01

    If a person is on a presentation and he/she does not know how to go back to a previous PowerPoint slide, his/her credibility will be clouded and the audience will become frustrated. More sophisticated presenters use handheld remotes to control the basic navigation of slides. Even in this case, keyboard shortcuts can be an added benefit. For those…

  14. A Mid-DESD Review: Key Findings and Ways Forward

    ERIC Educational Resources Information Center

    Wals, Arjen E. J.

    2009-01-01

    This article lists the key outcomes and recommendations of Phase I of the monitoring and evaluation of the DESD. Phase I focused on a review of the structures, provisions and conditions countries and regions have put in place in order to facilitate the development and implementation of ESD. The author also touches upon the constraints and…

  15. Effect of delay in hospital presentation on clinical and imaging findings in acute pulmonary thromboembolism.

    PubMed

    Jenab, Yaser; Alemzadeh-Ansari, Mohammad Javad; Fehri, Seyedeh Arezoo; Ghaffari-Marandi, Neda; Jalali, Arash

    2014-04-01

    There is limited information on the extent and clinical importance of the delay in hospital presentation of acute pulmonary thromboembolism (PTE). The aim of this study was to investigate the delay in hospital presentation of PTE and its association with clinical and imaging findings in PTE. This prospective study was conducted on patients admitted to our hospital with a diagnosis of acute PTE between September 2007 and September 2011. Relationships between delay in hospital presentation and clinical findings, risk factors, imaging findings, and in-hospital mortality were analyzed. Of the 195 patients enrolled, 84 (43.1%) patients presented 3 days after the onset of symptoms. Patients with chest pain, history of immobility for more than 3 days, recent surgery, and estrogen use had significantly less delayed presentation. Right ventricular dysfunction was significantly more frequent in patients with delayed presentation (odds ratio [OR] = 2.38; 95% confidence interval [CI] 1.27-4.44; p = 0.006); however, no relationship was found between delay in presentation and pulmonary computed tomographic angiography or color Doppler sonography findings. Patients with delayed presentation were at higher risk of in-hospital mortality (OR = 4.32; 95% CI 1.12-16.49; p = 0.021). Our study showed that a significant portion of patients with acute PTE had delayed presentation. Also, patients with delayed presentation had worse echocardiographic findings and higher in-hospital mortality. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. Causes, consequences, and policy responses to the migration of health workers: key findings from India.

    PubMed

    Walton-Roberts, Margaret; Runnels, Vivien; Rajan, S Irudaya; Sood, Atul; Nair, Sreelekha; Thomas, Philomina; Packer, Corinne; MacKenzie, Adrian; Tomblin Murphy, Gail; Labonté, Ronald; Bourgeault, Ivy Lynn

    2017-04-05

    This study sought to better understand the drivers of skilled health professional migration, its consequences, and the various strategies countries have employed to mitigate its negative impacts. The study was conducted in four countries-Jamaica, India, the Philippines, and South Africa-that have historically been "sources" of health workers migrating to other countries. The aim of this paper is to present the findings from the Indian portion of the study. Data were collected using surveys of Indian generalist and specialist physicians, nurses, midwives, dentists, pharmacists, dieticians, and other allied health therapists. We also conducted structured interviews with key stakeholders representing government ministries, professional associations, regional health authorities, health care facilities, and educational institutions. Quantitative data were analyzed using descriptive statistics and regression models. Qualitative data were analyzed thematically. Shortages of health workers are evident in certain parts of India and in certain specialty areas, but the degree and nature of such shortages are difficult to determine due to the lack of evidence and health information. The relationship of such shortages to international migration is not clear. Policy responses to health worker migration are also similarly embedded in wider processes aimed at health workforce management, but overall, there is no clear policy agenda to manage health worker migration. Decision-makers in India present conflicting options about the need or desirability of curtailing migration. Consequences of health work migration on the Indian health care system are not easily discernable from other compounding factors. Research suggests that shortages of skilled health workers in India must be examined in relation to domestic policies on training, recruitment, and retention rather than viewed as a direct consequence of the international migration of health workers.

  17. The village/commune safety policy and HIV prevention efforts among key affected populations in Cambodia: finding a balance

    PubMed Central

    2012-01-01

    The Village/Commune Safety Policy was launched by the Ministry of Interior of the Kingdom of Cambodia in 2010 and, due to a priority focus on “cleaning the streets”, has created difficulties for HIV prevention programs attempting to implement programs that work with key affected populations including female sex workers and people who inject drugs. The implementation of the policy has forced HIV program implementers, the UN and various government counterparts to explore and develop collaborative ways of delivering HIV prevention services within this difficult environment. The following case study explores some of these efforts and highlights the promising development of a Police Community Partnership Initiative that it is hoped will find a meaningful balance between the Village/Commune Safety Policy and HIV prevention efforts with key affected populations in Cambodia. PMID:22770267

  18. A GIANT RETROPERITONEAL LIPOMA PRESENTING AS A SCIATIC HERNIA: MRI FINDINGS.

    PubMed

    Duran, S; Cavusoglu, M; Elverici, E; Unal, T D

    2015-01-01

    Sciatic hernia is a rare condition and its clinical diagnosis is uneasy. Herniation of pelvic organs as well as of retroperitoneal neoplasm has been reported in the literature. Sciatica occurs as a result of compression of the sciatic nerve by the herniated sac. We present a case of retroperitoneal lipoma in a patient who had lower leg complaint and describe the imaging findings.

  19. Cystinosis Presenting with Findings of Bartter Syndrome

    PubMed Central

    Özkan, Behzat; Çayır, Atilla; Koşan, Celalettin; Alp, Handan

    2011-01-01

    A five-year-old boy was referred to our pediatric clinic for evaluation of failure to thrive, headache, intermittent high fever, restlessness, polyuria, and polydipsia. His weight and height measurements were under the 3rd percentile. Clinical findings consisted of frontal bossing, carious teeth, O-bain deformity of the lower extremities, and moderate dehydration. The presence of metabolic alkalosis, hypokalemia, hypochloremia, and high renin and aldosterone levels were suggestive of Bartter syndrome and a treatment regimen for Bartter syndrome was started. At follow-up, the polyuria and hyponatremia were found to persist. A reassessment of the patient revealed findings consistent with proximal renal tubular acidosis such as metabolic acidosis with a high urinary pH, proteinuria, aminoaciduria with phosphaturia and hypercalciuria. Based on the presence of parental consanguinity as well as polyuria, proteinuria, low tubular reabsorption of phosphorus, generalized aminoaciduria, light yellow skin and hair color, the probable diagnosis of cystinosis was established and was confirmed by slit-lamp examination of the cornea showing cystine crystal deposition. Our case is a good example demonstrating that development of metabolic alkalosis does not exclude cystinosis and that all findings of the patient should be thoroughly evaluated. Conflict of interest:None declared. PMID:21750641

  20. Cystinosis presenting with findings of Bartter syndrome.

    PubMed

    Özkan, Behzat; Çayır, Atilla; Koşan, Celalettin; Alp, Handan

    2011-01-01

    A five-year-old boy was referred to our pediatric clinic for evaluation of failure to thrive, headache, intermittent high fever, restlessness, polyuria, and polydipsia. His weight and height measurements were under the 3rd percentile. Clinical findings consisted of frontal bossing, carious teeth, O-bain deformity of the lower extremities, and moderate dehydration. The presence of metabolic alkalosis, hypokalemia, hypochloremia, and high renin and aldosterone levels were suggestive of Bartter syndrome and a treatment regimen for Bartter syndrome was started. At follow-up, the polyuria and hyponatremia were found to persist. A reassessment of the patient revealed findings consistent with proximal renal tubular acidosis such as metabolic acidosis with a high urinary pH, proteinuria, aminoaciduria with phosphaturia and hypercalciuria. Based on the presence of parental consanguinity as well as polyuria, proteinuria, low tubular reabsorption of phosphorus, generalized aminoaciduria, light yellow skin and hair color, the probable diagnosis of cystinosis was established and was confirmed by slit-lamp examination of the cornea showing cystine crystal deposition. Our case is a good example demonstrating that development of metabolic alkalosis does not exclude cystinosis and that all findings of the patient should be thoroughly evaluated. ©Journal of Clinical Research in Pediatric Endocrinology, Published by Galenos Publishing.

  1. Florida Nurse Leader Survey Findings: Key Leadership Competencies, Barriers to Leadership, and Succession Planning Needs.

    PubMed

    Denker, Ann-Lynn; Sherman, Rose O; Hutton-Woodland, Michael; Brunell, Mary Lou; Medina, Pamela

    2015-01-01

    This study examined barriers to nursing leadership and succession planning needs for nurse leaders in Florida. The Florida Action Coalition responded to the call to prepare and enable nurses to lead change to advance health, through a grant supported by the Robert Wood Johnson Foundation and Florida Blue Foundation. This is a nurse leader subset of a 56-item statewide survey of actively licensed RNs and advanced RN practitioners in Florida conducted via a cross-sectional, exploratory descriptive research design. Key findings included a description of leadership competencies, barriers, and succession planning practices. Florida nurse leaders are aging and less diverse than the general population and report limited utilization of succession planning by their organizations. In Florida, attention must be directed to resources and strategies to develop skilled nurse leaders and plan succession.

  2. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  3. Ensuring Biologics Advanced Development and Manufacturing Capability for the United States Government: A Summary of Key Findings and Conclusions

    DTIC Science & Technology

    2009-10-06

    Government: A Summary of Key Findings and Conclusions. This report has passed the Department of Defense’s security review process and is approved for...manufacturing and combine advance development and production of biologics in a multi-product facility focused on satisfying USG needs. Finally, the study...MCM needs of both DoD and HHS, an extensive survey was conducted. This included a review of all published requirements, the biodefense R&D portfolio

  4. Key Findings from the U.S.-India Partnership for Climate Resilience Workshop on Development and Application of Downscaling Climate Projections

    NASA Astrophysics Data System (ADS)

    Kunkel, K.; Dissen, J.; Easterling, D. R.; Kulkarni, A.; Akhtar, F. H.; Hayhoe, K.; Stoner, A. M. K.; Swaminathan, R.; Thrasher, B. L.

    2017-12-01

    s part of the Department of State U.S.-India Partnership for Climate Resilience (PCR), scientists from NOAA NCEI, CICS-NC, Texas Tech University (TTU), Stanford University (SU), and the Indian Institute of Tropical Meteorology (IITM) held a workshop at IITM in Pune, India during 7-9 March 2017 on the development, techniques and applications of downscaled climate projections. Workshop participants from TTU, SU, and IITM presented state-of-the-art climate downscaling techniques using the ARRM method, NASA NEX climate products, CORDEX-South Asia and analysis tools for resilience planning and sustainable development. PCR collaborators in attendance included Indian practitioners, researchers and other NGO including the WRI Partnership for Resilience and Preparedness (PREP), The Energy and Resources Institute (TERI), and NIH. The scientific techniques were provided to workshop participants in a software package written in R by TTU scientists and several sessions were devoted to hands-on experience with the software package. The workshop further examined case studies on the use of downscaled climate data for decision making in a range of sectors, including human health, agriculture, and water resources management as well as to inform the development of the India State Action Plans. This talk will discuss key outcomes including information needs for downscaling climate projections, importance of QA/QC of the data, key findings from select case studies, and the importance of collaborations and partnerships to apply downscaling projections to help inform the development of the India State Action Plans.

  5. Magnetic resonance imaging findings in patients presenting with (sub)acute cerebellar ataxia.

    PubMed

    Schneider, Tanja; Thomalla, Götz; Goebell, Einar; Piotrowski, Anna; Yousem, David Mark

    2015-06-01

    Acute or subacute cerebellar inflammation is mainly caused by postinfectious, toxic, neoplastic, vascular, or idiopathic processes and can result in cerebellar ataxia. Previous magnetic resonance (MR) studies in single patients who developed acute or subacute ataxia showed varying imaging features. Eighteen patients presenting with acute and subacute onset of ataxia were included in this study. Cases of chronic-progressive/hereditary and noncerebellar causes (ischemia, multiple sclerosis lesions, metastasis, bleedings) were excluded. MR imaging findings were then matched with the clinical history of the patient. An underlying etiology for ataxic symptoms were found in 14/18 patients (postinfectious/infectious, paraneoplastic, autoimmune, drug-induced). In two of five patients without MR imaging findings and three of eight patients with minimal imaging features (cerebellar atrophy, slight signal alterations, and small areas of restricted diffusion), adverse clinical outcomes were documented. Of the five patients with prominent MR findings (cerebellar swelling, contrast enhancement, or broad signal abnormalities), two were lost to follow-up and two showed long-term sequelae. No correlation was found between the presence of initial MRI findings in subacute or acute ataxia patients and their long-term clinical outcome. MR imaging was more flagrantly positive in cases due to encephalitis.

  6. Sublingual epidermoid cyst presenting with distinctive magnetic resonance imaging findings.

    PubMed

    Yoshida, Naohiro; Kodama, Kozue; Iino, Yukiko

    2014-06-18

    A case of sublingual epidermoid cyst presenting distinctive magnetic resonance imaging (MRI) findings is described. A 39-year-old man presented to our hospital with a three months progressive left submandibular swelling, difficulty moving his tongue, and snoring. Preoperative evaluation with MRI and fine needle aspiration cytology (FNAC) revealed that the heterogeneous cystic lesion contained the squamous cells, which is compatible with ectodermal tissue. The mass was located above the mylohyoid muscle and spread to the pharyngeal space. By considering the size, infection history, patient age, and location, the cyst was completely resected under general anesthesia via cervical approach without any complication. Histopathologically, the cyst wall was lined by stratified squamous epithelium with no skin appendage, suggesting an epidermoid cyst. Ultrasound (US), MRI and FNAC were very useful of the preoperative diagnosis for oral and sublingual lesion. The postoperative course was uneventful and without recurrence after 24 months. This case showed that epidermoid cysts formed the rarely heterogeneous cystic tumor and it underlined usefulness of preoperative diagnosis, such as US, MRI and FNAC for oral and sublingual tumor.

  7. A natural language processing program effectively extracts key pathologic findings from radical prostatectomy reports.

    PubMed

    Kim, Brian J; Merchant, Madhur; Zheng, Chengyi; Thomas, Anil A; Contreras, Richard; Jacobsen, Steven J; Chien, Gary W

    2014-12-01

    Natural language processing (NLP) software programs have been widely developed to transform complex free text into simplified organized data. Potential applications in the field of medicine include automated report summaries, physician alerts, patient repositories, electronic medical record (EMR) billing, and quality metric reports. Despite these prospects and the recent widespread adoption of EMR, NLP has been relatively underutilized. The objective of this study was to evaluate the performance of an internally developed NLP program in extracting select pathologic findings from radical prostatectomy specimen reports in the EMR. An NLP program was generated by a software engineer to extract key variables from prostatectomy reports in the EMR within our healthcare system, which included the TNM stage, Gleason grade, presence of a tertiary Gleason pattern, histologic subtype, size of dominant tumor nodule, seminal vesicle invasion (SVI), perineural invasion (PNI), angiolymphatic invasion (ALI), extracapsular extension (ECE), and surgical margin status (SMS). The program was validated by comparing NLP results to a gold standard compiled by two blinded manual reviewers for 100 random pathology reports. NLP demonstrated 100% accuracy for identifying the Gleason grade, presence of a tertiary Gleason pattern, SVI, ALI, and ECE. It also demonstrated near-perfect accuracy for extracting histologic subtype (99.0%), PNI (98.9%), TNM stage (98.0%), SMS (97.0%), and dominant tumor size (95.7%). The overall accuracy of NLP was 98.7%. NLP generated a result in <1 second, whereas the manual reviewers averaged 3.2 minutes per report. This novel program demonstrated high accuracy and efficiency identifying key pathologic details from the prostatectomy report within an EMR system. NLP has the potential to assist urologists by summarizing and highlighting relevant information from verbose pathology reports. It may also facilitate future urologic research through the rapid and

  8. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 1999.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This booklet presents an overview of the findings pertaining to eighth, tenth, and twelfth grade students from the 1999 Monitoring the Future Study. This overview focuses on recent trends in the use of various licit and illicit drugs. It also examines trends in the levels of perceived risk and personal disapproval associated with each drug, which…

  9. Oregon Public School Drug Use Survey, 1996: Key Findings Report.

    ERIC Educational Resources Information Center

    Finigan, Michael

    Alcohol, tobacco, and other drug use among public school students continues to be a major concern in Oregon as it is across the nation. This report, the sixth of the biannual public school drug use surveys conducted in Oregon since 1986, discusses major findings. These findings are (1) marijuana use is up for both the eighth and eleventh grades;…

  10. Redefining late acute graft pancreatitis: clinical presentation, radiologic findings, principles of management, and prognosis.

    PubMed

    Small, Risa M; Shetzigovski, Ilanit; Blachar, Arye; Sosna, Jacob; Klausner, Joseph M; Nakache, Richard; Ben-Haim, Menahem

    2008-06-01

    To define the incidence, clinical presentation, radiologic findings and principles of diagnosis, and management of acute graft pancreatitis occurring more than 3 months after transplantation. Acute graft pancreatitis is a frequent late complication after simultaneous pancreas-kidney transplantation (SPKT) with enteric drainage that is not well understood. We performed a retrospective analysis of data from patients who underwent SPKT with enteric drainage at our institution. All recipients who experienced episodes that met the clinical criteria for late graft pancreatitis were included. We excluded events proven to be anastomotic or duodenal stump leaks. Clinical presentation, laboratory findings, radiologic imaging, course of management, and graft and patient outcome were evaluated and analyzed. Of 79 SPKTs (1995-2007), 11 (14%) recipients experienced 31 episodes of late graft pancreatitis (average number per patient, 3; range, 1-13), occurring an average of 28 months after transplantation (range, 3 months to 8 years). All patients presented with right lower quadrant abdominal peritonitis, fever, and findings compatible with pancreas graft inflammation on computed tomography or ultrasound imaging. Mild hyperamylasemia (>110 IU/L) was found in 82% of cases. Treatment was conservative, including bowel rest, antibiotics, and percutaneous sampling and drainage of abscesses as necessary. Excellent graft and patient survival were achieved. The diagnosis of late acute graft pancreatitis is clinical, with confirmatory computed tomography or ultrasound imaging. Conservative treatment yields excellent graft and patient survival.

  11. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  12. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  13. Recent Trends in General Education Design, Learning Outcomes, and Teaching Approaches. Key Findings from a Survey among Administrators at AAC&U Member Institutions

    ERIC Educational Resources Information Center

    Association of American Colleges and Universities, 2016

    2016-01-01

    This report summarizes key findings from a national survey among chief academic officers at Association of American Colleges and Universities (AAC&U) member institutions and explores how institutions are defining common learning outcomes, trends related to general education design and the use of emerging, evidence-based teach­ing and learning…

  14. Stomata: key players in the earth system, past and present.

    PubMed

    Berry, Joseph A; Beerling, David J; Franks, Peter J

    2010-06-01

    Stomata have played a key role in the Earth System for at least 400 million years. By enabling plants to control the rate of evaporation from their photosynthetic organs, stomata helped to set in motion non-linear processes that led to an acceleration of the hydrologic cycle over the continents and an expansion of climate zones favorable for plant life. Global scale modeling of land-atmosphere interactions provides a way to explore parallels between the influence of vegetation on climate over time, and the influence of spatial and temporal variation in the activities of vegetation in the current Earth System on climate and weather. We use the logic in models that simulate land-atmosphere interactions to illustrate the central role played by stomatal conductance in the Earth System. In the modeling context, most of the activities of plants and their manifold interactions with their genomes and with the environment are communicated to the atmosphere through a single property: the aperture or conductance of their stomata. We tend to think of the controls on vegetation responses in the real world as being distributed among factors such as seasonal patterns of growth, the changing availability of soil water, or changes in light intensity and leaf water potential over a day. However, the impact of these controls on crucial exchanges of energy and water vapor with the atmosphere are also largely mediated by stomata. The decisions 'made by' stomata emerge as an important and inadequately understood component of these models. At the present time we lack effective ways to link advances in the biology of stomata to this decision making process. While not unusual, this failure to connect between disciplines, introduces uncertainty in modeling studies being used to predict weather and climate change and ultimately to inform policy decisions. This problem is also an opportunity.

  15. Human health effects of dichloromethane: key findings and scientific issues.

    PubMed

    Schlosser, Paul M; Bale, Ambuja S; Gibbons, Catherine F; Wilkins, Amina; Cooper, Glinda S

    2015-02-01

    The U.S. EPA's Integrated Risk Information System (IRIS) completed an updated toxicological review of dichloromethane in November 2011. In this commentary we summarize key results and issues of this review, including exposure sources, identification of potential health effects, and updated physiologically based pharmacokinetic (PBPK) modeling. We performed a comprehensive review of primary research studies and evaluation of PBPK models. Hepatotoxicity was observed in oral and inhalation exposure studies in several studies in animals; neurological effects were also identified as a potential area of concern. Dichloromethane was classified as likely to be carcinogenic in humans based primarily on evidence of carcinogenicity at two sites (liver and lung) in male and female B6C3F1 mice (inhalation exposure) and at one site (liver) in male B6C3F1 mice (drinking-water exposure). Recent epidemiologic studies of dichloromethane (seven studies of hematopoietic cancers published since 2000) provide additional data raising concerns about associations with non-Hodgkin lymphoma and multiple myeloma. Although there are gaps in the database for dichloromethane genotoxicity (i.e., DNA adduct formation and gene mutations in target tissues in vivo), the positive DNA damage assays correlated with tissue and/or species availability of functional glutathione S-transferase (GST) metabolic activity, the key activation pathway for dichloromethane-induced cancer. Innovations in the IRIS assessment include estimation of cancer risk specifically for a presumed sensitive genotype (GST-theta-1+/+), and PBPK modeling accounting for human physiological distributions based on the expected distribution for all individuals 6 months to 80 years of age. The 2011 IRIS assessment of dichloromethane provides insights into the toxicity of a commonly used solvent.

  16. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this presentation is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  17. Radiological findings of gastric adenomyoma in a neonate presenting with gastric outlet obstruction.

    PubMed

    Rhim, Jung Hyo; Kim, Woo Sun; Choi, Young Hun; Cheon, Jung-Eun; Park, Sung Hye

    2013-03-01

    Gastric adenomyoma is a rare tumour-like lesion composed of glandular components and smooth muscle bundles. We report a case of gastric adenomyoma in a 1-week-old neonate who presented with gastric outlet obstruction. To the best of our knowledge, this is the youngest child reported with gastric adenomyoma and a unique case demonstrating radiological findings of gastric adenomyoma in a young infant. At US, the lesion was seen as an asymmetrical mass-like wall-thickening of the pylorus. Upper gastrointestinal series showed findings similar to those seen in a case of hypertrophic pyloric stenosis. We suggest that gastric adenomyoma should be included in the causes of gastric outlet obstruction in neonates even though it is rare in young children.

  18. Do Disadvantaged Students Get Less Effective Teaching? Key Findings from Recent Institute of Education Sciences Studies. NCEE Evaluation Brief. Technical Appendix. NCEE 2014-4010

    ERIC Educational Resources Information Center

    Max, Jeffrey; Glazerman, Steven

    2014-01-01

    This document represents the technical appendix intended to accompany "Do Disadvantaged Students Get Less Effective Teaching? Key Findings from Recent Institute of Education Sciences Studies. NCEE Evaluation Brief. NCEE 2014-4010." Contents include: (1) Summary of Related, Non-Peer-Reviewed Studies; (2) Methods for Comparing Findings…

  19. Estimating the size of key populations at higher risk of HIV infection: a summary of experiences and lessons presented during a technical meeting on size estimation among key populations in Asian countries

    PubMed Central

    Calleja, Jesus Maria Garcia; Zhao, Jinkou; Reddy, Amala; Seguy, Nicole

    2014-01-01

    Problem Size estimates of key populations at higher risk of HIV exposure are recognized as critical for understanding the trajectory of the HIV epidemic and planning and monitoring an effective response, especially for countries with concentrated and low epidemics such as those in Asia. Context To help countries estimate population sizes of key populations, global guidelines were updated in 2011 to reflect new technical developments and recent field experiences in applying these methods. Action In September 2013, a meeting of programme managers and experts experienced with population size estimates (PSE) for key populations was held for 13 Asian countries. This article summarizes the key results presented, shares practical lessons learnt and reviews the methodological approaches from implementing PSE in 13 countries. Lessons learnt It is important to build capacity to collect, analyse and use PSE data; establish a technical review group; and implement a transparent, well documented process. Countries should adapt global PSE guidelines and maintain operational definitions that are more relevant and useable for country programmes. Development of methods for non-venue-based key populations requires more investment and collaborative efforts between countries and among partners. PMID:25320676

  20. Mars’ First Billion Years: Key Findings, Key Unsolved Paradoxes, and Future Exploration

    NASA Astrophysics Data System (ADS)

    Ehlmann, Bethany

    2017-10-01

    In the evolution of terrestrial planets, the first billion years are the period most shrouded in mystery: How vigorous is early atmospheric loss? How do planetary climates respond to a brightening sun? When and how are plate tectonic recycling processes initiated? How do voluminous volcanism and heavy impact bombardment influence the composition of the atmosphere? Under what conditions might life arise? Looking outward to terrestrial planets around other stars, the record from Venus, Earth and Mars in this solar system is crucial for developing models of physical can chemical processes. Of these three worlds, Mars provides the longest record of planetary evolution from the first billion years, comprising >50% of exposed geologic units, which are only lightly overprinted by later processes.Orbital observations of the last decade have revealed abundant evidence for surface waters in the form of lakes, valley networks, and evidence of chemically open-system near-surface weathering. Groundwaters at temperatures ranging from just above freezing to hydrothermal have also left a rich record of process in the mineralogical record. A rsuite of environments - similar in diversity to Earth’s - has been discovered on Mars with water pH, temperature, redox, and chemistries varying in space and time.Here, I will focus on the consequences of the aqueous alteration of the Martian crust on the composition of the atmosphere based on recent work studying aspects of the volatile budget (Usui et al., 2015; Edwards & Ehlmann, 2015; Hu et al., 2015; Jakosky et al., 2017, Wordsworth et al., 2017, and Ehlmann, in prep.). The solid crust and mantle of Mars act as volatile reservoirs and volatile sources through volcanism, mineral precipitation, and release of gases. We examine the extent to which the budget is understood or ill-understood for hydrogen and carbon, and associated phases H2O, CO2, and CH4. Additionally, I identify some key stratigraphies where a combination of focused in

  1. SUMMARY OF EMISSIONS MANAGEMENT STRATEGY POLICY RELEVANT FINDINGS FROM EPA'S PM SUPERSITES PROGRAM

    EPA Science Inventory

    EPA is developing an integrated synthesis of key scientific and policy-relevant findings from EPA's Particulate Matter Supersites Program. This presentation provides a summary of the program and the integrated synthesis. Since there are many examples of such findings, ranging f...

  2. A case of severe sepsis presenting marked decrease of neutrophils and interesting findings on dynamic CT.

    PubMed

    Makino, Isamu; Tajima, Hidehiro; Kitagawa, Hirohisa; Nakagawara, Hisatoshi; Miyashita, Tomoharu; Nakanuma, Shinichi; Hayashi, Hironori; Takamura, Hiroyuki; Fushida, Sachio; Ohta, Tetsuo

    2015-05-28

    In a patient with severe sepsis, we sometimes observe immediate decrease of the counts of white blood cells (WBCs) and neutrophils, which is known as an indicator for poor prognosis. We observed marked decrease of white blood cells and neutrophils on blood examination and interesting findings on dynamic CT. Here, we present the case of a patient with severe postoperative sepsis occurring after major abdominal surgery and we discuss the mechanism of such clinical presentations. A 60-year-old man received pancreatoduodenectomy with colectomy for pancreatic cancer. He developed a high fever on postoperative day 3. We observed marked decrease of WBCs and neutrophils on blood examination. We also observed slight swelling of the liver, inhomogeneous enhancement of liver parenchyma in arterial phase, and periportal low density in the Glisson capsule in portal phase, without any findings indicating infectious complications on dynamic CT. WBCs and neutrophils increased above normal range in just 6 hours. Blood culture examination performed while the patient had a high fever was positive for Aeromonas hydrophila. After receiving intensive care, he promptly recovered from severe sepsis. The CT findings disappeared on second dynamic CT examination performed 3 days after the first examination. We treated a patient with severe sepsis after major abdominal surgery who presented very rapid change of the counts of WBCs and neutrophils and interesting CT findings in the liver. We rescued him from a critical situation by prompt and intensive treatment. Research is needed to accumulate and analyze data from more patients who present a similar clinical course to better understand their pathophysiological conditions.

  3. Extracolonic findings (ECF) on CT colonography (CTC) in patients presenting with colorectal symptoms.

    PubMed

    Badiani, Sarit; Tomas-Hernandez, Silvia; Karandikar, Sharad; Roy-Choudhury, Shuvro

    2013-10-01

    Computed tomographic colonography (CTC) is now an established method for imaging the colon and rectum in the screening and symptomatic setting. Additional benefit of CTC is the ability to assess for extracolonic findings especially in patients presenting with colorectal symptoms. To determine prevalence of extracolonic findings (ECF) in symptomatic patients undergoing CTC and determine accuracy of CTC for exclusion of significant abdominal disease and extracolonic malignancy (ECM). A total of 1359 unenhanced prone and postcontrast supine CTC studies were performed between March 2002 and December 2007. ECF were retrospectively classified according to C-RADS criteria into E1 to E4 findings. For ECM, a gold standard of clinical and/or radiological follow-up supplemented with data from the regional cancer registry with a median follow-up of 42 months was created. Sensitivity and negative predictive values for ECM was calculated. Following exclusions, 1177 CTCs were analyzed. Of 1423 extracolonic findings reported, 328/1423 (23%) E3 and 100/1423 (7%) E4 (including six eventual FP studies) findings were identified. Thirty-two ECMs were confirmed following further investigations. Seven further small ECMs were detected during the entire follow-up, of which two were potentially visible in retrospect (false-negative studies). Additional tests were generated from 55/1177 (4.7%) studies. Sensitivity and negative predictive value for ECM was 94.1% (95% CI 78.9-98.9%) and 99.8% (95% CI 99.3-99.9%), respectively. One in 37 patients were found to have an ECM. Two potentially detectable cancers were missed. Only a small proportion of patients underwent additional work-up.

  4. Title I ESEA Projects: Digest of Annual Evaluations. Supplementary Edition 1977-1978. A historical summary, by the Department of Federal Evaluation Resources, of the key findings reported in the annual evaluations of each project. Report #7827.

    ERIC Educational Resources Information Center

    Philadelphia School District, PA. Office of Research and Evaluation.

    This supplement provides a historical summary, for the Philadelphia, Pennsylvania schools, of the key findings in the Annual Evaluations of each Elementary Secondary Education Act Title I project since 1975. The 1977-1978 management information, the key findings for 1975-1976 and 1976-1977, as well as the preliminary findings for 1977-1978 are…

  5. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  6. Preoperative thoracic radiographic findings in dogs presenting for gastric dilatation-volvulus (2000-2010): 101 cases.

    PubMed

    Green, Jaime L; Cimino Brown, Dorothy; Agnello, Kimberly A

    2012-10-01

    To identify the incidence of clinically significant findings on preoperative thoracic radiographs in dogs with gastric dilatation-volvulus (GDV) and to determine if those findings are associated with survival. Retrospective study from 2000 to 2010. Urban university small animal teaching hospital. One hundred and one dogs diagnosed with GDV that had thoracic radiographs obtained preoperatively, and medical records available with the following information available: signalment, time of presentation, respiratory status, plasma lactate, presence of cardiac arrhythmias, reason for thoracic radiographs, radiographic findings, and outcome. None. Findings on preoperative thoracic radiographs included small vena cava (40%), esophageal dilation (39%), microcardia (34%), aspiration pneumonia (14%), cardiomegaly (5%), pulmonary nodule (4%), pulmonary edema (2%), sternal lymphadenopathy (1%), and pulmonary bullae (1%). Eighty-four percent of dogs (85 out of 101) survived to discharge. Dogs without cardiomegaly on presenting thoracic radiographs had a 10.2 greater odds of surviving to discharge. The most common findings on preoperative thoracic radiographs include esophageal dilation, microcardia, and a small vena cava while the incidence of pulmonary nodules was low. A negative association between survival and presence of cardiomegaly on preoperative thoracic radiographs in dogs with GDV supports the need to obtain these images for prognostic information in spite of the emergency surgical nature of the GDV. The main limitations of this study include the possibilities of type I and type II errors, the retrospective nature of the study, and the lack of well-defined criteria for obtaining thoracic radiographs. © Veterinary Emergency and Critical Care Society 2012.

  7. Mammographic and sonographic findings of steatocystoma multiplex presenting as breast lumps.

    PubMed

    Wan, John Mun Chin; Wong, Jill Su Lin; Tee, Shang-Ian

    2012-12-01

    Steatocystoma multiplex (SM) is an uncommon cutaneous disorder characterised by multiple intradermal cysts distributed over the trunk and proximal extremities. This condition affects both genders and is often inherited as an autosomal dominant trait, although sporadic cases have been described. This report describes the mammographic and sonographic features of the cysts, which presented as breast lumps, for evaluation. The cysts appeared as numerous well-circumscribed, radiolucent nodules with thin radiodense rims on mammography. On sonography, the cysts could be hypoechoic, isoechoic or demonstrate mixed echoes containing debris-fluid levels, depending on the amount of clear oily liquid and keratinous material. SM can be diagnosed based on a clinical setting of multiple asymptomatic small intradermal nodules over the trunk and proximal extremities, positive family history and imaging findings.

  8. The influence of sociocultural factors on organ donation and transplantation in Korea: findings from key informant interviews.

    PubMed

    Kim, Jung Ran; Elliott, Doug; Hyde, Cheryl

    2004-04-01

    Although brain death was formally recognized in Korea in 2000 for the purpose of organ donation, traditional Confucian-based thought still prevails. The aim of this study was to explore sociocultural perspectives that influence health professionals' attitudes and perceptions regarding organ donation. Semistructured interviews were conducted with nine key informants from three major hospitals providing transplant services in South Korea. Several themes were identified as barriers to organ donation: Confucianism, misunderstandings and myths, organs as spare for selling, lack of clarity in the definition of death in the new legislation, and limited medical insurance coverage. It remains difficult for brain death to be accepted as true death, and there is currently a poor rate of organ procurement. Findings of the study will help identify socioculturally appropriate strategies to promote acceptance and accessibility of organ transplantation among South Koreans.

  9. Diagnosis of Pediatric Foreign Body Ingestion: Clinical Presentation, Physical Examination, and Radiologic Findings.

    PubMed

    Sink, Jacquelyn R; Kitsko, Dennis J; Mehta, Deepak K; Georg, Matthew W; Simons, Jeffrey P

    2016-04-01

    (1) To describe clinical and radiologic findings in patients with esophageal foreign bodies. (2) To examine the sensitivity and specificity of history, physical examination, and radiologic studies in children with suspected foreign body ingestion. A retrospective cohort study was performed evaluating all children who underwent esophagoscopy for suspected foreign body ingestion at our institution from 2006 to 2013. Five hundred forty-three patients were included (54% male). Average age was 4.7 years (SD = 4.1 years). Foreign bodies were identified on esophagoscopy in 497 cases (92%). Ingestion was witnessed in 23% of cases. Most common presenting symptoms were choking/gagging (49%), vomiting (47%), and dysphagia/odynophagia (42%). Most patients with foreign bodies had a normal exam (76%). Most foreign bodies were radiopaque (83%). In 59% of patients with normal chest radiographs, a foreign body was present. Sensitivity and specificity of 1 or more findings on history, physical examination, and imaging were 99% and 0%, 21% and 76%, and 83% and 100%, respectively. Most patients with esophageal foreign bodies are symptomatic. Although many patients will have a normal physical examination, an abnormal exam should increase suspicion for a foreign body. Most esophageal foreign bodies are radiopaque, but a normal chest radiograph cannot rule out a foreign body. © The Author(s) 2015.

  10. Advances in Clinical Cardiology 2016: A Summary of the Key Clinical Trials.

    PubMed

    Gray, Alastair; McQuillan, Conor; Menown, Ian B A

    2017-07-01

    The findings of many new cardiology clinical trials over the last year have been published or presented at major international meetings. This paper aims to describe and place in context a summary of the key clinical trials in cardiology presented between January and December 2016. The authors reviewed clinical trials presented at major cardiology conferences during 2016 including the American College of Cardiology (ACC), European Association for Percutaneous Cardiovascular Interventions (EuroPCR), European Society of Cardiology (ESC), European Association for the Study of Diabetes (EASD), Transcatheter Cardiovascular Therapeutics (TCT), and the American Heart Association (AHA). Selection criteria were trials with a broad relevance to the cardiology community and those with potential to change current practice. A total of 57 key cardiology clinical trials were identified for inclusion. Here we describe and place in clinical context the key findings of new data relating to interventional and structural cardiology including delayed stenting following primary angioplasty, contrast-induced nephropathy, management of jailed wires, optimal duration of dual antiplatelet therapy (DAPT), stenting vs bypass for left main disease, new generation stents (BioFreedom, Orsiro, Absorb), transcatheter aortic valve implantation (Edwards Sapien XT, transcatheter embolic protection), and closure devices (Watchman, Amplatzer). New preventative cardiology data include trials of bariatric surgery, empagliflozin, liraglutide, semaglutide, PCSK9 inhibitors (evolocumab and alirocumab), and inclisiran. Antiplatelet therapy trials include platelet function monitoring and ticagrelor vs clopidogrel for peripheral vascular disease. New data are also presented in fields of heart failure (sacubitril/valsartan, aliskiren, spironolactone), atrial fibrillation (rivaroxaban in patients undergoing coronary intervention, edoxaban in DC cardioversion), cardiac devices (implantable cardioverter

  11. Using findings in multimedia learning to inform technology-based behavioral health interventions.

    PubMed

    Aronson, Ian David; Marsch, Lisa A; Acosta, Michelle C

    2013-09-01

    Clinicians and researchers are increasingly using technology-based behavioral health interventions to improve intervention effectiveness and to reach underserved populations. However, these interventions are rarely informed by evidence-based findings of how technology can be optimized to promote acquisition of key skills and information. At the same time, experts in multimedia learning generally do not apply their findings to health education or conduct research in clinical contexts. This paper presents an overview of some key aspects of multimedia learning research that may allow those developing health interventions to apply informational technology with the same rigor as behavioral science content. We synthesized empirical multimedia learning literature from 1992 to 2011. We identified key findings and suggested a framework for integrating technology with educational and behavioral science theory. A scientific, evidence-driven approach to developing technology-based interventions can yield greater effectiveness, improved fidelity, increased outcomes, and better client service.

  12. Improving pathways to primary health care among LGBTQ populations and health care providers: key findings from Nova Scotia, Canada.

    PubMed

    Gahagan, Jacqueline; Subirana-Malaret, Montse

    2018-06-13

    This study explores the perceived barriers to primary health care as identified among a sample of Lesbian, Gay, Bisexual, Transgender, and Queer (LGBTQ) identified individuals and health care providers in Nova Scotia, Canada. These findings, based on a province-wide anonymous online survey, suggest that additional efforts are needed to improve pathways to primary health among LGBTQ populations and in deepening our understanding of how to advance the unique primary health needs of these populations. Data were collected from the LGBTQ community through an online, closed-ended anonymous survey. Inclusion criteria for participation were self-identifying as LGBTQ, offering primary health care to LGBTQ patients, being able to understand English, being 16 years of age or older, and having lived in Nova Scotia for at least one year. A total of 283 LGBTQ respondents completed the online survey which included sociodemographic questions, perceptions of respondents' health status, and their primary health care experiences. In addition, a total of 109 health care providers completed the survey based on their experiences providing care in Nova Scotia, and in particular, their experiences and perceptions regarding LGBTQ access to primary health care and physician-patient interactions. Our results indicate that, in several key areas, the primary health care needs of LGBTQ populations in Nova Scotia are not being met and this may in turn contribute to their poor health outcomes across the life course. A framework of intersectionality and health equity was used to interpret and analyze the survey data. The key findings indicate the need to continue improving pathways to primary health care among LGBTQ populations, specifically in relation to additional training and related supports for health care providers who work with these populations.

  13. Osler-Weber-Rendu disease presenting with hepatocellular carcinoma: radiologic and genetic findings.

    PubMed

    Lee, Joo Ho; Lee, Yung Sang; Kim, Pyo Nyun; Lee, Beom Hee; Kim, Gu Whan; Yoo, Han Wook; Heo, Nae Yun; Lim, Young Suk; Lee, Han Chu; Chung, Young Hwa; Suh, Dong Jin

    2011-12-01

    This is a case report of a 68-year-old man with hepatocellular carcinoma (HCC) accompanied by hereditary hemorrhagic telangiectasia (HHT), also known as Osler-Weber-Rendu disease, and hepatic vascular malformation. HHT is an autosomal dominant disorder of the fibrovascular tissue that is characterized by recurrent epistaxis, mucocutaneous telangiectasias, and visceral arteriovenous malformations. HHT is caused by mutation of the genes involved in the signaling pathway of transforming growth factor-β, which plays an important role in the formation of vascular endothelia. Hepatic involvement has been reported as occurring in 30-73% of patients with HHT. However, symptomatic liver involvement is quite rare, and the representative clinical presentations of HHT in hepatic involvement are high-output heart failure, portal hypertension, nodular regenerative hyperplasia, and symptoms of biliary ischemia. Some cases of HCC in association with HHT have been reported, but are very rare. We present herein the characteristic radiologic and genetic findings of HHT that was diagnosed during the evaluation and treatment of HCC.

  14. Key Findings and Recommendations from the Coös Youth Study: Research from the First Half of the Study. Regional Issue Brief Number 41

    ERIC Educational Resources Information Center

    Staunton, Michael S.; Jaffee, Eleanor M.

    2014-01-01

    In this brief, authors Michael Staunton and Eleanor Jaffee review the key findings and recommendations from research conducted in the first half of the Coös Youth Study, which began in 2008 and is planned to continue through 2018. The study explores young people's decisions about their educational and job opportunities in rural northern New…

  15. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  16. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  17. Preparing and Presenting Effective Research Posters

    PubMed Central

    Miller, Jane E

    2007-01-01

    Objectives Posters are a common way to present results of a statistical analysis, program evaluation, or other project at professional conferences. Often, researchers fail to recognize the unique nature of the format, which is a hybrid of a published paper and an oral presentation. This methods note demonstrates how to design research posters to convey study objectives, methods, findings, and implications effectively to varied professional audiences. Methods A review of existing literature on research communication and poster design is used to identify and demonstrate important considerations for poster content and layout. Guidelines on how to write about statistical methods, results, and statistical significance are illustrated with samples of ineffective writing annotated to point out weaknesses, accompanied by concrete examples and explanations of improved presentation. A comparison of the content and format of papers, speeches, and posters is also provided. Findings Each component of a research poster about a quantitative analysis should be adapted to the audience and format, with complex statistical results translated into simplified charts, tables, and bulleted text to convey findings as part of a clear, focused story line. Conclusions Effective research posters should be designed around two or three key findings with accompanying handouts and narrative description to supply additional technical detail and encourage dialog with poster viewers. PMID:17355594

  18. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  19. Endoscopic findings and treatment outcome in cases presenting with dysphagia.

    PubMed

    Hafeez, Muhammad; Salamat, Amjad; Saeed, Farrukh; Zafar, Hafiz; Hassan, Fayyaz; Farooq, Asif

    2011-01-01

    Dysphagia results from impeded transport of liquids, solids, or both from the pharynx to the stomach. Among the malignant lesions, carcinoma of oesophagus is the commonest cause. Our objective was to find out the frequency of different endoscopic lesions and outcome of the endoscopic therapeutic interventions in patients presenting with dysphagia. This descriptive study was conducted at Department of Gastroenterology, Military Hospital Rawalpindi from June 2008 to May 2009. Patients of dysphagia after their consent were interviewed about the symptoms. Relevant biochemical investigations were done. Barium swallow and upper Gastrointestinal (GI) Endoscopy were carried out. Benign strictures were dilated with Savary Gilliard Dilators. Malignant strictures were further evaluated to decide treatment plan. In patients considered to have oesophageal dysmotility, pressure manometery was done before specific therapy. Seventy nine patients were enrolled. Twenty-five had malignant strictures, out of those commonest was adenocarcinoma 14 (56%). Twenty-nine had benign strictures the commonest being Gastro-oesophageal Reflux Disease (GERD) related peptic stricture 9 (31%). Fifteen had oesophageal dysmotility, and achalasia was present in 10 out of them. After evaluation 12 out of 25 patients with malignant strictures were considered fit for surgery. Self-expanding metal stents (SEMS) were passed in 5. All benign strictures were dilated with Savary-Gillard dilators. Pneumatic balloon dilation was done in patients of achalasia. The commonest malignant lesion resulting in dysphagia was adenocarcinoma while in benign it was GERD related peptic stricture. Achalasia was most frequent in oesophageal motility disorders. Standard of treatment for early oesophageal malignancy is surgical resection. SEMS is a reliable way to allay dysphagia in inoperable cases. Savary Gillard dilatation in benign, and pneumatic balloon achalasia dilatations are effective ways of treatment.

  20. Acute Promyelocytic Leukemia Presenting as Focal Neurologic Findings and Deteriorating Mental Status.

    PubMed

    Dolan, Matthew; Ngaruiya, Christine

    2017-01-01

    Acute promyelocytic leukemia (APL) is a rare but particularly malignant form of acute leukemia that is characterized by a rapid progression to fatal hemorrhage. Survival rates of patients with APL have increased with the introduction of all-trans retinoic acid (ATRA), but early deaths caused by hemorrhage still persist. A man with undiagnosed APL presenting with focal neurologic findings and deteriorating altered mental status caused by an intracranial hemorrhage is discussed. WHY SHOULD AN EMERGENCY PHYSICIAN BE AWARE OF THIS?: It is important to consider APL when diagnosing etiologies for intracranial hemorrhage. In addition to standard care, early administration of ATRA is recommended upon clinical suspicion of the disease. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Key Technologies of Phone Storage Forensics Based on ARM Architecture

    NASA Astrophysics Data System (ADS)

    Zhang, Jianghan; Che, Shengbing

    2018-03-01

    Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.

  2. Supporting Police Community Support Officers to Become Effective School Link Officers: Key Stakeholder Perceptions of a Pilot Professional Development Programme

    ERIC Educational Resources Information Center

    Thomas, Lorraine; Trotman, Dave

    2017-01-01

    This article presents the findings of a pilot professional development programme designed to support police community support officers (PCSOs) to become effective school link officers (SLOs) within urban secondary schools in the English West Midlands. Findings are presented via perceptions of key stakeholders: SLOs themselves; school-based mentors…

  3. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  4. Partial achilles tendon rupture presenting with giant hematoma; MRI findings of 4 year follow up.

    PubMed

    Sarsilmaz, Aysegul; Varer, Makbule; Coskun, Gulten; Apaydın, Melda; Oyar, Orhan

    2011-12-01

    In the young population, spontaneous rupture of Achilles tendon is very rare. The big hematoma is also rare finding of the Achilles tendon partial rupture. It is usually seen with complete rupture. We presented imaging findings of 4 years follow up of the spontaneous partial rupture of Achilles tendon presenting with giant expanding hematoma and mimicking complete rupture radiologically. We discussed the alterations of tendon signal intensity and result of conservative therapy after partial rupture with big hematoma in the long term. A 29 year-old man, applied with pain and swelling in the retrocalcaneal region of left ankle. He did not have chronic metabolic disease. He was not active in physical activities. X-ray radiograms were normal. At magnetic resonance images (MRI), there was an intratendinous big hematoma, subcutanous fat planes were edematous around tendon. The diagnosis was partial rupture and giant hematoma. Hematoma was drained. The conservative treatment was applied and his complaints disappeared. After treatment, approximately 4 years later, control MRI showed thickened and hypointense tendon in all images. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  5. Key Nutrients.

    ERIC Educational Resources Information Center

    Federal Extension Service (USDA), Washington, DC.

    Lessons written to help trainer agents prepare aides for work with families in the Food and Nutrition Program are presented in this booklet. The key nutrients discussed in the 10 lessons are protein, carbohydrates, fat, calcium, iron, iodine, and Vitamins A, B, C, and D. the format of each lesson is as follows: Purpose, Presentation, Application…

  6. Temporal dynamics and the identification of musical key.

    PubMed

    Farbood, Morwaread Mary; Marcus, Gary; Poeppel, David

    2013-08-01

    A central process in music cognition involves the identification of key; however, little is known about how listeners accomplish this task in real time. This study derives from work that suggests overlap between the neural and cognitive resources underlying the analyses of both music and speech and is the first, to our knowledge, to explore the timescales at which the brain infers musical key. We investigated the temporal psychophysics of key-finding over a wide range of tempi using melodic sequences with strong structural cues, where statistical information about overall key profile was ambiguous. Listeners were able to provide robust judgments within specific limits, at rates as high as 400 beats per minute (bpm; ∼7 Hz) and as low as 30 bpm (0.5 Hz), but not outside those bounds. These boundaries on reliable performance show that the process of key-finding is restricted to timescales that are closely aligned with beat induction and speech processing. 2013 APA, all rights reserved

  7. Secret Key Crypto Implementations

    NASA Astrophysics Data System (ADS)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  8. A comparison between transabdominal ultrasonographic and cystourethroscopy findings in adult Sudanese patients presenting with haematuria.

    PubMed

    Ahmed, Feras O; Hamdan, Hamdan Z; Abdelgalil, Hani B; Sharfi, Abdulrauf A

    2015-02-01

    Gross and microscopic haematuria both are a common cause of referral to urology clinics. It has a wide spectrum of differential. In many occasions, it is a presentation of underlining serious urological problems. Evaluation of gross and significant microscopic haematuria is of paramount importance. This study was conducted to assess and compare the findings and diagnostic competency of transabdominal ultrasonography (US) versus cystourethroscopy in patients with haematuria of lower urinary tract origin. Prospective hospital-based study done at Ibn Sina Specialized and Omdurman Military Hospitals from June 2012 to March 2013. The study included 109 patients. Structured questionnaires were used to gather data from patients. All patients were evaluated by transabdominal US before cystourethroscopy examination. One hundred and nine patients were studied. Patients' mean (SD) age was 57.9 (18.8) years. Fifty-four patients (49.5 %) presented with macroscopic haematuria, while 55 patients presented with microscopic haematuria. The sensitivity and specificity of the US in detecting prostate enlargement, vesical stones, bladder wall tumour, cystitis and schistosomiasis were [(84, 80 %); (82.6, 97.7 %); (64.7, 92.1 %); (15.3, 96.8 %); and (15.3, 98.9 %)], respectively, as compared to cystoscopic finding as the gold standard. Ultrasonography is accepted only as a first-line imaging tool for evaluation of haematuria in poor settings, but cannot replace or became as good as cystoscopy, which remains the gold standard.

  9. Efficient hit-finding approaches for histone methyltransferases: the key parameters.

    PubMed

    Ahrens, Thomas; Bergner, Andreas; Sheppard, David; Hafenbradl, Doris

    2012-01-01

    For many novel epigenetics targets the chemical ligand space and structural information were limited until recently and are still largely unknown for some targets. Hit-finding campaigns are therefore dependent on large and chemically diverse libraries. In the specific case of the histone methyltransferase G9a, the authors have been able to apply an efficient process of intelligent selection of compounds for primary screening, rather than screening the full diverse deck of 900 000 compounds to identify hit compounds. A number of different virtual screening methods have been applied for the compound selection, and the results have been analyzed in the context of their individual success rates. For the primary screening of 2112 compounds, a FlashPlate assay format and full-length histone H3.1 substrate were employed. Validation of hit compounds was performed using the orthogonal fluorescence lifetime technology. Rated by purity and IC(50) value, 18 compounds (0.9% of compound screening deck) were finally considered validated primary G9a hits. The hit-finding approach has led to novel chemotypes being identified, which can facilitate hit-to-lead projects. This study demonstrates the power of virtual screening technologies for novel, therapeutically relevant epigenetics protein targets.

  10. Clinical Profile and Electroencephalogram Findings in Children with Seizure Presenting to Dhulikhel Hospital.

    PubMed

    Poudyal, P; Shrestha, R Pb; Shrestha, P S; Dangol, S; Shrestha, N C; Joshi, A; Shrestha, A

    Background Seizure disorder is the most common childhood neurologic condition and a major public health concern. Identification of the underlying seizure etiology helps to identify appropriate treatment options and the prognosis for the child. Objective This study was conducted to investigate the clinical profile, causes and electroencephalogram findings in children with seizure presenting to a tertiary center in Kavre district. Method This was a hospital based prospective study carried out in the Department of Pediatrics, Dhulikhel Hospital, Kavre from 1st April 2015 to 31st March 2016. Variables collected were demographics, clinical presentations, laboratory tests, brain imaging studies, electroencephalography, diagnosis and outcome. Result Study included 120 (age 1 month to 16 years) children attending Dhulikhel Hospital. Majority of the patients were male (60.84%). Age at first seizure was less than 5 years in 75.83% of children. Seizure was generalized in 62.50%, focal in 31.67% and unclassified in 5.83%. Common causes of seizure were - Primary generalized epilepsy (26.66%), neurocysticercosis (10%) and hypoxic injury (6.6%) which was diagnosed in the perinatal period. Febrile seizure (26.66%) was the most common cause of seizure in children between 6 months to 5 years of age. Neurological examination, electroencephalography and Computed Tomography were abnormal in 71.66%, 68.92% and 58.14% cases respectively. Seizure was controlled by monotherapy in 69.16% cases and was resistant in 7.50% of the cases. Conclusion Primary generalized epilepsy and febrile seizure were the most common causes of seizures in children attending Dhulikhel Hospital. Electroencephalogram findings help to know the pattern of neuronal activity. Response to monotherapy was good and valproic acid was the most commonly used drug.

  11. Non-resonant electromagnetic energy harvester for car-key applications

    NASA Astrophysics Data System (ADS)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  12. Poster presentations: valuing all forms of evidence.

    PubMed

    Halligan, Phil

    2008-01-01

    This paper aims to assist readers who are considering submitting a poster presentation to a conference to appreciate their true worth and demonstrate the important contribution they can make to nursing scholarship and secondly, to provide new insights to conference reviewers who have the task of selecting appropriate contributions for conferences. The author will argue that the use of poster presentations is an ideal opportunity to disseminate research findings and clinical innovations. It offers a new, interesting, and thought-provoking perspective on poster presentations, which includes appraisal of extant literature and reflections about the significance of poster presentations to nursing scholarship. It highlights the benefits of submitting a poster presentation and concludes with some key points for conference reviewers to consider when deciding to select the suitability of abstracts for poster presentations or concurrent sessions.

  13. IPCC Climate Change 2013: Mitigation of Climate Change - Key Findings and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Sokona, Youba

    2014-05-01

    The Working Group III contribution to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, Mitigation of Climate Change, examines the results of scientific research about mitigation, with special attention on how knowledge has evolved since the Fourth Assessment Report published in 2007. Throughout, the focus is on the implications of its findings for policy, without being prescriptive about the particular policies that governments and other important participants in the policy process should adopt. The report begins with a framing of important concepts and methods that help to contextualize the findings presented throughout the assessment. The valuation of risks and uncertainties, ethical concepts and the context of sustainable development and equity are among the guiding principles for the assessment of mitigation strategies. The report highlights past trends in stocks and flows of greenhouse gases and the factors that drive emissions at global, regional, and sectoral scales including economic growth, technology or population changes. It provides analyses of the technological, economic and institutional requirements of long-term mitigation scenarios and details on mitigation measures and policies that are applied in different economic sectors and human settlements. It then discusses interactions of mitigation policies and different policy instrument types at national, regional and global governance levels and between economic sectors, The Working Group III report comprises 16 chapters and in assembling this assessment authors were guided by the principles of the IPCC mandate: to be explicit about mitigation options, to be explicit about their costs and about their risks and opportunities vis-à-vis other development priorities, and to be explicit about the underlying criteria, concepts, and methods for evaluating alternative policies.

  14. Imaging findings of intravascular papillary endothelial hyperplasia presenting in extremities: correlation with pathological findings.

    PubMed

    Lee, Sun Joo; Choo, Hye Jung; Park, Ji Sung; Park, Yeong-Mi; Eun, Choong Ki; Hong, Sung Hwan; Hwang, Ji Young; Lee, In Sook; Lee, Jongmin; Jung, Soo-Jin

    2010-08-01

    To describe magnetic resonance imaging (MRI) and ultrasound (US) findings of intravascular papillary endothelial hyperplasia (IPEH) arising in extremities. Six patients with IPEH confirmed by surgical resection were reviewed retrospectively. Before resection, 3 patients underwent both MRI and US and 3 patients underwent only MRI. Two radiologists retrospectively reviewed MR/US imaging results and correlated them with pathological features. The 6 IPEHs were diagnosed as 4 mixed forms and 2 pure forms. The pre-existing pathology of four mixed forms was intramuscular or intermuscular hemangioma. By MRI, the mixed form of IPEH (n = 4) revealed iso- to slightly high signal intensity containing nodule-like foci of high signal intensity on T1-weighted images (T1WI) and high signal intensity-containing nodule-like foci of low signal intensity on T2-weighted images (T2WI). The pure form of IPEH (n = 2) showed homogeneous iso- signal intensity on T1WI and high and low signal intensity containing nodule-like foci of low signal intensity on T2WI. On gadolinium-enhanced fat-suppressed T1WI, 50% of cases (n = 3: mixed forms) revealed peripheral, septal, and central enhancement. The other IPEHs (n = 3: 1 mixed and 2 pure forms) showed peripheral and septal enhancement or only peripheral enhancement. By US, two mixed forms of IPEH showed well-defined hypoechoic masses containing hyperechoic septa and central portion with vascularities. One pure form of IPEH was a homogeneous hypoechoic mass with septal and peripheral vascularities on color Doppler imaging. The foci of high signal intensity on T1WI, foci of low signal intensity on T2WI, and non-enhancing portions on MRI and the hypoechoic portion on US were histopathologically correlated with thrombi and the peripheral/septal or central enhancing areas on MRI, hyperechoic septa and the central portion on US, and septal/central or peripheral vascularities on color Doppler imaging corresponded to hypertrophic papillary epithelium and

  15. Predictors of Urgent Findings on Abdominopelvic CT in Patients with Crohn's Disease Presenting to the Emergency Department.

    PubMed

    Jung, Yoon Suk; Park, Dong Il; Hong, Sung Noh; Kim, Eun Ran; Kim, Young Ho; Cheon, Jae Hee; Eun, Chang Soo; Han, Dong Soo; Lee, Chang Kyun; Kim, Jae Hak; Huh, Kyu Chan; Yoon, Soon Man; Song, Hyun Joo; Shin, Jeong Eun; Jeon, Seong Ran

    2015-04-01

    Patients with Crohn's disease (CD) are frequently exposed to diagnostic radiation, mainly as a result of abdominopelvic computed tomography (APCT) examinations. However, there are limited data on the impact of APCT on clinical management in this population. To investigate clinical predictors of urgent findings on APCT in patients with CD who presented to the emergency department (ED). A retrospective study was performed among patients with CD presenting to 11 EDs with a gastrointestinal complaint. The primary outcome, OPAN (obstruction, perforation, abscess, or non-CD-related urgent findings), included new or worsening CD-related urgent findings or non-CD-related urgent findings that required urgent or emergency treatment. Variables with P < 0.1 in univariate analyses were included in a multivariable logistic regression model. Of the 266 APCTs performed, 103 (38.7 %) had OPAN and 113 (42.5 %) required changes in treatment plan. Stricturing or penetrating disease (odds ratio [OR] 2.72, 95 % confidence interval [CI] 1.21-6.13), heart rate >100 beats/min (OR 2.33, 95 % CI 1.10-4.93), leukocyte count >10,000/mm(3) (OR 4.38, 95 % CI 2.10-9.13), and CRP >2.5 mg/dL (OR 3.11, 95 % CI 1.23-7.86) were identified as the independent predictors of OPAN, whereas biologic agent use (OR 0.37; 95 % CI 0.15-0.90) was identified as the negative predictor in patients with CD. Only 39 % of the APCTs performed in the ED among patients with CD showed urgent findings. Stricturing or penetrating disease, tachycardia, leukocytosis, and high CRP level were predictors of urgent CT findings, while biologic agent use was a negative predictor. To reduce unnecessary radiation exposure, the selection process for CD patients referred for APCT must be improved.

  16. Changes in Land Cover and Terrestrial Biogeochemistry in the US: Key Findings from the Climate Science Special Report (CSSR)

    NASA Astrophysics Data System (ADS)

    Hibbard, K. A.; Hoffman, F. M.; Huntzinger, D. N.; West, T. O.

    2017-12-01

    The continual increase in annual average temperatures (1.0°C for the period 1901-2016 for the contiguous US), growing number of high temperature records, increasing intensity and frequency of heavy precipitation events in most parts of the US, and rising global mean sea level are among the key findings from the forthcoming Climate Science Special Report (CSSR) produced by the US Global Change Research Program (USGCRP). A chapter new to the climate science assessments directly addresses the feedbacks between climate change, land use and land cover change, and the carbon cycle. While the terrestrial biosphere is presently a net carbon sink, which has steadily increased since 1980, the future sign and magnitude of biosphere uptake cannot be determined because of uncertainties in the future trajectory of land cover and land use. Citing recent research, the chapter highlights that the combined effects of land use and land cover changes due to human activities account for 40% ± 16% of the human-caused global radiative forcing from 1850 to present. Moverover, plant community structure has already been altered by climate change and changes in the frequency and intensity of extreme events. Changes in temperature also have direct effects on the land surface as well as feedbacks to the atmosphere. For example, the number of consecutive frost-free days and the length of the growing season have increased across all regions in the contiguous US; however, overall plant productivity has been limited by biotic factors and seasonal limitations in water and nutrient availability. Within cities, the urban heat island (UHI) effect results in daytime temperatures 0.5°C-4.0°C higher and nighttime temperatures 1.0°C-2.5°C higher in urban areas than surrounding rural areas. We discuss terrestrial and biogeochemical forcings and feedbacks that can serve as critical evaluation and paramaterization datasets for Earth system modeling approaches with implications for management of

  17. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  18. Genetically Informative Research on Adolescent Substance Use: Methods, Findings, and Challenges

    ERIC Educational Resources Information Center

    Lynskey, Michael T.; Agrawal, Arpana; Heath, Andrew C.

    2010-01-01

    Objective: To provide an overview of the genetic epidemiology of substance use and misuse in adolescents. Method: A selective review of genetically informative research strategies, their limitations, and key findings examining issues related to the heritability of substance use and substance use disorders in children and adolescents is presented.…

  19. Key Findings of the AMAP 2015 Assessment on Black Carbon and Tropospheric Ozone as Arctic Climate Forcers

    NASA Astrophysics Data System (ADS)

    Quinn, P.

    2015-12-01

    emission from each sector and region) were also calculated. Key findings from the 2015 assessment will be presented.

  20. Key Largo Limestone revisited: Pleistocene shelf-edge facies, Florida Keys, USA

    USGS Publications Warehouse

    Gray, Multer H.; Gischler, E.; Lundberg, J.; Simmons, K.R.; Shinn, E.A.

    2002-01-01

    New dates and analysis of 12 deep and 57 shallow cores allow a more detailed interpretation of the Pleistocene shelf edge of the Florida Platform as found in various facies of the Key Largo Limestone beneath the Florida Keys. In this study a three-phase evolution of the Quaternary units (Q1-Q5) of the Key Largo is presented with new subdivision of the Q5. (1) In the first phase, the Q1 and Q2 (perhaps deposited during oxygen-isotope stage 11) deep-water quartz-rich environment evolved into a shallow carbonate phase. (2) Subsequently, a Q3 (presumably corresponding to oxygen-isotope stage 9) flourishing reef and productive high-platform sediment phase developed. (3) Finally, a Q4 and Q5 (corresponding to oxygen-isotope stages 7 and 5) stabilization phase occured with reefs and leeward productive lagoons, followed by lower sea levels presenting a sequence of younger (isotope substages 5c, 5a) shelf-margin wedges, sediment veneers and outlier reefs. The Key Largo Limestone provides an accessible model of a carbonate shelf edge with fluctuating water depth, bordering a deep seaward basin for a period of at least 300 ka. During this time, at least four onlaps/offlaps, often separated by periods of karst development with associated diagenetic alterations, took place. The story presented by this limestone not only allows a better understanding of the history of south Florida but also aids in the interpretation of similar persistent shelf-edge sites bordering deep basins in other areas.

  1. Fine-needle aspiration findings of a rare hematopoietic neoplasm presenting as obstructive jaundice.

    PubMed

    Tracht, Jessica; Ahmed, Ali M; Rosenblum Donath, Frida

    2017-12-01

    A 51-year-old female who presented with obstructive jaundice was found to have masses in the pancreatic head and tail as well as suspicious liver and periaortic masses on imaging. Aspiration cytology of the pancreatic tail mass showed abundant large single cells with vacuolated eosinophilic cytoplasm, marked nuclear pleomorphism, large bizarre irregular nuclei, binucleation, and prominent nucleoli. Numerous cells also showed intracytoplasmic black to brown pigmentation. A cell block was obtained and extensive immunohistochemical staining was performed. S-100, HMB-45, Sox10, pancytokeratin, CK7, RCC antigen, synaptophysin, HepPar 1, inhibin, CD45, CD21, and CD123 were negative, making melanoma, epithelial malignancies, lymphoma, follicular dendritic and plasmacytoid dendritic cell neoplasms less likely. CD4 and CD56 showed partial positivity, and CD68, CD163, and CD14 were positive, supporting the diagnosis of histiocytic sarcoma. Surgical specimens and immunohistochemistry confirmed the cytologic findings. Histiocytic sarcoma is a rare aggressive malignancy of histiocytic origin with most cases presenting in adults in extranodal sites, most commonly the intestinal tract. Few cases are reported in the literature, presenting diagnostic challenges for cytopathologists when seen on fine-needle aspiration. We present the first reported case of histiocytic sarcoma presenting as a pancreatic mass, diagnosed by endoscopic ultrasound guided fine-needle aspiration (EUS-FNA). This entity is rarely described on cytology and arose in a location in which EUS-FNA is the diagnostic modality of choice. This case study highlights that cytopathologists should be aware of histiocytic sarcoma occurring in extranodal locations accessible by EUS-FNA and be familiar with the cytomorphologic appearance. © 2017 Wiley Periodicals, Inc.

  2. A case of acyclovir neurotoxicity presenting with atypical cerebrospinal fluid findings.

    PubMed

    Thind, Guramrinder Singh; Roach, Richard

    2017-05-22

    An 82-year-old man with a history of end-stage renal disease presented with progressively worsening confusion and somnolence for the past 4-5 days. The patient was diagnosed with herpes zoster by his primary care physician 5 days ago and was started on a course of valacyclovir 1 g three times a day (dose not adjusted for renal impairment).A lumbar puncture was performed and cerebrospinal fluid (CSF) studies revealed 37 white blood cells (WBCs)/hpf (100% monocytes), protein 64 mg/dL and glucose 52 mg/dL. He was started on ceftriaxone, ampicillin and acyclovir. MRI of the brain was done and was unremarkable. Acyclovir-induced encephalopathy was high on differential, but his CSF findings were concerning for viral encephalitis. Nonetheless, all antimicrobials were discontinued and he was scheduled for a 5-hour dialysis session. The very next day, he showed immense improvement and eventually recovered completely. CSF PCR tests for both herpes simplex virus and varicella zoster virus came back negative. © BMJ Publishing Group Ltd (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  3. Key findings from HSC's 2010 site visits: health care markets weather economic downturn, brace for health reform.

    PubMed

    Felland, Laurie E; Grossman, Joy M; Tu, Ha T

    2011-05-01

    Lingering fallout--loss of jobs and employer coverage--from the great recession slowed demand for health care services but did little to slow aggressive competition by dominant hospital systems for well-insured patients, according to key findings from the Center for Studying Health System Change's (HSC) 2010 site visits to 12 nationally representative metropolitan communities. Hospitals with significant market clout continued to command high payment rate increases from private insurers, and tighter hospital-physician alignment heightened concerns about growing provider market power. High and rising premiums led to increasing employer adoption of consumer-driven health plans and continued increases in patient cost sharing, but the broader movement to educate and engage consumers in care decisions did not keep pace. State and local budget deficits led to some funding cuts for safety net providers, but an influx of federal stimulus funds increased support to community health centers and shored up Medicaid programs, allowing many people who lost private insurance because of job losses to remain covered. Hospitals, physicians and insurers generally viewed health reform coverage expansions favorably, but all worried about protecting revenues as reform requirements phase in.

  4. Canine dilated cardiomyopathy: a retrospective study of signalment, presentation and clinical findings in 369 cases.

    PubMed

    Martin, M W S; Stafford Johnson, M J; Celona, B

    2009-01-01

    To review the clinical and diagnostic findings and survival of dilated cardiomyopathy from a large population of dogs in England. A retrospective study of the case records of dogs with dilated cardiomyopathy collected between January 1993 and May 2006. There were 369 dogs with dilated cardiomyopathy of which all were pure-bred dogs except for four. The most commonly affected breeds were dobermanns and boxers. Over 95 per cent of dogs weighed more than 15 kg and 73 per cent were male. The median duration of signs before referral was three weeks with 65 per cent presenting in stage 3 heart failure. The most common signs were breathlessness (67 per cent) and coughing (64 per cent). The majority of dogs (89 per cent) had an arrhythmia at presentation and 74 per cent of dogs had radiographic signs of pulmonary oedema or pleural effusion. The median survival time was 19 weeks. Dilated cardiomyopathy occurs primarily in medium to large breed pure-bred dogs, and males are more frequently affected than females. The duration of clinical signs before referral is often short and the survival times are poor. Greater awareness of affected breeds, clinical signs and diagnostic findings may help in early recognition of this disease which often has a short clinical phase.

  5. The public and wildland fire management: social science findings for managers

    Treesearch

    S.M. McCaffrey

    2006-01-01

    Presents key social science findings from three National Fire Plan-sponsored research projects. Articles highlight information of likely interest to individuals working to decrease wildfire hazards on both private and public lands. Three general topic areas are addressed: (1) public views and acceptance of fuels management, (2) working with homeowners and communities,...

  6. An Overview of Findings from Wave 2 of the National Longitudinal Transition Study-2 (NLTS2). NCSER 2006-3004

    ERIC Educational Resources Information Center

    Wagner, Mary; Newman, Lynn; Cameto, Renee; Levine, Phyllis; Garza, Nicolle

    2006-01-01

    This report is an executive summary of two previously-released reports presenting findings from Wave 2: The Academic Achievement and Functional Performance of Youth with Disabilities and After High School: A First Look at the Postschool Experiences of Youth with Disabilities. Some key findings presented in the Overview include the following: (1) A…

  7. Strength in Ways: Finding Creativity in Routine Strategy Development

    DTIC Science & Technology

    2011-06-01

    STRENGTH IN WAYS: FINDING CREATIVITY IN ROUTINE STRATEGY DEVELOPMENT BY PAUL J. MAYKISH A THESIS PRESENTED TO THE FACULTY OF THE SCHOOL...Professional Development . iv ACKNOWLEDGEMENTS I feel indebted to my country for the opportunity to study strategy for one year. It is at once too much...with research and welcoming me into one of our greatest national treasures. Lieutenant Colonel Dollar Young (USAF) introduced me to numerous key

  8. Influence of presenting electrocardiographic findings on the treatment and outcomes of patients with non-ST-segment elevation myocardial infarction.

    PubMed

    Patel, Jigar H; Gupta, Raghav; Roe, Matthew T; Peng, S Andrew; Wiviott, Stephen D; Saucedo, Jorge F

    2014-01-15

    The influence of the presenting electrocardiographic (ECG) findings on the treatment and outcomes of patients with non-ST-segment elevation myocardial infarction (NSTEMI) has not been studied in contemporary practice. We analyzed the clinical characteristics, in-hospital management, and in-hospital outcomes of patients with NSTEMI in the Acute Coronary Treatment and Intervention Outcomes Network Registry-Get With The Guidelines (ACTION Registry-GWTG) according to the presenting ECG findings. A total of 175,556 patients from 485 sites from January 2007 to September 2011 were stratified by the ECG findings on presentation: ST depression (n = 40,146, 22.9%), T-wave inversions (n = 24,627, 14%), transient ST-segment elevation (n = 5,050, 2.9%), and no ischemic changes (n = 105,733, 60.2%). Patients presenting with ST-segment depression were the oldest and had the greatest prevalence of major cardiac risk factors. Coronary angiography was performed most frequently in the transient ST-segment elevation group, followed by the T-wave inversion, ST-segment depression, and no ischemic changes groups. The angiogram revealed that patients with ST-segment depression had more left main, proximal left anterior descending, and 3-vessel coronary artery disease and underwent coronary artery bypass grafting most often. In contrast, patients with transient ST-segment elevation had 1-vessel CAD and underwent percutaneous coronary intervention the most. The unadjusted mortality was highest in the ST-segment depression group, followed by the no ischemic changes, transient ST-segment elevation, and T-wave inversion group. Adjusted mortality using the ACTION Registry-GWTG in-hospital mortality model with the no ischemic changes group as the reference showed that in-hospital mortality was similar in the transient ST-segment elevation (odds ratio 1.15, 95% confidence interval 0.97 to 1.37; p = 0.10), higher in the ST-segment depression group (odds ratio 1.46, 95% confidence interval 1

  9. Hair breakage as a presenting sign of early or occult central centrifugal cicatricial alopecia: clinicopathologic findings in 9 patients.

    PubMed

    Callender, Valerie D; Wright, Dakara Rucker; Davis, Erica C; Sperling, Leonard C

    2012-09-01

    Central centrifugal cicatricial alopecia is the most common form of cicatricial alopecia in African American women. Treatment options are limited and mostly aimed at halting further hair loss but rarely result in hair regrowth. Therefore, it is important to recognize early clinical signs, perform a confirmatory biopsy, and begin treatment promptly. We have observed that hair breakage may be a key sign of early central centrifugal cicatricial alopecia, and this association is not clearly described in the literature. Nine patients with hair breakage on the vertex with or without scalp symptoms underwent scalp biopsies as part of their evaluation. Of these, 8 had histologic samples adequate for complete interpretation: 5 specimens (63%) showed histologic changes typical of central centrifugal cicatricial alopecia, with 1 of these showing advanced end-stage changes of cicatricial alopecia. Two (25%) revealed premature desquamation of the inner root sheath as the sole finding suggestive of early central centrifugal cicatricial alopecia and 1 (13%) was normal. Although hair breakage can have multiple causes, early central centrifugal cicatricial alopecia must be considered in the differential diagnosis, particularly in women of African ancestry. Histologic evaluation may reveal early or late findings that can help establish the diagnosis.

  10. Key Skills and Competencies. Symposium.

    ERIC Educational Resources Information Center

    2002

    This document contains three papers on key skills and competencies and human resource development (HRD). "Career Related Competencies" (Marinka A.C.T. Kuijpers) reports findings from surveys completed by Dutch employees who identified these issues: self-reflection is more important than career control; age and gender influence attitude…

  11. Secure image retrieval with multiple keys

    NASA Astrophysics Data System (ADS)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  12. Incidental finding of single coronary artery in a patient with alcoholic cardiomyopathy presenting as acute heart failure.

    PubMed

    McNair, Patrick; Jones, Erica; Truong, Quynh; Singh, Harsimran

    Single coronary artery is a rare clinical finding. Diagnosis is typically made incidentally after the patient presents with symptoms and undergoes coronary angiography, coronary computed tomography angiography (CTA), or post-mortem during autopsy. Several high-risk features of anomalous coronary arteries have been described in the literature. Our paper describes a case of dilated alcoholic cardiomyopathy presenting as heart failure with diagnostic workup incidentally revealing single coronary artery. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Finding solid ground: law enforcement, key populations and their health and rights in South Africa

    PubMed Central

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Introduction Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. Discussion We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, “othering” and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Conclusions Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality

  14. Finding solid ground: law enforcement, key populations and their health and rights in South Africa.

    PubMed

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, "othering" and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality. Creating opportunities to share experiences

  15. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  16. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2006

    ERIC Educational Resources Information Center

    Johnston, Lloyd D., O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2007-01-01

    This report provides a summary of drug use trends from a survey of nearly 50,000 eighth-, tenth-, and twelfth- grade students nationwide. It also includes perceived risk, personal disapproval, and perceived availability of each drug by this group. A synopsis of the methods used in the study and an overview of the key results from the 2006 survey…

  17. Anisakiasis presenting to the ED: clinical manifestations, time course, hematologic tests, computed tomographic findings, and treatment.

    PubMed

    Takabayashi, Takeshi; Mochizuki, Toshiaki; Otani, Norio; Nishiyama, Kei; Ishimatsu, Shinichi

    2014-12-01

    The prevalence of anisakiasis is rare in the United States and Europe compared with that in Japan, with few reports of its presentation in the emergency department (ED). This study describes the clinical, hematologic, computed tomographic (CT) characteristics, and treatment in gastric and small intestinal anisakiasis patients in the ED. We retrospectively reviewed the data of 83 consecutive anisakiasis presentations in our ED between 2003 and 2012. Gastric anisakiasis was endoscopically diagnosed with the Anisakis polypide. Small intestinal anisakiasis was diagnosed based on both hematologic (Anisakis antibody) and CT findings. Of the 83 cases, 39 had gastric anisakiasis and 44 had small intestinal anisakiasis based on our diagnostic criteria. Although all patients had abdominal pain, the gastric anisakiasis group developed symptoms significantly earlier (peaking within 6 hours) than the small intestinal anisakiasis group (peaking within 48 hours), and fewer patients with gastric anisakiasis needed admission therapy (5% vs 57%, P<.01). All patients in the gastric and 40 (91%) in the small intestinal anisakiasis group had a history of raw seafood ingestion. Computed tomographic findings revealed edematous wall thickening in all patients, and ascites and phlegmon of the mesenteric fat were more frequently observed in the small intestinal anisakiasis group. In the ED, early and accurate diagnosis of anisakiasis is important to treat and explain to the patient, and diagnosis can be facilitated by a history of raw seafood ingestion, evaluation of the time-to-symptom development, and classic CT findings. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. How well do middle school science programs measure up? Findings from Project 2061's curriculum review

    NASA Astrophysics Data System (ADS)

    Kesidou, Sofia; Roseman, Jo Ellen

    2002-08-01

    The purposes of this study were to examine how well middle school programs support the attainment of key scientific ideas specified in national science standards, and to identify typical strengths and weaknesses of these programs using research-based criteria. Nine widely used programs were examined by teams of teachers and specialists in research on teaching and learning. Reviewers found that whereas key ideas were generally present in the programs, they were typically buried between detailed or even unrelated ideas. Programs only rarely provided students with a sense of purpose for the units of study, took account of student beliefs that interfere with learning, engaged students with relevant phenomena to make abstract scientific ideas plausible, modeled the use of scientific knowledge so that students could apply what they learned in everyday situations, or scaffolded student efforts to make meaning of key phenomena and ideas presented in the programs. New middle school science programs that reflect findings from learning research are needed to support teachers better in helping students learn key ideas in science. The criteria and findings from this study on the inadequacies in existing programs could serve as guidelines in new curriculum development.

  19. Presentation of economic evaluation results.

    PubMed

    Chaikledkaew, Usa

    2014-05-01

    The first HTA guidelines for Thailand included a chapter outlining a set of guidelines on how best to report the findings of health economic evaluations, based on a review of best practice and existing guidelines on the presentation of economic evaluation results from around the world. In this second edition of HTA guidelines for Thailand, the recommendations build on the first edition by using a case study to illustrate how the guidelines can be applied in a real research context. The guidelines propose that all reporting include ten key elements: defining the scope of the study, selection of comparator(s), defining the type of economic evaluation, measurement of costs, measurement of clinical effects, handling time in economic evaluation studies, handling uncertainty and sensitivity analysis, presentation of the results, discussion of the results, and disclosure of funding and authors conflict of interest.

  20. Pulmonary vascular anomalies: a review of clinical and radiological findings of cases presenting with different complaints in childhood.

    PubMed

    Nacaroğlu, Hikmet Tekin; Ünsal-Karkıner, Canan Şule; Bahçeci-Erdem, Semiha; Özdemir, Rahmi; Karkıner, Aytaç; Alper, Hüdaver; Can, Demet

    2016-01-01

    Congenital pulmonary vascular abnormalities arise from several etiologies. These anomalies are difficult to categorize and sorted into distinct classifications. Major pulmonary vascular abnormalities can be ranked as interruption of the main pulmonary artery or its absence, emergence of the left pulmonary artery in the right pulmonary artery, pulmonary venous drainage abnormalities, and pulmonary arteriovenous malformations (PAVMs). Some of the cases are asymptomatic and diagnosed by coincidence, whereas a few of them are diagnosed by typical findings in the newborn and infancy period, symptoms, and radiological appearances. Early diagnosis is important, since death may occur as a result of pulmonary and cardiac pathologies developed in patients with pulmonary vascular anomalies. In this case presentation, the clinical and radiological findings of patients that presented with different complaints and were diagnosed with pulmonary vascular anomalies were introduced.

  1. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N.

    2008-07-15

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determinedmore » for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency ({eta} {approx} 20%) and dark count probability (p{sub dark} {approx} 10{sup -7})« less

  2. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2008-07-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper’s capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ≈ 20%) and dark count probability ( p dark ˜ 10-7).

  3. Long distance measurement-device-independent quantum key distribution with entangled photon sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xu, Feihu; Qi, Bing; Liao, Zhongfa

    2013-08-05

    We present a feasible method that can make quantum key distribution (QKD), both ultra-long-distance and immune, to all attacks in the detection system. This method is called measurement-device-independent QKD (MDI-QKD) with entangled photon sources in the middle. By proposing a model and simulating a QKD experiment, we find that MDI-QKD with one entangled photon source can tolerate 77 dB loss (367 km standard fiber) in the asymptotic limit and 60 dB loss (286 km standard fiber) in the finite-key case with state-of-the-art detectors. Our general model can also be applied to other non-QKD experiments involving entanglement and Bell state measurements.

  4. Key node selection in minimum-cost control of complex networks

    NASA Astrophysics Data System (ADS)

    Ding, Jie; Wen, Changyun; Li, Guoqi

    2017-11-01

    Finding the key node set that is connected with a given number of external control sources for driving complex networks from initial state to any predefined state with minimum cost, known as minimum-cost control problem, is critically important but remains largely open. By defining an importance index for each node, we propose revisited projected gradient method extension (R-PGME) in Monte-Carlo scenario to determine key node set. It is found that the importance index of a node is strongly correlated to occurrence rate of that node to be selected as a key node in Monte-Carlo realizations for three elementary topologies, Erdős-Rényi and scale-free networks. We also discover the distribution patterns of key nodes when the control cost reaches its minimum. Specifically, the importance indices of all nodes in an elementary stem show a quasi-periodic distribution with high peak values in the beginning and end of a quasi-period while they approach to a uniform distribution in an elementary cycle. We further point out that an elementary dilation can be regarded as two elementary stems whose lengths are the closest, and the importance indices in each stem present similar distribution as in an elementary stem. Our results provide a better understanding and deep insight of locating the key nodes in different topologies with minimum control cost.

  5. Higher Education in England 2016: Key Facts. September 2016/20

    ERIC Educational Resources Information Center

    Higher Education Funding Council for England, 2016

    2016-01-01

    This updated edition of "Higher Education in England: Key Facts" provides a statistical overview of key sector trends and developments in 2016. Using the most recent data, it draws together key findings from a range of reports published by the Higher Education Funding Council for England (HEFCE) over the past year to provide a robust,…

  6. Long-distance quantum key distribution with imperfect devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-12-04

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R{sub QKD}. The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels.more » We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols.« less

  7. Insights on the poster preparation and presentation process.

    PubMed

    Moore, L W; Augspurger, P; King, M O; Proffitt, C

    2001-05-01

    Dissemination of research findings and effective clinical innovations is key to the growth and development of the nursing profession. Several avenues exist for the dissemination of information. One forum for communication that has gained increased recognition over the past decade is the poster presentation. Poster presentations are often a significant part of regional, national, and international nursing conferences. Although posters are frequently used to disseminate information to the nursing community, little is reported about actual poster presenters' experiences with preparation and presentation of their posters. The purpose of this article is to present insights derived from information shared by poster presenters regarding the poster preparation and presentation process. Such insights derived from the personal experiences of poster presenters may assist others to efficiently and effectively prepare and present scholarly posters that disseminate information to the nursing community. Copyright 2001 by W.B. Saunders Company

  8. Contributions from associative and explicit sequence knowledge to the execution of discrete keying sequences.

    PubMed

    Verwey, Willem B

    2015-05-01

    Research has provided many indications that highly practiced 6-key sequences are carried out in a chunking mode in which key-specific stimuli past the first are largely ignored. When in such sequences a deviating stimulus occasionally occurs at an unpredictable location, participants fall back to responding to individual stimuli (Verwey & Abrahamse, 2012). The observation that in such a situation execution still benefits from prior practice has been attributed to the possibility to operate in an associative mode. To better understand the contribution to the execution of keying sequences of motor chunks, associative sequence knowledge and also of explicit sequence knowledge, the present study tested three alternative accounts for the earlier finding of an execution rate increase at the end of 6-key sequences performed in the associative mode. The results provide evidence that the earlier observed execution rate increase can be attributed to the use of explicit sequence knowledge. In the present experiment this benefit was limited to sequences that are executed at the moderately fast rates of the associative mode, and occurred at both the earlier and final elements of the sequences. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Rhizolith evidence in support of a late Holocene sea-level highstand at least 0.5 m higher than present at Key Biscayne, Florida

    NASA Astrophysics Data System (ADS)

    Froede, Carl R., Jr.

    2002-03-01

    R. Fairbridge and F. Shepard proposed different sea-level curves for the late Holocene. South Florida, as a tectonically stable platform, provides a key locale from which late Quaternary sea-level measurements have been attempted. Previous studies supporting Holocene sea-level curves have focused on mangrove peat deposits, barrier ridges, and archaeological sites. However, in situ biological indicators provide the best evidence in support of varying sea-level positions during the late Holocene. The northeastern side of Key Biscayne, Florida, has two areas of rock reef where rhizoliths (i.e., fossilized root casts) are exposed within the intertidal zone. They have previously been interpreted as the fossilized roots of a former black mangrove (Avicennia germinans) forest. However, the morphology, size, orientation, and areal extent of the rhizoliths is best understood if they are interpreted as the former root casts of turtle grass (Thalassia testudinum). This interpretation would constitute in situ biological evidence of a late Holocene sea-level position at least 0.5 m higher than at present. Previously published 14C dating of the calcareous paste inside the rhizoliths suggests that they formed 1 2 k.y. before present. This corresponds to a higher than present sea-level highstand supported by independent evidence from other areas in south Florida.

  10. SpaceWire Tiger Team Findings and Suggestions

    NASA Technical Reports Server (NTRS)

    Ishac, Joseph A.

    2011-01-01

    This technical report intends to highlight the key findings and recommendations of the SpaceWire Tiger Team for the CoNNeCT project. It covers findings which are technical in nature, covering design concepts and approaches.

  11. Endoscopic findings in patients presenting with dysphagia: analysis of a national endoscopy database.

    PubMed

    Krishnamurthy, Chaya; Hilden, Kristen; Peterson, Kathryn A; Mattek, Nora; Adler, Douglas G; Fang, John C

    2012-03-01

    Dysphagia is a common problem and an indication for upper endoscopy. There is no data on the frequency of the different endoscopic findings and whether they change according to demographics or by single versus repeat endoscopy. To determine the prevalence of endoscopic findings in patients with dysphagia and whether findings differ in regard to age, gender, ethnicity, and repeat procedure. This was a retrospective study using a national endoscopic database (CORI). A total of 30,377 patients underwent esophagogastroduodenoscopy (EGD) for dysphagia of which 4,202 patients were repeat endoscopies. Overall frequency of endoscopic findings was determined by gender, age, ethnicity, and single vs. repeat procedures. Esophageal stricture was the most common finding followed by normal, esophagitis/ulcer (EU), Schatzki ring (SR), esophageal food impaction (EFI), and suspected malignancy. Males were more likely to undergo repeat endoscopies and more likely to have stricture, EU, EFI, and suspected malignancy (P = 0.001). Patients 60 years or older had a higher prevalence of stricture, EU, SR, and suspected malignancy (P < 0.0001). Esophageal stricture was most common in white non-Hispanic patients compared to other ethnic groups. In patients undergoing repeat EGD, stricture, SR, EFI, and suspected malignancy were more common (P < 0.0001). The prevalence of endoscopic findings differs significantly by gender, age, and repeat procedure. The most common findings in descending order were stricture, normal, EU, SR, EFI, and suspected malignancy. For patients undergoing a repeat procedure, normal and EU were less common and all other abnormal findings were significantly more common.

  12. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  13. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-05-01

    We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.

  14. Tumour genesis syndrome: severe hypophosphatemia and hypokalemia may be ominous presenting findings in childhood acute myeloid leukaemia.

    PubMed

    Chan, Winnie Ky; Chang, Kai On; Lau, Wing Hung

    2017-08-01

    We report a 16-year-old girl who was diagnosed with acute leukaemia and a marked leucocytosis >200 × 10 9 /L. She presented with marked hypophosphatemia, hypokalemia, acute renal failure and acute respiratory failure. These electrolytes disturbances may indicate rapid tumour genesis. These ominous findings required urgent treatment to halt the crises of rapid leukemic cell proliferation. Mark hypophosphatemia and hypokalemia may be presenting electrolyte abnormalities in a patient with acute leukaemia, and these may be indicators of aggressive tumour genesis. What is known: • Mild electrolyte disturbances are common in oncology patients • Tumour lysis syndrome is well recognized by paediatriaticians What is new: • Life-threatening hypophosphatemia is an uncommon presentation • These electrolytes disorders may indicate an aggressive tumour genesis process even at presentation and require urgent treatment.

  15. Key Findings for Interpersonal Skills

    DTIC Science & Technology

    2013-12-04

    for example if you feel they use too much or too little eye contact or gesturing, stand too close or too far, or use gestures you’re unfamiliar with...IM2 RIGH[T now. 23 CM2 honestly 24 CM2 I didn’t even ((unintelligible)) 25 Would you tell him? 26 I didn’t do any fucking thing man 27 CF1 No he didn’t...that civilians whom they contact may have little or no understanding of what is happening, what they should do, or why they should do it. When

  16. Bronchoscopic findings and bleeding control predict survival in patients with solid malignancies presenting with mild hemoptysis.

    PubMed

    Grosu, Horiana B; Casal, Roberto F; Morice, Rodolfo C; Nogueras-González, Graciela M; Eapen, Georgie A; Ost, David; Sarkiss, Mona G; Jimenez, Carlos A

    2013-08-01

    Regardless of its volume, hemoptysis is a concerning symptom. Mild hemoptysis and its significance in patients with solid malignancies has not been studied. We conducted a retrospective chart review of patients with solid malignancies who presented for evaluation of mild hemoptysis. In this population, we studied the impact of bronchoscopic findings and endobronchial therapies on overall survival and bleeding recurrence. Patients were categorized into four groups on the basis of the presence or absence of active bleeding and endobronchial disease at the time of initial bronchoscopy: active bleeding with endobronchial lesion (AB/EBL), active bleeding without endobronchial lesion (AB/no-EBL), absence of active bleeding but with endobronchial lesion (no-AB/EBL), and absence of active bleeding and endobronchial lesion (no-AB/no-EBL). Ninety-five of the 112 patients with solid malignancies and mild hemoptysis underwent bronchoscopies. There was a significantly lower median survival time for patients with bronchoscopic findings of active bleeding and endobronchial lesion compared with patients with no active bleeding and/or no endobronchial lesion (3.48 mo; 95% confidence interval [CI], 2.14-6.05). On a multivariate analysis, factors independently associated with improved survival were higher hemoglobin values (hazard ratio [HR], 0.78; 95% CI, 0.67-0.91) and cessation of hemoptysis without recurrence at 48 hours (HR, 0.43; 95% CI, 0.22-0.84). Variables independently associated with worse survival were disease stage (HR, 10.8; 95% CI, 2.53-46.08) and AB/EBL (HR, 3.20; 95% CI, 1.74-5.89). In patients with solid malignancies presenting with mild hemoptysis, bronchoscopic findings of AB/EBL are associated with decreased survival. Hemoptysis control without recurrence at 48 hours after endobronchial intervention may improve survival.

  17. Ultrasonographic findings of Kimura's disease presenting in the upper extremities.

    PubMed

    Shin, Gi Won; Lee, Sun Joo; Choo, Hye Jung; Park, Young Mi; Jeong, Hae Woong; Lee, Sung-Moon; Suh, Jin-Suck; Jung, Soo-Jin

    2014-12-01

    To describe ultrasound findings of Kimura's disease arising in the upper extremities. Five patients with Kimura's disease confirmed by surgical resection were retrospectively reviewed by two musculoskeletal radiologists and a pathologist. All six lesions involved the epitrochlear area and appeared as partially (n = 5) or poorly (n = 1) marginated subcutaneous masses with the presence of curvilinear hyperechoic bands intermingled within the hypoechoic components by US. Moderate (n = 4) to severe (n = 2) vascular signals were observed in some proportion of the hyperechoic bands by color Doppler US. The associated findings were the increased echogenicity of surrounding subcutaneous fat (n = 6) and adjacent lymphadenopathy (n = 4). Microscopic examination showed proliferation of lymphoid follicles with prominent germinal centers and intervening fibrosis. In this study, Kimura's disease arising in the upper extremities showed a partially defined hypoechoic subcutaneous mass with internal hyperechoic bands and moderate-to-severe vascularities, increased echogenicity of the surrounding subcutaneous fat and adjacent lymphadenopathy on US. Thus, when these US features are observed in the typical epitrochlear region of an Asian individual, especially if accompanied by peripheral eosinophilia, Kimura's disease should be considered as a possible diagnosis.

  18. Dissemination as Dialogue: Building Trust and Sharing Research Findings Through Community Engagement.

    PubMed

    McDavitt, Bryce; Bogart, Laura M; Mutchler, Matt G; Wagner, Glenn J; Green, Harold D; Lawrence, Sean Jamar; Mutepfa, Kieta D; Nogg, Kelsey A

    2016-03-17

    A fundamental feature of community-based participatory research (CBPR) is sharing findings with community members and engaging community partners in the dissemination process. To be truly collaborative, dissemination should involve community members in a two-way dialogue about new research findings. Yet little literature describes how to engage communities in dialogue about research findings, especially with historically marginalized communities where mistrust of researchers may exist because of past or present social injustices. Through a series of interactive community presentations on findings from a longitudinal study, we developed a process for community dissemination that involved several overlapping phases: planning, outreach, content development, interactive presentations, and follow-up. Through this process, we built on existing and new community relationships. Following each interactive presentation, the research team debriefed and reviewed notes to identify lessons learned from the process. Key themes included the importance of creating a flexible dissemination plan, tailoring presentations to each community group, establishing a point person to serve as a community liaison, and continuing dialogue with community members after the presentations. Core strategies for developing trust during dissemination included engaging community members at every step, reserving ample time for discussion during presentations, building rapport by sharing personal experiences, being receptive to and learning from criticism, and implementing input from community members. This process led to a deeper understanding of research findings and ensured that results reached community members who were invested in them.

  19. Dissemination as Dialogue: Building Trust and Sharing Research Findings Through Community Engagement

    PubMed Central

    Bogart, Laura M.; Mutchler, Matt G.; Wagner, Glenn J.; Green, Harold D.; Lawrence, Sean Jamar; Mutepfa, Kieta D.; Nogg, Kelsey A.

    2016-01-01

    A fundamental feature of community-based participatory research (CBPR) is sharing findings with community members and engaging community partners in the dissemination process. To be truly collaborative, dissemination should involve community members in a two-way dialogue about new research findings. Yet little literature describes how to engage communities in dialogue about research findings, especially with historically marginalized communities where mistrust of researchers may exist because of past or present social injustices. Through a series of interactive community presentations on findings from a longitudinal study, we developed a process for community dissemination that involved several overlapping phases: planning, outreach, content development, interactive presentations, and follow-up. Through this process, we built on existing and new community relationships. Following each interactive presentation, the research team debriefed and reviewed notes to identify lessons learned from the process. Key themes included the importance of creating a flexible dissemination plan, tailoring presentations to each community group, establishing a point person to serve as a community liaison, and continuing dialogue with community members after the presentations. Core strategies for developing trust during dissemination included engaging community members at every step, reserving ample time for discussion during presentations, building rapport by sharing personal experiences, being receptive to and learning from criticism, and implementing input from community members. This process led to a deeper understanding of research findings and ensured that results reached community members who were invested in them. PMID:26986541

  20. Editorial Decisions May Perpetuate Belief in Invalid Research Findings

    PubMed Central

    Eriksson, Kimmo; Simpson, Brent

    2013-01-01

    Social psychology and related disciplines are seeing a resurgence of interest in replication, as well as actual replication efforts. But prior work suggests that even a clear demonstration that a finding is invalid often fails to shake acceptance of the finding. This threatens the full impact of these replication efforts. Here we show that the actions of two key players – journal editors and the authors of original (invalidated) research findings – are critical to the broader public’s continued belief in an invalidated research conclusion. Across three experiments, we show that belief in an invalidated finding falls sharply when a critical failed replication is published in the same – versus different – journal as the original finding, and when the authors of the original finding acknowledge that the new findings invalidate their conclusions. We conclude by discussing policy implications of our key findings. PMID:24023863

  1. Patterns of paediatric emergency presentations to a tertiary referral centre in the Northern Territory.

    PubMed

    Buntsma, Davina; Lithgow, Anna; O'Neill, Evan; Palmer, Didier; Morris, Peter; Acworth, Jason; Babl, Franz E

    2017-12-01

    To describe epidemiological data concerning paediatric attendances at the ED of Royal Darwin Hospital (RDH). We conducted a retrospective cohort study of paediatric emergency presentations to the RDH ED during 2004 and 2013. Epidemiological data, including demographics, admission rates and diagnostic grouping, were analysed using descriptive and comparative statistical methods. We compared data with findings from a baseline epidemiological study by the Paediatric Research in Emergency Departments International Collaborative (PREDICT) conducted in 2004. A total of 12 745 and 15 378 paediatric presentations (age 0-18 years) to the RDH ED were analysed for the years 2004 and 2013 respectively. In 2004, the mean age of children presenting to RDH was 7.1 years, and 56.0% were female. Indigenous patients accounted for 31.2% of presentations at RDH and were significantly more likely to be admitted than non-Indigenous patients (31.6% vs 12.8%, OR 3.24, 95% CI 2.95-3.55). Children <5 years old accounted for the highest number of presentations (45.2%) and admissions (51.2%), and there was a high proportion of adolescent presentations (18.0%). Similar to the PREDICT study, viral infectious conditions (bronchiolitis, gastroenteritis, upper respiratory tract infections) were the most common cause for presentations. Key differences included a higher proportion of patients presenting with cellulitis and head injury at RDH and an increasing proportion of adolescent psychiatric presentations at RDH from 2004 to 2013. This study provides important information regarding paediatric presentations to a major referral hospital in the Northern Territory. Overall, there was a disproportionate rate of presentation and admission among Indigenous children. Other key findings were higher proportions of cellulitis, head injury and adolescent presentations. These findings can assist in service planning and in directing future research specific to children in the Northern Territory. © 2017

  2. A Key to the New Library.

    ERIC Educational Resources Information Center

    Gerryts, Egbert; Pienaar, Heila

    This paper discusses finding the key to a new library in order to ensure its future, stressing the importance of alignment between strategy and people. The first section addresses management philosophy for renewal, including replacing the inflexible hierarchical pyramidal structure by a network organization with a service and competency management…

  3. Spatial patch occupancy patterns of the Lower Keys marsh rabbit

    USGS Publications Warehouse

    Eaton, Mitchell J.; Hughes, Phillip T.; Nichols, James D.; Morkill, Anne; Anderson, Chad

    2011-01-01

    Reliable estimates of presence or absence of a species can provide substantial information on management questions related to distribution and habitat use but should incorporate the probability of detection to reduce bias. We surveyed for the endangered Lower Keys marsh rabbit (Sylvilagus palustris hefneri) in habitat patches on 5 Florida Key islands, USA, to estimate occupancy and detection probabilities. We derived detection probabilities using spatial replication of plots and evaluated hypotheses that patch location (coastal or interior) and patch size influence occupancy and detection. Results demonstrate that detection probability, given rabbits were present, was <0.5 and suggest that naïve estimates (i.e., estimates without consideration of imperfect detection) of patch occupancy are negatively biased. We found that patch size and location influenced probability of occupancy but not detection. Our findings will be used by Refuge managers to evaluate population trends of Lower Keys marsh rabbits from historical data and to guide management decisions for species recovery. The sampling and analytical methods we used may be useful for researchers and managers of other endangered lagomorphs and cryptic or fossorial animals occupying diverse habitats.

  4. Neurosyphilis: mighty imitator forays with benign presentation and unique neuroimaging findings.

    PubMed

    Tiwana, Harmanpreet; Ahmed, Aiesha

    2018-04-30

    Background: Common causes of temporal lobe hyper intensities are central nervous system infections like herpes simplex encephalitis, Lyme disease, limbic encephalitis and vascular pathology like Cerebral Autosomal Dominant Arteriopathy with Subcortical infarcts and Leukoencephalopathy. Methods: Personal assessment, laboratory data analysis and neuroimaging for the patient who was admitted to a central Pennsylvania tertiary care referral centre were conducted. Results: A 52-year-old male presented with a 1-year history of diffuse dysesthesia in upper and lower extremities with associated intermittent headaches and neck stiffness. Evaluation with lumbar puncture revealed increased nucleated cells (50ul) with lymphocytic predominance (96%) and an elevated protein level of 109mg/dl. Magnetic resonance imaging (MRI) of the brain showed T2/FLAIR hyper intensity in bilateral subcortical temporal white matter, left-greater-than-right and associated volume loss in cerebral parenchyma. Additional abnormal work up included reactive serum reactive plasma regain and Treponema pallidum antibody particle agglutination. Diagnosis of neurosyphilis was made and the patient was treated with intramuscular (IM) penicillin for 3 weeks. At the time of discharge, his headache and neck stiffness resolved and dysesthesias were decreased in intensity. Conclusions: The diagnosis of neurosyphilis is intricate, and no reference standard exists. Neuroimaging findings of neurosyphilis commonly are cerebral infarctions, leptomeningeal enhancement or non-specific white matter lesions. Less common features on fluid-attenuated inversion recovery (FLAIR) sequences are cortical atrophy and mesial temporal parenchymal signal changes. It is prudent to keep neurosyphilis in differential of mesial temporal lobe white matter changes, as early diagnosis and treatment results in better prognosis.

  5. Coherent one-way quantum key distribution

    NASA Astrophysics Data System (ADS)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  6. Key factors impacting on diagnosis and treatment for vulvar cancer for Indigenous women: findings from Australia.

    PubMed

    McGrath, Pam; Rawson, Nicole

    2013-10-01

    To date, there has been limited research on the topic of vulvar cancer. This paper provides findings from a qualitative study conducted with Indigenous women in East Arnhem Land, Northern Territory, Australia on the psychosocial impact of diagnosis and treatment for vulvar cancer. The insights from the study outlined in this paper not only make a contribution to deepening our understanding of the experience of vulvar cancer for Indigenous women, but provide practical recommendations to ensure effective and early engagement for diagnosis and treatment. A qualitative research method was employed through in-depth, open-ended interviews. The participants of the study were a purposive sample of Indigenous women with the condition, health professionals, and Aboriginal health workers. There were a total of 40 participants; with twelve (n = 12) Indigenous women affected with the condition, fourteen (n = 14) Aboriginal Health Workers, ten (n = 10) nurses, three (n = 3) doctors, and one (n = 1) community member. This paper addresses three key issues highlighted by the participants which include the fact that the private nature of the disease makes the condition 'women's business', that there is a sense of shame associated with the condition, and that there is fear and worry generated by the seriousness of the condition. The private nature of the disease and the sense of shame associated with the condition impact upon the diagnosis and treatment for many Indigenous women. In addition, the limitation of resources for health service delivery for East Arnhem Land exacerbates the problems faced by these communities. This paper puts forward suggestions to facilitate early diagnosis and treatment for women affected with the condition.

  7. Side-channel-free quantum key distribution.

    PubMed

    Braunstein, Samuel L; Pirandola, Stefano

    2012-03-30

    Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.

  8. The RNA world in the 21st century-a systems approach to finding non-coding keys to clinical questions.

    PubMed

    Schmitz, Ulf; Naderi-Meshkin, Hojjat; Gupta, Shailendra K; Wolkenhauer, Olaf; Vera, Julio

    2016-05-01

    There was evidence that RNAs are a functionally rich class of molecules not only since the arrival of the next-generation sequencing technology. Non-coding RNAs (ncRNA) could be the key to accelerated diagnosis and enhanced prediction of disease and therapy outcomes as well as the design of advanced therapeutic strategies to overcome yet unsatisfactory approaches.In this review, we discuss the state of the art in RNA systems biology with focus on the application in the systems biomedicine field. We propose guidelines for analysing the role of microRNAs and long non-coding RNAs in human pathologies. We introduce RNA expression profiling and network approaches for the identification of stable and effective RNomics-based biomarkers, providing insights into the role of ncRNAs in disease regulation. Towards this, we discuss ways to model the dynamics of gene regulatory networks and signalling pathways that involve ncRNAs. We also describe data resources and computational methods for finding putative mechanisms of action of ncRNAs. Finally, we discuss avenues for the computer-aided design of novel RNA-based therapeutics. © The Author 2015. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  9. Laboratory findings in neurosyphilis patients with epileptic seizures alone as the initial presenting symptom.

    PubMed

    Tong, Man-Li; Liu, Li-Li; Zeng, Yan-Li; Zhang, Hui-Lin; Liu, Gui-Li; Zheng, Wei-Hong; Dong, Jie; Wu, Jing-Yi; Su, Yuan-Hui; Lin, Li-Rong; Yang, Tian-Ci

    2013-04-01

    A retrospective chart review was performed to characterize the clinical presentation, the characteristic combination of serologic and cerebrospinal fluid (CSF) abnormalities, and the neuroimaging findings of neurosyphilis (NS) patients who had epileptic seizures alone as an initial presenting symptom. In a 6.75-year period, 169 inpatients with NS were identified at Zhongshan Hospital (from June 2005 to February 2012). We demonstrated that 13 (7.7%) of the 169 NS patients had epileptic seizures alone as an initial presenting feature. Epileptic seizures occurred in NS patients with syphilitic meningitis (2 cases), meningovascular NS (5 cases), and general paresis (6 cases). The types of epileptic seizures included simple partial, complex partial with secondary generalization (including status epilepticus), and generalized seizures (no focal onset reported). Nine of NS patients with only epileptic seizures as primary symptom were misdiagnosed, and the original misdiagnosis was 69.23% (9/13). Ten (10/13, 76.9%) patients had an abnormal magnetic resonance imaging, and 7 (7/13 53.8%) patients had abnormal electroencephalogram recordings. In addition, the sera rapid plasma reagin (RPR) and Treponema pallidum particle agglutination (TPPA) from all 13 patients were positive. The overall positive rates of the CSF-RPR and CSF-TPPA were 61.5% and 69.2%, respectively. Three patients demonstrated CSF pleocytosis, and 9 patients exhibited elevated CSF protein levels. Therefore, NS with only epileptic seizures at the initial presentation exhibits a lack of specificity. It is recommended that every patient with clinically evident symptoms of epileptic seizures should have a blood test performed for syphilis. When the serology results are positive, all of the patients should undergo a CSF examination to diagnose NS. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. Hip and Lumbar Spine Physical Examination Findings in People Presenting With Low Back Pain, With or Without Lower Extremity Pain.

    PubMed

    Prather, Heidi; Cheng, Abby; Steger-May, Karen; Maheshwari, Vaibhav; Van Dillen, Linda

    2017-03-01

    Study Design Prospective cohort study, cross-sectional design. Background The hip-spine syndrome is described in patients with known arthritis of the hip. This study describes the hip examination findings of people presenting with low back pain (LBP). Objectives To (1) report examination findings of the hip in patients with LBP and (2) compare pain and function in patients with positive hip examination findings to those in patients without positive hip examination findings. Methods An examination and validated questionnaires of spine and hip pain and function were completed. Pain and function scores were compared between patients with and without positive hip findings. Results Consecutive patients (68 women, 33 men) with a mean age of 47.6 years (range, 18.4-79.8 years) participated. On physical examination, 81 (80%) had reduced hip flexion; 76 (75%) had reduced hip internal rotation; and 25 (25%) had 1, 32 (32%) had 2, and 23 (23%) had 3 positive provocative hip tests. Patients with reduced hip flexion had worse LBP-related (mean modified Oswestry Disability Index, 35.3 versus 25.6; P = .04) and hip-related function (mean modified Harris Hip Score, 66.0 versus 82.0; P = .03). Patients with reduced hip internal rotation had worse LBP-related function (mean Roland-Morris questionnaire, 12.4 versus 8.2; P = .003). A positive provocative hip test was coupled with more intense pain (median, 9 versus 7; P = .05) and worse LBP-related (mean Roland-Morris questionnaire, 12.1 versus 8.5; P = .02) and hip-related function (mean modified Harris Hip Score, 65.8 versus 89.7; P = .005). Conclusion Physical examination findings indicating hip dysfunction are common in patients presenting with LBP. Patients with LBP and positive hip examination findings have more pain and worse function compared to patients with LBP but without positive hip examination findings. Level of Evidence Symptom prevalence, level 1b. J Orthop Sports Phys Ther 2017;47(3):163-172. Epub 3 Feb 2017. doi:10

  11. Coordinating Council. Sixth Meeting: Who Are Our Key Users?

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This NASA Scientific and Technical Information Program Coordinating Council meeting deals with the topic 'Who are our key users?' Presentations were made on the following subtopics: Key users: Who uses the system the most, Who orders the most documents, Users: What do we know about them?, NASA/DOD Aerospace Knowledge Diffusion research project on 'Potential key users', How we meet the user's needs, and STI Council user requirements update. Summaries of discussions after the presentations are included along with visuals for the presentations.

  12. Key findings on legal and regulatory barriers to HIV testing and access to care across Europe.

    PubMed

    Power, L; Hows, J; Jakobsen, S F

    2018-02-01

    The aim of this work within OptTEST by HiE has been to demonstrate the role of legal and regulatory barriers in hindering access to HIV testing, treatment and care across Europe and to produce tools to help dismantle them. An online survey to assess country-specific data on legal and regulatory barriers distributed widely across the WHO Europe region. Literature reviews conducted in January-October 2015 in English, in November 2015 in Russian, and updated in April 2017. Semi-structured interviews were conducted with 25 key actors within the HIV field to feed into case studies and tip sheets on how to dismantle legal and regulatory barriers. More than 160 individuals and organisations from 49 countries across the WHO European region provided responses which were analysed and cross checked with other data sources and a searchable database produced (legalbarriers.peoplewithhiveurope.org). The conducted literature reviews yielded 88 papers and reports which identify legal and regulatory barriers to key populations' access to HV testing and care. Based on the interviews with key actors, ranging from PLHIV activists to government officials, on lessons-learned, a series of tip sheets and ten case studies were written-up intended to inform and inspire the HIV community to address and overcome existing barriers (opttest.eu/Tools). While some of the barriers identified may require major changes to wider health systems, or long term legal reform, many are open to a simple change in regulations or custom and practice. We have the tools. Why can't we finish the job? © 2018 British HIV Association.

  13. [A case of neuro-neutrophilic disease presenting with 5 months' with cognitive decline, meningoencephalitis, and marked systemic inflammatory findings, and diagnosed with brain biopsy].

    PubMed

    Ohe, Yasuko; Nakazato, Yoshihiko; Ishizawa, Keisuke; Deguchi, Ichiro; Tamura, Naotoshi; Araki, Nobuo

    2011-01-01

    A 63-year-old man was admitted to our hospital with cognitive decline. On admission, he had a fever and mild cognitive dysfunction, suggesting chronic meningoencephalitis. Apart from a mild increase in serum C-reactive protein level and marked neutrophilia, laboratory findings were unremarkable. Brain magnetic resonance (MR) imaging showed multiple small T2-hyperintense lesions in the white matter. Systemic evaluations for infectious organisms, autoantibodies, and malignancy were all negative. For 5 months we conducted therapeutic trials of various antibacterial, antifungal, and antituberculous drugs, but these were completely ineffective, and both meningoencephalitis and inflammatory signs persisted. Repeated brain MRI during the clinical course showed growth of the white matter lesions and progressive cerebral atrophy. C11-methionine positron emission tomography demonstrated a bright focus in the right frontal lobe, and this was biopsied. Key neuropathological findings were neutrophilic infiltration in the subarachnoid space and the frontal lobe without necrotic angiitis. These findings confirmed the diagnosis of neuro-neutrophilic disease, although skin tissue findings characteristic of Sweet disease and a B51, B54, or Cw1 HLA-profile were absent. After intravenous bolus administration of steroid and prolonged oral steroid therapy, fever and inflammatory signs diminished and cognitive symptoms improved.

  14. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Falk, Michael

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community. ?More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  15. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  16. External ophthalmomyiasis presenting to an emergency department: corneal findings as a sign of Oestrus ovis.

    PubMed

    Gholamhossein, Yaghoubi; Behrouz, Heydari

    2013-10-01

    This study aims to determine the frequency of opthalmyomyiasis externa and the ocular findings of disease in Southern Khorasan. All patients referred to the emergency department of Valiaser hospital during the year 2011 with external ophthalmomyiasis were enrolled in this study. The diagnosis of external ophthalmomyiasis was made according to clinical findings and the presence of Oestrus ovis larvae. There were 18 cases of external ophthalmomyiasis in the emergency department of Valiaser hospital in 2011. Most cases had the common signs and symptoms of allergic conjunctivitis, except for three males who were referred with respective complaints of red eye, foreign body sensation, and swelling around the eyelids after contact injury the previous day; corneal infiltration was present in three cases. The visual acuity among the three cases that had peripheral corneal involvement was 20 / 30 in both eyes. The bulbar conjunctiva showed chemosis in all cases and a ropy pattern discharge that was clinically compatible with external ophthalmomyiasis. However, in one case, microscopic slit lamp examination did not show Oestrus ovis larvae. The frequency of external ophthalmomyiasis was high in this region. Although external ophthalmomyiasis usually manifests as allergic conjunctivitis, coronary-like corneal infiltration may be considered in the differential diagnosis of external ophthalmomyiasis or toxic insult.

  17. External Ophthalmomyiasis Presenting to an Emergency Department: Corneal Findings as a Sign of Oestrus ovis

    PubMed Central

    Behrouz, Heydari

    2013-01-01

    Purpose This study aims to determine the frequency of opthalmyomyiasis externa and the ocular findings of disease in Southern Khorasan. Methods All patients referred to the emergency department of Valiaser hospital during the year 2011 with external ophthalmomyiasis were enrolled in this study. The diagnosis of external ophthalmomyiasis was made according to clinical findings and the presence of Oestrus ovis larvae. Results There were 18 cases of external ophthalmomyiasis in the emergency department of Valiaser hospital in 2011. Most cases had the common signs and symptoms of allergic conjunctivitis, except for three males who were referred with respective complaints of red eye, foreign body sensation, and swelling around the eyelids after contact injury the previous day; corneal infiltration was present in three cases. The visual acuity among the three cases that had peripheral corneal involvement was 20 / 30 in both eyes. The bulbar conjunctiva showed chemosis in all cases and a ropy pattern discharge that was clinically compatible with external ophthalmomyiasis. However, in one case, microscopic slit lamp examination did not show Oestrus ovis larvae. Conclusions The frequency of external ophthalmomyiasis was high in this region. Although external ophthalmomyiasis usually manifests as allergic conjunctivitis, coronary-like corneal infiltration may be considered in the differential diagnosis of external ophthalmomyiasis or toxic insult. PMID:24082771

  18. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  19. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  20. Proof-of-principle test of coherent-state continuous variable quantum key distribution through turbulent atmosphere (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Derkach, Ivan D.; Peuntinger, Christian; Ruppert, László; Heim, Bettina; Gunthner, Kevin; Usenko, Vladyslav C.; Elser, Dominique; Marquardt, Christoph; Filip, Radim; Leuchs, Gerd

    2016-10-01

    Continuous-variable quantum key distribution is a practical application of quantum information theory that is aimed at generation of secret cryptographic key between two remote trusted parties and that uses multi-photon quantum states as carriers of key bits. Remote parties share the secret key via a quantum channel, that presumably is under control of of an eavesdropper, and which properties must be taken into account in the security analysis. Well-studied fiber-optical quantum channels commonly possess stable transmittance and low noise levels, while free-space channels represent a simpler, less demanding and more flexible alternative, but suffer from atmospheric effects such as turbulence that in particular causes a non-uniform transmittance distribution referred to as fading. Nonetheless free-space channels, providing an unobstructed line-of-sight, are more apt for short, mid-range and potentially long-range (using satellites) communication and will play an important role in the future development and implementation of QKD networks. It was previously theoretically shown that coherent-state CV QKD should be in principle possible to implement over a free-space fading channel, but strong transmittance fluctuations result in the significant modulation-dependent channel excess noise. In this regime the post-selection of highly transmitting sub-channels may be needed, which can even restore the security of the protocol in the strongly turbulent channels. We now report the first proof-of-principle experimental test of coherent state CV QKD protocol using different levels Gaussian modulation over a mid-range (1.6-kilometer long) free-space atmospheric quantum channel. The transmittance of the link was characterized using intensity measurements for the reference but channel estimation using the modulated coherent states was also studied. We consider security against Gaussian collective attacks, that were shown to be optimal against CV QKD protocols . We assumed a

  1. Key Understandings in School Mathematics: 1

    ERIC Educational Resources Information Center

    Watson, Anne

    2010-01-01

    This article is the first in a series which draws on findings from Nunes, Watson and Bryant (2009): "Key understandings in school mathematics: a report to the Nuffield Foundation." The Nuffield report is soundly based on research about how children learn some of the concepts involved in mathematics. In this series of articles the author takes key…

  2. Key Understandings in School Mathematics: 3

    ERIC Educational Resources Information Center

    Watson, Anne

    2010-01-01

    This article is the third in a series which draws on findings from Nunes, Watson and Bryant (2009): "Key understandings in school mathematics: a report to the Nuffield Foundation". In this article the author focuses on what learners have to understand and learn in order to do secondary mathematics well in general terms. She is assuming a…

  3. Carcinosarcoma of the Extrahepatic Bile Duct Presenting with Stone-like Radiological Findings.

    PubMed

    Kumei, Shinsuke; Onishi, Yutaka; Ogura, Takeshi; Kusumoto, Chosei; Matsuno, Yasuko; Nishigami, Takashi; Maeda, Mitsuo; Harada, Masaru

    2015-01-01

    A 73-year-old woman was referred to our hospital due to epigastralgia and jaundice. The radiological findings showed a stone-like tumor in the extrahepatic bile duct. The patient was initially thought to have adenocarcinoma of the bile duct based on the findings of a pathological examination of the bile duct biopsy specimen and underwent pancreaticoduodenectomy; the final diagnosis of the lesion was so-called carcinosarcoma of the extrahepatic bile duct. She died of liver metastasis six months after the surgery. This case suggests that surgical resection is not adequate for achieving a radical cure, and the optimal treatment for extrahepatic bile duct carcinosarcoma should be established immediately.

  4. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  5. Old Wine in New Skins: The Sensitivity of Established Findings to New Methods

    ERIC Educational Resources Information Center

    Foster, E. Michael; Wiley-Exley, Elizabeth; Bickman, Leonard

    2009-01-01

    Findings from an evaluation of a model system for delivering mental health services to youth were reassessed to determine the robustness of key findings to the use of methodologies unavailable to the original analysts. These analyses address a key concern about earlier findings--that the quasi-experimental design involved the comparison of two…

  6. Preschool Inclusion: Key Findings from Research and Implications for Policy

    ERIC Educational Resources Information Center

    Lawrence, Sharmila; Smith, Sheila; Banerjee, Rashida

    2016-01-01

    A recent policy statement issued by the U.S. Department of Health and Human Services (HHS) and U.S. Department of Education (DOE) on early childhood inclusion presents extensive recommendations for state and local actions that could improve young children's access to high quality inclusive early childhood programs (HHS/DOE, 2015). This brief…

  7. How to Find HIV Treatment Services

    MedlinePlus

    ... Clinical Trials Apps skip to content Living with HIV Home Understanding HIV/AIDS Fact Sheets How to ... ET) Send us an email How to Find HIV Treatment Services Last Reviewed: December 6, 2017 Key ...

  8. Finding and Developing Moderators and Directional Keys by Regression Analysis.

    ERIC Educational Resources Information Center

    Kokosh, John

    A procedure for rapid screening of variables as potential moderators is presented and discussed. A moderator is defined as any variable which can be used to identify differentially predictable persons; or defined statistically by stating that if a predictor and a moderator are each divided into three or more categories and used as independent…

  9. New national curricula guidelines that support the use of interprofessional education in the Brazilian context: An analysis of key documents.

    PubMed

    Freire Filho, José Rodrigues; Viana Da Costa, Marcelo; Forster, Aldaísa Cassanho; Reeves, Scott

    2017-11-01

    The National Curricular Guidelines (NCGs) are important documents for understanding the history of academic health professions education in Brazil. Key policies within the NCGs have helped to reorient health professions education and have stimulated curricular changes, including active learning methodologies and more integrated teaching-service environments, and, more recently, have introduced interprofessional education (IPE) in both undergraduate and postgraduate sectors. This article presents the findings of a study that examined the NCGs for nursing, dentistry, and medicine courses as juridical foundations for adopting strategies that promote IPE across higher education institutions in Brazil. We employed a comparative and exploratory documentary analysis to understand the role of IPE and collaborative practices in NCGs for the three largest professions in Brazil. Following a thematic analysis of these texts, four key themes emerged: faculty development; competencies for teamwork; curricular structure; and learning metrics. Key findings related to each of these themes are presented and discussed in relation to the wider interprofessional literature. The article goes on to argue that the statements contained in the NCGs about adoption of IPE and collaborative practices will have an important influence in shaping the future of health professions education in Brazil.

  10. Security of Distributed-Phase-Reference Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Moroder, Tobias; Curty, Marcos; Lim, Charles Ci Wen; Thinh, Le Phuc; Zbinden, Hugo; Gisin, Nicolas

    2012-12-01

    Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.

  11. Multiple Paths to Mathematics Practice in Al-Kashi's Key to Arithmetic

    NASA Astrophysics Data System (ADS)

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his Key to Arithmetic, a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life and his contributions to mathematics and astronomy. Section 2 starts with a brief discussion of the contents and pedagogy of the Key to Arithmetic. Al-Kashi's multiple approaches are discussed through four different examples of his versatility in presenting a topic from multiple perspectives. These examples are multiple definitions, multiple algorithms, multiple formulas, and multiple methods for solving word problems. Section 3 is devoted to some benefits that can be gained by implementing al-Kashi's multiple paths approach in modern curricula. For this discussion, examples from two teaching modules taken from the Key to Arithmetic and implemented in Pre-Calculus and mathematics courses for preservice teachers are discussed. Also, the conclusions are supported by some aspects of these modules. This paper is an attempt to help mathematics educators explore more benefits from reading from original sources.

  12. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  13. Presenting symptoms and clinical findings in HPV-positive and HPV-negative oropharyngeal cancer patients.

    PubMed

    Carpén, Timo; Sjöblom, Anni; Lundberg, Marie; Haglund, Caj; Markkola, Antti; Syrjänen, Stina; Tarkkanen, Jussi; Mäkitie, Antti; Hagström, Jaana; Mattila, Petri

    2018-05-01

    Oropharyngeal squamous cell carcinoma (OPSCC) is divided in two different disease entities depending on HPV involvement. We investigated differences in presenting symptoms and clinical findings in patients with HPV-positive and -negative OPSCC tumors. Altogether 118 consecutive patients diagnosed with primary OPSCC between 2012 and 2014 at the Helsinki University Hospital were included. HPV-status of the tumors was assessed by PCR detection of HPV DNA and immunostaining with p16-INK4a antibody. Fifty-one (47.7%) of the patients had HPV-positive and 56 (52.3%) HPV-negative tumors. Forty-nine (49/51, 96.1%) of the HPV+ tumors were also p16+ showing high concordance. The most common presenting symptom among HPV+/p16+ patients was a neck mass (53.1%), whereas any sort of pain in the head and neck area was more frequently related to the HPV-/p16- (60.0%) group. HPV+/p16+ tumors had a tendency to locate in the tonsillar complex and more likely had already spread into regional lymph nodes compared with HPV-/p16- tumors. Smoking and heavy alcohol consumption were significantly more common among HPV-/p16- patients but also rather common among HPV+/p16+ patients. This analysis of symptoms and signs confirm that OPSCC can be dichotomized in two distinct disease entities as defined by HPV status.

  14. Artificial neural networks: Predicting head CT findings in elderly patients presenting with minor head injury after a fall.

    PubMed

    Dusenberry, Michael W; Brown, Charles K; Brewer, Kori L

    2017-02-01

    To construct an artificial neural network (ANN) model that can predict the presence of acute CT findings with both high sensitivity and high specificity when applied to the population of patients≥age 65years who have incurred minor head injury after a fall. An ANN was created in the Python programming language using a population of 514 patients ≥ age 65 years presenting to the ED with minor head injury after a fall. The patient dataset was divided into three parts: 60% for "training", 20% for "cross validation", and 20% for "testing". Sensitivity, specificity, positive and negative predictive values, and accuracy were determined by comparing the model's predictions to the actual correct answers for each patient. On the "cross validation" data, the model attained a sensitivity ("recall") of 100.00%, specificity of 78.95%, PPV ("precision") of 78.95%, NPV of 100.00%, and accuracy of 88.24% in detecting the presence of positive head CTs. On the "test" data, the model attained a sensitivity of 97.78%, specificity of 89.47%, PPV of 88.00%, NPV of 98.08%, and accuracy of 93.14% in detecting the presence of positive head CTs. ANNs show great potential for predicting CT findings in the population of patients ≥ 65 years of age presenting with minor head injury after a fall. As a good first step, the ANN showed comparable sensitivity, predictive values, and accuracy, with a much higher specificity than the existing decision rules in clinical usage for predicting head CTs with acute intracranial findings. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Academic Primer Series: Key Papers About Competency-Based Medical Education.

    PubMed

    Cooney, Robert; Chan, Teresa M; Gottlieb, Michael; Abraham, Michael; Alden, Sylvia; Mongelluzzo, Jillian; Pasirstein, Michael; Sherbino, Jonathan

    2017-06-01

    Competency-based medical education (CBME) presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Based on the online discussions of the 2016-2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs.

  16. Academic Primer Series: Key Papers About Competency-Based Medical Education

    PubMed Central

    Cooney, Robert; Chan, Teresa M.; Gottlieb, Michael; Abraham, Michael; Alden, Sylvia; Mongelluzzo, Jillian; Pasirstein, Michael; Sherbino, Jonathan

    2017-01-01

    Introduction Competency-based medical education (CBME) presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Methods Based on the online discussions of the 2016–2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Results Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. Conclusion We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs. PMID:28611893

  17. Presentation Anxiety Analysis: Comparing Face-to-Face Presentations and Webinars

    ERIC Educational Resources Information Center

    Campbell, Scott

    2015-01-01

    This study is an exploration in the changing landscape of how people deliver presentations in an attempt to determine the advantages and disadvantages of both forms. The study focused on key differences of student expectations and experiences delivering a presentation to an audience in the same location (face-to-face) compared to a presentation…

  18. Electrocardiographic Findings in Patients With Acute Coronary Syndrome Presenting With Out-of-Hospital Cardiac Arrest.

    PubMed

    Sarak, Bradley; Goodman, Shaun G; Brieger, David; Gale, Chris P; Tan, Nigel S; Budaj, Andrzej; Wong, Graham C; Huynh, Thao; Tan, Mary K; Udell, Jacob A; Bagai, Akshay; Fox, Keith A A; Yan, Andrew T

    2018-02-01

    We sought to characterize presenting electrocardiographic findings in patients with acute coronary syndromes (ACSs) and out-of-hospital cardiac arrest (OHCA). In the Global Registry of Acute Coronary Events and Canadian ACS Registry I, we examined presenting and 24- to 48-hour follow-up ECGs (electrocardiogram) of ACS patients who survived to hospital admission, stratified by presentation with OHCA. We assessed the prevalence of ST-segment deviation and bundle branch blocks (assessed by an independent ECG core laboratory) and their association with in-hospital and 6-month mortality among those with OHCA. Of the 12,040 ACS patients, 215 (1.8%) survived to hospital admission after OHCA. Those with OHCA had higher presenting rates of ST-segment elevation, ST-segment depression, T-wave inversion, precordial Q-waves, left bundle branch block (LBBB), and right bundle branch block (RBBB) than those without. Among patients with OHCA, those with ST-segment elevation had significantly lower in-hospital mortality (20.9% vs 33.0%, p = 0.044) and a trend toward lower 6-month mortality (27% vs 39%, p = 0.060) compared with those without ST-segment elevation. Conversely, among OCHA patients, LBBB was associated with significantly higher in-hospital and 6-month mortality rates (58% vs 22%, p <0.001, and 65% vs 28%, p <0.001, respectively). ST-segment depression and RBBB were not associated with either outcome. Sixty-three percent of bundle branch blocks (RBBB or LBBB) on the presenting ECG resolved by 24 to 48 hours. In conclusion, compared with ACS patients without cardiac arrest, those with OHCA had higher rates of ST-segment elevation, LBBB, and RBBB on admission. Among OHCA patients, ST-segment elevation was associated with lower in-hospital mortality, whereas LBBB was associated with higher in-hospital and 6-month mortality. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Diagnostic accuracy of the clinical and CT findings for differentiating Kikuchi's disease and tuberculous lymphadenitis presenting with cervical lymphadenopathy.

    PubMed

    Baek, Hye Jin; Lee, Jeong Hyun; Lim, Hyun Kyung; Lee, Ha Young; Baek, Jung Hwan

    2014-11-01

    To determine the optimal clinical and CT findings for differentiating Kikuchi's disease (KD) and tuberculous lymphadenitis (TB) in patients presenting with cervical lymphadenopathy. From 2006 to 2010, 87 consecutive patients who were finally diagnosed with KD or TB were enrolled. Two radiologists performed independent analysis of contrast-enhanced neck CT images with regard to the involvement pattern, nodal or perinodal changes, and evidence of the previous infection. Significant clinical and CT findings of KD were determined by statistical analyses. Of the 87 patients, 27 (31%) were classified as having KD and 60 (69%) as having TB. Statistically significant findings of KD patients were younger age, presence of fever, involvement of ≥5 nodal levels or the bilateral neck, no or minimal nodal necrosis, marked perinodal infiltration, and no evidence of upper lung lesion or mediastinal lymphadenopathy. The presence of four or more statistically significant clinical and CT findings of KD had the largest area under the receiver-operating characteristic curve (A z = 0.861; 95% confidence intervals 0.801, 0.909), with a sensitivity of 89% and specificity of 83%. CT can be a helpful tool for differentiating KD from TB, especially when it is combined with the clinical findings.

  20. Word-finding difficulty: a clinical analysis of the progressive aphasias

    PubMed Central

    Rohrer, Jonathan D.; Knight, William D.; Warren, Jane E.; Fox, Nick C.; Rossor, Martin N.; Warren, Jason D.

    2008-01-01

    The patient with word-finding difficulty presents a common and challenging clinical problem. The complaint of ‘word-finding difficulty’ covers a wide range of clinical phenomena and may signify any of a number of distinct pathophysiological processes. Although it occurs in a variety of clinical contexts, word-finding difficulty generally presents a diagnostic conundrum when it occurs as a leading or apparently isolated symptom, most often as the harbinger of degenerative disease: the progressive aphasias. Recent advances in the neurobiology of the focal, language-based dementias have transformed our understanding of these processes and the ways in which they breakdown in different diseases, but translation of this knowledge to the bedside is far from straightforward. Speech and language disturbances in the dementias present unique diagnostic and conceptual problems that are not fully captured by classical models derived from the study of vascular and other acute focal brain lesions. This has led to a reformulation of our understanding of how language is organized in the brain. In this review we seek to provide the clinical neurologist with a practical and theoretical bridge between the patient presenting with word-finding difficulty in the clinic and the evidence of the brain sciences. We delineate key illustrative speech and language syndromes in the degenerative dementias, compare these syndromes with the syndromes of acute brain damage, and indicate how the clinical syndromes relate to emerging neurolinguistic, neuroanatomical and neurobiological insights. We propose a conceptual framework for the analysis of word-finding difficulty, in order both better to define the patient's complaint and its differential diagnosis for the clinician and to identify unresolved issues as a stimulus to future work. PMID:17947337

  1. A Reporting System to Protect the Human Rights of People Living with HIV and Key Populations.

    PubMed

    Williamson, R Taylor; Fiscian, Vivian; Olson, Ryan Ubuntu; Poku, Fred Nana; Whittal, Joseph

    2017-12-01

    People living with HIV and key populations face human rights violations that affect their access to health services, relationships in their communities, housing options, and employment. To address these violations, government and civil society organizations in Ghana developed a discrimination reporting system managed by the Commission on Human Rights and Administrative Justice that links people living with HIV and key populations to legal services. This article presents findings on how Ghanaian stakeholders built this reporting system and discusses preliminary data on its impact. To organize our analysis, we used a conceptual framework that outlines the legal frameworks that protect human rights, the institutions that promote access to justice, and the mechanisms that link people living with HIV and key populations to legal services. Using in-depth interviews, we show that targeted technical assistance increased stakeholders' knowledge of issues that affect people living with HIV and key populations, strengthened these stakeholders' commitment to address discrimination, streamlined case management systems, and improved relationships between civil society and the government. Through case review, we find that most discrimination happens when accessing government services, inside communities and families, and in the workplace. Finally, we describe implications for other human rights commissions that are considering using a reporting system to protect human rights, including using legal frameworks, developing case management systems, and working with civil society.

  2. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  3. On Robust Key Agreement Based on Public Key Authentication

    NASA Astrophysics Data System (ADS)

    Hao, Feng

    We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.

  4. Finding-specific display presets for computed radiography soft-copy reading.

    PubMed

    Andriole, K P; Gould, R G; Webb, W R

    1999-05-01

    Much work has been done to optimize the display of cross-sectional modality imaging examinations for soft-copy reading (i.e., window/level tissue presets, and format presentations such as tile and stack modes, four-on-one, nine-on-one, etc). Less attention has been paid to the display of digital forms of the conventional projection x-ray. The purpose of this study is to assess the utility of providing presets for computed radiography (CR) soft-copy display, based not on the window/level settings, but on processing applied to the image optimized for visualization of specific findings, pathologies, etc (i.e., pneumothorax, tumor, tube location). It is felt that digital display of CR images based on finding-specific processing presets has the potential to: speed reading of digital projection x-ray examinations on soft copy; improve diagnostic efficacy; standardize display across examination type, clinical scenario, important key findings, and significant negatives; facilitate image comparison; and improve confidence in and acceptance of soft-copy reading. Clinical chest images are acquired using an Agfa-Gevaert (Mortsel, Belgium) ADC 70 CR scanner and Fuji (Stamford, CT) 9000 and AC2 CR scanners. Those demonstrating pertinent findings are transferred over the clinical picture archiving and communications system (PACS) network to a research image processing station (Agfa PS5000), where the optimal image-processing settings per finding, pathologic category, etc, are developed in conjunction with a thoracic radiologist, by manipulating the multiscale image contrast amplification (Agfa MUSICA) algorithm parameters. Soft-copy display of images processed with finding-specific settings are compared with the standard default image presentation for 50 cases of each category. Comparison is scored using a 5-point scale with the positive scale denoting the standard presentation is preferred over the finding-specific processing, the negative scale denoting the finding

  5. Necessary detection efficiencies for secure quantum key distribution and bound randomness

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul

    2016-01-01

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.

  6. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  7. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  8. Multimodal fusion of brain imaging data: A key to finding the missing link(s) in complex mental illness.

    PubMed

    Calhoun, Vince D; Sui, Jing

    2016-05-01

    It is becoming increasingly clear that combining multi-modal brain imaging data is able to provide more information for individual subjects by exploiting the rich multimodal information that exists. However, the number of studies that do true multimodal fusion (i.e. capitalizing on joint information among modalities) is still remarkably small given the known benefits. In part, this is because multi-modal studies require broader expertise in collecting, analyzing, and interpreting the results than do unimodal studies. In this paper, we start by introducing the basic reasons why multimodal data fusion is important and what it can do, and importantly how it can help us avoid wrong conclusions and help compensate for imperfect brain imaging studies. We also discuss the challenges that need to be confronted for such approaches to be more widely applied by the community. We then provide a review of the diverse studies that have used multimodal data fusion (primarily focused on psychosis) as well as provide an introduction to some of the existing analytic approaches. Finally, we discuss some up-and-coming approaches to multi-modal fusion including deep learning and multimodal classification which show considerable promise. Our conclusion is that multimodal data fusion is rapidly growing, but it is still underutilized. The complexity of the human brain coupled with the incomplete measurement provided by existing imaging technology makes multimodal fusion essential in order to mitigate against misdirection and hopefully provide a key to finding the missing link(s) in complex mental illness.

  9. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  10. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  11. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  12. Slips of the Typewriter Key.

    ERIC Educational Resources Information Center

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  13. Multiparty quantum key agreement with single particles

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  14. Findings from the Medicaid Competition Demonstrations: A guide for States

    PubMed Central

    Heinen, LuAnn; Fox, Peter D.; Anderson, Maren D.

    1990-01-01

    The Medicaid Competition Demonstrations were initiated in 1983-84 in six States (California, Florida, Minnesota, Missouri, New Jersey, and New York). State experiences in implementing the demonstrations are presented in this article. Although problems of enrolling Medicaid recipients in prepaid plans or with primary care case managers under these demonstrations proved challenging to States, lessons were learned in three key areas: program design and administration, health plan and provider relations, and beneficiary acceptance. Therefore, States considering similar programs in the future could benefit from these findings. PMID:10113403

  15. Non-unique key B-Tree implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ries, D.R.

    1980-12-23

    The B-Trees are an indexed method to allow fast retrieval and order preserving updates to a FRAMIS relation based on a designated set of keys in the relation. A B-Tree access method is being implemented to provide indexed and sequential (in index order) access to FRAMIS relations. The implementation modifies the basic B-Tree structure to correctly allow multiple key values and still maintain the balanced page fill property of B-Trees. The data structures of the B-Tree are presented first, including the FRAMIS solution to the duplicate key value problem. Then the access level routines and utilities are presented. These routinesmore » include the original B-Tree creation; searching the B-Tree; and inserting, deleting, and replacing tuples on the B-Tree. In conclusion, the uses of the B-Tree access structures at the semantic level to enhance the FRAMIS performance are discussed. 10 figures.« less

  16. Radiologic-pathologic findings of solitary fibrous tumor of the prostate presenting as a large mass with delayed filling-in on MRI.

    PubMed

    Bhargava, Puneet; Lee, Jean Hwa; Gupta, Saurabh; Seyal, Adeel Rahim; Vakar-Lopez, Funda; Moshiri, Mariam; Dighe, Manjiri Kiran

    2012-01-01

    We report a case of a solitary fibrous tumor of prostate presenting with urinary retention and a large prostate mass. We describe the clinical presentation, magnetic resonance imaging findings, and histopathology of this rare, benign tumor. Although clinical and radiologic appearances embrace various differential diagnoses including sarcoma, this mass was confirmed by histologic analysis following surgical resection. We report this rare, benign tumor to help the radiologist suggest the diagnosis when presented with a similar case.

  17. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  18. Efficient key pathway mining: combining networks and OMICS data.

    PubMed

    Alcaraz, Nicolas; Friedrich, Tobias; Kötzing, Timo; Krohmer, Anton; Müller, Joachim; Pauling, Josch; Baumbach, Jan

    2012-07-01

    Systems biology has emerged over the last decade. Driven by the advances in sophisticated measurement technology the research community generated huge molecular biology data sets. These comprise rather static data on the interplay of biological entities, for instance protein-protein interaction network data, as well as quite dynamic data collected for studying the behavior of individual cells or tissues in accordance with changing environmental conditions, such as DNA microarrays or RNA sequencing. Here we bring the two different data types together in order to gain higher level knowledge. We introduce a significantly improved version of the KeyPathwayMiner software framework. Given a biological network modelled as a graph and a set of expression studies, KeyPathwayMiner efficiently finds and visualizes connected sub-networks where most components are expressed in most cases. It finds all maximal connected sub-networks where all nodes but k exceptions are expressed in all experimental studies but at most l exceptions. We demonstrate the power of the new approach by comparing it to similar approaches with gene expression data previously used to study Huntington's disease. In addition, we demonstrate KeyPathwayMiner's flexibility and applicability to non-array data by analyzing genome-scale DNA methylation profiles from colorectal tumor cancer patients. KeyPathwayMiner release 2 is available as a Cytoscape plugin and online at http://keypathwayminer.mpi-inf.mpg.de.

  19. Tectonic history of Sweetgrass Arch, Montana and Alberta-key to finding new hydrocarbons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shepard, W. Shepard, B.

    1985-05-01

    The Sweetgrass arch of northwestern Montana and southern Alberta is a major ancient structural feature. Initial anticlinal emplacement occurred during the early Paleozoic and was parallel with the cratonic margin. Strong uplift followed by peneplanation occurred during the Late Jurassic and basal Cretaceous during the westward drifting of the North American plate following the breakup of Pangea. During Cretaceous and early Tertiary times, the Sweetgrass arch was quiescent, but was rejuvenated in mid to late Tertiary, upwarped by a basement flexure to its present structural configuration: a 200 mi (322 km) long, north-plunging anticline showing 10,000 ft (350 m) ofmore » structural relief. Midway down its plunge, the anticline is offset 30 mi (48 km) by a right-lateral transcurrent fault. During Late Cretaceous and early Tertiary, plutonic uplifts were emplaced on the east flank, forming traps for oil then migrating updip from the Williston and Alberta basins. Oil and gas accumulated in Mississippian, Jurassic, and basal Cretaceous reservoirs in structural and stratigraphic traps around these plutonic uplifts. Subsequent late Tertiary doming of the Sweetgrass arch tilted the earlier structural traps and drained them, resulting in remigration of much of the oil and gas to the crest of the arch. The tilting failed to destroy many of the stratigraphic traps. As a result, down the flanks of the Sweetgrass arch are many frozen stratigraphic traps including Cut Bank field, the largest single-pay stratigraphic trap in the north Rockies. On the crest are large structure accumulations of remigrated oil at Kevin Sunburst and Pondera. Evidence of remigration is recorded by live oil show tracks in the reservoirs and remnant gas caps throughout the area of earlier accumulations. A potential exists for finding new frozen traps on the flanks and remigrated oil accumulations on or near the crest of the Sweetgrass arch.« less

  20. Cardiomyopathy in Boxer dogs: a retrospective study of the clinical presentation, diagnostic findings and survival.

    PubMed

    Palermo, Valentina; Stafford Johnson, Michael J; Sala, Elisabetta; Brambilla, Paola G; Martin, Mike W S

    2011-03-01

    To retrospectively compare and contrast the clinical presentation, diagnostic findings and survival in Boxer dogs with cardiomyopathy, with or without left ventricular (LV) systolic failure. Medical records of Boxers referred between 1993 and 2008 in which a diagnosis of ventricular arrhythmias and/or cardiomyopathy was made, were reviewed. Dogs were divided into two groups according to their left ventricular (LV) systolic diameter, group A normal (20 dogs) or group B dilated (59 dogs). Dogs in group A had a better outcome than dogs in group B (median survival time of 124 and 17 weeks respectively, p < 0.001). In group B, dogs with a history of collapse had a worse outcome (median survival time of 10 weeks) compared with dogs not showing collapse (median survival time 24 weeks) (p = 0.031). The majority of dogs, in this UK study, presented with the myocardial dysfunction form of the disease, with LV dilation and congestive heart failure signs. The prognosis was worse in dogs with LV dilation compared to dogs with a normal LV and ventricular arrhythmias. In the Boxers with LV dilation, dogs with collapse had a worse prognosis than those without. Copyright © 2011 Elsevier B.V. All rights reserved.

  1. Sea snakes in Australian waters (Serpentes: subfamilies Hydrophiinae and Laticaudinae)--a review with an updated identification key.

    PubMed

    Rasmussen, Arne Redsted; Sanders, Kate Laura; Guinea, Michael L; Amey, Andrew P

    2014-10-02

    Sea snakes (Elapidae, subfamilies Hydrophiinae and Laticaudinae) reach high species richness in the South China Sea and in the Australian region; however, most countries in the two regions still lack up-to-date checklists and identification tools for these snakes. We present an updated reviewed checklist and a new complete identification key to sea snakes in Australian waters. The identification key includes 29 species documented and 4 possibly occurring taxa and is based mostly on easy-to-use external characters. We find no evidence for breeding populations of Laticauda in Australian waters, but include the genus on the list of possibly occurring taxa. 

  2. Vegetation of Eurasia from the last glacial maximum to present: Key biogeographic patterns

    NASA Astrophysics Data System (ADS)

    Binney, Heather; Edwards, Mary; Macias-Fauria, Marc; Lozhkin, Anatoly; Anderson, Patricia; Kaplan, Jed O.; Andreev, Andrei; Bezrukova, Elena; Blyakharchuk, Tatiana; Jankovska, Vlasta; Khazina, Irina; Krivonogov, Sergey; Kremenetski, Konstantin; Nield, Jo; Novenko, Elena; Ryabogina, Natalya; Solovieva, Nadia; Willis, Kathy; Zernitskaya, Valentina

    2017-02-01

    Continental-scale estimates of vegetation cover, including land-surface properties and biogeographic trends, reflect the response of plant species to climate change over the past millennia. These estimates can help assess the effectiveness of simulations of climate change using forward and inverse modelling approaches. With the advent of transient and contiguous time-slice palaeoclimate simulations, vegetation datasets with similar temporal qualities are desirable. We collated fossil pollen records for the period 21,000-0 cal yr BP (kyr cal BP; calibrated ages) for Europe and Asia north of 40°N, using extant databases and new data; we filtered records for adequate dating and sorted the nomenclature to conform to a consistent yet extensive taxon list. From this database we extracted pollen spectra representing 1000-year time-slices from 21 kyr cal BP to present and used the biomization approach to define the most likely vegetation biome represented. Biomes were mapped for the 22 time slices, and key plant functional types (PFTs, the constituents of the biomes) were tracked though time. An error matrix and index of topographic complexity clearly showed that the accuracy of pollen-based biome assignments (when compared with modern vegetation) was negatively correlated with topographic complexity, but modern vegetation was nevertheless effectively mapped by the pollen, despite moderate levels of misclassification for most biomes. The pattern at 21 ka is of herb-dominated biomes across the whole region. From the onset of deglaciation (17-18 kyr cal BP), some sites in Europe record forest biomes, particularly the south, and the proportion of forest biomes gradually increases with time through 14 kyr cal BP. During the same period, forest biomes and steppe or tundra biomes are intermixed across the central Asian mountains, and forest biomes occur in coastal Pacific areas. These forest biome occurrences, plus a record of dated plant macrofossils, indicate that some tree

  3. Key Frame Extraction in the Summary Space.

    PubMed

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  4. Music performance and the perception of key.

    PubMed

    Thompson, W F; Cuddy, L L

    1997-02-01

    The effect of music performance on perceived key movement was examined. Listeners judged key movement in sequences presented without performance expression (mechanical) in Experiment 1 and with performance expression in Experiment 2. Modulation distance varied. Judgments corresponded to predictions based on the cycle of fifths and toroidal models of key relatedness, with the highest correspondence for performed versions with the toroidal model. In Experiment 3, listeners compared mechanical sequences with either performed sequences or modifications of performed sequences. Modifications preserved expressive differences between chords, but not between voices. Predictions from Experiments 1 and 2 held only for performed sequences, suggesting that differences between voices are informative of key movement. Experiment 4 confirmed that modifications did not disrupt musicality. Analyses of performances further suggested a link between performance expression and key.

  5. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    PubMed

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  6. Attacks on quantum key distribution protocols that employ non-ITS authentication

    NASA Astrophysics Data System (ADS)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  7. Memory for melody and key in childhood.

    PubMed

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  8. Key Findings of AAP Store Survey

    ERIC Educational Resources Information Center

    Melendes, Bob; And Others

    1977-01-01

    Results of the Association of American Publishers "College Bookstore Marketing Survey" in the fall of 1976 are summarized. The intent was to improve college textbook publisher services to college stores in the areas of order fulfillment, publication scheduling, print quantities, shipping, billing, and processing of returns. (LBH)

  9. Effective radiology dashboards: key research findings.

    PubMed

    Karami, Mahtab; Safdari, Reza; Rahimi, Azin

    2013-01-01

    Innovative organizations have access to information for business intelligence through the objectives displayed in dashboards. In healthcare organizations, where the goal is to improve quality of care along with reducing costs, the radiology department is important from both financial and clinical aspects. Therefore, how to manage this department has critical impact on the effectiveness and efficiency of the organization. Today, since the information in this department not only has different data structure but also is gathered from different data sources, a well defined, comprehensive dashboard can be an effective tool to enhance performance.

  10. Multimodal fusion of brain imaging data: A key to finding the missing link(s) in complex mental illness

    PubMed Central

    Calhoun, Vince D; Sui, Jing

    2016-01-01

    It is becoming increasingly clear that combining multi-modal brain imaging data is able to provide more information for individual subjects by exploiting the rich multimodal information that exists. However, the number of studies that do true multimodal fusion (i.e. capitalizing on joint information among modalities) is still remarkably small given the known benefits. In part, this is because multi-modal studies require broader expertise in collecting, analyzing, and interpreting the results than do unimodal studies. In this paper, we start by introducing the basic reasons why multimodal data fusion is important and what it can do, and importantly how it can help us avoid wrong conclusions and help compensate for imperfect brain imaging studies. We also discuss the challenges that need to be confronted for such approaches to be more widely applied by the community. We then provide a review of the diverse studies that have used multimodal data fusion (primarily focused on psychosis) as well as provide an introduction to some of the existing analytic approaches. Finally, we discuss some up-and-coming approaches to multi-modal fusion including deep learning and multimodal classification which show considerable promise. Our conclusion is that multimodal data fusion is rapidly growing, but it is still underutilized. The complexity of the human brain coupled with the incomplete measurement provided by existing imaging technology makes multimodal fusion essential in order to mitigate against misdirection and hopefully provide a key to finding the missing link(s) in complex mental illness. PMID:27347565

  11. Autoshaping as a function of prior food presentations.

    PubMed

    Downing, K; Neuringer, A

    1976-11-01

    Young chickens were given 1, 10, 100, or 1000 presentations of grain in a hopper. Subsequently, the key was illuminated before each presentation of grain to study autoshaping of the key-peck response. The number of keylight-grain pairings before a bird first pecked the lighted key was found to be a U-shaped function of the number of prior food-only presentations, with pecks occurring significantly sooner after 100 food-only trials than after any of the other values. Two of five chicks at the 100-trial value pecked on the first illumination of the key. Experiment II showed further that when a series of food-only trials (no keylight) preceded keylight-only trials (no food) 30% of the chicks pecked the illuminated key. Experiment III extended the generality of first-trial pecking to pigeons. After preliminary training with food-only, two of five pigeons pecked on the first illumination of a key. The results suggest a close relationship between autoshaping and pseudo-conditioning.

  12. Finding Your Scientific Voice - Theatre Techniques for Physicists

    NASA Astrophysics Data System (ADS)

    Dreyer-Lude, Melanie

    Research talks can be dull. Scientists may be making important, ground-breaking discoveries, but their audience is often missing the message. Whether presenting a conference talk, pitching a congressman for funding, or participating in a job interview, scientists must learn how to tell their stories. Conducting research and talking about that research are separate skill sets. The curse of knowledge, too much information, or the inability to speak and move properly may all be standing in the way of turning a talk into a memorable event. Building on initiatives like those of the Alan Alda Center and Bruce Greenes theatrical productions, our workshop helps researchers connect performing skills to the reality of presenting complex research subjects. This talk reviews key aspects of the Finding Your Scientific Voice workshop. Using digital recordings of pre and post workshop presentations, we will demonstrate what is exceptional about our workshop process and how it uses theatrical tools like Great Beginnings, the Dramatic Arc, the Core Message and Strong Endings to transform a humdrum presentation into a dynamic speaking event.

  13. Fully device-independent conference key agreement

    NASA Astrophysics Data System (ADS)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  14. Computed tomography findings in young children with minor head injury presenting to the emergency department greater than 24h post injury.

    PubMed

    Gelernter, Renana; Weiser, Giora; Kozer, Eran

    2018-01-01

    Large studies which developed decision rules for the use of Computed tomography (CT) in children with minor head trauma excluded children with late presentation (more than 24h). To assess the prevalence of significant traumatic brain injury (TBI) on CT in infants with head trauma presenting to the emergency department (ED) more than 24h from the injury. A retrospective chart review of infants less than 24 months old referred for head CT because of traumatic brain injury from January 2004 to December 2014 in Assaf-Harofeh medical center was conducted. We used the PECARN definitions of TBI on CT to define significant CT findings. 344 cases were analyzed, 68 with late presentation. There was no significant difference in the age between children with late and early presentation (mean 11.4 (SD 5.6) month vs 10. 5 (SD 7.0) month, P=0.27). There was no significant difference between the groups in the incidence of significant TBI (22% vs 19%, p=0.61). Any TBI on CT (e.g. fracture) was found in 43 (63%) patients with late presentation compared with 116 (42%) patients with early presentation (p=0.002, OR 2.37, 95% CI 1.37-4.1). A similar rate of CT-identified traumatic brain injury was detected in both groups.‏ There was no significant difference in the incidence of significant TBI on CT between the groups.‏ Young children presenting to the ED more than 24 hours after the injury may have abnormal findings on CT. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Autoshaping of key pecking in pigeons with negative reinforcement.

    PubMed

    Rachlin, H

    1969-07-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key.

  16. Modelling efforts needed to advance herpes simplex virus (HSV) vaccine development: Key findings from the World Health Organization Consultation on HSV Vaccine Impact Modelling.

    PubMed

    Gottlieb, Sami L; Giersing, Birgitte; Boily, Marie-Claude; Chesson, Harrell; Looker, Katharine J; Schiffer, Joshua; Spicknall, Ian; Hutubessy, Raymond; Broutet, Nathalie

    2017-06-21

    Development of a vaccine against herpes simplex virus (HSV) is an important goal for global sexual and reproductive health. In order to more precisely define the health and economic burden of HSV infection and the theoretical impact and cost-effectiveness of an HSV vaccine, in 2015 the World Health Organization convened an expert consultation meeting on HSV vaccine impact modelling. The experts reviewed existing model-based estimates and dynamic models of HSV infection to outline critical future modelling needs to inform development of a comprehensive business case and preferred product characteristics for an HSV vaccine. This article summarizes key findings and discussions from the meeting on modelling needs related to HSV burden, costs, and vaccine impact, essential data needs to carry out those models, and important model components and parameters. Copyright © 2017. Published by Elsevier Ltd.

  17. An SSH key management system: easing the pain of managing key/user/account associations

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  18. Precise time technology for selected Air Force systems: Present status and future requirements

    NASA Technical Reports Server (NTRS)

    Yannoni, N. F.

    1981-01-01

    Precise time and time interval (PTTI) technology is becoming increasingly significant to Air Force operations as digital techniques find expanded utility in military missions. Timing has a key role in the function as well as in navigation. A survey of the PTTI needs of several Air Force systems is presented. Current technology supporting these needs was reviewed and new requirements are emphasized for systems as they transfer from initial development to final operational deployment.

  19. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  20. YoungStar in Wisconsin: Analysis of Data as of July 2014. Executive Summary: Key Findings and Analysis

    ERIC Educational Resources Information Center

    Wisconsin Council on Children and Families, 2014

    2014-01-01

    YoungStar is a five-star quality rating system for child care providers based on education, learning environment, business methods, and practices around child health and well-being. Through this rating system, the state is addressing several key issues in Wisconsin's child care system. The rating system will: (1) Improve the overall quality of…

  1. Projecting biodiversity and wood production in future forest landscapes: 15 key modeling considerations.

    PubMed

    Felton, Adam; Ranius, Thomas; Roberge, Jean-Michel; Öhman, Karin; Lämås, Tomas; Hynynen, Jari; Juutinen, Artti; Mönkkönen, Mikko; Nilsson, Urban; Lundmark, Tomas; Nordin, Annika

    2017-07-15

    A variety of modeling approaches can be used to project the future development of forest systems, and help to assess the implications of different management alternatives for biodiversity and ecosystem services. This diversity of approaches does however present both an opportunity and an obstacle for those trying to decide which modeling technique to apply, and interpreting the management implications of model output. Furthermore, the breadth of issues relevant to addressing key questions related to forest ecology, conservation biology, silviculture, economics, requires insights stemming from a number of distinct scientific disciplines. As forest planners, conservation ecologists, ecological economists and silviculturalists, experienced with modeling trade-offs and synergies between biodiversity and wood biomass production, we identified fifteen key considerations relevant to assessing the pros and cons of alternative modeling approaches. Specifically we identified key considerations linked to study question formulation, modeling forest dynamics, forest processes, study landscapes, spatial and temporal aspects, and the key response metrics - biodiversity and wood biomass production, as well as dealing with trade-offs and uncertainties. We also provide illustrative examples from the modeling literature stemming from the key considerations assessed. We use our findings to reiterate the need for explicitly addressing and conveying the limitations and uncertainties of any modeling approach taken, and the need for interdisciplinary research efforts when addressing the conservation of biodiversity and sustainable use of environmental resources. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    NASA Astrophysics Data System (ADS)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  3. Quantum Public Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2017-11-01

    Classical public key cryptosystems ( P K C), such as R S A, E I G a m a l, E C C, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem i.e. quantum public key cryptosystem ( Q P K C) based on the Bell states. In particular, in the proposed QPKC the public key are given by the first n particles of Bell states and generalized Pauli operations. The corresponding secret key are the last n particles of Bell states and the inverse of generalized Pauli operations. The proposed QPKC encrypts the message using a public key and decrypts the ciphertext using a private key. By H o l e v o ' s theorem, we proved the security of the secret key and messages during the QPKC.

  4. Evaluation of a primary school drug drama project: methodological issues and key findings.

    PubMed

    Starkey, F; Orme, J

    2001-10-01

    This paper describes the impact evaluation of a primary school drug drama project developed by a health promotion service and a theatre's education department in England. The project targeted 10-11 year olds in 41 schools with an interactive drama production and workshop day on attitudes, choices, decisions and risks of alcohol, tobacco and illegal drug use. Parents were also involved in parents' evenings and watching children's performances. The research consisted of both process evaluation, consultation with pupils, teachers, parents, actors and health promotion staff on the project itself, and impact evaluation which looked at potential changes in children's knowledge, attitudes and decision-making skills. This paper reports findings of the impact evaluation, from six of the schools participating in the project. The impact evaluation consisted of pre- and post-project testing using a 'draw and write' and a problem-solving exercise. These findings suggest that the project had a significant impact on the children's knowledge of names of specific illegal drugs, and on their awareness that alcohol and cigarettes were also drugs, and secondly encouraged the children to think in less stereotypical terms about drugs and drug users. The problem-solving exercise, involving decision-making scenarios, showed small but positive trends between pre- and post-project solutions in more than half of the response categories. Methodological difficulties relating to evaluating such a project are discussed.

  5. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  6. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  7. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    DOE PAGES

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; ...

    2016-08-09

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less

  8. Preliminary Airspace Operations Simulations Findings Report

    NASA Technical Reports Server (NTRS)

    2005-01-01

    Provides preliminary findings of the initial series (normal operations and contingency management) of airspace operations simulations. The key elements of this report discuss feedback from controller subjects for UAS flight above FL430. Findings provide initial evaluation of routine UAS operations above dense ARTCC airspace (ZOB), and identify areas of further research, policy direction and procedural development. This document further serves as an addendum to the detailed AOS simulation plan (Deliverable SIM001), incorporating feedback from FAA air traffic personnel and Access 5 IPTs.

  9. The preferable keypad layout for ease of pressing small cell phone keys with the thumb.

    PubMed

    Muraki, Satoshi; Okabe, Keiichi; Abe, Tetsuji; Sai, Akishige

    2010-12-01

    The present study investigated the effect of keypad layout on the ease of operating small cell phones with the thumb in one-handed operations by young and elderly male and female participants. Eighteen young participants (9 males and 9 females) and 12 elderly participants (6 males and 6 females) operated 9 different keypads modeled after commercially available cordless handsets. Keypads designed by using the L9 orthogonal array differed in vertical pitch (V-Pitch: 7, 8, 9 mm) between keys, horizontal pitch (H-Pitch: 10, 11, 12 mm) between keys, the margin below the bottom row of keys (B-Margin: 5, 13, 21 mm), and phone body width (P-Width: 38, 41, 44 mm). Results concerning subjective overall usability showed the lowest scores for a V-Pitch of 7 mm and a B-Margin of 5 mm in most groups. However, for the female participants, with shorter thumbs, the increase in V-pitch did not improve operability. In the elderly participants, miskeying frequently occurred at dial keys of specific numbers. These findings suggest that the preferable keypad layout differs between different age groups and between male and female participants.

  10. Finding optimal vaccination strategies under parameter uncertainty using stochastic programming.

    PubMed

    Tanner, Matthew W; Sattenspiel, Lisa; Ntaimo, Lewis

    2008-10-01

    We present a stochastic programming framework for finding the optimal vaccination policy for controlling infectious disease epidemics under parameter uncertainty. Stochastic programming is a popular framework for including the effects of parameter uncertainty in a mathematical optimization model. The problem is initially formulated to find the minimum cost vaccination policy under a chance-constraint. The chance-constraint requires that the probability that R(*) finding the optimal vaccination policy when vaccine supply is limited and (b) a cost-benefit scenario. The class of epidemic models for which this method can be used is described and we present an example formulation for which the resulting problem is a mixed-integer program. A short numerical example based on plausible parameter values and distributions is given to illustrate how including parameter uncertainty improves the robustness of the optimal strategy at the cost of higher coverage of the population. Results derived from a stochastic programming analysis can also help to guide decisions about how much effort and resources to focus on collecting data needed to provide better estimates of key parameters.

  11. Designing new institutions for implementing integrated disaster risk management: key elements and future directions.

    PubMed

    Gopalakrishnan, Chennat; Okada, Norio

    2007-12-01

    The goal of integrated disaster risk management is to promote an overall improvement in the quality of safety and security in a region, city or community at disaster risk. This paper presents the case for a thorough overhaul of the institutional component of integrated disaster risk management. A review of disaster management institutions in the United States indicates significant weaknesses in their ability to contribute effectively to the implementation of integrated disaster risk management. Our analysis and findings identify eight key elements for the design of dynamic new disaster management institutions. Six specific approaches are suggested for incorporating the identified key elements in building new institutions that would have significant potential for enhancing the effective implementation of integrated disaster risk management. We have developed a possible blueprint for effective design and construction of efficient, sustainable and functional disaster management institutions.

  12. Memory for melody and key in childhood

    PubMed Central

    Poon, Jaimie; Weiss, Michael W.

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age. PMID:29077726

  13. Public Expenditures on Children through 2008: Key Facts

    ERIC Educational Resources Information Center

    Macomber, Jennifer; Isaacs, Julia; Kent, Adam; Vericker, Tracy

    2010-01-01

    This report provides the key findings on the public spending on children through 2008. They are: (1) Spending on children increased under the American Recovery and Reinvestment Act (ARRA) and other stimulus spending, but not proportionately to other federal spending. As ARRA expires, we project that spending on children will decline, assuming no…

  14. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  15. Silent Presentation of a Solid Pseudopapillary Neoplasm of the Pancreas.

    PubMed

    Rivera, Melisa; Lara-Del Rio, Jose A; Di Pasquale-Guadalupe, Lorena; Zequeira, Jorge

    2017-06-12

    BACKGROUND Solid pseudopapillary neoplasm (SPN) is a rare tumor frequently found in the head or tail of the pancreas. It mainly presents in young women between the 2nd and 3rd decades of life. A predilection for African Americans and Asians has been observed and is rarely reported in children. Most patients are symptomatic, with abdominal pain as the most common presenting symptom. Clinical laboratory test results are usually normal and pancreatic markers are not typically elevated. Metastatic disease is very uncommon, but most often metastasizes to the liver and regional lymph nodes. Prognosis is usually excellent after surgical resection. CASE REPORT We present the case of a 14-year-old Hispanic female who presented to the emergency department after a high-speed motor vehicle accident. She suffered multiple body traumas. Specifically, the patient referred severe epigastric pain. No significant past medical or surgical history was obtained. Laboratory workup was non-contributory. Further evaluation with abdomen and pelvis contrast-enhanced computed tomography and magnetic resonance imaging revealed a pancreatic tail mass. Distal pancreatectomy followed. Pathologic diagnosis of SPN was established. CONCLUSIONS SPN is a rare exocrine tumor with excellent prognosis following resection. Imaging findings are suggestive, but a pathology evaluation is necessary to make the final diagnosis. Differential diagnosis includes entities such as mucinous cystic pancreatic tumor, pancreatic ductal carcinoma, and pancreatic serous cystadenoma. Radiologists play a vital role in the diagnosis, since many times, as in our case, it presents as an incidental finding. A small percentage of SPN neoplasms are associated with metastasis or local recurrence. Therefore, the aim of our case presentation is to review key imaging findings to guide early management and surgical planning.

  16. A de novo 11q23 deletion in a patient presenting with severe ophthalmologic findings, psychomotor retardation and facial dysmorphism.

    PubMed

    Şimşek-Kiper, Pelin Özlem; Bayram, Yavuz; Ütine, Gülen Eda; Alanay, Yasemin; Boduroğlu, Koray

    2014-01-01

    Distal 11q deletion, previously known as Jacobsen syndrome, is caused by segmental aneusomy for the distal end of the long arm of chromosome 11. Typical clinical features include facial dysmorphism, mild-to-moderate psychomotor retardation, trigonocephaly, cardiac defects, and thrombocytopenia. There is a significant variability in the range of clinical features. We report herein a five-year-old girl with severe ophthalmological findings, facial dysmorphism, and psychomotor retardation with normal platelet function, in whom a de novo 11q23 deletion was detected, suggesting that distal 11q monosomy should be kept in mind in patients presenting with dysmorphic facial features and psychomotor retardation even in the absence of hematological findings.

  17. Arthroscopic Findings in Anterior Shoulder Instability

    PubMed Central

    Hantes, Michael; Raoulis, Vasilios

    2017-01-01

    Background: In the last years, basic research and arthroscopic surgery, have improved our understanding of shoulder anatomy and pathology. It is a fact that arthroscopic treatment of shoulder instability has evolved considerably over the past decades. The aim of this paper is to present the variety of pathologies that should be identified and treated during shoulder arthroscopy when dealing with anterior shoulder instability cases. Methods: A review of the current literature regarding arthroscopic shoulder anatomy, anatomic variants, and arthroscopic findings in anterior shoulder instability, is presented. In addition, correlation of arthroscopic findings with physical examination and advanced imaging (CT and MRI) in order to improve our understanding in anterior shoulder instability pathology is discussed. Results: Shoulder instability represents a broad spectrum of disease and a thorough understanding of the pathoanatomy is the key for a successful treatment of the unstable shoulder. Patients can have a variety of pathologies concomitant with a traditional Bankart lesion, such as injuries of the glenoid (bony Bankart), injuries of the glenoid labrum, superiorly (SLAP) or anteroinferiorly (e.g. anterior labroligamentous periosteal sleeve avulsion, and Perthes), capsular lesions (humeral avulsion of the glenohumeral ligament), and accompanying osseous-cartilage lesions (Hill-Sachs, glenolabral articular disruption). Shoulder arthroscopy allows for a detailed visualization and a dynamic examination of all anatomic structures, identification of pathologic findings, and treatment of all concomitant lesions. Conclusion: Surgeons must be well prepared and understanding the normal anatomy of the glenohumeral joint, including its anatomic variants to seek for the possible pathologic lesions in anterior shoulder instability during shoulder arthroscopy. Patient selection criteria, improved surgical techniques, and implants available have contributed to the enhancement of

  18. Feasibility of satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.

    2009-04-01

    In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).

  19. Finding food

    PubMed Central

    Forsyth, Ann; Lytle, Leslie; Riper, David Van

    2011-01-01

    A significant amount of travel is undertaken to find food. This paper examines challenges in measuring access to food using Geographic Information Systems (GIS), important in studies of both travel and eating behavior. It compares different sources of data available including fieldwork, land use and parcel data, licensing information, commercial listings, taxation data, and online street-level photographs. It proposes methods to classify different kinds of food sales places in a way that says something about their potential for delivering healthy food options. In assessing the relationship between food access and travel behavior, analysts must clearly conceptualize key variables, document measurement processes, and be clear about the strengths and weaknesses of data. PMID:21837264

  20. Establishment of Aedes albopictus (Diptera: Culicidae) in the Florida Keys, 2001-2017.

    PubMed

    Murray, Heidi L; Pruszynski, Catherine A; Leal, Andrea L; Hribar, Lawrence J

    2018-06-23

    The presence of Aedes albopictus (Skuse) was first reported in the Florida Keys in 1993. Despite extensive surveillance, the Florida Keys Mosquito Control District (FKMCD) only collected specimens occasionally on a few islands, some years finding no evidence of the invasive species. In 2013-2017, FKMCD witnessed a sudden increase in population size and geographic extent of Ae. albopictus. Samples of Ae. albopictus have now been identified on 30 different islands in the Florida Keys. Three islands in particular (Key Largo, Big Pine Key, and Stock Island) have produced multiple positive samples during at least 4 of the last 5 yr, suggesting establishment of the invasive species. FKMCD continues to monitor Ae. albopictus throughout the Keys and make extensive efforts to reduce population abundance and geographic extent of this disease vector.

  1. The Genetics of Autism: Key Issues, Recent Findings and Clinical Implications

    PubMed Central

    El-Fishawy, Paul; State, Matthew W.

    2010-01-01

    Autism spectrum disorders (ASD’S) are highly heritable. Consequently, gene discovery promises to help illuminate the pathophysiology of these syndromes, yielding important opportunities for the development of novel treatments and a more nuanced understanding of the natural history of these disorders. Although the underlying genetic architecture of ASD’s is not yet known, the literature demonstrates that it is not, writ large, a monogenic disorder with Mendelian inheritance, but rather a group of complex genetic syndromes with risk deriving from genetic variations in multiple genes. The widely accepted “Common Disease-Common Variant” hypothesis predicts that the risk alleles in ASD’s and other complex disorders will be common in the general population. However, recent evidence from gene discovery efforts in a wide range of diseases raises important questions regarding the overall applicability of the theory and the extent of its usefulness in explaining individual genetic liability. In contrast, considerable evidence points to the importance of rare alleles both with regard to their value in providing a foothold into the molecular mechanisms of ASD and their overall contribution to the population-wide risk. This chapter reviews the origins of the common versus rare variant debate, highlights recent findings in the field, and addresses the clinical implications of both common and rare variant discoveries. PMID:20159341

  2. Space division multiplexing chip-to-chip quantum key distribution.

    PubMed

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2017-09-29

    Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.

  3. User's guide to the Fault Inferring Nonlinear Detection System (FINDS) computer program

    NASA Technical Reports Server (NTRS)

    Caglayan, A. K.; Godiwala, P. M.; Satz, H. S.

    1988-01-01

    Described are the operation and internal structure of the computer program FINDS (Fault Inferring Nonlinear Detection System). The FINDS algorithm is designed to provide reliable estimates for aircraft position, velocity, attitude, and horizontal winds to be used for guidance and control laws in the presence of possible failures in the avionics sensors. The FINDS algorithm was developed with the use of a digital simulation of a commercial transport aircraft and tested with flight recorded data. The algorithm was then modified to meet the size constraints and real-time execution requirements on a flight computer. For the real-time operation, a multi-rate implementation of the FINDS algorithm has been partitioned to execute on a dual parallel processor configuration: one based on the translational dynamics and the other on the rotational kinematics. The report presents an overview of the FINDS algorithm, the implemented equations, the flow charts for the key subprograms, the input and output files, program variable indexing convention, subprogram descriptions, and the common block descriptions used in the program.

  4. Integrating Key Competences in School Physical Education Programmes

    ERIC Educational Resources Information Center

    Lleixà, Teresa; González-Arévalo, Carles; Braz-Vieira, Marcelo

    2016-01-01

    In 2006, the European Union published its recommendations on competences for lifelong learning. Since then, key competences have been integrated into the official curriculum in Spain. The objectives of the present study are: a) to describe the strategies used most frequently by physical education teachers to incorporate key competences in their…

  5. Middle Leadership: A Key Role of Numeracy Reform

    ERIC Educational Resources Information Center

    Jorgensen, Robyn

    2016-01-01

    This paper reports on a large national project that explored successful numeracy practices in remote and very remote schools. While there have been a number of significant findings, the middle leader has been identified as a key role in the development of successful numeracy/mathematics practices in schools. The middle leader plays a critical role…

  6. Key Performance Parameter Driven Technology Goals for Electric Machines and Power Systems

    NASA Technical Reports Server (NTRS)

    Bowman, Cheryl; Jansen, Ralph; Brown, Gerald; Duffy, Kirsten; Trudell, Jeffrey

    2015-01-01

    Transitioning aviation to low carbon propulsion is one of the crucial strategic research thrust and is a driver in the search for alternative propulsion system for advanced aircraft configurations. This work requires multidisciplinary skills coming from multiple entities. The feasibility of scaling up various electric drive system technologies to meet the requirements of a large commercial transport is discussed in terms of key parameters. Functional requirements are identified that impact the power system design. A breakeven analysis is presented to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  7. TRPV1 as a key determinant in ciguatera and neurotoxic shellfish poisoning

    PubMed Central

    Cuypers, Eva; Yanagihara, Angel; Rainier, Jon D.; Tytgat, Jan

    2007-01-01

    Ciguatera fish poisoning and neurotoxic shellfish poisoning are distinct clinical entities characterized by gastrointestinal and neurological disturbances, following the consumption of certain reef fish and shellfish containing toxic polyether compounds sporadically present in certain toxic marine dinoflagellates. The biotransformation and bioaccumulation of gambierol and brevetoxin, and their congeners, are believed to be involved in the pathogenesis of these “food-chain diseases”, for which no effective treatments are available. Here, we describe for the first time the potent effect of gambierol and brevetoxin on TRPV1 channels, a key player in thermal and pain sensation. Our findings may lead to promising new therapeutic interventions. PMID:17659256

  8. Creation of Audiovisual Presentations as a Tool to Develop Key Competences in Secondary-School Students. A Case Study in Science Class

    ERIC Educational Resources Information Center

    Ezquerra, Ángel; Manso, Javier; Burgos, Mª Esther; Hallabrin, Carla

    2014-01-01

    New curricular plans based on key competences create the need for new educational proposals that allow their development. This article describes a proposal to develop key competences through project-based learning. The project's objective is the creation of a digital video. The following study was carried out with students in their final two years…

  9. Genital Findings in Cases of Child Sexual Abuse: Genital vs Vaginal Penetration.

    PubMed

    Gallion, H R; Milam, L J; Littrell, L L

    2016-12-01

    To (1) examine the prevalence of abnormal genital findings in a large cohort of female children presenting with concerns of sexual abuse; and (2) explore how children use language when describing genital contact and genital anatomy. In this prospective study we documented medical histories and genital findings in all children who met inclusion criteria. Findings were categorized as normal, indeterminate, and diagnostic of trauma. Logistic regression analysis was used to determine the effects of key covariates on predicting diagnostic findings. Children older than 4 years of age were asked questions related to genital anatomy to assess their use of language. A regional, university-affiliated sexual abuse clinic. Female children (N = 1500) aged from birth to 17 years (inclusive) who received an anogenital examination with digital images. Physical exam findings, medical history, and the child's use of language were recorded. Physical findings were determined in 99% (n = 1491) of patients. Diagnostic findings were present in 7% (99 of 1491). After adjusting for age, acuity, and type of sexual contact reported by the adult, the estimated odds of diagnostic findings were 12.5 times higher for children reporting genital penetration compared with those who reported only contact (95% confidence interval, 3.46-45.34). Finally, children used the word "inside" to describe contact other than penetration of the vaginal canal (ie, labial penetration). A history of penetration by the child was the primary predictor of diagnostic findings. Interpretation of children's use of "inside" might explain the low prevalence of diagnostic findings and warrants further study. Copyright © 2016 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  10. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  11. Chapter 06: Identification key

    Treesearch

    Alex Wiedenhoeft

    2011-01-01

    The key is written to guide you through the identification process in the most efficient and accurate way possible. It presents you with a numbered series of questions and asks you to answer them. The answers you provide will be based on your interpretations of the anatomical characters in your unknown specimen and will lead you to a new set of questions. Each time you...

  12. Access to Print Literacy for Children and Young People with Visual Impairment: Findings from a Review of Literature

    ERIC Educational Resources Information Center

    Douglas, Graeme; McLinden, Mike; McCall, Steve; Pavey, Sue; Ware, Jean; Farrell, Ann Marie

    2011-01-01

    This article presents a selection of findings from a literature review of best practice models and outcomes in the education of visually impaired children. The review suggested that a key focus of research in this area has been upon the concept of "access", particularly with regards to barriers children with visual impairment face in accessing…

  13. A Survey of American Voter Attitudes Concerning Child Care Services: Highlights and Key Findings.

    ERIC Educational Resources Information Center

    Marttila & Kiley, Inc., Boston, MA.

    A national telephone survey of a representative sample of 901 voters was conducted to measure voter attitudes toward child care and, in particular, the Act for Better Child Care Services (ABC). The survey also explored attitudes toward parental leave. Findings indicated that: (1) a majority of Americans think of child care as an urgent need and…

  14. Recurrent dermatofibrosarcoma protuberans with pulmonary metastases presenting twelve years after initial diagnosis: 18F-FDG PET/CT imaging findings.

    PubMed

    Suman, Sudhir; Sharma, Punit; Jain, Tarun Kumar; Sahoo, Manas Kumar; Bal, Chandrasekhar; Kumar, Rakesh

    2014-01-01

    Dermatofibrosarcoma protuberans is a rare cutaneous tumor that is locally aggressive and has a high rate of recurrence after surgical excision. The tumor grows slowly, typically over years. On rare occasions, metastasis to distant sites (especially the lung) or regional lymph nodes may occur. Here, we present F-FDG PET/CT imaging findings of a 52-year-old man with a local recurrence of dermatofibrosarcoma protuberans in the anterior abdominal wall with metastases to bilateral lungs.

  15. Autoshaping as a function of prior food presentations1

    PubMed Central

    Downing, Kevin; Neuringer, Allen

    1976-01-01

    Young chickens were given 1, 10, 100, or 1000 presentations of grain in a hopper. Subsequently, the key was illuminated before each presentation of grain to study autoshaping of the key-peck response. The number of keylight-grain pairings before a bird first pecked the lighted key was found to be a U-shaped function of the number of prior food-only presentations, with pecks occurring significantly sooner after 100 food-only trials than after any of the other values. Two of five chicks at the 100-trial value pecked on the first illumination of the key. Experiment II showed further that when a series of food-only trials (no keylight) preceded keylight-only trials (no food) 30% of the chicks pecked the illuminated key. Experiment III extended the generality of first-trial pecking to pigeons. After preliminary training with food-only, two of five pigeons pecked on the first illumination of a key. The results suggest a close relationship between autoshaping and pseudo-conditioning. PMID:16811961

  16. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  17. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  18. No drama: key elements to the success of an HIV/STI-prevention mass-media campaign.

    PubMed

    Pedrana, Alisa E; Hellard, Margaret E; Higgs, Peter; Asselin, Jason; Batrouney, Colin; Stoovè, Mark

    2014-05-01

    We qualitatively examined gay men's reactions to the national "Drama Downunder" HIV/STI social marketing campaign targeting gay men in Australia to identify key campaign elements that underpinned the demonstrated effectiveness of the campaign. We present findings from six qualitative focus groups held with 49 participants as part of the evaluation of the sexual-health-promotion campaign over 2008-2009. Participants identified attention-grabbing images, a humorous approach, positive and simple tailored messaging, and the use of mainstream media as campaign features crucial in normalizing sexual health testing, driving campaign engagement, and ensuring high message exposure. Our results suggest that designers of future campaigns should strive to balance positive and negative campaign images and messages, and find new ways to engage men with sexual health topics, particularly younger gay men. We discuss the implications of our findings about campaign effectiveness for future health-promotion campaigns and message design.

  19. ClinicalKey: a point-of-care search engine.

    PubMed

    Vardell, Emily

    2013-01-01

    ClinicalKey is a new point-of-care resource for health care professionals. Through controlled vocabulary, ClinicalKey offers a cross section of resources on diseases and procedures, from journals to e-books and practice guidelines to patient education. A sample search was conducted to demonstrate the features of the database, and a comparison with similar tools is presented.

  20. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  1. Mind the Gap: The Effect of Keyboard Key Gap and Pitch on Typing Speed, Accuracy, and Usability, Part 3.

    PubMed

    Madison, Heather; Pereira, Anna; Korshøj, Mette; Taylor, Laura; Barr, Alan; Rempel, David

    2015-11-01

    The aim of this study was to evaluate the effects of key gap (distance between edges of keys) on computer keyboards on typing speed, percentage error, preference, and usability. In Parts 1 and 2 of this series, a small key pitch (center-to-center distance between keys) was found to reduce productivity and usability, but the findings were confounded by gap. In this study, key gap was varied while holding key pitch constant. Participants (N = 25) typed on six keyboards, which differed in gap between keys (1, 3, or 5 mm) and pitch (16 or 17 mm; distance between centers of keys), while typing speed, accuracy, usability, and preference were measured. There was no statistical interaction between gap and pitch. Accuracy was better for keyboards with a gap of 5 mm compared to a 1-mm gap (p = .04). Net typing speed (p = .02), accuracy (p = .002), and most usability measures were better for keyboards with a pitch of 17 mm compared to a 16-mm pitch. The study findings support keyboard designs with a gap between keys of 5 mm over 1 mm and a key pitch of 17 mm over 16 mm. These findings may influence keyboard standards and design, especially the design of small keyboards used with portable devices, such as tablets and laptops. © 2015, Human Factors and Ergonomics Society.

  2. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    NASA Astrophysics Data System (ADS)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  3. An overview of key silvicultural information for ponderosa pine

    Treesearch

    John Fiske; John Tappeiner

    2005-01-01

    This paper provides a selected list of classical references for the important silvicultural findings for ponderosa pine, and categorizes some of the key current literature, as well as some of the older, lesser known but important literature. The paper also provides some history of scientific developments, and sources of further information.

  4. Key Facts about Higher Education in Washington: 2009-10

    ERIC Educational Resources Information Center

    Washington Higher Education Coordinating Board, 2010

    2010-01-01

    First published in 2002, "Key Facts about Higher Education in Washington" provides valuable information on the ways higher education serves the state and its people. The most current data and information available is presented throughout this report to highlight the "Key Facts" about Washington's postsecondary institutions,…

  5. Patients Presenting to the Emergency Unit with Gynaecological Lower Abdominal Pain, with and without Pathological Clinical Findings - Service Utilisation, Pain History, Implications.

    PubMed

    Siedentopf, F; Wowro, E; Möckel, M; Kentenich, H; David, M

    2016-09-01

    Introduction: Few studies have evaluated the utilisation of emergency gynaecological services, although lower abdominal pain (LAP) is one of the most common symptoms prompting emergency presentation. Although such pain may be caused by potentially life-threatening gynaecological diseases, very often no clinical cause is found. The aim of this study was to describe the characteristics of emergency presentations in order to enable quicker identification of real emergencies in routine clinical practice. Materials and Methods: Standardised, so-called first aid cards of 1066 consecutive patients with LAP presenting acutely to one emergency unit were analysed in this retrospective, cross-sectional study. Results: Over one third of cases did not constitute actual medical emergencies on objective criteria, with investigations yielding "no pathological findings". Parameters were identified that more often lead to hospital admission, e.g. palpation of a mass/resistance or at least one pathological ultrasound finding. In addition, it was found that symptoms of longer duration (average 8 days), and not only acute LAP, were also often experienced by patients as emergencies. Conclusion: A diagnosis of "no pathological findings", which was common in our study, suggests a subjective experience of an emergency from the patient's point of view, although the possibility of unrecognised pathology has to be borne in mind. Apart from functional disorders, the origins of symptoms may include psychosomatic causes and psychosocial problems, which cannot be further defined in the emergency care setting. Also, the phenomenon of increased utilisation of emergency services parallel to the assumed opening hours of routine outpatient care facilities must be seen in a critical light.

  6. Creating an effective poster presentation.

    PubMed

    Taggart, H M; Arslanian, C

    2000-01-01

    One way to build knowledge in nursing is to share research findings or clinical program outcomes. The dissemination of these findings is often a difficult final step in a project that has taken months or years to complete. One method of sharing findings in a relaxed and informal setting is a poster presentation. This method is an effective form for presenting findings using an interactive approach. The milieu of a poster presentation enables the presenters to interact and dialogue with colleagues. Guidelines for size and format require that the poster is clear and informative. Application of design helps to create visually appealing posters. This article summarizes elements of designing and conducting a poster presentation.

  7. Securing quantum key distribution systems using fewer states

    NASA Astrophysics Data System (ADS)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  8. Key Program Findings and Insights From the Baby-Friendly Hawaii Project.

    PubMed

    Kahin, Sahra A; McGurk, Meghan; Hansen-Smith, Heidi; West, Margaret; Li, Ruowei; Melcher, Carolyn Lopez

    2017-05-01

    Breastfeeding is the optimal method for infant feeding. In the United States, 81.1% of mothers initiate breastfeeding; however, only 44.4% and 22.3% of mothers are exclusively breastfeeding at 3 and 6 months, respectively. Research aim: The Centers for Disease Control and Prevention provides guidance and funding to state health departments to support strategies to improve breastfeeding policies and practices in the hospital, community, and worksite settings. In 2010, the Hawaii State Department of Health received support from the Centers for Disease Control and Prevention to launch the Baby-Friendly Hawaii Project (BFHP) to increase the number of Hawaii hospitals that provide maternity care consistent with the Ten Steps to Successful Breastfeeding and increase the rate of women who remain exclusively breastfeeding throughout their hospital stay. For this article, we examined the BFHP's final evaluation report and Hawaii breastfeeding and maternity care data to identify the role of the BFHP in facilitating improvements in maternity care practices and breastfeeding rates. Since 2010, 52 hospital site visits, 58 trainings, and ongoing technical assistance were administered, and more than 750 staff and health professionals from BFHP hospitals were trained. Hawaii's overall quality composite Maternity Practices in Infant Nutrition and Care score increased from 65 (out of 100) in 2009 to 76 in 2011 and 80 in 2013, and Newborn Screening Data showed an increase in statewide exclusive breastfeeding from 59.7% in 2009 to 77.0% in 2014. Implementation and findings from the BFHP can inform future planning at the state and federal levels on maternity care practices that can improve breastfeeding.

  9. Key Mites Commonly Associated With the Southern Pine Beetle

    Treesearch

    D.N. Kinn

    1976-01-01

    This paper outlines a method of preparing mites for microscopic examination and contains a simple key to the 15 species of mites commonly associated with the southern pine bark beetle. Research workers wanting to identify these mites and others curious about them, but untrained in acarology, should find little difficulty in making identifications.

  10. Ten Keys to the Portal

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  11. Autoshaping of key pecking in pigeons with negative reinforcement1

    PubMed Central

    Rachlin, Howard

    1969-01-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key. ImagesFig. 3.Fig. 4. PMID:16811371

  12. Children's contact with their incarcerated parents: research findings and recommendations.

    PubMed

    Poehlmann, Julie; Dallaire, Danielle; Loper, Ann Booker; Shear, Leslie D

    2010-09-01

    Approximately 1.7 million children have parents who are incarcerated in prison in the United States, and possibly millions of additional children have a parent incarcerated in jail. Many affected children experience increased risk for developing behavior problems, academic failure, and substance abuse. For a growing number of children, incarcerated parents, caregivers, and professionals, parent-child contact during the imprisonment period is a key issue. In this article, we present a conceptual model to provide a framework within which to interpret findings about parent-child contact when parents are incarcerated. We then summarize recent research examining parent-child contact in context. On the basis of the research reviewed, we present initial recommendations for children's contact with incarcerated parents and also suggest areas for future intervention and research with this vulnerable population. Copyright 2010 APA, all rights reserved.

  13. A simple method for finding the scattering coefficients of quantum graphs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cottrell, Seth S.

    2015-09-15

    Quantum walks are roughly analogous to classical random walks, and similar to classical walks they have been used to find new (quantum) algorithms. When studying the behavior of large graphs or combinations of graphs, it is useful to find the response of a subgraph to signals of different frequencies. In doing so, we can replace an entire subgraph with a single vertex with variable scattering coefficients. In this paper, a simple technique for quickly finding the scattering coefficients of any discrete-time quantum graph will be presented. These scattering coefficients can be expressed entirely in terms of the characteristic polynomial ofmore » the graph’s time step operator. This is a marked improvement over previous techniques which have traditionally required finding eigenstates for a given eigenvalue, which is far more computationally costly. With the scattering coefficients we can easily derive the “impulse response” which is the key to predicting the response of a graph to any signal. This gives us a powerful set of tools for rapidly understanding the behavior of graphs or for reducing a large graph into its constituent subgraphs regardless of how they are connected.« less

  14. Key Program Findings and Insights From the Baby-Friendly Hawaii Project

    PubMed Central

    Kahin, Sahra A.; McGurk, Meghan; Hansen-Smith, Heidi; West, Margaret; Li, Ruowei; Melcher, Carolyn Lopez

    2017-01-01

    Background Breastfeeding is the optimal method for infant feeding. In the United States, 81.1% of mothers initiate breastfeeding; however, only 44.4% and 22.3% of mothers are exclusively breastfeeding at 3 and 6 months, respectively. Research aim The Centers for Disease Control and Prevention provides guidance and funding to state health departments to support strategies to improve breastfeeding policies and practices in the hospital, community, and worksite settings. In 2010, the Hawaii State Department of Health received support from the Centers for Disease Control and Prevention to launch the Baby-Friendly Hawaii Project (BFHP) to increase the number of Hawaii hospitals that provide maternity care consistent with the Ten Steps to Successful Breastfeeding and increase the rate of women who remain exclusively breastfeeding throughout their hospital stay. Methods For this article, we examined the BFHP’s final evaluation report and Hawaii breastfeeding and maternity care data to identify the role of the BFHP in facilitating improvements in maternity care practices and breastfeeding rates. Results Since 2010, 52 hospital site visits, 58 trainings, and ongoing technical assistance were administered, and more than 750 staff and health professionals from BFHP hospitals were trained. Hawaii’s overall quality composite Maternity Practices in Infant Nutrition and Care score increased from 65 (out of 100) in 2009 to 76 in 2011 and 80 in 2013, and Newborn Screening Data showed an increase in statewide exclusive breastfeeding from 59.7% in 2009 to 77.0% in 2014. Conclusion Implementation and findings from the BFHP can inform future planning at the state and federal levels on maternity care practices that can improve breastfeeding. PMID:28135119

  15. Successful conservative management of symptomatic bilateral dorsal patellar defects presenting with cartilage involvement and bone marrow edema: MRI findings.

    PubMed

    Kwee, Thomas C; Sonneveld, Heleen; Nix, Maarten

    2016-05-01

    The dorsal patellar defect is a relatively rare entity that involves the superolateral quadrant of the patella. It is usually considered to represent a delayed ossification process, although its exact origin remains unclear. Because of its usually innocuous nature and clinical course, invasive interventions are generally deemed unnecessary, although curretage has been successfully performed on symptomatic cases. This case report presents a rather unusual case of symptomatic bilateral dorsal patellar defects with cartilage involvement and widespread surrounding bone marrow edema as demonstrated by magnetic resonance imaging (MRI). Both cartilage involvement and bone marrow edema should be considered part of the spectrum of associated MRI findings that can be encountered in this entity. Furthermore, the presented case shows that symptomatic dorsal patellar defects can be treated conservatively with success and that (decrease of) pain symptoms are likely related to (decrease of) bone marrow edema.

  16. Correlation of Radiological and Endoscopic Findings in Patients Presenting with Dysphagia.

    PubMed

    Sachdeva, Kavita; Kaul, Vineet

    2017-03-01

    Dysphagia is a common symptom with diverse etiology in otolaryngology. In the present study clinicopathological, radiological and endoscopic evaluation of patients was done in a tertiary care hospital in patients presenting with dysphagia. A prospective nonrandomized observational study was carried out on total of 80 cases having dysphagia during March 2015 to August 2016. In the present study, out of 80 patients, youngest case was a three years old child while oldest case was an 85 years old female. The mean age was 48.3 ± 20.3 years. The majority of cases were in age group 41-59 years (35%). Male to female ratio was 2.33:1. The mean duration of illness was 15.44 weeks. 15% of patients had absolute dysphagia. For detecting the lesion, Barium swallow study (BSS) showed a total sensitivity of 49.05% (n = 53), Computerised Tomography (CT) showed a total sensitivity of 85.70% (n = 49), plain skiagram neck & chest showed a total sensitivity of 88.88% (n = 9) and endoscopy was the most sensitive test overall as it showed a total sensitivity of 98.75% (n = 80). No complications were reported with either rigid or flexible endoscopy. Dysphagia is a common presenting complaint in otolaryngology with cases coming directly or being referred from other specialities. Males are more commonly affected than females and incidence of malignancy increases with age. Endoscopy can become the first screening test in dysphagia due to its high sensitivity and low risk of complications, with radiological tests being done in an adjunct manner.

  17. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  18. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  19. America's Children: Key National Indicators of Well-Being, 2011

    ERIC Educational Resources Information Center

    Cook, Traci; Blachman, Dara; Dye, Jane; Macartney, Suzanne; Lukacs, Susan; Howie, LaJeana; Kena, Grace; Sonnenberg, William; Axelrad, Daniel; Steffen, Barry; Truman, Jennifer; Cotto, Jessica; Jekielek, Susan; Mueggenborg, Mary; Coleman-Jensen, Alisha; Denton, Stephanie; Avenevoli, Shelli; Singleton, James; Knighton, Cindi; Han, Beth; O'Connell, Kellie; Guenther, Patricia; Hiza, Hazel; Kuczynski, Kevin; Koegel, Kristin; Radel, Laura

    2011-01-01

    "America's Children: Key National Indicators of Well-Being, 2011" is a compendium of indicators depicting both the promises and the challenges confronting our Nation's young people. The report, the 15th in an ongoing series, presents 41 key indicators on important aspects of children's lives. These indicators are drawn from the most…

  20. Academic detailing can play a key role in assessing and implementing comparative effectiveness research findings.

    PubMed

    Fischer, Michael A; Avorn, Jerry

    2012-10-01

    Comparative effectiveness research evaluates the relative effectiveness, safety, and value of competing treatment options in clinically realistic settings. Such evaluations can be methodologically complex and difficult to interpret. There will be a growing need for critical evaluation of comparative effectiveness studies to assess the adequacy of their design and to put new information into a broader context. Equally important, this knowledge will have to be communicated to clinicians in a way that will actually change practice. We identify three challenges to effective dissemination of comparative effectiveness research findings: the difficulty of interpreting comparative effectiveness research data, the need for trusted sources of information, and the challenge of turning research results into clinical action. We suggest that academic detailing-direct outreach education that gives clinicians an accurate and unbiased synthesis of the best evidence for practice in a given clinical area-can translate comparative effectiveness research findings into actions that improve health care decision making and patient outcomes.

  1. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  2. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  3. An investigation into the differentiating characteristics between car key burglars and regular burglars.

    PubMed

    Chapman, Rachel; Smith, Lisa L; Bond, John W

    2012-07-01

    Car key burglary has recently become the focus of empirical investigation as offenders, no longer able to steal vehicles without first obtaining their keys, resort to "burgling" target properties. Research surrounding the modus operandi of these offenses is beginning to emerge; however, little attention has been paid to investigating the characteristics of car key burglary offenders. Challenging the assumption that car key burglary offenses are perpetrated by regular burglars, this study aims to differentiate between offenders. Logistic regression analysis of 110 car key and 110 regular burglary offenders revealed that car key burglars are more likely to have previous vehicle theft convictions and are also more likely to be detected on information supplied to the police than regular burglars. Regular burglars are more likely to have previous shoplifting convictions. It was concluded that car key burglars are a distinct sample of offenders and the implications of these findings are discussed. © 2012 American Academy of Forensic Sciences.

  4. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  5. Encryption key distribution via chaos synchronization

    NASA Astrophysics Data System (ADS)

    Keuninckx, Lars; Soriano, Miguel C.; Fischer, Ingo; Mirasso, Claudio R.; Nguimdo, Romain M.; van der Sande, Guy

    2017-02-01

    We present a novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver. The concept is sufficiently generic to be implemented on either photonic, optoelectronic or electronic platforms. The method for generating the key bitstream from the chaotic signals is reconfigurable. Although derived from a deterministic process, the obtained bit series fulfill the randomness conditions as defined by the National Institute of Standards test suite. We demonstrate the feasibility of our concept on an electronic delay oscillator circuit and test the robustness against attacks using a state-of-the-art system identification method.

  6. Encryption key distribution via chaos synchronization

    PubMed Central

    Keuninckx, Lars; Soriano, Miguel C.; Fischer, Ingo; Mirasso, Claudio R.; Nguimdo, Romain M.; Van der Sande, Guy

    2017-01-01

    We present a novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver. The concept is sufficiently generic to be implemented on either photonic, optoelectronic or electronic platforms. The method for generating the key bitstream from the chaotic signals is reconfigurable. Although derived from a deterministic process, the obtained bit series fulfill the randomness conditions as defined by the National Institute of Standards test suite. We demonstrate the feasibility of our concept on an electronic delay oscillator circuit and test the robustness against attacks using a state-of-the-art system identification method. PMID:28233876

  7. Key Themes in Mobile Learning: Prospects for Learner-Generated Learning through AR and VR

    ERIC Educational Resources Information Center

    Aguayo, Claudio; Cochrane, Thomas; Narayan, Vickel

    2017-01-01

    This paper summarises the findings from a literature review in mobile learning, developed as part of a 2-year six-institution project in New Zealand. Through the development of a key themes codebook, we address selected key themes with respect to their relevance to learner-generated learning through emerging technologies, with attention to mobile…

  8. Rickettsial entry into host cells: finding the keys to unlock the doors

    USDA-ARS?s Scientific Manuscript database

    In this issue of Infection and Immunity, Ojogun et al. present compelling evidence that A. phagocytophilum outer membrane protein A (OmpA) is required for efficient entry into host myeloid cells. Using classical approaches, this team of investigators led by Jason Carlyon shows that entry can be bloc...

  9. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  10. Congenital portosystemic shunts: imaging findings and clinical presentations in 11 patients.

    PubMed

    Konstas, Angelos A; Digumarthy, Subba R; Avery, Laura L; Wallace, Karen L; Lisovsky, Mikhail; Misdraji, Joseph; Hahn, Peter F

    2011-11-01

    To evaluate the clinical anatomy and presentations of congenital portosystemic shunts, and determine features that promote recognition on imaging. Institutional review board approval was obtained for this HIPAA-compliant study. The requirement for written informed consent was waived. Radiology reports were retrospectively reviewed from non-cirrhotic patients who underwent imaging studies from January 1999 through February 2009. Clinical sources reviewed included electronic medical records, archived images and histopathological material. Eleven patients with congenital portosystemic shunts were identified (six male and five female; age range 20 days to 84 years). Seven patients had extrahepatic and four patients had intrahepatic shunts. All 11 patients had absent or hypoplastic intrahepatic portal veins, a feature detected by CT and MRI, but not by US. Seven patients presented with shunt complications and four with presentations unrelated to shunt pathophysiology. Three adult patients had four splenic artery aneurysms. Prospective radiological evaluation of five adult patients with cross-sectional imaging had failed prospectively to recognize the presence of congenital portosystemic shunts on one or more imaging examinations. Congenital portosystemic shunts are associated with splenic artery aneurysms, a previously unrecognized association. Portosystemic shunts were undetected during prospective radiologic evaluation in the majority of adult patients, highlighting the need to alert radiologists to this congenital anomaly. Copyright © 2010. Published by Elsevier Ireland Ltd.

  11. Traumatic injuries of the diaphragm: overview of imaging findings and diagnosis.

    PubMed

    Hammer, Mark M; Raptis, Demetrios A; Mellnick, Vincent M; Bhalla, Sanjeev; Raptis, Constantine A

    2017-04-01

    Injuries to the diaphragm muscle occur in penetrating and severe blunt trauma and can lead to delayed hernia formation. Computed tomography is the mainstay in the diagnosis of these injuries, which may be subtle at presentation. Imaging findings differ between blunt and penetrating trauma. Key features in blunt trauma include diaphragm fragment distraction and organ herniation because of increased intra-abdominal pressure. In penetrating trauma, herniation is uncommon, and the trajectory of the object is critical in making the diagnosis of diaphragm injury in these patients. Radiologists must keep a high index of suspicion for injury to the diaphragm in cases of trauma to the chest or abdomen.

  12. PISA 2015: Findings and Some Implications for UK Science Education

    ERIC Educational Resources Information Center

    Osborne, Jonathan; Millar, Robin

    2017-01-01

    This article provides an overview of the main findings for the countries of the UK from the Organisation for Economic Co-operation and Development (OECD) Programme for International Student Assessment (PISA) in 2015, where science was the major focus. The nature of the tests, the key findings and how they might be interpreted are discussed--in…

  13. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  14. Workplace wellness programs in Canada: an exploration of key issues.

    PubMed

    Morrison, Erin; MacKinnon, Neil J

    2008-01-01

    Faced with the reality of rising health costs, Canadian employers are thinking beyond traditional notions of responsibility for employee health and have begun to embrace Workplace Wellness Programs (WWPs). This article investigates the critical issues of WWPs in the Canadian context from the perspective of key stakeholders. Using a combination of literature and key informant interviews, seven key themes are presented along with recommendations for wider implementation of WWPs in Canada.

  15. Data publication and dissemination of interactive keys under the open access model

    USDA-ARS?s Scientific Manuscript database

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  16. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  17. Photo interpretation key to Michigan land cover/use

    NASA Technical Reports Server (NTRS)

    Enslin, W. R.; Hudson, W. D.; Lusch, D. P.

    1983-01-01

    A set of photo interpretation keys is presented to provide a structured approach to the identification of land cover/use categories as specified in the Michigan Resource Inventory Act. The designated categories are urban and; built up lands; agricultural lands; forest land; nonforested land; water bodies; wetlands; and barren land. The keys were developed for use with medium scale (1:20,000 to 1:24,000) color infrared aerial photography. Although each key is generalized in that it relies only upon the most distinguishing photo characteristics in separating the various land cover/use categories, additional interpretation characteristics, distinguishing features and background material are given.

  18. Pure neuritic leprosy presenting as ulnar nerve neuropathy: a case report of electrodiagnostic, radiographic, and histopathological findings.

    PubMed

    Payne, Russell; Baccon, Jennifer; Dossett, John; Scollard, David; Byler, Debra; Patel, Akshal; Harbaugh, Kimberly

    2015-11-01

    Hansen's disease, or leprosy, is a chronic infectious disease with many manifestations. Though still a major health concern and leading cause of peripheral neuropathy in the developing world, it is rare in the United States, with only about 150 cases reported each year. Nevertheless, it is imperative that neurosurgeons consider it in the differential diagnosis of neuropathy. The causative organism is Mycobacterium leprae, which infects and damages Schwann cells in the peripheral nervous system, leading first to sensory and then to motor deficits. A rare presentation of Hansen's disease is pure neuritic leprosy. It is characterized by nerve involvement without the characteristic cutaneous stigmata. The authors of this report describe a case of pure neuritic leprosy presenting as ulnar nerve neuropathy with corresponding radiographic, electrodiagnostic, and histopathological data. This 11-year-old, otherwise healthy male presented with progressive right-hand weakness and numbness with no cutaneous abnormalities. Physical examination and electrodiagnostic testing revealed findings consistent with a severe ulnar neuropathy at the elbow. Magnetic resonance imaging revealed diffuse thickening and enhancement of the ulnar nerve and narrowing at the cubital tunnel. The patient underwent ulnar nerve decompression with biopsy. Pathology revealed acid-fast organisms within the nerve, which was pathognomonic for Hansen's disease. He was started on antibiotic therapy, and on follow-up he had improved strength and sensation in the ulnar nerve distribution. Pure neuritic leprosy, though rare in the United States, should be considered in the differential diagnosis of those presenting with peripheral neuropathy and a history of travel to leprosy-endemic areas. The long incubation period of M. leprae, the ability of leprosy to mimic other conditions, and the low sensitivity of serological tests make clinical, electrodiagnostic, and radiographic evaluation necessary for diagnosis

  19. Herpes simplex encephalitis presenting as stroke-like symptoms with atypical MRI findings and lacking cerebrospinal fluid pleocytosis.

    PubMed

    Tsuboguchi, Shintaro; Wakasugi, Takahiro; Umeda, Yoshitaka; Umeda, Maiko; Oyake, Mutsuo; Fujita, Nobuya

    2017-07-29

    A 73-year-old woman presented with sudden onset of right hemiparesis and was diagnosed as having cerebral infarction on the basis of diffusion-weighted brain MRI, which demonstrated lesions in the left parietal cortex. On the 3rd day, the patient developed right upper limb myoclonus, aphasia, and disturbance of consciousness with high fever. On the 6th day, she was transferred to our hospital with suspected viral encephalitis, and treatment with acyclovir was started. By the 6th day, the lesions detected by MRI had expanded to the gyrus cinguli, insula and thalamus, but not to the temporal lobe. At that time, the CSF cell count was 8/μl, and this later increased to 17/μl by the 13th day. Although herpes simplex virus DNA was detected in the CSF on the 6th day, there was no evidence of CSF pleocytosis or temporal lobe abnormalities demonstrable by brain MRI throughout the whole follow-up period. This was very atypical case of herpes simplex encephalitis characterized by a stroke-like episode, atypical MRI findings, and absence of cerebrospinal fluid pleocytosis. It is important to be mindful that herpes simplex encephalitis (HSE) can have an atypical presentation, and that sufficient acyclovir treatment should be initiated until HSE can be ruled out.

  20. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  1. Two-Winged Cloeodes in Brazil: New Species, Stage Description, and Key to South American Species

    PubMed Central

    Massariol, Fabiana Criste; Lima, Lucas Ramos Costa; Pinheiro, Ulisses Dos Santos; Quieroz, Luciano Lopes; Oliveira, Leandro Gonçalves; Salles, Frederico Falcão

    2013-01-01

    The present work, based on material from northern, central-western, and northeastern Brazil, contributes to the knowledge of the two-winged Cloeodes Traver (Ephemeroptera: Baetidae) in South America. Two new species, C. maracatu, sp. nov. and C. spaceki, sp. nov., are described, the former based on nymphs and reared adults and the latter only on nymphs; the male and female imago of C. auwe and the female imago of C. redactus are described. Based on these findings, an updated key for South American nymphs and male adults of the two-winged Cloeodes is provided. PMID:23906240

  2. NASA's Hubble Space Telescope: Presentation to the Freedom Museum

    NASA Technical Reports Server (NTRS)

    Leete, Stephen

    2017-01-01

    The Freedom Museum, located in Manassas, VA, requested a speaker through the NASA Speakers Bureau, on the topic of the Hubble Space Telescope. A public outreach presentation has been prepared. Many of the facts are drawn from a public source, the Wikipedia article on the Hubble Space Telescope. This covers the history of the development of the HST, as well as the initial flaw and its repair, and the subsequent series of servicing missions, for which I was involved in the last three. This has been the topic of numerous books. This has been supplemented mostly by facts known to the author, such as names of individuals who played key roles, but not any technical information. Because the reqeustor asked for a significant part of the talk to address major science findings and discoveries, significant portions of a public presentation on this topic developed by Kenneth Carpenter of GSFC were obtained and incorporated, with credit. I have confirmed that this material is also available through public sources.

  3. Selecting a climate model subset to optimise key ensemble properties

    NASA Astrophysics Data System (ADS)

    Herger, Nadja; Abramowitz, Gab; Knutti, Reto; Angélil, Oliver; Lehmann, Karsten; Sanderson, Benjamin M.

    2018-02-01

    End users studying impacts and risks caused by human-induced climate change are often presented with large multi-model ensembles of climate projections whose composition and size are arbitrarily determined. An efficient and versatile method that finds a subset which maintains certain key properties from the full ensemble is needed, but very little work has been done in this area. Therefore, users typically make their own somewhat subjective subset choices and commonly use the equally weighted model mean as a best estimate. However, different climate model simulations cannot necessarily be regarded as independent estimates due to the presence of duplicated code and shared development history. Here, we present an efficient and flexible tool that makes better use of the ensemble as a whole by finding a subset with improved mean performance compared to the multi-model mean while at the same time maintaining the spread and addressing the problem of model interdependence. Out-of-sample skill and reliability are demonstrated using model-as-truth experiments. This approach is illustrated with one set of optimisation criteria but we also highlight the flexibility of cost functions, depending on the focus of different users. The technique is useful for a range of applications that, for example, minimise present-day bias to obtain an accurate ensemble mean, reduce dependence in ensemble spread, maximise future spread, ensure good performance of individual models in an ensemble, reduce the ensemble size while maintaining important ensemble characteristics, or optimise several of these at the same time. As in any calibration exercise, the final ensemble is sensitive to the metric, observational product, and pre-processing steps used.

  4. Key challenges in the development and implementation of telehealth projects.

    PubMed

    Joseph, Victor; West, Robert M; Shickle, Darren; Keen, Justin; Clamp, Susan

    2011-01-01

    A literature review was carried out to identify the key challenges in the implementation of telehealth. This was followed by a survey of organisations in England involved in telehealth projects in order to understand the challenges they faced. Ten of the 13 health or local authority organisations surveyed had telehealth projects and three were at the planning stage. The analysis revealed seven key challenges facing implementers of telehealth in England. Based on the findings from the literature review and the survey, a model was constructed and a checklist drawn up. The model contained the following elements: identifying issues, needs and partners; producing a strategy; securing funding; implementing changes; and monitoring and evaluating a telehealth project. The checklist was validated by using key informants from the organisations originally surveyed. The checklist may be useful to guide telehealth development and implementation in the future.

  5. One Step Quantum Key Distribution Based on EPR Entanglement.

    PubMed

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  6. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  7. Turnaround Arts Initiative: Summary of Key Findings

    ERIC Educational Resources Information Center

    Stoelinga, Sara Ray; Silk, Yael; Reddy, Prateek; Rahman, Nadiv

    2015-01-01

    Turnaround Arts is a public-private partnership that aims to test the hypothesis that strategically implementing high-quality and integrated arts education programming in high-poverty, chronically underperforming schools adds significant value to school-wide reform. In 2014, the Turnaround Arts initiative completed an evaluation report covering…

  8. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  9. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  10. How to Improve Integrated Care for People with Chronic Conditions: Key Findings from EU FP-7 Project INTEGRATE and Beyond.

    PubMed

    Borgermans, Liesbeth; Marchal, Yannick; Busetto, Loraine; Kalseth, Jorid; Kasteng, Frida; Suija, Kadri; Oona, Marje; Tigova, Olena; Rösenmuller, Magda; Devroey, Dirk

    2017-09-25

    Political and public health leaders increasingly recognize the need to take urgent action to address the problem of chronic diseases and multi-morbidity. European countries are facing unprecedented demand to find new ways to deliver care to improve patient-centredness and personalization, and to avoid unnecessary time in hospitals. People-centred and integrated care has become a central part of policy initiatives to improve the access, quality, continuity, effectiveness and sustainability of healthcare systems and are thus preconditions for the economic sustainability of the EU health and social care systems. This study presents an overview of lessons learned and critical success factors to policy making on integrated care based on findings from the EU FP-7 Project Integrate, a literature review, other EU projects with relevance to this study, a number of best practices on integrated care and our own experiences with research and policy making in integrated care at the national and international level. Seven lessons learned and critical success factors to policy making on integrated care were identified. The lessons learned and critical success factors to policy making on integrated care show that a comprehensive systems perspective should guide the development of integrated care towards better health practices, education, research and policy.

  11. How to Improve Integrated Care for People with Chronic Conditions: Key Findings from EU FP-7 Project INTEGRATE and Beyond

    PubMed Central

    Marchal, Yannick; Busetto, Loraine; Kalseth, Jorid; Kasteng, Frida; Suija, Kadri; Oona, Marje; Tigova, Olena; Rösenmuller, Magda; Devroey, Dirk

    2017-01-01

    Background: Political and public health leaders increasingly recognize the need to take urgent action to address the problem of chronic diseases and multi-morbidity. European countries are facing unprecedented demand to find new ways to deliver care to improve patient-centredness and personalization, and to avoid unnecessary time in hospitals. People-centred and integrated care has become a central part of policy initiatives to improve the access, quality, continuity, effectiveness and sustainability of healthcare systems and are thus preconditions for the economic sustainability of the EU health and social care systems. Purpose: This study presents an overview of lessons learned and critical success factors to policy making on integrated care based on findings from the EU FP-7 Project Integrate, a literature review, other EU projects with relevance to this study, a number of best practices on integrated care and our own experiences with research and policy making in integrated care at the national and international level. Results: Seven lessons learned and critical success factors to policy making on integrated care were identified. Conclusion: The lessons learned and critical success factors to policy making on integrated care show that a comprehensive systems perspective should guide the development of integrated care towards better health practices, education, research and policy. PMID:29588630

  12. Online Information Exchanges for Parents of Children With a Rare Health Condition: Key Findings From an Online Support Community

    PubMed Central

    Campo, Shelly; Lowe, John; Andsager, Julie; Morcuende, Jose A

    2013-01-01

    Background The Internet provides new opportunities for parents of children with difficult illnesses and disabilities to find information and support. The Internet is particularly important for caregivers of children with special needs due to numerous health-related decisions they face. For at-risk populations, online support communities can become key settings and channels for health promotion and communication. Objective This study is an initial exploration of the information-seeking and information-provision processes present in an online support community, which is an area of opportunity and interest for Internet-based medical research and practice. The aim of this study was to explore and describe information-related processes of uncertainty management in relationship to clubfoot. Specifically, the study explored interpersonal communication (information seeking and provision) in an online support community serving the needs of parents of children with clubfoot. Methods The study population consisted of messages posted to an online community by caregivers (parents) of children with clubfoot. The theoretical framework informing the study was the Uncertainty Management Theory (UMT). The study used content analysis to explore and categorize the content of 775 messages. Results Women authored 664 of 775 messages (86%) and men authored 47 messages (6%). Caregivers managed uncertainty through information seeking and provision behaviors that were dynamic and multilayered. The ratio of information-seeking messages to information-provision responses was 1 to 4. All five types of information-seeking behaviors proposed by Brashers’ schema were identified, most of them being correlated. Information seeking using direct questions was found to be positively correlated to self-disclosure (r=.538), offering of a candidate answer (r=.318), and passive information seeking (r=.253). Self-disclosure was found to be positively correlated to provision of a candidate answer (r=.324

  13. Finding the Key Periods for Assimilating HJ-1A/B CCD Data and the WOFOST Model to Evaluate Heavy Metal Stress in Rice.

    PubMed

    Zhao, Shuang; Qian, Xu; Liu, Xiangnan; Xu, Zhao

    2018-04-17

    Accurately monitoring heavy metal stress in crops is vital for food security and agricultural production. The assimilation of remote sensing images into the World Food Studies (WOFOST) model provides an efficient way to solve this problem. In this study, we aimed at investigating the key periods of the assimilation framework for continuous monitoring of heavy metal stress in rice. The Harris algorithm was used for the leaf area index (LAI) curves to select the key period for an optimized assimilation. To obtain accurate LAI values, the measured dry weight of rice roots (WRT), which have been proven to be the most stress-sensitive indicator of heavy metal stress, were incorporated into the improved WOFOST model. Finally, the key periods, which contain four dominant time points, were used to select remote sensing images for the RS-WOFOST model for continuous monitoring of heavy metal stress. Compared with the key period which contains all the available remote sensing images, the results showed that the optimal key period can significantly improve the time efficiency of the assimilation framework by shortening the model operation time by more than 50%, while maintaining its accuracy. This result is highly significant when monitoring heavy metals in rice on a large-scale. Furthermore, it can also offer a reference for the timing of field measurements in monitoring heavy metal stress in rice.

  14. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  15. Effects of Individual Differences in Working Memory on Plan Presentational Choices

    PubMed Central

    Tintarev, Nava; Masthoff, Judith

    2016-01-01

    This paper addresses research questions that are central to the area of visualization interfaces for decision support: (RQ1) whether individual user differences in working memory should be considered when choosing how to present visualizations; (RQ2) how to present the visualization to support effective decision making and processing; and (RQ3) how to evaluate the effectiveness of presentational choices. These questions are addressed in the context of presenting plans, or sequences of actions, to users. The experiments are conducted in several domains, and the findings are relevant to applications such as semi-autonomous systems in logistics. That is, scenarios that require the attention of humans who are likely to be interrupted, and require good performance but are not time critical. Following a literature review of different types of individual differences in users that have been found to affect the effectiveness of presentational choices, we consider specifically the influence of individuals' working memory (RQ1). The review also considers metrics used to evaluate presentational choices, and types of presentational choices considered. As for presentational choices (RQ2), we consider a number of variants including interactivity, aggregation, layout, and emphasis. Finally, to evaluate the effectiveness of plan presentational choices (RQ3) we adopt a layered-evaluation approach and measure performance in a dual task paradigm, involving both task interleaving and evaluation of situational awareness. This novel methodology for evaluating visualizations is employed in a series of experiments investigating presentational choices for a plan. A key finding is that emphasizing steps (by highlighting borders) can improve effectiveness on a primary task, but only when controlling for individual variation in working memory. PMID:27899905

  16. Effects of Individual Differences in Working Memory on Plan Presentational Choices.

    PubMed

    Tintarev, Nava; Masthoff, Judith

    2016-01-01

    This paper addresses research questions that are central to the area of visualization interfaces for decision support: (RQ1) whether individual user differences in working memory should be considered when choosing how to present visualizations; (RQ2) how to present the visualization to support effective decision making and processing; and (RQ3) how to evaluate the effectiveness of presentational choices. These questions are addressed in the context of presenting plans, or sequences of actions, to users. The experiments are conducted in several domains, and the findings are relevant to applications such as semi-autonomous systems in logistics. That is, scenarios that require the attention of humans who are likely to be interrupted, and require good performance but are not time critical. Following a literature review of different types of individual differences in users that have been found to affect the effectiveness of presentational choices, we consider specifically the influence of individuals' working memory (RQ1). The review also considers metrics used to evaluate presentational choices, and types of presentational choices considered. As for presentational choices (RQ2), we consider a number of variants including interactivity, aggregation, layout, and emphasis. Finally, to evaluate the effectiveness of plan presentational choices (RQ3) we adopt a layered-evaluation approach and measure performance in a dual task paradigm, involving both task interleaving and evaluation of situational awareness. This novel methodology for evaluating visualizations is employed in a series of experiments investigating presentational choices for a plan. A key finding is that emphasizing steps (by highlighting borders) can improve effectiveness on a primary task, but only when controlling for individual variation in working memory.

  17. Locally acquired Dengue--Key West, Florida, 2009-2010.

    PubMed

    2010-05-21

    Dengue is the most common vector-borne viral disease in the world, causing an estimated 50-100 million infections and 25,000 deaths each year. During 1946-1980, no cases of dengue acquired in the continental United States were reported. Since 1980, a few locally acquired U.S. cases have been confirmed along the Texas-Mexico border, temporally associated with large outbreaks in neighboring Mexican cities. On September 1, 2009, a New York physician notified the Monroe County (Florida) Health Department (MCHD) and the Florida Department of Health (FDOH) of a suspected dengue case in a New York state resident whose only recent travel was to Key West, Florida. CDC confirmed the diagnosis, and a press release was issued to notify the public and Key West physicians of the potential risk for locally acquired dengue infections. In the next 2 weeks, two dengue infections in Key West residents without recent travel were reported and confirmed. Subsequently, enhanced and active surveillance identified 24 more Key West cases during 2009. On April 13, 2010, another Key West dengue case was reported to FDOH, bringing the total to 28. This report describes the first three dengue cases reported in 2009, briefly summarizes the 2010 case, highlights preliminary findings from the ongoing investigation, and outlines measures used to mitigate and control the outbreak. Clinicians should include dengue in the differential diagnosis of acute febrile illnesses in patients who live in or have recently traveled to subtropical areas of the United States or to the tropics.

  18. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae)

    PubMed Central

    Hernández, Macotulio Soto; Jones, Robert W.; Castillo, Pedro Reyes

    2013-01-01

    Abstract Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included. PMID:23717181

  19. Dating Violence among College Students: Key Issues for College Counselors

    ERIC Educational Resources Information Center

    Murray, Christine E.; Kardatzke, Kerrie N.

    2007-01-01

    The authors present a review of literature examining dating violence among college students. They describe 6 key issues related to dating violence among college students that affect college counselors' work. These key issues relate to the incidence and prevalence of physical, sexual, and psychological violence in college students' dating…

  20. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  1. Key-lock colloids in a nematic liquid crystal.

    PubMed

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  2. NASA Advisory Council: Fact-Finding Session

    NASA Technical Reports Server (NTRS)

    Cohen, Aaron; Martin, Franklin D.; Craig, Mark K.; Duke, Michael B.

    1992-01-01

    The principal agenda item for this fact-finding meeting of the NASA Advisory Council was NASA's preliminary planning of options to implement the President's initiative for establishing a base on the Moon and launching a human expedition to Mars. NASA's presentation (1) reviewed the key elements in the President's speech of July 20, 1989, summoning the Nation to launch a new exploration initiative to the Moon and Mars; (2) outlined five candidate options analyzed in terms of schedule and scale of effort (for a return to the Moon and for a voyage to Mars); (3) outlined tentative robotic mission milestones for both a 'vigorous deployment' option and a 'paced deployment' option; (4) reviewed Earth-to-orbit delivery requirements for a lunar heavy-lift launch vehicle, the National Space Transportation System, and a Mars heavy-lift launch vehicle; (5) summarized the associated Space Station Freedom requirements; (6) outlined the technology as well as human factors requirements for the candidate options; and (7) summarized the themes and approaches that could be employed for the science aspects of a national Moon/Mars exploration program.

  3. Decoy-state quantum key distribution with biased basis choice

    PubMed Central

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states. PMID:23948999

  4. Decoy-state quantum key distribution with biased basis choice.

    PubMed

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states.

  5. Two-key concurrent responding: response-reinforcement dependencies and blackouts1

    PubMed Central

    Herbert, Emily W.

    1970-01-01

    Two-key concurrent responding was maintained for three pigeons by a single variable-interval 1-minute schedule of reinforcement in conjunction with a random number generator that assigned feeder operations between keys with equal probability. The duration of blackouts was varied between keys when each response initiated a blackout, and grain arranged by the variable-interval schedule was automatically presented after a blackout (Exp. I). In Exp. II every key peck, except for those that produced grain, initiated a blackout, and grain was dependent upon a response following a blackout. For each pigeon in Exp. I and for one pigeon in Exp. II, the relative frequency of responding on a key approximated, i.e., matched, the relative reciprocal of the duration of the blackout interval on that key. In a third experiment, blackouts scheduled on a variable-interval were of equal duration on the two keys. For one key, grain automatically followed each blackout; for the other key, grain was dependent upon a response and never followed a blackout. The relative frequency of responding on the former key, i.e., the delay key, better approximated the negative exponential function obtained by Chung (1965) than the matching function predicted by Chung and Herrnstein (1967). PMID:16811458

  6. One Step Quantum Key Distribution Based on EPR Entanglement

    PubMed Central

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-01-01

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865

  7. A checklist and adult key to the Chinese stonefly (Plecoptera) genera.

    PubMed

    Chen, Zhi-Teng; Du, Yu-Zhou

    2018-01-23

    The first checklist of the known stonefly genera of China is presented. Using relevant literature and available specimens, a diagnostic key to the ten families representing 65 genera is provided. In addition, illustrations for the key characters are provided.

  8. Key Working for Families with Young Disabled Children

    PubMed Central

    Carter, Bernie; Thomas, Megan

    2011-01-01

    For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other

  9. Special Education Law: Illustrative Basics and Nuances of Key IDEA Components

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2015-01-01

    Intended as professional development for both new and experienced special educators, this article provides both the basic requirements and nuanced issues for foundational, successive, and overlapping key components under the Individuals With Disabilities Education Act (IDEA): (a) child find, (b) eligibility, and (c) free appropriate public…

  10. Psychometric properties of the Transitions from Foster Care Key Leader Survey.

    PubMed

    Salazar, Amy M; Brown, Eric C; Monahan, Kathryn C; Catalano, Richard F

    2016-04-01

    This study summarizes the development and piloting of the Transitions from Foster Care Key Leader Survey (TFC-KLS), an instrument designed to measure change in systems serving young people transitioning from foster care to adulthood. The Jim Casey Youth Opportunity Initiative's logic model was used as a basis for instrument development. The instrument was piloted with 119 key leaders in six communities. Seven of eight latent scales performed well in psychometric testing. The relationships among the 24 measures of system change were explored. A CFA testing overall model fit was satisfactory following slight modifications. Finally, a test of inter-rater reliability between two raters did not find reliable reporting of service availability in a supplemental portion of the survey. The findings were generally positive and supported the validity and utility of the instrument for measuring system change, following some adaptations. Implications for the field are discussed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Weighted Key Player Problem for Social Network Analysis

    DTIC Science & Technology

    2011-03-01

    the degree of the actor, the number of adjacent neighbors, to de - termine its centrality value. Introduced in its current form by Freeman, a node’s...identifying individuals who are key in a number of contexts. This chapter developed the WKPP-Pos measure that allows for the inclusion of actor and...Techniques were de - 44 veloped for using the p-median to find optimal solutions to the WKPP-Pos measure and for using hierarchical clustering as a

  12. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  13. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    NASA Astrophysics Data System (ADS)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  14. Paediatric International Nursing Study: using person-centred key performance indicators to benchmark children's services.

    PubMed

    McCance, Tanya; Wilson, Val; Kornman, Kelly

    2016-07-01

    The aim of the Paediatric International Nursing Study was to explore the utility of key performance indicators in developing person-centred practice across a range of services provided to sick children. The objective addressed in this paper was evaluating the use of these indicators to benchmark services internationally. This study builds on primary research, which produced indicators that were considered novel both in terms of their positive orientation and use in generating data that privileges the patient voice. This study extends this research through wider testing on an international platform within paediatrics. The overall methodological approach was a realistic evaluation used to evaluate the implementation of the key performance indicators, which combined an integrated development and evaluation methodology. The study involved children's wards/hospitals in Australia (six sites across three states) and Europe (seven sites across four countries). Qualitative and quantitative methods were used during the implementation process, however, this paper reports the quantitative data only, which used survey, observations and documentary review. The findings demonstrate the quality of care being delivered to children and their families across different international sites. The benchmarking does, however, highlight some differences between paediatric and general hospitals, and between the different key performance indicators across all the sites. The findings support the use of the key performance indicators as a novel method to benchmark services internationally. Whilst the data collected across 20 paediatric sites suggest services are more similar than different, benchmarking illuminates variations that encourage a critical dialogue about what works and why. The transferability of the key performance indicators and measurement framework across different settings has significant implications for practice. The findings offer an approach to benchmarking and celebrating

  15. Nest predation research: Recent findings and future perspectives

    USGS Publications Warehouse

    Chalfoun, Anna D.; Ibanez-Alamo, J. D.; Magrath, R. D.; Schmidt, Kenneth A.; Thomson, R. L.; Oteyza, Juan C.; Haff, T. M.; Martin, T.E.

    2016-01-01

    Nest predation is a key source of selection for birds that has attracted increasing attention from ornithologists. The inclusion of new concepts applicable to nest predation that stem from social information, eavesdropping or physiology has expanded our knowledge considerably. Recent methodological advancements now allow focus on all three players within nest predation interactions: adults, offspring and predators. Indeed, the study of nest predation now forms a vital part of avian research in several fields, including animal behaviour, population ecology, evolution and conservation biology. However, within nest predation research there are important aspects that require further development, such as the comparison between ecological and evolutionary antipredator responses, and the role of anthropogenic change. We hope this review of recent findings and the presentation of new research avenues will encourage researchers to study this important and interesting selective pressure, and ultimately will help us to better understand the biology of birds.

  16. Entropy Driven Self-Assembly in Charged Lock-Key Particles.

    PubMed

    Odriozola, Gerardo; Lozada-Cassou, Marcelo

    2016-07-07

    In this work we study the lock-key model successfully used in supramolecular chemistry and particles self-assembly and gain further insight into the infinite diluted limit of the lock and key, depletant mediated, effective attraction. We discuss the depletant forces and entropy approaches to self-assembly and give details on the different contributions to the net force for a charged lock and key pair immersed in a solvent plus a primitive model electrolyte. We show a strong correlation of the force components behavior and the underlying processes of co-ion and solvent release from the cavity. In addition, we put into context the universal behavior observed for the energy-distance curves when changing the lock and key to solvent size ratio. Basically, we now show that this behavior is not always achieved and depends on the particular system geometry. Finally, we present a qualitative good agreement with experiments when changing the electrolyte concentration, valence, and cavity-key size ratio.

  17. Assessing the prevalence and clinical relevance of positive abdominal and pelvic CT findings in senior patients presenting to the emergency department.

    PubMed

    Alabousi, Abdullah; Patlas, Michael N; Meshki, Malek; Monteiro, Sandra; Katz, Douglas S

    2016-04-01

    The purpose of our study was to retrospectively evaluate the prevalence and clinical relevance of positive abdominal and pelvic CT findings for patients 65 years of age and older, when compared with all other scanned adult Emergency Department (ED) patients, at a single tertiary care hospital. Our hypothesis was that there is an increased prevalence and clinical relevance of positive abdominal/pelvic CT findings in senior patients. A research ethics board-approved retrospective review of all adult patients who underwent an emergency CT of the abdomen and pelvis for acute nontraumatic abdominal and/or pelvic signs and symptoms was performed. Two thousand one hundred two patients between October 1, 2011, and September 30, 2013, were reviewed. Six hundred thirty-one patients were included in the <65 group (298 men and 333 women; mean age 46, age range 18-64), and 462 were included in the >65 group (209 men and 253 women; mean age 77.6, age range 65-99). Overall, there were more positive CT findings for patients <65 (389 positive cases, 61.6 %) compared with the >65 group (257 positive cases, 55.6 %), which was a statistically significant difference (p < 0.03). Moreover, with the exception of complicated appendicitis cases, which were more common in the >65 group, there were no statistically significant differences in the clinical/surgical relevance of the positive CT findings between the two groups. The findings of our retrospective study therefore refute our hypothesis that there is an increased prevalence of positive abdominal CT findings in patients >65. This may be related to ED physicians at our institution being more hesitant to order CT examinations for the younger population, presumably due to radiation concerns. However, older patients in our series were more likely to present with complicated appendicitis, and a lower threshold for ordering CT examinations of the abdomen and pelvis in this patient population should therefore be considered.

  18. Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses

    NASA Astrophysics Data System (ADS)

    Zhang, Zhan-Jun; Man, Zhong-Xiao

    2005-07-01

    Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.

  19. Intake of key chronic disease-related nutrients among baby boomers.

    PubMed

    King, Dana E; Xiang, Jun; Brown, Alexander

    2014-06-01

    The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease-related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease-related nutrients of the baby boomer generation with the previous generation of middle-aged adults. National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988-1994) and the NHANES for 2007-2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. The baby boomers' average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P < 0.001). The intake of vitamin C (105/89 g), water (1208/1001 g), and vegetables (199/229 g) was less than that of the previous generation (P < 0.001), and the dietary intake of fruit and fiber was unchanged. In regression analyses, dietary changes remained significant after controlling for age, race, sex, and socioeconomic status (all P < 0.01). The study findings document higher dietary intake of key chronic disease-related nutrients along with reduced vegetable intake among baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group.

  20. Intake of Key Chronic Disease–Related Nutrients among Baby Boomers

    PubMed Central

    King, Dana E.; Xiang, Jun; Brown, Alexander

    2014-01-01

    Objectives The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease–related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease–related nutrients of the baby boomer generation with the previous generation of middle-aged adults. Methods National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988–1994) and the NHANES for 2007–2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. Results The baby boomers’ average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P < 0.001). The intake of vitamin C (105/89 g), water (1208/1001 g), and vegetables (199/229 g) was less than that of the previous generation (P < 0.001), and the dietary intake of fruit and fiber was unchanged. In regression analyses, dietary changes remained significant after controlling for age, race, sex, and socioeconomic status (all P < 0.01). Conclusions The study findings document higher dietary intake of key chronic disease–related nutrients along with reduced vegetable intake among baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group. PMID:24945165

  1. Colonoscopic findings and management of patients with outbreak typhoid fever presenting with lower gastrointestinal bleeding.

    PubMed

    Shaikhani, Mohammad A R; Husein, Hiwa A B; Karbuli, Taha A; Mohamed, Mohamed Abdulrahman

    2013-09-01

    Lower gastrointestinal bleeding (LGIB) along with intestinal perforation is a well-known complication of typhoid fever. Reports of colonoscopic appearance and intervention of typhoid perforation involve only few cases. This series reports the colonoscopic findings and the role of colonoscopic hemostatic interventions in controlling the bleeding ileocolonic lesions. During the typhoid fever outbreak in Sulaymaniyah City in Iraqi Kurdistan Region, we received 52 patients with LGIB manifesting as fresh bleeding per rectum or melena. We performed total colonoscopy with ileal intubation for all cases. The findings were recorded and endoscopic hemostatic intervention with adrenaline-saline injection and argon plasma coagulation was applied to actively bleeding lesion. These patients were young, 11-30 years of age, with female preponderance. Blood culture was positive in 50 %. Colonoscopic findings were mostly located in the ileocecal region, although other areas of the colon were involved in many cases. Twenty-four percent of the cases required endoscopic hemostatic intervention by adrenaline injection with argon plasma coagulation which was effective in all patients except one who died in spite of surgical intervention in addition of endoscopic hemostasis. Dual endoscopic hemostatic intervention can be a safe and effective management option for patients with LGIB due to typhoid fever.

  2. Quantum key distribution with passive decoy state selection

    NASA Astrophysics Data System (ADS)

    Mauerer, Wolfgang; Silberhorn, Christine

    2007-05-01

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical postprocessing. This allows one to improve the effective signal statistics and achievable distance.

  3. Quantum key distribution using gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Grosshans, Frédéric; Van Assche, Gilles; Wenger, Jérôme; Brouri, Rosa; Cerf, Nicolas J.; Grangier, Philippe

    2003-01-01

    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

  4. CT and MRI Findings in Cerebral Aspergilloma.

    PubMed

    Gärtner, Friederike; Forstenpointner, Julia; Ertl-Wagner, Birgit; Hooshmand, Babak; Riedel, Christian; Jansen, Olav

    2017-11-20

    Purpose  Invasive aspergillosis usually affects immunocompromised patients. It carries a high risk of morbidity and mortality and usually has a nonspecific clinical presentation. Early diagnosis is essential in order to start effective treatment and improve clinical outcome. Materials and Methods  In a retrospective search of the PACS databases from two medical centers, we identified 9 patients with histologically proven cerebral aspergilloma. We systematically analyzed CT and MRI imaging findings to identify typical imaging appearances of cerebral aspergilloma. Results  CT did not show a typical appearance of the aspergillomas. In 100 % (9/9) there was a rim-attenuated diffusion restriction on MRI imaging. Multiple hypointense layers in the aspergillus wall, especially on the internal side, were detected in 100 % on T2-weighted imaging (9/9). Aspergillomas were T1-hypointense in 66 % of cases (6/9) and partly T1-hyperintense in 33 % (3/9). In 78 % (7/9) of cases, a rim-attenuated diffusion restriction was detected after contrast agent application. Conclusion  Nine cases were identified. Whereas CT features were less typical, we observed the following imaging features on MRI: A strong, rim-attenuated diffusion restriction (9/9); onion layer-like hypointense zones, in particular in the innermost part of the abscess wall on T2-weighted images (9/9). Enhancement of the lesion border was present in the majority of the cases (7/9). Key points   · There are typical MRI imaging features of aspergillomas.. · However, these findings could be affected by the immune status of the patient.. · Swift identification of aspergilloma imaging patterns is essential to allow for adequate therapeutic decision making.. Citation Format · Gärtner F, Forstenpointner J, Ertl-Wagner B et al. CT and MRI Findings in Cerebral Aspergilloma. Fortschr Röntgenstr 2017; DOI: 10.1055/s-0043-120766. © Georg Thieme Verlag KG Stuttgart · New York.

  5. Webinar summary: Important findings for managers [Chapter 2

    Treesearch

    Claudia Regan

    2014-01-01

    This chapter summarizes key findings and offers take-home messages of the Future Forest Webinar Series with regard to resource management planning, analyses, and project design. In the wake of the mountain pine beetle (MPB) epidemic, resource managers are especially concerned with developing more resilient forests, providing for the sustainability of wildlife and fish...

  6. How Is This Flower Pollinated? A Polyclave Key to Use in Teaching.

    ERIC Educational Resources Information Center

    Tyrrell, Lucy

    1989-01-01

    Presents an identification method which uses the process of elimination to identify pollination systems. Provides the polyclave key, methodology for using the key, a sample worksheet, and abbreviation codes for pollination systems. (MVL)

  7. Are the Keys loved to death? A study of diver specialization levels and preferences in the Florida Keys

    Treesearch

    Shona Paterson; David K. Loomis

    2010-01-01

    This paper presents research conducted for the Florida Reef Resilience Program on nonresident recreational SCUBA divers in three zones of the Florida Keys. When divers were segmented into specialization subgroups for analysis, divers in different subgroups tended to use different geographic locations. These results suggest differences in user preferences; yet when...

  8. A visual identification key utilizing both gestalt and analytic approaches to identification of Carices present in North America (Plantae, Cyperaceae)

    PubMed Central

    2013-01-01

    Abstract Images are a critical part of the identification process because they enable direct, immediate and relatively unmediated comparisons between a specimen being identified and one or more reference specimens. The Carices Interactive Visual Identification Key (CIVIK) is a novel tool for identification of North American Carex species, the largest vascular plant genus in North America, and two less numerous closely-related genera, Cymophyllus and Kobresia. CIVIK incorporates 1288 high-resolution tiled image sets that allow users to zoom in to view minute structures that are crucial at times for identification in these genera. Morphological data are derived from the earlier Carex Interactive Identification Key (CIIK) which in turn used data from the Flora of North America treatments. In this new iteration, images can be viewed in a grid or histogram format, allowing multiple representations of data. In both formats the images are fully zoomable. PMID:24723777

  9. Key to the recognition of normapolles and some morphologically similar pollen genera

    USGS Publications Warehouse

    Batten, D.J.; Christopher, R.A.

    1981-01-01

    A dichotomous key to the recognition of 86 Normapolles and morphologically similar pollen genera is presented. The key is accompanied by line drawings of each genus and an illustrated glossary of descriptive terms. ?? 1981.

  10. On the complexity of search for keys in quantum cryptography

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2016-03-01

    The trace distance is used as a security criterion in proofs of security of keys in quantum cryptography. Some authors doubted that this criterion can be reduced to criteria used in classical cryptography. The following question has been answered in this work. Let a quantum cryptography system provide an ɛ-secure key such that ½‖ρ XE - ρ U ⊗ ρ E ‖1 < ɛ, which will be repeatedly used in classical encryption algorithms. To what extent does the ɛ-secure key reduce the number of search steps (guesswork) as compared to the use of ideal keys? A direct relation has been demonstrated between the complexity of the complete consideration of keys, which is one of the main security criteria in classical systems, and the trace distance used in quantum cryptography. Bounds for the minimum and maximum numbers of search steps for the determination of the actual key have been presented.

  11. All together now: findings from a PCORI workshop to align patient-reported outcomes in the electronic health record

    PubMed Central

    Jensen, Roxanne E; Snyder, Claire F; Basch, Ethan; Frank, Lori; Wu, Albert W

    2016-01-01

    In recent years, patient-reported outcomes have become increasingly collected and integrated into electronic health records. However, there are few cross-cutting recommendations and limited guidance available in this rapidly developing research area. Our goal is to report key findings from a 2013 Patient-Centered Outcomes Research Institute workshop on this topic and a summary of actions that followed from the workshop, and present resulting recommendations that address patient, clinical and research/quality improvement barriers to regular use. These findings provide actionable guidance across research and practice settings to promote and sustain widespread adoption of patient-reported outcomes across patient populations, healthcare settings and electronic health record systems. PMID:27586855

  12. All together now: findings from a PCORI workshop to align patient-reported outcomes in the electronic health record.

    PubMed

    Jensen, Roxanne E; Snyder, Claire F; Basch, Ethan; Frank, Lori; Wu, Albert W

    2016-11-01

    In recent years, patient-reported outcomes have become increasingly collected and integrated into electronic health records. However, there are few cross-cutting recommendations and limited guidance available in this rapidly developing research area. Our goal is to report key findings from a 2013 Patient-Centered Outcomes Research Institute workshop on this topic and a summary of actions that followed from the workshop, and present resulting recommendations that address patient, clinical and research/quality improvement barriers to regular use. These findings provide actionable guidance across research and practice settings to promote and sustain widespread adoption of patient-reported outcomes across patient populations, healthcare settings and electronic health record systems.

  13. Practical decoy state for quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Qi Bing; Zhao Yi

    2005-07-15

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less

  14. Thermohaline circulation at three key sections in the North Atlantic over 1985-2002

    NASA Astrophysics Data System (ADS)

    Marsh, Robert; de Cuevas, Beverly A.; Coward, Andrew C.; Bryden, Harry L.; Álvarez, Marta

    2005-05-01

    Efforts are presently underway to monitor the Thermohaline Circulation (THC) in the North Atlantic. A measuring strategy has been designed to monitor both the Meridional Overturning Circulation (MOC) in the subtropics and dense outflows at higher latitudes. To provide a historical context for these new observations, we diagnose an eddy-permitting ocean model simulation of the period 1985-2002. We present time series of the THC, MOC and heat transport, at key hydrographic sections in the subtropics, the northeast Atlantic and the Labrador Sea. The simulated THC compares well with observations. We find considerable variability in the THC on each section, most strikingly in the Labrador Sea during the early 1990's, consistent with observed changes. Overturning in the northeast Atlantic declines by ~20% over the 1990's, coincident with an increase in the subtropics. We speculate that MOC weakening may soon be detected in the subtropics, if the decline continues in mid-latitudes.

  15. Epigenetic reprogramming - is deamination key to active DNA demethylation?

    PubMed Central

    Teperek-Tkacz, Marta; Pasque, Vincent; Gentsch, George; Ferguson-Smith, Anne C.

    2013-01-01

    DNA demethylation processes are important for reproduction being central in epigenetic reprogramming during embryonic and germ cell development. While the enzymes methylating DNA have been known for many years, identification of factors capable of mediating active DNA demethylation has been challenging. Recent findings suggest that cytidine deaminases may be key players in active DNA demethylation. One of the most investigated candidates is AID (activation-induced cytidine deaminase) best known for its role in generating secondary antibody diversity in B cells. We evaluate evidence for cytidine deaminases in DNA demethylation pathways in vertebrates and discuss possible models for their targeting and activity regulation. These findings are also considered alongside alternative demethylation pathways involving hydroxymethylation. PMID:21911441

  16. Honeybees Learn Odour Mixtures via a Selection of Key Odorants

    PubMed Central

    Reinhard, Judith; Sinclair, Michael; Srinivasan, Mandyam V.; Claudianos, Charles

    2010-01-01

    Background The honeybee has to detect, process and learn numerous complex odours from her natural environment on a daily basis. Most of these odours are floral scents, which are mixtures of dozens of different odorants. To date, it is still unclear how the bee brain unravels the complex information contained in scent mixtures. Methodology/Principal Findings This study investigates learning of complex odour mixtures in honeybees using a simple olfactory conditioning procedure, the Proboscis-Extension-Reflex (PER) paradigm. Restrained honeybees were trained to three scent mixtures composed of 14 floral odorants each, and then tested with the individual odorants of each mixture. Bees did not respond to all odorants of a mixture equally: They responded well to a selection of key odorants, which were unique for each of the three scent mixtures. Bees showed less or very little response to the other odorants of the mixtures. The bees' response to mixtures composed of only the key odorants was as good as to the original mixtures of 14 odorants. A mixture composed of the other, non-key-odorants elicited a significantly lower response. Neither an odorant's volatility or molecular structure, nor learning efficiencies for individual odorants affected whether an odorant became a key odorant for a particular mixture. Odorant concentration had a positive effect, with odorants at high concentration likely to become key odorants. Conclusions/Significance Our study suggests that the brain processes complex scent mixtures by predominantly learning information from selected key odorants. Our observations on key odorant learning lend significant support to previous work on olfactory learning and mixture processing in honeybees. PMID:20161714

  17. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following:more » 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.« less

  18. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  19. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  20. Biomarkers and Imaging Findings of Anderson–Fabry Disease—What We Know Now

    PubMed Central

    Beirão, Idalina; Cabrita, Ana; Torres, Márcia; Silva, Fernando; Aguiar, Patrício; Laranjeira, Francisco; Gomes, Ana Marta

    2017-01-01

    Anderson–Fabry disease (AFD) is an X-linked lysosomal storage disorder, caused by deficiency or absence of the alpha-galactosidase A activity, with a consequent glycosphingolipid accumulation. Biomarkers and imaging findings may be useful for diagnosis, identification of an organ involvement, therapy monitoring and prognosis. The aim of this article is to review the current available literature on biomarkers and imaging findings of AFD patients. An extensive bibliographic review from PubMed, Medline and Clinical Key databases was performed by a group of experts from nephrology, neurology, genetics, cardiology and internal medicine, aiming for consensus. Lyso-GB3 is a valuable biomarker to establish the diagnosis. Proteinuria and creatinine are the most valuable to detect renal damage. Troponin I and high-sensitivity assays for cardiac troponin T can identify patients with cardiac lesions, but new techniques of cardiac imaging are essential to detect incipient damage. Specific cerebrovascular imaging findings are present in AFD patients. Techniques as metabolomics and proteomics have been developed in order to find an AFD fingerprint. Lyso-GB3 is important for evaluating the pathogenic mutations and monitoring the response to treatment. Many biomarkers can detect renal, cardiac and cerebrovascular involvement, but none of these have proved to be important to monitoring the response to treatment. Imaging features are preferred in order to find cardiac and cerebrovascular compromise in AFD patients. PMID:28933368

  1. Key factors affecting dying children and their families.

    PubMed

    Hinds, Pamela S; Schum, Lisa; Baker, Justin N; Wolfe, Joanne

    2005-01-01

    The death of a child alters the life and health of others immediately and for the rest of their lives. How a child dies influences parents' abilities to continue their role functions as well as siblings' abilities to make and maintain friendships, and may be the basis for health care providers' decisions to exit direct care roles. Thus, facilitating a "good death"-an obvious care priority for all involved with the dying child-ought also to be a priority for the health of bereaved families and affected health care providers. Making this a care priority is complicated by a serious lack of data, as details of the last hours or weeks of a dying child or adolescent's life are largely unknown. The purpose of this paper is to identify key factors that affect the course of dying children and adolescents and that of their bereaved survivors, and to link those key factors to needed research that could produce clinically relevant findings to improve the care of these patients. Key factors described here include suffering (physical, psychological, and spiritual), communication, decision making, prognostic ambiguities, ability of the seriously ill child to give assent to research participation, and educational preparation of health care providers to give competent end-of-life care.

  2. TSLP: A Key Regulator of Asthma Pathogenesis.

    PubMed

    West, Erin E; Kashyap, Mohit; Leonard, Warren J

    2012-12-01

    Asthma is a complex disorder of the airways that is characterized by T helper type 2 (Th2) inflammation. The pleiotrophic cytokine TSLP has emerged as an important player involved in orchestrating the inflammation seen in asthma and other atopic diseases. Early research elucidated the role of TSLP on CD4 + T cells, and recent work has revealed the impact of TSLP on multiple cell types. Furthermore, TSLP plays an important role in the sequential progression of atopic dermatitis to asthma, clarifying the key role of TSLP in the pathogenesis of asthma, a finding with therapeutic implications.

  3. Training: Who Needs It? Research Report 1995. Key Issues for Providers.

    ERIC Educational Resources Information Center

    Hotel and Catering Training Co., London (England).

    Aimed at all those involved in the supply of training and vocational education for the hospitality industry, this report summarizes findings of the research report, "Training Who Needs It?" It draws out and explores in more detail key issues relating to the provision of training, support, and related initiatives for the industry. Section…

  4. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  5. Quality and Improvement in Scottish Education: Trends in Inspection Findings 2008-2011

    ERIC Educational Resources Information Center

    Education Scotland, 2012

    2012-01-01

    The findings of Education Scotland's sectoral programme of inspections, which sample the providers of education at every stage from the early years to adult learning, provide a key source of evidence on how effectively one of its core public services is performing. The last published summary of inspection findings was produced in 2009 when Her…

  6. Optimizing height presentation for aircraft cockpit displays

    NASA Astrophysics Data System (ADS)

    Jordan, Chris S.; Croft, D.; Selcon, Stephen J.; Markin, H.; Jackson, M.

    1997-02-01

    This paper describes an experiment conducted to investigate the type of display symbology that most effectively conveys height information to users of head-down plan-view radar displays. The experiment also investigated the use of multiple information sources (redundancy) in the design of such displays. Subjects were presented with eight different height display formats. These formats were constructed from a control, and/or one, two, or three sources of redundant information. The three formats were letter coding, analogue scaling, and toggling (spatially switching the position of the height information from above to below the aircraft symbol). Subjects were required to indicate altitude awareness via a four-key, forced-choice keyboard response. Error scores and response times were taken as performance measures. There were three main findings. First, there was a significant performance advantage when the altitude information was presented above and below the symbol to aid the representation of height information. Second, the analogue scale, a line whose length indicated altitude, proved significantly detrimental to performance. Finally, no relationship was found between the number of redundant information sources employed and performance. The implications for future aircraft and displays are discussed in relation to current aircraft tactical displays and in the context of perceptual psychological theory.

  7. Benthic boundary layer processes in the Lower Florida Keys

    USGS Publications Warehouse

    Lavoie, D.L.; Richardson, M.D.; Holmes, C.

    1997-01-01

    This special issue of Geo-Marine Letters, "Benthic Boundary Layer Processes in the Lower Florida Keys," includes 12 papers that present preliminary results from the Key West Campaign. The Dry Tortugas and Marquesas Keys test sites were selected by a group of 115 scientists and technicians to study benthic boundary layer processes in a carbonate environment controlled by bioturbation and biogeochemical processes. Major activities included remote sediment classification; high-frequency acoustic scattering experiments; sediment sampling for radiological, geotechnical, biological, biogeochemical, physical, and geoacoustic studies; and hydrodynamic studies using an instrumented tetrapod. All these data are being used to improve our understanding of the effects of environmental processes on sediment structure and behavior.

  8. Key Data on Education in Europe 2009

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; de Coster, Isabelle; Forsthuber, Bernadette; Noorani, Sogol; Ruffio, Philippe

    2009-01-01

    This seventh edition of "Key Data on Education in Europe" retains its main special feature which is the combination of statistical data and qualitative information to describe the organisation and functioning of education systems in Europe. The present 2009 edition maintains the subject-based structure defined by the previous one but…

  9. A Simplified Approach to Encephalitis and Its Mimics: Key Clinical Decision Points in the Setting of Specific Imaging Abnormalities.

    PubMed

    McKnight, Colin D; Kelly, Aine M; Petrou, Myria; Nidecker, Anna E; Lorincz, Matthew T; Altaee, Duaa K; Gebarski, Stephen S; Foerster, Bradley

    2017-06-01

    Infectious encephalitis is a relatively common cause of morbidity and mortality. Treatment of infectious encephalitis with antiviral medication can be highly effective when administered promptly. Clinical mimics of encephalitis arise from a broad range of pathologic processes, including toxic, metabolic, neoplastic, autoimmune, and cardiovascular etiologies. These mimics need to be rapidly differentiated from infectious encephalitis to appropriately manage the correct etiology; however, the many overlapping signs of these various entities present a challenge to accurate diagnosis. A systematic approach that considers both the clinical manifestations and the imaging findings of infectious encephalitis and its mimics can contribute to more accurate and timely diagnosis. Following an institutional review board approval, a health insurance portability and accountability act (HIPAA)-compliant search of our institutional imaging database (teaching files) was conducted to generate a list of adult and pediatric patients who presented between January 1, 1995 and October 10, 2013 for imaging to evaluate possible cases of encephalitis. Pertinent medical records, including clinical notes as well as surgical and pathology reports, were reviewed and correlated with imaging findings. Clinical and imaging findings were combined to generate useful flowcharts designed to assist in distinguishing infectious encephalitis from its mimics. Key imaging features were reviewed and were placed in the context of the provided flowcharts. Four flowcharts were presented based on the primary anatomic site of imaging abnormality: group 1: temporal lobe; group 2: cerebral cortex; group 3: deep gray matter; and group 4: white matter. An approach that combines features on clinical presentation was then detailed. Imaging examples were used to demonstrate similarities and key differences. Early recognition of infectious encephalitis is critical, but can be quite complex due to diverse pathologies and

  10. An Improved Recovery Algorithm for Decayed AES Key Schedule Images

    NASA Astrophysics Data System (ADS)

    Tsow, Alex

    A practical algorithm that recovers AES key schedules from decayed memory images is presented. Halderman et al. [1] established this recovery capability, dubbed the cold-boot attack, as a serious vulnerability for several widespread software-based encryption packages. Our algorithm recovers AES-128 key schedules tens of millions of times faster than the original proof-of-concept release. In practice, it enables reliable recovery of key schedules at 70% decay, well over twice the decay capacity of previous methods. The algorithm is generalized to AES-256 and is empirically shown to recover 256-bit key schedules that have suffered 65% decay. When solutions are unique, the algorithm efficiently validates this property and outputs the solution for memory images decayed up to 60%.

  11. Developing CALL for Heritage Languages: "The 7 Keys of the Dragon"

    ERIC Educational Resources Information Center

    Revithiadou, Anthi; Kourtis-Kazoullis, Vasilia; Soukalopoulou, Maria; Konstantoudakis, Konstantinos; Zarras, Christos

    2015-01-01

    In this article we present an interactive extensible software, "The 7 Keys of the Dragon," for the teaching/learning of Albanian and Russian to students that attend primary and secondary education in Greece with the respective languages as their heritage languages. We address the key challenges we encountered during the conceptualization…

  12. Making the decoy-state measurement-device-independent quantum key distribution practically useful

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Heng; Yu, Zong-Wen; Wang, Xiang-Bin

    2016-04-01

    The relatively low key rate seems to be the major barrier to its practical use for the decoy-state measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.

  13. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  14. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE PAGES

    Farmer, M. T.; Gerardi, C.; Bremer, N.; ...

    2016-10-31

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  15. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farmer, M. T.; Gerardi, C.; Bremer, N.

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  16. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  17. Stress in hospital medicine: a problem for key hospital staff.

    PubMed

    Allen, I

    2001-08-01

    Many factors which contribute to stress in the workplace apply to both consultants and ward sisters. Both groups find that their roles have become more complex while they have increasingly lost control of their own clinical and professional territory in a managerial culture. The erosion of the key relationship between consultants and ward sisters is of concern and the need for teamworking is insufficiently recognized.

  18. Diagnostic findings in infants presenting to a pediatric emergency department for lethargy or feeding complaints.

    PubMed

    Webb, Tara; Nugent, Melodee; Simpson, Pippa; Melzer-Lange, Marlene

    2014-03-01

    Lethargy is a common complaint among infants in the pediatric emergency department (ED), yet there is little data to guide appropriate evaluation. The objectives of the study were (1) to determine the frequency of diagnoses requiring intervention/monitoring and (2) to identify predictors of these diagnoses. A retrospective chart review of patients aged 0 to 6 months with a chief complaint of lethargy or poor feeding from January 2004 to December 2009 was performed. Patients were excluded if they had a fever, hypothermia, a chronic medical condition, or a history of trauma. Charts were reviewed by a single investigator; 10% were reviewed by a second investigator for agreement. History, examination, laboratory and radiology results, ED and inpatient diagnoses, as well as return visits within 7 days were recorded. Frequencies of diagnoses and interventions were described, and history and examination findings associated with these categories were determined. Two hundred seventy-two patients were included; 34 patients (12.5%; 95% confidence interval [CI], 8.8%-17%) required intervention/monitoring. These patients were classified into 6 categories. Eighteen had hematologic disorders (6.6%; 95% CI, 4.0%-10.3%), 8 had dehydration (2.9%; 95% CI, 1.3%-5.7%), 2 had intracranial bleeds (0.7%; 95% CI, 0.09%-2.6%), 3 had serious bacterial infections (1%; 95% CI, 0.2%-3.2%), 1 had a cardiac disorder (0.4%; 95% CI, 0.009%-2%), and 2 had neurologic disorders (0.7%; 95% CI, 0.9%-2.6%). Of the patients, 76% had conditions that were clinically evident (dehydration and hyperbilirubinemia requiring phototherapy). The patients with cardiac disorders, neurologic disorders, and intracranial bleeds all had abnormal examination findings in the ED. The 3 patients with serious bacterial infections were younger than 2 months of age and ill appearing; all had urinary tract infections. Infants with lethargy or poor feeding who require an intervention are likely to have conditions that are

  19. Differential phase-shift keying and channel equalization in free space optical communication system

    NASA Astrophysics Data System (ADS)

    Zhang, Dai; Hao, Shiqi; Zhao, Qingsong; Wan, Xiongfeng; Xu, Chenlu

    2018-01-01

    We present the performance benefits of differential phase-shift keying (DPSK) modulation in eliminating influence from atmospheric turbulence, especially for coherent free space optical (FSO) communication with a high communication rate. Analytic expression of detected signal is derived, based on which, homodyne detection efficiency is calculated to indicate the performance of wavefront compensation. Considered laser pulses always suffer from atmospheric scattering effect by clouds, intersymbol interference (ISI) in high-speed FSO communication link is analyzed. Correspondingly, the channel equalization method of a binormalized modified constant modulus algorithm based on set-membership filtering (SM-BNMCMA) is proposed to solve the ISI problem. Finally, through the comparison with existing channel equalization methods, its performance benefits of both ISI elimination and convergence speed are verified. The research findings have theoretical significance in a high-speed FSO communication system.

  20. [Reversal of aging and lifespan elongation. Current biomedical key publications and the implications for geriatrics].

    PubMed

    Bollheimer, L C; Volkert, D; Bertsch, T; Sieber, C C; Büttner, R

    2013-08-01

    Biological aging means a time-dependent accumulation of changes to which a living organism is being exposed during its lifetime. Biological aging normally concurs with chronological aging the time frame of which is set by an upper limit, the lifespan (in humans approximately 120 years). New findings in experimental biogerontology are challenging both the dogma of irreversibility of biological aging and the preset species-specific limitations of life. The present overview first explains the general principle of rejuvenation and reversal of biological aging with paradigms from stem cell research. Secondly, recent key publications on artificial telomerase elongation and (alleged) lifespan enhancement by sirtuins and resveratrol will be discussed with an emphasis on the implications for (future) geriatric medicine.

  1. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  2. Community Peer-Led Falls Prevention Presentations: What Do the Experts Suggest?

    PubMed

    Khong, Linda A M; Berlach, Richard G; Hill, Keith D; Hill, Anne-Marie

    2018-04-01

    Falls among older adults are a major problem. Despite considerable progress in falls prevention research, older adults often show low motivation to engage in recommended preventive strategies. Peer-led falls prevention education for older adults may have potential for bridging the research evidence-practice gap, thereby promoting the uptake of falls prevention strategies. We evaluated peer educators' presentations of falls prevention education to community-dwelling older adults in regard to established criteria that were consistent with adult learning principles, the framework of health behaviour change, falls prevention guidelines, and recommendations for providing falls prevention information. We conducted a within-stage mixed model study using purposive and snowball sampling techniques to recruit 10 experts to evaluate video recordings of the delivery of three peer-led falls prevention presentations. Each expert viewed three videos and rated them using a questionnaire containing both open-ended and closed items. There was a good level of expert agreement across the questionnaire domains. Though the experts rated some aspects of the presentations highly, they thought that the presentations were mainly didactic in delivery, not consistently personally relevant to the older adult audience, and did not encourage older adults to engage in the preventive strategies that were presented. Based on the experts' findings, we developed five key themes and recommendations for the effective delivery of peer-led falls prevention presentations. These included recommending that peer educators share falls prevention messages in a more interactive and experiential manner and that uptake of strategies should be facilitated by encouraging the older adults to develop a personalised action plan. Findings suggest that if peer-led falls prevention presentations capitalise on older adults' capability, opportunity, and motivation, the older adults may be more receptive to take up falls

  3. Daylight operation of a free space, entanglement-based quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Peloso, Matthew P.; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, Antía; Kurtsiefer, Christian

    2009-04-01

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.

  4. The Children's Hearings Project Research Findings. A Summary Report.

    ERIC Educational Resources Information Center

    Merry, Sally E.; And Others

    Since 1980 the Children's Hearings Project (CHP) in Cambridge, Massachusetts, has offered status offenders and their families mediation as an alternative to the courts. This report describes CPH's origins and summarizes the results of an extensive research study conducted during the first 2 years of its operation. The key findings were: (1)…

  5. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  6. Upper bounds on secret-key agreement over lossy thermal bosonic channels

    NASA Astrophysics Data System (ADS)

    Kaur, Eneet; Wilde, Mark M.

    2017-12-01

    Upper bounds on the secret-key-agreement capacity of a quantum channel serve as a way to assess the performance of practical quantum-key-distribution protocols conducted over that channel. In particular, if a protocol employs a quantum repeater, achieving secret-key rates exceeding these upper bounds is evidence of having a working quantum repeater. In this paper, we extend a recent advance [Liuzzo-Scorpo et al., Phys. Rev. Lett. 119, 120503 (2017), 10.1103/PhysRevLett.119.120503] in the theory of the teleportation simulation of single-mode phase-insensitive Gaussian channels such that it now applies to the relative entropy of entanglement measure. As a consequence of this extension, we find tighter upper bounds on the nonasymptotic secret-key-agreement capacity of the lossy thermal bosonic channel than were previously known. The lossy thermal bosonic channel serves as a more realistic model of communication than the pure-loss bosonic channel, because it can model the effects of eavesdropper tampering and imperfect detectors. An implication of our result is that the previously known upper bounds on the secret-key-agreement capacity of the thermal channel are too pessimistic for the practical finite-size regime in which the channel is used a finite number of times, and so it should now be somewhat easier to witness a working quantum repeater when using secret-key-agreement capacity upper bounds as a benchmark.

  7. A Dichotomous Key to Tree Cones and Fruits of the Eastern United States.

    ERIC Educational Resources Information Center

    Collins, Linda T.

    1991-01-01

    The author presents a dichotomous key to 29 tree cones, fruits, and nuts of eastern United States. Students can use the key to identify at least 10 species in a 1-hour laboratory assignment. This key uses reproductive structures that are significantly different from others. These structures are durable enough to be used in the laboratory for many…

  8. Cerebro-costo-mandibular syndrome: Clinical, radiological, and genetic findings.

    PubMed

    Tooley, Madeleine; Lynch, Danielle; Bernier, Francois; Parboosingh, Jillian; Bhoj, Elizabeth; Zackai, Elaine; Calder, Alistair; Itasaki, Nobue; Wakeling, Emma; Scott, Richard; Lees, Melissa; Clayton-Smith, Jill; Blyth, Moira; Morton, Jenny; Shears, Debbie; Kini, Usha; Homfray, Tessa; Clarke, Angus; Barnicoat, Angela; Wallis, Colin; Hewitson, Rebecca; Offiah, Amaka; Saunders, Michael; Langton-Hewer, Simon; Hilliard, Tom; Davis, Peter; Smithson, Sarah

    2016-05-01

    Cerebro-Costo-Mandibular syndrome (CCMS) is a rare autosomal dominant condition comprising branchial arch-derivative malformations with striking rib-gaps. Affected patients often have respiratory difficulties, associated with upper airway obstruction, reduced thoracic capacity, and scoliosis. We describe a series of 12 sporadic and 4 familial patients including 13 infants/children and 3 adults. Severe micrognathia and reduced numbers of ribs with gaps are consistent findings. Cleft palate, feeding difficulties, respiratory distress, tracheostomy requirement, and scoliosis are common. Additional malformations such as horseshoe kidney, hypospadias, and septal heart defect may occur. Microcephaly and significant developmental delay are present in a small minority of patients. Key radiological findings are of a narrow thorax, multiple posterior rib gaps and abnormal costo-transverse articulation. A novel finding in 2 patients is bilateral accessory ossicles arising from the hyoid bone. Recently, specific mutations in SNRPB, which encodes components of the major spliceosome, have been found to cause CCMS. These mutations cluster in an alternatively spliced regulatory exon and result in altered SNRPB expression. DNA was available from 14 patients and SNRPB mutations were identified in 12 (4 previously reported). Eleven had recurrent mutations previously described in patients with CCMS and one had a novel mutation in the alternative exon. These results confirm the specificity of SNRPB mutations in CCMS and provide further evidence for the role of spliceosomal proteins in craniofacial and thoracic development. © 2016 Wiley Periodicals, Inc.

  9. Key Ingredients-Target Groups, Methods and Messages, and Evaluation-of Local-Level, Public Interventions to Counter Stigma and Discrimination: A Lived Experience Informed Selective Narrative Literature Review.

    PubMed

    Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A

    2018-04-01

    A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.

  10. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    NASA Astrophysics Data System (ADS)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  11. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  12. Eavesdropping on counterfactual quantum key distribution with finite resources

    NASA Astrophysics Data System (ADS)

    Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng

    2014-08-01

    A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.

  13. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  14. 1981-1982 Evaluation Findings.

    ERIC Educational Resources Information Center

    Austin Independent School District, TX. Office of Research and Evaluation.

    The findings in evaluation and testing activities of the Austin Independent School District (AISD) during the 1981-82 school year are summarized. The first section, "1982 at a Glance," discusses the evaluation findings as a whole. Final reports and abstracts of related reports on achievement test results are presented for the district…

  15. Ten steps to successful poster presentation.

    PubMed

    Hardicre, Jayne; Devitt, Patric; Coad, Jane

    Receiving a letter confirming acceptance for you to present a poster at a conference can evoke mixed emotions. Joy, panic, fear and dread are among the many possible emotions and this is not exclusive to first time presenters. Developing an effective poster presentation is a skill that you can learn and can provide a rewarding way to present your work in a manner less intimidating than oral presentation (Shelledy, 2004). The key to successful poster presentation is meticulous, timely, well informed preparation. This article outlines ten steps to help guide you through the process to maximize your success.

  16. Inclusion Body Myositis: A Case Presenting with Respiratory Failure and Autopsy Findings Leading to the Hypothesis of a Paraneoplastic Cause.

    PubMed

    Dardis, Christopher; Antezana, Ariel; Tanji, Kurenai; Maccabee, Paul J

    2017-06-23

    BACKGROUND Sporadic inclusion body myositis (IBM) is the most common acquired myopathy seen in adults aged over 50 years, with a prevalence estimated at between 1 and 70 per million. Weakness of the diaphragm with loss of vital capacity is almost universal in IBM. This is almost always asymptomatic. When respiratory complications occur, they are most often due to aspiration. Respiratory failure due to diaphragmatic weakness is exceptionally rare, particularly as the presenting symptom of the disease. It is not currently considered to be a paraneoplastic syndrome. CASE REPORT Our patient presented with hypercarbic respiratory failure. This is the first such reported case without signs of weakness elsewhere of which we are aware. We suspected IBM based on her history of progressive weakness and findings on electromyography. There was a delay of 5 years in obtaining biopsy for confirmation, during which she presented with recurrent episodes of respiratory failure despite using non-invasive ventilation. An autopsy revealed the presence of papillary thyroid carcinoma with spread to local lymph nodes. On the basis that these co-morbidities are unlikely to have occurred by chance (we estimate 1×10-17), we hypothesize that IBM may be a paraneoplastic condition. We acknowledge that proof would require demonstrating a pathogenic antibody. CONCLUSIONS IBM should be considered in older patients (age >45) presenting with otherwise unexplained respiratory failure. A workup for possible malignancy in this setting appears reasonable.

  17. Asymptomatic tracheal MALT lymphoma discovered on spirometric findings presenting with elevated respiratory resistance.

    PubMed

    Kadota, Naoki; Shinohara, Tsutomu; Machida, Hisanori; Nakanishi, Hirofumi; Suehiro, Fumie; Toda, Hiroko; Yoshino, Tadashi; Ogushi, Fumitaka

    2015-06-06

    Central airway obstruction (CAO) may be caused by various etiologies. However, conventional chest X-rays are rarely diagnostic for patients with CAO. We here described a 64-year-old asymptomatic female with tracheal mucosa-associated lymphoid tissue lymphoma discovered on spirometric findings during a complete physical examination. The plateau of forced expiratory flow was consistent with CAO. A decreased peak expiratory flow rate was noted at least 3 years before the diagnosis, and was attributed to an insufficient effort by the patient. Impulse oscillometric measurements, which were taken during quiet breathing and were effort-independent, suggested elevated respiratory resistance. These abnormalities completely disappeared after radiation therapy. The addition of impulse oscillometry to spirometry may be useful for screening CAO in routine health examinations.

  18. Limitations of poster presentations reporting educational innovations at a major international medical education conference

    PubMed Central

    Gordon, Morris; Darbyshire, Daniel; Saifuddin, Aamir; Vimalesvaran, Kavitha

    2013-01-01

    Background In most areas of medical research, the label of ‘quality’ is associated with well-accepted standards. Whilst its interpretation in the field of medical education is contentious, there is agreement on the key elements required when reporting novel teaching strategies. We set out to assess if these features had been fulfilled by poster presentations at a major international medical education conference. Methods Such posters were analysed in four key areas: reporting of theoretical underpinning, explanation of instructional design methods, descriptions of the resources needed for introduction, and the offering of materials to support dissemination. Results Three hundred and twelve posters were reviewed with 170 suitable for analysis. Forty-one percent described their methods of instruction or innovation design. Thirty-three percent gave details of equipment, and 29% of studies described resources that may be required for delivering such an intervention. Further resources to support dissemination of their innovation were offered by 36%. Twenty-three percent described the theoretical underpinning or conceptual frameworks upon which their work was based. Conclusions These findings suggest that posters presenting educational innovation are currently limited in what they offer to educators. Presenters should seek to enhance their reporting of these crucial aspects by employing existing published guidance, and organising committees may wish to consider explicitly requesting such information at the time of initial submission. PMID:24199272

  19. Limitations of poster presentations reporting educational innovations at a major international medical education conference.

    PubMed

    Gordon, Morris; Darbyshire, Daniel; Saifuddin, Aamir; Vimalesvaran, Kavitha

    2013-02-19

    In most areas of medical research, the label of 'quality' is associated with well-accepted standards. Whilst its interpretation in the field of medical education is contentious, there is agreement on the key elements required when reporting novel teaching strategies. We set out to assess if these features had been fulfilled by poster presentations at a major international medical education conference. Such posters were analysed in four key areas: reporting of theoretical underpinning, explanation of instructional design methods, descriptions of the resources needed for introduction, and the offering of materials to support dissemination. Three hundred and twelve posters were reviewed with 170 suitable for analysis. Forty-one percent described their methods of instruction or innovation design. Thirty-three percent gave details of equipment, and 29% of studies described resources that may be required for delivering such an intervention. Further resources to support dissemination of their innovation were offered by 36%. Twenty-three percent described the theoretical underpinning or conceptual frameworks upon which their work was based. These findings suggest that posters presenting educational innovation are currently limited in what they offer to educators. Presenters should seek to enhance their reporting of these crucial aspects by employing existing published guidance, and organising committees may wish to consider explicitly requesting such information at the time of initial submission.

  20. Limitations of poster presentations reporting educational innovations at a major international medical education conference.

    PubMed

    Gordon, Morris; Darbyshire, Daniel; Saifuddin, Aamir; Vimalesvaran, Kavitha

    2013-01-01

    In most areas of medical research, the label of 'quality' is associated with well-accepted standards. Whilst its interpretation in the field of medical education is contentious, there is agreement on the key elements required when reporting novel teaching strategies. We set out to assess if these features had been fulfilled by poster presentations at a major international medical education conference. Such posters were analysed in four key areas: reporting of theoretical underpinning, explanation of instructional design methods, descriptions of the resources needed for introduction, and the offering of materials to support dissemination. Three hundred and twelve posters were reviewed with 170 suitable for analysis. Forty-one percent described their methods of instruction or innovation design. Thirty-three percent gave details of equipment, and 29% of studies described resources that may be required for delivering such an intervention. Further resources to support dissemination of their innovation were offered by 36%. Twenty-three percent described the theoretical underpinning or conceptual frameworks upon which their work was based. These findings suggest that posters presenting educational innovation are currently limited in what they offer to educators. Presenters should seek to enhance their reporting of these crucial aspects by employing existing published guidance, and organising committees may wish to consider explicitly requesting such information at the time of initial submission.

  1. The role and mechanics of dendritic cells in tumor antigen acquisition and presentation following laser immunotherapy

    NASA Astrophysics Data System (ADS)

    Laverty, Sean M.; Dawkins, Bryan A.; Chen, Wei R.

    2018-02-01

    We extend our model of the antitumor immune response initiated by laser-immunotherapy treatment to more closely examine key steps in the immune response 1) tumor antigen acquisition by antigen-presenting dendritic cells (DCs) and 2) cytotoxic T cell (CTL) priming by lymphatic DCs. Specifically we explore the formation of DC-CTL complexes that lead to CTL priming. We find that the bias in the dissociation rate of the complex influences the outcome of treatment. In particular, a bias towards priming favors a rapid activated CTL response and the clearance of tumors.

  2. Microscale optical cryptography using a subdiffraction-limit optical key

    NASA Astrophysics Data System (ADS)

    Ogura, Yusuke; Aino, Masahiko; Tanida, Jun

    2018-04-01

    We present microscale optical cryptography using a subdiffraction-limit optical pattern, which is finer than the diffraction-limit size of the decrypting optical system, as a key and a substrate with a reflectance distribution as an encrypted image. Because of the subdiffraction-limit spatial coding, this method enables us to construct a secret image with the diffraction-limit resolution. Simulation and experimental results demonstrate, both qualitatively and quantitatively, that the secret image becomes recognizable when and only when the substrate is illuminated with the designed key pattern.

  3. Key Higher-Education Issues in the States

    ERIC Educational Resources Information Center

    Fischer, Karin; Hebel, Sara

    2007-01-01

    Legislatures are set to convene in January in 43 states. This article presents the key issues that are expected to be debated by legislatures in states this year. These issues include: (1) Annulment of a controversial law in Texas that guarantees students who graduate in the top 10 percent of their high-school classes admission to any public…

  4. Efficient bit sifting scheme of post-processing in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Le, Dan; Wu, Xianyan; Niu, Xiamu; Guo, Hong

    2015-10-01

    Bit sifting is an important step in the post-processing of quantum key distribution (QKD). Its function is to sift out the undetected original keys. The communication traffic of bit sifting has essential impact on the net secure key rate of a practical QKD system. In this paper, an efficient bit sifting scheme is presented, of which the core is a lossless source coding algorithm. Both theoretical analysis and experimental results demonstrate that the performance of the scheme is approaching the Shannon limit. The proposed scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means the proposed scheme can decrease the secure key consumption for classical channel authentication and increase the net secure key rate of the QKD system, as demonstrated by analyzing the improvement on the net secure key rate. Meanwhile, some recommendations on the application of the proposed scheme to some representative practical QKD systems are also provided.

  5. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  6. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  7. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  8. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  9. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  10. Parametric Human Body Reconstruction Based on Sparse Key Points.

    PubMed

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  11. Key paediatric messages from Amsterdam

    PubMed Central

    Barben, Jürg; Bohlin, Kajsa; Everard, Mark L.; Hall, Graham; Pijnenburg, Mariëlle; Priftis, Kostas N.; Rusconi, Franca; Midulla, Fabio

    2016-01-01

    The Paediatric Assembly of the European Respiratory Society (ERS) maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress. PMID:27730186

  12. Symmetric autocompensating quantum key distribution

    NASA Astrophysics Data System (ADS)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  13. Comparison of Alternative Evidence Summary and Presentation Formats in Clinical Guideline Development: A Mixed-Method Study

    PubMed Central

    Opiyo, Newton; Shepperd, Sasha; Musila, Nyokabi; Allen, Elizabeth; Nyamai, Rachel; Fretheim, Atle; English, Mike

    2013-01-01

    Background Best formats for summarising and presenting evidence for use in clinical guideline development remain less well defined. We aimed to assess the effectiveness of different evidence summary formats to address this gap. Methods Healthcare professionals attending a one-week Kenyan, national guideline development workshop were randomly allocated to receive evidence packaged in three different formats: systematic reviews (SRs) alone, systematic reviews with summary-of-findings tables, and ‘graded-entry’ formats (a ‘front-end’ summary and a contextually framed narrative report plus the SR). The influence of format on the proportion of correct responses to key clinical questions, the primary outcome, was assessed using a written test. The secondary outcome was a composite endpoint, measured on a 5-point scale, of the clarity of presentation and ease of locating the quality of evidence for critical neonatal outcomes. Interviews conducted within two months following completion of trial data collection explored panel members’ views on the evidence summary formats and experiences with appraisal and use of research information. Results 65 (93%) of 70 participants completed questions on the prespecified outcome measures. There were no differences between groups in the odds of correct responses to key clinical questions. ‘Graded-entry’ formats were associated with a higher mean composite score for clarity and accessibility of information about the quality of evidence for critical neonatal outcomes compared to systematic reviews alone (adjusted mean difference 0.52, 95% CI 0.06 to 0.99). There was no difference in the mean composite score between SR with SoF tables and SR alone. Findings from interviews with 16 panelists indicated that short narrative evidence reports were preferred for the improved clarity of information presentation and ease of use. Conclusions Our findings suggest that ‘graded-entry’ evidence summary formats may improve clarity and

  14. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  15. Security of a semi-quantum protocol where reflections contribute to the secret key

    NASA Astrophysics Data System (ADS)

    Krawec, Walter O.

    2016-05-01

    In this paper, we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using X basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work, we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key; for error rates larger than this threshold, A and B should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.

  16. A State-of-the-Art Review on Soil Reinforcement Technology Using Natural Plant Fiber Materials: Past Findings, Present Trends and Future Directions.

    PubMed

    Gowthaman, Sivakumar; Nakashima, Kazunori; Kawasaki, Satoru

    2018-04-04

    Incorporating sustainable materials into geotechnical applications increases day by day due to the consideration of impacts on healthy geo-environment and future generations. The environmental issues associated with conventional synthetic materials such as cement, plastic-composites, steel and ashes necessitate alternative approaches in geotechnical engineering. Recently, natural fiber materials in place of synthetic material have gained momentum as an emulating soil-reinforcement technique in sustainable geotechnics. However, the natural fibers are innately different from such synthetic material whereas behavior of fiber-reinforced soil is influenced not only by physical-mechanical properties but also by biochemical properties. In the present review, the applicability of natural plant fibers as oriented distributed fiber-reinforced soil (ODFS) and randomly distributed fiber-reinforced soil (RDFS) are extensively discussed and emphasized the inspiration of RDFS based on the emerging trend. Review also attempts to explore the importance of biochemical composition of natural-fibers on the performance in subsoil reinforced conditions. The treatment methods which enhances the behavior and lifetime of fibers, are also presented. While outlining the current potential of fiber reinforcement technology, some key research gaps have been highlighted at their importance. Finally, the review briefly documents the future direction of the fiber reinforcement technology by associating bio-mediated technological line.

  17. A State-of-the-Art Review on Soil Reinforcement Technology Using Natural Plant Fiber Materials: Past Findings, Present Trends and Future Directions

    PubMed Central

    Gowthaman, Sivakumar; Nakashima, Kazunori; Kawasaki, Satoru

    2018-01-01

    Incorporating sustainable materials into geotechnical applications increases day by day due to the consideration of impacts on healthy geo-environment and future generations. The environmental issues associated with conventional synthetic materials such as cement, plastic-composites, steel and ashes necessitate alternative approaches in geotechnical engineering. Recently, natural fiber materials in place of synthetic material have gained momentum as an emulating soil-reinforcement technique in sustainable geotechnics. However, the natural fibers are innately different from such synthetic material whereas behavior of fiber-reinforced soil is influenced not only by physical-mechanical properties but also by biochemical properties. In the present review, the applicability of natural plant fibers as oriented distributed fiber-reinforced soil (ODFS) and randomly distributed fiber-reinforced soil (RDFS) are extensively discussed and emphasized the inspiration of RDFS based on the emerging trend. Review also attempts to explore the importance of biochemical composition of natural-fibers on the performance in subsoil reinforced conditions. The treatment methods which enhances the behavior and lifetime of fibers, are also presented. While outlining the current potential of fiber reinforcement technology, some key research gaps have been highlighted at their importance. Finally, the review briefly documents the future direction of the fiber reinforcement technology by associating bio-mediated technological line. PMID:29617285

  18. Key to trematodes reported in waterfowl

    USGS Publications Warehouse

    McDonald, Malcolm Edwin

    1981-01-01

    The trematodes show the greatest variety of forms among the helminth parasites of waterfowl, including over half of all species reported; sometimes this group also includes the greatest part of the worms in a single bird. Over 500 species of trematodes have been reported in waterfowl. Almost all of these have been included in the present set of keys; it was not possible, however, to obtain the descriptions of a few forms (7 of 525).

  19. Can the University Forget the Past and Find Happiness in the Present?

    ERIC Educational Resources Information Center

    Hirsch, Abraham M.

    1972-01-01

    Outlines a proposal for structuring higher education so that both teaching and research are closely interrelated to particular social issues; for instance, world peace, urban improvement, health, or poverty. Traditional organization based on academic disciplines is considered not relevant to present research or instruction demands. (AL)

  20. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  1. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  2. Safe, Healthy and Ready to Succeed: Arizona School Readiness Key Performance Indicators

    ERIC Educational Resources Information Center

    Migliore, Donna E.

    2006-01-01

    "Safe, Healthy and Ready to Succeed: Arizona School Readiness Key Performance Indicators" presents a set of baseline measurements that gauge how well a statewide system of school readiness supports is addressing issues that affect Arizona children's readiness for school. The Key Performance Indicators (KPIs) measure the system, rather…

  3. Problem Finding in Professional Learning Communities: A Learning Study Approach

    ERIC Educational Resources Information Center

    Tan, Yuen Sze Michelle; Caleon, Imelda Santos

    2016-01-01

    This study marries collaborative problem solving and learning study in understanding the onset of a cycle of teacher professional development process within school-based professional learning communities (PLCs). It aimed to explore how a PLC carried out collaborative problem finding--a key process involved in collaborative problem solving--that…

  4. SSeCloud: Using secret sharing scheme to secure keys

    NASA Astrophysics Data System (ADS)

    Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang

    2017-08-01

    With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.

  5. Dual Key Speech Encryption Algorithm Based Underdetermined BSS

    PubMed Central

    Zhao, Huan; Chen, Zuo; Zhang, Xixiang

    2014-01-01

    When the number of the mixed signals is less than that of the source signals, the underdetermined blind source separation (BSS) is a significant difficult problem. Due to the fact that the great amount data of speech communications and real-time communication has been required, we utilize the intractability of the underdetermined BSS problem to present a dual key speech encryption method. The original speech is mixed with dual key signals which consist of random key signals (one-time pad) generated by secret seed and chaotic signals generated from chaotic system. In the decryption process, approximate calculation is used to recover the original speech signals. The proposed algorithm for speech signals encryption can resist traditional attacks against the encryption system, and owing to approximate calculation, decryption becomes faster and more accurate. It is demonstrated that the proposed method has high level of security and can recover the original signals quickly and efficiently yet maintaining excellent audio quality. PMID:24955430

  6. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  7. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  8. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  9. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  10. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  11. Gut Microbiota and Autism: Key Concepts and Findings

    ERIC Educational Resources Information Center

    Ding, Helen T.; Taur, Ying; Walkup, John T.

    2017-01-01

    There is an emerging body of evidence linking the intestinal microbiota with autism spectrum disorders (ASD). Studies have demonstrated differences in the composition of gut bacteria between children with ASD and controls. Certain intestinal bacteria have been observed in abundance and may be involved in the pathogenesis of ASD; including members…

  12. Finding the key - cell biology and science education.

    PubMed

    Miller, Kenneth R

    2010-12-01

    No international research community, cell biology included, can exist without an educational community to renew and replenish it. Unfortunately, cell biology researchers frequently regard their work as independent of the process of education and see little reason to reach out to science teachers. For cell biology to continue to prosper, I argue that researchers must support education in at least three ways. First, we must view education and research as part of a single scientific community. Second, we should take advantage of new technologies to connect the research laboratory to the classroom. Finally, we must take the initiative in defending the integrity of science teaching, particularly when education is under attack for political or religious reasons. Copyright © 2010 Elsevier Ltd. All rights reserved.

  13. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  14. Inclusion Body Myositis: A Case Presenting with Respiratory Failure and Autopsy Findings Leading to the Hypothesis of a Paraneoplastic Cause

    PubMed Central

    Dardis, Christopher; Antezana, Ariel; Tanji, Kurenai; Maccabee, Paul

    2017-01-01

    Patient: Female, 48 Final Diagnosis: Inclusion body myositis Symptoms: Shortness of breath • weakness Medication: — Clinical Procedure: Biopsy Specialty: Neurology Objective: Rare disease Background: Sporadic inclusion body myositis (IBM) is the most common acquired myopathy seen in adults aged over 50 years, with a prevalence estimated at between 1 and 70 per million. Weakness of the diaphragm with loss of vital capacity is almost universal in IBM. This is almost always asymptomatic. When respiratory complications occur, they are most often due to aspiration. Respiratory failure due to diaphragmatic weakness is exceptionally rare, particularly as the presenting symptom of the disease. It is not currently considered to be a paraneoplastic syndrome. Case Report: Our patient presented with hypercarbic respiratory failure. This is the first such reported case without signs of weakness elsewhere of which we are aware. We suspected IBM based on her history of progressive weakness and findings on electromyography. There was a delay of 5 years in obtaining biopsy for confirmation, during which she presented with recurrent episodes of respiratory failure despite using non-invasive ventilation. An autopsy revealed the presence of papillary thyroid carcinoma with spread to local lymph nodes. On the basis that these co-morbidities are unlikely to have occurred by chance (we estimate 1×10−17), we hypothesize that IBM may be a paraneoplastic condition. We acknowledge that proof would require demonstrating a pathogenic antibody. Conclusions: IBM should be considered in older patients (age >45) presenting with otherwise unexplained respiratory failure. A workup for possible malignancy in this setting appears reasonable. PMID:28642454

  15. "Untapped Potential?" Key Competency Learning and Physical Education

    ERIC Educational Resources Information Center

    Gillespie, Lorna; Penney, Dawn; Pope, Clive

    2013-01-01

    This paper reports on a collaborative action research project that directed attention to the opportunities Physical Education presents to develop learning associated with three of the key competencies detailed in the New Zealand Curriculum; thinking; managing self; and relating to others. Three teachers in one secondary school explored the…

  16. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  17. Characterizing autism spectrum disorders by key biochemical pathways.

    PubMed

    Subramanian, Megha; Timmerman, Christina K; Schwartz, Joshua L; Pham, Daniel L; Meffert, Mollie K

    2015-01-01

    The genetic and phenotypic heterogeneity of autism spectrum disorders (ASD) presents a substantial challenge for diagnosis, classification, research, and treatment. Investigations into the underlying molecular etiology of ASD have often yielded mixed and at times opposing findings. Defining the molecular and biochemical underpinnings of heterogeneity in ASD is crucial to our understanding of the pathophysiological development of the disorder, and has the potential to assist in diagnosis and the rational design of clinical trials. In this review, we propose that genetically diverse forms of ASD may be usefully parsed into entities resulting from converse patterns of growth regulation at the molecular level, which lead to the correlates of general synaptic and neural overgrowth or undergrowth. Abnormal brain growth during development is a characteristic feature that has been observed both in children with autism and in mouse models of autism. We review evidence from syndromic and non-syndromic ASD to suggest that entities currently classified as autism may fundamentally differ by underlying pro- or anti-growth abnormalities in key biochemical pathways, giving rise to either excessive or reduced synaptic connectivity in affected brain regions. We posit that this classification strategy has the potential not only to aid research efforts, but also to ultimately facilitate early diagnosis and direct appropriate therapeutic interventions.

  18. Characterizing autism spectrum disorders by key biochemical pathways

    PubMed Central

    Subramanian, Megha; Timmerman, Christina K.; Schwartz, Joshua L.; Pham, Daniel L.; Meffert, Mollie K.

    2015-01-01

    The genetic and phenotypic heterogeneity of autism spectrum disorders (ASD) presents a substantial challenge for diagnosis, classification, research, and treatment. Investigations into the underlying molecular etiology of ASD have often yielded mixed and at times opposing findings. Defining the molecular and biochemical underpinnings of heterogeneity in ASD is crucial to our understanding of the pathophysiological development of the disorder, and has the potential to assist in diagnosis and the rational design of clinical trials. In this review, we propose that genetically diverse forms of ASD may be usefully parsed into entities resulting from converse patterns of growth regulation at the molecular level, which lead to the correlates of general synaptic and neural overgrowth or undergrowth. Abnormal brain growth during development is a characteristic feature that has been observed both in children with autism and in mouse models of autism. We review evidence from syndromic and non-syndromic ASD to suggest that entities currently classified as autism may fundamentally differ by underlying pro- or anti-growth abnormalities in key biochemical pathways, giving rise to either excessive or reduced synaptic connectivity in affected brain regions. We posit that this classification strategy has the potential not only to aid research efforts, but also to ultimately facilitate early diagnosis and direct appropriate therapeutic interventions. PMID:26483618

  19. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  20. Automatically pairing measured findings across narrative abdomen CT reports.

    PubMed

    Sevenster, Merlijn; Bozeman, Jeffrey; Cowhy, Andrea; Trost, William

    2013-01-01

    Radiological measurements are one of the key variables in widely adopted guidelines (WHO, RECIST) that standardize and objectivize response assessment in oncology care. Measurements are typically described in free-text, narrative radiology reports. We present a natural language processing pipeline that extracts measurements from radiology reports and pairs them with extracted measurements from prior reports of the same clinical finding, e.g., lymph node or mass. A ground truth was created by manually pairing measurements in the abdomen CT reports of 50 patients. A Random Forest classifier trained on 15 features achieved superior results in an end-to-end evaluation of the pipeline on the extraction and pairing task: precision 0.910, recall 0.878, F-measure 0.894, AUC 0.988. Representing the narrative content in terms of UMLS concepts did not improve results. Applications of the proposed technology include data mining, advanced search and workflow support for healthcare professionals managing radiological measurements.

  1. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  2. Academic Primer Series: Five Key Papers for Consulting Clinician Educators.

    PubMed

    Chan, Teresa M; Gottlieb, Michael; Quinn, Antonia; London, Kory; Conlon, Lauren W; Ankel, Felix

    2017-02-01

    Clinician educators are often asked to perform consultations for colleagues. Invitations to consult and advise others on local problems can help foster great collaborations between centers, and allows for an exchange of ideas between programs. In this article, the authors identify and summarize several key papers to assist emerging clinician educators with the consultation process. A consensus-building process was used to generate a list of key papers that describe the importance and significance of educational consulting, informed by social media sources. A three-round voting methodology, akin to a Delphi study, determined the most impactful papers from the larger list. Summaries of the five most highly rated papers on education consultation are presented in this paper. These papers were determined by a mixed group of junior and senior faculty members, who have summarized these papers with respect to their relevance for their peer groups. Five key papers on the educational consultation process are presented in this paper. These papers offer background and perspective to help junior faculty gain a grasp of consultation processes.

  3. Robust multiparty quantum secret key sharing over two collective-noise channels

    NASA Astrophysics Data System (ADS)

    Zhang, Zhan-jun

    2006-02-01

    Based on a polarization-based quantum key distribution protocol over a collective-noise channel [Phys. Rev. Lett. 92 (2004) 017901], a robust (n,n)-threshold scheme of multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) is proposed. In this scheme the sharer entirety can establish a joint key with the message sender only if all the sharers collaborate together. Since Bell singlets are enough for use and only single-photon polarization needs to be identified, this scheme is feasible according to the present-day technique.

  4. Experimental interstellar organic chemistry - Preliminary findings

    NASA Technical Reports Server (NTRS)

    Khare, B. N.; Sagan, C.

    1973-01-01

    Review of the results of some explicit experimental simulation of interstellar organic chemistry consisting in low-temperature high-vacuum UV irradiation of condensed simple gases known or suspected to be present in the interstellar medium. The results include the finding that acetonitrile may be present in the interstellar medium. The implication of this and other findings are discussed.

  5. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  6. The Internet: Past, Present, and Future.

    ERIC Educational Resources Information Center

    Galbreath, Jeremy, Ed.

    1997-01-01

    Examines the "reality behind the hype" surrounding the Internet. Discusses its early development; growth and present state; and key applications, including e-mail, voice/video telephony, integrated messaging, electronic commerce, the World Wide Web, and Web commerce, Intranet, Extranet; education and training; security; ownership; and…

  7. State Legislative Leaders: Keys to Effective Legislation for Children and Families. A Report.

    ERIC Educational Resources Information Center

    State Legislative Leaders Foundation, Centerville, MA.

    In 1993, the State Legislative Leaders Foundation launched a research project, "State Legislative Leaders: Keys To Effective Legislation for Children and Families." This report documents the findings of the project involving 177 of the most influential Republican and Democratic state legislature leaders from all 50 states. For more than…

  8. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  9. Genetic relatedness of dengue viruses in Key West, Florida, USA, 2009-2010.

    PubMed

    Muñoz-Jordán, Jorge L; Santiago, Gilberto A; Margolis, Harold; Stark, Lillian

    2013-04-01

    Sequencing of dengue virus type 1 (DENV-1) strains isolated in Key West/Monroe County, Florida, indicate endemic transmission for >2 years of a distinct and predominant sublineage of the American-African genotype. DENV-1 strains isolated elsewhere in Florida grouped within a separate Central American lineage. Findings indicate endemic transmission of DENV into the continental United States.

  10. Key-Node-Separated Graph Clustering and Layouts for Human Relationship Graph Visualization.

    PubMed

    Itoh, Takayuki; Klein, Karsten

    2015-01-01

    Many graph-drawing methods apply node-clustering techniques based on the density of edges to find tightly connected subgraphs and then hierarchically visualize the clustered graphs. However, users may want to focus on important nodes and their connections to groups of other nodes for some applications. For this purpose, it is effective to separately visualize the key nodes detected based on adjacency and attributes of the nodes. This article presents a graph visualization technique for attribute-embedded graphs that applies a graph-clustering algorithm that accounts for the combination of connections and attributes. The graph clustering step divides the nodes according to the commonality of connected nodes and similarity of feature value vectors. It then calculates the distances between arbitrary pairs of clusters according to the number of connecting edges and the similarity of feature value vectors and finally places the clusters based on the distances. Consequently, the technique separates important nodes that have connections to multiple large clusters and improves the visibility of such nodes' connections. To test this technique, this article presents examples with human relationship graph datasets, including a coauthorship and Twitter communication network dataset.

  11. Quadrature-quadrature phase-shift keying

    NASA Astrophysics Data System (ADS)

    Saha, Debabrata; Birdsall, Theodore G.

    1989-05-01

    Quadrature-quadrature phase-shift keying (Q2PSK) is a spectrally efficient modulation scheme which utilizes available signal space dimensions in a more efficient way than two-dimensional schemes such as QPSK and MSK (minimum-shift keying). It uses two data shaping pulses and two carriers, which are pairwise quadrature in phase, to create a four-dimensional signal space and increases the transmission rate by a factor of two over QPSK and MSK. However, the bit error rate performance depends on the choice of pulse pair. With simple sinusoidal and cosinusoidal data pulses, the Eb/N0 requirement for Pb(E) = 10 to the -5 is approximately 1.6 dB higher than that of MSK. Without additional constraints, Q2PSK does not maintain constant envelope. However, a simple block coding provides a constant envelope. This coded signal substantially outperforms MSKS and TFM (time-frequency multiplexing) in bandwidth efficiency. Like MSK, Q2PSK also has self-clocking and self-synchronizing ability. An optimum class of pulse shapes for use in Q2PSK-format is presented. One suboptimum realization achieves the Nyquist rate of 2 bits/s/Hz using binary detection.

  12. Dissemination and Adoption of Comparative Effectiveness Research Findings When Findings Challenge Current Practices

    PubMed Central

    Schneider, Eric C.; Timbie, Justin W.; Fox, D. Steven; Van Busum, Kristin R.; Caloyeras, John P.

    2013-01-01

    Abstract Insufficient evidence regarding the effectiveness of medical treatments has been identified as a key source of inefficiency in the U.S. healthcare system. Variation in the use of diagnostic tests and treatments for patients with similar symptoms or conditions has been attributed to clinical uncertainty, since the published scientific evidence base does not provide adequate information to determine which treatments are most effective for patients with specific clinical needs. The federal government has made a dramatic investment in comparative effectiveness research (CER), with the expectation that CER will influence clinical practice and improve the efficiency of healthcare delivery. To do this, CER must provide information that supports fundamental changes in healthcare delivery and informs the choice of diagnostic and treatment strategies. This article summarizes findings from a qualitative analysis of the factors that impede the translation of CER into clinical practice and those that facilitate it. A case-study methodology is used to explore the extent to which these factors led to changes in clinical practice following five recent key CER studies. The enabling factors and barriers to translation for each study are discussed, the root causes for the failure of translation common to the studies are synthesized, and policy options that may optimize the impact of future CER—particularly CER funded through the American Recovery and Reinvestment Act of 2009—are proposed. PMID:28083277

  13. Models of HIV Preconception Care and Key Elements Influencing These Services: Findings from Healthcare Providers in Seven US Cities.

    PubMed

    Simone, Joanne; Hoyt, Mary Jo; Storm, Deborah S; Finocchario-Kessler, Sarah

    2018-06-05

    Preconception care can improve maternal and infant outcomes by identifying and modifying health risks before pregnancy and reducing unplanned pregnancies. However, information about how preconception care is provided to persons living with HIV (PLWH) is lacking. This study uses qualitative interviews with HIV care providers to describe current models of preconception care and explore factors influencing services. Single, anonymous, telephone interviews were conducted with 92 purposively selected HIV healthcare providers in Atlanta, Baltimore, Houston, Kansas City, Newark, Philadelphia, and San Francisco in 2013-2014. Content analysis and a grounded theory approach were used to analyze data. Participants included 57% physicians with a median of 10 [interquartile range (IQR) = 5-17] years HIV care experience; the mean proportion of female patients was 45%. Participants described Individual Provider (48.9%), Team-based (43.2%), and Referral-only (7.6%) models of preconception care, with 63% incorporating referrals outside their clinics. Thematic analysis identified five key elements influencing the provision of preconception care within and across models: consistency of delivery, knowledge and attitudes, clinic characteristics, coordination of care, and referral accessibility. Described models of preconception care reflect the complexity of our healthcare system. Qualitative analysis offers insights about how HIV clinicians provide preconception care and how key elements influence services. However, additional research about the models and outcomes of preconception care services are needed. To improve preconception care for PLWH, research and quality improvement initiatives must utilize available strengths and tackle existing barriers, identified by our study and others, to define and implement effective models of preconception care services.

  14. Timing and documentation of key events in neonatal resuscitation.

    PubMed

    Heathcote, Adam Charles; Jones, Jacqueline; Clarke, Paul

    2018-04-30

    Only a minority of babies require extended resuscitation at birth. Resuscitations concerning babies who die or who survive with adverse outcomes are increasingly subject to medicolegal scrutiny. Our aim was to describe real-life timings of key resuscitation events observed in a historical series of newborns who required full resuscitation at birth. Twenty-seven babies born in our centre over a 10-year period had an Apgar score of 0 at 1 min and required full resuscitation. The median (95% confidence interval) postnatal age at achieving key events were commencing cardiac compressions, 2.0 (1.5-4.0) min; endotracheal intubation, 3.8 (2.0-6.0) min; umbilical venous catheterisation 9.0 (7.5-12.0) min; and administration of first adrenaline dose 10.0 (8.0-14.0) min. The wide range of timings presented from real-life cases may prove useful to clinicians involved in medical negligence claims and provide a baseline for quality improvements in resuscitation training. What is Known: • Only a minority of babies require extended resuscitation at birth; these cases are often subject to medicolegal interrogation • Timings of key resuscitation events are poorly described and documentation of resuscitation events is often lacking yet is open to medicolegal scrutiny What is New: • We present a wide range of real-life timings of key resuscitation events during the era of routine newborn life support training • These timings may prove useful to clinicians involved in medical negligence claims and provide a baseline for quality improvements in resuscitation training.

  15. Measurement-device-independent entanglement-based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Liu, Hongwei; Yin, Zhenqiang; Li, Zuohan; Lian, Shibin; Du, Yungang; Wu, Lingan

    2016-05-01

    We present a quantum key distribution protocol in a model in which the legitimate users gather statistics as in the measurement-device-independent entanglement witness to certify the sources and the measurement devices. We show that the task of measurement-device-independent quantum communication can be accomplished based on monogamy of entanglement, and it is fairly loss tolerate including source and detector flaws. We derive a tight bound for collective attacks on the Holevo information between the authorized parties and the eavesdropper. Then with this bound, the final secret key rate with the source flaws can be obtained. The results show that long-distance quantum cryptography over 144 km can be made secure using only standard threshold detectors.

  16. The concept lens diagram: a new mechanism for presenting biochemistry content in terms of "big ideas".

    PubMed

    Rowland, Susan L; Smith, Christopher A; Gillam, Elizabeth M A; Wright, Tony

    2011-07-01

    A strong, recent movement in tertiary education is the development of conceptual, or "big idea" teaching. The emphasis in course design is now on promoting key understandings, core competencies, and an understanding of connections between different fields. In biochemistry teaching, this radical shift from the content-based tradition is being driven by the "omics" information explosion; we can no longer teach all the information we have available. Biochemistry is a core, enabling discipline for much of modern scientific research, and biochemistry teaching is in urgent need of a method for delivery of conceptual frameworks. In this project, we aimed to define the key concepts in biochemistry. We find that the key concepts we defined map well onto the core science concepts recommended by the Vision and Change project. We developed a new method to present biochemistry through the lenses of these concepts. This new method challenged the way we thought about biochemistry as teachers. It also stimulated the majority of the students to think more deeply about biochemistry and to make links between biochemistry and material in other courses. This method is applicable to the full spectrum of content usually taught in biochemistry. Copyright © 2011 Wiley Periodicals, Inc.

  17. Post-processing procedure for industrial quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Kiktenko, Evgeny; Trushechkin, Anton; Kurochkin, Yury; Fedorov, Aleksey

    2016-08-01

    We present algorithmic solutions aimed on post-processing procedure for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of classical public communication channel is also considered.

  18. Imaging Findings of Ulceroglandular Tularemia.

    PubMed

    Anand, Neil; Deochand, Osmani; Murphy, Robyn

    2017-01-01

    Francisella tularensis, the causative organism in Tularemia, is a relatively rare disease. There are a few radiological clues to elucidate its presence when suspicion arises. There should be strong consideration for Tularemia in the differential of any patient with its classic symptoms, diffuse cervical lymphadenopathy with evidence of necrosis, and enlarged adenoids. Ultrasound may demonstrate suppurative lymphadenopathy suggestive of infection, as in the case presented. CT often will demonstrate the extent of lymphadenopathy. On chest radiography, tularemia pneumonia is often the presenting finding, which may demonstrate bilateral or lobar infiltrates. Additionally, hilar lymphadenopathy and pleural effusions are often associated findings. Cavitary lesions may be present, which are better delineated on CT scan. We present a case of a 7-year-old male who presented with a painful right-sided palpable neck mass for 9 days, who was diagnosed with Tularemia after numerous admissions.

  19. Renewable Electricity Futures (Presentation)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mai, T.

    2012-08-01

    This presentation summarizes findings of NREL's Renewable Electricity Futures study, published in June 2012. RE Futures investigated the challenges and impacts of achieving very high renewable electricity generation levels in the contiguous United States by 2050. This presentation was presented in a Wind Powering America webinar on August 15, 2012 and is now available through the Wind Powering America website.

  20. Writing usable qualitative health research findings.

    PubMed

    Sandelowski, Margarete; Leeman, Jennifer

    2012-10-01

    Scholars in diverse health-related disciplines and specialty fields of practice routinely promote qualitative research as an essential component of intervention and implementation programs of research and of a comprehensive evidence base for practice. Remarkably little attention, however, has been paid to the most important element of qualitative studies--the findings in reports of those studies--and specifically to enhancing the accessibility and utilization value of these findings for diverse audiences of users. The findings in reports of qualitative health research are too often difficult to understand and even to find owing to the way they are presented. A basic strategy for enhancing the presentation of these findings is to translate them into thematic statements, which can then in turn be translated into the language of intervention and implementation. Writers of qualitative health research reports might consider these strategies better to showcase the significance and actionability of findings to a wider audience.

  1. Principles of visual key construction-with a visual identification key to the Fagaceae of the southeastern United States.

    PubMed

    Kirchoff, Bruce K; Leggett, Roxanne; Her, Va; Moua, Chue; Morrison, Jessica; Poole, Chamika

    2011-01-01

    Advances in digital imaging have made possible the creation of completely visual keys. By a visual key we mean a key based primarily on images, and that contains a minimal amount of text. Characters in visual keys are visually, not verbally defined. In this paper we create the first primarily visual key to a group of taxa, in this case the Fagaceae of the southeastern USA. We also modify our recently published set of best practices for image use in illustrated keys to make them applicable to visual keys. Photographs of the Fagaceae were obtained from internet and herbarium databases or were taken specifically for this project. The images were printed and then sorted into hierarchical groups. These hierarchical groups of images were used to create the 'couplets' in the key. A reciprocal process of key creation and testing was used to produce the final keys. Four keys were created, one for each of the parts-leaves, buds, fruits and bark. Species description pages consisting of multiple images were also created for each of the species in the key. Creation and testing of the key resulted in a modified list of best practices for image use visual keys. The inclusion of images into paper and electronic keys has greatly increased their ease of use. However, virtually all of these keys are still based upon verbally defined, atomistic characters. The creation of primarily visual keys allows us to overcome the well-known limitations of linguistic-based characters and create keys that are much easier to use, especially for botanical novices.

  2. Academic Primer Series: Eight Key Papers about Education Theory.

    PubMed

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  3. MoKey: A versatile exergame creator for everyday usage.

    PubMed

    Eckert, Martina; López, Marcos; Lázaro, Carlos; Meneses, Juan

    2017-11-27

    Currently, virtual applications for physical exercises are highly appreciated as rehabilitation instruments. This article presents a middleware called "MoKey" (Motion Keyboard), which converts standard off-the-shelf software into exergames (exercise games). A configurable set of gestures, captured by a motion capture camera, is translated into the key strokes required by the chosen software. The present study assesses the tool regarding usability and viability on a heterogeneous group of 11 participants, aged 5 to 51, with moderate to severe disabilities, and mostly bound to a wheelchair. In comparison with FAAST (The Flexible Action and Articulated Skeleton Toolkit), MoKey achieved better results in terms of ease of use and computational load. The viability as an exergame creator tool was proven with help of four applications (PowerPoint®, e-book reader, Skype®, and Tetris). Success rates of up to 91% have been achieved, subjective perception was rated with 4.5 points (from 0-5). The middleware provides increased motivation due to the use of favorite software and the advantage of exploiting it for exercise. Used together with communication software or online games, social inclusion can be stimulated. The therapists can employ the tool to monitor the correctness and progress of the exercises.

  4. Key Impact Factors on Dam Break Fatalities

    NASA Astrophysics Data System (ADS)

    Huang, D.; Yu, Z.; Song, Y.; Han, D.; Li, Y.

    2016-12-01

    Dam failures can lead to catastrophes on human society. However, there is a lack of research about dam break fatalities, especially on the key factors that affect fatalities. Based on the analysis of historical dam break cases, most studies have used the regression analysis to explore the correlation between those factors and fatalities, but without implementing optimization to find the dominating factors. In order to understand and reduce the risk of fatalities, this study has proposed a new method to select the impact factors on the fatality. It employs an improved ANN (Artificial Neural Network) combined with LOOCV (Leave-one-out cross-validation) and SFS (Stepwise Forward Selection) approach to explore the nonlinear relationship between impact factors and life losses. It not only considers the factors that have been widely used in the literature but also introduces new factors closely involved with fatalities. Dam break cases occurred in China from 1954 to 2013 are summarized, within which twenty-five cases are selected with a comprehensive coverage of geographic position and temporal variation. Twelve impact factors are taken into account as the inputs, i.e., severity of dam break flood (SF), population at risk (PR), public understanding of dam break (UB), warning time (TW), evacuation condition (EC), weather condition during dam break (WB), dam break mode (MB), water storage (SW), building vulnerability (VB), dam break time (TB), average distance from the affected area to the dam (DD) and preventive measures by government (PG).From those, three key factors of SF, MB and TB are chosen. The proposed method is able to extract the key factors, and the derived fatality model performs well in various types of dam break conditions.

  5. Composable security proof for continuous-variable quantum key distribution with coherent States.

    PubMed

    Leverrier, Anthony

    2015-02-20

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.

  6. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    NASA Astrophysics Data System (ADS)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  7. Drug Promiscuity in PDB: Protein Binding Site Similarity Is Key.

    PubMed

    Haupt, V Joachim; Daminelli, Simone; Schroeder, Michael

    2013-01-01

    Drug repositioning applies established drugs to new disease indications with increasing success. A pre-requisite for drug repurposing is drug promiscuity (polypharmacology) - a drug's ability to bind to several targets. There is a long standing debate on the reasons for drug promiscuity. Based on large compound screens, hydrophobicity and molecular weight have been suggested as key reasons. However, the results are sometimes contradictory and leave space for further analysis. Protein structures offer a structural dimension to explain promiscuity: Can a drug bind multiple targets because the drug is flexible or because the targets are structurally similar or even share similar binding sites? We present a systematic study of drug promiscuity based on structural data of PDB target proteins with a set of 164 promiscuous drugs. We show that there is no correlation between the degree of promiscuity and ligand properties such as hydrophobicity or molecular weight but a weak correlation to conformational flexibility. However, we do find a correlation between promiscuity and structural similarity as well as binding site similarity of protein targets. In particular, 71% of the drugs have at least two targets with similar binding sites. In order to overcome issues in detection of remotely similar binding sites, we employed a score for binding site similarity: LigandRMSD measures the similarity of the aligned ligands and uncovers remote local similarities in proteins. It can be applied to arbitrary structural binding site alignments. Three representative examples, namely the anti-cancer drug methotrexate, the natural product quercetin and the anti-diabetic drug acarbose are discussed in detail. Our findings suggest that global structural and binding site similarity play a more important role to explain the observed drug promiscuity in the PDB than physicochemical drug properties like hydrophobicity or molecular weight. Additionally, we find ligand flexibility to have a minor

  8. The effect of keyboard key spacing on typing speed, error, usability, and biomechanics, Part 2: Vertical spacing.

    PubMed

    Pereira, Anna; Hsieh, Chih-Ming; Laroche, Charles; Rempel, David

    2014-06-01

    The objective was to evaluate the effects of vertical key spacing on a conventional computer keyboard on typing speed, percentage error, usability, forearm muscle activity, and wrist posture for both females with small fingers and males with large fingers. Part I evaluated primarily horizontal key spacing and found that for male typists with large fingers, productivity and usability were similar for spacings of 17, 18, and 19 mm but were reduced for spacings of 16 mm. Few other key spacing studies are available, and the international standards that specify the spacing between keys on a keyboard have been mainly guided by design convention. Experienced female typists (n = 26) with small fingers (middle finger length < or = 7.71 cm or finger breadth of < or = 1.93 cm) and male typists (n = 26) with large fingers (middle finger length > or = 8.37 cm or finger breadth of > or = 2.24 cm) typed on five keyboards that differed primarily in vertical key spacing (17 x 18, 17 x 17, 17 x 16, 17 x 15.5, and 18 x 16 mm) while typing speed, error, fatigue, preference, forearm muscle activity, and wrist posture were recorded. Productivity and usability ratings were significantly worse for the keyboard with 15.5 mm vertical spacing compared to the other keyboards for both groups.There were few significant differences on usability ratings between the other keyboards. Reducing vertical key spacing,from 18 to 17 to 16 mm, had no significant effect on productivity or usability. The findings support the design of keyboards with vertical key spacings of 16, 17, or 18 mm. These findings may influence keyboard design and standards.

  9. Experimental study on discretely modulated continuous-variable quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen Yong; Zou Hongxin; Chen Pingxing

    2010-08-15

    We present a discretely modulated continuous-variable quantum key distribution system in free space by using strong coherent states. The amplitude noise in the laser source is suppressed to the shot-noise limit by using a mode cleaner combined with a frequency shift technique. Also, it is proven that the phase noise in the source has no impact on the final secret key rate. In order to increase the encoding rate, we use broadband homodyne detectors and the no-switching protocol. In a realistic model, we establish a secret key rate of 46.8 kbits/s against collective attacks at an encoding rate of 10more » MHz for a 90% channel loss when the modulation variance is optimal.« less

  10. Histopathology findings in patients presenting with menorrhagia: A study of 100 hysterectomy specimen

    PubMed Central

    Sawke, Nilima G.; Sawke, Gopal Krishna; Jain, Hanisha

    2015-01-01

    Background: Menorrhagia, by definition, is heavy cyclical blood loss in excess of 80 ml/month of menstrual period lasting longer than 7 days. There are many possible causes of heavy menstrual bleeding which include hormonal imbalance, fibroids, miscarriage or ectopic pregnancy, nonhormonal intrauterine device, adenomyosis, pelvic inflammatory disease, and rarely uterine, ovarian, or cervical cancer. Treatment depends on the causes of the menorrhagia. Hysterectomy is one of the several surgical procedures as definitive treatment. Objective: To determine the histopathologic spectrum of lesions associated with menorrhagia in different age groups. Study Design: This prospective descriptive study was conducted at the Department of Pathology, People's College of Medical Sciences and Research Centre, Bhopal. During the study period, 100 hysterectomy specimens were taken which were performed for the treatment of menorrhagia. Patients with menorrhagia in the age group of 30-50 years were selected after detailed history and fulfilling the inclusion criteria. Result: In our study, it was observed that maximum number of cases were in the age group of 41-50 years (n = 35) followed by the age group of 31-40 (n = 30). Out of 100 cases, 31% cases (n = 31) showed adenomyosis followed by leiomyomas 25% (n = 25), endometrial hyperplasia 23% (n = 23), and endometrial polyp 4% (n = 4). 11% cases (n = 11) showed dual pathology consisting of both adenomyosis and endometrial hyperplasia and 6% cases (n = 6) of leiomyoma with adenomyosis. Conclusion: Uterine adenomyosis and leiomyoma are the most common benign conditions found in hysterectomy specimens with peak incidence at 31-50 years. Patients having menorrhagia above 40 years should be screened for any endometrial pathology. Histopathology is mandatory for confirming diagnosis and the key to effective therapy and optimal outcome. PMID:26903755

  11. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    PubMed

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  12. Mathematical Reasoning in Teachers' Presentations

    ERIC Educational Resources Information Center

    Bergqvist, Tomas; Lithner, Johan

    2012-01-01

    This paper presents a study of the opportunities presented to students that allow them to learn different types of mathematical reasoning during teachers' ordinary task solving presentations. The characteristics of algorithmic and creative reasoning that are seen in the presentations are analyzed. We find that most task solutions are based on…

  13. Renewable Electricity Futures (Presentation)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hand, M. M.

    2012-08-01

    This presentation library summarizes findings of NREL's Renewable Electricity Futures study, published in June 2012. RE Futures investigated the challenges and impacts of achieving very high renewable electricity generation levels in the contiguous United States by 2050. It was presented in a webinar given by the California Energy Commission.

  14. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  15. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  16. First- and third-party ground truth for key frame extraction from consumer video clips

    NASA Astrophysics Data System (ADS)

    Costello, Kathleen; Luo, Jiebo

    2007-02-01

    Extracting key frames (KF) from video is of great interest in many applications, such as video summary, video organization, video compression, and prints from video. KF extraction is not a new problem. However, current literature has been focused mainly on sports or news video. In the consumer video space, the biggest challenges for key frame selection from consumer videos are the unconstrained content and lack of any preimposed structure. In this study, we conduct ground truth collection of key frames from video clips taken by digital cameras (as opposed to camcorders) using both first- and third-party judges. The goals of this study are: (1) to create a reference database of video clips reasonably representative of the consumer video space; (2) to identify associated key frames by which automated algorithms can be compared and judged for effectiveness; and (3) to uncover the criteria used by both first- and thirdparty human judges so these criteria can influence algorithm design. The findings from these ground truths will be discussed.

  17. Clinical Needs Finding: Developing the Virtual Experience, A Case Study

    PubMed Central

    Mittal, Vaishali; Thompson, Megan; Altman, Stuart M; Taylor, Peter; Summers, Alexander; Goodwin, Kelsey; Louie, Angelique Y

    2013-01-01

    We describe an innovative program at the University of California, Davis for students to engage in clinical needs finding. Using a team-based approach, students participated in clinical rotations to observe firsthand the needs of clinicians at the university affiliated medical center. The teams were asked to develop documentary-style videos to capture key experiences that would allow future viewers to use the videos as “virtual” clinical rotations. This was conceived as a strategy to allow students in prohibitively large classes, or students in programs at institutions without associated medical or veterinary school programs, to experience clinical rotations and perform needs assessments. The students' perspectives on the experience as well as instructor analysis of best practices for this type of activity are presented and discussed. We found that the internship experience was valuable to the students participating, by not only introducing the practice of needs finding but for increasing the students' confidence in the practice of engineering design and their ability to work independently. The videos produced were of such high quality that instructors from other institutions have requested copies for instructional use. Virtual clinical rotations through video experiences may provide a reasonable substitute for students who do not have the ability to participate in rotations in person. PMID:23483373

  18. Analyzing key ecological functions for transboundary subbasin assessments.

    Treesearch

    B.G Marcot; T.A. O' Neil; J.B. Nyberg; A. MacKinnon; P.J. Paquet; D.H. Johnson

    2007-01-01

    We present an evaluation of the ecological roles ("key ecological functions" or KEFs) of 618 wildlife species as one facet of subbasin assessment in the Columbia River basin (CRB) of the United States and Canada. Using a wildlife-habitat relationships database (IBIS) and geographic information system, we have mapped KEFs as levels of functional redundancy (...

  19. Imaging Findings of Ulceroglandular Tularemia

    PubMed Central

    Anand, Neil; Deochand, Osmani; Murphy, Robyn

    2017-01-01

    Francisella tularensis, the causative organism in Tularemia, is a relatively rare disease. There are a few radiological clues to elucidate its presence when suspicion arises. There should be strong consideration for Tularemia in the differential of any patient with its classic symptoms, diffuse cervical lymphadenopathy with evidence of necrosis, and enlarged adenoids. Ultrasound may demonstrate suppurative lymphadenopathy suggestive of infection, as in the case presented. CT often will demonstrate the extent of lymphadenopathy. On chest radiography, tularemia pneumonia is often the presenting finding, which may demonstrate bilateral or lobar infiltrates. Additionally, hilar lymphadenopathy and pleural effusions are often associated findings. Cavitary lesions may be present, which are better delineated on CT scan. We present a case of a 7-year-old male who presented with a painful right-sided palpable neck mass for 9 days, who was diagnosed with Tularemia after numerous admissions. PMID:28580063

  20. Quantum key distribution using continuous-variable non-Gaussian states

    NASA Astrophysics Data System (ADS)

    Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.

    2016-02-01

    In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.