Sample records for key findings show

  1. 13. VIEW INTO BLOCK AREA SHOWING KEY MECHANISM, NOTE FLOOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. VIEW INTO BLOCK AREA SHOWING KEY MECHANISM, NOTE FLOOR SEPARATION AT THRESHOLD AND KEY-WINDING MECHANISM - Montgomery County Jail, Washington & Spring Streets, Crawfordsville, Montgomery County, IN

  2. 36. HISTORIC PHOTOGRAPH SHOWING BILL KEYS CLEANING UP AFTER THE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    36. HISTORIC PHOTOGRAPH SHOWING BILL KEYS CLEANING UP AFTER THE MILL RUN (NOTE SCREEN FROM MORTAR SETTING ON TABLE, STAMPS ARE HUNG UP). - Wall Street Gold Mill, Twentynine Palms, San Bernardino County, CA

  3. Institutional Data Management in Higher Education. ECAR Key Findings

    ERIC Educational Resources Information Center

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  4. Perceptual Tests of an Algorithm for Musical Key-Finding

    ERIC Educational Resources Information Center

    Schmuckler, Mark A.; Tomovski, Robert

    2005-01-01

    Perceiving the tonality of a musical passage is a fundamental aspect of the experience of hearing music. Models for determining tonality have thus occupied a central place in music cognition research. Three experiments investigated 1 well-known model of tonal determination: the Krumhansl-Schmuckler key-finding algorithm. In Experiment 1,…

  5. Powering Down: Green IT in Higher Education. Key Findings

    ERIC Educational Resources Information Center

    Sheehan, Mark C.

    2010-01-01

    This document presents the key findings from "Powering Down: Green IT in Higher Education," the 2010 ECAR (EDUCAUSE Center for Applied Research) study of green IT. The study examines the stance institutions and their central IT organizations are taking on environmental sustainability (ES), the progress they are making on a variety of key…

  6. Key Findings and Recommendations for Technology Transfer at the ITS JPO

    DOT National Transportation Integrated Search

    2011-03-18

    This report provides key findings and recommendations for technology transfer at the Intelligent Transportation Systems Joint Program Office (ITS JPO) based upon an assessment of best practices in technology transfer in other industries, such as nati...

  7. Integrated vehicle-based safety systems : heavy-truck field operational test key findings report.

    DOT National Transportation Integrated Search

    2010-08-01

    This document presents key findings from the heavy-truck field operational test conducted as : part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of : analyses performed by the University of Michigan Transporta...

  8. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    DOT National Transportation Integrated Search

    2011-01-01

    This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportati...

  9. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    DOT National Transportation Integrated Search

    2011-01-01

    "This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportat...

  10. Human Health Effects of Biphenyl: Key Findings and Scientific Issues

    PubMed Central

    Li, Zheng; Hogan, Karen A.; Cai, Christine; Rieth, Susan

    2015-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) has evaluated the human health hazards of biphenyl exposure. Objectives: We review key findings and scientific issues regarding expected human health effects of biphenyl. Methods: Scientific literature from 1926 through September 2012 was critically evaluated to identify potential human health hazards associated with biphenyl exposure. Key issues related to the carcinogenicity and noncancer health hazards of biphenyl were examined based on evidence from experimental animal bioassays and mechanistic studies. Discussion: Systematic consideration of experimental animal studies of oral biphenyl exposure took into account the variety of study designs (e.g., study sizes, exposure levels, and exposure durations) to reconcile differing reported results. The available mechanistic and toxicokinetic evidence supports the hypothesis that male rat urinary bladder tumors arise through urinary bladder calculi formation but is insufficient to hypothesize a mode of action for liver tumors in female mice. Biphenyl and its metabolites may induce genetic damage, but a role for genotoxicity in biphenyl-induced carcinogenicity has not been established. Conclusions: The available health effects data for biphenyl provides suggestive evidence for carcinogenicity in humans, based on increased incidences of male rat urinary bladder tumors at high exposure levels and on female mouse liver tumors. Kidney toxicity is also a potential human health hazard of biphenyl exposure. Citation: Li Z, Hogan KA, Cai C, Rieth S. 2016. Human health effects of biphenyl: key findings and scientific issues. Environ Health Perspect 124:703–712; http://dx.doi.org/10.1289/ehp.1509730 PMID:26529796

  11. Human Health Effects of Biphenyl: Key Findings and Scientific Issues.

    PubMed

    Li, Zheng; Hogan, Karen A; Cai, Christine; Rieth, Susan

    2016-06-01

    In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) has evaluated the human health hazards of biphenyl exposure. We review key findings and scientific issues regarding expected human health effects of biphenyl. Scientific literature from 1926 through September 2012 was critically evaluated to identify potential human health hazards associated with biphenyl exposure. Key issues related to the carcinogenicity and noncancer health hazards of biphenyl were examined based on evidence from experimental animal bioassays and mechanistic studies. Systematic consideration of experimental animal studies of oral biphenyl exposure took into account the variety of study designs (e.g., study sizes, exposure levels, and exposure durations) to reconcile differing reported results. The available mechanistic and toxicokinetic evidence supports the hypothesis that male rat urinary bladder tumors arise through urinary bladder calculi formation but is insufficient to hypothesize a mode of action for liver tumors in female mice. Biphenyl and its metabolites may induce genetic damage, but a role for genotoxicity in biphenyl-induced carcinogenicity has not been established. The available health effects data for biphenyl provides suggestive evidence for carcinogenicity in humans, based on increased incidences of male rat urinary bladder tumors at high exposure levels and on female mouse liver tumors. Kidney toxicity is also a potential human health hazard of biphenyl exposure. Li Z, Hogan KA, Cai C, Rieth S. 2016. Human health effects of biphenyl: key findings and scientific issues. Environ Health Perspect 124:703-712; http://dx.doi.org/10.1289/ehp.1509730.

  12. "State of the Nation": A Discussion of Some of the Project's Key Findings

    ERIC Educational Resources Information Center

    Earley, Peter

    2010-01-01

    This paper considers several of the key findings of the State of the Nation research. Specific reference is made to three areas--impact evaluation, strategic leadership of professional development, and barriers and constraints to effective CPD practice--which are considered with reference to findings from the other TDA-funded projects conducted at…

  13. 40 CFR 63.2831 - Where can I find definitions of key words used in this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... words used in this subpart? 63.2831 Section 63.2831 Protection of Environment ENVIRONMENTAL PROTECTION... Vegetable Oil Production What This Subpart Covers § 63.2831 Where can I find definitions of key words used in this subpart? You can find definitions of key words used in this subpart in § 63.2872. ...

  14. Language Learning at Key Stage 2: Findings from a Longitudinal Study

    ERIC Educational Resources Information Center

    Cable, Carrie; Driscoll, Patricia; Mitchell, Rosamond; Sing, Sue; Cremin, Teresa; Earl, Justine; Eyres, Ian; Holmes, Bernardette; Martin, Cynthia; Heins, Barbara

    2012-01-01

    This paper discusses some of the findings from a 3-year longitudinal study of language learning in the upper stage of English primary schools, i.e. at Key Stage 2. This largely qualitative study (commissioned by the then Department for Children, Schools and Families) was designed to explore and document developing provision and practice in a…

  15. The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings

    ERIC Educational Resources Information Center

    Smith, Shannon D.; Caruso, Judith Borreson

    2010-01-01

    This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…

  16. U of M Civil Service Wellness Survey: Finding Out Employees' Health and Wellness Needs. A Report of Key Findings.

    ERIC Educational Resources Information Center

    Matross, Ron; Roesler, Jon

    Key findings from a wellness survey conducted with University of Minnesota civil service employees are discussed. The survey was designed to provide information to guide future campus health and wellness programming. Four topics were covered: physical fitness/exercise, nutrition, self-improvement/psychological health, and general health/preventive…

  17. How the World's Best Schools Stay on Top: Study's Key Findings Pinpoint Practices That Align with Learning Forward

    ERIC Educational Resources Information Center

    Killion, Joellen

    2016-01-01

    Key findings from a new study highlight how Learning Forward's long-standing position on professional learning correlates with practices in high-performing systems in Singapore, Shanghai, Hong Kong, and British Columbia. The purpose of this article is to share key findings from the study so that educators might apply them to strengthening…

  18. Alternative IT Sourcing Strategies: From the Campus to the Cloud. ECAR Key Findings

    ERIC Educational Resources Information Center

    Goldstein, Philip J.

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study, "Alternative IT Sourcing Strategies: From the Campus to the Cloud," by Philip J. Goldstein. The study explores a multitude of strategies used by colleges and university information technology organizations to deliver the breadth of technologies…

  19. Responding to Recession: IT Funding and Cost Management in Higher Education. Key Findings

    ERIC Educational Resources Information Center

    Goldstein, Philip J.

    2010-01-01

    This document presents the key findings from "Responding to Recession: IT Funding and Cost Management in Higher Education", the 2010 ECAR (EDUCAUSE Center for Applied Research) study of how the economic recession is impacting information technology (IT) organizations and operations in higher education. The study was designed to address the…

  20. Finding the Key to a Good Theatre Program: Some Comments on the ETA Survey.

    ERIC Educational Resources Information Center

    Hobgood, Burnet M.

    1991-01-01

    Offers some comments on the Educational Theatre Association's survey on the status of theater in U.S. high schools in the same issue of this journal. Discusses finding the key factors responsible for good school theater. (PRA)

  1. Human Health Effects of Trichloroethylene: Key Findings and Scientific Issues

    PubMed Central

    Jinot, Jennifer; Scott, Cheryl Siegel; Makris, Susan L.; Cooper, Glinda S.; Dzubow, Rebecca C.; Bale, Ambuja S.; Evans, Marina V.; Guyton, Kathryn Z.; Keshava, Nagalakshmi; Lipscomb, John C.; Barone, Stanley; Fox, John F.; Gwinn, Maureen R.; Schaum, John; Caldwell, Jane C.

    2012-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) completed a toxicological review of trichloroethylene (TCE) in September 2011, which was the result of an effort spanning > 20 years. Objectives: We summarized the key findings and scientific issues regarding the human health effects of TCE in the U.S. EPA’s toxicological review. Methods: In this assessment we synthesized and characterized thousands of epidemiologic, experimental animal, and mechanistic studies, and addressed several key scientific issues through modeling of TCE toxicokinetics, meta-analyses of epidemiologic studies, and analyses of mechanistic data. Discussion: Toxicokinetic modeling aided in characterizing the toxicological role of the complex metabolism and multiple metabolites of TCE. Meta-analyses of the epidemiologic data strongly supported the conclusions that TCE causes kidney cancer in humans and that TCE may also cause liver cancer and non-Hodgkin lymphoma. Mechanistic analyses support a key role for mutagenicity in TCE-induced kidney carcinogenicity. Recent evidence from studies in both humans and experimental animals point to the involvement of TCE exposure in autoimmune disease and hypersensitivity. Recent avian and in vitro mechanistic studies provided biological plausibility that TCE plays a role in developmental cardiac toxicity, the subject of substantial debate due to mixed results from epidemiologic and rodent studies. Conclusions: TCE is carcinogenic to humans by all routes of exposure and poses a potential human health hazard for noncancer toxicity to the central nervous system, kidney, liver, immune system, male reproductive system, and the developing embryo/fetus. PMID:23249866

  2. AN INTEGRATED SYNTHESIS OF KEY AND POLICY RELEVANT FINDINGS FROM EPA'S SUPERSITES PROGRAM AND RELATED STUDIES

    EPA Science Inventory

    This presentation provides an overview and initial insights into the findings based on results from EPA's PM Supersites Program and related studies. Many key atmospheric sciences findings have been identified through the research conducted during the last five years as part of t...

  3. 40 CFR 63.1176 - Where can I find definitions of key words used in this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... words used in this subpart? 63.1176 Section 63.1176 Protection of Environment ENVIRONMENTAL PROTECTION... Production § 63.1176 Where can I find definitions of key words used in this subpart? The definitions of key words used in this subpart are in the Clean Air Act (Act), in § 63.2 of the general provisions in...

  4. Teaching Teachers for the Future (TTF) Project TPACK Survey: Summary of the Key Findings

    ERIC Educational Resources Information Center

    Finger, Glenn; Jamieson-Proctor, Romina; Cavanagh, Rob; Albion, Peter; Grimbeek, Peter; Bond, Trevor; Fitzgerald, Robert; Romeo, Geoff; Lloyd, Margaret

    2013-01-01

    This paper presents a summary of the key findings of the TTF TPACK Survey developed and administered for the Teaching the Teachers for the Future (TTF) Project implemented in 2011. The TTF Project, funded by an Australian Government ICT Innovation Fund grant, involved all 39 Australian Higher Education Institutions which provide initial teacher…

  5. Human Health Effects of Dichloromethane: Key Findings and Scientific Issues

    PubMed Central

    Schlosser, Paul M.; Bale, Ambuja S.; Gibbons, Catherine F.; Wilkins, Amina

    2014-01-01

    effects of dichloromethane: key findings and scientific issues. Environ Health Perspect 123:114–119; http://dx.doi.org/10.1289/ehp.1308030 PMID:25325283

  6. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 2001.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This report presents an overview of the key findings from the Monitoring the Future 2001 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  7. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2002.

    ERIC Educational Resources Information Center

    Michigan Univ., Ann Arbor. Inst. for Social Research.

    This report presents an overview of the key findings from the Monitoring the Future 2002 nationwide survey of 8th, 10th, and 12th grade students. A particular emphasis is placed on recent trends in the use of licit and illicit drugs. Trends in the levels of perceived risk and personal disapproval associated with each drug--which this study has…

  8. Improving GRADE evidence tables part 1: a randomized trial shows improved understanding of content in summary of findings tables with a new format.

    PubMed

    Carrasco-Labra, Alonso; Brignardello-Petersen, Romina; Santesso, Nancy; Neumann, Ignacio; Mustafa, Reem A; Mbuagbaw, Lawrence; Etxeandia Ikobaltzeta, Itziar; De Stio, Catherine; McCullagh, Lauren J; Alonso-Coello, Pablo; Meerpohl, Joerg J; Vandvik, Per Olav; Brozek, Jan L; Akl, Elie A; Bossuyt, Patrick; Churchill, Rachel; Glenton, Claire; Rosenbaum, Sarah; Tugwell, Peter; Welch, Vivian; Garner, Paul; Guyatt, Gordon; Schünemann, Holger J

    2016-06-01

    The current format of summary of findings (SoFs) tables for presenting effect estimates and associated quality of evidence improve understanding and assist users finding key information in systematic reviews. Users of SoF tables have demanded alternative formats to express findings from systematic reviews. We conducted a randomized controlled trial among systematic review users to compare the relative merits of a new format with the current formats of SoF tables regarding understanding, accessibility of information, satisfaction, and preference. Our primary goal was to show that the new format is not inferior to the current format. Of 390 potentially eligible subjects, 290 were randomized. Of seven items testing understanding, three showed similar results, two showed small differences favoring the new format, and two (understanding risk difference and quality of the evidence associated with a treatment effect) showed large differences favoring the new format [63% (95% confidence interval {CI}: 55, 71) and 62% (95% CI: 52, 71) more correct answers, respectively]. Respondents rated information in the alternative format as more accessible overall and preferred the new format over the current format. While providing at least similar levels of understanding for some items and increased understanding for others, users prefer the new format of SoF tables. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  10. Assessment of Health Effects of Exogenous Urea: Summary and Key Findings.

    PubMed

    Dickerson, Aisha S; Lee, Janice S; Keshava, Channa; Hotchkiss, Andrew; Persad, Amanda S

    2018-05-01

    Urea has been utilized as a reductant in diesel fuels to lower emission of nitrogen oxides, igniting interest in probable human health hazards associated with exposure to exogenous urea. Here, we summarize and update key findings on potential health effects of exogenous urea, including carcinogenicity. No definitive target organs for oral exposure were identified; however, results in animal studies suggest that the liver and kidney could be potential target organs of urea toxicity. The available human-subject literature suggests that the impact on lung function is minimal. Based on the literature on exogenous urea, we concluded that there was inadequate information to assess the carcinogenic potential of urea, or perform a quantitative assessment to derive reference values. Given the limited information on exogenous urea, additional research to address gaps for exogenous urea should include long-term cancer bioassays, two-generation reproductive toxicity studies, and mode-of-action investigations.

  11. Socioeconomic assessment of Forest Service American Recovery and Reinvestment Act projects: key findings and lessons learned

    Treesearch

    Susan Charnley; Pamela Jakes; John Schelhas

    2012-01-01

    The American Recovery and Reinvestment Act of 2009 (the Recovery Act) aimed to create jobs and promote economic growth while addressing the Nation’s social and environmental needs. The USDA Forest Service received $1.15 billion in economic recovery funding. This report contains key findings and lessons learned from a socioeconomic assessment of Forest Service Recovery...

  12. Infectious mononucleosis lymphoadenitis showing histologic findings indistinguishable from toxoplasma lymphadenitis. A report of three cases.

    PubMed

    Kojima, Masaru; Kashimura, Makoto; Itoh, Hideaki; Noro, Masahiro; Matsuda, Hazuki; Tsukamoto, Norihumi; Akikusa, Bunshiro; Masawa, Nobuhide; Morita, Yukio

    2010-06-15

    Lymph node lesions in infectious mononucleosis (IM) show a marked histologic diversity. We report here three cases of IM lymphadenitis with histologic findings indistinguishable from those of toxoplasmic lymphadenitis. The histologic findings of the three cases presented here showed a histologic triad of toxoplasmic lymphadenitis, including (i) numerous lymphoid follicles with hyperplastic germinal centers; (ii) small clusters or single epithelioid histiocytes; and (iii) multiple foci of monocytoid B-cells. Moreover, all three lesions contained isolated or small clusters of epithelioid histiocytes within the hyperplastic germinal centers and the periphery of lymphoid follicles, which are the most specific histologic findings of toxoplasmic lymphadenitis. However, serologic findings confirmed EBV infection in all three cases. On in situ hybridization, numerous Epstein-Barr virus (EBV)-encoded small RNA (EBER)-positive cells were demonstrated in the germinal center, as well as in interfollicular areas in all three cases. Toxoplasmosis gondii infection was excluded in at least one case, based on serologic findings. Polymerase chain reaction analysis also demonstrated that there was no T. gondii DNA in the remaining two cases. Two of our three cases showed atypical clinical presentations, including an absence of atypical lymphocytosis in peripheral blood in two cases, age more than 30 years, and an absence of systemic symptoms in one case. It appears that previous descriptions emphasize the differential diagnostic problems between IM lymphadenitis and malignant lymphomas. However, from a therapeutic perspective, it is important to discriminate IM lymphadenitis from toxoplasmic lymphadenitis particularly in patients showing atypical clinical features. 2010 Elsevier GmbH. All rights reserved.

  13. Trends in Learning Outcomes Assessment. Key Findings from a Survey among Administrators at AAC&U Member Institutions

    ERIC Educational Resources Information Center

    Association of American Colleges and Universities, 2016

    2016-01-01

    This 2016 report summarizes key findings from a national survey among chief academic officers at Association of American Colleges & Universities (AAC&U) member institutions and explores trends in learning outcomes and approaches to assessing them. It documents that many in higher education are moving away from standardized tests and…

  14. Monitoring HIV Prevention Programme Outcomes among Key Populations in Kenya: Findings from a National Survey

    PubMed Central

    Musyoki, Helgar; Anthony, John; Kioko, Japheth; Kaosa, Shem; Ogwang, Bernard E.; Githuka, George; Sirengo, Martin; Birir, Sarah; Blanchard, James F.; Muraguri, Nicholas; Isac, Shajy; Moses, Stephen

    2015-01-01

    In preparation for the implementation of the Kenya AIDS Strategic Framework 2014/15-2018/19, the Kenya National AIDS and STI Control Programme facilitated a national polling booth survey as part of a baseline assessment of HIV-related risk behaviours among FSWs, MSM, and PWID, and their utilization of existing preventive interventions, as well as structural factors that may influence KPs’ vulnerability to HIV. The survey was conducted among “key populations” (female sex workers, men who have sex with men, and people who inject drugs) to understand current HIV risk and prevention behaviours, utilization of existing programmes and services, and experiences of violence. In total, 3,448 female sex workers, 1,308 men who have sex with men, and 690 people who inject drugs were randomly selected to participate in polling booth survey sessions from seven priority sites. Survey responses were aggregated and descriptive statistics derived. In general, reported condom use among all key populations was quite high with paying clients, and lower with regular, non-paying partners. Many participants reported unavailability of condoms or clean injecting equipment within the past month. Exposure to, and utilization of, existing HIV prevention services varied significantly among the groups, and was reported least commonly by female sex workers. Encouragingly, approximately three-quarters of all key population members reported receiving an HIV test in the past three months. All key population groups reported experiencing high levels of physical and sexual violence from partners/clients, and/or arrest and violence by law enforcement officials. Although some of the findings are encouraging, there is room for improvement in HIV prevention programmes and services for key populations across Kenya. PMID:26313642

  15. Reflections of Girls in the Media: A Two-Part Study on Gender and Media. Summary of Key Findings.

    ERIC Educational Resources Information Center

    1997

    This pamphlet summarizes the key findings of a two-part study that investigated the messages that young women (age 10 to 17) get from the media. A content analysis examined messages to girls across a range of media most heavily used by adolescent girls: television, movies, magazines, music videos, television commercials, and magazine…

  16. Temporal dynamics and the identification of musical key.

    PubMed

    Farbood, Morwaread Mary; Marcus, Gary; Poeppel, David

    2013-08-01

    A central process in music cognition involves the identification of key; however, little is known about how listeners accomplish this task in real time. This study derives from work that suggests overlap between the neural and cognitive resources underlying the analyses of both music and speech and is the first, to our knowledge, to explore the timescales at which the brain infers musical key. We investigated the temporal psychophysics of key-finding over a wide range of tempi using melodic sequences with strong structural cues, where statistical information about overall key profile was ambiguous. Listeners were able to provide robust judgments within specific limits, at rates as high as 400 beats per minute (bpm; ∼7 Hz) and as low as 30 bpm (0.5 Hz), but not outside those bounds. These boundaries on reliable performance show that the process of key-finding is restricted to timescales that are closely aligned with beat induction and speech processing. 2013 APA, all rights reserved

  17. Editorial Decisions May Perpetuate Belief in Invalid Research Findings

    PubMed Central

    Eriksson, Kimmo; Simpson, Brent

    2013-01-01

    Social psychology and related disciplines are seeing a resurgence of interest in replication, as well as actual replication efforts. But prior work suggests that even a clear demonstration that a finding is invalid often fails to shake acceptance of the finding. This threatens the full impact of these replication efforts. Here we show that the actions of two key players – journal editors and the authors of original (invalidated) research findings – are critical to the broader public’s continued belief in an invalidated research conclusion. Across three experiments, we show that belief in an invalidated finding falls sharply when a critical failed replication is published in the same – versus different – journal as the original finding, and when the authors of the original finding acknowledge that the new findings invalidate their conclusions. We conclude by discussing policy implications of our key findings. PMID:24023863

  18. Key Findings from a National Internet Survey of 400 Teachers and 95 Principals Conducted November 12-21, 2008

    ERIC Educational Resources Information Center

    McCleskey, Nicole

    2010-01-01

    This paper presents the key findings from a national Internet survey of 400 teachers and 95 principals. This survey was conducted November 12-21, 2008. The sample was based on a list provided by EMI Surveys, a custom online research sample provider with an extensive portfolio of projects. The margin of error for a sample of 495 interviews is [plus…

  19. A Mid-DESD Review: Key Findings and Ways Forward

    ERIC Educational Resources Information Center

    Wals, Arjen E. J.

    2009-01-01

    This article lists the key outcomes and recommendations of Phase I of the monitoring and evaluation of the DESD. Phase I focused on a review of the structures, provisions and conditions countries and regions have put in place in order to facilitate the development and implementation of ESD. The author also touches upon the constraints and…

  20. Secure image retrieval with multiple keys

    NASA Astrophysics Data System (ADS)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  1. The village/commune safety policy and HIV prevention efforts among key affected populations in Cambodia: finding a balance

    PubMed Central

    2012-01-01

    The Village/Commune Safety Policy was launched by the Ministry of Interior of the Kingdom of Cambodia in 2010 and, due to a priority focus on “cleaning the streets”, has created difficulties for HIV prevention programs attempting to implement programs that work with key affected populations including female sex workers and people who inject drugs. The implementation of the policy has forced HIV program implementers, the UN and various government counterparts to explore and develop collaborative ways of delivering HIV prevention services within this difficult environment. The following case study explores some of these efforts and highlights the promising development of a Police Community Partnership Initiative that it is hoped will find a meaningful balance between the Village/Commune Safety Policy and HIV prevention efforts with key affected populations in Cambodia. PMID:22770267

  2. Perinatal findings of Seckel syndrome: a case report of a fetus showing primordial dwarfism and severe microcephaly.

    PubMed

    Takikawa, Keiko Miyachi; Kikuchi, Akihiko; Yokoyama, Akiko; Ono, Kyoko; Iwasawa, Yuki; Sunagawa, Sorahiro; Takagi, Kimiyo; Kawame, Hiroshi; Nakamura, Tomohiko

    2008-01-01

    Seckel syndrome is a rare form of primordial dwarfism and most of the previous reports have been limited to postnatal findings. We report on a fetus showing severe microcephaly, intrauterine growth restriction and a few gyri with shallow sulci on the fetal brain suggesting cortical dysplasia, followed by ultrasound and magnetic resonance imaging in the prenatal period. Cardiotocograph revealed a reassuring fetal status throughout the whole pregnancy period. A male infant weighing 1,556 g was delivered at 39 weeks' gestation, and a diagnosis of Seckel syndrome was made based on postnatal typical findings. Although previous reports on prenatal findings of Seckel syndrome are quite limited, we think that our case presents typical features of a fetus affected by this syndrome. When prenatal ultrasound shows severe microcephaly and intrauterine growth restriction, this rare syndrome should be included in the differential diagnosis. Moreover, magnetic resonance imaging of the affected fetal brain provides further diagnostic clues. Copyright 2008 S. Karger AG, Basel.

  3. Florida Nurse Leader Survey Findings: Key Leadership Competencies, Barriers to Leadership, and Succession Planning Needs.

    PubMed

    Denker, Ann-Lynn; Sherman, Rose O; Hutton-Woodland, Michael; Brunell, Mary Lou; Medina, Pamela

    2015-01-01

    This study examined barriers to nursing leadership and succession planning needs for nurse leaders in Florida. The Florida Action Coalition responded to the call to prepare and enable nurses to lead change to advance health, through a grant supported by the Robert Wood Johnson Foundation and Florida Blue Foundation. This is a nurse leader subset of a 56-item statewide survey of actively licensed RNs and advanced RN practitioners in Florida conducted via a cross-sectional, exploratory descriptive research design. Key findings included a description of leadership competencies, barriers, and succession planning practices. Florida nurse leaders are aging and less diverse than the general population and report limited utilization of succession planning by their organizations. In Florida, attention must be directed to resources and strategies to develop skilled nurse leaders and plan succession.

  4. Ensuring Biologics Advanced Development and Manufacturing Capability for the United States Government: A Summary of Key Findings and Conclusions

    DTIC Science & Technology

    2009-10-06

    Government: A Summary of Key Findings and Conclusions. This report has passed the Department of Defense’s security review process and is approved for...manufacturing and combine advance development and production of biologics in a multi-product facility focused on satisfying USG needs. Finally, the study...MCM needs of both DoD and HHS, an extensive survey was conducted. This included a review of all published requirements, the biodefense R&D portfolio

  5. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  6. Male mental health problems, psychopathy, and personality traits: key findings from the first 14 years of the Pittsburgh Youth Study.

    PubMed

    Loeber, R; Farrington, D P; Stouthamer-Loeber, M; Moffitt, T E; Caspi, A; Lynam, D

    2001-12-01

    This paper reviews key findings on juvenile mental health problems in boys, psychopathy, and personality traits, obtained in the first 14 years of studies using data from the Pittsburgh Youth Study. This is a study of 3 samples, each of about 500 boys initially randomly drawn from boys in the 1st, 4th, and 7th grades of public schools in Pittsburgh. The boys have been followed regularly, initially each half year, and later at yearly intervals. Currently, the oldest boys are about 25 years old, whereas the youngest boys are about 19. Findings are presented on the prevalence and interrelation of disruptive behaviors, ADHD, and depressed mood. Results concerning risk factors for these outcomes are reviewed. Psychological factors such as psychopathy, impulsivity, and personality are described. The paper closes with findings on service delivery of boys with mental health problems.

  7. A natural language processing program effectively extracts key pathologic findings from radical prostatectomy reports.

    PubMed

    Kim, Brian J; Merchant, Madhur; Zheng, Chengyi; Thomas, Anil A; Contreras, Richard; Jacobsen, Steven J; Chien, Gary W

    2014-12-01

    Natural language processing (NLP) software programs have been widely developed to transform complex free text into simplified organized data. Potential applications in the field of medicine include automated report summaries, physician alerts, patient repositories, electronic medical record (EMR) billing, and quality metric reports. Despite these prospects and the recent widespread adoption of EMR, NLP has been relatively underutilized. The objective of this study was to evaluate the performance of an internally developed NLP program in extracting select pathologic findings from radical prostatectomy specimen reports in the EMR. An NLP program was generated by a software engineer to extract key variables from prostatectomy reports in the EMR within our healthcare system, which included the TNM stage, Gleason grade, presence of a tertiary Gleason pattern, histologic subtype, size of dominant tumor nodule, seminal vesicle invasion (SVI), perineural invasion (PNI), angiolymphatic invasion (ALI), extracapsular extension (ECE), and surgical margin status (SMS). The program was validated by comparing NLP results to a gold standard compiled by two blinded manual reviewers for 100 random pathology reports. NLP demonstrated 100% accuracy for identifying the Gleason grade, presence of a tertiary Gleason pattern, SVI, ALI, and ECE. It also demonstrated near-perfect accuracy for extracting histologic subtype (99.0%), PNI (98.9%), TNM stage (98.0%), SMS (97.0%), and dominant tumor size (95.7%). The overall accuracy of NLP was 98.7%. NLP generated a result in <1 second, whereas the manual reviewers averaged 3.2 minutes per report. This novel program demonstrated high accuracy and efficiency identifying key pathologic details from the prostatectomy report within an EMR system. NLP has the potential to assist urologists by summarizing and highlighting relevant information from verbose pathology reports. It may also facilitate future urologic research through the rapid and

  8. Oregon Public School Drug Use Survey, 1996: Key Findings Report.

    ERIC Educational Resources Information Center

    Finigan, Michael

    Alcohol, tobacco, and other drug use among public school students continues to be a major concern in Oregon as it is across the nation. This report, the sixth of the biannual public school drug use surveys conducted in Oregon since 1986, discusses major findings. These findings are (1) marijuana use is up for both the eighth and eleventh grades;…

  9. Virtual prototyping study shows increased ATPase activity of Hsp90 to be the key determinant of cancer phenotype.

    PubMed

    Vali, Shireen; Pallavi, Rani; Kapoor, Shweta; Tatu, Utpal

    2010-03-01

    Hsp90 is an ATP-dependent molecular chaperone that regulates key signaling proteins and thereby impacts cell growth and development. Chaperone cycle of Hsp90 is regulated by ATP binding and hydrolysis through its intrinsic ATPase activities, which is in turn modulated by interaction with its co-chaperones. Hsp90 ATPase activity varies in different organisms and is known to be increased in tumor cells. In this study we have quantitatively analyzed the impact of increasing Hsp90 ATPase activity on the activities of its clients through a virtual prototyping technology, which comprises a dynamic model of Hsp90 interaction with clients involved in proliferation pathways. Our studies highlight the importance of increased ATPase activity of Hsp90 in cancer cells as the key modulator for increased proliferation and survival. A tenfold increase in ATPase activity of Hsp90 often seen in cancer cells increases the levels of active client proteins such as Akt-1, Raf-1 and Cyclin D1 amongst others to about 12-, 8- and 186-folds respectively. Additionally we studied the effect of a competitive inhibitor of Hsp90 activity on the reduction in the client protein levels. Virtual prototyping experiments corroborate with findings that the drug has almost 10- to 100-fold higher affinity as indicated by a lower IC(50) value (30-100 nM) in tumor cells with higher ATPase activity. The results also indicate a 15- to 25-fold higher efficacy of the inhibitor in reducing client levels in tumor cells. This analysis provides mechanistic insights into the links between increased Hsp90 ATPase activity, tumor phenotype and the hypersensitivity of tumor Hsp90 to inhibition by ATP analogs. The online version of this article (doi:10.1007/s11693-009-9046-3) contains supplementary material, which is available to authorized users.

  10. The National Television Violence Study: Key Findings and Recommendations.

    ERIC Educational Resources Information Center

    Young Children, 1996

    1996-01-01

    Summarizes findings of the Television Violence Study indicating that the context of much television violence is dangerous to viewers, perpetrators go unpunished in the majority of programs, negative consequences of violence are often ignored, guns feature prominently, and presentation of violence differs greatly across networks and across…

  11. Recent Trends in General Education Design, Learning Outcomes, and Teaching Approaches. Key Findings from a Survey among Administrators at AAC&U Member Institutions

    ERIC Educational Resources Information Center

    Association of American Colleges and Universities, 2016

    2016-01-01

    This report summarizes key findings from a national survey among chief academic officers at Association of American Colleges and Universities (AAC&U) member institutions and explores how institutions are defining common learning outcomes, trends related to general education design and the use of emerging, evidence-based teach­ing and learning…

  12. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  13. Human health effects of dichloromethane: key findings and scientific issues.

    PubMed

    Schlosser, Paul M; Bale, Ambuja S; Gibbons, Catherine F; Wilkins, Amina; Cooper, Glinda S

    2015-02-01

    The U.S. EPA's Integrated Risk Information System (IRIS) completed an updated toxicological review of dichloromethane in November 2011. In this commentary we summarize key results and issues of this review, including exposure sources, identification of potential health effects, and updated physiologically based pharmacokinetic (PBPK) modeling. We performed a comprehensive review of primary research studies and evaluation of PBPK models. Hepatotoxicity was observed in oral and inhalation exposure studies in several studies in animals; neurological effects were also identified as a potential area of concern. Dichloromethane was classified as likely to be carcinogenic in humans based primarily on evidence of carcinogenicity at two sites (liver and lung) in male and female B6C3F1 mice (inhalation exposure) and at one site (liver) in male B6C3F1 mice (drinking-water exposure). Recent epidemiologic studies of dichloromethane (seven studies of hematopoietic cancers published since 2000) provide additional data raising concerns about associations with non-Hodgkin lymphoma and multiple myeloma. Although there are gaps in the database for dichloromethane genotoxicity (i.e., DNA adduct formation and gene mutations in target tissues in vivo), the positive DNA damage assays correlated with tissue and/or species availability of functional glutathione S-transferase (GST) metabolic activity, the key activation pathway for dichloromethane-induced cancer. Innovations in the IRIS assessment include estimation of cancer risk specifically for a presumed sensitive genotype (GST-theta-1+/+), and PBPK modeling accounting for human physiological distributions based on the expected distribution for all individuals 6 months to 80 years of age. The 2011 IRIS assessment of dichloromethane provides insights into the toxicity of a commonly used solvent.

  14. Do Disadvantaged Students Get Less Effective Teaching? Key Findings from Recent Institute of Education Sciences Studies. NCEE Evaluation Brief. Technical Appendix. NCEE 2014-4010

    ERIC Educational Resources Information Center

    Max, Jeffrey; Glazerman, Steven

    2014-01-01

    This document represents the technical appendix intended to accompany "Do Disadvantaged Students Get Less Effective Teaching? Key Findings from Recent Institute of Education Sciences Studies. NCEE Evaluation Brief. NCEE 2014-4010." Contents include: (1) Summary of Related, Non-Peer-Reviewed Studies; (2) Methods for Comparing Findings…

  15. Mars’ First Billion Years: Key Findings, Key Unsolved Paradoxes, and Future Exploration

    NASA Astrophysics Data System (ADS)

    Ehlmann, Bethany

    2017-10-01

    In the evolution of terrestrial planets, the first billion years are the period most shrouded in mystery: How vigorous is early atmospheric loss? How do planetary climates respond to a brightening sun? When and how are plate tectonic recycling processes initiated? How do voluminous volcanism and heavy impact bombardment influence the composition of the atmosphere? Under what conditions might life arise? Looking outward to terrestrial planets around other stars, the record from Venus, Earth and Mars in this solar system is crucial for developing models of physical can chemical processes. Of these three worlds, Mars provides the longest record of planetary evolution from the first billion years, comprising >50% of exposed geologic units, which are only lightly overprinted by later processes.Orbital observations of the last decade have revealed abundant evidence for surface waters in the form of lakes, valley networks, and evidence of chemically open-system near-surface weathering. Groundwaters at temperatures ranging from just above freezing to hydrothermal have also left a rich record of process in the mineralogical record. A rsuite of environments - similar in diversity to Earth’s - has been discovered on Mars with water pH, temperature, redox, and chemistries varying in space and time.Here, I will focus on the consequences of the aqueous alteration of the Martian crust on the composition of the atmosphere based on recent work studying aspects of the volatile budget (Usui et al., 2015; Edwards & Ehlmann, 2015; Hu et al., 2015; Jakosky et al., 2017, Wordsworth et al., 2017, and Ehlmann, in prep.). The solid crust and mantle of Mars act as volatile reservoirs and volatile sources through volcanism, mineral precipitation, and release of gases. We examine the extent to which the budget is understood or ill-understood for hydrogen and carbon, and associated phases H2O, CO2, and CH4. Additionally, I identify some key stratigraphies where a combination of focused in

  16. Title I ESEA Projects: Digest of Annual Evaluations. Supplementary Edition 1977-1978. A historical summary, by the Department of Federal Evaluation Resources, of the key findings reported in the annual evaluations of each project. Report #7827.

    ERIC Educational Resources Information Center

    Philadelphia School District, PA. Office of Research and Evaluation.

    This supplement provides a historical summary, for the Philadelphia, Pennsylvania schools, of the key findings in the Annual Evaluations of each Elementary Secondary Education Act Title I project since 1975. The 1977-1978 management information, the key findings for 1975-1976 and 1976-1977, as well as the preliminary findings for 1977-1978 are…

  17. Multimodal fusion of brain imaging data: A key to finding the missing link(s) in complex mental illness.

    PubMed

    Calhoun, Vince D; Sui, Jing

    2016-05-01

    It is becoming increasingly clear that combining multi-modal brain imaging data is able to provide more information for individual subjects by exploiting the rich multimodal information that exists. However, the number of studies that do true multimodal fusion (i.e. capitalizing on joint information among modalities) is still remarkably small given the known benefits. In part, this is because multi-modal studies require broader expertise in collecting, analyzing, and interpreting the results than do unimodal studies. In this paper, we start by introducing the basic reasons why multimodal data fusion is important and what it can do, and importantly how it can help us avoid wrong conclusions and help compensate for imperfect brain imaging studies. We also discuss the challenges that need to be confronted for such approaches to be more widely applied by the community. We then provide a review of the diverse studies that have used multimodal data fusion (primarily focused on psychosis) as well as provide an introduction to some of the existing analytic approaches. Finally, we discuss some up-and-coming approaches to multi-modal fusion including deep learning and multimodal classification which show considerable promise. Our conclusion is that multimodal data fusion is rapidly growing, but it is still underutilized. The complexity of the human brain coupled with the incomplete measurement provided by existing imaging technology makes multimodal fusion essential in order to mitigate against misdirection and hopefully provide a key to finding the missing link(s) in complex mental illness.

  18. The influence of sociocultural factors on organ donation and transplantation in Korea: findings from key informant interviews.

    PubMed

    Kim, Jung Ran; Elliott, Doug; Hyde, Cheryl

    2004-04-01

    Although brain death was formally recognized in Korea in 2000 for the purpose of organ donation, traditional Confucian-based thought still prevails. The aim of this study was to explore sociocultural perspectives that influence health professionals' attitudes and perceptions regarding organ donation. Semistructured interviews were conducted with nine key informants from three major hospitals providing transplant services in South Korea. Several themes were identified as barriers to organ donation: Confucianism, misunderstandings and myths, organs as spare for selling, lack of clarity in the definition of death in the new legislation, and limited medical insurance coverage. It remains difficult for brain death to be accepted as true death, and there is currently a poor rate of organ procurement. Findings of the study will help identify socioculturally appropriate strategies to promote acceptance and accessibility of organ transplantation among South Koreans.

  19. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  20. Improving pathways to primary health care among LGBTQ populations and health care providers: key findings from Nova Scotia, Canada.

    PubMed

    Gahagan, Jacqueline; Subirana-Malaret, Montse

    2018-06-13

    This study explores the perceived barriers to primary health care as identified among a sample of Lesbian, Gay, Bisexual, Transgender, and Queer (LGBTQ) identified individuals and health care providers in Nova Scotia, Canada. These findings, based on a province-wide anonymous online survey, suggest that additional efforts are needed to improve pathways to primary health among LGBTQ populations and in deepening our understanding of how to advance the unique primary health needs of these populations. Data were collected from the LGBTQ community through an online, closed-ended anonymous survey. Inclusion criteria for participation were self-identifying as LGBTQ, offering primary health care to LGBTQ patients, being able to understand English, being 16 years of age or older, and having lived in Nova Scotia for at least one year. A total of 283 LGBTQ respondents completed the online survey which included sociodemographic questions, perceptions of respondents' health status, and their primary health care experiences. In addition, a total of 109 health care providers completed the survey based on their experiences providing care in Nova Scotia, and in particular, their experiences and perceptions regarding LGBTQ access to primary health care and physician-patient interactions. Our results indicate that, in several key areas, the primary health care needs of LGBTQ populations in Nova Scotia are not being met and this may in turn contribute to their poor health outcomes across the life course. A framework of intersectionality and health equity was used to interpret and analyze the survey data. The key findings indicate the need to continue improving pathways to primary health care among LGBTQ populations, specifically in relation to additional training and related supports for health care providers who work with these populations.

  1. Key Findings and Recommendations from the Coös Youth Study: Research from the First Half of the Study. Regional Issue Brief Number 41

    ERIC Educational Resources Information Center

    Staunton, Michael S.; Jaffee, Eleanor M.

    2014-01-01

    In this brief, authors Michael Staunton and Eleanor Jaffee review the key findings and recommendations from research conducted in the first half of the Coös Youth Study, which began in 2008 and is planned to continue through 2018. The study explores young people's decisions about their educational and job opportunities in rural northern New…

  2. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  3. Evaluation of a primary school drug drama project: methodological issues and key findings.

    PubMed

    Starkey, F; Orme, J

    2001-10-01

    This paper describes the impact evaluation of a primary school drug drama project developed by a health promotion service and a theatre's education department in England. The project targeted 10-11 year olds in 41 schools with an interactive drama production and workshop day on attitudes, choices, decisions and risks of alcohol, tobacco and illegal drug use. Parents were also involved in parents' evenings and watching children's performances. The research consisted of both process evaluation, consultation with pupils, teachers, parents, actors and health promotion staff on the project itself, and impact evaluation which looked at potential changes in children's knowledge, attitudes and decision-making skills. This paper reports findings of the impact evaluation, from six of the schools participating in the project. The impact evaluation consisted of pre- and post-project testing using a 'draw and write' and a problem-solving exercise. These findings suggest that the project had a significant impact on the children's knowledge of names of specific illegal drugs, and on their awareness that alcohol and cigarettes were also drugs, and secondly encouraged the children to think in less stereotypical terms about drugs and drug users. The problem-solving exercise, involving decision-making scenarios, showed small but positive trends between pre- and post-project solutions in more than half of the response categories. Methodological difficulties relating to evaluating such a project are discussed.

  4. Multimodal fusion of brain imaging data: A key to finding the missing link(s) in complex mental illness

    PubMed Central

    Calhoun, Vince D; Sui, Jing

    2016-01-01

    It is becoming increasingly clear that combining multi-modal brain imaging data is able to provide more information for individual subjects by exploiting the rich multimodal information that exists. However, the number of studies that do true multimodal fusion (i.e. capitalizing on joint information among modalities) is still remarkably small given the known benefits. In part, this is because multi-modal studies require broader expertise in collecting, analyzing, and interpreting the results than do unimodal studies. In this paper, we start by introducing the basic reasons why multimodal data fusion is important and what it can do, and importantly how it can help us avoid wrong conclusions and help compensate for imperfect brain imaging studies. We also discuss the challenges that need to be confronted for such approaches to be more widely applied by the community. We then provide a review of the diverse studies that have used multimodal data fusion (primarily focused on psychosis) as well as provide an introduction to some of the existing analytic approaches. Finally, we discuss some up-and-coming approaches to multi-modal fusion including deep learning and multimodal classification which show considerable promise. Our conclusion is that multimodal data fusion is rapidly growing, but it is still underutilized. The complexity of the human brain coupled with the incomplete measurement provided by existing imaging technology makes multimodal fusion essential in order to mitigate against misdirection and hopefully provide a key to finding the missing link(s) in complex mental illness. PMID:27347565

  5. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  6. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  7. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  8. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  9. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  10. Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blandino, Rémi; Etesse, Jean; Grangier, Philippe

    2014-12-04

    We show that the maximum transmission distance of continuous-variable quantum key distribution in presence of a Gaussian noisy lossy channel can be arbitrarily increased using a heralded noiseless linear amplifier. We explicitly consider a protocol using amplitude and phase modulated coherent states with reverse reconciliation. Assuming that the secret key rate drops to zero for a line transmittance T{sub lim}, we find that a noiseless amplifier with amplitude gain g can improve this value to T{sub lim}/g{sup 2}, corresponding to an increase in distance proportional to log g. We also show that the tolerance against noise is increased.

  11. Efficient hit-finding approaches for histone methyltransferases: the key parameters.

    PubMed

    Ahrens, Thomas; Bergner, Andreas; Sheppard, David; Hafenbradl, Doris

    2012-01-01

    For many novel epigenetics targets the chemical ligand space and structural information were limited until recently and are still largely unknown for some targets. Hit-finding campaigns are therefore dependent on large and chemically diverse libraries. In the specific case of the histone methyltransferase G9a, the authors have been able to apply an efficient process of intelligent selection of compounds for primary screening, rather than screening the full diverse deck of 900 000 compounds to identify hit compounds. A number of different virtual screening methods have been applied for the compound selection, and the results have been analyzed in the context of their individual success rates. For the primary screening of 2112 compounds, a FlashPlate assay format and full-length histone H3.1 substrate were employed. Validation of hit compounds was performed using the orthogonal fluorescence lifetime technology. Rated by purity and IC(50) value, 18 compounds (0.9% of compound screening deck) were finally considered validated primary G9a hits. The hit-finding approach has led to novel chemotypes being identified, which can facilitate hit-to-lead projects. This study demonstrates the power of virtual screening technologies for novel, therapeutically relevant epigenetics protein targets.

  12. Non-resonant electromagnetic energy harvester for car-key applications

    NASA Astrophysics Data System (ADS)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  13. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  14. Securing quantum key distribution systems using fewer states

    NASA Astrophysics Data System (ADS)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  15. Key Program Findings and Insights From the Baby-Friendly Hawaii Project.

    PubMed

    Kahin, Sahra A; McGurk, Meghan; Hansen-Smith, Heidi; West, Margaret; Li, Ruowei; Melcher, Carolyn Lopez

    2017-05-01

    Breastfeeding is the optimal method for infant feeding. In the United States, 81.1% of mothers initiate breastfeeding; however, only 44.4% and 22.3% of mothers are exclusively breastfeeding at 3 and 6 months, respectively. Research aim: The Centers for Disease Control and Prevention provides guidance and funding to state health departments to support strategies to improve breastfeeding policies and practices in the hospital, community, and worksite settings. In 2010, the Hawaii State Department of Health received support from the Centers for Disease Control and Prevention to launch the Baby-Friendly Hawaii Project (BFHP) to increase the number of Hawaii hospitals that provide maternity care consistent with the Ten Steps to Successful Breastfeeding and increase the rate of women who remain exclusively breastfeeding throughout their hospital stay. For this article, we examined the BFHP's final evaluation report and Hawaii breastfeeding and maternity care data to identify the role of the BFHP in facilitating improvements in maternity care practices and breastfeeding rates. Since 2010, 52 hospital site visits, 58 trainings, and ongoing technical assistance were administered, and more than 750 staff and health professionals from BFHP hospitals were trained. Hawaii's overall quality composite Maternity Practices in Infant Nutrition and Care score increased from 65 (out of 100) in 2009 to 76 in 2011 and 80 in 2013, and Newborn Screening Data showed an increase in statewide exclusive breastfeeding from 59.7% in 2009 to 77.0% in 2014. Implementation and findings from the BFHP can inform future planning at the state and federal levels on maternity care practices that can improve breastfeeding.

  16. What Is the Key for Older People to Show Interest in Playing Digital Learning Games? Initial Qualitative Findings from the LEAGE Project on a Multicultural European Sample.

    PubMed

    Diaz-Orueta, Unai; Facal, David; Nap, Henk Herman; Ranga, Myrto-Maria

    2012-04-01

    Learning digital games can influence both older adults' health condition and their capacity to carry on activities in their actual environment. The goal of the current study was to explore and define the user requirements for developing digital learning games for older Europeans, focusing on types of learning games, motivational and social aspects, and preferences on game controllers. For this initial stage, a qualitative focus group study was performed in three participating countries (Spain, The Netherlands, and Greece) where both games existing in the market and others developed in other European Commission projects like HERMES were presented to them, both on video presentations and also with the possibility to actually test some of them. Challenge, socialization, fun, providing learning opportunities, and escape from daily routine were extracted as the main keys why older people would be interested in playing digital games. Users described themselves as active and participating in many leisure activities, and this level of activity appeared to be related with the contents proposed for digital games, such as physical activity, culture, arts, and other human sciences (history, geography, traveling, foreign languages, music), and daily life skills (cooking, computer use, first aid). The knowledge gathered from the focus groups will be used as input for the design of a learning game that will be largely compatible with the needs and abilities of a wide range of older Europeans.

  17. Finding the Key Periods for Assimilating HJ-1A/B CCD Data and the WOFOST Model to Evaluate Heavy Metal Stress in Rice.

    PubMed

    Zhao, Shuang; Qian, Xu; Liu, Xiangnan; Xu, Zhao

    2018-04-17

    Accurately monitoring heavy metal stress in crops is vital for food security and agricultural production. The assimilation of remote sensing images into the World Food Studies (WOFOST) model provides an efficient way to solve this problem. In this study, we aimed at investigating the key periods of the assimilation framework for continuous monitoring of heavy metal stress in rice. The Harris algorithm was used for the leaf area index (LAI) curves to select the key period for an optimized assimilation. To obtain accurate LAI values, the measured dry weight of rice roots (WRT), which have been proven to be the most stress-sensitive indicator of heavy metal stress, were incorporated into the improved WOFOST model. Finally, the key periods, which contain four dominant time points, were used to select remote sensing images for the RS-WOFOST model for continuous monitoring of heavy metal stress. Compared with the key period which contains all the available remote sensing images, the results showed that the optimal key period can significantly improve the time efficiency of the assimilation framework by shortening the model operation time by more than 50%, while maintaining its accuracy. This result is highly significant when monitoring heavy metals in rice on a large-scale. Furthermore, it can also offer a reference for the timing of field measurements in monitoring heavy metal stress in rice.

  18. Key Program Findings and Insights From the Baby-Friendly Hawaii Project

    PubMed Central

    Kahin, Sahra A.; McGurk, Meghan; Hansen-Smith, Heidi; West, Margaret; Li, Ruowei; Melcher, Carolyn Lopez

    2017-01-01

    Background Breastfeeding is the optimal method for infant feeding. In the United States, 81.1% of mothers initiate breastfeeding; however, only 44.4% and 22.3% of mothers are exclusively breastfeeding at 3 and 6 months, respectively. Research aim The Centers for Disease Control and Prevention provides guidance and funding to state health departments to support strategies to improve breastfeeding policies and practices in the hospital, community, and worksite settings. In 2010, the Hawaii State Department of Health received support from the Centers for Disease Control and Prevention to launch the Baby-Friendly Hawaii Project (BFHP) to increase the number of Hawaii hospitals that provide maternity care consistent with the Ten Steps to Successful Breastfeeding and increase the rate of women who remain exclusively breastfeeding throughout their hospital stay. Methods For this article, we examined the BFHP’s final evaluation report and Hawaii breastfeeding and maternity care data to identify the role of the BFHP in facilitating improvements in maternity care practices and breastfeeding rates. Results Since 2010, 52 hospital site visits, 58 trainings, and ongoing technical assistance were administered, and more than 750 staff and health professionals from BFHP hospitals were trained. Hawaii’s overall quality composite Maternity Practices in Infant Nutrition and Care score increased from 65 (out of 100) in 2009 to 76 in 2011 and 80 in 2013, and Newborn Screening Data showed an increase in statewide exclusive breastfeeding from 59.7% in 2009 to 77.0% in 2014. Conclusion Implementation and findings from the BFHP can inform future planning at the state and federal levels on maternity care practices that can improve breastfeeding. PMID:28135119

  19. Key findings from HSC's 2010 site visits: health care markets weather economic downturn, brace for health reform.

    PubMed

    Felland, Laurie E; Grossman, Joy M; Tu, Ha T

    2011-05-01

    Lingering fallout--loss of jobs and employer coverage--from the great recession slowed demand for health care services but did little to slow aggressive competition by dominant hospital systems for well-insured patients, according to key findings from the Center for Studying Health System Change's (HSC) 2010 site visits to 12 nationally representative metropolitan communities. Hospitals with significant market clout continued to command high payment rate increases from private insurers, and tighter hospital-physician alignment heightened concerns about growing provider market power. High and rising premiums led to increasing employer adoption of consumer-driven health plans and continued increases in patient cost sharing, but the broader movement to educate and engage consumers in care decisions did not keep pace. State and local budget deficits led to some funding cuts for safety net providers, but an influx of federal stimulus funds increased support to community health centers and shored up Medicaid programs, allowing many people who lost private insurance because of job losses to remain covered. Hospitals, physicians and insurers generally viewed health reform coverage expansions favorably, but all worried about protecting revenues as reform requirements phase in.

  20. Secret-key expansion from covert communication

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  1. Key Skills and Competencies. Symposium.

    ERIC Educational Resources Information Center

    2002

    This document contains three papers on key skills and competencies and human resource development (HRD). "Career Related Competencies" (Marinka A.C.T. Kuijpers) reports findings from surveys completed by Dutch employees who identified these issues: self-reflection is more important than career control; age and gender influence attitude…

  2. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  3. Necessary detection efficiencies for secure quantum key distribution and bound randomness

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul

    2016-01-01

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.

  4. Astronomers Discover Most Distant Galaxy Showing Key Evidence For Furious Star Formation

    NASA Astrophysics Data System (ADS)

    2003-12-01

    Astronomers have discovered a key signpost of rapid star formation in a galaxy 11 billion light-years from Earth, seen as it was when the Universe was only 20 percent of its current age. Using the National Science Foundation's Very Large Array (VLA) radio telescope, the scientists found a huge quantity of dense interstellar gas -- the environment required for active star formation -- at the greatest distance yet detected. A furious spawning of the equivalent of 1,000 Suns per year in a distant galaxy dubbed the Cloverleaf may be typical of galaxies in the early Universe, the scientists say. Cloverleaf galaxy VLA image (green) of radio emission from HCN gas, superimposed on Hubble Space Telescope image of the Cloverleaf galaxy. The four images of the Cloverleaf are the result of gravitational lensing. CREDIT: NRAO/AUI/NSF, STScI (Click on Image for Larger Version) "This is a rate of star formation more than 300 times greater than that in our own Milky Way and similar spiral galaxies, and our discovery may provide important information about the formation and evolution of galaxies throughout the Universe," said Philip Solomon, of Stony Brook University in New York. While the raw material for star formation has been found in galaxies at even greater distances, the Cloverleaf is by far the most distant galaxy showing this essential signature of star formation. That essential signature comes in the form of a specific frequency of radio waves emitted by molecules of the gas hydrogen cyanide (HCN). "If you see HCN, you are seeing gas with the high density required to form stars," said Paul Vanden Bout of the National Radio Astronomy Observatory (NRAO). Solomon and Vanden Bout worked with Chris Carilli of NRAO and Michel Guelin of the Institute for Millimeter Astronomy in France. They reported their results in the December 11 issue of the scientific journal Nature. In galaxies like the Milky Way, dense gas traced by HCN but composed mainly of hydrogen molecules is always

  5. Finding solid ground: law enforcement, key populations and their health and rights in South Africa

    PubMed Central

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Introduction Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. Discussion We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, “othering” and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Conclusions Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality

  6. Finding solid ground: law enforcement, key populations and their health and rights in South Africa.

    PubMed

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, "othering" and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality. Creating opportunities to share experiences

  7. Monitoring the Future: National Results on Adolescent Drug Use. Overview of Key Findings, 2006

    ERIC Educational Resources Information Center

    Johnston, Lloyd D., O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2007-01-01

    This report provides a summary of drug use trends from a survey of nearly 50,000 eighth-, tenth-, and twelfth- grade students nationwide. It also includes perceived risk, personal disapproval, and perceived availability of each drug by this group. A synopsis of the methods used in the study and an overview of the key results from the 2006 survey…

  8. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N.

    2008-07-15

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determinedmore » for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency ({eta} {approx} 20%) and dark count probability (p{sub dark} {approx} 10{sup -7})« less

  9. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2008-07-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper’s capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ≈ 20%) and dark count probability ( p dark ˜ 10-7).

  10. Key Findings from the U.S.-India Partnership for Climate Resilience Workshop on Development and Application of Downscaling Climate Projections

    NASA Astrophysics Data System (ADS)

    Kunkel, K.; Dissen, J.; Easterling, D. R.; Kulkarni, A.; Akhtar, F. H.; Hayhoe, K.; Stoner, A. M. K.; Swaminathan, R.; Thrasher, B. L.

    2017-12-01

    s part of the Department of State U.S.-India Partnership for Climate Resilience (PCR), scientists from NOAA NCEI, CICS-NC, Texas Tech University (TTU), Stanford University (SU), and the Indian Institute of Tropical Meteorology (IITM) held a workshop at IITM in Pune, India during 7-9 March 2017 on the development, techniques and applications of downscaled climate projections. Workshop participants from TTU, SU, and IITM presented state-of-the-art climate downscaling techniques using the ARRM method, NASA NEX climate products, CORDEX-South Asia and analysis tools for resilience planning and sustainable development. PCR collaborators in attendance included Indian practitioners, researchers and other NGO including the WRI Partnership for Resilience and Preparedness (PREP), The Energy and Resources Institute (TERI), and NIH. The scientific techniques were provided to workshop participants in a software package written in R by TTU scientists and several sessions were devoted to hands-on experience with the software package. The workshop further examined case studies on the use of downscaled climate data for decision making in a range of sectors, including human health, agriculture, and water resources management as well as to inform the development of the India State Action Plans. This talk will discuss key outcomes including information needs for downscaling climate projections, importance of QA/QC of the data, key findings from select case studies, and the importance of collaborations and partnerships to apply downscaling projections to help inform the development of the India State Action Plans.

  11. Composable security proof for continuous-variable quantum key distribution with coherent States.

    PubMed

    Leverrier, Anthony

    2015-02-20

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.

  12. Key Relation Extraction from Biomedical Publications.

    PubMed

    Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian

    2017-01-01

    Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.

  13. Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems: Key Findings from a Roadmapping Workshop

    PubMed Central

    Weiss, Brian A.; Vogl, Gregory; Helu, Moneer; Qiao, Guixiu; Pellegrino, Joan; Justiniano, Mauricio; Raghunathan, Anand

    2017-01-01

    The National Institute of Standards and Technology (NIST) hosted the Roadmapping Workshop – Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems (PHM4SMS) in Fall 2014 to discuss the needs and priorities of stakeholders in the PHM4SMS technology area. The workshop brought together over 70 members of the PHM community. The attendees included representatives from small, medium, and large manufacturers; technology developers and integrators; academic researchers; government organizations; trade associations; and standards bodies. The attendees discussed the current and anticipated measurement science challenges to advance PHM methods and techniques for smart manufacturing systems; the associated research and development needed to implement condition monitoring, diagnostic, and prognostic technologies within manufacturing environments; and the priorities to meet the needs of PHM in manufacturing. This paper will summarize the key findings of this workshop, and present some of the critical measurement science challenges and corresponding roadmaps, i.e., suggested courses of action, to advance PHM for manufacturing. Milestones and targeted capabilities will be presented for each roadmap across three areas: PHM Manufacturing Process Techniques; PHM Performance Assessment; and PHM Infrastructure – Hardware, Software, and Integration. An analysis of these roadmaps and crosscutting themes seen across the breakout sessions is also discussed. PMID:28664163

  14. Key node selection in minimum-cost control of complex networks

    NASA Astrophysics Data System (ADS)

    Ding, Jie; Wen, Changyun; Li, Guoqi

    2017-11-01

    Finding the key node set that is connected with a given number of external control sources for driving complex networks from initial state to any predefined state with minimum cost, known as minimum-cost control problem, is critically important but remains largely open. By defining an importance index for each node, we propose revisited projected gradient method extension (R-PGME) in Monte-Carlo scenario to determine key node set. It is found that the importance index of a node is strongly correlated to occurrence rate of that node to be selected as a key node in Monte-Carlo realizations for three elementary topologies, Erdős-Rényi and scale-free networks. We also discover the distribution patterns of key nodes when the control cost reaches its minimum. Specifically, the importance indices of all nodes in an elementary stem show a quasi-periodic distribution with high peak values in the beginning and end of a quasi-period while they approach to a uniform distribution in an elementary cycle. We further point out that an elementary dilation can be regarded as two elementary stems whose lengths are the closest, and the importance indices in each stem present similar distribution as in an elementary stem. Our results provide a better understanding and deep insight of locating the key nodes in different topologies with minimum control cost.

  15. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gittsovich, O.; Moroder, T.

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  16. Causes, consequences, and policy responses to the migration of health workers: key findings from India.

    PubMed

    Walton-Roberts, Margaret; Runnels, Vivien; Rajan, S Irudaya; Sood, Atul; Nair, Sreelekha; Thomas, Philomina; Packer, Corinne; MacKenzie, Adrian; Tomblin Murphy, Gail; Labonté, Ronald; Bourgeault, Ivy Lynn

    2017-04-05

    This study sought to better understand the drivers of skilled health professional migration, its consequences, and the various strategies countries have employed to mitigate its negative impacts. The study was conducted in four countries-Jamaica, India, the Philippines, and South Africa-that have historically been "sources" of health workers migrating to other countries. The aim of this paper is to present the findings from the Indian portion of the study. Data were collected using surveys of Indian generalist and specialist physicians, nurses, midwives, dentists, pharmacists, dieticians, and other allied health therapists. We also conducted structured interviews with key stakeholders representing government ministries, professional associations, regional health authorities, health care facilities, and educational institutions. Quantitative data were analyzed using descriptive statistics and regression models. Qualitative data were analyzed thematically. Shortages of health workers are evident in certain parts of India and in certain specialty areas, but the degree and nature of such shortages are difficult to determine due to the lack of evidence and health information. The relationship of such shortages to international migration is not clear. Policy responses to health worker migration are also similarly embedded in wider processes aimed at health workforce management, but overall, there is no clear policy agenda to manage health worker migration. Decision-makers in India present conflicting options about the need or desirability of curtailing migration. Consequences of health work migration on the Indian health care system are not easily discernable from other compounding factors. Research suggests that shortages of skilled health workers in India must be examined in relation to domestic policies on training, recruitment, and retention rather than viewed as a direct consequence of the international migration of health workers.

  17. Tectonic history of Sweetgrass Arch, Montana and Alberta-key to finding new hydrocarbons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shepard, W. Shepard, B.

    1985-05-01

    The Sweetgrass arch of northwestern Montana and southern Alberta is a major ancient structural feature. Initial anticlinal emplacement occurred during the early Paleozoic and was parallel with the cratonic margin. Strong uplift followed by peneplanation occurred during the Late Jurassic and basal Cretaceous during the westward drifting of the North American plate following the breakup of Pangea. During Cretaceous and early Tertiary times, the Sweetgrass arch was quiescent, but was rejuvenated in mid to late Tertiary, upwarped by a basement flexure to its present structural configuration: a 200 mi (322 km) long, north-plunging anticline showing 10,000 ft (350 m) ofmore » structural relief. Midway down its plunge, the anticline is offset 30 mi (48 km) by a right-lateral transcurrent fault. During Late Cretaceous and early Tertiary, plutonic uplifts were emplaced on the east flank, forming traps for oil then migrating updip from the Williston and Alberta basins. Oil and gas accumulated in Mississippian, Jurassic, and basal Cretaceous reservoirs in structural and stratigraphic traps around these plutonic uplifts. Subsequent late Tertiary doming of the Sweetgrass arch tilted the earlier structural traps and drained them, resulting in remigration of much of the oil and gas to the crest of the arch. The tilting failed to destroy many of the stratigraphic traps. As a result, down the flanks of the Sweetgrass arch are many frozen stratigraphic traps including Cut Bank field, the largest single-pay stratigraphic trap in the north Rockies. On the crest are large structure accumulations of remigrated oil at Kevin Sunburst and Pondera. Evidence of remigration is recorded by live oil show tracks in the reservoirs and remnant gas caps throughout the area of earlier accumulations. A potential exists for finding new frozen traps on the flanks and remigrated oil accumulations on or near the crest of the Sweetgrass arch.« less

  18. Higher Education in England 2016: Key Facts. September 2016/20

    ERIC Educational Resources Information Center

    Higher Education Funding Council for England, 2016

    2016-01-01

    This updated edition of "Higher Education in England: Key Facts" provides a statistical overview of key sector trends and developments in 2016. Using the most recent data, it draws together key findings from a range of reports published by the Higher Education Funding Council for England (HEFCE) over the past year to provide a robust,…

  19. Long-distance quantum key distribution with imperfect devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-12-04

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R{sub QKD}. The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels.more » We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols.« less

  20. Device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Hänggi, Esther

    2010-12-01

    In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.

  1. SpaceWire Tiger Team Findings and Suggestions

    NASA Technical Reports Server (NTRS)

    Ishac, Joseph A.

    2011-01-01

    This technical report intends to highlight the key findings and recommendations of the SpaceWire Tiger Team for the CoNNeCT project. It covers findings which are technical in nature, covering design concepts and approaches.

  2. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  3. Fully device-independent conference key agreement

    NASA Astrophysics Data System (ADS)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  4. Honeybees Learn Odour Mixtures via a Selection of Key Odorants

    PubMed Central

    Reinhard, Judith; Sinclair, Michael; Srinivasan, Mandyam V.; Claudianos, Charles

    2010-01-01

    Background The honeybee has to detect, process and learn numerous complex odours from her natural environment on a daily basis. Most of these odours are floral scents, which are mixtures of dozens of different odorants. To date, it is still unclear how the bee brain unravels the complex information contained in scent mixtures. Methodology/Principal Findings This study investigates learning of complex odour mixtures in honeybees using a simple olfactory conditioning procedure, the Proboscis-Extension-Reflex (PER) paradigm. Restrained honeybees were trained to three scent mixtures composed of 14 floral odorants each, and then tested with the individual odorants of each mixture. Bees did not respond to all odorants of a mixture equally: They responded well to a selection of key odorants, which were unique for each of the three scent mixtures. Bees showed less or very little response to the other odorants of the mixtures. The bees' response to mixtures composed of only the key odorants was as good as to the original mixtures of 14 odorants. A mixture composed of the other, non-key-odorants elicited a significantly lower response. Neither an odorant's volatility or molecular structure, nor learning efficiencies for individual odorants affected whether an odorant became a key odorant for a particular mixture. Odorant concentration had a positive effect, with odorants at high concentration likely to become key odorants. Conclusions/Significance Our study suggests that the brain processes complex scent mixtures by predominantly learning information from selected key odorants. Our observations on key odorant learning lend significant support to previous work on olfactory learning and mixture processing in honeybees. PMID:20161714

  5. Key Findings for Interpersonal Skills

    DTIC Science & Technology

    2013-12-04

    for example if you feel they use too much or too little eye contact or gesturing, stand too close or too far, or use gestures you’re unfamiliar with...IM2 RIGH[T now. 23 CM2 honestly 24 CM2 I didn’t even ((unintelligible)) 25 Would you tell him? 26 I didn’t do any fucking thing man 27 CF1 No he didn’t...that civilians whom they contact may have little or no understanding of what is happening, what they should do, or why they should do it. When

  6. A Key to the New Library.

    ERIC Educational Resources Information Center

    Gerryts, Egbert; Pienaar, Heila

    This paper discusses finding the key to a new library in order to ensure its future, stressing the importance of alignment between strategy and people. The first section addresses management philosophy for renewal, including replacing the inflexible hierarchical pyramidal structure by a network organization with a service and competency management…

  7. Key factors impacting on diagnosis and treatment for vulvar cancer for Indigenous women: findings from Australia.

    PubMed

    McGrath, Pam; Rawson, Nicole

    2013-10-01

    To date, there has been limited research on the topic of vulvar cancer. This paper provides findings from a qualitative study conducted with Indigenous women in East Arnhem Land, Northern Territory, Australia on the psychosocial impact of diagnosis and treatment for vulvar cancer. The insights from the study outlined in this paper not only make a contribution to deepening our understanding of the experience of vulvar cancer for Indigenous women, but provide practical recommendations to ensure effective and early engagement for diagnosis and treatment. A qualitative research method was employed through in-depth, open-ended interviews. The participants of the study were a purposive sample of Indigenous women with the condition, health professionals, and Aboriginal health workers. There were a total of 40 participants; with twelve (n = 12) Indigenous women affected with the condition, fourteen (n = 14) Aboriginal Health Workers, ten (n = 10) nurses, three (n = 3) doctors, and one (n = 1) community member. This paper addresses three key issues highlighted by the participants which include the fact that the private nature of the disease makes the condition 'women's business', that there is a sense of shame associated with the condition, and that there is fear and worry generated by the seriousness of the condition. The private nature of the disease and the sense of shame associated with the condition impact upon the diagnosis and treatment for many Indigenous women. In addition, the limitation of resources for health service delivery for East Arnhem Land exacerbates the problems faced by these communities. This paper puts forward suggestions to facilitate early diagnosis and treatment for women affected with the condition.

  8. Side-channel-free quantum key distribution.

    PubMed

    Braunstein, Samuel L; Pirandola, Stefano

    2012-03-30

    Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.

  9. The RNA world in the 21st century-a systems approach to finding non-coding keys to clinical questions.

    PubMed

    Schmitz, Ulf; Naderi-Meshkin, Hojjat; Gupta, Shailendra K; Wolkenhauer, Olaf; Vera, Julio

    2016-05-01

    There was evidence that RNAs are a functionally rich class of molecules not only since the arrival of the next-generation sequencing technology. Non-coding RNAs (ncRNA) could be the key to accelerated diagnosis and enhanced prediction of disease and therapy outcomes as well as the design of advanced therapeutic strategies to overcome yet unsatisfactory approaches.In this review, we discuss the state of the art in RNA systems biology with focus on the application in the systems biomedicine field. We propose guidelines for analysing the role of microRNAs and long non-coding RNAs in human pathologies. We introduce RNA expression profiling and network approaches for the identification of stable and effective RNomics-based biomarkers, providing insights into the role of ncRNAs in disease regulation. Towards this, we discuss ways to model the dynamics of gene regulatory networks and signalling pathways that involve ncRNAs. We also describe data resources and computational methods for finding putative mechanisms of action of ncRNAs. Finally, we discuss avenues for the computer-aided design of novel RNA-based therapeutics. © The Author 2015. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  10. Key findings on legal and regulatory barriers to HIV testing and access to care across Europe.

    PubMed

    Power, L; Hows, J; Jakobsen, S F

    2018-02-01

    The aim of this work within OptTEST by HiE has been to demonstrate the role of legal and regulatory barriers in hindering access to HIV testing, treatment and care across Europe and to produce tools to help dismantle them. An online survey to assess country-specific data on legal and regulatory barriers distributed widely across the WHO Europe region. Literature reviews conducted in January-October 2015 in English, in November 2015 in Russian, and updated in April 2017. Semi-structured interviews were conducted with 25 key actors within the HIV field to feed into case studies and tip sheets on how to dismantle legal and regulatory barriers. More than 160 individuals and organisations from 49 countries across the WHO European region provided responses which were analysed and cross checked with other data sources and a searchable database produced (legalbarriers.peoplewithhiveurope.org). The conducted literature reviews yielded 88 papers and reports which identify legal and regulatory barriers to key populations' access to HV testing and care. Based on the interviews with key actors, ranging from PLHIV activists to government officials, on lessons-learned, a series of tip sheets and ten case studies were written-up intended to inform and inspire the HIV community to address and overcome existing barriers (opttest.eu/Tools). While some of the barriers identified may require major changes to wider health systems, or long term legal reform, many are open to a simple change in regulations or custom and practice. We have the tools. Why can't we finish the job? © 2018 British HIV Association.

  11. Key Understandings in School Mathematics: 1

    ERIC Educational Resources Information Center

    Watson, Anne

    2010-01-01

    This article is the first in a series which draws on findings from Nunes, Watson and Bryant (2009): "Key understandings in school mathematics: a report to the Nuffield Foundation." The Nuffield report is soundly based on research about how children learn some of the concepts involved in mathematics. In this series of articles the author takes key…

  12. Key Understandings in School Mathematics: 3

    ERIC Educational Resources Information Center

    Watson, Anne

    2010-01-01

    This article is the third in a series which draws on findings from Nunes, Watson and Bryant (2009): "Key understandings in school mathematics: a report to the Nuffield Foundation". In this article the author focuses on what learners have to understand and learn in order to do secondary mathematics well in general terms. She is assuming a…

  13. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  14. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  15. Old Wine in New Skins: The Sensitivity of Established Findings to New Methods

    ERIC Educational Resources Information Center

    Foster, E. Michael; Wiley-Exley, Elizabeth; Bickman, Leonard

    2009-01-01

    Findings from an evaluation of a model system for delivering mental health services to youth were reassessed to determine the robustness of key findings to the use of methodologies unavailable to the original analysts. These analyses address a key concern about earlier findings--that the quasi-experimental design involved the comparison of two…

  16. Hotel shows health system keys to service excellence.

    PubMed

    2003-08-01

    Ritz-Carlton partnership part of broader program pursuing service excellence. Nearly 600 system leaders will participate in day-long seminars. GE, Harvard serve as strategic partners for ongoing educational efforts.

  17. How to Find HIV Treatment Services

    MedlinePlus

    ... Clinical Trials Apps skip to content Living with HIV Home Understanding HIV/AIDS Fact Sheets How to ... ET) Send us an email How to Find HIV Treatment Services Last Reviewed: December 6, 2017 Key ...

  18. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  19. A Reporting System to Protect the Human Rights of People Living with HIV and Key Populations.

    PubMed

    Williamson, R Taylor; Fiscian, Vivian; Olson, Ryan Ubuntu; Poku, Fred Nana; Whittal, Joseph

    2017-12-01

    People living with HIV and key populations face human rights violations that affect their access to health services, relationships in their communities, housing options, and employment. To address these violations, government and civil society organizations in Ghana developed a discrimination reporting system managed by the Commission on Human Rights and Administrative Justice that links people living with HIV and key populations to legal services. This article presents findings on how Ghanaian stakeholders built this reporting system and discusses preliminary data on its impact. To organize our analysis, we used a conceptual framework that outlines the legal frameworks that protect human rights, the institutions that promote access to justice, and the mechanisms that link people living with HIV and key populations to legal services. Using in-depth interviews, we show that targeted technical assistance increased stakeholders' knowledge of issues that affect people living with HIV and key populations, strengthened these stakeholders' commitment to address discrimination, streamlined case management systems, and improved relationships between civil society and the government. Through case review, we find that most discrimination happens when accessing government services, inside communities and families, and in the workplace. Finally, we describe implications for other human rights commissions that are considering using a reporting system to protect human rights, including using legal frameworks, developing case management systems, and working with civil society.

  20. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2014-07-25

    link in a free- space channel through a marine environment (such as loss, noise and turbulence) and (2) parametrically calculating the secret key rate...width. Parametric calculations of the expected secret key rate As can be seen in Figure 6, the secret key rate of the BB84 protocol in the presence...Figure 9 shows the effect of various detriments on the secret -kay rate, for laser-decoy BB84. Figure 9: Effects of detriments on secret-key rate

  1. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  2. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  3. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-01-01

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624

  4. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  5. Fish can show emotional fever: stress-induced hyperthermia in zebrafish

    PubMed Central

    Huntingford, Felicity A.; Boltaña, Sebastian; Vargas, Reynaldo; Knowles, Toby G.; Mackenzie, Simon

    2015-01-01

    Whether fishes are sentient beings remains an unresolved and controversial question. Among characteristics thought to reflect a low level of sentience in fishes is an inability to show stress-induced hyperthermia (SIH), a transient rise in body temperature shown in response to a variety of stressors. This is a real fever response, so is often referred to as ‘emotional fever’. It has been suggested that the capacity for emotional fever evolved only in amniotes (mammals, birds and reptiles), in association with the evolution of consciousness in these groups. According to this view, lack of emotional fever in fishes reflects a lack of consciousness. We report here on a study in which six zebrafish groups with access to a temperature gradient were either left as undisturbed controls or subjected to a short period of confinement. The results were striking: compared to controls, stressed zebrafish spent significantly more time at higher temperatures, achieving an estimated rise in body temperature of about 2–4°C. Thus, zebrafish clearly have the capacity to show emotional fever. While the link between emotion and consciousness is still debated, this finding removes a key argument for lack of consciousness in fishes. PMID:26609087

  6. Fish can show emotional fever: stress-induced hyperthermia in zebrafish.

    PubMed

    Rey, Sonia; Huntingford, Felicity A; Boltaña, Sebastian; Vargas, Reynaldo; Knowles, Toby G; Mackenzie, Simon

    2015-11-22

    Whether fishes are sentient beings remains an unresolved and controversial question. Among characteristics thought to reflect a low level of sentience in fishes is an inability to show stress-induced hyperthermia (SIH), a transient rise in body temperature shown in response to a variety of stressors. This is a real fever response, so is often referred to as 'emotional fever'. It has been suggested that the capacity for emotional fever evolved only in amniotes (mammals, birds and reptiles), in association with the evolution of consciousness in these groups. According to this view, lack of emotional fever in fishes reflects a lack of consciousness. We report here on a study in which six zebrafish groups with access to a temperature gradient were either left as undisturbed controls or subjected to a short period of confinement. The results were striking: compared to controls, stressed zebrafish spent significantly more time at higher temperatures, achieving an estimated rise in body temperature of about 2-4°C. Thus, zebrafish clearly have the capacity to show emotional fever. While the link between emotion and consciousness is still debated, this finding removes a key argument for lack of consciousness in fishes. © 2015 The Authors.

  7. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph

    PubMed Central

    Zhao, Shuai; Tong, Yunhai; Wang, Zitian; Tan, Shaohua

    2016-01-01

    In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks’ price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds. PMID:27893780

  8. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    PubMed

    Zhao, Shuai; Tong, Yunhai; Wang, Zitian; Tan, Shaohua

    2016-01-01

    In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  9. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  10. Efficient key pathway mining: combining networks and OMICS data.

    PubMed

    Alcaraz, Nicolas; Friedrich, Tobias; Kötzing, Timo; Krohmer, Anton; Müller, Joachim; Pauling, Josch; Baumbach, Jan

    2012-07-01

    Systems biology has emerged over the last decade. Driven by the advances in sophisticated measurement technology the research community generated huge molecular biology data sets. These comprise rather static data on the interplay of biological entities, for instance protein-protein interaction network data, as well as quite dynamic data collected for studying the behavior of individual cells or tissues in accordance with changing environmental conditions, such as DNA microarrays or RNA sequencing. Here we bring the two different data types together in order to gain higher level knowledge. We introduce a significantly improved version of the KeyPathwayMiner software framework. Given a biological network modelled as a graph and a set of expression studies, KeyPathwayMiner efficiently finds and visualizes connected sub-networks where most components are expressed in most cases. It finds all maximal connected sub-networks where all nodes but k exceptions are expressed in all experimental studies but at most l exceptions. We demonstrate the power of the new approach by comparing it to similar approaches with gene expression data previously used to study Huntington's disease. In addition, we demonstrate KeyPathwayMiner's flexibility and applicability to non-array data by analyzing genome-scale DNA methylation profiles from colorectal tumor cancer patients. KeyPathwayMiner release 2 is available as a Cytoscape plugin and online at http://keypathwayminer.mpi-inf.mpg.de.

  11. Key Frame Extraction in the Summary Space.

    PubMed

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  12. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    PubMed

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  13. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  14. Formal Analysis of Key Integrity in PKCS#11

    NASA Astrophysics Data System (ADS)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  15. Key Findings of AAP Store Survey

    ERIC Educational Resources Information Center

    Melendes, Bob; And Others

    1977-01-01

    Results of the Association of American Publishers "College Bookstore Marketing Survey" in the fall of 1976 are summarized. The intent was to improve college textbook publisher services to college stores in the areas of order fulfillment, publication scheduling, print quantities, shipping, billing, and processing of returns. (LBH)

  16. Effective radiology dashboards: key research findings.

    PubMed

    Karami, Mahtab; Safdari, Reza; Rahimi, Azin

    2013-01-01

    Innovative organizations have access to information for business intelligence through the objectives displayed in dashboards. In healthcare organizations, where the goal is to improve quality of care along with reducing costs, the radiology department is important from both financial and clinical aspects. Therefore, how to manage this department has critical impact on the effectiveness and efficiency of the organization. Today, since the information in this department not only has different data structure but also is gathered from different data sources, a well defined, comprehensive dashboard can be an effective tool to enhance performance.

  17. Benefit finding in response to general life stress: measurement and correlates

    PubMed Central

    Cassidy, Tony; McLaughlin, Marian; Giles, Melanie

    2014-01-01

    Benefit finding herein defined as “the process of deriving positive growth from adversity” has become a key construct in the evolution of positive psychology, and research suggests that it may provide the basis for a resource model of stress and coping. However, measures of benefit finding have tended to be domain specific. The current study focused on developing a more generic multidimensional measure of benefit finding. A measure of benefit finding was developed and tested in 855 students (574 females and 281 males) aged between 18 and 40 years. A 28-item scale with six dimensions was produced and Confirmatory Factor Analysis (CFA) confirmed the scale structure. The model proposed that psychological and social resources would mediate the relationship between experienced stressors and benefit finding. Structural equation modelling with Analysis of Moment Structures (AMOS) shows that the model is a good fit for the data and psychological and social resources partially mediated the relationship. It is argued that psychological and social resources enable benefit finding in relation to life stress and provide a focus for the development of preventive interventions to improve positive health. PMID:25750781

  18. Entropy Driven Self-Assembly in Charged Lock-Key Particles.

    PubMed

    Odriozola, Gerardo; Lozada-Cassou, Marcelo

    2016-07-07

    In this work we study the lock-key model successfully used in supramolecular chemistry and particles self-assembly and gain further insight into the infinite diluted limit of the lock and key, depletant mediated, effective attraction. We discuss the depletant forces and entropy approaches to self-assembly and give details on the different contributions to the net force for a charged lock and key pair immersed in a solvent plus a primitive model electrolyte. We show a strong correlation of the force components behavior and the underlying processes of co-ion and solvent release from the cavity. In addition, we put into context the universal behavior observed for the energy-distance curves when changing the lock and key to solvent size ratio. Basically, we now show that this behavior is not always achieved and depends on the particular system geometry. Finally, we present a qualitative good agreement with experiments when changing the electrolyte concentration, valence, and cavity-key size ratio.

  19. The preferable keypad layout for ease of pressing small cell phone keys with the thumb.

    PubMed

    Muraki, Satoshi; Okabe, Keiichi; Abe, Tetsuji; Sai, Akishige

    2010-12-01

    The present study investigated the effect of keypad layout on the ease of operating small cell phones with the thumb in one-handed operations by young and elderly male and female participants. Eighteen young participants (9 males and 9 females) and 12 elderly participants (6 males and 6 females) operated 9 different keypads modeled after commercially available cordless handsets. Keypads designed by using the L9 orthogonal array differed in vertical pitch (V-Pitch: 7, 8, 9 mm) between keys, horizontal pitch (H-Pitch: 10, 11, 12 mm) between keys, the margin below the bottom row of keys (B-Margin: 5, 13, 21 mm), and phone body width (P-Width: 38, 41, 44 mm). Results concerning subjective overall usability showed the lowest scores for a V-Pitch of 7 mm and a B-Margin of 5 mm in most groups. However, for the female participants, with shorter thumbs, the increase in V-pitch did not improve operability. In the elderly participants, miskeying frequently occurred at dial keys of specific numbers. These findings suggest that the preferable keypad layout differs between different age groups and between male and female participants.

  20. Modelling efforts needed to advance herpes simplex virus (HSV) vaccine development: Key findings from the World Health Organization Consultation on HSV Vaccine Impact Modelling.

    PubMed

    Gottlieb, Sami L; Giersing, Birgitte; Boily, Marie-Claude; Chesson, Harrell; Looker, Katharine J; Schiffer, Joshua; Spicknall, Ian; Hutubessy, Raymond; Broutet, Nathalie

    2017-06-21

    Development of a vaccine against herpes simplex virus (HSV) is an important goal for global sexual and reproductive health. In order to more precisely define the health and economic burden of HSV infection and the theoretical impact and cost-effectiveness of an HSV vaccine, in 2015 the World Health Organization convened an expert consultation meeting on HSV vaccine impact modelling. The experts reviewed existing model-based estimates and dynamic models of HSV infection to outline critical future modelling needs to inform development of a comprehensive business case and preferred product characteristics for an HSV vaccine. This article summarizes key findings and discussions from the meeting on modelling needs related to HSV burden, costs, and vaccine impact, essential data needs to carry out those models, and important model components and parameters. Copyright © 2017. Published by Elsevier Ltd.

  1. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  2. Key parameters controlling the performance of catalytic motors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Esplandiu, Maria J.; Afshar Farniya, Ali; Reguera, David, E-mail: dreguera@ub.edu

    2016-03-28

    The development of autonomous micro/nanomotors driven by self-generated chemical gradients is a topic of high interest given their potential impact in medicine and environmental remediation. Although impressive functionalities of these devices have been demonstrated, a detailed understanding of the propulsion mechanism is still lacking. In this work, we perform a comprehensive numerical analysis of the key parameters governing the actuation of bimetallic catalytic micropumps. We show that the fluid motion is driven by self-generated electro-osmosis where the electric field originates by a proton current rather than by a lateral charge asymmetry inside the double layer. Hence, the surface potential andmore » the electric field are the key parameters for setting the pumping strength and directionality. The proton flux that generates the electric field stems from the proton gradient induced by the electrochemical reactions taken place at the pump. Surprisingly the electric field and consequently the fluid flow are mainly controlled by the ionic strength and not by the conductivity of the solution, as one could have expected. We have also analyzed the influence of the chemical fuel concentration, electrochemical reaction rates, and size of the metallic structures for an optimized pump performance. Our findings cast light on the complex chemomechanical actuation of catalytic motors and provide important clues for the search, design, and optimization of novel catalytic actuators.« less

  3. Key parameters controlling the performance of catalytic motors.

    PubMed

    Esplandiu, Maria J; Afshar Farniya, Ali; Reguera, David

    2016-03-28

    The development of autonomous micro/nanomotors driven by self-generated chemical gradients is a topic of high interest given their potential impact in medicine and environmental remediation. Although impressive functionalities of these devices have been demonstrated, a detailed understanding of the propulsion mechanism is still lacking. In this work, we perform a comprehensive numerical analysis of the key parameters governing the actuation of bimetallic catalytic micropumps. We show that the fluid motion is driven by self-generated electro-osmosis where the electric field originates by a proton current rather than by a lateral charge asymmetry inside the double layer. Hence, the surface potential and the electric field are the key parameters for setting the pumping strength and directionality. The proton flux that generates the electric field stems from the proton gradient induced by the electrochemical reactions taken place at the pump. Surprisingly the electric field and consequently the fluid flow are mainly controlled by the ionic strength and not by the conductivity of the solution, as one could have expected. We have also analyzed the influence of the chemical fuel concentration, electrochemical reaction rates, and size of the metallic structures for an optimized pump performance. Our findings cast light on the complex chemomechanical actuation of catalytic motors and provide important clues for the search, design, and optimization of novel catalytic actuators.

  4. YoungStar in Wisconsin: Analysis of Data as of July 2014. Executive Summary: Key Findings and Analysis

    ERIC Educational Resources Information Center

    Wisconsin Council on Children and Families, 2014

    2014-01-01

    YoungStar is a five-star quality rating system for child care providers based on education, learning environment, business methods, and practices around child health and well-being. Through this rating system, the state is addressing several key issues in Wisconsin's child care system. The rating system will: (1) Improve the overall quality of…

  5. Phenobarbital and propiconazole toxicogenomic profiles in mice show major similarities consistent with the key role that constitutive androstane receptor (CAR) activation plays in their mode of action

    PubMed Central

    Currie, Richard A.; Peffer, Richard C.; Goetz, Amber K.; Omiecinski, Curtis J.; Goodman, Jay I.

    2014-01-01

    Toxicogenomics (TGx) is employed frequently to investigate underlying molecular mechanisms of the compound of interest and, thus, has become an aid to mode of action determination. However, the results and interpretation of a TGx dataset are influenced by the experimental design and methods of analysis employed. This article describes an evaluation and reanalysis, by two independent laboratories, of previously published TGx mouse liver microarray data for a triazole fungicide, propiconazole (PPZ), and the anticonvulsant drug phenobarbital (PB). Propiconazole produced an increase incidence of liver tumors in male CD-1 mice only at a dose that exceeded the maximum tolerated dose (2500 ppm). Firstly, we illustrate how experimental design differences between two in vivo studies with PPZ and PB may impact the comparisons of TGx results. Secondly, we demonstrate that different researchers using different pathway analysis tools can come to different conclusions on specific mechanistic pathways, even when using the same datasets. Finally, despite these differences the results across three different analyses also show a striking degree of similarity observed for PPZ and PB treated livers when the expression data are viewed as major signaling pathways and cell processes affected. Additional studies described here show that the postulated key event of hepatocellular proliferation was observed in CD-1 mice for both PPZ and PB, and that PPZ is also a potent activator of the mouse CAR nuclear receptor. Thus, with regard to the events which are hallmarks of CAR-induced effects that are key events in the mode of action (MOA) of mouse liver carcinogenesis with PB, PPZ-induced tumors can be viewed as being promoted by a similar PB-like CAR-dependent MOA. PMID:24675475

  6. Preliminary Airspace Operations Simulations Findings Report

    NASA Technical Reports Server (NTRS)

    2005-01-01

    Provides preliminary findings of the initial series (normal operations and contingency management) of airspace operations simulations. The key elements of this report discuss feedback from controller subjects for UAS flight above FL430. Findings provide initial evaluation of routine UAS operations above dense ARTCC airspace (ZOB), and identify areas of further research, policy direction and procedural development. This document further serves as an addendum to the detailed AOS simulation plan (Deliverable SIM001), incorporating feedback from FAA air traffic personnel and Access 5 IPTs.

  7. Secret key distillation from shielded two-qubit states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bae, Joonwoo

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key canmore » be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.« less

  8. Public Expenditures on Children through 2008: Key Facts

    ERIC Educational Resources Information Center

    Macomber, Jennifer; Isaacs, Julia; Kent, Adam; Vericker, Tracy

    2010-01-01

    This report provides the key findings on the public spending on children through 2008. They are: (1) Spending on children increased under the American Recovery and Reinvestment Act (ARRA) and other stimulus spending, but not proportionately to other federal spending. As ARRA expires, we project that spending on children will decline, assuming no…

  9. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  10. Spike-train communities: finding groups of similar spike trains.

    PubMed

    Humphries, Mark D

    2011-02-09

    Identifying similar spike-train patterns is a key element in understanding neural coding and computation. For single neurons, similar spike patterns evoked by stimuli are evidence of common coding. Across multiple neurons, similar spike trains indicate potential cell assemblies. As recording technology advances, so does the urgent need for grouping methods to make sense of large-scale datasets of spike trains. Existing methods require specifying the number of groups in advance, limiting their use in exploratory analyses. I derive a new method from network theory that solves this key difficulty: it self-determines the maximum number of groups in any set of spike trains, and groups them to maximize intragroup similarity. This method brings us revealing new insights into the encoding of aversive stimuli by dopaminergic neurons, and the organization of spontaneous neural activity in cortex. I show that the characteristic pause response of a rat's dopaminergic neuron depends on the state of the superior colliculus: when it is inactive, aversive stimuli invoke a single pattern of dopaminergic neuron spiking; when active, multiple patterns occur, yet the spike timing in each is reliable. In spontaneous multineuron activity from the cortex of anesthetized cat, I show the existence of neural ensembles that evolve in membership and characteristic timescale of organization during global slow oscillations. I validate these findings by showing that the method both is remarkably reliable at detecting known groups and can detect large-scale organization of dynamics in a model of the striatum.

  11. 42 CFR 456.655 - Validation of showings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Administrator will not find an agency's showing satisfactory if the information obtained through his validation... 42 Public Health 4 2010-10-01 2010-10-01 false Validation of showings. 456.655 Section 456.655... Showing of an Effective Institutional Utilization Control Program § 456.655 Validation of showings. (a...

  12. Finding food

    PubMed Central

    Forsyth, Ann; Lytle, Leslie; Riper, David Van

    2011-01-01

    A significant amount of travel is undertaken to find food. This paper examines challenges in measuring access to food using Geographic Information Systems (GIS), important in studies of both travel and eating behavior. It compares different sources of data available including fieldwork, land use and parcel data, licensing information, commercial listings, taxation data, and online street-level photographs. It proposes methods to classify different kinds of food sales places in a way that says something about their potential for delivering healthy food options. In assessing the relationship between food access and travel behavior, analysts must clearly conceptualize key variables, document measurement processes, and be clear about the strengths and weaknesses of data. PMID:21837264

  13. Establishment of Aedes albopictus (Diptera: Culicidae) in the Florida Keys, 2001-2017.

    PubMed

    Murray, Heidi L; Pruszynski, Catherine A; Leal, Andrea L; Hribar, Lawrence J

    2018-06-23

    The presence of Aedes albopictus (Skuse) was first reported in the Florida Keys in 1993. Despite extensive surveillance, the Florida Keys Mosquito Control District (FKMCD) only collected specimens occasionally on a few islands, some years finding no evidence of the invasive species. In 2013-2017, FKMCD witnessed a sudden increase in population size and geographic extent of Ae. albopictus. Samples of Ae. albopictus have now been identified on 30 different islands in the Florida Keys. Three islands in particular (Key Largo, Big Pine Key, and Stock Island) have produced multiple positive samples during at least 4 of the last 5 yr, suggesting establishment of the invasive species. FKMCD continues to monitor Ae. albopictus throughout the Keys and make extensive efforts to reduce population abundance and geographic extent of this disease vector.

  14. The Genetics of Autism: Key Issues, Recent Findings and Clinical Implications

    PubMed Central

    El-Fishawy, Paul; State, Matthew W.

    2010-01-01

    Autism spectrum disorders (ASD’S) are highly heritable. Consequently, gene discovery promises to help illuminate the pathophysiology of these syndromes, yielding important opportunities for the development of novel treatments and a more nuanced understanding of the natural history of these disorders. Although the underlying genetic architecture of ASD’s is not yet known, the literature demonstrates that it is not, writ large, a monogenic disorder with Mendelian inheritance, but rather a group of complex genetic syndromes with risk deriving from genetic variations in multiple genes. The widely accepted “Common Disease-Common Variant” hypothesis predicts that the risk alleles in ASD’s and other complex disorders will be common in the general population. However, recent evidence from gene discovery efforts in a wide range of diseases raises important questions regarding the overall applicability of the theory and the extent of its usefulness in explaining individual genetic liability. In contrast, considerable evidence points to the importance of rare alleles both with regard to their value in providing a foothold into the molecular mechanisms of ASD and their overall contribution to the population-wide risk. This chapter reviews the origins of the common versus rare variant debate, highlights recent findings in the field, and addresses the clinical implications of both common and rare variant discoveries. PMID:20159341

  15. Involuntary Memories and Dissociative Amnesia: Assessing Key Assumptions in PTSD Research.

    PubMed

    Berntsen, Dorthe; Rubin, David C

    2014-03-01

    Autobiographical memories of trauma victims are often described as disturbed in two ways. First, the trauma is frequently re-experienced in the form of involuntary, intrusive recollections. Second, the trauma is difficult to recall voluntarily (strategically); important parts may be totally or partially inaccessible-a feature known as dissociative amnesia. These characteristics are often mentioned by PTSD researchers and are included as PTSD symptoms in the DSM-IV-TR (American Psychiatric Association, 2000). In contrast, we show that both involuntary and voluntary recall are enhanced by emotional stress during encoding. We also show that the PTSD symptom in the diagnosis addressing dissociative amnesia, trouble remembering important aspects of the trauma is less well correlated with the remaining PTSD symptoms than the conceptual reversal of having trouble forgetting important aspects of the trauma. Our findings contradict key assumptions that have shaped PTSD research over the last 40 years.

  16. Involuntary Memories and Dissociative Amnesia: Assessing Key Assumptions in PTSD Research

    PubMed Central

    Berntsen, Dorthe; Rubin, David C.

    2014-01-01

    Autobiographical memories of trauma victims are often described as disturbed in two ways. First, the trauma is frequently re-experienced in the form of involuntary, intrusive recollections. Second, the trauma is difficult to recall voluntarily (strategically); important parts may be totally or partially inaccessible—a feature known as dissociative amnesia. These characteristics are often mentioned by PTSD researchers and are included as PTSD symptoms in the DSM-IV-TR (American Psychiatric Association, 2000). In contrast, we show that both involuntary and voluntary recall are enhanced by emotional stress during encoding. We also show that the PTSD symptom in the diagnosis addressing dissociative amnesia, trouble remembering important aspects of the trauma is less well correlated with the remaining PTSD symptoms than the conceptual reversal of having trouble forgetting important aspects of the trauma. Our findings contradict key assumptions that have shaped PTSD research over the last 40 years. PMID:25309832

  17. KEY COMPARISON: CCQM-K21 Key Comparison Determination of pp’-DDT in fish oil

    NASA Astrophysics Data System (ADS)

    Webb, K. S.; Carter, D.; Wolff Briche, C. S. J.

    2003-01-01

    A key comparison on the determination of (pp'-dichlorodiphenyl) trichloroethane (pp'-DDT) in a fish oil matrix has been successfully completed. Nine NMIs participated in this key comparison and used the technique of isotope dilution gas-chromatography mass spectrometry (ID/GC/MS) for the determinations. Two samples (A and B) of fish oil were distributed to participants, each gravimetrically spiked with pp'-DDT. The KCRV for Sample A is 0.0743 +/- 0.0020 µg g-1 and that of Sample B is 0.1655 +/- 0.0014 µg g-1 of pp'-DDT in fish oil. The results for Sample A showed a RSD of 3.5%, the RSD for Sample B was within 1%. These results were an improvement over those of the corresponding pilot study (CCQM-P21), where at a mass fraction of pp'-DDT in fish oil of 0.311 µg g-1 the RSD was 2.6%. The compound pp'-DDT is a typical organochlorine pesticide and this key comparison has shown that NMIs have the ability to measure such compounds at levels typically found in the environment. The compound (pp'-dichlorodiphenyl) dichloroethylene (pp'-DDE), a metabolite of pp'-DDT, was the subject of a previous key comparison (CCQM-K5). The compound pp'-DDT is technically more challenging than that of pp'-DDE since it can decompose during the measurement procedure. Consequently the success of this key comparison, combined with that of CCQM-K5 demonstrates a broad measurement capability by NMIs for organochlorine compounds in the environment. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the Mutual Recognition Arrangement (MRA).

  18. Middle Leadership: A Key Role of Numeracy Reform

    ERIC Educational Resources Information Center

    Jorgensen, Robyn

    2016-01-01

    This paper reports on a large national project that explored successful numeracy practices in remote and very remote schools. While there have been a number of significant findings, the middle leader has been identified as a key role in the development of successful numeracy/mathematics practices in schools. The middle leader plays a critical role…

  19. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  20. Is an Appreciation of Isomerism the Key to Unlocking the Mysteries of the Cardiac Findings in Heterotaxy?

    PubMed

    Anderson, Robert H; Spicer, Diane E; Loomba, Rohit

    2018-02-06

    Pediatric cardiologists treating patients with severe congenital cardiac defects define "visceral heterotaxy" on the basis of isomerism of the atrial appendages. The isomeric features represent an obvious manifestation of disruption of left-right asymmetry during embryonic development. Thus, there are two subsets of individuals within the overall syndrome, with features of either right or left isomerism. Within the heart, it is only the atrial appendages that are truly isomeric. The remainder of the cardiac components shows variable morphology, as does the arrangement of the remaining body organs. Order is provided in this potentially chaotic arrangement simply by describing the specific features of each of the systems. These features as defined by clinicians, however, seem less well recognized by those investigating the developmental origins of the disruption of symmetry. Developmental biologists place much greater emphasis on ventricular looping. Although the direction of the loop can certainly be interpreted as representing an example of asymmetry, it is not comparable to the isomeric features that underscore the clinical syndromes. This is because, thus far, there is no evidence of ventricular isomerism, with the ventricles distinguished one from the other on the basis of their disparate anatomical features. In similar fashion, some consider transposition to represent abnormal lateralization, but again, clinical diagnosis depends on recognition of the lateralized features. In this review, therefore, we discuss the key questions that currently underscore the mismatch in the approaches to "lateralization" as taken by clinicians and developmental biologists.

  1. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 1999.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This booklet presents an overview of the findings pertaining to eighth, tenth, and twelfth grade students from the 1999 Monitoring the Future Study. This overview focuses on recent trends in the use of various licit and illicit drugs. It also examines trends in the levels of perceived risk and personal disapproval associated with each drug, which…

  2. A Survey of American Voter Attitudes Concerning Child Care Services: Highlights and Key Findings.

    ERIC Educational Resources Information Center

    Marttila & Kiley, Inc., Boston, MA.

    A national telephone survey of a representative sample of 901 voters was conducted to measure voter attitudes toward child care and, in particular, the Act for Better Child Care Services (ABC). The survey also explored attitudes toward parental leave. Findings indicated that: (1) a majority of Americans think of child care as an urgent need and…

  3. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  4. Seven Keys to Successful Study.

    ERIC Educational Resources Information Center

    Edwards, Peter

    Written for secondary, technical, and technical and further education (TAFE) students, this book aims to make learning easier and more enjoyable by showing students how to use a series of basic study skills called "keys." The book offers an explanation, examples, graphic illustrations, and activities for each skill. Chapters include: (1)…

  5. Introductory Biology Students’ Use of Enhanced Answer Keys and Reflection Questions to Engage in Metacognition and Enhance Understanding

    PubMed Central

    Sabel, Jaime L.; Dauer, Joseph T.; Forbes, Cory T.

    2017-01-01

    Providing feedback to students as they learn to integrate individual concepts into complex systems is an important way to help them to develop robust understanding, but it is challenging in large, undergraduate classes for instructors to provide feedback that is frequent and directed enough to help individual students. Various scaffolds can be used to help students engage in self-regulated learning and generate internal feedback to improve their learning. This study examined the use of enhanced answer keys with added reflection questions and instruction as scaffolds for engaging undergraduate students in self-regulated learning within an introductory biology course. Study findings show that both the enhanced answer keys and reflection questions helped students to engage in metacognition and develop greater understanding of biological concepts. Further, students who received additional instruction on the use of the scaffolds changed how they used them and, by the end of the semester, were using the scaffolds in significantly different ways and showed significantly higher learning gains than students who did not receive the instruction. These findings provide evidence for the benefit of designing scaffolds within biology courses that will support students in engaging in metacognition and enhancing their understanding of biological concepts. PMID:28645893

  6. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  7. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this presentation is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  8. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2015-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  9. Key Findings of the AMAP 2015 Assessment on Black Carbon and Tropospheric Ozone as Arctic Climate Forcers

    NASA Astrophysics Data System (ADS)

    Quinn, P.

    2015-12-01

    emission from each sector and region) were also calculated. Key findings from the 2015 assessment will be presented.

  10. Using findings in multimedia learning to inform technology-based behavioral health interventions.

    PubMed

    Aronson, Ian David; Marsch, Lisa A; Acosta, Michelle C

    2013-09-01

    Clinicians and researchers are increasingly using technology-based behavioral health interventions to improve intervention effectiveness and to reach underserved populations. However, these interventions are rarely informed by evidence-based findings of how technology can be optimized to promote acquisition of key skills and information. At the same time, experts in multimedia learning generally do not apply their findings to health education or conduct research in clinical contexts. This paper presents an overview of some key aspects of multimedia learning research that may allow those developing health interventions to apply informational technology with the same rigor as behavioral science content. We synthesized empirical multimedia learning literature from 1992 to 2011. We identified key findings and suggested a framework for integrating technology with educational and behavioral science theory. A scientific, evidence-driven approach to developing technology-based interventions can yield greater effectiveness, improved fidelity, increased outcomes, and better client service.

  11. 6. NORTH FRONT DETAIL, SHOWING AUTO ENTRANCE. VIEW TO SOUTHEAST. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. NORTH FRONT DETAIL, SHOWING AUTO ENTRANCE. VIEW TO SOUTHEAST. - Commercial & Industrial Buildings, Key City Electric Street Railroad, Powerhouse & Storage Barn, Eighth & Washington Streets, Dubuque, Dubuque County, IA

  12. Public-key encryption with chaos.

    PubMed

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  13. Public-key encryption with chaos

    NASA Astrophysics Data System (ADS)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  14. An absolute measure for a key currency

    NASA Astrophysics Data System (ADS)

    Oya, Shunsuke; Aihara, Kazuyuki; Hirata, Yoshito

    It is generally considered that the US dollar and the euro are the key currencies in the world and in Europe, respectively. However, there is no absolute general measure for a key currency. Here, we investigate the 24-hour periodicity of foreign exchange markets using a recurrence plot, and define an absolute measure for a key currency based on the strength of the periodicity. Moreover, we analyze the time evolution of this measure. The results show that the credibility of the US dollar has not decreased significantly since the Lehman shock, when the Lehman Brothers bankrupted and influenced the economic markets, and has increased even relatively better than that of the euro and that of the Japanese yen.

  15. IPCC Climate Change 2013: Mitigation of Climate Change - Key Findings and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Sokona, Youba

    2014-05-01

    The Working Group III contribution to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, Mitigation of Climate Change, examines the results of scientific research about mitigation, with special attention on how knowledge has evolved since the Fourth Assessment Report published in 2007. Throughout, the focus is on the implications of its findings for policy, without being prescriptive about the particular policies that governments and other important participants in the policy process should adopt. The report begins with a framing of important concepts and methods that help to contextualize the findings presented throughout the assessment. The valuation of risks and uncertainties, ethical concepts and the context of sustainable development and equity are among the guiding principles for the assessment of mitigation strategies. The report highlights past trends in stocks and flows of greenhouse gases and the factors that drive emissions at global, regional, and sectoral scales including economic growth, technology or population changes. It provides analyses of the technological, economic and institutional requirements of long-term mitigation scenarios and details on mitigation measures and policies that are applied in different economic sectors and human settlements. It then discusses interactions of mitigation policies and different policy instrument types at national, regional and global governance levels and between economic sectors, The Working Group III report comprises 16 chapters and in assembling this assessment authors were guided by the principles of the IPCC mandate: to be explicit about mitigation options, to be explicit about their costs and about their risks and opportunities vis-à-vis other development priorities, and to be explicit about the underlying criteria, concepts, and methods for evaluating alternative policies.

  16. Mind the Gap: The Effect of Keyboard Key Gap and Pitch on Typing Speed, Accuracy, and Usability, Part 3.

    PubMed

    Madison, Heather; Pereira, Anna; Korshøj, Mette; Taylor, Laura; Barr, Alan; Rempel, David

    2015-11-01

    The aim of this study was to evaluate the effects of key gap (distance between edges of keys) on computer keyboards on typing speed, percentage error, preference, and usability. In Parts 1 and 2 of this series, a small key pitch (center-to-center distance between keys) was found to reduce productivity and usability, but the findings were confounded by gap. In this study, key gap was varied while holding key pitch constant. Participants (N = 25) typed on six keyboards, which differed in gap between keys (1, 3, or 5 mm) and pitch (16 or 17 mm; distance between centers of keys), while typing speed, accuracy, usability, and preference were measured. There was no statistical interaction between gap and pitch. Accuracy was better for keyboards with a gap of 5 mm compared to a 1-mm gap (p = .04). Net typing speed (p = .02), accuracy (p = .002), and most usability measures were better for keyboards with a pitch of 17 mm compared to a 16-mm pitch. The study findings support keyboard designs with a gap between keys of 5 mm over 1 mm and a key pitch of 17 mm over 16 mm. These findings may influence keyboard standards and design, especially the design of small keyboards used with portable devices, such as tablets and laptops. © 2015, Human Factors and Ergonomics Society.

  17. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    NASA Astrophysics Data System (ADS)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  18. An overview of key silvicultural information for ponderosa pine

    Treesearch

    John Fiske; John Tappeiner

    2005-01-01

    This paper provides a selected list of classical references for the important silvicultural findings for ponderosa pine, and categorizes some of the key current literature, as well as some of the older, lesser known but important literature. The paper also provides some history of scientific developments, and sources of further information.

  19. The Physics of Equestrian Show Jumping

    NASA Astrophysics Data System (ADS)

    Stinner, Art

    2014-04-01

    This article discusses the kinematics and dynamics of equestrian show jumping. For some time I have attended a series of show jumping events at Spruce Meadows, an international equestrian center near Calgary, Alberta, often referred to as the "Wimbledon of equestrian jumping." I have always had a desire to write an article such as this one, but when I searched the Internet for information and looked at YouTube presentations, I could only find simplistic references to Newton's laws and the conservation of mechanical energy principle. Nowhere could I find detailed calculations. On the other hand, there were several biomechanical articles with empirical reports of the results of kinetic and dynamic investigations of show jumping using high-speed digital cameras and force plates. They summarize their results in tables that give information about the motion of a horse jumping over high fences (1.40 m) and the magnitudes of the forces encountered when landing. However, they do not describe the physics of these results.

  20. Exploring key factors in online shopping with a hybrid model.

    PubMed

    Chen, Hsiao-Ming; Wu, Chia-Huei; Tsai, Sang-Bing; Yu, Jian; Wang, Jiangtao; Zheng, Yuxiang

    2016-01-01

    Nowadays, the web increasingly influences retail sales. An in-depth analysis of consumer decision-making in the context of e-business has become an important issue for internet vendors. However, factors affecting e-business are complicated and intertwined. To stimulate online sales, understanding key influential factors and causal relationships among the factors is important. To gain more insights into this issue, this paper introduces a hybrid method, which combines the Decision Making Trial and Evaluation Laboratory (DEMATEL) with the analytic network process, called DANP method, to find out the driving factors that influence the online business mostly. By DEMATEL approach the causal graph showed that "online service" dimension has the highest degree of direct impact on other dimensions; thus, the internet vendor is suggested to made strong efforts on service quality throughout the online shopping process. In addition, the study adopted DANP to measure the importance of key factors, among which "transaction security" proves to be the most important criterion. Hence, transaction security should be treated with top priority to boost the online businesses. From our study with DANP approach, the comprehensive information can be visually detected so that the decision makers can spotlight on the root causes to develop effectual actions.

  1. Iris recognition based on key image feature extraction.

    PubMed

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  2. 12. FIRST FLOOR CAR BARN SPACE, SHOWING COLUMNS AND ROOF ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. FIRST FLOOR CAR BARN SPACE, SHOWING COLUMNS AND ROOF STRUCTURE. VIEW TO SOUTHEAST. - Commercial & Industrial Buildings, Key City Electric Street Railroad, Powerhouse & Storage Barn, Eighth & Washington Streets, Dubuque, Dubuque County, IA

  3. Key Mites Commonly Associated With the Southern Pine Beetle

    Treesearch

    D.N. Kinn

    1976-01-01

    This paper outlines a method of preparing mites for microscopic examination and contains a simple key to the 15 species of mites commonly associated with the southern pine bark beetle. Research workers wanting to identify these mites and others curious about them, but untrained in acarology, should find little difficulty in making identifications.

  4. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  5. Rickettsial entry into host cells: finding the keys to unlock the doors

    USDA-ARS?s Scientific Manuscript database

    In this issue of Infection and Immunity, Ojogun et al. present compelling evidence that A. phagocytophilum outer membrane protein A (OmpA) is required for efficient entry into host myeloid cells. Using classical approaches, this team of investigators led by Jason Carlyon shows that entry can be bloc...

  6. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  7. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  8. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  9. Academic detailing can play a key role in assessing and implementing comparative effectiveness research findings.

    PubMed

    Fischer, Michael A; Avorn, Jerry

    2012-10-01

    Comparative effectiveness research evaluates the relative effectiveness, safety, and value of competing treatment options in clinically realistic settings. Such evaluations can be methodologically complex and difficult to interpret. There will be a growing need for critical evaluation of comparative effectiveness studies to assess the adequacy of their design and to put new information into a broader context. Equally important, this knowledge will have to be communicated to clinicians in a way that will actually change practice. We identify three challenges to effective dissemination of comparative effectiveness research findings: the difficulty of interpreting comparative effectiveness research data, the need for trusted sources of information, and the challenge of turning research results into clinical action. We suggest that academic detailing-direct outreach education that gives clinicians an accurate and unbiased synthesis of the best evidence for practice in a given clinical area-can translate comparative effectiveness research findings into actions that improve health care decision making and patient outcomes.

  10. Four Keys to a Smooth Flight.

    ERIC Educational Resources Information Center

    O'Neill, Jan; Conzemius, Anne

    2002-01-01

    Describes four key elements typically seen in schools that show continuous improvement in student results. Such schools' cultures are permeated by a shared focus on student learning, a strong culture of reflective practice, a collaborative environment where teachers see colleagues and parents as important partners, and an ever increasing…

  11. An investigation into the differentiating characteristics between car key burglars and regular burglars.

    PubMed

    Chapman, Rachel; Smith, Lisa L; Bond, John W

    2012-07-01

    Car key burglary has recently become the focus of empirical investigation as offenders, no longer able to steal vehicles without first obtaining their keys, resort to "burgling" target properties. Research surrounding the modus operandi of these offenses is beginning to emerge; however, little attention has been paid to investigating the characteristics of car key burglary offenders. Challenging the assumption that car key burglary offenses are perpetrated by regular burglars, this study aims to differentiate between offenders. Logistic regression analysis of 110 car key and 110 regular burglary offenders revealed that car key burglars are more likely to have previous vehicle theft convictions and are also more likely to be detected on information supplied to the police than regular burglars. Regular burglars are more likely to have previous shoplifting convictions. It was concluded that car key burglars are a distinct sample of offenders and the implications of these findings are discussed. © 2012 American Academy of Forensic Sciences.

  12. Exemplar Units of Work for English. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    These exemplar units of work for National Strategy Key Stage 3 English show how medium and short-term planning can be based on the Key Stage 3 Framework objectives and support the implementation of Curriculum 2000. The Key Stage 3 English strand introduces pupils to more specialist study of language and literature and supports the study of…

  13. We're Playing "Jeremy Kyle"! Television Talk Shows in the Playground

    ERIC Educational Resources Information Center

    Marsh, Jackie; Bishop, Julia

    2014-01-01

    This paper focuses on an episode of play in a primary school playground in England, which featured a group of children re-enacting elements of the television talk show "The Jeremy Kyle Show". The episode is analysed in the light of work that has identified the key elements of the talk show genre and the children's play is examined in…

  14. Key Themes in Mobile Learning: Prospects for Learner-Generated Learning through AR and VR

    ERIC Educational Resources Information Center

    Aguayo, Claudio; Cochrane, Thomas; Narayan, Vickel

    2017-01-01

    This paper summarises the findings from a literature review in mobile learning, developed as part of a 2-year six-institution project in New Zealand. Through the development of a key themes codebook, we address selected key themes with respect to their relevance to learner-generated learning through emerging technologies, with attention to mobile…

  15. Long-distance practical quantum key distribution by entanglement swapping.

    PubMed

    Scherer, Artur; Sanders, Barry C; Tittel, Wolfgang

    2011-02-14

    We develop a model for practical, entanglement-based long-distance quantum key distribution employing entanglement swapping as a key building block. Relying only on existing off-the-shelf technology, we show how to optimize resources so as to maximize secret key distribution rates. The tools comprise lossy transmission links, such as telecom optical fibers or free space, parametric down-conversion sources of entangled photon pairs, and threshold detectors that are inefficient and have dark counts. Our analysis provides the optimal trade-off between detector efficiency and dark counts, which are usually competing, as well as the optimal source brightness that maximizes the secret key rate for specified distances (i.e. loss) between sender and receiver.

  16. Measurement errors in voice-key naming latency for Hiragana.

    PubMed

    Yamada, Jun; Tamaoka, Katsuo

    2003-12-01

    This study makes explicit the limitations and possibilities of voice-key naming latency research on single hiragana symbols (a Japanese syllabic script) by examining three sets of voice-key naming data against Sakuma, Fushimi, and Tatsumi's 1997 speech-analyzer voice-waveform data. Analysis showed that voice-key measurement errors can be substantial in standard procedures as they may conceal the true effects of significant variables involved in hiragana-naming behavior. While one can avoid voice-key measurement errors to some extent by applying Sakuma, et al.'s deltas and by excluding initial phonemes which induce measurement errors, such errors may be ignored when test items are words and other higher-level linguistic materials.

  17. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  18. Measurement-device-independent entanglement-based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Liu, Hongwei; Yin, Zhenqiang; Li, Zuohan; Lian, Shibin; Du, Yungang; Wu, Lingan

    2016-05-01

    We present a quantum key distribution protocol in a model in which the legitimate users gather statistics as in the measurement-device-independent entanglement witness to certify the sources and the measurement devices. We show that the task of measurement-device-independent quantum communication can be accomplished based on monogamy of entanglement, and it is fairly loss tolerate including source and detector flaws. We derive a tight bound for collective attacks on the Holevo information between the authorized parties and the eavesdropper. Then with this bound, the final secret key rate with the source flaws can be obtained. The results show that long-distance quantum cryptography over 144 km can be made secure using only standard threshold detectors.

  19. PISA 2015: Findings and Some Implications for UK Science Education

    ERIC Educational Resources Information Center

    Osborne, Jonathan; Millar, Robin

    2017-01-01

    This article provides an overview of the main findings for the countries of the UK from the Organisation for Economic Co-operation and Development (OECD) Programme for International Student Assessment (PISA) in 2015, where science was the major focus. The nature of the tests, the key findings and how they might be interpreted are discussed--in…

  20. Religion, finding interests in life, and change in self-esteem during late life.

    PubMed

    Krause, Neal; Hayward, R David

    2014-05-01

    Research indicates that greater involvement in activities is essential for successful aging. The purpose of the current study is to examine a construct that motivates involvement in activities-finding interests in life. In the process, we also show how involvement in religion may help promote interests. In order to examine these issues, a conceptual model is tested that contains the following core hypotheses: (1) older people who go to church more often will be more likely to have stronger God-mediated control beliefs (i.e., the belief that God works together with people to resolve problems and reach desired goals); (2) older adults with a stronger sense of God-mediated control will be more likely to find things in life that are interesting; and (3) older individuals with more interests experience a greater sense of self-worth over time. Findings from a nationwide survey provide support for the key relationships described above. © The Author(s) 2013.

  1. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  2. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  3. Preliminary Findings Show Maternal Hypothyroidism May Contribute to Abnormal Cortical Morphology in Offspring

    PubMed Central

    Lischinsky, Julieta E.; Skocic, Jovanka; Clairman, Hayyah; Rovet, Joanne

    2016-01-01

    In rodents, insufficient thyroid hormone (TH) gestationally has adverse effects on cerebral cortex development. Comparable studies of humans examining how TH insufficiency affects cortical morphology are limited to children with congenital hypothyroidism or offspring of hypothyroxinemic women; effects on cortex of children born to women with clinically diagnosed hypothyroidism are not known. We studied archived MRI scans from 22 children aged 10–12 years born to women treated for preexisting or de novo hypothyroidism in pregnancy (HYPO) and 24 similar age and sex controls from euthyroid women. FreeSurfer Image Analysis Suite software was used to measure cortical thickness (CT) and a vertex-based approach served to compare HYPO versus control groups and Severe versus Mild HYPO subgroups as well as to perform regression analyses examining effects of trimester-specific maternal TSH on CT. Results showed that relative to controls, HYPO had multiple regions of both cortical thinning and thickening, which differed for left and right hemispheres. In HYPO, thinning was confined to medial and mid-lateral regions of each hemisphere and thickening to superior regions (primarily frontal) of the left hemisphere and inferior regions (particularly occipital and temporal) of the right. The Severe HYPO subgroup showed more thinning than Mild in frontal and temporal regions and more thickening in bilateral posterior and frontal regions. Maternal TSH values predicted degree of thinning and thickening within multiple brain regions, with the pattern and direction of correlations differing by trimester. Notably, some correlations remained when cases born to women with severe hypothyroidism were removed from the analyses, suggesting that mild variations of maternal TH may permanently affect offspring cortex. We conclude that maternal hypothyroidism during pregnancy has long-lasting manifestations on the cortical morphology of their offspring with specific effects reflecting both

  4. Male genital leiomyomas showing androgen receptor expression.

    PubMed

    Suárez-Peñaranda, José Manuel; Vieites, Begoña; Evgenyeva, Elena; Vázquez-Veiga, Hugo; Forteza, Jeronimo

    2007-12-01

    Genital leiomyoma in men include those superficial leiomyomas arising in the scrotum and the areola. They are unusual neoplasms: few cases have been reported in the literature and they usually escape clinical diagnosis. Three cases of male genital leiomyomas are reported: two in the scrotum and one in the areola. They were all conservatively excised and the behaviour was completely benign in all cases. Histopathological examination showed the typical findings of superficial leiomyomas, with some minor differences between cases arising in the scrotum and those from the areola. Immunohistochemical findings not only confirmed the smooth muscle nature of all cases but also showed unequivocal immunostaining for androgen receptors in the leiomyomas from the scrotum. Immunostaining for androgen receptors in scrotal leiomyomas is, as far as we are aware, a previously unknown characteristic of male genital leiomyomas. This finding supports the role of steroid hormones in the growth of genital leiomyomas, similar to leiomyomas found in other locations.

  5. How to Improve Integrated Care for People with Chronic Conditions: Key Findings from EU FP-7 Project INTEGRATE and Beyond.

    PubMed

    Borgermans, Liesbeth; Marchal, Yannick; Busetto, Loraine; Kalseth, Jorid; Kasteng, Frida; Suija, Kadri; Oona, Marje; Tigova, Olena; Rösenmuller, Magda; Devroey, Dirk

    2017-09-25

    Political and public health leaders increasingly recognize the need to take urgent action to address the problem of chronic diseases and multi-morbidity. European countries are facing unprecedented demand to find new ways to deliver care to improve patient-centredness and personalization, and to avoid unnecessary time in hospitals. People-centred and integrated care has become a central part of policy initiatives to improve the access, quality, continuity, effectiveness and sustainability of healthcare systems and are thus preconditions for the economic sustainability of the EU health and social care systems. This study presents an overview of lessons learned and critical success factors to policy making on integrated care based on findings from the EU FP-7 Project Integrate, a literature review, other EU projects with relevance to this study, a number of best practices on integrated care and our own experiences with research and policy making in integrated care at the national and international level. Seven lessons learned and critical success factors to policy making on integrated care were identified. The lessons learned and critical success factors to policy making on integrated care show that a comprehensive systems perspective should guide the development of integrated care towards better health practices, education, research and policy.

  6. How to Improve Integrated Care for People with Chronic Conditions: Key Findings from EU FP-7 Project INTEGRATE and Beyond

    PubMed Central

    Marchal, Yannick; Busetto, Loraine; Kalseth, Jorid; Kasteng, Frida; Suija, Kadri; Oona, Marje; Tigova, Olena; Rösenmuller, Magda; Devroey, Dirk

    2017-01-01

    Background: Political and public health leaders increasingly recognize the need to take urgent action to address the problem of chronic diseases and multi-morbidity. European countries are facing unprecedented demand to find new ways to deliver care to improve patient-centredness and personalization, and to avoid unnecessary time in hospitals. People-centred and integrated care has become a central part of policy initiatives to improve the access, quality, continuity, effectiveness and sustainability of healthcare systems and are thus preconditions for the economic sustainability of the EU health and social care systems. Purpose: This study presents an overview of lessons learned and critical success factors to policy making on integrated care based on findings from the EU FP-7 Project Integrate, a literature review, other EU projects with relevance to this study, a number of best practices on integrated care and our own experiences with research and policy making in integrated care at the national and international level. Results: Seven lessons learned and critical success factors to policy making on integrated care were identified. Conclusion: The lessons learned and critical success factors to policy making on integrated care show that a comprehensive systems perspective should guide the development of integrated care towards better health practices, education, research and policy. PMID:29588630

  7. Modulatory effects of naringin on hepatic key enzymes of carbohydrate metabolism in high-fat diet/low-dose streptozotocin-induced diabetes in rats.

    PubMed

    Pari, Leelavinothan; Chandramohan, Ramasamy

    2017-07-01

    We evaluated the modulatory effects of naringin on altered hepatic key enzymes of carbohydrate metabolism in high-fat diet/low-dose streptozotocin-induced diabetic rats. Oral treatment of naringin at a doses of 20, 40 and 80 mg/kg body weight to diabetic rats for 30 days resulted in a significant reduction in the levels of plasma glucose, blood glycosylated hemoglobin and increase in the levels of plasma insulin and blood hemoglobin. The altered activities of the hepatic key enzymes of carbohydrate metabolism such as hexokinase, glucose-6-phosphatase, fructose-1,6-bisphosphatase, glucose-6-phosphate dehydrogenase, glycogen synthase, glycogen phosphorylase and glycogen content of diabetic rats were significantly reverted to near normal levels by the treatment of naringin in a dose-dependent manner. Naringin at a dose of 80 mg/kg body weight showed the highest significant effect than the other two doses (20 and 40 mg/kg). Further, immunohistochemical observation of pancreas revealed that naringin-treated diabetic rats showed the increased number of insulin immunoreactive β-cells, which confirmed the biochemical findings. These findings revealed that naringin has potential antihyperglycemic activity in high-fat diet/low-dose streptozotocin-induced diabetic rats.

  8. Key challenges in the development and implementation of telehealth projects.

    PubMed

    Joseph, Victor; West, Robert M; Shickle, Darren; Keen, Justin; Clamp, Susan

    2011-01-01

    A literature review was carried out to identify the key challenges in the implementation of telehealth. This was followed by a survey of organisations in England involved in telehealth projects in order to understand the challenges they faced. Ten of the 13 health or local authority organisations surveyed had telehealth projects and three were at the planning stage. The analysis revealed seven key challenges facing implementers of telehealth in England. Based on the findings from the literature review and the survey, a model was constructed and a checklist drawn up. The model contained the following elements: identifying issues, needs and partners; producing a strategy; securing funding; implementing changes; and monitoring and evaluating a telehealth project. The checklist was validated by using key informants from the organisations originally surveyed. The checklist may be useful to guide telehealth development and implementation in the future.

  9. FRB121102 Bursts Show Detailed Spectrotemporal Structure

    NASA Astrophysics Data System (ADS)

    Hessels, Jason; Seymour, Andrew; Spitler, Laura; Michilli, Daniele; Lynch, Ryan S.; Gajjar, Vishal; Gourdji, Kelly

    2018-01-01

    FRB121102 is a sporadic emitter of millisecond-duration radio bursts, and is associated with a compact, persistent radio source in the primary star-forming region of a dwarf galaxy at ~ 1 Gpc. Key to understanding FRB121102's physical nature is using the observed burst properties to elucidate the underlying emission mechanism and its local environment. Here we present a sample of high signal-to-noise bursts that reveal hitherto unseen spectrotemporal features. We find that the bursts are often composed of sub-bursts with finite bandwidths, and characteristic frequencies that drift downwards during the burst. While this behavior could be an intrinsic feature of the burst emission mechanism, we also discuss an interpretation in terms of plasma lensing in the source environment, similar to the pulse echoes sometimes seen from the Crab pulsar.

  10. Insecurity of Detector-Device-Independent Quantum Key Distribution.

    PubMed

    Sajeed, Shihan; Huang, Anqi; Sun, Shihai; Xu, Feihu; Makarov, Vadim; Curty, Marcos

    2016-12-16

    Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to detector side channels, a major security loophole in quantum key distribution (QKD) implementations. In contrast to what has been claimed, however, we demonstrate that the security of DDI-QKD is not based on postselected entanglement, and we introduce various eavesdropping strategies that show that DDI-QKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit devices' imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus, free of malicious modifications, which is a key assumption in DDI-QKD.

  11. Turnaround Arts Initiative: Summary of Key Findings

    ERIC Educational Resources Information Center

    Stoelinga, Sara Ray; Silk, Yael; Reddy, Prateek; Rahman, Nadiv

    2015-01-01

    Turnaround Arts is a public-private partnership that aims to test the hypothesis that strategically implementing high-quality and integrated arts education programming in high-poverty, chronically underperforming schools adds significant value to school-wide reform. In 2014, the Turnaround Arts initiative completed an evaluation report covering…

  12. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  13. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  14. Quantum key distribution using continuous-variable non-Gaussian states

    NASA Astrophysics Data System (ADS)

    Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.

    2016-02-01

    In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.

  15. Efficient multiparty quantum key agreement with collective detection.

    PubMed

    Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie

    2017-11-10

    As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.

  16. A patient with Cotard syndrome who showed an improvement in single photon emission computed tomography findings after successful treatment with antidepressants.

    PubMed

    Hashioka, Sadayuki; Monji, Akira; Sasaki, Masayuki; Yoshida, Ichiro; Baba, Kanji; Tashiro, Nobutada

    2002-01-01

    We report the case of a presenile woman with Cotard syndrome, in the context of major depression, who showed an improvement in bilateral frontal hypoperfusion in a SPECT study using 99mTc-HMPAO after undergoing successful treatment with antidepressant therapy. We also retrospectively evaluated her clinical course based on the clinical stages. The symptoms of Cotard syndrome have been reported to change dramatically according to the stages. This peculiarity made it difficult for us to rapidly diagnose Cotard syndrome in the context of major depression, and not dementia, and thereby adequately treat the patient in our case. Differences in the reduced blood flow regions and a time lag from psychiatric remission were observed before the improvement in the SPECT findings when comparing our case with a previously reported case of Cotard syndrome. These differences suggest that the mechanism of Cotard syndrome is still not well understood at the present time.

  17. Locally acquired Dengue--Key West, Florida, 2009-2010.

    PubMed

    2010-05-21

    Dengue is the most common vector-borne viral disease in the world, causing an estimated 50-100 million infections and 25,000 deaths each year. During 1946-1980, no cases of dengue acquired in the continental United States were reported. Since 1980, a few locally acquired U.S. cases have been confirmed along the Texas-Mexico border, temporally associated with large outbreaks in neighboring Mexican cities. On September 1, 2009, a New York physician notified the Monroe County (Florida) Health Department (MCHD) and the Florida Department of Health (FDOH) of a suspected dengue case in a New York state resident whose only recent travel was to Key West, Florida. CDC confirmed the diagnosis, and a press release was issued to notify the public and Key West physicians of the potential risk for locally acquired dengue infections. In the next 2 weeks, two dengue infections in Key West residents without recent travel were reported and confirmed. Subsequently, enhanced and active surveillance identified 24 more Key West cases during 2009. On April 13, 2010, another Key West dengue case was reported to FDOH, bringing the total to 28. This report describes the first three dengue cases reported in 2009, briefly summarizes the 2010 case, highlights preliminary findings from the ongoing investigation, and outlines measures used to mitigate and control the outbreak. Clinicians should include dengue in the differential diagnosis of acute febrile illnesses in patients who live in or have recently traveled to subtropical areas of the United States or to the tropics.

  18. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  19. Key Odorants Regulate Food Attraction in Drosophila melanogaster

    PubMed Central

    Giang, Thomas; He, Jianzheng; Belaidi, Safaa; Scholz, Henrike

    2017-01-01

    In insects, the search for food is highly dependent on olfactory sensory input. Here, we investigated whether a single key odorant within an odor blend or the complexity of the odor blend influences the attraction of Drosophila melanogaster to a food source. A key odorant is defined as an odorant that elicits a difference in the behavioral response when two similar complex odor blends are offered. To validate that the observed behavioral responses were elicited by olfactory stimuli, we used olfactory co-receptor Orco mutants. We show that within a food odor blend, ethanol functions as a key odorant. In addition to ethanol other odorants might serve as key odorants at specific concentrations. However, not all odorants are key odorants. The intensity of the odor background influences the attractiveness of the key odorants. Increased complexity is only more attractive in a concentration-dependent range for single compounds in a blend. Orco is necessary to discriminate between two similarly attractive odorants when offered as single odorants and in food odor blends, supporting the importance of single odorant recognition in odor blends. These data strongly indicate that flies use more than one strategy to navigate to a food odor source, depending on the availability of key odorants in the odor blend and the alternative odor offered. PMID:28928642

  20. Key-lock colloids in a nematic liquid crystal.

    PubMed

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  1. Comparative Study of Human and Mouse Postsynaptic Proteomes Finds High Compositional Conservation and Abundance Differences for Key Synaptic Proteins

    PubMed Central

    Bayés, Àlex; Collins, Mark O.; Croning, Mike D. R.; van de Lagemaat, Louie N.; Choudhary, Jyoti S.; Grant, Seth G. N.

    2012-01-01

    Direct comparison of protein components from human and mouse excitatory synapses is important for determining the suitability of mice as models of human brain disease and to understand the evolution of the mammalian brain. The postsynaptic density is a highly complex set of proteins organized into molecular networks that play a central role in behavior and disease. We report the first direct comparison of the proteome of triplicate isolates of mouse and human cortical postsynaptic densities. The mouse postsynaptic density comprised 1556 proteins and the human one 1461. A large compositional overlap was observed; more than 70% of human postsynaptic density proteins were also observed in the mouse postsynaptic density. Quantitative analysis of postsynaptic density components in both species indicates a broadly similar profile of abundance but also shows that there is higher abundance variation between species than within species. Well known components of this synaptic structure are generally more abundant in the mouse postsynaptic density. Significant inter-species abundance differences exist in some families of key postsynaptic density proteins including glutamatergic neurotransmitter receptors and adaptor proteins. Furthermore, we have identified a closely interacting set of molecules enriched in the human postsynaptic density that could be involved in dendrite and spine structural plasticity. Understanding synapse proteome diversity within and between species will be important to further our understanding of brain complexity and disease. PMID:23071613

  2. Trojan horse attacks on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Du, Yungang; Wu, Lingan

    2016-04-01

    There has been much interest in ;counterfactual quantum cryptography; (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes.

  3. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  4. Key Technologies of Phone Storage Forensics Based on ARM Architecture

    NASA Astrophysics Data System (ADS)

    Zhang, Jianghan; Che, Shengbing

    2018-03-01

    Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.

  5. Defining disaster resilience: comparisons from key stakeholders involved in emergency management in Victoria, Australia.

    PubMed

    Goode, Natassia; Salmon, Paul M; Spencer, Caroline; McArdle, Dudley; Archer, Frank

    2017-01-01

    Three years after the introduction of the National Strategy for Disaster Resilience there remains no unanimously adopted definition of disaster resilience within Australia's emergency management sector. The aim of this study is to determine what the concept means to key stakeholders in the emergency management sector in the Australian State of Victoria, and how these conceptualisations overlap and diverge. Via an online survey, 113 people were asked how they define disaster resilience in their work in the emergency management sector. A data mining software tool, Leximancer, was employed to uncover the relationships between the definitions provided. The findings show that stakeholders see resilience as an 'ability' that encompasses emergency management activities and personal responsibility. However, the findings also highlight some possible points of conflict between stakeholders. In addition, the paper outlines and discusses a number of potential consequences for the implementation and the success of the resilience-based approach in Australia. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  6. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  7. Decoy-state quantum key distribution with biased basis choice

    PubMed Central

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states. PMID:23948999

  8. Decoy-state quantum key distribution with biased basis choice.

    PubMed

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states.

  9. Special Education Law: Illustrative Basics and Nuances of Key IDEA Components

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2015-01-01

    Intended as professional development for both new and experienced special educators, this article provides both the basic requirements and nuanced issues for foundational, successive, and overlapping key components under the Individuals With Disabilities Education Act (IDEA): (a) child find, (b) eligibility, and (c) free appropriate public…

  10. Psychometric properties of the Transitions from Foster Care Key Leader Survey.

    PubMed

    Salazar, Amy M; Brown, Eric C; Monahan, Kathryn C; Catalano, Richard F

    2016-04-01

    This study summarizes the development and piloting of the Transitions from Foster Care Key Leader Survey (TFC-KLS), an instrument designed to measure change in systems serving young people transitioning from foster care to adulthood. The Jim Casey Youth Opportunity Initiative's logic model was used as a basis for instrument development. The instrument was piloted with 119 key leaders in six communities. Seven of eight latent scales performed well in psychometric testing. The relationships among the 24 measures of system change were explored. A CFA testing overall model fit was satisfactory following slight modifications. Finally, a test of inter-rater reliability between two raters did not find reliable reporting of service availability in a supplemental portion of the survey. The findings were generally positive and supported the validity and utility of the instrument for measuring system change, following some adaptations. Implications for the field are discussed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Weighted Key Player Problem for Social Network Analysis

    DTIC Science & Technology

    2011-03-01

    the degree of the actor, the number of adjacent neighbors, to de - termine its centrality value. Introduced in its current form by Freeman, a node’s...identifying individuals who are key in a number of contexts. This chapter developed the WKPP-Pos measure that allows for the inclusion of actor and...Techniques were de - 44 veloped for using the p-median to find optimal solutions to the WKPP-Pos measure and for using hierarchical clustering as a

  12. Finding optimal vaccination strategies under parameter uncertainty using stochastic programming.

    PubMed

    Tanner, Matthew W; Sattenspiel, Lisa; Ntaimo, Lewis

    2008-10-01

    We present a stochastic programming framework for finding the optimal vaccination policy for controlling infectious disease epidemics under parameter uncertainty. Stochastic programming is a popular framework for including the effects of parameter uncertainty in a mathematical optimization model. The problem is initially formulated to find the minimum cost vaccination policy under a chance-constraint. The chance-constraint requires that the probability that R(*) show how to formulate the problem in two additional cases: (a) finding the optimal vaccination policy when vaccine supply is limited and (b) a cost-benefit scenario. The class of epidemic models for which this method can be used is described and we present an example formulation for which the resulting problem is a mixed-integer program. A short numerical example based on plausible parameter values and distributions is given to illustrate how including parameter uncertainty improves the robustness of the optimal strategy at the cost of higher coverage of the population. Results derived from a stochastic programming analysis can also help to guide decisions about how much effort and resources to focus on collecting data needed to provide better estimates of key parameters.

  13. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    NASA Astrophysics Data System (ADS)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  14. SUMMARY OF EMISSIONS MANAGEMENT STRATEGY POLICY RELEVANT FINDINGS FROM EPA'S PM SUPERSITES PROGRAM

    EPA Science Inventory

    EPA is developing an integrated synthesis of key scientific and policy-relevant findings from EPA's Particulate Matter Supersites Program. This presentation provides a summary of the program and the integrated synthesis. Since there are many examples of such findings, ranging f...

  15. Paediatric International Nursing Study: using person-centred key performance indicators to benchmark children's services.

    PubMed

    McCance, Tanya; Wilson, Val; Kornman, Kelly

    2016-07-01

    The aim of the Paediatric International Nursing Study was to explore the utility of key performance indicators in developing person-centred practice across a range of services provided to sick children. The objective addressed in this paper was evaluating the use of these indicators to benchmark services internationally. This study builds on primary research, which produced indicators that were considered novel both in terms of their positive orientation and use in generating data that privileges the patient voice. This study extends this research through wider testing on an international platform within paediatrics. The overall methodological approach was a realistic evaluation used to evaluate the implementation of the key performance indicators, which combined an integrated development and evaluation methodology. The study involved children's wards/hospitals in Australia (six sites across three states) and Europe (seven sites across four countries). Qualitative and quantitative methods were used during the implementation process, however, this paper reports the quantitative data only, which used survey, observations and documentary review. The findings demonstrate the quality of care being delivered to children and their families across different international sites. The benchmarking does, however, highlight some differences between paediatric and general hospitals, and between the different key performance indicators across all the sites. The findings support the use of the key performance indicators as a novel method to benchmark services internationally. Whilst the data collected across 20 paediatric sites suggest services are more similar than different, benchmarking illuminates variations that encourage a critical dialogue about what works and why. The transferability of the key performance indicators and measurement framework across different settings has significant implications for practice. The findings offer an approach to benchmarking and celebrating

  16. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less

  17. Intake of key chronic disease-related nutrients among baby boomers.

    PubMed

    King, Dana E; Xiang, Jun; Brown, Alexander

    2014-06-01

    The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease-related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease-related nutrients of the baby boomer generation with the previous generation of middle-aged adults. National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988-1994) and the NHANES for 2007-2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. The baby boomers' average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P < 0.001). The intake of vitamin C (105/89 g), water (1208/1001 g), and vegetables (199/229 g) was less than that of the previous generation (P < 0.001), and the dietary intake of fruit and fiber was unchanged. In regression analyses, dietary changes remained significant after controlling for age, race, sex, and socioeconomic status (all P < 0.01). The study findings document higher dietary intake of key chronic disease-related nutrients along with reduced vegetable intake among baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group.

  18. Intake of Key Chronic Disease–Related Nutrients among Baby Boomers

    PubMed Central

    King, Dana E.; Xiang, Jun; Brown, Alexander

    2014-01-01

    Objectives The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease–related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease–related nutrients of the baby boomer generation with the previous generation of middle-aged adults. Methods National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988–1994) and the NHANES for 2007–2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. Results The baby boomers’ average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P < 0.001). The intake of vitamin C (105/89 g), water (1208/1001 g), and vegetables (199/229 g) was less than that of the previous generation (P < 0.001), and the dietary intake of fruit and fiber was unchanged. In regression analyses, dietary changes remained significant after controlling for age, race, sex, and socioeconomic status (all P < 0.01). Conclusions The study findings document higher dietary intake of key chronic disease–related nutrients along with reduced vegetable intake among baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group. PMID:24945165

  19. Experimental quantum key distribution with source flaws

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  20. Webinar summary: Important findings for managers [Chapter 2

    Treesearch

    Claudia Regan

    2014-01-01

    This chapter summarizes key findings and offers take-home messages of the Future Forest Webinar Series with regard to resource management planning, analyses, and project design. In the wake of the mountain pine beetle (MPB) epidemic, resource managers are especially concerned with developing more resilient forests, providing for the sustainability of wildlife and fish...

  1. Pigeons (Columba livia) show change blindness in a color-change detection task.

    PubMed

    Herbranson, Walter T; Jeffers, Jacob S

    2017-07-01

    Change blindness is a phenomenon whereby changes to a stimulus are more likely go unnoticed under certain circumstances. Pigeons learned a change detection task, in which they observed sequential stimulus displays consisting of individual colors back-projected onto three response keys. The color of one response key changed during each sequence and pecks to the key that displayed the change were reinforced. Pigeons showed a change blindness effect, in that change detection accuracy was worse when there was an inter-stimulus interval interrupting the transition between consecutive stimulus displays. Birds successfully transferred to stimulus displays involving novel colors, indicating that pigeons learned a general change detection rule. Furthermore, analysis of responses to specific color combinations showed that pigeons could detect changes involving both spectral and non-spectral colors and that accuracy was better for changes involving greater differences in wavelength. These results build upon previous investigations of change blindness in both humans and pigeons and suggest that change blindness may be a general consequence of selective visual attention relevant to multiple species and stimulus dimensions.

  2. 15. MAP OF ALAMEDA SHIPYARD SHOWING PROPOSED ADDITIONAL FACILITIES. United ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. MAP OF ALAMEDA SHIPYARD SHOWING PROPOSED ADDITIONAL FACILITIES. United Engineering Company Ltd., Alameda Shipyard. A site map with all existing structures keyed to an identification legend. Also shows proposed new structures. No architect noted. Drawn by "J.B.H." (John Hudspeth?). Sheet 2. Plan no. 10,528. Scale one inch to 100 feet. November 12, 1943, last revised 1/18/44. pencil on vellum - United Engineering Company Shipyard, 2900 Main Street, Alameda, Alameda County, CA

  3. Setting objectives for managing Key deer

    USGS Publications Warehouse

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  4. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  5. Epigenetic reprogramming - is deamination key to active DNA demethylation?

    PubMed Central

    Teperek-Tkacz, Marta; Pasque, Vincent; Gentsch, George; Ferguson-Smith, Anne C.

    2013-01-01

    DNA demethylation processes are important for reproduction being central in epigenetic reprogramming during embryonic and germ cell development. While the enzymes methylating DNA have been known for many years, identification of factors capable of mediating active DNA demethylation has been challenging. Recent findings suggest that cytidine deaminases may be key players in active DNA demethylation. One of the most investigated candidates is AID (activation-induced cytidine deaminase) best known for its role in generating secondary antibody diversity in B cells. We evaluate evidence for cytidine deaminases in DNA demethylation pathways in vertebrates and discuss possible models for their targeting and activity regulation. These findings are also considered alongside alternative demethylation pathways involving hydroxymethylation. PMID:21911441

  6. Memory-assisted quantum key distribution resilient against multiple-excitation effects

    NASA Astrophysics Data System (ADS)

    Lo Piparo, Nicolò; Sinclair, Neil; Razavi, Mohsen

    2018-01-01

    Memory-assisted measurement-device-independent quantum key distribution (MA-MDI-QKD) has recently been proposed as a technique to improve the rate-versus-distance behavior of QKD systems by using existing, or nearly-achievable, quantum technologies. The promise is that MA-MDI-QKD would require less demanding quantum memories than the ones needed for probabilistic quantum repeaters. Nevertheless, early investigations suggest that, in order to beat the conventional memory-less QKD schemes, the quantum memories used in the MA-MDI-QKD protocols must have high bandwidth-storage products and short interaction times. Among different types of quantum memories, ensemble-based memories offer some of the required specifications, but they typically suffer from multiple excitation effects. To avoid the latter issue, in this paper, we propose two new variants of MA-MDI-QKD both relying on single-photon sources for entangling purposes. One is based on known techniques for entanglement distribution in quantum repeaters. This scheme turns out to offer no advantage even if one uses ideal single-photon sources. By finding the root cause of the problem, we then propose another setup, which can outperform single memory-less setups even if we allow for some imperfections in our single-photon sources. For such a scheme, we compare the key rate for different types of ensemble-based memories and show that certain classes of atomic ensembles can improve the rate-versus-distance behavior.

  7. Quantum key distribution with an entangled light emitting diode

    NASA Astrophysics Data System (ADS)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Farrer, I.; Ritchie, D. A.; Shields, A. J.

    2015-12-01

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.

  8. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  9. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  10. Changes in Land Cover and Terrestrial Biogeochemistry in the US: Key Findings from the Climate Science Special Report (CSSR)

    NASA Astrophysics Data System (ADS)

    Hibbard, K. A.; Hoffman, F. M.; Huntzinger, D. N.; West, T. O.

    2017-12-01

    The continual increase in annual average temperatures (1.0°C for the period 1901-2016 for the contiguous US), growing number of high temperature records, increasing intensity and frequency of heavy precipitation events in most parts of the US, and rising global mean sea level are among the key findings from the forthcoming Climate Science Special Report (CSSR) produced by the US Global Change Research Program (USGCRP). A chapter new to the climate science assessments directly addresses the feedbacks between climate change, land use and land cover change, and the carbon cycle. While the terrestrial biosphere is presently a net carbon sink, which has steadily increased since 1980, the future sign and magnitude of biosphere uptake cannot be determined because of uncertainties in the future trajectory of land cover and land use. Citing recent research, the chapter highlights that the combined effects of land use and land cover changes due to human activities account for 40% ± 16% of the human-caused global radiative forcing from 1850 to present. Moverover, plant community structure has already been altered by climate change and changes in the frequency and intensity of extreme events. Changes in temperature also have direct effects on the land surface as well as feedbacks to the atmosphere. For example, the number of consecutive frost-free days and the length of the growing season have increased across all regions in the contiguous US; however, overall plant productivity has been limited by biotic factors and seasonal limitations in water and nutrient availability. Within cities, the urban heat island (UHI) effect results in daytime temperatures 0.5°C-4.0°C higher and nighttime temperatures 1.0°C-2.5°C higher in urban areas than surrounding rural areas. We discuss terrestrial and biogeochemical forcings and feedbacks that can serve as critical evaluation and paramaterization datasets for Earth system modeling approaches with implications for management of

  11. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  12. Making the decoy-state measurement-device-independent quantum key distribution practically useful

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Heng; Yu, Zong-Wen; Wang, Xiang-Bin

    2016-04-01

    The relatively low key rate seems to be the major barrier to its practical use for the decoy-state measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.

  13. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  14. Key factors affecting dying children and their families.

    PubMed

    Hinds, Pamela S; Schum, Lisa; Baker, Justin N; Wolfe, Joanne

    2005-01-01

    The death of a child alters the life and health of others immediately and for the rest of their lives. How a child dies influences parents' abilities to continue their role functions as well as siblings' abilities to make and maintain friendships, and may be the basis for health care providers' decisions to exit direct care roles. Thus, facilitating a "good death"-an obvious care priority for all involved with the dying child-ought also to be a priority for the health of bereaved families and affected health care providers. Making this a care priority is complicated by a serious lack of data, as details of the last hours or weeks of a dying child or adolescent's life are largely unknown. The purpose of this paper is to identify key factors that affect the course of dying children and adolescents and that of their bereaved survivors, and to link those key factors to needed research that could produce clinically relevant findings to improve the care of these patients. Key factors described here include suffering (physical, psychological, and spiritual), communication, decision making, prognostic ambiguities, ability of the seriously ill child to give assent to research participation, and educational preparation of health care providers to give competent end-of-life care.

  15. TSLP: A Key Regulator of Asthma Pathogenesis.

    PubMed

    West, Erin E; Kashyap, Mohit; Leonard, Warren J

    2012-12-01

    Asthma is a complex disorder of the airways that is characterized by T helper type 2 (Th2) inflammation. The pleiotrophic cytokine TSLP has emerged as an important player involved in orchestrating the inflammation seen in asthma and other atopic diseases. Early research elucidated the role of TSLP on CD4 + T cells, and recent work has revealed the impact of TSLP on multiple cell types. Furthermore, TSLP plays an important role in the sequential progression of atopic dermatitis to asthma, clarifying the key role of TSLP in the pathogenesis of asthma, a finding with therapeutic implications.

  16. Training: Who Needs It? Research Report 1995. Key Issues for Providers.

    ERIC Educational Resources Information Center

    Hotel and Catering Training Co., London (England).

    Aimed at all those involved in the supply of training and vocational education for the hospitality industry, this report summarizes findings of the research report, "Training Who Needs It?" It draws out and explores in more detail key issues relating to the provision of training, support, and related initiatives for the industry. Section…

  17. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  18. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  19. Quality and Improvement in Scottish Education: Trends in Inspection Findings 2008-2011

    ERIC Educational Resources Information Center

    Education Scotland, 2012

    2012-01-01

    The findings of Education Scotland's sectoral programme of inspections, which sample the providers of education at every stage from the early years to adult learning, provide a key source of evidence on how effectively one of its core public services is performing. The last published summary of inspection findings was produced in 2009 when Her…

  20. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  1. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  2. Showing Our Strengths

    ERIC Educational Resources Information Center

    Jacobsen, Teresa L.

    2010-01-01

    Back when leadership academies were proliferating (a mere two years ago), succession planning was a key curriculum component. Solano County, California, like many other entities, was looking at impending retirements of top-level administrators, and so it began to groom prospective leaders. The County's administration designed an "emerging…

  3. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  4. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE PAGES

    Farmer, M. T.; Gerardi, C.; Bremer, N.; ...

    2016-10-31

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  5. Key findings and remaining questions in the areas of core-concrete interaction and debris coolability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farmer, M. T.; Gerardi, C.; Bremer, N.

    The reactor accidents at Fukushima-Dai-ichi have rekindled interest in late phase severe accident behavior involving reactor pressure vessel breach and discharge of molten core melt into the containment. Two technical issues of interest in this area include core-concrete interaction and the extent to which the core debris may be quenched and rendered coolable by top flooding. The OECD-sponsored Melt Coolability and Concrete Interaction (MCCI) programs at Argonne National Laboratory included the conduct of large scale reactor material experiments and associated analysis with the objectives of resolving the ex-vessel debris coolability issue, and to address remaining uncertainties related to long-term two-dimensionalmore » molten core-concrete interactions under both wet and dry cavity conditions. These tests provided a broad database to support accident management planning, as well as the development and validation of models and codes that can be used to extrapolate the experiment results to plant conditions. This paper provides a high level overview of the key experiment results obtained during the program. Finally, a discussion is also provided that describes technical gaps that remain in this area, several of which have arisen based on the sequence of events and operator actions during Fukushima.« less

  6. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    NASA Astrophysics Data System (ADS)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  7. Stress in hospital medicine: a problem for key hospital staff.

    PubMed

    Allen, I

    2001-08-01

    Many factors which contribute to stress in the workplace apply to both consultants and ward sisters. Both groups find that their roles have become more complex while they have increasingly lost control of their own clinical and professional territory in a managerial culture. The erosion of the key relationship between consultants and ward sisters is of concern and the need for teamworking is insufficiently recognized.

  8. Introductory Biology Students' Use of Enhanced Answer Keys and Reflection Questions to Engage in Metacognition and Enhance Understanding.

    PubMed

    Sabel, Jaime L; Dauer, Joseph T; Forbes, Cory T

    2017-01-01

    Providing feedback to students as they learn to integrate individual concepts into complex systems is an important way to help them to develop robust understanding, but it is challenging in large, undergraduate classes for instructors to provide feedback that is frequent and directed enough to help individual students. Various scaffolds can be used to help students engage in self-regulated learning and generate internal feedback to improve their learning. This study examined the use of enhanced answer keys with added reflection questions and instruction as scaffolds for engaging undergraduate students in self-regulated learning within an introductory biology course. Study findings show that both the enhanced answer keys and reflection questions helped students to engage in metacognition and develop greater understanding of biological concepts. Further, students who received additional instruction on the use of the scaffolds changed how they used them and, by the end of the semester, were using the scaffolds in significantly different ways and showed significantly higher learning gains than students who did not receive the instruction. These findings provide evidence for the benefit of designing scaffolds within biology courses that will support students in engaging in metacognition and enhancing their understanding of biological concepts. © 2017 J. L. Sabel et al. CBE—Life Sciences Education © 2017 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  9. Quantum key distribution with an entangled light emitting diode

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurementsmore » also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.« less

  10. Eavesdropping on counterfactual quantum key distribution with finite resources

    NASA Astrophysics Data System (ADS)

    Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng

    2014-08-01

    A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.

  11. Fundamental rate-loss tradeoff for optical quantum key distribution.

    PubMed

    Takeoka, Masahiro; Guha, Saikat; Wilde, Mark M

    2014-10-24

    Since 1984, various optical quantum key distribution (QKD) protocols have been proposed and examined. In all of them, the rate of secret key generation decays exponentially with distance. A natural and fundamental question is then whether there are yet-to-be discovered optical QKD protocols (without quantum repeaters) that could circumvent this rate-distance tradeoff. This paper provides a major step towards answering this question. Here we show that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use. Our result has major implications for understanding the secret key agreement capacity of optical channels-a long-standing open problem in optical quantum information theory-and strongly suggests a real need for quantum repeaters to perform QKD at high rates over long distances.

  12. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  13. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  14. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  15. The Children's Hearings Project Research Findings. A Summary Report.

    ERIC Educational Resources Information Center

    Merry, Sally E.; And Others

    Since 1980 the Children's Hearings Project (CHP) in Cambridge, Massachusetts, has offered status offenders and their families mediation as an alternative to the courts. This report describes CPH's origins and summarizes the results of an extensive research study conducted during the first 2 years of its operation. The key findings were: (1)…

  16. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  17. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  18. A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

    PubMed Central

    Moon, Soo Young; Cho, Tae Ho

    2014-01-01

    Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥10%. PMID:25136649

  19. Tight finite-key analysis for quantum cryptography

    PubMed Central

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-01

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies. PMID:22252558

  20. Tight finite-key analysis for quantum cryptography.

    PubMed

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  1. Upper bounds on secret-key agreement over lossy thermal bosonic channels

    NASA Astrophysics Data System (ADS)

    Kaur, Eneet; Wilde, Mark M.

    2017-12-01

    Upper bounds on the secret-key-agreement capacity of a quantum channel serve as a way to assess the performance of practical quantum-key-distribution protocols conducted over that channel. In particular, if a protocol employs a quantum repeater, achieving secret-key rates exceeding these upper bounds is evidence of having a working quantum repeater. In this paper, we extend a recent advance [Liuzzo-Scorpo et al., Phys. Rev. Lett. 119, 120503 (2017), 10.1103/PhysRevLett.119.120503] in the theory of the teleportation simulation of single-mode phase-insensitive Gaussian channels such that it now applies to the relative entropy of entanglement measure. As a consequence of this extension, we find tighter upper bounds on the nonasymptotic secret-key-agreement capacity of the lossy thermal bosonic channel than were previously known. The lossy thermal bosonic channel serves as a more realistic model of communication than the pure-loss bosonic channel, because it can model the effects of eavesdropper tampering and imperfect detectors. An implication of our result is that the previously known upper bounds on the secret-key-agreement capacity of the thermal channel are too pessimistic for the practical finite-size regime in which the channel is used a finite number of times, and so it should now be somewhat easier to witness a working quantum repeater when using secret-key-agreement capacity upper bounds as a benchmark.

  2. Experimentally feasible quantum-key-distribution scheme using qubit-like qudits and its comparison with existing qubit- and qudit-based protocols

    NASA Astrophysics Data System (ADS)

    Chau, H. F.; Wang, Qinan; Wong, Cardythy

    2017-02-01

    Recently, Chau [Phys. Rev. A 92, 062324 (2015), 10.1103/PhysRevA.92.062324] introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a 2n-dimensional Hilbert space in the form (|i > ±|j >) /√{2 } with n ≥2 . For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtained in the absence of transmission error. Here we show that by modifying the basis announcement procedure, the same experimental setup can generate n bits of raw key for each qudit prepared and measured in the same basis in the noiseless situation. The reason is that in addition to the phase information, each qudit also carries information on the Hilbert subspace used. The additional (n -1 ) bits of raw key comes from a clever utilization of this extra piece of information. We prove the unconditional security of this modified protocol and compare its performance with other existing provably secure qubit- and qudit-based protocols on market in the one-way classical communication setting. Interestingly, we find that for the case of n =2 , the secret key rate of this modified protocol using nondegenerate random quantum code to perform one-way entanglement distillation is equal to that of the six-state scheme.

  3. Symmetric autocompensating quantum key distribution

    NASA Astrophysics Data System (ADS)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  4. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  5. Key to trematodes reported in waterfowl

    USGS Publications Warehouse

    McDonald, Malcolm Edwin

    1981-01-01

    The trematodes show the greatest variety of forms among the helminth parasites of waterfowl, including over half of all species reported; sometimes this group also includes the greatest part of the worms in a single bird. Over 500 species of trematodes have been reported in waterfowl. Almost all of these have been included in the present set of keys; it was not possible, however, to obtain the descriptions of a few forms (7 of 525).

  6. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

    PubMed

    Nellore, Vishwa; Xi, Sam; Dwyer, Chris

    2015-12-22

    Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.

  7. Forensic steganalysis: determining the stego key in spatial domain steganography

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica; Goljan, Miroslav; Soukal, David; Holotyak, Taras

    2005-03-01

    This paper is an extension of our work on stego key search for JPEG images published at EI SPIE in 2004. We provide a more general theoretical description of the methodology, apply our approach to the spatial domain, and add a method that determines the stego key from multiple images. We show that in the spatial domain the stego key search can be made significantly more efficient by working with the noise component of the image obtained using a denoising filter. The technique is tested on the LSB embedding paradigm and on a special case of embedding by noise adding (the +/-1 embedding). The stego key search can be performed for a wide class of steganographic techniques even for sizes of secret message well below those detectable using known methods. The proposed strategy may prove useful to forensic analysts and law enforcement.

  8. A Technique for Showing Causal Arguments in Accident Reports

    NASA Technical Reports Server (NTRS)

    Holloway, C. M.; Johnson, C. W.

    2005-01-01

    In the prototypical accident report, specific findings, particularly those related to causes and contributing factors, are usually written out explicitly and clearly. Also, the evidence upon which these findings are based is typically explained in detail. Often lacking, however, is any explicit discussion, description, or depiction of the arguments that connect the findings and the evidence. That is, the reports do not make clear why the investigators believe that the specific evidence they found necessarily leads to the particular findings they enumerated. This paper shows how graphical techniques can be used to depict relevant arguments supporting alternate positions on the causes of a complex road-traffic accident.

  9. Benefit-finding intervention for Alzheimer caregivers: conceptual framework, implementation issues, and preliminary efficacy.

    PubMed

    Cheng, Sheung-Tak; Lau, Rosanna W L; Mak, Emily P M; Ng, Natalie S S; Lam, Linda C W

    2014-12-01

    To describe an intervention promoting benefit-finding in Alzheimer caregivers, to discuss key issues in implementation and ways to resolve them, and to examine whether the intervention reduced burden and depression in a small randomized trial. Twenty-five caregivers were randomized into benefit-finding and psychoeducation groups. Both groups had eight weekly sessions. Outcome measures including role overload, Zarit Burden Interview, and Hamilton depression scale were collected at baseline and after treatment. Results were analyzed using analysis of covariance. Additionally, the challenges of implementing such interventions, some of which related to cultural issues, were analyzed qualitatively. Controlling for pretest, the benefit-finding group had lower depression than the psychoeducation group at post-test, despite the fact that some caregivers found benefit-finding challenging. The two groups did not differ on overload and burden. However, within-group analysis suggested that both groups showed significant reductions in overload from pretest to post-test. In addition, we discussed participants' difficulties in grasping the technique of thought modification for benefit-finding, recording such exercises at home, and sharing their thoughts and experiences in groups. We described measures undertaken in the main trial to overcome these issues. Cognitive approaches focusing on benefit-finding are feasible among Chinese caregivers, with preliminary evidence suggesting an effect on alleviating depression. © The Author 2014. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  10. SSeCloud: Using secret sharing scheme to secure keys

    NASA Astrophysics Data System (ADS)

    Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang

    2017-08-01

    With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.

  11. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  12. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  13. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  14. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  15. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  16. Boundary-layer processes: key findings from MATERHORN-X field campaigns

    NASA Astrophysics Data System (ADS)

    Di Sabatino, Silvana; Leo, Laura S.; Pardyjak, Eric R.; Fernando, Harindra JS

    2017-04-01

    structure, a feature which is commonly found in the first 50-100 m from the ground. The second part of the talk will discuss the interaction between an isolated hill and an approaching (undisturbed) stably-stratified flow with emphasis on the dividing streamline concept. The hill was located northwest of and close to the Granite Mountain, and was approximately 60m in height. A suite of (smoke) flow-visualization, remote sensing and in-situ measurement assets were deployed. At small Froude numbers (Fr<1), a stratified flow approaching the hill either possesses sufficient kinetic energy to pass over the summit or else flows around the sides, with the dividing streamline separating the two scenarios. By applying a logarithmic approach velocity profile to the well-known Sheppard's formula based on simple energetics, an explicit representation for the dividing streamline height was derived and a new set of parameters were identified to determine the dividing streamline height. The analysis shows that there will always be a dividing streamline for real atmospheric stratified shear flows. This has relevant implications for modelling air-flow and dispersion in mountainous regions.

  17. Parametric Human Body Reconstruction Based on Sparse Key Points.

    PubMed

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  18. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  19. Security of a semi-quantum protocol where reflections contribute to the secret key

    NASA Astrophysics Data System (ADS)

    Krawec, Walter O.

    2016-05-01

    In this paper, we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using X basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work, we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key; for error rates larger than this threshold, A and B should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.

  20. Russian Quality Assessment System in Education: Key Lessons

    ERIC Educational Resources Information Center

    Bolotov, V.; Valdman, I.; Kovaleva, G.; Pinskaya, M.

    2015-01-01

    This article examines key lessons learned by Russia while developing national assessment system in education. It shows that reforms are more likely to succeed backed with sustained political support, clearly defined goals or priorities, gradual introduction, and open discussion with stakeholders. [This article was translated by Lucy Gunderson.

  1. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    NASA Astrophysics Data System (ADS)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    Over the past few decades, Scleractinian coral populations in the Florida Keys have increasingly experienced mortality due to bleaching events as well as microbial mediated illnesses such as black band and white band disease. Such pathologies seem to be most correlated with elevated sea surface temperatures, increased UV exposures, and shifts in the microbial community living on the coral itself. Recent studies indicate that corals’ exposure to UV in the Florida Keys is primarily controlled by the concentration of CDOM (Chromophoric Dissolved Organic Matter) in the water column. Further, microbial community alterations may be linked to changes in concentration and chemical composition of the larger DOM (Dissolved Organic Matter) pool. Our research characterized the spatial and temporal properties of DOM in Florida Bay and along the Keys ecosystems using DOC analyses, in-situ water column optical measurements, and spectral analyses including absorbance and fluorescence measurements. We analyzed DOM characteristics along transects running from the mouth of the Shark River at the southwest base of the Everglades, through Florida Bay, and along near-shore Keys coastal waters. Two 12 hour time-series samplings were also performed at the Seven-Mile Bridge, the primary Florida Bay discharge channel to the lower Keys region. Photo-bleaching experiments showed that the chemical characteristics of the DOM pool are altered by exposure to solar radiation. Results also show that DOC (~0.8-5.8 mg C/L) and CDOM (~0.5-16.5 absorbance coefficient at 305nm) concentrations exhibit seasonal fluctuations in our study region. EEM analyses suggest seasonal transitions between primarily marine (summer) and terrestrial (winter) sources along the Keys. We are currently combining EEM-PARAFAC analysis with in-situ optical measurements to model changes in the spectral properties of DOM in the water column. Additionally, we are using stable δ13C isotopic analysis to further characterize DOM

  2. Severe weather as a spectacle: the Meteo-Show

    NASA Astrophysics Data System (ADS)

    Orbe, Iñaki; Gaztelumendi, Santiago

    2017-06-01

    In this work we focus on perhaps one of the worst journalist practice when dealing with severe weather, the Meteo-Show or the extended practice, especially in TV, for using weather and meteorology for spectacle. Journalism today has found weather information in a real goldmine in terms of audience due to the growing public interest in this matter. However, as it happens with other content, sensationalism and exaggeration have also reached weather information, primarily when episodes of adverse nature (snow, heavy rain, floods, etc.) are addressed. In this paper we look to identify the worst practices in weather communication through analysis of examples from real journalist work. We present some keys to understand this trend, highlighting the ingredients that are present in the worst Meteo-show.

  3. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  4. Intracellular GPCRs Play Key Roles in Synaptic Plasticity.

    PubMed

    Jong, Yuh-Jiin I; Harmon, Steven K; O'Malley, Karen L

    2018-02-16

    The trillions of synaptic connections within the human brain are shaped by experience and neuronal activity, both of which underlie synaptic plasticity and ultimately learning and memory. G protein-coupled receptors (GPCRs) play key roles in synaptic plasticity by strengthening or weakening synapses and/or shaping dendritic spines. While most studies of synaptic plasticity have focused on cell surface receptors and their downstream signaling partners, emerging data point to a critical new role for the very same receptors to signal from inside the cell. Intracellular receptors have been localized to the nucleus, endoplasmic reticulum, lysosome, and mitochondria. From these intracellular positions, such receptors may couple to different signaling systems, display unique desensitization patterns, and/or show distinct patterns of subcellular distribution. Intracellular GPCRs can be activated at the cell surface, endocytosed, and transported to an intracellular site or simply activated in situ by de novo ligand synthesis, diffusion of permeable ligands, or active transport of non-permeable ligands. Current findings reinforce the notion that intracellular GPCRs play a dynamic role in synaptic plasticity and learning and memory. As new intracellular GPCR roles are defined, the need to selectively tailor agonists and/or antagonists to both intracellular and cell surface receptors may lead to the development of more effective therapeutic tools.

  5. Problem Finding in Professional Learning Communities: A Learning Study Approach

    ERIC Educational Resources Information Center

    Tan, Yuen Sze Michelle; Caleon, Imelda Santos

    2016-01-01

    This study marries collaborative problem solving and learning study in understanding the onset of a cycle of teacher professional development process within school-based professional learning communities (PLCs). It aimed to explore how a PLC carried out collaborative problem finding--a key process involved in collaborative problem solving--that…

  6. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  7. Measurement-device-independent quantum key distribution.

    PubMed

    Lo, Hoi-Kwong; Curty, Marcos; Qi, Bing

    2012-03-30

    How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem--measurement-device-independent quantum key distribution (QKD). It not only removes all detector side channels, but also doubles the secure distance with conventional lasers. Our proposal can be implemented with standard optical components with low detection efficiency and highly lossy channels. In contrast to the previous solution of full device independent QKD, the realization of our idea does not require detectors of near unity detection efficiency in combination with a qubit amplifier (based on teleportation) or a quantum nondemolition measurement of the number of photons in a pulse. Furthermore, its key generation rate is many orders of magnitude higher than that based on full device independent QKD. The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors.

  8. Peak finding using biorthogonal wavelets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tan, C.Y.

    2000-02-01

    The authors show in this paper how they can find the peaks in the input data if the underlying signal is a sum of Lorentzians. In order to project the data into a space of Lorentzian like functions, they show explicitly the construction of scaling functions which look like Lorentzians. From this construction, they can calculate the biorthogonal filter coefficients for both the analysis and synthesis functions. They then compare their biorthogonal wavelets to the FBI (Federal Bureau of Investigations) wavelets when used for peak finding in noisy data. They will show that in this instance, their filters perform muchmore » better than the FBI wavelets.« less

  9. Dengue outbreak in Key West, Florida, USA, 2009.

    PubMed

    Radke, Elizabeth G; Gregory, Christopher J; Kintziger, Kristina W; Sauber-Schatz, Erin K; Hunsperger, Elizabeth A; Gallagher, Glen R; Barber, Jean M; Biggerstaff, Brad J; Stanek, Danielle R; Tomashek, Kay M; Blackmore, Carina G M

    2012-01-01

    After 3 dengue cases were acquired in Key West, Florida, we conducted a serosurvey to determine the scope of the outbreak. Thirteen residents showed recent infection (infection rate 5%; 90% CI 2%-8%), demonstrating the reemergence of dengue in Florida. Increased awareness of dengue among health care providers is needed.

  10. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  11. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  12. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  13. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  14. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  15. Gut Microbiota and Autism: Key Concepts and Findings

    ERIC Educational Resources Information Center

    Ding, Helen T.; Taur, Ying; Walkup, John T.

    2017-01-01

    There is an emerging body of evidence linking the intestinal microbiota with autism spectrum disorders (ASD). Studies have demonstrated differences in the composition of gut bacteria between children with ASD and controls. Certain intestinal bacteria have been observed in abundance and may be involved in the pathogenesis of ASD; including members…

  16. Finding the key - cell biology and science education.

    PubMed

    Miller, Kenneth R

    2010-12-01

    No international research community, cell biology included, can exist without an educational community to renew and replenish it. Unfortunately, cell biology researchers frequently regard their work as independent of the process of education and see little reason to reach out to science teachers. For cell biology to continue to prosper, I argue that researchers must support education in at least three ways. First, we must view education and research as part of a single scientific community. Second, we should take advantage of new technologies to connect the research laboratory to the classroom. Finally, we must take the initiative in defending the integrity of science teaching, particularly when education is under attack for political or religious reasons. Copyright © 2010 Elsevier Ltd. All rights reserved.

  17. Interactive simulations for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  18. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  19. Memetic algorithms for de novo motif-finding in biomedical sequences.

    PubMed

    Bi, Chengpeng

    2012-09-01

    The objectives of this study are to design and implement a new memetic algorithm for de novo motif discovery, which is then applied to detect important signals hidden in various biomedical molecular sequences. In this paper, memetic algorithms are developed and tested in de novo motif-finding problems. Several strategies in the algorithm design are employed that are to not only efficiently explore the multiple sequence local alignment space, but also effectively uncover the molecular signals. As a result, there are a number of key features in the implementation of the memetic motif-finding algorithm (MaMotif), including a chromosome replacement operator, a chromosome alteration-aware local search operator, a truncated local search strategy, and a stochastic operation of local search imposed on individual learning. To test the new algorithm, we compare MaMotif with a few of other similar algorithms using simulated and experimental data including genomic DNA, primary microRNA sequences (let-7 family), and transmembrane protein sequences. The new memetic motif-finding algorithm is successfully implemented in C++, and exhaustively tested with various simulated and real biological sequences. In the simulation, it shows that MaMotif is the most time-efficient algorithm compared with others, that is, it runs 2 times faster than the expectation maximization (EM) method and 16 times faster than the genetic algorithm-based EM hybrid. In both simulated and experimental testing, results show that the new algorithm is compared favorably or superior to other algorithms. Notably, MaMotif is able to successfully discover the transcription factors' binding sites in the chromatin immunoprecipitation followed by massively parallel sequencing (ChIP-Seq) data, correctly uncover the RNA splicing signals in gene expression, and precisely find the highly conserved helix motif in the transmembrane protein sequences, as well as rightly detect the palindromic segments in the primary micro

  20. The Impact of Legalizing and Regulating Weed: Issues with Study Design and Emerging Findings in the USA.

    PubMed

    Hunt, Priscillia E; Miles, Jeremy

    2017-01-01

    Evaluations of the impact of medical and recreational marijuana laws rely on quasi- or natural experiments in which researchers exploit changes in the law and attempt to determine the impact of these changes on outcomes. This chapter reviews three key issues of causal inference in observational studies with respect to estimating of impact of medical or recreational laws on marijuana use-intervention definition, outcome measurement, and random assignment of study participants. We show that studies tend to use the same statistical approach (differences-in-differences) and yet find differential impacts of medical marijuana laws on adult use in particular. We demonstrate that these seemingly conflicting findings may be due to different years of analysis, ages of the study sample in each year, and assignment of jurisdictions to the control group versus treatment group.

  1. Dengue Outbreak in Key West, Florida, USA, 2009

    PubMed Central

    Radke, Elizabeth G.; Gregory, Christopher J.; Kintziger, Kristina W.; Sauber-Schatz, Erin K.; Hunsperger, Elizabeth A.; Gallagher, Glen R.; Barber, Jean M.; Biggerstaff, Brad J.; Stanek, Danielle R.; Tomashek, Kay M.

    2012-01-01

    After 3 dengue cases were acquired in Key West, Florida, we conducted a serosurvey to determine the scope of the outbreak. Thirteen residents showed recent infection (infection rate 5%; 90% CI 2%–8%), demonstrating the reemergence of dengue in Florida. Increased awareness of dengue among health care providers is needed. PMID:22257471

  2. KEY COMPARISON: Final report on international key comparison CCQM-K53: Oxygen in nitrogen

    NASA Astrophysics Data System (ADS)

    Lee, Jeongsoon; Bok Lee, Jin; Moon, Dong Min; Seog Kim, Jin; van der Veen, Adriaan M. H.; Besley, Laurie; Heine, Hans-Joachim; Martin, Belén; Konopelko, L. A.; Kato, Kenji; Shimosaka, Takuya; Perez Castorena, Alejandro; Macé, Tatiana; Milton, Martin J. T.; Kelley, Mike; Guenther, Franklin; Botha, Angelique

    2010-01-01

    Gravimetry is used as the primary method for the preparation of primary standard gas mixtures in most national metrology institutes, and it requires the combined abilities of purity assessment, weighing technique and analytical skills. At the CCQM GAWG meeting in October 2005, it was agreed that KRISS should coordinate a key comparison, CCQM-K53, on the gravimetric preparation of gas, at a level of 100 µmol/mol of oxygen in nitrogen. KRISS compared the gravimetric value of each cylinder with an analytical instrument. A preparation for oxygen gas standard mixture requires particular care to be accurate, because oxygen is a major component of the atmosphere. Key issues for this comparison are related to (1) the gravimetric technique which needs at least two steps for dilution, (2) oxygen impurity in nitrogen, and (3) argon impurity in nitrogen. The key comparison reference value is obtained from the linear regression line (with origin) of a selected set of participants. The KCRV subset, except one, agree with each other. The standard deviation of the x-residuals of this group (which consists of NMIJ, VSL, NIST, NPL, BAM, KRISS and CENAM) is 0.056 µmol/mol and consistent with the uncertainties given to their standard mixtures. The standard deviation of the residuals of all participating laboratory is 0.182 µmol/mol. With respect to impurity analysis, overall argon amounts of the cylinders are in the region of about 3 µmol/mol however; four cylinders showed an argon amount fraction over 10 µmol/mol. Two of these are inconsistent with the KCRV subset. The explicit separation between two peaks of oxygen and argon in the GC chromatogram is essential to maintain analytical capability. Additionally oxygen impurity analysis in nitrogen is indispensable to ensure the preparative capability. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The

  3. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks

    NASA Astrophysics Data System (ADS)

    Ristenpart, Thomas; Yilek, Scott

    Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.

  4. Chicago Record Shows Duncan as Collaborator

    ERIC Educational Resources Information Center

    Aarons, Dakarai I.

    2009-01-01

    This article features American educator administrator Arne Duncan, whose seven-year tenure as the head of the 408,000-student Chicago school district has been marked by innovations to improve the quality of teachers and principals and a focus on basic reading and math skills. His low-key, collaborative style was a key to his success in Chicago,…

  5. State Legislative Leaders: Keys to Effective Legislation for Children and Families. A Report.

    ERIC Educational Resources Information Center

    State Legislative Leaders Foundation, Centerville, MA.

    In 1993, the State Legislative Leaders Foundation launched a research project, "State Legislative Leaders: Keys To Effective Legislation for Children and Families." This report documents the findings of the project involving 177 of the most influential Republican and Democratic state legislature leaders from all 50 states. For more than…

  6. Genetic relatedness of dengue viruses in Key West, Florida, USA, 2009-2010.

    PubMed

    Muñoz-Jordán, Jorge L; Santiago, Gilberto A; Margolis, Harold; Stark, Lillian

    2013-04-01

    Sequencing of dengue virus type 1 (DENV-1) strains isolated in Key West/Monroe County, Florida, indicate endemic transmission for >2 years of a distinct and predominant sublineage of the American-African genotype. DENV-1 strains isolated elsewhere in Florida grouped within a separate Central American lineage. Findings indicate endemic transmission of DENV into the continental United States.

  7. GC/MS-based metabolomic studies reveal key roles of glycine in regulating silk synthesis in silkworm, Bombyx mori.

    PubMed

    Chen, Quanmei; Liu, Xinyu; Zhao, Ping; Sun, Yanhui; Zhao, Xinjie; Xiong, Ying; Xu, Guowang; Xia, Qingyou

    2015-02-01

    Metabolic profiling of silkworm, especially the factors that affect silk synthesis at the metabolic level, is little known. Herein, metabolomic method based on gas chromatography-mass spectrometry was applied to identify key metabolic changes in silk synthesis deficient silkworms. Forty-six differential metabolites were identified in Nd group with the defect of silk synthesis. Significant changes in the levels of glycine and uric acid (up-regulation), carbohydrates and free fatty acids (down-regulation) were observed. The further metabolomics of silk synthesis deficient silkworms by decreasing silk proteins synthesis using knocking out fibroin heavy chain gene or extirpating silk glands operation showed that the changes of the metabolites were almost consistent with those of the Nd group. Furthermore, the increased silk yields by supplying more glycine or its related metabolite confirmed that glycine is a key metabolite to regulate silk synthesis. These findings provide important insights into the regulation between metabolic profiling and silk synthesis. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Spatial patch occupancy patterns of the Lower Keys marsh rabbit

    USGS Publications Warehouse

    Eaton, Mitchell J.; Hughes, Phillip T.; Nichols, James D.; Morkill, Anne; Anderson, Chad

    2011-01-01

    Reliable estimates of presence or absence of a species can provide substantial information on management questions related to distribution and habitat use but should incorporate the probability of detection to reduce bias. We surveyed for the endangered Lower Keys marsh rabbit (Sylvilagus palustris hefneri) in habitat patches on 5 Florida Key islands, USA, to estimate occupancy and detection probabilities. We derived detection probabilities using spatial replication of plots and evaluated hypotheses that patch location (coastal or interior) and patch size influence occupancy and detection. Results demonstrate that detection probability, given rabbits were present, was <0.5 and suggest that naïve estimates (i.e., estimates without consideration of imperfect detection) of patch occupancy are negatively biased. We found that patch size and location influenced probability of occupancy but not detection. Our findings will be used by Refuge managers to evaluate population trends of Lower Keys marsh rabbits from historical data and to guide management decisions for species recovery. The sampling and analytical methods we used may be useful for researchers and managers of other endangered lagomorphs and cryptic or fossorial animals occupying diverse habitats.

  9. Finite-size analysis of a continuous-variable quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grosshans, Frederic; Grangier, Philippe

    2010-06-15

    The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully securemore » secret keys in the finite-size scenario, over distances larger than 50 km.« less

  10. Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-06-01

    One crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In a typical QKD protocol the users have to sacrifice part of their raw data to estimate the parameters of the communication channel as, for example, the error rate. This introduces a trade-off between the secret key rate and the accuracy of parameter estimation in the finite-size regime. Here we show that continuous-variable QKD is not subject to this constraint as the whole raw keys can be used for both parameter estimation and secret key generation, without compromising the security. First, we show that this property holds for measurement-device-independent (MDI) protocols, as a consequence of the fact that in a MDI protocol the correlations between Alice and Bob are postselected by the measurement performed by an untrusted relay. This result is then extended beyond the MDI framework by exploiting the fact that MDI protocols can simulate device-dependent one-way QKD with arbitrarily high precision.

  11. Dissemination and Adoption of Comparative Effectiveness Research Findings When Findings Challenge Current Practices

    PubMed Central

    Schneider, Eric C.; Timbie, Justin W.; Fox, D. Steven; Van Busum, Kristin R.; Caloyeras, John P.

    2013-01-01

    Abstract Insufficient evidence regarding the effectiveness of medical treatments has been identified as a key source of inefficiency in the U.S. healthcare system. Variation in the use of diagnostic tests and treatments for patients with similar symptoms or conditions has been attributed to clinical uncertainty, since the published scientific evidence base does not provide adequate information to determine which treatments are most effective for patients with specific clinical needs. The federal government has made a dramatic investment in comparative effectiveness research (CER), with the expectation that CER will influence clinical practice and improve the efficiency of healthcare delivery. To do this, CER must provide information that supports fundamental changes in healthcare delivery and informs the choice of diagnostic and treatment strategies. This article summarizes findings from a qualitative analysis of the factors that impede the translation of CER into clinical practice and those that facilitate it. A case-study methodology is used to explore the extent to which these factors led to changes in clinical practice following five recent key CER studies. The enabling factors and barriers to translation for each study are discussed, the root causes for the failure of translation common to the studies are synthesized, and policy options that may optimize the impact of future CER—particularly CER funded through the American Recovery and Reinvestment Act of 2009—are proposed. PMID:28083277

  12. Models of HIV Preconception Care and Key Elements Influencing These Services: Findings from Healthcare Providers in Seven US Cities.

    PubMed

    Simone, Joanne; Hoyt, Mary Jo; Storm, Deborah S; Finocchario-Kessler, Sarah

    2018-06-05

    Preconception care can improve maternal and infant outcomes by identifying and modifying health risks before pregnancy and reducing unplanned pregnancies. However, information about how preconception care is provided to persons living with HIV (PLWH) is lacking. This study uses qualitative interviews with HIV care providers to describe current models of preconception care and explore factors influencing services. Single, anonymous, telephone interviews were conducted with 92 purposively selected HIV healthcare providers in Atlanta, Baltimore, Houston, Kansas City, Newark, Philadelphia, and San Francisco in 2013-2014. Content analysis and a grounded theory approach were used to analyze data. Participants included 57% physicians with a median of 10 [interquartile range (IQR) = 5-17] years HIV care experience; the mean proportion of female patients was 45%. Participants described Individual Provider (48.9%), Team-based (43.2%), and Referral-only (7.6%) models of preconception care, with 63% incorporating referrals outside their clinics. Thematic analysis identified five key elements influencing the provision of preconception care within and across models: consistency of delivery, knowledge and attitudes, clinic characteristics, coordination of care, and referral accessibility. Described models of preconception care reflect the complexity of our healthcare system. Qualitative analysis offers insights about how HIV clinicians provide preconception care and how key elements influence services. However, additional research about the models and outcomes of preconception care services are needed. To improve preconception care for PLWH, research and quality improvement initiatives must utilize available strengths and tackle existing barriers, identified by our study and others, to define and implement effective models of preconception care services.

  13. Drug Promiscuity in PDB: Protein Binding Site Similarity Is Key.

    PubMed

    Haupt, V Joachim; Daminelli, Simone; Schroeder, Michael

    2013-01-01

    Drug repositioning applies established drugs to new disease indications with increasing success. A pre-requisite for drug repurposing is drug promiscuity (polypharmacology) - a drug's ability to bind to several targets. There is a long standing debate on the reasons for drug promiscuity. Based on large compound screens, hydrophobicity and molecular weight have been suggested as key reasons. However, the results are sometimes contradictory and leave space for further analysis. Protein structures offer a structural dimension to explain promiscuity: Can a drug bind multiple targets because the drug is flexible or because the targets are structurally similar or even share similar binding sites? We present a systematic study of drug promiscuity based on structural data of PDB target proteins with a set of 164 promiscuous drugs. We show that there is no correlation between the degree of promiscuity and ligand properties such as hydrophobicity or molecular weight but a weak correlation to conformational flexibility. However, we do find a correlation between promiscuity and structural similarity as well as binding site similarity of protein targets. In particular, 71% of the drugs have at least two targets with similar binding sites. In order to overcome issues in detection of remotely similar binding sites, we employed a score for binding site similarity: LigandRMSD measures the similarity of the aligned ligands and uncovers remote local similarities in proteins. It can be applied to arbitrary structural binding site alignments. Three representative examples, namely the anti-cancer drug methotrexate, the natural product quercetin and the anti-diabetic drug acarbose are discussed in detail. Our findings suggest that global structural and binding site similarity play a more important role to explain the observed drug promiscuity in the PDB than physicochemical drug properties like hydrophobicity or molecular weight. Additionally, we find ligand flexibility to have a minor

  14. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  15. Advances in Clinical Cardiology 2016: A Summary of the Key Clinical Trials.

    PubMed

    Gray, Alastair; McQuillan, Conor; Menown, Ian B A

    2017-07-01

    The findings of many new cardiology clinical trials over the last year have been published or presented at major international meetings. This paper aims to describe and place in context a summary of the key clinical trials in cardiology presented between January and December 2016. The authors reviewed clinical trials presented at major cardiology conferences during 2016 including the American College of Cardiology (ACC), European Association for Percutaneous Cardiovascular Interventions (EuroPCR), European Society of Cardiology (ESC), European Association for the Study of Diabetes (EASD), Transcatheter Cardiovascular Therapeutics (TCT), and the American Heart Association (AHA). Selection criteria were trials with a broad relevance to the cardiology community and those with potential to change current practice. A total of 57 key cardiology clinical trials were identified for inclusion. Here we describe and place in clinical context the key findings of new data relating to interventional and structural cardiology including delayed stenting following primary angioplasty, contrast-induced nephropathy, management of jailed wires, optimal duration of dual antiplatelet therapy (DAPT), stenting vs bypass for left main disease, new generation stents (BioFreedom, Orsiro, Absorb), transcatheter aortic valve implantation (Edwards Sapien XT, transcatheter embolic protection), and closure devices (Watchman, Amplatzer). New preventative cardiology data include trials of bariatric surgery, empagliflozin, liraglutide, semaglutide, PCSK9 inhibitors (evolocumab and alirocumab), and inclisiran. Antiplatelet therapy trials include platelet function monitoring and ticagrelor vs clopidogrel for peripheral vascular disease. New data are also presented in fields of heart failure (sacubitril/valsartan, aliskiren, spironolactone), atrial fibrillation (rivaroxaban in patients undergoing coronary intervention, edoxaban in DC cardioversion), cardiac devices (implantable cardioverter

  16. Principles of visual key construction-with a visual identification key to the Fagaceae of the southeastern United States.

    PubMed

    Kirchoff, Bruce K; Leggett, Roxanne; Her, Va; Moua, Chue; Morrison, Jessica; Poole, Chamika

    2011-01-01

    Advances in digital imaging have made possible the creation of completely visual keys. By a visual key we mean a key based primarily on images, and that contains a minimal amount of text. Characters in visual keys are visually, not verbally defined. In this paper we create the first primarily visual key to a group of taxa, in this case the Fagaceae of the southeastern USA. We also modify our recently published set of best practices for image use in illustrated keys to make them applicable to visual keys. Photographs of the Fagaceae were obtained from internet and herbarium databases or were taken specifically for this project. The images were printed and then sorted into hierarchical groups. These hierarchical groups of images were used to create the 'couplets' in the key. A reciprocal process of key creation and testing was used to produce the final keys. Four keys were created, one for each of the parts-leaves, buds, fruits and bark. Species description pages consisting of multiple images were also created for each of the species in the key. Creation and testing of the key resulted in a modified list of best practices for image use visual keys. The inclusion of images into paper and electronic keys has greatly increased their ease of use. However, virtually all of these keys are still based upon verbally defined, atomistic characters. The creation of primarily visual keys allows us to overcome the well-known limitations of linguistic-based characters and create keys that are much easier to use, especially for botanical novices.

  17. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.

    PubMed

    Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara

    2003-08-29

    The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

  18. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-05-01

    We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.

  19. Final report of the APMP water flow key comparison: APMP.M.FF-K1

    NASA Astrophysics Data System (ADS)

    Lee, Kwang-Bock; Chun, Sejong; Terao, Yoshiya; Thai, Nguyen Hong; Tsair Yang, Cheng; Tao, Meng; Gutkin, Mikhail B.

    2011-01-01

    The key comparison, APMP.M.FF-K1, was undertaken by APMP/TCFF, the Technical Committee for Fluid Flow (TCFF) under the Asia Pacific Metrology Program (APMP). One objective of the key comparison was to demonstrate the degree of equivalence among six participating laboratories (KRISS, NMIJ, VMI, CMS, NIM and VNIIM) in water flow rate metrology by comparing the results with the key comparison reference value (KCRV) determined from the CCM.FF-K1 key comparison. The other objective of this key comparison was to provide supporting evidence for the calibration and measurement capabilities (CMCs), which had been declared by the participating laboratories during this key comparison. The Transfer Standard Package (TSP) was a Coriolis mass flowmeter, which had been used in the CCM.FF-K1 key comparison. Because the K-factors in the APMP.M.FF-K1 key comparison were slightly lower than the K-factors of the CCM.FF-K1 key comparison due to long-term drifts of the TSP, a correction value D was introduced. The value of D was given by a weighted sum between two link laboratories (NMIJ and KRISS), which participated in both the CCM.FF-K1 and the APMP.M.FF-K1 key comparisons. By this correction, the K-factors were laid between 12.004 and 12.017 at either low (Re = 254 000) or high (Re = 561 000) flow rates. Most of the calibration data were within expected uncertainty bounds. However, some data showed undulations, which gave large fluctuations of the metering factor at Re = 561 000. Calculation of degrees of equivalence showed that all the participating laboratories had deviations between -0.009 and 0.007 pulses/kg from the CCM.FF-K1 KCRV at either the low or the high flow rates. In case of En calculation, all the participating laboratories showed values less than 1, indicating that the corrected K-factors of all the laboratories were equivalent with the KCRV at both Re = 254 000 and 561 000. When the corrected K-factors from two participating laboratories were compared, all the

  20. Key Impact Factors on Dam Break Fatalities

    NASA Astrophysics Data System (ADS)

    Huang, D.; Yu, Z.; Song, Y.; Han, D.; Li, Y.

    2016-12-01

    Dam failures can lead to catastrophes on human society. However, there is a lack of research about dam break fatalities, especially on the key factors that affect fatalities. Based on the analysis of historical dam break cases, most studies have used the regression analysis to explore the correlation between those factors and fatalities, but without implementing optimization to find the dominating factors. In order to understand and reduce the risk of fatalities, this study has proposed a new method to select the impact factors on the fatality. It employs an improved ANN (Artificial Neural Network) combined with LOOCV (Leave-one-out cross-validation) and SFS (Stepwise Forward Selection) approach to explore the nonlinear relationship between impact factors and life losses. It not only considers the factors that have been widely used in the literature but also introduces new factors closely involved with fatalities. Dam break cases occurred in China from 1954 to 2013 are summarized, within which twenty-five cases are selected with a comprehensive coverage of geographic position and temporal variation. Twelve impact factors are taken into account as the inputs, i.e., severity of dam break flood (SF), population at risk (PR), public understanding of dam break (UB), warning time (TW), evacuation condition (EC), weather condition during dam break (WB), dam break mode (MB), water storage (SW), building vulnerability (VB), dam break time (TB), average distance from the affected area to the dam (DD) and preventive measures by government (PG).From those, three key factors of SF, MB and TB are chosen. The proposed method is able to extract the key factors, and the derived fatality model performs well in various types of dam break conditions.

  1. 7 CFR 29.98 - Appeal findings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Appeal findings. 29.98 Section 29.98 Agriculture... INSPECTION Regulations Appeal § 29.98 Appeal findings. Immediately after an appeal has been heard and the... prepared by the appeal inspector. Such certificate or sample shall show the finding of the appeal inspector...

  2. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2008-05-01

    The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

  3. Long distance measurement-device-independent quantum key distribution with entangled photon sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xu, Feihu; Qi, Bing; Liao, Zhongfa

    2013-08-05

    We present a feasible method that can make quantum key distribution (QKD), both ultra-long-distance and immune, to all attacks in the detection system. This method is called measurement-device-independent QKD (MDI-QKD) with entangled photon sources in the middle. By proposing a model and simulating a QKD experiment, we find that MDI-QKD with one entangled photon source can tolerate 77 dB loss (367 km standard fiber) in the asymptotic limit and 60 dB loss (286 km standard fiber) in the finite-key case with state-of-the-art detectors. Our general model can also be applied to other non-QKD experiments involving entanglement and Bell state measurements.

  4. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    NASA Astrophysics Data System (ADS)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  5. The effect of keyboard key spacing on typing speed, error, usability, and biomechanics, Part 2: Vertical spacing.

    PubMed

    Pereira, Anna; Hsieh, Chih-Ming; Laroche, Charles; Rempel, David

    2014-06-01

    The objective was to evaluate the effects of vertical key spacing on a conventional computer keyboard on typing speed, percentage error, usability, forearm muscle activity, and wrist posture for both females with small fingers and males with large fingers. Part I evaluated primarily horizontal key spacing and found that for male typists with large fingers, productivity and usability were similar for spacings of 17, 18, and 19 mm but were reduced for spacings of 16 mm. Few other key spacing studies are available, and the international standards that specify the spacing between keys on a keyboard have been mainly guided by design convention. Experienced female typists (n = 26) with small fingers (middle finger length < or = 7.71 cm or finger breadth of < or = 1.93 cm) and male typists (n = 26) with large fingers (middle finger length > or = 8.37 cm or finger breadth of > or = 2.24 cm) typed on five keyboards that differed primarily in vertical key spacing (17 x 18, 17 x 17, 17 x 16, 17 x 15.5, and 18 x 16 mm) while typing speed, error, fatigue, preference, forearm muscle activity, and wrist posture were recorded. Productivity and usability ratings were significantly worse for the keyboard with 15.5 mm vertical spacing compared to the other keyboards for both groups.There were few significant differences on usability ratings between the other keyboards. Reducing vertical key spacing,from 18 to 17 to 16 mm, had no significant effect on productivity or usability. The findings support the design of keyboards with vertical key spacings of 16, 17, or 18 mm. These findings may influence keyboard design and standards.

  6. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    PubMed

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  7. Maximizing the benefits of antiretroviral therapy for key affected populations.

    PubMed

    Grubb, Ian R; Beckham, Sarah W; Kazatchkine, Michel; Thomas, Ruth M; Albers, Eliot R; Cabral, Mauro; Lange, Joep; Vella, Stefano; Kurian, Manoj; Beyrer, Chris

    2014-01-01

    Scientific research has demonstrated the clinical benefits of earlier initiation of antiretroviral treatment (ART), and that ART can markedly reduce HIV transmission to sexual partners. Ensuring universal access to ART for those who need it has long been a core principle of the HIV response, and extending the benefits of ART to key populations is critical to increasing the impact of ART and the overall effectiveness of the HIV response. However, this can only be achieved through coordinated efforts to address political, social, legal and economic barriers that key populations face in accessing HIV services. Recent analyses show that HIV prevalence levels among key populations are far higher than among the general population, and they experience a range of biological and behavioural factors, and social, legal and economic barriers that increase their vulnerability to HIV and have resulted in alarmingly low ART coverage. World Health Organization 2014 consolidated guidance on HIV among key populations offers the potential for increased access to ART by key populations, following the same principles as for the general adult population. However, it should not be assumed that key populations will achieve greater access to ART unless stigma, discrimination and punitive laws, policies and practices that limit access to ART and other HIV interventions in many countries are addressed. Rights-based approaches and investments in critical enablers, such as supportive legal and policy environments, are essential to enable wider access to ART and other HIV interventions for key populations. The primary objective of ART should always be to treat the person living with HIV; prevention is an important, additional benefit. ART should be provided only with informed consent. The preventive benefits of treatment must not be used as a pretext for failure to provide other necessary HIV programming for key populations, including comprehensive harm reduction and other prevention

  8. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  9. First- and third-party ground truth for key frame extraction from consumer video clips

    NASA Astrophysics Data System (ADS)

    Costello, Kathleen; Luo, Jiebo

    2007-02-01

    Extracting key frames (KF) from video is of great interest in many applications, such as video summary, video organization, video compression, and prints from video. KF extraction is not a new problem. However, current literature has been focused mainly on sports or news video. In the consumer video space, the biggest challenges for key frame selection from consumer videos are the unconstrained content and lack of any preimposed structure. In this study, we conduct ground truth collection of key frames from video clips taken by digital cameras (as opposed to camcorders) using both first- and third-party judges. The goals of this study are: (1) to create a reference database of video clips reasonably representative of the consumer video space; (2) to identify associated key frames by which automated algorithms can be compared and judged for effectiveness; and (3) to uncover the criteria used by both first- and thirdparty human judges so these criteria can influence algorithm design. The findings from these ground truths will be discussed.

  10. Distributing and Showing Farmer Learning Videos in Bangladesh

    ERIC Educational Resources Information Center

    Bentley, Jeffery W.; Van Mele, Paul; Harun-ar-Rashid, Md.; Krupnik, Timothy J.

    2016-01-01

    Purpose: To describe the results of showing farmer learning videos through different types of volunteers. Design/Methodology/Approach: Semi-structured interviews with volunteers from different occupational groups in Bangladesh, and a phone survey with 227 respondents. Findings: Each occupational group acted differently. Shop keepers, tillage…

  11. THE KEY ROLE OF SOLAR DYNAMICS IN THE CHROMOSPHERIC HANLE POLARIZATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlin, E. S.; Bianda, M., E-mail: escarlin@irsol.ch

    The quantum theory of polarized light allows one to model scattering in the solar atmosphere for inferring its properties. This powerful approach has revealed two key long-standing problems in solar physics: the puzzling dilemmas between theory and observations in several anomalously polarized spectral lines and the need for inferring the ubiquitous weak chromospheric magnetic fields, which requires discriminating the Hanle effect in dynamic optically thick plasmas. However, the ever-present dynamics, i.e., the temporal evolution of heatings and macroscopic motions, has been widely disregarded when modeling and interpreting the scattering polarization. This has hindered a consistent theoretical solution to the puzzlemore » while falsifying the Hanle diagnosis. Here, we show that the dynamical evolution is a keystone for solving both problems because its systematic impact allows an explanation of the observations from “anomalous” instantaneous polarization signals. Evolution accounted for, we reproduce amplitudes and (spectral and spatial) shapes of the Ca i 4227 Å polarization at solar disk center, identifying a restrictive arrangement of magnetic fields, kinematics, heatings, and spatio-temporal resolution. We find that the joint action of dynamics, Hanle effect, and low temporal resolutions mimics Zeeman linear polarization profiles, the true weak-field Zeeman signals being negligible. Our results allow reinterpretation of many polarization signals of the solar spectra and support time-dependent scattering polarization as a powerful tool for deciphering the spatio-temporal distribution of chromospheric heatings and fields. This approach may be a key aid in developing the Hanle diagnosis for the solar atmosphere.« less

  12. Computed tomographic findings of trichuriasis

    PubMed Central

    Tokmak, Naime; Koc, Zafer; Ulusan, Serife; Koltas, Ismail Soner; Bal, Nebil

    2006-01-01

    In this report, we present computed tomographic findings of colonic trichuriasis. The patient was a 75-year-old man who complained of abdominal pain, and weight loss. Diagnosis was achieved by colonoscopic biopsy. Abdominal computed tomography showed irregular and nodular thickening of the wall of the cecum and ascending colon. Although these findings are nonspecific, they may be one of the findings of trichuriasis. These findings, confirmed by pathologic analysis of the biopsied tissue and Kato-Katz parasitological stool flotation technique, revealed adult Trichuris. To our knowledge, this is the first report of colonic trichuriasis indicated by computed tomography. PMID:16830393

  13. Screening key candidate genes and pathways involved in insulinoma by microarray analysis.

    PubMed

    Zhou, Wuhua; Gong, Li; Li, Xuefeng; Wan, Yunyan; Wang, Xiangfei; Li, Huili; Jiang, Bin

    2018-06-01

    Insulinoma is a rare type tumor and its genetic features remain largely unknown. This study aimed to search for potential key genes and relevant enriched pathways of insulinoma.The gene expression data from GSE73338 were downloaded from Gene Expression Omnibus database. Differentially expressed genes (DEGs) were identified between insulinoma tissues and normal pancreas tissues, followed by pathway enrichment analysis, protein-protein interaction (PPI) network construction, and module analysis. The expressions of candidate key genes were validated by quantitative real-time polymerase chain reaction (RT-PCR) in insulinoma tissues.A total of 1632 DEGs were obtained, including 1117 upregulated genes and 514 downregulated genes. Pathway enrichment results showed that upregulated DEGs were significantly implicated in insulin secretion, and downregulated DEGs were mainly enriched in pancreatic secretion. PPI network analysis revealed 7 hub genes with degrees more than 10, including GCG (glucagon), GCGR (glucagon receptor), PLCB1 (phospholipase C, beta 1), CASR (calcium sensing receptor), F2R (coagulation factor II thrombin receptor), GRM1 (glutamate metabotropic receptor 1), and GRM5 (glutamate metabotropic receptor 5). DEGs involved in the significant modules were enriched in calcium signaling pathway, protein ubiquitination, and platelet degranulation. Quantitative RT-PCR data confirmed that the expression trends of these hub genes were similar to the results of bioinformatic analysis.The present study demonstrated that candidate DEGs and enriched pathways were the potential critical molecule events involved in the development of insulinoma, and these findings were useful for better understanding of insulinoma genesis.

  14. Maximum likelihood estimators for truncated and censored power-law distributions show how neuronal avalanches may be misevaluated

    NASA Astrophysics Data System (ADS)

    Langlois, Dominic; Cousineau, Denis; Thivierge, J. P.

    2014-01-01

    The coordination of activity amongst populations of neurons in the brain is critical to cognition and behavior. One form of coordinated activity that has been widely studied in recent years is the so-called neuronal avalanche, whereby ongoing bursts of activity follow a power-law distribution. Avalanches that follow a power law are not unique to neuroscience, but arise in a broad range of natural systems, including earthquakes, magnetic fields, biological extinctions, fluid dynamics, and superconductors. Here, we show that common techniques that estimate this distribution fail to take into account important characteristics of the data and may lead to a sizable misestimation of the slope of power laws. We develop an alternative series of maximum likelihood estimators for discrete, continuous, bounded, and censored data. Using numerical simulations, we show that these estimators lead to accurate evaluations of power-law distributions, improving on common approaches. Next, we apply these estimators to recordings of in vitro rat neocortical activity. We show that different estimators lead to marked discrepancies in the evaluation of power-law distributions. These results call into question a broad range of findings that may misestimate the slope of power laws by failing to take into account key aspects of the observed data.

  15. Maximum likelihood estimators for truncated and censored power-law distributions show how neuronal avalanches may be misevaluated.

    PubMed

    Langlois, Dominic; Cousineau, Denis; Thivierge, J P

    2014-01-01

    The coordination of activity amongst populations of neurons in the brain is critical to cognition and behavior. One form of coordinated activity that has been widely studied in recent years is the so-called neuronal avalanche, whereby ongoing bursts of activity follow a power-law distribution. Avalanches that follow a power law are not unique to neuroscience, but arise in a broad range of natural systems, including earthquakes, magnetic fields, biological extinctions, fluid dynamics, and superconductors. Here, we show that common techniques that estimate this distribution fail to take into account important characteristics of the data and may lead to a sizable misestimation of the slope of power laws. We develop an alternative series of maximum likelihood estimators for discrete, continuous, bounded, and censored data. Using numerical simulations, we show that these estimators lead to accurate evaluations of power-law distributions, improving on common approaches. Next, we apply these estimators to recordings of in vitro rat neocortical activity. We show that different estimators lead to marked discrepancies in the evaluation of power-law distributions. These results call into question a broad range of findings that may misestimate the slope of power laws by failing to take into account key aspects of the observed data.

  16. Encrypted optical storage with wavelength-key and random phase codes.

    PubMed

    Matoba, O; Javidi, B

    1999-11-10

    An encrypted optical memory system that uses a wavelength code as well as input and Fourier-plane random phase codes is proposed. Original data are illuminated by a coherent light source with a specified wavelength and are then encrypted with two random phase codes before being stored holographically in a photorefractive material. Successful decryption requires the use of a readout beam with the same wavelength as that used in the recording, in addition to the correct phase key in the Fourier plane. The wavelength selectivity of the proposed system is evaluated numerically. We show that the number of available wavelength keys depends on the correlation length of the phase key in the Fourier plane. Preliminary experiments of encryption and decryption of optical memory in a LiNbO(3):Fe photorefractive crystal are demonstrated.

  17. Design of virtual simulation experiment based on key events

    NASA Astrophysics Data System (ADS)

    Zhong, Zheng; Zhou, Dongbo; Song, Lingxiu

    2018-06-01

    Considering complex content and lacking of guidance in virtual simulation experiments, the key event technology in VR narrative theory was introduced for virtual simulation experiment to enhance fidelity and vividness process. Based on the VR narrative technology, an event transition structure was designed to meet the need of experimental operation process, and an interactive event processing model was used to generate key events in interactive scene. The experiment of" margin value of bees foraging" based on Biologic morphology was taken as an example, many objects, behaviors and other contents were reorganized. The result shows that this method can enhance the user's experience and ensure experimental process complete and effectively.

  18. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  19. Completely device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Aguilar, Edgar A.; Ramanathan, Ravishankar; Kofler, Johannes; Pawłowski, Marcin

    2016-08-01

    Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries—an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence our work reduces the requirements needed to perform secure DIQKD and establish safe communication.

  20. Swedish and American studies show that initiatives to decrease maternal obesity could play a key role in reducing preterm birth.

    PubMed

    Gould, Jeffrey B; Mayo, Jonathan; Shaw, Gary M; Stevenson, David K

    2014-06-01

    Maternal obesity is a major source of preventable perinatal morbidity, but studies of the relationship between obesity and preterm birth have been inconsistent. This review looks at two major studies covering just under 3.5 million births, from California, USA, and Sweden. Inconsistent findings in previous studies appear to stem from the complex relationship between obesity and preterm birth. Initiatives to decrease maternal obesity represent an important strategy in reducing preterm birth. ©2014 Foundation Acta Paediatrica. Published by John Wiley & Sons Ltd.

  1. Monitoring the Future National Results on Adolescent Drug Use: Overview of Key Findings, 2000.

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.

    This publication presents an overview of the 2000 survey of 8th, 10th, and 12th grade students, with a particular emphasis on recent trends in the use of various licit and illicit drugs. It also shows trends in the levels of perceived risk and personal disapproval associated with each drug, which this study has shown to be particularly important…

  2. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    NASA Astrophysics Data System (ADS)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  3. A novel key-frame extraction approach for both video summary and video index.

    PubMed

    Lei, Shaoshuai; Xie, Gang; Yan, Gaowei

    2014-01-01

    Existing key-frame extraction methods are basically video summary oriented; yet the index task of key-frames is ignored. This paper presents a novel key-frame extraction approach which can be available for both video summary and video index. First a dynamic distance separability algorithm is advanced to divide a shot into subshots based on semantic structure, and then appropriate key-frames are extracted in each subshot by SVD decomposition. Finally, three evaluation indicators are proposed to evaluate the performance of the new approach. Experimental results show that the proposed approach achieves good semantic structure for semantics-based video index and meanwhile produces video summary consistent with human perception.

  4. 76 FR 68314 - Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ...-AA08 Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL AGENCY: Coast... World Championship, a series of high-speed boat races. The event is scheduled to take place on Wednesday... Key West World Championship, a series of high-speed boat races. The event will be held on the waters...

  5. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  6. Quantum exhaustive key search with simplified-DES as a case study.

    PubMed

    Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N

    2016-01-01

    To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.

  7. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  8. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  9. Key Reconciliation for High Performance Quantum Key Distribution

    PubMed Central

    Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente

    2013-01-01

    Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440

  10. Diversity of key players in the microbial ecosystems of the human body

    PubMed Central

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-01-01

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different. PMID:26514870

  11. Diversity of key players in the microbial ecosystems of the human body.

    PubMed

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  12. Genetically Informative Research on Adolescent Substance Use: Methods, Findings, and Challenges

    ERIC Educational Resources Information Center

    Lynskey, Michael T.; Agrawal, Arpana; Heath, Andrew C.

    2010-01-01

    Objective: To provide an overview of the genetic epidemiology of substance use and misuse in adolescents. Method: A selective review of genetically informative research strategies, their limitations, and key findings examining issues related to the heritability of substance use and substance use disorders in children and adolescents is presented.…

  13. Quantum key distribution with entangled photon sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-07-15

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDCmore » source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses.« less

  14. 25 CFR 502.14 - Key employee.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  15. Strength in Ways: Finding Creativity in Routine Strategy Development

    DTIC Science & Technology

    2011-06-01

    STRENGTH IN WAYS: FINDING CREATIVITY IN ROUTINE STRATEGY DEVELOPMENT BY PAUL J. MAYKISH A THESIS PRESENTED TO THE FACULTY OF THE SCHOOL...Professional Development . iv ACKNOWLEDGEMENTS I feel indebted to my country for the opportunity to study strategy for one year. It is at once too much...with research and welcoming me into one of our greatest national treasures. Lieutenant Colonel Dollar Young (USAF) introduced me to numerous key

  16. CT and MRI Findings in Cerebral Aspergilloma.

    PubMed

    Gärtner, Friederike; Forstenpointner, Julia; Ertl-Wagner, Birgit; Hooshmand, Babak; Riedel, Christian; Jansen, Olav

    2017-11-20

    Purpose  Invasive aspergillosis usually affects immunocompromised patients. It carries a high risk of morbidity and mortality and usually has a nonspecific clinical presentation. Early diagnosis is essential in order to start effective treatment and improve clinical outcome. Materials and Methods  In a retrospective search of the PACS databases from two medical centers, we identified 9 patients with histologically proven cerebral aspergilloma. We systematically analyzed CT and MRI imaging findings to identify typical imaging appearances of cerebral aspergilloma. Results  CT did not show a typical appearance of the aspergillomas. In 100 % (9/9) there was a rim-attenuated diffusion restriction on MRI imaging. Multiple hypointense layers in the aspergillus wall, especially on the internal side, were detected in 100 % on T2-weighted imaging (9/9). Aspergillomas were T1-hypointense in 66 % of cases (6/9) and partly T1-hyperintense in 33 % (3/9). In 78 % (7/9) of cases, a rim-attenuated diffusion restriction was detected after contrast agent application. Conclusion  Nine cases were identified. Whereas CT features were less typical, we observed the following imaging features on MRI: A strong, rim-attenuated diffusion restriction (9/9); onion layer-like hypointense zones, in particular in the innermost part of the abscess wall on T2-weighted images (9/9). Enhancement of the lesion border was present in the majority of the cases (7/9). Key points   · There are typical MRI imaging features of aspergillomas.. · However, these findings could be affected by the immune status of the patient.. · Swift identification of aspergilloma imaging patterns is essential to allow for adequate therapeutic decision making.. Citation Format · Gärtner F, Forstenpointner J, Ertl-Wagner B et al. CT and MRI Findings in Cerebral Aspergilloma. Fortschr Röntgenstr 2017; DOI: 10.1055/s-0043-120766. © Georg Thieme Verlag KG Stuttgart · New York.

  17. Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Li, Renjie; Liao, Qin; Zhou, Jian; Huang, Duan

    2018-02-01

    Discrete modulation is proven to be beneficial to improving the performance of continuous-variable quantum key distribution (CVQKD) in long-distance transmission. In this paper, we suggest a construct to improve the maximal generated secret key rate of discretely modulated eight-state CVQKD using an optical amplifier (OA) with a slight cost of transmission distance. In the proposed scheme, an optical amplifier is exploited to compensate imperfection of Bob's apparatus, so that the generated secret key rate of eight-state protocol is enhanced. Specifically, we investigate two types of optical amplifiers, phase-insensitive amplifier (PIA) and phase-sensitive amplifier (PSA), and thereby obtain approximately equivalent improved performance for eight-state CVQKD system when applying these two different amplifiers. Numeric simulation shows that the proposed scheme can well improve the generated secret key rate of eight-state CVQKD in both asymptotic limit and finite-size regime. We also show that the proposed scheme can achieve the relatively high-rate transmission at long-distance communication system.

  18. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  19. Quantum-locked key distribution at nearly the classical capacity rate.

    PubMed

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  20. Future of the Korea national parks: a preliminary Delphi study of key experts

    Treesearch

    Byung-kyu Lee; Wilbur F. LaPage

    2002-01-01

    A preliminary Delphi survey of a panel of key experts who are very knowledgeable of Korean national parks was conducted between February and March in 2001. Park professionals, environmental NGO directors, interested citizens, and retirees identified issues facing the Korean park system (Wave1). Findings from wave I of the survey provided the baseline for a series of...

  1. Exploring novel key regulators in breast cancer network.

    PubMed

    Ali, Shahnawaz; Malik, Md Zubbair; Singh, Soibam Shyamchand; Chirom, Keilash; Ishrat, Romana; Singh, R K Brojen

    2018-01-01

    The breast cancer network constructed from 70 experimentally verified genes is found to follow hierarchical scale free nature with heterogeneous modular organization and diverge leading hubs. The topological parameters (degree distributions, clustering co-efficient, connectivity and centralities) of this network obey fractal rules indicating absence of centrality lethality rule, and efficient communication among the components. From the network theoretical approach, we identified few key regulators out of large number of leading hubs, which are deeply rooted from top to down of the network, serve as backbone of the network, and possible target genes. However, p53, which is one of these key regulators, is found to be in low rank and keep itself at low profile but directly cross-talks with important genes BRCA2 and BRCA3. The popularity of these hubs gets changed in unpredictable way at various levels of organization thus showing disassortive nature. The local community paradigm approach in this network shows strong correlation of nodes in majority of modules/sub-modules (fast communication among nodes) and weak correlation of nodes only in few modules/sub-modules (slow communication among nodes) at various levels of network organization.

  2. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  3. Maximizing the benefits of antiretroviral therapy for key affected populations

    PubMed Central

    Grubb, Ian R; Beckham, Sarah W; Kazatchkine, Michel; Thomas, Ruth M; Albers, Eliot R; Cabral, Mauro; Lange, Joep; Vella, Stefano; Kurian, Manoj; Beyrer, Chris

    2014-01-01

    Introduction Scientific research has demonstrated the clinical benefits of earlier initiation of antiretroviral treatment (ART), and that ART can markedly reduce HIV transmission to sexual partners. Ensuring universal access to ART for those who need it has long been a core principle of the HIV response, and extending the benefits of ART to key populations is critical to increasing the impact of ART and the overall effectiveness of the HIV response. However, this can only be achieved through coordinated efforts to address political, social, legal and economic barriers that key populations face in accessing HIV services. Discussion Recent analyses show that HIV prevalence levels among key populations are far higher than among the general population, and they experience a range of biological and behavioural factors, and social, legal and economic barriers that increase their vulnerability to HIV and have resulted in alarmingly low ART coverage. World Health Organization 2014 consolidated guidance on HIV among key populations offers the potential for increased access to ART by key populations, following the same principles as for the general adult population. However, it should not be assumed that key populations will achieve greater access to ART unless stigma, discrimination and punitive laws, policies and practices that limit access to ART and other HIV interventions in many countries are addressed. Conclusions Rights-based approaches and investments in critical enablers, such as supportive legal and policy environments, are essential to enable wider access to ART and other HIV interventions for key populations. The primary objective of ART should always be to treat the person living with HIV; prevention is an important, additional benefit. ART should be provided only with informed consent. The preventive benefits of treatment must not be used as a pretext for failure to provide other necessary HIV programming for key populations, including comprehensive harm

  4. Practical decoy state for quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Qi Bing; Zhao Yi

    2005-07-15

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less

  5. A Novel Multiple-Access Correlation-Delay-Shift-Keying

    NASA Astrophysics Data System (ADS)

    Duan, J. Y.; Jiang, G. P.; Yang, H.

    In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).

  6. Melanosome evolution indicates a key physiological shift within feathered dinosaurs.

    PubMed

    Li, Quanguo; Clarke, Julia A; Gao, Ke-Qin; Zhou, Chang-Fu; Meng, Qingjin; Li, Daliang; D'Alba, Liliana; Shawkey, Matthew D

    2014-03-20

    Inference of colour patterning in extinct dinosaurs has been based on the relationship between the morphology of melanin-containing organelles (melanosomes) and colour in extant bird feathers. When this relationship evolved relative to the origin of feathers and other novel integumentary structures, such as hair and filamentous body covering in extinct archosaurs, has not been evaluated. Here we sample melanosomes from the integument of 181 extant amniote taxa and 13 lizard, turtle, dinosaur and pterosaur fossils from the Upper-Jurassic and Lower-Cretaceous of China. We find that in the lineage leading to birds, the observed increase in the diversity of melanosome morphologies appears abruptly, near the origin of pinnate feathers in maniraptoran dinosaurs. Similarly, mammals show an increased diversity of melanosome form compared to all ectothermic amniotes. In these two clades, mammals and maniraptoran dinosaurs including birds, melanosome form and colour are linked and colour reconstruction may be possible. By contrast, melanosomes in lizard, turtle and crocodilian skin, as well as the archosaurian filamentous body coverings (dinosaur 'protofeathers' and pterosaur 'pycnofibres'), show a limited diversity of form that is uncorrelated with colour in extant taxa. These patterns may be explained by convergent changes in the key melanocortin system of mammals and birds, which is known to affect pleiotropically both melanin-based colouration and energetic processes such as metabolic rate in vertebrates, and may therefore support a significant physiological shift in maniraptoran dinosaurs.

  7. Experiences with an adaptive design for a dose-finding study in patients with osteoarthritis.

    PubMed

    Miller, Frank; Björnsson, Marcus; Svensson, Ola; Karlsten, Rolf

    2014-03-01

    Dose-finding studies in non-oncology areas are usually conducted in Phase II of the development process of a new potential medicine and it is key to choose a good design for such a study, as the results will decide if and how to proceed to Phase III. The present article has focus on the design of a dose-finding study for pain in osteoarthritis patients treated with the TRPV1 antagonist AZD1386. We describe different design alternatives in the planning of this study, the reasoning for choosing the adaptive design and experiences with conduct and interim analysis. Three alternatives were proposed: one single dose-finding study with parallel design, a programme with a smaller Phase IIa study followed by a Phase IIb dose-finding study, and an adaptive dose-finding study. We describe these alternatives in detail and explain why the adaptive design was chosen for the study. We give insights in design aspects of the adaptive study, which need to be pre-planned, like interim decision criteria, statistical analysis method and setup of a Data Monitoring Committee. Based on the interim analysis it was recommended to stop the study for futility since AZD1386 showed no significant pain decrease based on the primary variable. We discuss results and experiences from the conduct of the study with the novel design approach. Huge cost savings have been done compared to if the option with one dose-finding design for Phase II had been chosen. However, we point out several challenges with this approach. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. The public and wildland fire management: social science findings for managers

    Treesearch

    S.M. McCaffrey

    2006-01-01

    Presents key social science findings from three National Fire Plan-sponsored research projects. Articles highlight information of likely interest to individuals working to decrease wildfire hazards on both private and public lands. Three general topic areas are addressed: (1) public views and acceptance of fuels management, (2) working with homeowners and communities,...

  9. Unconditional security of quantum key distribution over arbitrarily long distances

    PubMed

    Lo; Chau

    1999-03-26

    Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. The proof is reduced from a noisy quantum scheme to a noiseless quantum scheme and then from a noiseless quantum scheme to a noiseless classical scheme, which can then be tackled by classical probability theory.

  10. 78 FR 33221 - Special Local Regulation; Annual Swim Around Key West, Atlantic Ocean and Gulf of Mexico; Key...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-04

    ... Fort Zach State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key... State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key Channel and West...

  11. Multiple Paths to Mathematics Practice in Al-Kashi's Key to Arithmetic

    NASA Astrophysics Data System (ADS)

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his Key to Arithmetic, a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life and his contributions to mathematics and astronomy. Section 2 starts with a brief discussion of the contents and pedagogy of the Key to Arithmetic. Al-Kashi's multiple approaches are discussed through four different examples of his versatility in presenting a topic from multiple perspectives. These examples are multiple definitions, multiple algorithms, multiple formulas, and multiple methods for solving word problems. Section 3 is devoted to some benefits that can be gained by implementing al-Kashi's multiple paths approach in modern curricula. For this discussion, examples from two teaching modules taken from the Key to Arithmetic and implemented in Pre-Calculus and mathematics courses for preservice teachers are discussed. Also, the conclusions are supported by some aspects of these modules. This paper is an attempt to help mathematics educators explore more benefits from reading from original sources.

  12. Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-01

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  13. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

    PubMed

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-16

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  14. Comparison is key.

    PubMed

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  15. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    NASA Astrophysics Data System (ADS)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  16. Biometrics based key management of double random phase encoding scheme using error control codes

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  17. Gun Shows and Gun Violence: Fatally Flawed Study Yields Misleading Results

    PubMed Central

    Hemenway, David; Webster, Daniel; Pierce, Glenn; Braga, Anthony A.

    2010-01-01

    A widely publicized but unpublished study of the relationship between gun shows and gun violence is being cited in debates about the regulation of gun shows and gun commerce. We believe the study is fatally flawed. A working paper entitled “The Effect of Gun Shows on Gun-Related Deaths: Evidence from California and Texas” outlined this study, which found no association between gun shows and gun-related deaths. We believe the study reflects a limited understanding of gun shows and gun markets and is not statistically powered to detect even an implausibly large effect of gun shows on gun violence. In addition, the research contains serious ascertainment and classification errors, produces results that are sensitive to minor specification changes in key variables and in some cases have no face validity, and is contradicted by 1 of its own authors’ prior research. The study should not be used as evidence in formulating gun policy. PMID:20724672

  18. Gun shows and gun violence: fatally flawed study yields misleading results.

    PubMed

    Wintemute, Garen J; Hemenway, David; Webster, Daniel; Pierce, Glenn; Braga, Anthony A

    2010-10-01

    A widely publicized but unpublished study of the relationship between gun shows and gun violence is being cited in debates about the regulation of gun shows and gun commerce. We believe the study is fatally flawed. A working paper entitled "The Effect of Gun Shows on Gun-Related Deaths: Evidence from California and Texas" outlined this study, which found no association between gun shows and gun-related deaths. We believe the study reflects a limited understanding of gun shows and gun markets and is not statistically powered to detect even an implausibly large effect of gun shows on gun violence. In addition, the research contains serious ascertainment and classification errors, produces results that are sensitive to minor specification changes in key variables and in some cases have no face validity, and is contradicted by 1 of its own authors' prior research. The study should not be used as evidence in formulating gun policy.

  19. Partially Turboelectric Aircraft Drive Key Performance Parameters

    NASA Technical Reports Server (NTRS)

    Jansen, Ralph H.; Duffy, Kirsten P.; Brown, Gerald V.

    2017-01-01

    The purpose of this paper is to propose electric drive specific power, electric drive efficiency, and electrical propulsion fraction as the key performance parameters for a partially turboelectric aircraft power system and to investigate their impact on the overall aircraft performance. Breguet range equations for a base conventional turbofan aircraft and a partially turboelectric aircraft are found. The benefits and costs that may result from the partially turboelectric system are enumerated. A break even analysis is conducted to find the minimum allowable electric drive specific power and efficiency, for a given electrical propulsion fraction, that can preserve the range, fuel weight, operating empty weight, and payload weight of the conventional aircraft. Current and future power system performance is compared to the required performance to determine the potential benefit.

  20. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  1. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  2. Key Largo Limestone revisited: Pleistocene shelf-edge facies, Florida Keys, USA

    USGS Publications Warehouse

    Gray, Multer H.; Gischler, E.; Lundberg, J.; Simmons, K.R.; Shinn, E.A.

    2002-01-01

    New dates and analysis of 12 deep and 57 shallow cores allow a more detailed interpretation of the Pleistocene shelf edge of the Florida Platform as found in various facies of the Key Largo Limestone beneath the Florida Keys. In this study a three-phase evolution of the Quaternary units (Q1-Q5) of the Key Largo is presented with new subdivision of the Q5. (1) In the first phase, the Q1 and Q2 (perhaps deposited during oxygen-isotope stage 11) deep-water quartz-rich environment evolved into a shallow carbonate phase. (2) Subsequently, a Q3 (presumably corresponding to oxygen-isotope stage 9) flourishing reef and productive high-platform sediment phase developed. (3) Finally, a Q4 and Q5 (corresponding to oxygen-isotope stages 7 and 5) stabilization phase occured with reefs and leeward productive lagoons, followed by lower sea levels presenting a sequence of younger (isotope substages 5c, 5a) shelf-margin wedges, sediment veneers and outlier reefs. The Key Largo Limestone provides an accessible model of a carbonate shelf edge with fluctuating water depth, bordering a deep seaward basin for a period of at least 300 ka. During this time, at least four onlaps/offlaps, often separated by periods of karst development with associated diagenetic alterations, took place. The story presented by this limestone not only allows a better understanding of the history of south Florida but also aids in the interpretation of similar persistent shelf-edge sites bordering deep basins in other areas.

  3. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  4. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  5. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  6. Collaborative testing for key-term definitions under representative conditions: Efficiency costs and no learning benefits.

    PubMed

    Wissman, Kathryn T; Rawson, Katherine A

    2018-01-01

    Students are expected to learn key-term definitions across many different grade levels and academic disciplines. Thus, investigating ways to promote understanding of key-term definitions is of critical importance for applied purposes. A recent survey showed that learners report engaging in collaborative practice testing when learning key-term definitions, with outcomes also shedding light on the way in which learners report engaging in collaborative testing in real-world contexts (Wissman & Rawson, 2016, Memory, 24, 223-239). However, no research has directly explored the effectiveness of engaging in collaborative testing under representative conditions. Accordingly, the current research evaluates the costs (with respect to efficiency) and the benefits (with respect to learning) of collaborative testing for key-term definitions under representative conditions. In three experiments (ns = 94, 74, 95), learners individually studied key-term definitions and then completed retrieval practice, which occurred either individually or collaboratively (in dyads). Two days later, all learners completed a final individual test. Results from Experiments 1-2 showed a cost (with respect to efficiency) and no benefit (with respect to learning) of engaging in collaborative testing for key-term definitions. Experiment 3 evaluated a theoretical explanation for why collaborative benefits do not emerge under representative conditions. Collectively, outcomes indicate that collaborative testing versus individual testing is less effective and less efficient when learning key-term definitions under representative conditions.

  7. An antiarch placoderm shows that pelvic girdles arose at the root of jawed vertebrates

    PubMed Central

    Zhu, Min; Yu, Xiaobo; Choo, Brian; Wang, Junqing; Jia, Liantao

    2012-01-01

    Almost all gnathostomes or jawed vertebrates (including osteichthyans, chondrichthyans, ‘acanthodians’ and most placoderms) possess paired pectoral and pelvic fins. To date, it has generally been believed that antiarch placoderms (extinct armoured jawed fishes from the Silurian–Devonian periods) lacked pelvic fins. The putative absence of pelvic fins is a key character bearing on the monophyly or paraphyly of placoderms. It also has far-reaching implications for studying the sequence of origin of pelvic girdles versus that of movable jaws in the course of vertebrate evolution. Parayunnanolepis xitunensis represents the only example of a primitive antiarch with extensive post-thoracic preservation, and its original description has been cited as confirming the primitive lack of pelvic fins in early antiarchs. Here, we present a revised description of Parayunnanolepis and offer the first unambiguous evidence for the presence of pelvic girdles in antiarchs. As antiarchs are placed at the base of the gnathostome radiation in several recent studies, our finding shows that all jawed vertebrates (including antiarch placoderms) primitively possess both pectoral and pelvic fins and that the pelvic fins did not arise within gnathostomes at a point subsequent to the origin of jaws. PMID:22219394

  8. Key Provisions of the Patient Protection and Affordable Care Act (ACA): A Systematic Review and Presentation of Early Research Findings.

    PubMed

    French, Michael T; Homer, Jenny; Gumus, Gulcin; Hickling, Lucas

    2016-10-01

    To conduct a systematic literature review of selected major provisions of the Affordable Care Act (ACA) pertaining to expanded health insurance coverage. We present and synthesize research findings from the last 5 years regarding both the immediate and long-term effects of the ACA. We conclude with a summary and offer a research agenda for future studies. We identified relevant articles from peer-reviewed scholarly journals by performing a comprehensive search of major electronic databases. We also identified reports in the "gray literature" disseminated by government agencies and other organizations. Overall, research shows that the ACA has substantially decreased the number of uninsured individuals through the dependent coverage provision, Medicaid expansion, health insurance exchanges, availability of subsidies, and other policy changes. Affordability of health insurance continues to be a concern for many people and disparities persist by geography, race/ethnicity, and income. Early evidence also indicates improvements in access to and affordability of health care. All of these changes are certain to ultimately impact state and federal budgets. The ACA will either directly or indirectly affect almost all Americans. As new and comprehensive data become available, more rigorous evaluations will provide further insights as to whether the ACA has been successful in achieving its goals. © Health Research and Educational Trust.

  9. Multiple Paths to Mathematics Practice in Al-Kashi's "Key to Arithmetic"

    ERIC Educational Resources Information Center

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his "Key to Arithmetic", a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life…

  10. KEY COMPARISON: Final report on APMP.M.P-K6.1 pneumatic key comparison from 20 kPa to 105 kPa in gauge mode

    NASA Astrophysics Data System (ADS)

    Hung, Chen-Chuan; Jian, Wu; Changpan, Tawat

    2009-01-01

    This report describes the key comparison APMP.M.P-K6.1 among the three national metrology institutes, Center for Measurement Standards-ITRI (CMS-ITRI, Taiwan), SPRING Singapore and National Institute of Metrology (NIMT), in the pressure range from 20 kPa to 105 kPa in gas media and gauge mode executed during the period April 2003 to April 2004. This comparison was conducted by CMS-ITRI and was based on the calibration procedure of APMP pneumatic pressure comparison APMP.M.P-K6. We intended to link to the CCM.P-K6 key comparison through the APMP.M.P-K6 key comparison by using the proposed linkage method in the APMP.M.P-K6 key comparison to determine a linking factor that can transform the quantities measured in the APMP.M.P-K6.1 key comparison. All three participating institutes used pneumatic piston gauges as their pressure standards. The Ruska 2465 gas-operated piston-cylinder assembly TL-1409 used as transfer standard offered by CMS-ITRI was calibrated three times by the pilot institute during the comparison period and showed that it was very stable after evaluation. The comparison was conducted on the basis of cross-float experiments to determine the effective area of transfer standards from the national standards of three institutes. The comparison results (as shown in Table 6) were equivalent to the CCM.P-K6 comparison and the relative bilateral degrees of equivalence between two laboratories were smaller than 39.7 × 10-6 from 20 kPa to 105 kPa. These results showed all participating institutes measuring the same quantity in the whole pressure range lay within their expanded uncertainty with confidence level 95%. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  11. A fast image matching algorithm based on key points

    NASA Astrophysics Data System (ADS)

    Wang, Huilin; Wang, Ying; An, Ru; Yan, Peng

    2014-05-01

    Image matching is a very important technique in image processing. It has been widely used for object recognition and tracking, image retrieval, three-dimensional vision, change detection, aircraft position estimation, and multi-image registration. Based on the requirements of matching algorithm for craft navigation, such as speed, accuracy and adaptability, a fast key point image matching method is investigated and developed. The main research tasks includes: (1) Developing an improved celerity key point detection approach using self-adapting threshold of Features from Accelerated Segment Test (FAST). A method of calculating self-adapting threshold was introduced for images with different contrast. Hessian matrix was adopted to eliminate insecure edge points in order to obtain key points with higher stability. This approach in detecting key points has characteristics of small amount of computation, high positioning accuracy and strong anti-noise ability; (2) PCA-SIFT is utilized to describe key point. 128 dimensional vector are formed based on the SIFT method for the key points extracted. A low dimensional feature space was established by eigenvectors of all the key points, and each eigenvector was projected onto the feature space to form a low dimensional eigenvector. These key points were re-described by dimension-reduced eigenvectors. After reducing the dimension by the PCA, the descriptor was reduced to 20 dimensions from the original 128. This method can reduce dimensions of searching approximately near neighbors thereby increasing overall speed; (3) Distance ratio between the nearest neighbour and second nearest neighbour searching is regarded as the measurement criterion for initial matching points from which the original point pairs matched are obtained. Based on the analysis of the common methods (e.g. RANSAC (random sample consensus) and Hough transform cluster) used for elimination false matching point pairs, a heuristic local geometric restriction

  12. Qualitative research methods: key features and insights gained from use in infection prevention research.

    PubMed

    Forman, Jane; Creswell, John W; Damschroder, Laura; Kowalski, Christine P; Krein, Sarah L

    2008-12-01

    Infection control professionals and hospital epidemiologists are accustomed to using quantitative research. Although quantitative studies are extremely important in the field of infection control and prevention, often they cannot help us explain why certain factors affect the use of infection control practices and identify the underlying mechanisms through which they do so. Qualitative research methods, which use open-ended techniques, such as interviews, to collect data and nonstatistical techniques to analyze it, provide detailed, diverse insights of individuals, useful quotes that bring a realism to applied research, and information about how different health care settings operate. Qualitative research can illuminate the processes underlying statistical correlations, inform the development of interventions, and show how interventions work to produce observed outcomes. This article describes the key features of qualitative research and the advantages that such features add to existing quantitative research approaches in the study of infection control. We address the goal of qualitative research, the nature of the research process, sampling, data collection and analysis, validity, generalizability of findings, and presentation of findings. Health services researchers are increasingly using qualitative methods to address practical problems by uncovering interacting influences in complex health care environments. Qualitative research methods, applied with expertise and rigor, can contribute important insights to infection prevention efforts.

  13. Effects of regulated competition on key outcomes of care: cataract surgeries in the Netherlands.

    PubMed

    Heijink, Richard; Mosca, Ilaria; Westert, Gert

    2013-11-01

    Similar to several other countries, the Netherlands implemented market-oriented health care reforms in recent years. Previous studies raised questions on the effects of these reforms on key outcomes such as quality, costs, and prices. The empirical evidence is up to now mixed. This study looked at the variation in prices, volume, and quality of cataract surgeries since the introduction of price competition in 2006. We found no price convergence over time and constant price differences between hospitals. Quality indicators generally showed positive results in cataract care, though the quality and scope of the indicators was suboptimal at this stage. Furthermore, we found limited between-hospital variation in quality and there was no clear-cut relation between prices and quality. Volume of cataract care strongly increased in the period studied. These findings indicate that health insurers may not have been able to drive prices down, make trade-offs between price and quality, and selectively contract health care without usable quality information. Positive results coming out from the 2006 reform should not be taken for granted. Looking forward, future research on similar topics and with newer data should clarify the extent to which these findings can be generalized. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Racial and Ethnic Disparities: Key Findings from the National Survey of America's Families. Series B, No. B-5.

    ERIC Educational Resources Information Center

    Staveteig, Sarah; Wigton, Alyssa

    This brief outlines findings from the National Survey of America's Families, a survey of 44,461 households, on 7 indicators of well-being by race and ethnicity: poverty, family structure, child support, food hardship, housing hardship, health status, and health insurance coverage. For the purpose of this brief, all persons of Hispanic origin were…

  15. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  16. Making a Difference: Findings from "Better Beginnings" a Family Literacy Intervention Programme

    ERIC Educational Resources Information Center

    Barratt-Pugh, Caroline; Allen, Nola

    2011-01-01

    Since 2005, "Better Beginnings", an early intervention, statewide family literacy programme developed by The State Library of Western Australia, has provided thousands of families with strategies and resources to promote and support book-sharing from birth. This paper reports on the key findings of an independent longitudinal evaluation…

  17. The Effective Elementary School Principal: Theoretical Bases, Research Findings and Practical Implications.

    ERIC Educational Resources Information Center

    Burnett, I. Emett, Jr.; Pankake, Anita M.

    Although much of the current school reform movement relies on the basic assumption of effective elementary school administration, insufficient effort has been made to synthesize key concepts found in organizational theory and management studies with relevant effective schools research findings. This paper attempts such a synthesis to help develop…

  18. How well do middle school science programs measure up? Findings from Project 2061's curriculum review

    NASA Astrophysics Data System (ADS)

    Kesidou, Sofia; Roseman, Jo Ellen

    2002-08-01

    The purposes of this study were to examine how well middle school programs support the attainment of key scientific ideas specified in national science standards, and to identify typical strengths and weaknesses of these programs using research-based criteria. Nine widely used programs were examined by teams of teachers and specialists in research on teaching and learning. Reviewers found that whereas key ideas were generally present in the programs, they were typically buried between detailed or even unrelated ideas. Programs only rarely provided students with a sense of purpose for the units of study, took account of student beliefs that interfere with learning, engaged students with relevant phenomena to make abstract scientific ideas plausible, modeled the use of scientific knowledge so that students could apply what they learned in everyday situations, or scaffolded student efforts to make meaning of key phenomena and ideas presented in the programs. New middle school science programs that reflect findings from learning research are needed to support teachers better in helping students learn key ideas in science. The criteria and findings from this study on the inadequacies in existing programs could serve as guidelines in new curriculum development.

  19. How Are You Doing? Key Performance Indicators and Benchmarking

    ERIC Educational Resources Information Center

    Fahey, John P.

    2011-01-01

    School business officials need to "know and show" that their operations are well managed. To do so, they ask themselves questions, such as "How are they doing? How do they compare with others? Are they making progress fast enough? Are they using the best practices?" Using key performance indicators (KPIs) and benchmarking as regular parts of their…

  20. Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Li, Jun-Lin; Wang, Chuan

    2010-11-01

    A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.

  1. A key role for mitochondria in endothelial signaling by plasma cysteine/cystine redox potential

    PubMed Central

    Go, Young-Mi; Park, Heonyong; Koval, Michael; Orr, Michael; Reed, Matthew; Liang, Yongliang; Smith, Debra; Pohl, Jan; Jones, Dean P.

    2011-01-01

    The redox potential of the plasma cysteine/cystine couple (EhCySS) is oxidized in association with risk factors for cardiovascular disease (CVD), including age, smoking, type 2 diabetes, obesity, and alcohol abuse. Previous in vitro findings support a cause–effect relationship for extracellular EhCySS in cell signaling pathways associated with CVD, including those controlling monocyte adhesion to endothelial cells. In this study, we provide evidence that mitochondria are a major source of reactive oxygen species (ROS) in the signaling response to a more oxidized extracellular EhCySS. This increase in ROS was blocked by overexpression of mitochondrial thioredoxin-2 (Trx2) in endothelial cells from Trx2-transgenic mice, suggesting that mitochondrial thiol antioxidant status plays a key role in this redox signaling mechanism. Mass spectrometry-based redox proteomics showed that several classes of plasma membrane and cytoskeletal proteins involved in inflammation responded to this redox switch, including vascular cell adhesion molecule, integrins, actin, and several Ras family GTPases. Together, the data show that the proinflammatory effects of oxidized plasma EhCySS are due to a mitochondrial signaling pathway that is mediated through redox control of downstream effector proteins. PMID:19879942

  2. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  3. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network

    PubMed Central

    Yang, Bin; Zhang, Jianfeng

    2017-01-01

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme. PMID:28657588

  4. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    PubMed

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  5. The Geology of the Florida Keys.

    ERIC Educational Resources Information Center

    Shinn, Eugene A.

    1988-01-01

    Describes some of the ancient geologic history of the Florida Keys from Key Largo to Key West including the effects of glaciers, sea level rise, reef distribution, spurs and grooves, backstepping and ecological zonation, growth rates and erosion. Predicts future changes in this area. (CW)

  6. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    NASA Astrophysics Data System (ADS)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  7. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    NASA Astrophysics Data System (ADS)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  8. Assessment of Climate Change in the Southwest United States: Key Findings

    NASA Astrophysics Data System (ADS)

    Garfin, G. M.

    2012-12-01

    The Assessment of Climate Change in the Southwest United States, is a technical input to the National Climate Assessment. The 121-author report summarizes knowledge about climate change and its impacts across Arizona, California, Colorado, Nevada, New Mexico, and Utah. The report looks at links between climate and natural resources, vulnerabilities to climate variability and change across the region and along the U.S.-Mexico border, and adaptation and mitigation choices for addressing future changes. The period since 1950 has been warmer than any period of comparable length in the last 600 years. Droughts of the past 2,000 years have exceeded the most severe and sustained drought during 1901-2010. In the last decade, flows in the major river basins of the Southwest have been lower than their 20th century averages; many snowmelt-fed streams in the region exhibited earlier snowmelt and earlier center of mass of annual streamflows. Climate models project continued temperature increases, with longer and hotter summer heat waves. Average precipitation is projected to decrease in the southern part of the region. Reduced streamflows are projected for the Rio Grande, Colorado, and San Joaquin rivers. More frequent and intense winter flooding is projected for the western Sierra Nevada, whereas Colorado Front Range summer flooding is projected to increase. Observed ecosystems impacts include changes in phenology, widespread forest disturbance due to the confluence of drought, increased temperatures, and changes to insect life cycles. Area burned by wildfire is projected to increase in most of the Southwest. Plant and animal species' distributions will be affected by climate change, and studies show that observed climate changes are strongly associated with observed changes in species' distributions. California coastal ecosystems will be affected by a combination of ocean warming, reduced oxygen content, sea level rise and ocean acidification. When west coast sea levels are

  9. Captured key electrical safety lockout system

    DOEpatents

    Darimont, Daniel E.

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  10. Captured key electrical safety lockout system

    DOEpatents

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Btu accounting: Showing results

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, K.E.

    1994-10-01

    In the preceding article in this series last month, the author showed how to calculate the energy consumed to make a pound of product. To realize a payoff, however, the results must be presented in graphs or tables that clearly display what has happened. They must call attention to plant performance and ultimately lead to more efficient use of energy. Energy-consumption reporting is particularly valuable when viewed over a period of time. The author recommend compiling data annually and maintaining a ten-year performance history. Four cases are considered: individual plant performance; site performance for sites having more than one plant;more » company performance, for companies having more than one site; and performance based on product, for identical or similar products made at different plants or sites. Of these, individual plant performance is inherently the most useful. It also serves as the best basis for site, company and product performance reports. A key element in energy accounting is the relating of all energy consumption to a common basis. As developed last month in Part 1 in this series, the author chose Btu[sub meth] (i.e., Btu of methane equivalent, expressed as its higher heating value) for this purpose. It represents the amount of methane that would be needed to replace (in the case of fuels) or generate (in the case of steam and power) the energy being used.« less

  12. Two-party quantum key agreement protocols under collective noise channel

    NASA Astrophysics Data System (ADS)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  13. Security of quantum key distribution with iterative sifting

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos

    2018-01-01

    Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.

  14. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  15. Tau Positive Neurons Show Marked Mitochondrial Loss and Nuclear Degradation in Alzheimer's Disease.

    PubMed

    Wee, Melissa; Chegini, Fariba; Power, John H T; Majd, Shohreh

    2018-06-12

    Alzheimer's disease (AD) pathology consists of intraneuronal neurofibrillary tangles, made of hyperphosphorylated tau and extracellular accumulation of beta amyloid (Aβ) in Aβ plaques. There is an extensive debate as to which pathology initiates and responsible for cellular loss in AD. Using confocal and light microscopy, post mortem brains from control and AD cases, an antibody to SOD2 as a marker for mitochondria and an antibody to all forms of tau, we analyzed mitochondrial density in tau positive neurons along with nuclear degradation by calculating the raw integrative density. Our findings showed an extensive staining of aggregated tau in cell bodies, dystrophic neurites and neurofilaments in AD with minimal staining in control tissue, along with a marked decrease in mitochondria in tau positive (tau+) neurons. The control or tau negative (tau-) neurons in AD contained an even distribution of mitochondria, which was greatly diminished in tau+ neurons by 40%. There were no significant differences between control and tau- neurons in AD. Tau+ neurons showed marked nuclear degradation which appeared to progress with the extent of tau aggregation. The aggregated tau infiltrated and appeared to break the nuclear envelope with progressively more DNA exiting the nucleus and associating with accumulating of intracellular tau. We report mitochondrial decrease is likely due to a decrease in protein synthesis rather than a redistribution of mitochondria because of decreased axonal transport. We suggest that the decrease in mitochondria and nuclear degradation are key mechanisms for the neuronal loss seen in AD. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  16. Key to the Future”: British American Tobacco and Cigarette Smuggling in China

    PubMed Central

    Lee, Kelley; Collin, Jeff

    2006-01-01

    Background Cigarette smuggling is a major public health issue, stimulating increased tobacco consumption and undermining tobacco control measures. China is the ultimate prize among tobacco's emerging markets, and is also believed to have the world's largest cigarette smuggling problem. Previous work has demonstrated the complicity of British American Tobacco (BAT) in this illicit trade within Asia and the former Soviet Union. Methods and Findings This paper analyses internal documents of BAT available on site from the Guildford Depository and online from the BAT Document Archive. Documents dating from the early 1900s to 2003 were searched and indexed on a specially designed project database to enable the construction of an historical narrative. Document analysis incorporated several validation techniques within a hermeneutic process. This paper describes the huge scale of this illicit trade in China, amounting to billions of (United States) dollars in sales, and the key supply routes by which it has been conducted. It examines BAT's efforts to optimise earnings by restructuring operations, and controlling the supply chain and pricing of smuggled cigarettes. Conclusions Our research shows that smuggling has been strategically critical to BAT's ongoing efforts to penetrate the Chinese market, and to its overall goal to become the leading company within an increasingly global industry. These findings support the need for concerted efforts to strengthen global collaboration to combat cigarette smuggling. PMID:16834455

  17. Communicating with individuals receiving home mechanical ventilation: the experiences of key communication partners.

    PubMed

    Laakso, Katja; Markström, Agneta; Havstam, Christina; Idvall, Markus; Hartelius, Lena

    2014-01-01

    The aim of the study was to explore the communication experiences of key communications partners (CPs) of individuals receiving home mechanical ventilation (HMV), with particular emphasis on the possibilities, difficulties and limitations CPs experienced in communication, possible support given to facilitate communication and exploring what made a skilled communicator. A qualitative research design using interviews was used. The participants included 19 key CPs of individuals receiving HMV. The analysis resulted in five themes: Encountering communication limitations, Functional communication strategies, Being a communication facilitator, Role insecurity and Emotional reactions and coping. The findings revealed that CPs needed to develop partly new reference frames for communication. In particular, participants emphasised the need to understand and interpret subtle details in the communicative interaction. The findings are discussed in the light of previous research, in particular an earlier study exploring another perspective; the ventilator-supported individuals' experiences of communication. Issues relating to the educational needs of CPs of individuals receiving HMV are discussed. The results are intended to enhance understanding of the challenges that individuals receiving HMV and their CPs face with communication, which should be of relevance not only to speech therapists, but for all healthcare practitioners in the field of HMV.

  18. Rapid Recent Warming of Coral Reefs in the Florida Keys.

    PubMed

    Manzello, Derek P

    2015-11-16

    Coral reef decline in the Florida Keys has been well-publicized, controversial, and polarizing owing to debate over the causative agent being climate change versus overfishing. The recurrence of mass bleaching in 2014, the sixth event since 1987, prompted a reanalysis of temperature data. The summer and winter of 2014 were the warmest on record. The oldest known in-situ temperature record of any coral reef is from Hens and Chickens Reef (H&C) in the Florida Keys, which showed significant warming from 1975-2014. The average number of days ≥31.5 and 32(o)C per year increased 2670% and 2560%, respectively, from the mid-1990 s to present relative to the previous 20 years. In every year after 1992 and 1994, maximum daily average temperatures exceeded 30.5 and 31°C, respectively. From 1975-1994, temperatures were <31 °C in 61% of years, and in 44% of the years prior to 1992 temperatures were <30.5 °C. The measured rate of warming predicts the start of annual bleaching between 2020 and 2034, sooner than expected from climate models and satellite-based sea temperatures. These data show that thermal stress is increasing and occurring on a near-annual basis on Florida Keys reefs due to ocean warming from climate change.

  19. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  20. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  1. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  2. Continuous-variable quantum key distribution with 1 Mbps secure key rate.

    PubMed

    Huang, Duan; Lin, Dakai; Wang, Chao; Liu, Weiqi; Fang, Shuanghong; Peng, Jinye; Huang, Peng; Zeng, Guihua

    2015-06-29

    We report the first continuous-variable quantum key distribution (CVQKD) experiment to enable the creation of 1 Mbps secure key rate over 25 km standard telecom fiber in a coarse wavelength division multiplexers (CWDM) environment. The result is achieved with two major technological advances: the use of a 1 GHz shot-noise-limited homodyne detector and the implementation of a 50 MHz clock system. The excess noise due to noise photons from local oscillator and classical data channels in CWDM is controlled effectively. We note that the experimental verification of high-bit-rate CVQKD in the multiplexing environment is a significant step closer toward large-scale deployment in fiber networks.

  3. Supporting Police Community Support Officers to Become Effective School Link Officers: Key Stakeholder Perceptions of a Pilot Professional Development Programme

    ERIC Educational Resources Information Center

    Thomas, Lorraine; Trotman, Dave

    2017-01-01

    This article presents the findings of a pilot professional development programme designed to support police community support officers (PCSOs) to become effective school link officers (SLOs) within urban secondary schools in the English West Midlands. Findings are presented via perceptions of key stakeholders: SLOs themselves; school-based mentors…

  4. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  5. Key frame extraction based on spatiotemporal motion trajectory

    NASA Astrophysics Data System (ADS)

    Zhang, Yunzuo; Tao, Ran; Zhang, Feng

    2015-05-01

    Spatiotemporal motion trajectory can accurately reflect the changes of motion state. Motivated by this observation, this letter proposes a method for key frame extraction based on motion trajectory on the spatiotemporal slice. Different from the well-known motion related methods, the proposed method utilizes the inflexions of the motion trajectory on the spatiotemporal slice of all the moving objects. Experimental results show that although a similar performance is achieved in the single-objective screen, by comparing the proposed method to that achieved with the state-of-the-art methods based on motion energy or acceleration, the proposed method shows a better performance in a multiobjective video.

  6. Image use in field guides and identification keys: review and recommendations.

    PubMed

    Leggett, Roxanne; Kirchoff, Bruce K

    2011-01-01

    Although illustrations have played an important role in identification keys and guides since the 18th century, their use has varied widely. Some keys lack all illustrations, while others are heavily illustrated. Even within illustrated guides, the way in which images are used varies considerably. Here, we review image use in paper and electronic guides, and establish a set of best practices for image use in illustrated keys and guides. Our review covers image use in both paper and electronic guides, though we only briefly cover apps for mobile devices. With this one exception, we cover the full range of guides, from those that consist only of species descriptions with no keys, to lavishly illustrated technical keys. Emphasis is placed on how images are used, not on the operation of the guides and key, which has been reviewed by others. We only deal with operation when it impacts image use. Few illustrated keys or guides use images in optimal ways. Most include too few images to show taxonomic variation or variation in characters and character states. The use of multiple images allows easier taxon identification and facilitates the understanding of characters. Most images are usually not standardized, making comparison between images difficult. Although some electronic guides allow images to be enlarged, many do not. The best keys and guides use standardized images, displayed at sizes that are easy to see and arranged in a standardized manner so that similar images can be compared across species. Illustrated keys and glossaries should contain multiple images for each character state so that the user can judge variation in the state. Photographic backgrounds should not distract from the subject and, where possible, should be of a standard colour. When used, drawings should be prepared by professional botanical illustrators, and clearly labelled. Electronic keys and guides should allow images to be enlarged so that their details can be seen.

  7. Image use in field guides and identification keys: review and recommendations

    PubMed Central

    Leggett, Roxanne; Kirchoff, Bruce K.

    2011-01-01

    Background and aims Although illustrations have played an important role in identification keys and guides since the 18th century, their use has varied widely. Some keys lack all illustrations, while others are heavily illustrated. Even within illustrated guides, the way in which images are used varies considerably. Here, we review image use in paper and electronic guides, and establish a set of best practices for image use in illustrated keys and guides. Scope Our review covers image use in both paper and electronic guides, though we only briefly cover apps for mobile devices. With this one exception, we cover the full range of guides, from those that consist only of species descriptions with no keys, to lavishly illustrated technical keys. Emphasis is placed on how images are used, not on the operation of the guides and key, which has been reviewed by others. We only deal with operation when it impacts image use. Main points Few illustrated keys or guides use images in optimal ways. Most include too few images to show taxonomic variation or variation in characters and character states. The use of multiple images allows easier taxon identification and facilitates the understanding of characters. Most images are usually not standardized, making comparison between images difficult. Although some electronic guides allow images to be enlarged, many do not. Conclusions The best keys and guides use standardized images, displayed at sizes that are easy to see and arranged in a standardized manner so that similar images can be compared across species. Illustrated keys and glossaries should contain multiple images for each character state so that the user can judge variation in the state. Photographic backgrounds should not distract from the subject and, where possible, should be of a standard colour. When used, drawings should be prepared by professional botanical illustrators, and clearly labelled. Electronic keys and guides should allow images to be enlarged so that

  8. Secret Key Crypto Implementations

    NASA Astrophysics Data System (ADS)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  9. Treating Substance-Using Women and Their Children in Public Housing: Preliminary Evaluation Findings.

    ERIC Educational Resources Information Center

    Metsch, Lisa R.; Wolfe, Harlan P.; Fewell, Rebecca; McCoy, Clyde B.; Elwood, William N.; Wohler-Torres, Brad; Petersen-Baston, Pamela; Haskins, Henry V.

    2001-01-01

    SafePort is a residential substance abuse treatment program within public housing to provide drug treatment to parenting women in Key West, Florida. All family members--women, children, and significant others--receive comprehensive assessments to determine appropriate therapeutic interventions. Preliminary evaluation findings suggest that women…

  10. Social risk, stigma and space: key concepts for understanding HIV vulnerability among black men who have sex with men in New York City.

    PubMed

    Parker, Caroline M; Garcia, Jonathan; Philbin, Morgan M; Wilson, Patrick A; Parker, Richard G; Hirsch, Jennifer S

    2017-03-01

    Black men who have sex with men in the USA face disproportionate incidence rates of HIV. This paper presents findings from an ethnographic study conducted in New York City that explored the structural and socio-cultural factors shaping men's sexual relationships with the goal of furthering understandings of their HIV-related vulnerability. Methods included participant observation and in-depth interviews with 31 Black men who have sex with men (three times each) and 17 key informants. We found that HIV vulnerability is perceived as produced through structural inequalities including economic insecurity, housing instability, and stigma and discrimination. The theoretical concepts of social risk, intersectional stigma, and the social production of space are offered as lenses through which to analyse how structural inequalities shape HIV vulnerability. We found that social risk shaped HIV vulnerability by influencing men's decisions in four domains: 1) where to find sexual partners, 2) where to engage in sexual relationships, 3) what kinds of relationships to seek, and 4) whether to carry and to use condoms. Advancing conceptualisations of social risk, we show that intersectional stigma and the social production of space are key processes through which social risk generates HIV vulnerability among Black men who have sex with men.

  11. Social risk, stigma and space: key concepts for understanding HIV vulnerability among black men who have sex with men in New York City

    PubMed Central

    Parker, Caroline M.; Garcia, Jonathan; Philbin, Morgan M.; Wilson, Patrick A.; Parker, Richard G.; Hirsch, Jennifer S.

    2017-01-01

    Black men who have sex with men in the USA face disproportionate incidence rates of HIV. This paper presents findings from an ethnographic study conducted in New York City that explored the structural and socio-cultural factors shaping men’s sexual relationships with the goal of furthering understandings of their HIV-related vulnerability. Methods included participant observation and in-depth interviews with 31 Black men who have sex with men (three times each) and 17 key informants. We found that HIV vulnerability is perceived as produced through structural inequalities including economic insecurity, housing instability, and stigma and discrimination. The theoretical concepts of social risk, intersectional stigma, and the social production of space are offered as lenses through which to analyse how structural inequalities shape HIV vulnerability. We found that social risk shaped HIV vulnerability by influencing men’s decisions in four domains: 1) where to find sexual partners, 2) where to engage in sexual relationships, 3) what kinds of relationships to seek, and 4) whether to carry and to use condoms. Advancing conceptualisations of social risk, we show that intersectional stigma and the social production of space are key processes through which social risk generates HIV vulnerability among Black men who have sex with men. PMID:27550415

  12. The Power of Key: Celebrating 20 Years of Innovation at the Key Learning Community

    ERIC Educational Resources Information Center

    Kunkel, Christine

    2007-01-01

    The Key Learning Community in Indianapolis was the first school in the world to base its approach on the theory of multiple intelligences. Ms. Kunkel, Key's principal, reflects on the school's continuing growth and success--even in the face of pressures to standardize--and shares the history of its founding. (Contains 5 endnotes.)

  13. Measurement-device-independent quantum key distribution with source state errors and statistical fluctuation

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2017-03-01

    We show how to calculate the secure final key rate in the four-intensity decoy-state measurement-device-independent quantum key distribution protocol with both source errors and statistical fluctuations with a certain failure probability. Our results rely only on the range of only a few parameters in the source state. All imperfections in this protocol have been taken into consideration without assuming any specific error patterns of the source.

  14. Addressing College Drinking as a Statewide Public Health Problem: Key Findings From the Maryland Collaborative.

    PubMed

    Arria, Amelia M; Jernigan, David H

    2018-03-01

    Excessive drinking among college students is a serious and pervasive public health problem. Although much research attention has focused on developing and evaluating evidence-based practices to address college drinking, adoption has been slow. The Maryland Collaborative to Reduce College Drinking and Related Problems was established in 2012 to bring together a network of institutions of higher education in Maryland to collectively address college drinking by using both individual-level and environmental-level evidence-based approaches. In this article, the authors describe the findings of this multilevel, multicomponent statewide initiative. To date, the Maryland Collaborative has succeeded in providing a forum for colleges to share knowledge and experiences, strengthen existing strategies, and engage in a variety of new activities. Administration of an annual student survey has been useful for guiding interventions as well as evaluating progress toward the Maryland Collaborative's goal to measurably reduce high-risk drinking and its radiating consequences on student health, safety, and academic performance and on the communities surrounding college campuses. The experiences of the Maryland Collaborative exemplify real-world implementation of evidence-based approaches to reduce this serious public health problem.

  15. Coherent attacking continuous-variable quantum key distribution with entanglement in the middle

    NASA Astrophysics Data System (ADS)

    Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying

    2018-06-01

    We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.

  16. The Five Key Questions of Human Performance Modeling.

    PubMed

    Wu, Changxu

    2018-01-01

    Via building computational (typically mathematical and computer simulation) models, human performance modeling (HPM) quantifies, predicts, and maximizes human performance, human-machine system productivity and safety. This paper describes and summarizes the five key questions of human performance modeling: 1) Why we build models of human performance; 2) What the expectations of a good human performance model are; 3) What the procedures and requirements in building and verifying a human performance model are; 4) How we integrate a human performance model with system design; and 5) What the possible future directions of human performance modeling research are. Recent and classic HPM findings are addressed in the five questions to provide new thinking in HPM's motivations, expectations, procedures, system integration and future directions.

  17. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  18. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  19. Feasibility of continuous-variable quantum key distribution with noisy coherent states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Usenko, Vladyslav C.; Department of Optics, Palacky University, CZ-772 07 Olomouc; Filip, Radim

    2010-02-15

    We address security of the quantum key distribution scheme based on the noisy modulation of coherent states and investigate how it is robust against noise in the modulation regardless of the particular technical implementation. As the trusted preparation noise is shown to be security breaking even for purely lossy channels, we reveal the essential difference between two types of trusted noise, namely sender-side preparation noise and receiver-side detection noise, the latter being security preserving. We consider the method of sender-side state purification to compensate the preparation noise and show its applicability in the realistic conditions of channel loss, untrusted channelmore » excess noise, and trusted detection noise. We show that purification makes the scheme robust to the preparation noise (i.e., even the arbitrary noisy coherent states can in principle be used for the purpose of quantum key distribution). We also take into account the effect of realistic reconciliation and show that the purification method is still efficient in this case up to a limited value of preparation noise.« less

  20. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  1. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  2. Children's and Young People's Reading in 2013: Findings from the 2013 National Literacy Trust's Annual Survey

    ERIC Educational Resources Information Center

    Clark, Christina

    2014-01-01

    This report outlines findings about children's and young people's reading from our fourth annual literacy survey conducted in November/December 2013. 29,422 young people aged eight to 16 participated. Some of the key findings for 2013 include: (1) Levels of reading enjoyment have improved for the first time since 2005 (see Figure 2, p. 9); (2)…

  3. Children's and Young People's Writing in 2012: Findings from the National Literacy Trust's Annual Literacy Survey

    ERIC Educational Resources Information Center

    Clark, Christina

    2013-01-01

    This report outlines findings that relate to writing, taken from the third annual literacy survey, which was conducted in November/December 2012. 34,910 young people aged 8 to 16 participated. Key findings include: (1) 44.1% of children and young people enjoy writing either "very much" or "quite a lot"; 14.8% of children and…

  4. Projecting biodiversity and wood production in future forest landscapes: 15 key modeling considerations.

    PubMed

    Felton, Adam; Ranius, Thomas; Roberge, Jean-Michel; Öhman, Karin; Lämås, Tomas; Hynynen, Jari; Juutinen, Artti; Mönkkönen, Mikko; Nilsson, Urban; Lundmark, Tomas; Nordin, Annika

    2017-07-15

    A variety of modeling approaches can be used to project the future development of forest systems, and help to assess the implications of different management alternatives for biodiversity and ecosystem services. This diversity of approaches does however present both an opportunity and an obstacle for those trying to decide which modeling technique to apply, and interpreting the management implications of model output. Furthermore, the breadth of issues relevant to addressing key questions related to forest ecology, conservation biology, silviculture, economics, requires insights stemming from a number of distinct scientific disciplines. As forest planners, conservation ecologists, ecological economists and silviculturalists, experienced with modeling trade-offs and synergies between biodiversity and wood biomass production, we identified fifteen key considerations relevant to assessing the pros and cons of alternative modeling approaches. Specifically we identified key considerations linked to study question formulation, modeling forest dynamics, forest processes, study landscapes, spatial and temporal aspects, and the key response metrics - biodiversity and wood biomass production, as well as dealing with trade-offs and uncertainties. We also provide illustrative examples from the modeling literature stemming from the key considerations assessed. We use our findings to reiterate the need for explicitly addressing and conveying the limitations and uncertainties of any modeling approach taken, and the need for interdisciplinary research efforts when addressing the conservation of biodiversity and sustainable use of environmental resources. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. A conceptual and statistical framework for adaptive radiations with a key role for diversity dependence.

    PubMed

    Etienne, Rampal S; Haegeman, Bart

    2012-10-01

    In this article we propose a new framework for studying adaptive radiations in the context of diversity-dependent diversification. Diversity dependence causes diversification to decelerate at the end of an adaptive radiation but also plays a key role in the initial pulse of diversification. In particular, key innovations (which in our definition include novel traits as well as new environments) may cause decoupling of the diversity-dependent dynamics of the innovative clade from the diversity-dependent dynamics of its ancestral clade. We present a likelihood-based inference method to test for decoupling of diversity dependence using molecular phylogenies. The method, which can handle incomplete phylogenies, identifies when the decoupling took place and which diversification parameters are affected. We illustrate our approach by applying it to the molecular phylogeny of the North American clade of the legume tribe Psoraleeae (47 extant species, of which 4 are missing). Two diversification rate shifts were previously identified for this clade; our analysis shows that the first, positive shift can be associated with decoupling of two Pediomelum subgenera from the other Psoraleeae lineages, while we argue that the second, negative shift can be attributed to speciation being protracted. The latter explanation yields nonzero extinction rates, in contrast to previous findings. Our framework offers a new perspective on macroevolution: new environments and novel traits (ecological opportunity) and diversity dependence (ecological limits) cannot be considered separately.

  6. [Key effect genes responding to nerve injury identified by gene ontology and computer pattern recognition].

    PubMed

    Pan, Qian; Peng, Jin; Zhou, Xue; Yang, Hao; Zhang, Wei

    2012-07-01

    In order to screen out important genes from large gene data of gene microarray after nerve injury, we combine gene ontology (GO) method and computer pattern recognition technology to find key genes responding to nerve injury, and then verify one of these screened-out genes. Data mining and gene ontology analysis of gene chip data GSE26350 was carried out through MATLAB software. Cd44 was selected from screened-out key gene molecular spectrum by comparing genes' different GO terms and positions on score map of principal component. Function interferences were employed to influence the normal binding of Cd44 and one of its ligands, chondroitin sulfate C (CSC), to observe neurite extension. Gene ontology analysis showed that the first genes on score map (marked by red *) mainly distributed in molecular transducer activity, receptor activity, protein binding et al molecular function GO terms. Cd44 is one of six effector protein genes, and attracted us with its function diversity. After adding different reagents into the medium to interfere the normal binding of CSC and Cd44, varying-degree remissions of CSC's inhibition on neurite extension were observed. CSC can inhibit neurite extension through binding Cd44 on the neuron membrane. This verifies that important genes in given physiological processes can be identified by gene ontology analysis of gene chip data.

  7. Implementing recovery: an analysis of the key technologies in Scotland

    PubMed Central

    2011-01-01

    Background Over the past ten years the promotion of recovery has become a stated aim of mental health policies within a number of English speaking countries, including Scotland. Implementation of a recovery approach involves a significant reorientation of mental health services and practices, which often poses significant challenges for reformers. This article examines how four key technologies of recovery have assisted in the move towards the creation of a recovery-oriented mental health system in Scotland. Methods Drawing on documentary analysis and a series of interviews we examine the construction and implementation of four key recovery 'technologies' as they have been put to use in Scotland: recovery narratives, the Scottish Recovery Indicator (SRI), Wellness Recovery Action Planning (WRAP) and peer support. Results Our findings illuminate how each of these technologies works to instantiate, exemplify and disseminate a 'recovery orientation' at different sites within the mental health system in order to bring about a 'recovery oriented' mental health system. They also enable us to identify some of the factors that facilitate or hinder the effectiveness of those technologies in bringing about a change in how mental health services are delivered in Scotland. These finding provide a basis for some general reflections on the utility of 'recovery technologies' to implement a shift towards recovery in mental health services in Scotland and elsewhere. Conclusions Our analysis of this process within the Scottish context will be valuable for policy makers and service coordinators wishing to implement recovery values within their own national mental health systems. PMID:21569633

  8. Final Report: Summary of Findings and Recommendations for Suction Devices for Management of Prehospital Combat Casualty Care Injuries

    DTIC Science & Technology

    2017-11-13

    information and proposes a series of findings and recommendations to improved airway management in the prehospital combat environment. The key...Airway Final Report: Summary of Findings and Recommendations for Suction Devices for Management of Prehospital Combat Casualty Care Injuries...75 General Information and Device Usability

  9. Contributions from associative and explicit sequence knowledge to the execution of discrete keying sequences.

    PubMed

    Verwey, Willem B

    2015-05-01

    Research has provided many indications that highly practiced 6-key sequences are carried out in a chunking mode in which key-specific stimuli past the first are largely ignored. When in such sequences a deviating stimulus occasionally occurs at an unpredictable location, participants fall back to responding to individual stimuli (Verwey & Abrahamse, 2012). The observation that in such a situation execution still benefits from prior practice has been attributed to the possibility to operate in an associative mode. To better understand the contribution to the execution of keying sequences of motor chunks, associative sequence knowledge and also of explicit sequence knowledge, the present study tested three alternative accounts for the earlier finding of an execution rate increase at the end of 6-key sequences performed in the associative mode. The results provide evidence that the earlier observed execution rate increase can be attributed to the use of explicit sequence knowledge. In the present experiment this benefit was limited to sequences that are executed at the moderately fast rates of the associative mode, and occurred at both the earlier and final elements of the sequences. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  11. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    PubMed Central

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  12. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  13. Nanotechnology in Mexico: Key Findings Based on OECD Criteria

    ERIC Educational Resources Information Center

    Foladori, Guillermo; Arteaga Figueroa, Edgar; Záyago Lau, Edgar; Appelbaum, Richard; Robles-Belmont, Eduardo; Villa, Liliana; Parker, Rachel; Leos, Vanessa

    2015-01-01

    This analysis of Mexico's nanotechnology policies utilizes indicators developed by the Organization for Economic Co-operation and Development, which in 2008 conducted a pilot survey comparing the nanotechnology policies of 24 countries. In this paper, we apply the same questionnaire to the Mexican case, adding business information derived from the…

  14. Stakeholder Perspectives on a Culture of Health: Key Findings.

    PubMed

    Acosta, Joie D; Whitley, Margaret D; May, Linnea Warren; Dubowitz, Tamara; Williams, Malcolm V; Chandra, Anita

    2017-06-01

    Since 2013, the Robert Wood Johnson Foundation (RWJF) has embarked on a pioneering effort to advance a Culture of Health. The Culture of Health action framework is founded on a vision in which "everyone in our diverse society leads healthier lives now and for generations to come." To put the Culture of Health vision into action, RWJF asked RAND Health to support the development of an action framework and measurement strategy. This article summarizes the stakeholder engagement efforts that RAND used to inform this work. It draws on a series of interviews and focus groups that RAND researchers conducted with stakeholders both within and outside the United States. It should be of interest to RWJF, as well as to those individuals and organizations interested in advancing the Culture of Health action framework. Given that RWJF is focused on using the Culture of Health action framework and measures to catalyze national dialogue about content and investments to improve population health and well-being, the study should be beneficial to a range of national, state, and local leaders across a variety of sectors that contribute to health as described by the Culture of Health action framework.

  15. Blended learning on family planning policy requirements: key findings and implications for health professionals.

    PubMed

    Limaye, Rupali J; Ahmed, Naheed; Ohkubo, Saori; Ballard, Anne

    2018-04-01

    To address unmet needs for family planning and advance women's rights, US federal foreign aid recipients must ensure compliance with the family planning legislative and policy requirements. Because many health providers work in rural and remote settings, blended learning, which combines in-person and online experiences, is a promising approach for strengthening their compliance knowledge. This cross-sectional study examined the effect of blended learning that included three components (online course, in-person training and conference call) on retention of family planning compliance knowledge. A total of 660 learners from 44 countries completed the online survey (8% response rate). Study participants were asked about their knowledge of family planning compliance and suggestions to improve their learning experiences. Knowledge retention was higher in the group that utilised all three learning approaches compared with the online course plus conference call group (P<0.05). Participants who took the online course multiple times tended to retain knowledge better than respondents who took it only once, although this result was not statistically significant. The study relied on a convenience sample, which may contribute to bias. The response rate, while low at 8%, was representative of the user base, and included 660 respondents. Participation in a blended learning training resulted in the highest gains in knowledge retention compared with online-only learning. These findings suggest that blended learning and repeat online trainings are critical to ensuring health professionals are aware of family planning compliance regulations. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. Harry Potter and the Dichotomous Key

    ERIC Educational Resources Information Center

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  17. "Key Concepts in ELT": Taking Stock

    ERIC Educational Resources Information Center

    Hall, Graham

    2012-01-01

    This article identifies patterns and trends within "Key Concepts in ELT", both since the inception of the feature in ELT Journal in 1993 and during the 17 years of the current editorship. After outlining the aims of the series, the article identifies key themes that have emerged over time, exploring the links between "Key Concepts" pieces and the…

  18. Key-Generation Algorithms for Linear Piece In Hand Matrix Method

    NASA Astrophysics Data System (ADS)

    Tadaki, Kohtaro; Tsujii, Shigeo

    The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Gröbner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.

  19. Are Key Principles for improved health technology assessment supported and used by health technology assessment organizations?

    PubMed

    Neumann, Peter J; Drummond, Michael F; Jönsson, Bengt; Luce, Bryan R; Schwartz, J Sanford; Siebert, Uwe; Sullivan, Sean D

    2010-01-01

    Previously, our group-the International Working Group for HTA Advancement-proposed a set of fifteen Key Principles that could be applied to health technology assessment (HTA) programs in different jurisdictions and across a range of organizations and perspectives. In this commentary, we investigate the extent to which these principles are supported and used by fourteen selected HTA organizations worldwide. We find that some principles are broadly supported: examples include being explicit about HTA goals and scope; considering a wide range of evidence and outcomes; and being unbiased and transparent. Other principles receive less widespread support: examples are addressing issues of generalizability and transferability; being transparent on the link between HTA findings and decision-making processes; considering a full societal perspective; and monitoring the implementation of HTA findings. The analysis also suggests a lack of consensus in the field about some principles--for example, considering a societal perspective. Our study highlights differences in the uptake of key principles for HTA and indicates considerable room for improvement for HTA organizations to adopt principles identified to reflect good HTA practices. Most HTA organizations espouse certain general concepts of good practice--for example, assessments should be unbiased and transparent. However, principles that require more intensive follow-up--for example, monitoring the implementation of HTA findings--have received little support and execution.

  20. In search of the last common ancestor: new findings on wild chimpanzees

    PubMed Central

    McGrew, W. C.

    2010-01-01

    Modelling the behaviour of extinct hominins is essential in order to devise useful hypotheses of our species' evolutionary origins for testing in the palaeontological and archaeological records. One approach is to model the last common ancestor (LCA) of living apes and humans, based on current ethological and ecological knowledge of our closest living relations. Such referential modelling is based on rigorous, ongoing field studies of the chimpanzee (Pan troglodytes) and the bonobo (Pan paniscus). This paper reviews recent findings from nature, focusing on those with direct implications for hominin evolution, e.g. apes, using elementary technology to access basic resources such as food and water, or sheltering in caves or bathing as thermoregulatory adaptations. I give preference to studies that directly address key issues, such as whether stone artefacts are detectible before the Oldowan, based on the percussive technology of hammer and anvil use by living apes. Detailed comparative studies of chimpanzees living in varied habitats, from rainforest to savannah, reveal that some behavioural patterns are universal (e.g. shelter construction), while others show marked (e.g. extractive foraging) or nuanced (e.g. courtship) cross-populational variation. These findings allow us to distinguish between retained, primitive traits of the LCA versus derived ones in the human lineage. PMID:20855301

  1. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    PubMed

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  2. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study

    PubMed Central

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Background and Objective: Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. Methods: This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. Results: The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. Conclusion: In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making. PMID:29854016

  3. Key role of symbiotic dinitrogen fixation in tropical forest secondary succession

    NASA Astrophysics Data System (ADS)

    Batterman, Sarah A.; Hedin, Lars O.; van Breugel, Michiel; Ransijn, Johannes; Craven, Dylan J.; Hall, Jefferson S.

    2013-10-01

    Forests contribute a significant portion of the land carbon sink, but their ability to sequester CO2 may be constrained by nitrogen, a major plant-limiting nutrient. Many tropical forests possess tree species capable of fixing atmospheric dinitrogen (N2), but it is unclear whether this functional group can supply the nitrogen needed as forests recover from disturbance or previous land use, or expand in response to rising CO2 (refs 6, 8). Here we identify a powerful feedback mechanism in which N2 fixation can overcome ecosystem-scale deficiencies in nitrogen that emerge during periods of rapid biomass accumulation in tropical forests. Over a 300-year chronosequence in Panama, N2-fixing tree species accumulated carbon up to nine times faster per individual than their non-fixing neighbours (greatest difference in youngest forests), and showed species-specific differences in the amount and timing of fixation. As a result of fast growth and high fixation, fixers provided a large fraction of the nitrogen needed to support net forest growth (50,000kg carbon per hectare) in the first 12years. A key element of ecosystem functional diversity was ensured by the presence of different N2-fixing tree species across the entire forest age sequence. These findings show that symbiotic N2 fixation can have a central role in nitrogen cycling during tropical forest stand development, with potentially important implications for the ability of tropical forests to sequester CO2.

  4. Key role of symbiotic dinitrogen fixation in tropical forest secondary succession.

    PubMed

    Batterman, Sarah A; Hedin, Lars O; van Breugel, Michiel; Ransijn, Johannes; Craven, Dylan J; Hall, Jefferson S

    2013-10-10

    Forests contribute a significant portion of the land carbon sink, but their ability to sequester CO2 may be constrained by nitrogen, a major plant-limiting nutrient. Many tropical forests possess tree species capable of fixing atmospheric dinitrogen (N2), but it is unclear whether this functional group can supply the nitrogen needed as forests recover from disturbance or previous land use, or expand in response to rising CO2 (refs 6, 8). Here we identify a powerful feedback mechanism in which N2 fixation can overcome ecosystem-scale deficiencies in nitrogen that emerge during periods of rapid biomass accumulation in tropical forests. Over a 300-year chronosequence in Panama, N2-fixing tree species accumulated carbon up to nine times faster per individual than their non-fixing neighbours (greatest difference in youngest forests), and showed species-specific differences in the amount and timing of fixation. As a result of fast growth and high fixation, fixers provided a large fraction of the nitrogen needed to support net forest growth (50,000 kg carbon per hectare) in the first 12 years. A key element of ecosystem functional diversity was ensured by the presence of different N2-fixing tree species across the entire forest age sequence. These findings show that symbiotic N2 fixation can have a central role in nitrogen cycling during tropical forest stand development, with potentially important implications for the ability of tropical forests to sequester CO2.

  5. Key Nutrients.

    ERIC Educational Resources Information Center

    Federal Extension Service (USDA), Washington, DC.

    Lessons written to help trainer agents prepare aides for work with families in the Food and Nutrition Program are presented in this booklet. The key nutrients discussed in the 10 lessons are protein, carbohydrates, fat, calcium, iron, iodine, and Vitamins A, B, C, and D. the format of each lesson is as follows: Purpose, Presentation, Application…

  6. Toward Dysfunctional Connectivity: A Review of Neuroimaging Findings in Pediatric Major Depressive Disorder

    PubMed Central

    Hulvershorn, Leslie; Cullen, Kathryn; Anand, Amit

    2011-01-01

    Child and adolescent psychiatric neuroimaging research typically lags behind similar advances in adult disorders. While the pediatric depression imaging literature is less developed, a recent surge in interest has created the need for a synthetic review of this work. Major findings from pediatric volumetric and functional magnetic resonance imaging (fMRI), magnetic resonance spectroscopy (MRS), diffusion tensor imaging (DTI) and resting state functional connectivity studies converge to implicate a corticolimbic network of key areas that work together to mediate the task of emotion regulation. Imaging the brain of children and adolescents with unipolar depression began with volumetric studies of isolated brain regions that served to identify key prefrontal, cingulate and limbic nodes of depression-related circuitry elucidated from more recent advances in DTI and functional connectivity imaging. Systematic review of these studies preliminarily suggests developmental differences between findings in youth and adults, including prodromal neurobiological features, along with some continuity across development. PMID:21901425

  7. A qualitative study of the perspectives of key stakeholders on the delivery of clinical academic training in the East Midlands.

    PubMed

    Green, Ruth H; Evans, Val; MacLeod, Sheona; Barratt, Jonathan

    2018-02-01

    Major changes in the design and delivery of clinical academic training in the United Kingdom have occurred yet there has been little exploration of the perceptions of integrated clinic academic trainees or educators. We obtained the views of a range of key stakeholders involved in clinical academic training in the East Midlands. A qualitative study with inductive iterative thematic content analysis of findings from trainee surveys and facilitated focus groups. The East Midlands School of Clinical Academic Training. Integrated Clinical Academic Trainees, clinical and academic educators involved in clinical academic training. The experience, opinions and beliefs of key stakeholders about barriers and enablers in the delivery of clinical academic training. We identified key themes many shared by both trainees and educators. These highlighted issues in the systems and process of the integrated academic pathways, career pathways, supervision and support, the assessment process and the balance between clinical and academic training. Our findings help inform the future development of integrated academic training programmes.

  8. Teaching Competences Necessary for Developing Key Competences of Primary Education Students in Spain: Teacher Assessments

    ERIC Educational Resources Information Center

    De-Juanas Oliva, Ángel; Martín del Pozo, Rosa; Pesquero Franco, Encarnación

    2016-01-01

    In Spain the syllabus of primary education students and their future teachers is broken down by competences. As teacher educators we were interested in finding out "which teaching competences teachers consider are most necessary to facilitate learning of student key competences." Therefore, we conducted a study with a sample of 286…

  9. "Health regains but livelihoods lag": findings from a study with people on ART in Zambia and Kenya.

    PubMed

    Samuels, Fiona A; Rutenberg, Naomi

    2011-06-01

    Although ART is increasingly accessible and eases some stresses, it creates other challenges including the importance of food security to enhance ART-effectiveness. This paper explores the role livelihood strategies play in achieving food security and maintaining nutritional status among ART patients in Kenya and Zambia. Ongoing quantitative studies exploring adherence to ART in Mombasa, Kenya (n=118) and in Lusaka, Zambia (n=375) were used to identify the relationship between BMI and adherence; an additional set of in-depth interviews with people on ART (n=32) and members of their livelihood networks (n=64) were undertaken. Existing frameworks and scales for measuring food security and a positive deviance approach was used to analyse data. Findings show the majority of people on ART in Zambia are food insecure; similarly most respondents in both countries report missing meals. Snacking is important for dietary intake, especially in Kenya. Most food is purchased in both countries. Having assets is key for achieving livelihood security in both Kenya and Zambia. Food supplementation is critical to survival and for developing social capital since most is shared amongst family members and others. Whilst family and friends are key to an individual's livelihood network, often more significant for daily survival is proximity to people and the ability to act immediately, characteristics most often found amongst neighbours and tenants. In both countries findings show that with ART health has rebounded but livelihoods lag. Similarly, in both countries respondents with high adherence and high BMI are more self-reliant, have multiple income sources and assets; those with low adherence and low BMI have more tenuous livelihoods and were less likely to have farms/gardens. Food supplementation is, therefore, not a long-term solution. Building on existing livelihood strategies represents an alternative for programme managers and policy-makers as do other strategies including

  10. KEY COMPARISON: Final report on CCQM-K69 key comparison: Testosterone glucuronide in human urine

    NASA Astrophysics Data System (ADS)

    Liu, Fong-Ha; Mackay, Lindsey; Murby, John

    2010-01-01

    The CCQM-K69 key comparison of testosterone glucuronide in human urine was organized under the auspices of the CCQM Organic Analysis Working Group (OAWG). The National Measurement Institute Australia (NMIA) acted as the coordinating laboratory for the comparison. The samples distributed for the key comparison were prepared at NMIA with funding from the World Anti-Doping Agency (WADA). WADA granted the approval for this material to be used for the intercomparison provided the distribution and handling of the material were strictly controlled. Three national metrology institutes (NMIs)/designated institutes (DIs) developed reference methods and submitted data for the key comparison along with two other laboratories who participated in the parallel pilot study. A good selection of analytical methods and sample workup procedures was displayed in the results submitted considering the complexities of the matrix involved. The comparability of measurement results was successfully demonstrated by the participating NMIs. Only the key comparison data were used to estimate the key comparison reference value (KCRV), using the arithmetic mean approach. The reported expanded uncertainties for results ranged from 3.7% to 6.7% at the 95% level of confidence and all results agreed within the expanded uncertainty of the KCRV. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  11. Online Information Exchanges for Parents of Children With a Rare Health Condition: Key Findings From an Online Support Community

    PubMed Central

    Campo, Shelly; Lowe, John; Andsager, Julie; Morcuende, Jose A

    2013-01-01

    Background The Internet provides new opportunities for parents of children with difficult illnesses and disabilities to find information and support. The Internet is particularly important for caregivers of children with special needs due to numerous health-related decisions they face. For at-risk populations, online support communities can become key settings and channels for health promotion and communication. Objective This study is an initial exploration of the information-seeking and information-provision processes present in an online support community, which is an area of opportunity and interest for Internet-based medical research and practice. The aim of this study was to explore and describe information-related processes of uncertainty management in relationship to clubfoot. Specifically, the study explored interpersonal communication (information seeking and provision) in an online support community serving the needs of parents of children with clubfoot. Methods The study population consisted of messages posted to an online community by caregivers (parents) of children with clubfoot. The theoretical framework informing the study was the Uncertainty Management Theory (UMT). The study used content analysis to explore and categorize the content of 775 messages. Results Women authored 664 of 775 messages (86%) and men authored 47 messages (6%). Caregivers managed uncertainty through information seeking and provision behaviors that were dynamic and multilayered. The ratio of information-seeking messages to information-provision responses was 1 to 4. All five types of information-seeking behaviors proposed by Brashers’ schema were identified, most of them being correlated. Information seeking using direct questions was found to be positively correlated to self-disclosure (r=.538), offering of a candidate answer (r=.318), and passive information seeking (r=.253). Self-disclosure was found to be positively correlated to provision of a candidate answer (r=.324

  12. Practical challenges in quantum key distribution

    DOE PAGES

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...

    2016-11-08

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  13. Practical challenges in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  14. Interventions and assessment tools addressing key concepts people need to know to appraise claims about treatment effects: a systematic mapping review.

    PubMed

    Austvoll-Dahlgren, Astrid; Nsangi, Allen; Semakula, Daniel

    2016-12-29

    People's ability to appraise claims about treatment effects is crucial for informed decision-making. Our objective was to systematically map this area of research in order to (a) provide an overview of interventions targeting key concepts that people need to understand to assess treatment claims and (b) to identify assessment tools used to evaluate people's understanding of these concepts. The findings of this review provide a starting point for decisions about which key concepts to address when developing new interventions, and which assessment tools should be considered. We conducted a systematic mapping review of interventions and assessment tools addressing key concepts important for people to be able to assess treatment claims. A systematic literature search was done by a reserach librarian in relevant databases. Judgement about inclusion of studies and data collection was done by at least two researchers. We included all quantitative study designs targeting one or more of the key concepts, and targeting patients, healthy members of the public, and health professionals. The studies were divided into four categories: risk communication and decision aids, evidence-based medicine and critical appraisal, understanding of controlled trials, and science education. Findings were summarised descriptively. We included 415 studies, of which the interventions and assessment tools we identified included only a handful of the key concepts. The most common key concepts in interventions were "Treatments usually have beneficial and harmful effects," "Treatment comparisons should be fair," "Compare like with like," and "Single studies can be misleading." A variety of assessment tools were identified, but only four assessment tools included 10 or more key concepts. There is great potential for developing learning and assessment tools targeting key concepts that people need to understand to assess claims about treatment effects. There is currently no instrument covering

  15. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  16. 3-D simulations of M9 earthquakes on the Cascadia Megathrust: Key parameters and uncertainty

    USGS Publications Warehouse

    Wirth, Erin; Frankel, Arthur; Vidale, John; Marafi, Nasser A.; Stephenson, William J.

    2017-01-01

    Geologic and historical records indicate that the Cascadia subduction zone is capable of generating large, megathrust earthquakes up to magnitude 9. The last great Cascadia earthquake occurred in 1700, and thus there is no direct measure on the intensity of ground shaking or specific rupture parameters from seismic recordings. We use 3-D numerical simulations to generate broadband (0-10 Hz) synthetic seismograms for 50 M9 rupture scenarios on the Cascadia megathrust. Slip consists of multiple high-stress drop subevents (~M8) with short rise times on the deeper portion of the fault, superimposed on a background slip distribution with longer rise times. We find a >4x variation in the intensity of ground shaking depending upon several key parameters, including the down-dip limit of rupture, the slip distribution and location of strong-motion-generating subevents, and the hypocenter location. We find that extending the down-dip limit of rupture to the top of the non-volcanic tremor zone results in a ~2-3x increase in peak ground acceleration for the inland city of Seattle, Washington, compared to a completely offshore rupture. However, our simulations show that allowing the rupture to extend to the up-dip limit of tremor (i.e., the deepest rupture extent in the National Seismic Hazard Maps), even when tapering the slip to zero at the down-dip edge, results in multiple areas of coseismic coastal uplift. This is inconsistent with coastal geologic evidence (e.g., buried soils, submerged forests), which suggests predominantly coastal subsidence for the 1700 earthquake and previous events. Defining the down-dip limit of rupture as the 1 cm/yr locking contour (i.e., mostly offshore) results in primarily coseismic subsidence at coastal sites. We also find that the presence of deep subevents can produce along-strike variations in subsidence and ground shaking along the coast. Our results demonstrate the wide range of possible ground motions from an M9 megathrust earthquake in

  17. Key principles for a national clinical decision support knowledge sharing framework: synthesis of insights from leading subject matter experts

    PubMed Central

    Hongsermeier, Tonya; Wright, Adam; Lewis, Janet; Bell, Douglas S; Middleton, Blackford

    2013-01-01

    Objective To identify key principles for establishing a national clinical decision support (CDS) knowledge sharing framework. Materials and methods As part of an initiative by the US Office of the National Coordinator for Health IT (ONC) to establish a framework for national CDS knowledge sharing, key stakeholders were identified. Stakeholders' viewpoints were obtained through surveys and in-depth interviews, and findings and relevant insights were summarized. Based on these insights, key principles were formulated for establishing a national CDS knowledge sharing framework. Results Nineteen key stakeholders were recruited, including six executives from electronic health record system vendors, seven executives from knowledge content producers, three executives from healthcare provider organizations, and three additional experts in clinical informatics. Based on these stakeholders' insights, five key principles were identified for effectively sharing CDS knowledge nationally. These principles are (1) prioritize and support the creation and maintenance of a national CDS knowledge sharing framework; (2) facilitate the development of high-value content and tooling, preferably in an open-source manner; (3) accelerate the development or licensing of required, pragmatic standards; (4) acknowledge and address medicolegal liability concerns; and (5) establish a self-sustaining business model. Discussion Based on the principles identified, a roadmap for national CDS knowledge sharing was developed through the ONC's Advancing CDS initiative. Conclusion The study findings may serve as a useful guide for ongoing activities by the ONC and others to establish a national framework for sharing CDS knowledge and improving clinical care. PMID:22865671

  18. Key principles for a national clinical decision support knowledge sharing framework: synthesis of insights from leading subject matter experts.

    PubMed

    Kawamoto, Kensaku; Hongsermeier, Tonya; Wright, Adam; Lewis, Janet; Bell, Douglas S; Middleton, Blackford

    2013-01-01

    To identify key principles for establishing a national clinical decision support (CDS) knowledge sharing framework. As part of an initiative by the US Office of the National Coordinator for Health IT (ONC) to establish a framework for national CDS knowledge sharing, key stakeholders were identified. Stakeholders' viewpoints were obtained through surveys and in-depth interviews, and findings and relevant insights were summarized. Based on these insights, key principles were formulated for establishing a national CDS knowledge sharing framework. Nineteen key stakeholders were recruited, including six executives from electronic health record system vendors, seven executives from knowledge content producers, three executives from healthcare provider organizations, and three additional experts in clinical informatics. Based on these stakeholders' insights, five key principles were identified for effectively sharing CDS knowledge nationally. These principles are (1) prioritize and support the creation and maintenance of a national CDS knowledge sharing framework; (2) facilitate the development of high-value content and tooling, preferably in an open-source manner; (3) accelerate the development or licensing of required, pragmatic standards; (4) acknowledge and address medicolegal liability concerns; and (5) establish a self-sustaining business model. Based on the principles identified, a roadmap for national CDS knowledge sharing was developed through the ONC's Advancing CDS initiative. The study findings may serve as a useful guide for ongoing activities by the ONC and others to establish a national framework for sharing CDS knowledge and improving clinical care.

  19. High key rate continuous-variable quantum key distribution with a real local oscillator.

    PubMed

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Ma, Hongxin; Wang, Shiyu; Zeng, Guihua

    2018-02-05

    Continuous-variable quantum key distribution (CVQKD) with a real local oscillator (LO) has been extensively studied recently due to its security and simplicity. In this paper, we propose a novel implementation of a high-key-rate CVQKD with a real LO. Particularly, with the help of the simultaneously generated reference pulse, the phase drift of the signal is tracked in real time and then compensated. By utilizing the time and polarization multiplexing techniques to isolate the reference pulse and controlling the intensity of it, not only the contamination from it is suppressed, but also a high accuracy of the phase compensation can be guaranteed. Besides, we employ homodyne detection on the signal to ensure the high quantum efficiency and heterodyne detection on the reference pulse to acquire the complete phase information of it. In order to suppress the excess noise, a theoretical noise model for our scheme is established. According to this model, the impact of the modulation variance and the intensity of the reference pulse are both analysed theoretically and then optimized according to the experimental data. By measuring the excess noise in the 25km optical fiber transmission system, a 3.14Mbps key rate in the asymptotic regime proves to be achievable. This work verifies the feasibility of the high-key-rate CVQKD with a real LO within the metropolitan area.

  20. Model of the Students' Key Competences Development through Interactive Whiteboard in the Subject of Technology

    ERIC Educational Resources Information Center

    Brecka, Peter; Valentová, Monika

    2017-01-01

    The basis of the submitted study are the continuously rising demands to alter the curricula with the aim to develop students' key competences in order to increase their professional versatility. The lack of scientific research and discussions show that little investigation has been done on the issue of development of key competences. Therefore,…