Science.gov

Sample records for minimizing malicious behavior

  1. Behavioral biometrics for verification and recognition of malicious software agents

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  2. Associations between Peer Nominations, Teacher Ratings, Self-Reports, and Observations of Malicious and Disruptive Behavior

    ERIC Educational Resources Information Center

    Henry, David B.

    2006-01-01

    This study evaluates the validity of two aggression scales for predicting observations of malicious or disruptive behavior at school. Subgroups of a sample of 1,560 children (age 8.6 plus or minus 1.5 years) were assessed using (a) peer nominations of aggression, (b) teacher reports on the Teacher Report Form (TRF) of the Child Behavior Checklist…

  3. Associations between Peer Nominations, Teacher Ratings, Self-Reports, and Observations of Malicious and Disruptive Behavior

    ERIC Educational Resources Information Center

    Henry, David B.

    2006-01-01

    This study evaluates the validity of two aggression scales for predicting observations of malicious or disruptive behavior at school. Subgroups of a sample of 1,560 children (age 8.6 plus or minus 1.5 years) were assessed using (a) peer nominations of aggression, (b) teacher reports on the Teacher Report Form (TRF) of the Child Behavior Checklist…

  4. Behavioral analysis of malicious code through network traffic and system call monitoring

    NASA Astrophysics Data System (ADS)

    Grégio, André R. A.; Fernandes Filho, Dario S.; Afonso, Vitor M.; Santos, Rafael D. C.; Jino, Mario; de Geus, Paulo L.

    2011-06-01

    Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.

  5. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems

    SciTech Connect

    Kalafut, Andrew J.; Shue, Craig A; Gupta, Prof. Minaxi

    2010-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using 12 popular blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted and others account for large fractions of blacklisted IPs. Overall, we conclude that examining malicious activity at the AS granularity can unearth networks with lax security or those that harbor cybercrime.

  6. 76 FR 22925 - Assumption Buster Workshop: Abnormal Behavior Detection Finds Malicious Actors

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... card. Fraud detection algorithms (based on user behavior models) and procedures immediately set off... unusual behavior on the part of authorized users. The fraud detection algorithms use the financial... sets of values to be analyzed with well understood algorithms. For example, credit card purchases...

  7. Detection of malicious computer executables

    DOEpatents

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  8. Detecting Malicious Insiders in Military Networks

    DTIC Science & Technology

    2006-01-01

    unattended, no time out Net Scan Web Browsing DB Search Encrypted Email Coded Messages Covert Channels CI Case Files Disk Erasure Disk Wiping Pornography ...unethical or addictive behavior (e.g., on line gambling). Some observables have been used in some historical cases as a tip-off of malicious activity...Adding context involves human ef- fort along with the electronic detective work. This includes un- derstanding users’ role, normal relationships with

  9. Abnormally Malicious Autonomous Systems and their Internet Connectivity

    SciTech Connect

    Shue, Craig A; Kalafut, Prof. Andrew; Gupta, Prof. Minaxi

    2011-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularly peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.

  10. Deterring Malicious Behavior in Cyberspace

    DTIC Science & Technology

    2015-01-01

    television interview, the director of the Federal Bureau of Investigation, James Cook, said China has hacked every big US com- pany looking for useful...into digi- tal jihad, boasting of plans to establish a “cyber caliphate” from which to mount catastrophic hacking and virus attacks on the United...APT hacking is designed to covertly penetrate networks and systems to steal or alter information, manipulate data, or cause damage. A DDoS assault

  11. Counterintelligence Through Malicious Code Analysis

    DTIC Science & Technology

    2007-06-01

    THROUGH MALICIOUS CODE ANALYSIS by Edmond J. Murphy June 2007 Thesis Advisor: Chris Eagle Second Reader: George Dinolt THIS PAGE... George Dinolt Second Reader Peter Denning Chairman, Department of Computer Science iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT As... George Dinolt for his numerous contributions to the writing of this thesis, as well as his general contribution to my education at the Naval

  12. Towards a testbed for malicious code detection

    SciTech Connect

    Lo, R.; Kerchen, P.; Crawford, R.; Ho, W.; Crossley, J.; Fink, G.; Levitt, K.; Olsson, R.; Archer, M. . Div. of Computer Science)

    1991-01-01

    This paper proposes an environment for detecting many types of malicious code, including computer viruses, Trojan horses, and time/logic bombs. This malicious code testbed (MCT) is based upon both static and dynamic analysis tools developed at the University of California, Davis, which have been shown to be effective against certain types of malicious code. The testbed extends the usefulness of these tools by using them in a complementary fashion to detect more general cases of malicious code. Perhaps more importantly, the MCT allows administrators and security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict. 5 refs., 2 figs., 2 tabs.

  13. Identification of Malicious Web Pages by Inductive Learning

    NASA Astrophysics Data System (ADS)

    Liu, Peishun; Wang, Xuefang

    Malicious web pages are an increasing threat to current computer systems in recent years. Traditional anti-virus techniques focus typically on detection of the static signatures of Malware and are ineffective against these new threats because they cannot deal with zero-day attacks. In this paper, a novel classification method for detecting malicious web pages is presented. This method is generalization and specialization of attack pattern based on inductive learning, which can be used for updating and expanding knowledge database. The attack pattern is established from an example and generalized by inductive learning, which can be used to detect unknown attacks whose behavior is similar to the example.

  14. Automated assistance for detecting malicious code

    SciTech Connect

    Crawford, R.; Kerchen, P.; Levitt, K.; Olsson, R.; Archer, M.; Casillas, M.

    1993-06-18

    This paper gives an update on the continuing work on the Malicious Code Testbed (MCT). The MCT is a semi-automated tool, operating in a simulated, cleanroom environment, that is capable of detecting many types of malicious code, such as viruses, Trojan horses, and time/logic bombs. The MCT allows security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.

  15. Evidence for surprise minimization over value maximization in choice behavior

    PubMed Central

    Schwartenbeck, Philipp; FitzGerald, Thomas H. B.; Mathys, Christoph; Dolan, Ray; Kronbichler, Martin; Friston, Karl

    2015-01-01

    Classical economic models are predicated on the idea that the ultimate aim of choice is to maximize utility or reward. In contrast, an alternative perspective highlights the fact that adaptive behavior requires agents’ to model their environment and minimize surprise about the states they frequent. We propose that choice behavior can be more accurately accounted for by surprise minimization compared to reward or utility maximization alone. Minimizing surprise makes a prediction at variance with expected utility models; namely, that in addition to attaining valuable states, agents attempt to maximize the entropy over outcomes and thus ‘keep their options open’. We tested this prediction using a simple binary choice paradigm and show that human decision-making is better explained by surprise minimization compared to utility maximization. Furthermore, we replicated this entropy-seeking behavior in a control task with no explicit utilities. These findings highlight a limitation of purely economic motivations in explaining choice behavior and instead emphasize the importance of belief-based motivations. PMID:26564686

  16. Domain Parking: Not as Malicious as Expected

    DTIC Science & Technology

    2014-08-01

    Domain Parking: Not as Malicious as Expected Leigh Metcalf , Jonathan Spring netsa-contact@cert.org CERT® Coordination Center, Software Engineering...Parking: Not as Malicious as Expected 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Metcalf /Jonathan Spring Leigh 5d...Tech. Rep. RFC 3927, May 2005. [11] L. B. Metcalf and J. M. Spring, “Everything you wanted to know about black- lists but were afraid to ask

  17. Dispositional envy revisited: unraveling the motivational dynamics of benign and malicious envy.

    PubMed

    Lange, Jens; Crusius, Jan

    2015-02-01

    Previous research has conceptualized dispositional envy as a unitary construct. Recently however, episodic envy has been shown to emerge in two qualitatively different forms. Benign envy is related to the motivation to move upward, whereas malicious envy is related to pulling superior others down. In four studies (N = 1,094)--using the newly developed Benign and Malicious Envy Scale (BeMaS)--we show that dispositional envy is also characterized by two independent dimensions related to distinct motivational dynamics and behavioral consequences. Dispositional benign and malicious envy uniquely predict envious responding following upward social comparisons. Furthermore, they are differentially connected to hope for success and fear of failure. Corresponding to these links, dispositional benign envy predicted faster race performance of marathon runners mediated via higher goal setting. In contrast, dispositional malicious envy predicted race goal disengagement. The findings highlight that disentangling the two sides of envy opens up numerous research avenues.

  18. Detecting and isolating malicious nodes in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Jassim, Sabah

    2007-04-01

    Malicious nodes can seriously impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping. Secure routes are shortest paths on which every node on the route is trusted even if unknown. Secure route discovery requires the adoption of mechanisms of associating trust to nodes. Most existing secure route discovery mechanisms rely on shared keys and digital signature. In the absence of central nodes that act as certification authority, such protocols suffer from heavy computational burden and are vulnerable to malicious attacks. In this paper we shall review existing techniques for secure routing and propose to complement route finding with creditability scores. Each node would have a credit list for its neighbors. Each node monitors its neighbors' pattern of delivering packets and regularly credits are reviewed and updated accordingly. Unlike most existing schemes the focus of our work is based on post route discovery stage, i.e. when packets are transmitted on discovered routes. The level of trust in any route will be based on the credits associated with the neighbors belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks.

  19. A Learning System for Discriminating Variants of Malicious Network Traffic

    SciTech Connect

    Beaver, Justin M; Symons, Christopher T; Gillen, Rob

    2013-01-01

    Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacks and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.

  20. Finding Malicious Cyber Discussions in Social Media

    DTIC Science & Technology

    2015-12-11

    attacker techniques and tools, and potential victims. Applying modern machine learning approaches, Lincoln Laboratory has demonstrated the ability to...are not necessarily endorsed by the United States Government. 2 discussion text via machine learning and human language technology (HLT...machine learning classifier to determine if a discussion concerns malicious cyber topics: 1. An analyst has already discovered Internet content, such

  1. Malicious Use of Nonpharmaceuticals in Children

    ERIC Educational Resources Information Center

    Yin, Shan

    2011-01-01

    Objective: The objective of this study was to describe malicious nonpharmaceutical exposures in children reported to US poison centers. Methods: We performed a retrospective study of all nonpharmaceutical exposures involving children 7 years old reported to the US National Poison Data System (NPDS) from 2000 to 2008 for which the reason for…

  2. Malicious Use of Nonpharmaceuticals in Children

    ERIC Educational Resources Information Center

    Yin, Shan

    2011-01-01

    Objective: The objective of this study was to describe malicious nonpharmaceutical exposures in children reported to US poison centers. Methods: We performed a retrospective study of all nonpharmaceutical exposures involving children 7 years old reported to the US National Poison Data System (NPDS) from 2000 to 2008 for which the reason for…

  3. Awareness of Malicious Social Engineering among Facebook Users

    ERIC Educational Resources Information Center

    Slonka, Kevin J.

    2014-01-01

    With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The…

  4. Awareness of Malicious Social Engineering among Facebook Users

    ERIC Educational Resources Information Center

    Slonka, Kevin J.

    2014-01-01

    With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The…

  5. Automatic recognition of malicious intent indicators.

    SciTech Connect

    Drescher, D. J.; Yee, Mark L.; Giron, Casey; Fogler, Robert Joseph; Nguyen, Hung D.; Koch, Mark William

    2010-09-01

    A major goal of next-generation physical protection systems is to extend defenses far beyond the usual outer-perimeter-fence boundaries surrounding protected facilities. Mitigation of nuisance alarms is among the highest priorities. A solution to this problem is to create a robust capability to Automatically Recognize Malicious Indicators of intruders. In extended defense applications, it is not enough to distinguish humans from all other potential alarm sources as human activity can be a common occurrence outside perimeter boundaries. Our approach is unique in that it employs a stimulus to determine a malicious intent indicator for the intruder. The intruder's response to the stimulus can be used in an automatic reasoning system to decide the intruder's intent.

  6. Practical Strategies for Minimizing Challenging Behaviors in the Preschool Classroom

    ERIC Educational Resources Information Center

    Jiang, Hui S.; Jones, Sarah Y.

    2016-01-01

    Challenging behaviors can happen to children with a variety of abilities in all kinds of settings, and children's early experiences as members of classroom communities serve as the foundation on which lifelong patterns of social behaviors are constructed. Therefore, helping children with challenging behaviors become fully included is essential for…

  7. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  8. Enhancing network robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider , Proc. Natl. Acad. Sci. USAPNASA60027-842410.1073/pnas.1009440108 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (Rn), we propose a link-robustness index (Rl). We show that solely enhancing Rn cannot guarantee the improvement of Rl. Moreover, the structure of an Rl-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the Rn and Rl into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  9. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  10. Risk assessment of malicious biocontamination of food.

    PubMed

    Elad, Daniel

    2005-06-01

    Throughout the last decades of the 20th century, the biological threat evolved from primarily a government-controlled weapon to a tool of terrorism. One of the consequences of this trend is the near impossibility of foreseeing when and how an act of bioterrorism will occur. The suitability of food products for such an act stems from the multitude of microorganisms that may be used for contamination and the vulnerability of the products during and after processing. Tests that would enable the detection of a large variety of microorganisms quickly, reliably, and economically should also provide satisfactory means to prevent acts of malicious biocontamination of food products. Until such means become available, a priority-based approach to the problem is probably the most practical. Priorities should be determined based on a systematic risk assessment to define the relative likelihood of a certain microorganism being used in an act of malicious food contamination. Criteria to be evaluated are availability, weaponization processes, delivery of an effective dose, probability of early detection, and the microorganism's resistance to the conditions to which it will be exposed. Because the results of such an assessment may vary according to prevailing conditions, the assessment must be based on the existing circumstances. The results of the assessment should then be applied to the various procedures of food processing, which should further reduce the number of potential microbial threats. Existing methods of screening food for contaminating microorganisms and existing food safety and security procedures such as hazard analysis and critical control point programs may have to be modified to become suitable for the detection of acts of bioterrorism.

  11. Firefly synchrony: a behavioral strategy to minimize visual clutter.

    PubMed

    Moiseff, Andrew; Copeland, Jonathan

    2010-07-09

    Most firefly species (Coleoptera: Lampyridae) use bioluminescent flashes for signaling. In some species, the flashing between males occurs rhythmically and repeatedly (synchronically) with millisecond precision. We studied synchrony's behavioral role in the North American firefly, Photinus carolinus. We placed a female in a virtual environment containing artificial males that flashed at varying degrees of synchrony. Females responded to an average of 82% of synchronous flashes compared with as few as 3% of asynchronous flashes. We conclude that one function of flash synchrony is to facilitate a female's ability to recognize her conspecific male's flashing by eliminating potential visual clutter from other flashing males.

  12. DROP: Detecting Return-Oriented Programming Malicious Code

    NASA Astrophysics Data System (ADS)

    Chen, Ping; Xiao, Hai; Shen, Xiaobin; Yin, Xinchun; Mao, Bing; Xie, Li

    Return-Oriented Programming (ROP) is a new technique that helps the attacker construct malicious code mounted on x86/SPARC executables without any function call at all. Such technique makes the ROP malicious code contain no instruction, which is different from existing attacks. Moreover, it hides the malicious code in benign code. Thus, it circumvents the approaches that prevent control flow diversion outside legitimate regions (such as W ⊕ X ) and most malicious code scanning techniques (such as anti-virus scanners). However, ROP has its own intrinsic feature which is different from normal program design: (1) uses short instruction sequence ending in "ret", which is called gadget, and (2) executes the gadgets contiguously in specific memory space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.

  13. Minimizing deviant behavior in healthcare organizations: the effects of supportive leadership and job design.

    PubMed

    Chullen, C Logan; Dunford, Benjamin B; Angermeier, Ingo; Boss, R Wayne; Boss, Alan D

    2010-01-01

    In an era when healthcare organizations are beset by intense competition, lawsuits, and increased administrative costs, it is essential that employees perform their jobs efficiently and without distraction. Deviant workplace behavior among healthcare employees is especially threatening to organizational effectiveness, and healthcare managers must understand the antecedents of such behavior to minimize its prevalence. Deviant employee behavior has been categorized into two major types, individual and organizational, according to the intended target of the behavior. Behavior directed at the individual includes such acts as harassment and aggression, whereas behavior directed at the organization includes such acts as theft, sabotage, and voluntary absenteeism, to name a few (Robinson and Bennett 1995). Drawing on theory from organizational behavior, we examined two important features of supportive leadership, leader-member exchange (LMX) and perceived organizational support (POS), and two important features of job design, intrinsic motivation and depersonalization, as predictors of subsequent deviant behavior in a sample of over 1,900 employees within a large US healthcare organization. Employees who reported weaker perceptions of LMX and greater perceptions of depersonalization were more likely to engage in deviant behavior directed at the individual, whereas employees who reported weaker perceptions of POS and intrinsic motivation were more likely to engage in deviant behavior directed at the organization. These findings give rise to specific prescriptions for healthcare managers to prevent or minimize the frequency of deviant behavior in the workplace.

  14. Children's Judgments of Disloyal and Immoral Peer Behavior: Subjective Group Dynamics in Minimal Intergroup Contexts

    ERIC Educational Resources Information Center

    Abrams, Dominic; Rutland, Adam; Ferrell, Jennifer M.; Pelletier, Joseph

    2008-01-01

    The developmental model of subjective group dynamics hypothesizes that peer exclusion during middle childhood involves inferences about group dynamics. To test the generality of this prediction, children judged, within minimal groups, peers whose behavior was loyal versus disloyal (Study 1: n = 46, mean age = 113 months) or morally acceptable…

  15. Use of price-minimizing strategies by smokers and their effects on subsequent smoking behaviors.

    PubMed

    Choi, Kelvin; Hennrikus, Deborah; Forster, Jean; St Claire, Ann W

    2012-07-01

    Use of cigarette price-minimizing strategies may reduce the effectiveness of cigarette excise taxes on the prevalence of smoking. We examined the use of different price-minimizing strategies by smokers and their associations with subsequent smoking behaviors. Seven hundred eighteen current smokers from the Minnesota Adult Tobacco Survey Cohort Study provided information on the use of six different price-minimizing strategies in 2009; 602 of them were resurveyed in 2010 to assess their smoking behavior. Logistic regression was used to assess the effects of use of each strategy, use of at least one strategy, and the number of strategies used on quit smoking, attempted to quit, or cut back on cigarette consumption. Overall, 78% of participants used at least one price-minimizing strategy in 2009 to save money on cigarettes. About 53% reported buying from less expensive places, 49% used coupons or promotions, 42% purchased by the carton, and 34% changed to a cheaper brand. Participants' characteristics differed somewhat by strategy. Participants who reported buying by the carton were less likely to attempt to quit smoking and cut back on cigarette consumption subsequently; those who used more strategies were less likely to cut back on their cigarette consumption. Use of cigarette price-minimizing strategies is common among smokers and appears to hinder smokers from attempting to quit and reducing cigarette consumption. Prohibiting the use of coupons and promotions may uphold the effect of cigarette taxes to reduce the prevalence of smoking.

  16. The algorithm of malicious code detection based on data mining

    NASA Astrophysics Data System (ADS)

    Yang, Yubo; Zhao, Yang; Liu, Xiabi

    2017-08-01

    Traditional technology of malicious code detection has low accuracy and it has insufficient detection capability for new variants. In terms of malicious code detection technology which is based on the data mining, its indicators are not accurate enough, and its classification detection efficiency is relatively low. This paper proposed the information gain ratio indicator based on the N-gram to choose signature, this indicator can accurately reflect the detection weight of the signature, and helped by C4.5 decision tree to elevate the algorithm of classification detection.

  17. Minimizing Bullying Behavior of Middle School Students through Behavioral Intervention and Instruction

    ERIC Educational Resources Information Center

    Drosopoulos, J. Dan; Heald, A. Zachariah; McCue, M. John

    2008-01-01

    This action research project report examined all forms of bullying behaviors and ways to reduce those behaviors. The project included 63 students from both a high school health class and a 6th and 7th grade middle school homeroom. The research was conducted from September 17, 2007 through December 14, 2007. In the specified locations, female to…

  18. Visualizing minimal ingroup and outgroup faces: implications for impressions, attitudes, and behavior.

    PubMed

    Ratner, Kyle G; Dotsch, Ron; Wigboldus, Daniel H J; van Knippenberg, Ad; Amodio, David M

    2014-06-01

    More than 40 years of research have shown that people favor members of their ingroup in their impressions, attitudes, and behaviors. Here, we propose that people also form different mental images of minimal ingroup and outgroup members, and we test the hypothesis that differences in these mental images contribute to the well-established biases that arise from minimal group categorization. In Study 1, participants were assigned to 1 of 2 groups using a classic minimal group paradigm. Next, a reverse correlation image classification procedure was used to create visual renderings of ingroup and outgroup face representations. Subsequently, a 2nd sample naive to the face generation stage rated these faces on a series of trait dimensions. The results indicated that the ingroup face was significantly more likely than the outgroup face to elicit favorable impressions (e.g., trusting, caring, intelligent, attractive). Extending this finding, Study 2 revealed that ingroup face representations elicited more favorable implicitly measured attitudes than did outgroup representations, and Study 3 showed that ingroup faces were trusted more than outgroup faces during an economic game. Finally, Study 4 demonstrated that facial physiognomy associated with trustworthiness more closely resembled the facial structure of the average ingroup than outgroup face representation. Together, these studies suggest that minimal group distinctions can elicit different mental representations, and that this visual bias is sufficient to elicit ingroup favoritism in impressions, attitudes and behaviors.

  19. Minimization of lumen depreciation in LED lamps using thermal transient behavior analysis and design optimizations.

    PubMed

    Khan, M Nisa

    2016-02-10

    We expansively investigate thermal behaviors of various general-purpose light-emitting diode (LED) lamps and apply our measured results, validated by simulation, to establish lamp design rules for optimizing their optical and thermal properties. These design rules provide the means to minimize lumen depreciation over time by minimizing the periods for lamps to reach thermal steady-state while maintaining their high luminous efficacy and omnidirectional light distribution capability. While it is well known that minimizing the junction temperature of an LED leads to a longer lifetime and an increased lumen output, our study demonstrates, for the first time, to the best of our knowledge, that it is also important to minimize the time it takes to reach thermal equilibrium because doing so minimizes lumen depreciation and enhances light output and color stability during operation. Specifically, we have found that, in addition to inadequate heat-sink fin areas for a lamp configuration, LEDs mounted on multiple boards, as opposed to a single board, lead to longer periods for reaching thermal equilibrium contributing to larger lumen depreciation.

  20. Absence of physician recourse in malpractice litigation--malicious prosecution.

    PubMed

    Spector, Richard A

    2002-01-01

    The courts are protective of the plaintiff's rights under law to seek redress in the court by placing the facts of their allegations before a judge or jury. Because the avenue to the court is through representation and advocacy, the courts equally are protective of the agent of that representation, the attorney. To date, no physician who has been sued for medical malpractice in Louisiana has brought a successful malicious prosecution claim against the plaintiff or his attorney.

  1. Collision-avoidance behaviors of minimally restrained flying locusts to looming stimuli

    PubMed Central

    Chan, R. WM.; Gabbiani, F.

    2013-01-01

    SUMMARY Visually guided collision avoidance is of paramount importance in flight, for instance to allow escape from potential predators. Yet, little is known about the types of collision-avoidance behaviors that may be generated by flying animals in response to an impending visual threat. We studied the behavior of minimally restrained locusts flying in a wind tunnel as they were subjected to looming stimuli presented to the side of the animal, simulating the approach of an object on a collision course. Using high-speed movie recordings, we observed a wide variety of collision-avoidance behaviors including climbs and dives away from – but also towards – the stimulus. In a more restrained setting, we were able to relate kinematic parameters of the flapping wings with yaw changes in the trajectory of the animal. Asymmetric wing flapping was most strongly correlated with changes in yaw, but we also observed a substantial effect of wing deformations. Additionally, the effect of wing deformations on yaw was relatively independent of that of wing asymmetries. Thus, flying locusts exhibit a rich range of collision-avoidance behaviors that depend on several distinct aerodynamic characteristics of wing flapping flight. PMID:23364572

  2. Adaptive behavior in autism: Minimal clinically important differences on the Vineland-II.

    PubMed

    Chatham, C H; Taylor, K I; Charman, T; Liogier D'ardhuy, X; Eule, E; Fedele, A; Hardan, A Y; Loth, E; Murtagh, L; Del Valle Rubido, M; San Jose Caceres, A; Sevigny, J; Sikich, L; Snyder, L; Tillmann, J E; Ventola, P E; Walton-Bowen, K L; Wang, P P; Willgoss, T; Bolognani, F

    2017-09-21

    Autism Spectrum Disorder (ASD) is associated with persistent impairments in adaptive abilities across multiple domains. These social, personal, and communicative impairments become increasingly pronounced with development, and are present regardless of IQ. The Vineland Adaptive Behavior Scales, Second Edition (Vineland-II) is the most commonly used instrument for quantifying these impairments, but minimal clinically important differences (MCIDs) on Vineland-II scores have not been rigorously established in ASD. We pooled data from several consortia/registries (EU-AIMS LEAP study, ABIDE-I, ABIDE-II, INFOR, Simons Simplex Collection and Autism Treatment Network [ATN]) and clinical investigations and trials (Stanford, Yale, Roche) resulting in a data set of over 9,000 individuals with ASD. Two approaches were used to estimate MCIDs: distribution-based methods and anchor-based methods. Distribution-based MCID [d-MCID] estimates included the standard error of the measurement, as well as one-fifth and one-half of the covariate-adjusted standard deviation (both cross-sectionally and longitudinally). Anchor-based MCID [a-MCID] estimates include the slope of linear regression of clinician ratings of severity on the Vineland-II score, the slope of linear regression of clinician ratings of longitudinal improvement category on Vineland-II change, the Vineland-II change score maximally differentiating clinical impressions of minimal versus no improvement, and equipercentile equating. Across strata, the Vineland-II Adaptive Behavior Composite standardized score MCID estimates range from 2.01 to 3.2 for distribution-based methods, and from 2.42 to 3.75 for sample-size-weighted anchor-based methods. Lower Vineland-II standardized score MCID estimates were observed for younger and more cognitively impaired populations. These MCID estimates enable users of Vineland-II to assess both the statistical and clinical significance of any observed change. Autism Res 2017. © 2017

  3. The effects of collaboration and minimal-group membership on children's prosocial behavior, liking, affiliation, and trust.

    PubMed

    Plötner, Maria; Over, Harriet; Carpenter, Malinda; Tomasello, Michael

    2015-11-01

    Recent theoretical work has highlighted potential links between interpersonal collaboration and group membership in the evolution of human sociality. Here we compared the effects of collaboration and minimal-group membership on young children's prosocial behavior (i.e., helping and resource allocation), liking, affiliation, and trust. In a design that matched as closely as possible these two ways of connecting with others, we showed that 5-year-olds' behavior was affected similarly by collaboration and minimal-group membership; both increased children's preference for their partners on multiple dimensions and produced overall effects of a similar magnitude. In contrast, 3.5-year-olds did not have a strong preference for either collaborators or minimal in-group members. Thus, both collaboration and minimal-group membership are similarly effective in their influence on children's prosocial behavior and social preferences.

  4. Price-Minimizing Behaviors in Response to Increasing Tobacco Price: A Cross-Sectional Study of Students

    ERIC Educational Resources Information Center

    Rutter, Lucy; Britton, John; Langley, Tessa

    2017-01-01

    Background: The public health benefits of tobacco taxation are undermined when smokers engage in price-minimizing behaviors other than quitting in response to rising prices. Methods: 314 students at the University of Nottingham, UK, completed an online survey about their smoking behavior and their likely responses to hypothetical tobacco price…

  5. Quantum private comparison with a malicious third party

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling; Wu, Chunhui

    2015-06-01

    In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants' inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, such as entanglement and quantum memory, our protocol is based on BB84 protocol, which is more feasible for practical applications. Finally, we analyze the security of the presented protocol.

  6. Neurophysiological and Behavioral Responses to Music Therapy in Vegetative and Minimally Conscious States

    PubMed Central

    O’Kelly, Julian; James, L.; Palaniappan, R.; Taborin, J.; Fachner, J.; Magee, W. L.

    2013-01-01

    Assessment of awareness for those with disorders of consciousness is a challenging undertaking, due to the complex presentation of the population. Debate surrounds whether behavioral assessments provide greatest accuracy in diagnosis compared to neuro-imaging methods, and despite developments in both, misdiagnosis rates remain high. Music therapy may be effective in the assessment and rehabilitation with this population due to effects of musical stimuli on arousal, attention, and emotion, irrespective of verbal or motor deficits. However, an evidence base is lacking as to which procedures are most effective. To address this, a neurophysiological and behavioral study was undertaken comparing electroencephalogram (EEG), heart rate variability, respiration, and behavioral responses of 20 healthy subjects with 21 individuals in vegetative or minimally conscious states (VS or MCS). Subjects were presented with live preferred music and improvised music entrained to respiration (procedures typically used in music therapy), recordings of disliked music, white noise, and silence. ANOVA tests indicated a range of significant responses (p ≤ 0.05) across healthy subjects corresponding to arousal and attention in response to preferred music including concurrent increases in respiration rate with globally enhanced EEG power spectra responses (p = 0.05–0.0001) across frequency bandwidths. Whilst physiological responses were heterogeneous across patient cohorts, significant post hoc EEG amplitude increases for stimuli associated with preferred music were found for frontal midline theta in six VS and four MCS subjects, and frontal alpha in three VS and four MCS subjects (p = 0.05–0.0001). Furthermore, behavioral data showed a significantly increased blink rate for preferred music (p = 0.029) within the VS cohort. Two VS cases are presented with concurrent changes (p ≤ 0.05) across measures indicative of discriminatory responses to both music therapy

  7. Eating disorder behaviors and depression: a minimal relationship beyond social comparison, self-esteem, and body dissatisfaction.

    PubMed

    Green, Melinda A; Scott, Norman A; Cross, Susan E; Liao, Kelly Yu-Hsin; Hallengren, Jada J; Davids, Christopher M; Carter, Lindsey P; Kugler, David W; Read, Katherine E; Jepson, Amanda J

    2009-09-01

    Existing literature fails to comprehensively identify factors contributing to the comorbid relationship between eating disorder (ED) behaviors and unipolar depression. Maladaptive social comparison, body dissatisfaction, and low self-esteem are disruptive psychological patterns common to both constructs. It is unclear whether a unique relationship exists between depression and eating disorder behaviors beyond the effects exerted by this negative cognitive triad. The purpose of the present study is to examine whether a unique relationship exists between depression and ED behaviors after controlling for maladaptive social comparison, body dissatisfaction, and low self-esteem. We predict minimal unique variance in ED behaviors will be explained by depression after controlling for this negative cognitive triad.

  8. Price-Minimizing Behaviors in a Cohort of Smokers before and after a Cigarette Tax Increase

    PubMed Central

    Betzner, Anne; Boyle, Raymond G.; St. Claire, Ann W.

    2016-01-01

    Cigarette tax increases result in a reduced demand for cigarettes and increased efforts by smokers to reduce their cost of smoking. Less is known about how smokers think about their expenditures for cigarettes and the possible mechanisms that underlie price-minimizing behaviors. In-depth longitudinal interviews were conducted with Minnesota smokers to explore the factors that influence smokers’ decisions one month prior to a $1.75 cigarette tax increase and again one and three months after the increase. A total of 42 were sampled with 35 completed interviews at all three time points, resulting in 106 interviews across all participants at all time points. A qualitative descriptive approach examined smoking and buying habits, as well as reasons behind these decisions. A hierarchy of ways to save money on cigarettes included saving the most money by changing to roll your own pipe tobacco, changing to a cheaper brand, cutting down or quitting, changing to cigarillos, and buying online. Using coupons, shopping around, buying by the carton, changing the style of cigarette, and stocking up prior to the tax increase were described as less effective. Five factors emerged as impacting smokers’ efforts to save money on cigarettes after the tax: brand loyalty, frugality, addiction, stress, and acclimation. PMID:27322301

  9. Price-Minimizing Behaviors in a Cohort of Smokers before and after a Cigarette Tax Increase.

    PubMed

    Betzner, Anne; Boyle, Raymond G; St Claire, Ann W

    2016-06-17

    Cigarette tax increases result in a reduced demand for cigarettes and increased efforts by smokers to reduce their cost of smoking. Less is known about how smokers think about their expenditures for cigarettes and the possible mechanisms that underlie price-minimizing behaviors. In-depth longitudinal interviews were conducted with Minnesota smokers to explore the factors that influence smokers' decisions one month prior to a $1.75 cigarette tax increase and again one and three months after the increase. A total of 42 were sampled with 35 completed interviews at all three time points, resulting in 106 interviews across all participants at all time points. A qualitative descriptive approach examined smoking and buying habits, as well as reasons behind these decisions. A hierarchy of ways to save money on cigarettes included saving the most money by changing to roll your own pipe tobacco, changing to a cheaper brand, cutting down or quitting, changing to cigarillos, and buying online. Using coupons, shopping around, buying by the carton, changing the style of cigarette, and stocking up prior to the tax increase were described as less effective. Five factors emerged as impacting smokers' efforts to save money on cigarettes after the tax: brand loyalty, frugality, addiction, stress, and acclimation.

  10. Minimal Effect of Daytime Napping Behavior on Nocturnal Sleep in Pregnant Women

    PubMed Central

    Ebert, Rebecca M.; Wood, Annette; Okun, Michele L.

    2015-01-01

    Study Objectives: To assess whether daytime naps negatively impact nocturnal sleep. Design: Longitudinal, prospective cohort design. Participants: 161 pregnant women recruited and evaluated in early gestation (10–20 weeks). Measurements and Results: Daily sleep information was collected in three 2-week periods (10–12, 14–16, and 18–20 weeks gestation) with a daily sleep diary and an actigraph. The average number of naps, as well as the average length of each nap, were calculated from sleep diaries. Women were categorized first as non nappers (0 naps/2-week period), moderate nappers (1–3 naps/2-week period), or frequent nappers (≥ 4 naps/2-week period). Then, based on the average nap length, they were categorized as short (< 90 min) or long (≥ 90 min) nappers. Nocturnal sleep parameters included SOL, WASO, SE, and TST. SAS procedure MIXED was used for modeling the main effects of nap group and time, and time by nap group interactions. Women who took naps had a decrease in diary-assessed nocturnal TST, but not actigraphy-assessed TST. This observation was group- and time-specific. There were no other group differences. Women who napped ≥ 90 min had poorer diary-assessed SE and lower diary-assessed TST than those who took shorter naps. Length of nap was not associated with any other sleep measures. Conclusions: The number of daytime naps have minimal impact on nocturnal sleep parameters; however, long nappers did exhibit modestly impaired sleep continuity and sleep quality. Overall, we propose that daytime naps provide a beneficial countermeasure to the sleep disruption commonly reported by pregnant women. This may be clinically beneficial given that sleep continuity and quality are important correlates of pregnancy outcomes. Commentary: A commentary on this article appears in this issue on page 593. Citation: Ebert RM, Wood A, Okun ML. Minimal effect of daytime napping behavior on nocturnal sleep in pregnant women. J Clin Sleep Med 2015;11(6):635

  11. How Do Price Minimizing Behaviors Impact Smoking Cessation? Findings from the International Tobacco Control (ITC) Four Country Survey

    PubMed Central

    Licht, Andrea S.; Hyland, Andrew J.; O’Connor, Richard J.; Chaloupka, Frank J.; Borland, Ron; Fong, Geoffrey T.; Nargis, Nigar; Cummings, K. Michael

    2011-01-01

    This paper examines how price minimizing behaviors impact efforts to stop smoking. Data on 4,988 participants from the International Tobacco Control Policy Evaluation (ITC) Four-Country Survey who were smokers at baseline (wave 5) and interviewed at a 1 year follow-up were used. We examined whether price minimizing behaviors at baseline predicted: (1) cessation, (2) quit attempts, and (3) successful quit attempts at one year follow up using multivariate logistic regression modeling. A subset analysis included 3,387 participants who were current smokers at waves 5 and 6 and were followed through wave 7 to explore effects of changing purchase patterns on cessation. Statistical tests for interaction were performed to examine the joint effect of SES and price/tax avoidance behaviors on cessation outcomes. Smokers who engaged in any price/tax avoidance behaviors were 28% less likely to report cessation. Persons using low/untaxed sources were less likely to quit at follow up, those purchasing cartons were less likely to make quit attempts and quit, and those using discount cigarettes were less likely to succeed, conditional on making attempts. Respondents who utilized multiple behaviors simultaneously were less likely to make quit attempts and to succeed. SES did not modify the effects of price minimizing behaviors on cessation outcomes. The data from this paper indicate that the availability of lower priced cigarette alternatives may attenuate public health efforts aimed at to reduce reducing smoking prevalence through price and tax increases among all SES groups. PMID:21655144

  12. How do price minimizing behaviors impact smoking cessation? Findings from the International Tobacco Control (ITC) Four Country Survey.

    PubMed

    Licht, Andrea S; Hyland, Andrew J; O'Connor, Richard J; Chaloupka, Frank J; Borland, Ron; Fong, Geoffrey T; Nargis, Nigar; Cummings, K Michael

    2011-05-01

    This paper examines how price minimizing behaviors impact efforts to stop smoking. Data on 4,988 participants from the International Tobacco Control Policy Evaluation (ITC) Four-Country Survey who were smokers at baseline (wave 5) and interviewed at a 1 year follow-up were used. We examined whether price minimizing behaviors at baseline predicted: (1) cessation, (2) quit attempts, and (3) successful quit attempts at one year follow up using multivariate logistic regression modeling. A subset analysis included 3,387 participants who were current smokers at waves 5 and 6 and were followed through wave 7 to explore effects of changing purchase patterns on cessation. Statistical tests for interaction were performed to examine the joint effect of SES and price/tax avoidance behaviors on cessation outcomes. Smokers who engaged in any price/tax avoidance behaviors were 28% less likely to report cessation. Persons using low/untaxed sources were less likely to quit at follow up, those purchasing cartons were less likely to make quit attempts and quit, and those using discount cigarettes were less likely to succeed, conditional on making attempts. Respondents who utilized multiple behaviors simultaneously were less likely to make quit attempts and to succeed. SES did not modify the effects of price minimizing behaviors on cessation outcomes. The data from this paper indicate that the availability of lower priced cigarette alternatives may attenuate public health efforts aimed at to reduce reducing smoking prevalence through price and tax increases among all SES groups.

  13. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Control Environmental Stimulation through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang; Shih, Ching-Tien; Lin, Kun-Tsan; Chiang, Ming-Shan

    2009-01-01

    This study assessed whether two people with profound multiple disabilities and minimal motor behavior would be able to control environmental stimulation using thumb poke ability with a mouse wheel and a newly developed mouse driver (i.e., a new mouse driver replacing standard mouse driver, and turning a mouse into a precise thumb poke detector).…

  14. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Improve Computer Pointing Efficiency through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang; Chang, Man-Ling; Shih, Ching-Tien

    2009-01-01

    This study evaluated whether two people with multiple disabilities and minimal motor behavior would be able to improve their pointing performance using finger poke ability with a mouse wheel through a Dynamic Pointing Assistive Program (DPAP) and a newly developed mouse driver (i.e., a new mouse driver replaces standard mouse driver, changes a…

  15. Children with Multiple Disabilities and Minimal Motor Behavior Using Chin Movements to Operate Microswitches to Obtain Environmental Stimulation

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Tota, Alessia; Antonucci, Massimo; Oliva, Doretta

    2006-01-01

    In these two studies, two children with multiple disabilities and minimal motor behavior were assessed to see if they could use chin movements to operate microswitches to obtain environmental stimulation. In Study I, we applied an adapted version of a recently introduced electronic microswitch [Lancioni, G. E., O'Reilly, M. F., Singh, N. N.,…

  16. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Control Environmental Stimulation through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang; Shih, Ching-Tien; Lin, Kun-Tsan; Chiang, Ming-Shan

    2009-01-01

    This study assessed whether two people with profound multiple disabilities and minimal motor behavior would be able to control environmental stimulation using thumb poke ability with a mouse wheel and a newly developed mouse driver (i.e., a new mouse driver replacing standard mouse driver, and turning a mouse into a precise thumb poke detector).…

  17. An Overview of Intervention Options for Promoting Adaptive Behavior of Persons with Acquired Brain Injury and Minimally Conscious State

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Bosco, Andrea; Belardinelli, Marta Olivetti; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff

    2010-01-01

    This paper presents an overview of the studies directed at helping post-coma persons with minimally conscious state improve their adaptive behavior. Twenty-one studies were identified for the 2000-2010 period (i.e., a period in which an intense debate has occurred about diagnostic, rehabilitative, prognostic, and ethical issues concerning people…

  18. An Overview of Intervention Options for Promoting Adaptive Behavior of Persons with Acquired Brain Injury and Minimally Conscious State

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Bosco, Andrea; Belardinelli, Marta Olivetti; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff

    2010-01-01

    This paper presents an overview of the studies directed at helping post-coma persons with minimally conscious state improve their adaptive behavior. Twenty-one studies were identified for the 2000-2010 period (i.e., a period in which an intense debate has occurred about diagnostic, rehabilitative, prognostic, and ethical issues concerning people…

  19. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

    NASA Astrophysics Data System (ADS)

    Lee, Kijeong; Tolentino, Randy S.; Park, Gil-Cheol; Kim, Yong-Tae

    Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

  20. A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks.

    PubMed

    Piccinelli, R; Sansavini, G; Lucchetti, R; Zio, E

    2017-02-23

    The protection and safe operations of power systems heavily rely on the identification of the causes of damage and service disruption. This article presents a general framework for the assessment of power system vulnerability to malicious attacks. The concept of susceptibility to an attack is employed to quantitatively evaluate the degree of exposure of the system and its components to intentional offensive actions. A scenario with two agents having opposing objectives is proposed, i.e., a defender having multiple alternatives of protection strategies for system elements, and an attacker having multiple alternatives of attack strategies against different combinations of system elements. The defender aims to minimize the system susceptibility to the attack, subject to budget constraints; on the other hand, the attacker aims to maximize the susceptibility. The problem is defined as a zero-sum game between the defender and the attacker. The assumption that the interests of the attacker and the defender are opposite makes it irrelevant whether or not the defender shows the strategy he/she will use. Thus, the approaches "leader-follower game" or "simultaneous game" do not provide differences as far as the results are concerned. The results show an example of such a situation, and the von Neumann theorem is applied to find the (mixed) equilibrium strategies of the attacker and of the defender.

  1. Parsing (malicious) pleasures: schadenfreude and gloating at others’ adversity

    PubMed Central

    Leach, Colin Wayne; Spears, Russell; Manstead, Antony S. R.

    2015-01-01

    We offer the first empirical comparison of the pleasure in seeing (i.e., schadenfreude) and in causing (i.e., gloating) others’ adversity. In Study 1, we asked participants to recall and report on an (individual or group) episode of pleasure that conformed to our formal definition of schadenfreude, gloating, pride, or joy, without reference to an emotion word. Schadenfreude and gloating were distinct in the situational features of the episode, participants’ appraisals of it, and their expressions of pleasure (e.g., smiling, boasting). In Study 2, we had participants imagine being in an (individual or group) emotion episode designed to fit our conceptualization of schadenfreude or gloating. Individual and group versions of the emotions did not differ much in either study. However, the two pleasures differed greatly in their situational features, appraisals, experience, and expression. This parsing of the particular pleasures of schadenfreude and gloating brings nuance to the study of (malicious) pleasure, which tends to be less finely conceptualized and examined than displeasure despite its importance to social relations. PMID:25767455

  2. Parsing (malicious) pleasures: schadenfreude and gloating at others' adversity.

    PubMed

    Leach, Colin Wayne; Spears, Russell; Manstead, Antony S R

    2015-01-01

    We offer the first empirical comparison of the pleasure in seeing (i.e., schadenfreude) and in causing (i.e., gloating) others' adversity. In Study 1, we asked participants to recall and report on an (individual or group) episode of pleasure that conformed to our formal definition of schadenfreude, gloating, pride, or joy, without reference to an emotion word. Schadenfreude and gloating were distinct in the situational features of the episode, participants' appraisals of it, and their expressions of pleasure (e.g., smiling, boasting). In Study 2, we had participants imagine being in an (individual or group) emotion episode designed to fit our conceptualization of schadenfreude or gloating. Individual and group versions of the emotions did not differ much in either study. However, the two pleasures differed greatly in their situational features, appraisals, experience, and expression. This parsing of the particular pleasures of schadenfreude and gloating brings nuance to the study of (malicious) pleasure, which tends to be less finely conceptualized and examined than displeasure despite its importance to social relations.

  3. An Original Behavior Modification Program for Weight Reduction: Minimal Intervention and Permanent Habit Change.

    ERIC Educational Resources Information Center

    Lublin, Irwin; Kirkish, Patricia

    This description of a weight reduction program, based on generalizations derived from eight years of work with overweight persons, discusses the clients' rationalization of overeating behaviors. In this behavior modification program, the client is required to permanently give up one high calorie food and to write down all foods eaten before actual…

  4. An Original Behavior Modification Program for Weight Reduction: Minimal Intervention and Permanent Habit Change.

    ERIC Educational Resources Information Center

    Lublin, Irwin; Kirkish, Patricia

    This description of a weight reduction program, based on generalizations derived from eight years of work with overweight persons, discusses the clients' rationalization of overeating behaviors. In this behavior modification program, the client is required to permanently give up one high calorie food and to write down all foods eaten before actual…

  5. A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

    PubMed Central

    Tsai, Tung-Tso

    2014-01-01

    The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties. PMID:24991641

  6. Effects of malicious ocular laser exposure in commercial airline pilots.

    PubMed

    Palakkamanil, Mathew M; Fielden, Michael P

    2015-12-01

    Intentional malicious laser strikes on commercial pilots are committed by individuals who target a laser into airplane cockpits during takeoff and landing. Because laser exposure to pilots is a relatively new but growing occurrence, our study investigates the ocular effect of this laser exposure in pilots. Retrospective chart review by a single ophthalmologist. All commercial airline pilots (58 male, 3 female) who experienced a laser strike while flying between April 2012 and November 2014 who presented to our clinic were included. A retrospective chart review was performed in a retinal specialist's practice. Ocular assessment was performed within 3 days of laser exposure. A complete ophthalmic evaluation was conducted, including Early Treatment Diabetic Retinopathy Study visual acuity, colour vision, visual fields, intraocular pressure, slit-lamp examination, dilated fundus examination, colour fundus photographs, and ocular coherence tomography. Sixty-four laser strike incidents involving commercial pilots were included. All pilots in the study experienced some degree of immediate ocular irritation or light sensitivity. No definite cases of ocular damage were attributed to laser strikes. No pilot had any functional ocular deficits. Our study revealed that laser strikes on aircraft did not result in permanent visual functional or structural deficits. However, laser strikes cause immediate visual effects, including glare, flash blindness, and ocular irritation that can interfere with a pilot's visual function. Given the widespread accessibility of high-power lasers and the rapid increase in incidents, laser strikes threaten to jeopardize aviation safety unless effective preventative measures are put in place. Copyright © 2015 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  7. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-01-03

    Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.

  8. MIS-behavior: practical heuristics for precise pediatric minimally invasive surgery.

    PubMed

    Blinman, Thane A

    2015-02-01

    Minimally invasive surgery (MIS) has changed pediatric urology and general surgery, offering less morbidity and new surgical options for many procedures. This promise goes unrealized when technical methods lag. Application of MIS in children is uneven after more than 2 decades of application. Principles of versatile and proficient technique may remain unstated and implicit in surgical training, often leaving surgical training an exercise in inference and imitation. This article describes some essential practical principles of precision MIS applied to patients of any size. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Energy barriers, entropy barriers, and non-Arrhenius behavior in a minimal glassy model.

    PubMed

    Du, Xin; Weeks, Eric R

    2016-06-01

    We study glassy dynamics using a simulation of three soft Brownian particles confined to a two-dimensional circular region. If the circular region is large, the disks freely rearrange, but rearrangements are rarer for smaller system sizes. We directly measure a one-dimensional free-energy landscape characterizing the dynamics. This landscape has two local minima corresponding to the two distinct disk configurations, separated by a free-energy barrier that governs the rearrangement rate. We study several different interaction potentials and demonstrate that the free-energy barrier is composed of a potential-energy barrier and an entropic barrier. The heights of both of these barriers depend on temperature and system size, demonstrating how non-Arrhenius behavior can arise close to the glass transition.

  10. Impact of malicious servers over trust and reputation models in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Verma, Vinod Kumar; Singh, Surinder; Pathak, N. P.

    2016-03-01

    This article deals with the impact of malicious servers over different trust and reputation models in wireless sensor networks. First, we analysed the five trust and reputation models, namely BTRM-WSN, Eigen trust, peer trust, power trust, linguistic fuzzy trust model. Further, we proposed wireless sensor network design for optimisation of these models. Finally, influence of malicious servers on the behaviour of above mentioned trust and reputation models is discussed. Statistical analysis has been carried out to prove the validity of our proposal.

  11. Accuracy comparison among different machine learning techniques for detecting malicious codes

    NASA Astrophysics Data System (ADS)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  12. Self-help cognitive-behavioral therapy with minimal therapist contact for social phobia: a controlled trial.

    PubMed

    Abramowitz, Jonathan S; Moore, Elizabeth L; Braddock, Autumn E; Harrington, Diana L

    2009-03-01

    Due to treatment accessibility and cost issues, interest in self-help programs (e.g., bibliotherapy, telehealth) for common psychological disorders is growing. Research supporting the efficacy of such a program for social anxiety, however, is limited. The present study examined the efficacy of an 8-week self-directed cognitive behavioral treatment with minimal therapist involvement for social phobia based on a widely available self-help book. Twenty-one adults with social phobia initially received either treatment (i.e. assigned readings in the workbook with limited therapist contact) or were wait-listed. Wait-listed patients eventually received the same self-directed treatment. Results revealed that the self-help/minimal therapist contact treatment was superior to wait-list on most outcome measures. Across the entire sample, reductions in social anxiety, global severity, general anxiety, and depression were observed at posttest and 3-month follow-up. These findings provide preliminary support for using this self-help workbook for individuals with mild to moderate social anxiety in conjunction with infrequent therapist visits to reinforce the treatment principles. Study limitations and future directions are discussed.

  13. An Approach for Detecting Malicious Emails Using Runtime Monitoring with Hidden Data

    DTIC Science & Technology

    2016-09-01

    WITH HIDDEN DATA .......................21 A. ARCHITECTURE ...................................................................................21 B... Architecture for Malicious Emails. Source: [21]. ........ 21 Figure 10. Workflow for Developing Pattern Matching with Hidden Information. Source...WITH HIDDEN DATA A. ARCHITECTURE In Chapter III, we overviewed deterministic RM. In this chapter we introduce a recent architecture that enables RM

  14. Non-developmental item computer systems and the malicious software threat

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software; computer system unique attributes; positive feedback to commercial computer systems vendors; and NDI (Non-Development Item) computers and software safety.

  15. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    ERIC Educational Resources Information Center

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  16. Leveling up and down: the experiences of benign and malicious envy.

    PubMed

    van de Ven, Niels; Zeelenberg, Marcel; Pieters, Rik

    2009-06-01

    Envy is the painful emotion caused by the good fortune of others. This research empirically supports the distinction between two qualitatively different types of envy, namely benign and malicious envy. It reveals that the experience of benign envy leads to a moving-up motivation aimed at improving one's own position, whereas the experience of malicious envy leads to a pulling-down motivation aimed at damaging the position of the superior other. Study 1 used guided recall of the two envy types in a culture (the Netherlands) that has separate words for benign and malicious envy. Analyses of the experiential content of these emotions found the predicted differences. Study 2 and 3 used one sample from the United States and one from Spain, respectively, where a single word exists for both envy types. A latent class analysis based on the experiential content of envy confirmed the existence of separate experiences of benign and malicious envy in both these cultures as well. The authors discuss the implications of distinguishing the two envy types for theories of cooperation, group performance, and Schadenfreude.

  17. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    ERIC Educational Resources Information Center

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  18. Gas permeability and thermal behavior of polypropylene films used for packaging minimally processed fresh-cut potatoes: a case study.

    PubMed

    Siracusa, Valentina; Blanco, Ignazio; Romani, Santina; Tylewicz, Urszula; Dalla Rosa, Marco

    2012-10-01

    This work reports an experimental study on the permeability and thermal behavior of commercial polypropylene (PP) film used for fresh-cut potatoes packaging. The permeability was tested using oxygen, carbon dioxide, nitrogen, mix of these 3 gases, normally used for modified atmosphere packaging (MAP) and Air, to understand if it would be possible to extend the shelf life of this food product designed for the catering field in respect to the packaging behavior. The temperature influence on permeability data, from 5 to 40 °C, was analyzed, before and after 4, 8, 12, 15, and 20 d of food contact, pointing out the dependence between temperature and gas transmission rate (GTR), solubility (S), diffusion coefficient (D), and time lag (t(L)) parameters. The activation energies (E) of the permeation process were determined with the different gases used in the experiments. The thermal behavior of PP film was studied by differential scanning calorimetry (DSC) and thermogravimetric analysis (TG) to well understand its thermal stability. Fourier transformed-infrared with attenuated total reflectance (FT-IR/ATR) spectroscopy was also performed in order to study the influence of the food contact on the chemical characteristics of the polymer film. The results obtained were discussed and compared each other. Studied samples showed, for all investigated gases, an increase of gas permeability and S values at higher temperature. Heat resistance classification among the sample as it is and stored in modified atmospheres was made. Finally all performed experiments have showed good polymer stability for the shelf-life storage potatoes under study. Study of packaging material was performed in a range of temperature, which can simulate the service condition to assess the suitability of a commercial polymer film for modified atmosphere packaging of fresh-cut potatoes minimally processed designed for catering purpose. © 2012 Institute of Food Technologists®

  19. Minimal Pairs: Minimal Importance?

    ERIC Educational Resources Information Center

    Brown, Adam

    1995-01-01

    This article argues that minimal pairs do not merit as much attention as they receive in pronunciation instruction. There are other aspects of pronunciation that are of greater importance, and there are other ways of teaching vowel and consonant pronunciation. (13 references) (VWL)

  20. Socio-Economic Variation in Price Minimizing Behaviors: Findings from the International Tobacco Control (ITC) Four Country Survey

    PubMed Central

    Licht, Andrea S.; Hyland, Andrew J.; O’Connor, Richard J.; Chaloupka, Frank J.; Borland, Ron; Fong, Geoffrey T.; Nargis, Nigar; Cummings, K. Michael

    2011-01-01

    This paper examines how socio-economic status (SES) modifies how smokers adjust to changes in the price of tobacco products through utilization of multiple price minimizing techniques. Data come from the International Tobacco Control Policy Evaluation (ITC) Four Country Survey, nationally representative samples of adult smokers and includes respondents from Canada, the United States, the United Kingdom and Australia. Cross-sectional analyses were completed among 8,243 respondents (7,038 current smokers) from the survey wave conducted between October 2006 and February 2007. Analyses examined predictors of purchasing from low/untaxed sources, using discount cigarettes or roll-your-own (RYO) tobacco, purchasing cigarettes in cartons, and engaging in high levels of price and tax avoidance at last purchase. All analyses tested for interactions with SES and were weighted to account for changing and under-represented demographics. Relatively high levels of price and tax avoidance behaviors were present; 8% reported buying from low or untaxed source; 36% used discount or generic brands, 13.5% used RYO tobacco, 29% reported purchasing cartons, and 63% reported using at least one of these high price avoidance behaviors. Respondents categorized as having low SES were approximately 26% less likely to report using low or untaxed sources and 43% less likely to purchase tobacco by the carton. However, respondents with low SES were 85% more likely to report using discount brands/RYO compared to participants with higher SES. Overall, lower SES smokers were 25% more likely to engage in at least one or more tax avoidance behaviors compared to their higher SES counterparts. Price and tax avoidance behaviors are relatively common among smokers of all SES strata, but strategies differed with higher SES groups more likely to report traveling to a low-tax location to avoid paying higher prices, purchase duty free tobacco, and purchase by cartons instead of packs all of which were less

  1. Socio-economic variation in price minimizing behaviors: findings from the International Tobacco Control (ITC) Four Country Survey.

    PubMed

    Licht, Andrea S; Hyland, Andrew J; O'Connor, Richard J; Chaloupka, Frank J; Borland, Ron; Fong, Geoffrey T; Nargis, Nigar; Cummings, K Michael

    2011-01-01

    This paper examines how socio-economic status (SES) modifies how smokers adjust to changes in the price of tobacco products through utilization of multiple price minimizing techniques. Data come from the International Tobacco Control Policy Evaluation (ITC) Four Country Survey, nationally representative samples of adult smokers and includes respondents from Canada, the United States, the United Kingdom and Australia. Cross-sectional analyses were completed among 8,243 respondents (7,038 current smokers) from the survey wave conducted between October 2006 and February 2007. Analyses examined predictors of purchasing from low/untaxed sources, using discount cigarettes or roll-your-own (RYO) tobacco, purchasing cigarettes in cartons, and engaging in high levels of price and tax avoidance at last purchase. All analyses tested for interactions with SES and were weighted to account for changing and under-represented demographics. Relatively high levels of price and tax avoidance behaviors were present; 8% reported buying from low or untaxed source; 36% used discount or generic brands, 13.5% used RYO tobacco, 29% reported purchasing cartons, and 63% reported using at least one of these high price avoidance behaviors. Respondents categorized as having low SES were approximately 26% less likely to report using low or untaxed sources and 43% less likely to purchase tobacco by the carton. However, respondents with low SES were 85% more likely to report using discount brands/RYO compared to participants with higher SES. Overall, lower SES smokers were 25% more likely to engage in at least one or more tax avoidance behaviors compared to their higher SES counterparts. Price and tax avoidance behaviors are relatively common among smokers of all SES strata, but strategies differed with higher SES groups more likely to report traveling to a low-tax location to avoid paying higher prices, purchase duty free tobacco, and purchase by cartons instead of packs all of which were less

  2. Persons with multiple disabilities and minimal motor behavior using small forehead movements and new microswitch technology to control environmental stimuli.

    PubMed

    Lancioni, Giulio E; O'Reilly, Mark F; Singh, Nirbhay N; Sigafoos, Jeff; Didden, Robert; Oliva, Doretta; Montironi, Gianluigi

    2007-06-01

    Persons with multiple disabilities and minimal motor behavior may be unable to use available microswitch technology to control environmental stimuli. For these persons, one may need to rely on small motor expressions (as responses) and new, matching microswitch technology to ensure a successful outcome. In the present study, a small movement of the forehead skin was selected as the response for two participants (ages 6.5 and 14.2 years) with profound multiple disabilities. The microswitch technology included (a) an optic sensor, i.e., barcode reader, (b) a small tag with horizontal bars attached to the participants' forehead, and (c) an electronic control system which activated stimuli in relation to response occurrence. Movement of the forehead skin shifted up or down the tag with bars and this shifting, if greater than a preset limit and therefore recorded as a response, led to the activation of the control system. Each participant received an ABAB sequence, in which A represented baseline and B intervention phases, and a 6-wk. postintervention check. Analysis showed both participants increased their responding during the intervention phases and maintained that responding at the postintervention check. Implications of the findings were discussed.

  3. Effect of soaking in noni (Morinda citrifolia) juice on the microbiological and color behavior of Haden minimally processed mango.

    PubMed

    Ulloa, José Armando; González Tapia, Noemí T; Rosas Ulloa, Petra; Ramírez Ramírez, José Carmen; Ulloa Rangel, Blanca E

    2015-05-01

    The purpose of this study was to evaluate the effect of soaking in noni juice on the microbiological and color behavior of minimally processed mango. Two batches of Haden mango cubes were treated by immersion in noni juice for 2.5 or 5.0 min. Each batch was packed in polypropylene boxes and stored at 6 °C for up to 15 days; in addition, a control group of mango cubes was prepared by immersion in sterile water for the same duration. According to the results, the soaking of mango cubes in noni juice had an antimicrobial effect on mesophilic aerobic bacteria, molds and yeasts during storage at 6 °C for 15 days, without significantly (P < 0.05) affecting the CIE L*, a*, b*, chroma and hue angle values, in comparison with the control after 12 days of storage. The noni juice soaking treatment was demonstrated to be a potentially valuable technology for decontamination of fresh-cut fruit surfaces.

  4. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Improve Computer Drag-and-Drop Efficiency through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang

    2011-01-01

    This study evaluated whether two people with multiple disabilities and minimal motor behavior would be able to improve their Drag-and-Drop (DnD) performance using their finger/thumb poke ability with a mouse scroll wheel through a Dynamic Drag-and-Drop Assistive Program (DDnDAP). A multiple probe design across participants was used in this study…

  5. Assisting People with Multiple Disabilities and Minimal Motor Behavior to Improve Computer Drag-and-Drop Efficiency through a Mouse Wheel

    ERIC Educational Resources Information Center

    Shih, Ching-Hsiang

    2011-01-01

    This study evaluated whether two people with multiple disabilities and minimal motor behavior would be able to improve their Drag-and-Drop (DnD) performance using their finger/thumb poke ability with a mouse scroll wheel through a Dynamic Drag-and-Drop Assistive Program (DDnDAP). A multiple probe design across participants was used in this study…

  6. Measuring the Cool Tool as a Targeted Intervention to Minimize Teacher Reprimands and Students' On-Task Behaviors in an Urban Elementary School

    ERIC Educational Resources Information Center

    Utley, Cheryl A.; Obiakor, Festus E.

    2015-01-01

    This study measured the effects of a targeted intervention, The Cool Tool, implemented in the secondary prevention tier to minimize teacher reprimands and students' on-task behaviors in an urban elementary school. The participants in the social skills intervention programs were seven teachers, across grades K-5. Assessments included pre-posttest…

  7. Measuring the Cool Tool as a Targeted Intervention to Minimize Teacher Reprimands and Students' On-Task Behaviors in an Urban Elementary School

    ERIC Educational Resources Information Center

    Utley, Cheryl A.; Obiakor, Festus E.

    2015-01-01

    This study measured the effects of a targeted intervention, The Cool Tool, implemented in the secondary prevention tier to minimize teacher reprimands and students' on-task behaviors in an urban elementary school. The participants in the social skills intervention programs were seven teachers, across grades K-5. Assessments included pre-posttest…

  8. History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network.

    PubMed

    Gul, Noor; Qureshi, Ijaz Mansoor; Omar, Adnan; Elahi, Atif; Khan, Sajjad

    2017-01-01

    In cognitive radio communication, spectrum sensing plays a vital role in sensing the existence of the primary user (PU). The sensing performance is badly affected by fading and shadowing in case of single secondary user(SU). To overcome this issue, cooperative spectrum sensing (CSS) is proposed. Although the reliability of the system is improved with cooperation but existence of malicious user (MU) in the CSS deteriorates the performance. In this work, we consider the Kullback-Leibler (KL) divergence method for minimizing spectrum sensing data falsification (SSDF) attack. In the proposed CSS scheme, each SU reports the fusion center(FC) about the availability of PU and also keeps the same evidence in its local database. Based on the KL divergence value, if the FC acknowledges the user as normal, then the user will send unified energy information to the FC based on its current and previous sensed results. This method keeps the probability of detection high and energy optimum, thus providing an improvement in performance of the system. Simulation results show that the proposed KL divergence method has performed better than the existing equal gain combination (EGC), maximum gain combination (MGC) and simple KL divergence schemes in the presence of MUs.

  9. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

    SciTech Connect

    Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A

    2013-01-01

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

  10. Reliability of Physical Systems: Detection of Malicious Subcircuits (Trojan Circuits) in Sequential Circuits

    NASA Astrophysics Data System (ADS)

    Matrosova, A. Yu.; Kirienko, I. E.; Tomkov, V. V.; Miryutov, A. A.

    2016-12-01

    Reliability of physical systems is provided by reliability of their parts including logical ones. Insertion of malicious subcircuits that can destroy logical circuit or cause leakage of confidential information from a system necessitates the detection of such subcircuits followed by their masking if possible. We suggest a method of finding a set of sequential circuit nodes in which Trojan Circuits can be inserted. The method is based on random estimations of controllability and observability of combinational nodes calculated using a description of sequential circuit working area and an evidence of existence of a transfer sequence for the proper set of internal states without finding the sequence itself. The method allows cutting calculations using operations on Reduced Ordered Binary Decision Diagrams (ROBDDs) that can depend only on the state variables of the circuit. The approach, unlike traditional ones, does not require preliminary sequential circuit simulation but can use its results. It can be used when malicious circuits cannot be detected during sequential circuit verification.

  11. Teaching Generative Reading Via Recombination of Minimal Textual Units: A Legacy of Verbal Behavior to Children in Brazil

    PubMed Central

    de Souza, Deisy G.; de Rose, Julio C.; Faleiros, Thais C.; Bortoloti, Renato; Hanna, Elenice Seixas; McIlvane, William J.

    2009-01-01

    This paper reports results of two studies that sought to teach generative reading skills to a large group of Brazilian children who were exhibiting protracted failure in school. Inspired by Skinner’s analysis of verbal relations and minimal verbal units, the methodology took advantage of certain characteristics of Portuguese. Many words in this language are comprised of two-letter syllabic units (e.g., BO+LA= ball, CA+BO= handle, LA+TA= can) that can be recombined to form new words (e.g., BOCA= mouth, BOTA= boot), thus establishing a route to generative reading via recombinative generalization. Such syllabic units were incorporated within curricular framework that used matching-to-sample and learning by exclusion methods to teach matching relations involving pictures, printed and spoken words, and printed and spoken syllables. Study 1 was conducted within a university-based learning center that maintained certain aspects of laboratory conditions. It showed that teaching textual relations between dictated and printed syllables could control procedurally the inter- and intra-participant variability observed in past studies that lacked this feature -resulting in virtually universally positive teaching outcomes. Study 2 was conducted in a public school programs that applied the same basic training methodology. Positive training outcomes in an experimental group were approximately 3–5 times greater than that in a placebo control group. Together, these studies illustrate that the functional analysis in Verbal Behavior is having a direct impact in educational science in Brazil. It has led to procedures that can be effectively translated from the laboratory to the community via delivery systems that can be implemented in the developing world. PMID:19960112

  12. Detecting Malicious Tweets in Twitter Using Runtime Monitoring With Hidden Information

    DTIC Science & Technology

    2016-06-01

    text mining using Twitter streaming API and python [Online]. Available: http://adilmoujahid.com/posts/2014/07/twitter-analytics/ [22] M. Singh, B...sites with 645,750,000 registered users [3] and has open source public tweets for data mining . 2. Malicious Users and Tweets In the modern world...want to data mine in Twitter, and presents the natural language assertions and corresponding rule patterns. It then describes the steps performed using

  13. Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network

    PubMed Central

    Yang, Huizhong

    2014-01-01

    An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. We show that possible combination of the two delays can affect the stability of the model and make the model bifurcate periodic solutions under some certain conditions. For further investigation, properties of the periodic solutions are studied by using the normal form method and center manifold theory. Finally, some numerical simulations are given to justify the theoretical results. PMID:25147837

  14. Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders

    NASA Astrophysics Data System (ADS)

    White, Jonathan; Panda, Brajendra

    A major concern for computer system security is the threat from malicious insiders who target and abuse critical data items in the system. In this paper, we propose a solution to enable automatic identification of critical data items in a database by way of data dependency relationships. This identification of critical data items is necessary because insider threats often target mission critical data in order to accomplish malicious tasks. Unfortunately, currently available systems fail to address this problem in a comprehensive manner. It is more difficult for non-experts to identify these critical data items because of their lack of familiarity and due to the fact that data systems are constantly changing. By identifying the critical data items automatically, security engineers will be better prepared to protect what is critical to the mission of the organization and also have the ability to focus their security efforts on these critical data items. We have developed an algorithm that scans the database logs and forms a directed graph showing which items influence a large number of other items and at what frequency this influence occurs. This graph is traversed to reveal the data items which have a large influence throughout the database system by using a novel metric based formula. These items are critical to the system because if they are maliciously altered or stolen, the malicious alterations will spread throughout the system, delaying recovery and causing a much more malignant effect. As these items have significant influence, they are deemed to be critical and worthy of extra security measures. Our proposal is not intended to replace existing intrusion detection systems, but rather is intended to complement current and future technologies. Our proposal has never been performed before, and our experimental results have shown that it is very effective in revealing critical data items automatically.

  15. Do you see what I see? Can non-experts with minimal training reproduce expert ratings in behavioral assessments of working dogs?

    PubMed

    Fratkin, Jamie L; Sinn, David L; Thomas, Scott; Hilliard, Stewart; Olson, Zezelia; Gosling, Samuel D

    2015-01-01

    Working-dog organizations often use behavioral ratings by experts to evaluate a dog's likelihood of success. However, these experts are frequently under severe time constraints. One way to alleviate the pressure on limited organizational resources would be to use non-experts to assess dog behavior. Here, in populations of military working dogs (Study 1) and explosive-detection dogs (Study 2), we evaluated the reliability and validity of behavioral ratings assessed by minimally trained non-experts from videotapes. Analyses yielded evidence for generally good levels of inter-observer reliability and criterion validity (indexed by convergence between the non-expert ratings and ratings made previously by experts). We found some variation across items in Study 2 such that reliability and validity was significantly lower for three out of the 18 items, and one item had reliability and validity estimates that were impacted heavily by the behavioral test environment. There were no differences in reliability and validity based on the age of the dog. Overall the results suggest that ratings made by minimally trained non-experts for most items can serve as a viable alternative to expert ratings freeing limited resources of highly trained staff. This article is part of a Special Issue entitled: Canine Behavior. Copyright © 2014 Elsevier B.V. All rights reserved.

  16. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  17. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    PubMed

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  18. Minimal cosmography

    NASA Astrophysics Data System (ADS)

    Piazza, Federico; Schücker, Thomas

    2016-04-01

    The minimal requirement for cosmography—a non-dynamical description of the universe—is a prescription for calculating null geodesics, and time-like geodesics as a function of their proper time. In this paper, we consider the most general linear connection compatible with homogeneity and isotropy, but not necessarily with a metric. A light-cone structure is assigned by choosing a set of geodesics representing light rays. This defines a "scale factor" and a local notion of distance, as that travelled by light in a given proper time interval. We find that the velocities and relativistic energies of free-falling bodies decrease in time as a consequence of cosmic expansion, but at a rate that can be different than that dictated by the usual metric framework. By extrapolating this behavior to photons' redshift, we find that the latter is in principle independent of the "scale factor". Interestingly, redshift-distance relations and other standard geometric observables are modified in this extended framework, in a way that could be experimentally tested. An extremely tight constraint on the model, however, is represented by the blackbody-ness of the cosmic microwave background. Finally, as a check, we also consider the effects of a non-metric connection in a different set-up, namely, that of a static, spherically symmetric spacetime.

  19. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy

    PubMed Central

    Roma-Rodrigues, Catarina; Raposo, Luís R.; Cabral, Rita; Paradinha, Fabiana; Baptista, Pedro V.; Fernandes, Alexandra R.

    2017-01-01

    Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes’ release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs) make them suitable vehicles to pursuit this goal. AuNPs’ properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs’ role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression. PMID:28098821

  20. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy.

    PubMed

    Roma-Rodrigues, Catarina; Raposo, Luís R; Cabral, Rita; Paradinha, Fabiana; Baptista, Pedro V; Fernandes, Alexandra R

    2017-01-14

    Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes' release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs) make them suitable vehicles to pursuit this goal. AuNPs' properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs' role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression.

  1. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors

    DTIC Science & Technology

    2015-09-28

    diverse clusters of suspicious domain names that cause DNS failures, by considering multiple types of syntactic as well as temporal patterns. Our...evolutionary learning framework evaluates the clusters produced over time to eliminate spurious cases while retaining sustaining (i.e., highly suspicious... clusters . One of the advantages of our framework is in analyzing DNS failures on per-client basis and not hinging on the existence of multiple

  2. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  3. Behavioral Investigation of the Influence of Social Categorization on Empathy for Pain: A Minimal Group Paradigm Study

    PubMed Central

    Montalan, Benoît; Lelard, Thierry; Godefroy, Olivier; Mouras, Harold

    2012-01-01

    Research on empathy for pain has provided evidence of an empathic bias toward racial ingroup members. In this study, we used for the first time the “minimal group paradigm” in which participants were assigned to artificial groups and required to perform pain judgments of pictures of hands and feet in painful or non-painful situations from self, ingroup, and outgroup perspectives. Findings showed that the mere categorization of people into two distinct arbitrary social groups appears to be sufficient to elicit an ingroup bias in empathy for pain. PMID:23087657

  4. Behavioral investigation of the influence of social categorization on empathy for pain: a minimal group paradigm study.

    PubMed

    Montalan, Benoît; Lelard, Thierry; Godefroy, Olivier; Mouras, Harold

    2012-01-01

    Research on empathy for pain has provided evidence of an empathic bias toward racial ingroup members. In this study, we used for the first time the "minimal group paradigm" in which participants were assigned to artificial groups and required to perform pain judgments of pictures of hands and feet in painful or non-painful situations from self, ingroup, and outgroup perspectives. Findings showed that the mere categorization of people into two distinct arbitrary social groups appears to be sufficient to elicit an ingroup bias in empathy for pain.

  5. Minimizing the cost of translocation failure with decision-tree models that predict species' behavioral response in translocation sites.

    PubMed

    Ebrahimi, Mehregan; Ebrahimie, Esmaeil; Bull, C Michael

    2015-08-01

    The high number of failures is one reason why translocation is often not recommended. Considering how behavior changes during translocations may improve translocation success. To derive decision-tree models for species' translocation, we used data on the short-term responses of an endangered Australian skink in 5 simulated translocations with different release conditions. We used 4 different decision-tree algorithms (decision tree, decision-tree parallel, decision stump, and random forest) with 4 different criteria (gain ratio, information gain, gini index, and accuracy) to investigate how environmental and behavioral parameters may affect the success of a translocation. We assumed behavioral changes that increased dispersal away from a release site would reduce translocation success. The trees became more complex when we included all behavioral parameters as attributes, but these trees yielded more detailed information about why and how dispersal occurred. According to these complex trees, there were positive associations between some behavioral parameters, such as fight and dispersal, that showed there was a higher chance, for example, of dispersal among lizards that fought than among those that did not fight. Decision trees based on parameters related to release conditions were easier to understand and could be used by managers to make translocation decisions under different circumstances.

  6. The Effects of a Motor Training Package on Minimally Assisted Standing Behavior in a Three-Month-Old Infant

    ERIC Educational Resources Information Center

    Dziewolska, Halina; Cautilli, Joseph

    2006-01-01

    Behavior analysts have spent relatively little time in designing interventions to enhance motor development in typically developing infants and children. This study examines the effect of a motor training package consisting of opportunity to respond and practice (standing the infant and letting her hold the fingers of the experimenter),…

  7. Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning.

    PubMed

    Kosmicki, J A; Sochat, V; Duda, M; Wall, D P

    2015-02-24

    Although the prevalence of autism spectrum disorder (ASD) has risen sharply in the last few years reaching 1 in 68, the average age of diagnosis in the United States remains close to 4--well past the developmental window when early intervention has the largest gains. This emphasizes the importance of developing accurate methods to detect risk faster than the current standards of care. In the present study, we used machine learning to evaluate one of the best and most widely used instruments for clinical assessment of ASD, the Autism Diagnostic Observation Schedule (ADOS) to test whether only a subset of behaviors can differentiate between children on and off the autism spectrum. ADOS relies on behavioral observation in a clinical setting and consists of four modules, with module 2 reserved for individuals with some vocabulary and module 3 for higher levels of cognitive functioning. We ran eight machine learning algorithms using stepwise backward feature selection on score sheets from modules 2 and 3 from 4540 individuals. We found that 9 of the 28 behaviors captured by items from module 2, and 12 of the 28 behaviors captured by module 3 are sufficient to detect ASD risk with 98.27% and 97.66% accuracy, respectively. A greater than 55% reduction in the number of behaviorals with negligible loss of accuracy across both modules suggests a role for computational and statistical methods to streamline ASD risk detection and screening. These results may help enable development of mobile and parent-directed methods for preliminary risk evaluation and/or clinical triage that reach a larger percentage of the population and help to lower the average age of detection and diagnosis.

  8. Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning

    PubMed Central

    Kosmicki, J A; Sochat, V; Duda, M; Wall, D P

    2015-01-01

    Although the prevalence of autism spectrum disorder (ASD) has risen sharply in the last few years reaching 1 in 68, the average age of diagnosis in the United States remains close to 4—well past the developmental window when early intervention has the largest gains. This emphasizes the importance of developing accurate methods to detect risk faster than the current standards of care. In the present study, we used machine learning to evaluate one of the best and most widely used instruments for clinical assessment of ASD, the Autism Diagnostic Observation Schedule (ADOS) to test whether only a subset of behaviors can differentiate between children on and off the autism spectrum. ADOS relies on behavioral observation in a clinical setting and consists of four modules, with module 2 reserved for individuals with some vocabulary and module 3 for higher levels of cognitive functioning. We ran eight machine learning algorithms using stepwise backward feature selection on score sheets from modules 2 and 3 from 4540 individuals. We found that 9 of the 28 behaviors captured by items from module 2, and 12 of the 28 behaviors captured by module 3 are sufficient to detect ASD risk with 98.27% and 97.66% accuracy, respectively. A greater than 55% reduction in the number of behaviorals with negligible loss of accuracy across both modules suggests a role for computational and statistical methods to streamline ASD risk detection and screening. These results may help enable development of mobile and parent-directed methods for preliminary risk evaluation and/or clinical triage that reach a larger percentage of the population and help to lower the average age of detection and diagnosis. PMID:25710120

  9. Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens

    NASA Astrophysics Data System (ADS)

    Chandrakant, N.; Shenoy, P. Deepa; Venugopal, K. R.; Patnaik, L. M.

    A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect the wireless networks and mobile computing applications. In this paper, we examine the nodes that come under the vicinity of base node and members of the network and communication is provided to genuine nodes only. It is found that the proposed algorithm is a effective algorithm for security in MANETs.

  10. N-Substituted Benztropine Analogs: Selective Dopamine Transporter Ligands with a Fast Onset of Action and Minimal Cocaine-Like Behavioral Effects

    PubMed Central

    Li, Su-Min; Kopajtic, Theresa A.; O'Callaghan, Matthew J.; Agoston, Gregory E.; Cao, Jianjing; Newman, Amy Hauck

    2011-01-01

    Previous studies suggested that differences between the behavioral effects of cocaine and analogs of benztropine were related to the relatively slow onset of action of the latter compounds. Several N-substituted benztropine analogs with a relatively fast onset of effects were studied to assess whether a fast onset of effects would render the effects more similar to those of cocaine. Only one of the compounds increased locomotor activity, and the increases were modest compared with those of 10 to 20 mg/kg cocaine. In rats trained to discriminate 10 mg/kg cocaine from saline none of the compounds produced more than 40% cocaine-like responds up to 2 h after injection. None of the compounds produced place-conditioning when examined up to 90 min after injection, indicating minimal abuse liability. The compounds had 5.6 to 30 nM affinities at the dopamine transporter (DAT), with uniformly lower affinities at norepinephrine and serotonin transporters (from 490-4600 and 1420–7350 nM, respectively). Affinities at muscarinic M1 receptors were from 100- to 300-fold lower than DAT affinities, suggesting minimal contribution of those sites to the behavioral effects of the compounds. Affinities at histaminic H1 sites were from 11- to 43-fold lower than those for the DAT. The compounds also had affinity for sigma, 5-hydroxytryptamine1 (5-HT1), and 5-HT2 receptors that may have contributed to their behavioral effects. Together, the results indicate that a slow onset of action is not a necessary condition for reduced cocaine-like effects of atypical DAT ligands and suggest several mechanisms that may contribute to the reduced cocaine-like efficacy of these compounds. PMID:21088247

  11. Minimal Reduplication

    ERIC Educational Resources Information Center

    Kirchner, Jesse Saba

    2010-01-01

    This dissertation introduces Minimal Reduplication, a new theory and framework within generative grammar for analyzing reduplication in human language. I argue that reduplication is an emergent property in multiple components of the grammar. In particular, reduplication occurs independently in the phonology and syntax components, and in both cases…

  12. Minimal Reduplication

    ERIC Educational Resources Information Center

    Kirchner, Jesse Saba

    2010-01-01

    This dissertation introduces Minimal Reduplication, a new theory and framework within generative grammar for analyzing reduplication in human language. I argue that reduplication is an emergent property in multiple components of the grammar. In particular, reduplication occurs independently in the phonology and syntax components, and in both cases…

  13. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  14. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    PubMed

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  15. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    PubMed Central

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  16. A theoretical estimation for the optimal network robustness measure R against malicious node attacks

    NASA Astrophysics Data System (ADS)

    Ma, Liangliang; Liu, Jing; Duan, Boping; Zhou, Mingxing

    2015-07-01

    In a recent work (Schneider C. M. et al., Proc. Natl. Acad. Sci. U.S.A., 108 (2011) 3838), Schneider et al. introduced an effective measure R to evaluate the network robustness against malicious attacks on nodes. Take R as the objective function, they used a heuristic algorithm to optimize the network robustness. In this paper, a theoretical analysis is conducted to estimate the value of R for different types of networks, including regular networks, WS networks, ER networks, and BA networks. The experimental results show that the theoretical value of R is approximately equal to that of optimized networks. Furthermore, the theoretical analysis also shows that regular networks are the most robust than other networks. To validate this result, a heuristic method is proposed to optimize the network structure, in which the degree distribution can be changed and the number of nodes and edges remains invariant. The optimization results show that the degree of most nodes in the optimal networks is close to the average degree, and the optimal network topology is close to regular networks, which confirms the theoretical analysis.

  17. Sodium fluoroacetate toxicity: a case report of malicious poisoning in dogs across a Phoenix, Arizona neighborhood.

    PubMed

    Brower, Alexandra; Struthers, Jason; Schmidt, Jemima

    2017-10-03

    In May 2016, thirteen dogs housed in backyards within a single neighborhood were reported to have developed convulsions and died within a 24 h period. An investigation of the scene by law enforcement resulted in submission of eight dogs for postmortem examination. It was suspected that a rapid acting toxin was the cause of death. A gas chromatography-mass spectrophotometry (GC-MS) protocol combined with thin-layer chromatography that allows screening for common convulsants failed to identify a toxin in either pooled gastric content or liver samples from select cases. After consultation with a veterinary toxicologist, sodium fluoroacetate poisoning was investigated. Sodium fluoroacetate, also known as 1080, is a pesticide that was available in the United States from the 1940's to the 1970's, but since 1972 has been banned or under EPA restricted use. When gastric content was re-tested using a GC-MS protocol with selective fluoroacetate ion monitoring and carbon 14 radiolabeling to facilitate quantification, 379 ppb sodium fluoroacetate was detected in a pooled gastric content sample. In spite of its banned status, sodium fluoroacetate remains a rarely reported cause of malicious poisoning in domestic dogs in the United Sates. This compound is highly toxic and is capable of causing death in dogs, humans, other mammals, and insects in ingested quantities as small as a few droplets. Even when geographic or historical proximity to a source is not evident, this intoxication should be considered in dogs exhibiting compatible clinical signs.

  18. Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders

    DTIC Science & Technology

    2013-01-01

    Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders George...SYSLOG Alerts 9 Execute the Script Regularly 9 2.5 OSSEC HIDS Integration 10 2.5.1 Prerequisites 10 2.5.2 OSSEC Configuration for USB Auditing 11...CMU/SEI-2013-TN-003 | vi CMU/SEI-2013-TN-003 | vii Abstract Universal serial bus (USB) storage devices are useful for transferring

  19. Death by caffeine: presumptive malicious poisoning of a dog by incorporation in ground meat.

    PubMed

    Tawde, S N; Puschner, B; Albin, T; Stump, S; Poppenga, R H

    2012-12-01

    A 4-year-old, 37 kg, male German shepherd developed hyperthermia, tachycardia, and agitation following consumption of ground meat found in the backyard of its owner. When presented to a veterinary clinic, plasma ethylene glycol (EG) testing was positive, and the dog was given ethanol and lactated Ringer's solution intravenously. Approximately 11 h postexposure the dog died. Among tissues submitted for toxicological analysis, urine was negative for EG, ground meat was negative for certain drugs of abuse, and gastric contents were negative for zinc/aluminum phosphide and metaldehyde. Analysis of gastric contents by gas chromatography-mass spectrometry confirmed the presence of caffeine. Caffeine concentration in the ground meat was estimated at 1 %. Caffeine is a methylxanthine alkaloid with a reported canine oral median lethal dose (MLD(50)) of 140 mg/kg (range 120-200 mg/kg). A commercially available 200-mg tablet formulation of caffeine was considered to be a possible source but this was not confirmed. By conservative estimates, the dog would need to ingest approximately 500-550 g of the meat to reach the MLD(50). Acute intoxication affects the cardiovascular, pulmonary, neurologic, gastrointestinal, and metabolic systems. Although no tablet remnants were observed in the bait, tablets could have been crushed and/or dissolved. Other potential caffeine sources include guarana, brewed and concentrated coffee, and caffeine-containing beverages. Based on the history, clinical signs, and the detection of caffeine in the gastric contents and meat, a presumptive diagnosis of malicious caffeine poisoning was made. A suggested treatment regimen for caffeine intoxication in dogs is described. While few cases of accidental ingestion of caffeine by dogs have been described, the intentional use of a concentrated caffeine source to cause mortality in a dog has not been previously reported.

  20. Effects of minimal exercise and cognitive behavior modification on adherence, emotion change, self-image, and physical change in obese women.

    PubMed

    Annesi, J J

    2000-08-01

    The present investigation tested a 12-wk. treatment protocol which employed low intensity cardiovascular and resistance exercise as well as cognitive-behavior modification on 13 obese, previously sedentary women. Separate analyses were conducted on program maintenance, emotional change, and physiological change. Although self motivation was lower in the treatment group than in the control group (n=35), measures of exercise maintenance were significantly higher. Analyses within the treatment group only indicated significant improvements in measures of State Anxiety, Depression, Anger, Fatigue, Tension, and Vigor, also Health Evaluation, Body Area Satisfaction, and heightened Overweight Preoccupation, over the 12 weeks. Their feelings after individual bouts of exercise indicated significantly increased Positive Engagement, Revitalization, and Tranquility, and reduced Physical Exhaustion. Maximum volume of oxygen uptake (VO2max) significantly increased (2nd to 10th percentile), but not resting heart rate. No significant correlation was found between cardiorespiratory change and change in scores on depression and anxiety. No significant association was found between physiological change and change in body image. Preliminary evaluation of the minimal exercise treatment was given. The need to replicate findings with larger and different samples was emphasized.

  1. Intense or malicious? The decoding of eyebrow-lowering frowning in laughter animations depends on the presentation mode.

    PubMed

    Hofmann, Jennifer

    2014-01-01

    Joyful laughter is the only laughter type that has received sufficient validation in terms of morphology (i.e., face, voice). Still, it is unclear whether joyful laughter involves one prototypical facial-morphological configuration (Duchenne Display and mouth opening) to be decoded as such, or whether qualitatively distinct facial markers occur at different stages of laughter intensity. It was proposed that intense laughter goes along with eyebrow-lowering frowning, but in decoding studies of pictures, these "frowns" were associated with perceived maliciousness rather than higher intensity. Thus, two studies were conducted to investigate the influence of the presentation mode (static, dynamic) and eyebrow-lowering frowning on the perception of laughter animations of different intensity. In Study 1, participants (N = 110) were randomly assigned to two presentation modes (static pictures vs. dynamic videos) to watch animations of Duchenne laughter and laughter with added eyebrow-lowering frowning. Ratings on the intensity, valence, and contagiousness of the laughter were completed. In Study 2, participants (N = 55) saw both animation types in both presentation modes sequentially. Results confirmed that the static presentation lead to eyebrow-lowering frowning in intense laughter being perceived as more malicious, less intense, less benevolent, and less contagious compared to the dynamic presentation. This was replicated for maliciousness in Study 2, although participants could potentially infer the "frown" as a natural element of the laugh, as they had seen the video and the picture. Thus, a dynamic presentation is necessary for detecting graduating intensity markers in the joyfully laughing face. While this study focused on the decoding, future studies should investigate the encoding of frowning in laughter. This is important, as tools assessing facially expressed joy might need to account for laughter intensity markers that differ from the Duchenne Display.

  2. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  3. FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS

    SciTech Connect

    Jared Stimson Edward Murphy

    2007-06-01

    FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contents of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover

  4. Esophagectomy - minimally invasive

    MedlinePlus

    Minimally invasive esophagectomy; Robotic esophagectomy; Removal of the esophagus - minimally invasive; Achalasia - esophagectomy; Barrett esophagus - esophagectomy; Esophageal cancer - esophagectomy - laparoscopic; Cancer of the ...

  5. Hydrodynamic behavior and electrochemical impedance of the Hanging Meniscus Rotating Disk (HMRD) electrode. I - Meniscus shape under rotation. II - I-BIEM calculations of frequency dispersion and minimization

    NASA Technical Reports Server (NTRS)

    Cahan, Boris D.

    1991-01-01

    The shape equations for an HMRD in static and rotating configurations are developed and solved numerically. A rationale for the applicability of the standard Levich equations to the rotating case is given. The region of stability of the HMRD is examined, and the observed small negative intercept for a Levich plot is explained. The iterative boundary integral equation method is applied to the problem of frequency dispersion at an HMRD electrode. It is shown that a range of disk sizes and heights can be chosen to give almost uniform primary and secondary current distribution and minimal frequency disperison.

  6. Separation of Benign and Malicious Network Events for Accurate Malware Family Classification

    DTIC Science & Technology

    2015-09-28

    Sundaravel, “Fast malware classification by automated behavioral graph matching,” in ACM CSIIR Workshop , 2010. [3] K. Rieck, P. Trinius, C. Willems, and T...A close look on n-grams in intrusion detection: anomaly detection vs. classification ,” in ACM workshop on Artificial intelligence and security...ABSTRACT 16. SECURITY CLASSIFICATION OF: Labeling malware samples with their appropriate malware family helps understand and track malware evolution and

  7. Minimal covering problem and PLA minimization

    SciTech Connect

    Young, M.H.; Muroga, S.

    1985-12-01

    Solving the minimal covering problem by an implicit enumeration method is discussed. The implicit enumeration method in this paper is a modification of the Quine-McCluskey method tailored to computer processing and also its extension, utilizing some new properties of the minimal covering problem for speedup. A heuristic algorithm is also presented to solve large-scale problems. Its application to the minimization of programmable logic arrays (i.e., PLAs) is shown as an example. Computational experiences are presented to confirm the improvements by the implicit enumeration method discussed.

  8. A Two-Phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-Free Networks Against Multiple Malicious Attacks.

    PubMed

    Zhou, Mingxing; Liu, Jing

    2017-02-01

    Designing robust networks has attracted increasing attentions in recent years. Most existing work focuses on improving the robustness of networks against a specific type of attacks. However, networks which are robust against one type of attacks may not be robust against another type of attacks. In the real-world situations, different types of attacks may happen simultaneously. Therefore, we use the Pearson's correlation coefficient to analyze the correlation between different types of attacks, model the robustness measures against different types of attacks which are negatively correlated as objectives, and model the problem of optimizing the robustness of networks against multiple malicious attacks as a multiobjective optimization problem. Furthermore, to effectively solve this problem, we propose a two-phase multiobjective evolutionary algorithm, labeled as MOEA-RSFMMA. In MOEA-RSFMMA, a single-objective sampling phase is first used to generate a good initial population for the later two-objective optimization phase. Such a two-phase optimizing pattern well balances the computational cost of the two objectives and improves the search efficiency. In the experiments, both synthetic scale-free networks and real-world networks are used to validate the performance of MOEA-RSFMMA. Moreover, both local and global characteristics of networks in different parts of the obtained Pareto fronts are studied. The results show that the networks in different parts of Pareto fronts reflect different properties, and provide various choices for decision makers.

  9. SIV/macaque model of HIV infection in cocaine users: minimal effects of cocaine on behavior, virus replication, and CNS inflammation.

    PubMed

    Weed, Michael; Adams, Robert J; Hienz, Robert D; Meulendyke, Kelly A; Linde, Michael E; Clements, Janice E; Mankowski, Joseph L; Zink, M Christine

    2012-06-01

    Studies of the effects of drugs of abuse on HIV immune status, disease progression, and neuroAIDS have produced conflicting data and have not definitively shown whether this combination promotes cognitive impairment or disease progression. Using a consistent SIV-macaque model, we investigated the effects of cocaine on behavior, virologic parameters, and CNS inflammation. Macaques received either vehicle or chronic administration of behaviorally active doses of cocaine (1.7 or 3.2 mg/kg/day). Chronic cocaine administration reduced CD8+ T cell counts during acute and late stage infection but had no effect on CD4+ T cell counts. Low-dose cocaine-treated animals had lower CSF vRNA levels late in infection, but cocaine did not alter plasma viral load or vRNA or protein in brain. There were no differences in CSF CCL-2 or interleukin (IL)-6 levels or severity of encephalitis in cocaine-treated as compared to vehicle-treated macaques. There were no differences in brain inflammation or neurodegeneration markers, as determined by interferon (IFN)-β, MxA, CCL2, IL-6, TNFα, IFNγ, and indolamine 2,3-deoxygenase mRNA levels. APP levels also were not altered. The executive function of inhibitory control was not impaired in cocaine-treated or control animals following SIV infection. However, animals receiving 3.2 mg/kg/day cocaine performed more slowly in a bimanual motor test. Thus, chronic administration of cocaine produced only minor changes in behavior, encephalitis severity, CNS inflammation/neurodegeneration, and virus replication in SIV-infected pigtailed macaques, suggesting that cocaine would have only modest effects on the progression of neuroAIDS in HIV-infected individuals.

  10. Test and Evaluation of the Malicious Activity Simulation Tool (MAST) in a Local Area Network (LAN) Running the Common PC Operating System Environment (COMPOSE)

    DTIC Science & Technology

    2013-09-01

    Malicious Activity Simulation Tool MMORPG Massively Multiplayer Online Role-Playing Game MMS Mission Management Server MOA Memorandum of Agreement MS...conferencing, and massively multiplayer online role- playing games (MMORPG). During all of these Internet-based exchanges and transactions, the Internet user...In its 2011 Internet Crime Report, the Internet Crime Complaint Center (IC3) stated there were more than 300,000 complaints of online criminal

  11. Depressive-like behavior observed with a minimal loss of locus coeruleus (LC) neurons following administration of 6-hydroxydopamine is associated with electrophysiological changes and reversed with precursors of norepinephrine

    PubMed Central

    Szot, Patricia; Franklin, Allyn; Miguelez, Cristina; Wang, Yangqing; Vidaurrazaga, Igor; Ugedo, Luisa; Sikkema, Carl; Wilkinson, Charles W.; Raskind, Murray A.

    2016-01-01

    Depression is a common co-morbid condition most often observed in subjects with mild cognitive impairment (MCI) and during the early stages of Alzheimer’s disease (AD). Dysfunction of the central noradrenergic nervous system is an important component in depression. In AD, locus coeruleus (LC) noradrenergic neurons are significantly reduced pathologically and the reduction of LC neurons is hypothesized to begin very early in the progression of the disorder; however, it is not known if dysfunction of the noradrenergic system due to early LC neuronal loss is involved in mediating depression in early AD. Therefore, the purpose of this study was to determine in an animal model if a loss of noradrenergic LC neurons results in depressive-like behavior. The LC noradrenergic neuronal population was reduced by the bilateral administration of the neurotoxin 6-hydroxydopamine (6-OHDA) directly into the LC. Forced swim test (FST) was performed three weeks after the administration of 6-OHDA (5, 10 and 14 μg/μl), animals administered the 5 μg/μl of 6-OHDA demonstrated a significant increase in immobility, indicating depressive-like behavior. This increase in immobility at the 5 μg/μl dose was observed with a minimal loss of LC noradrenergic neurons as compared to LC neuronal loss observed at 10 and 14 μg/μl dose. A significant positive correlation between the number of surviving LC neurons after 6-OHDA and FST immobile time was observed, suggesting that in animals with a minimal loss of LC neurons (or a greater number of surviving LC neurons) following 6-OHDA demonstrated depressive-like behavior. As the 6-OHDA-induced loss of LC neurons is increased, the time spent immobile is reduced. Depressive-like behavior was also observed with the 5 μg/μl dose of 6-OHDA with a second behavior test, sucrose consumption. FTS increased immobility following 6-OHDA (5 μg/μl) was reversed by the administration of a single dose of L-1-3-4-dihydroxyphenylalanine (DOPA) or L-threo-3

  12. Better Hyper-minimization

    NASA Astrophysics Data System (ADS)

    Maletti, Andreas

    Hyper-minimization aims to compute a minimal deterministic finite automaton (dfa) that recognizes the same language as a given dfa up to a finite number of errors. Algorithms for hyper-minimization that run in time O(n logn), where n is the number of states of the given dfa, have been reported recently in [Gawrychowski and Jeż: Hyper-minimisation made efficient. Proc. Mfcs, Lncs 5734, 2009] and [Holzer and Maletti: An n logn algorithm for hyper-minimizing a (minimized) deterministic automaton. Theor. Comput. Sci. 411, 2010]. These algorithms are improved to return a hyper-minimal dfa that commits the least number of errors. This closes another open problem of [Badr, Geffert, and Shipman: Hyper-minimizing minimized deterministic finite state automata. Rairo Theor. Inf. Appl. 43, 2009]. Unfortunately, the time complexity for the obtained algorithm increases to O(n 2).

  13. Increasingly minimal bias routing

    DOEpatents

    Bataineh, Abdulla; Court, Thomas; Roweth, Duncan

    2017-02-21

    A system and algorithm configured to generate diversity at the traffic source so that packets are uniformly distributed over all of the available paths, but to increase the likelihood of taking a minimal path with each hop the packet takes. This is achieved by configuring routing biases so as to prefer non-minimal paths at the injection point, but increasingly prefer minimal paths as the packet proceeds, referred to herein as Increasing Minimal Bias (IMB).

  14. Minimizing Classroom Interruptions.

    ERIC Educational Resources Information Center

    Partin, Ronald L.

    1987-01-01

    Offers suggestions for minimizing classroom interruptions, such as suggesting to the principal that announcements not be read over the intercom during class time and arranging desks and chairs so as to minimize visual distractions. Contains a school interruption survey form. (JC)

  15. Questioning Strategies that Minimize Behavior Problems

    ERIC Educational Resources Information Center

    Bond, Nathan

    2008-01-01

    Teachers know from their training and experience that questioning plays an important role in today's instruction. Modern lessons are fast-paced and interactive, with teachers asking a lot of questions. Because this instructional strategy dominates class time and because students are active during the lesson, there are more chances for management…

  16. Behaviorism

    ERIC Educational Resources Information Center

    Moore, J.

    2011-01-01

    Early forms of psychology assumed that mental life was the appropriate subject matter for psychology, and introspection was an appropriate method to engage that subject matter. In 1913, John B. Watson proposed an alternative: classical S-R behaviorism. According to Watson, behavior was a subject matter in its own right, to be studied by the…

  17. Behaviorism

    ERIC Educational Resources Information Center

    Moore, J.

    2011-01-01

    Early forms of psychology assumed that mental life was the appropriate subject matter for psychology, and introspection was an appropriate method to engage that subject matter. In 1913, John B. Watson proposed an alternative: classical S-R behaviorism. According to Watson, behavior was a subject matter in its own right, to be studied by the…

  18. Minimal Orderings Revisited

    SciTech Connect

    Peyton, B.W.

    1999-07-01

    When minimum orderings proved too difficult to deal with, Rose, Tarjan, and Leuker instead studied minimal orderings and how to compute them (Algorithmic aspects of vertex elimination on graphs, SIAM J. Comput., 5:266-283, 1976). This paper introduces an algorithm that is capable of computing much better minimal orderings much more efficiently than the algorithm in Rose et al. The new insight is a way to use certain structures and concepts from modern sparse Cholesky solvers to re-express one of the basic results in Rose et al. The new algorithm begins with any initial ordering and then refines it until a minimal ordering is obtained. it is simple to obtain high-quality low-cost minimal orderings by using fill-reducing heuristic orderings as initial orderings for the algorithm. We examine several such initial orderings in some detail.

  19. Minimally invasive stomas.

    PubMed

    Hellinger, Michael D; Al Haddad, Abdullah

    2008-02-01

    Traditionally, stoma creation and end stoma reversal have been performed via a laparotomy incision. However, in many situations, stoma construction may be safely performed in a minimally invasive nature. This may include a trephine, laparoscopic, or combined approach. Furthermore, Hartmann's colostomy reversal, a procedure traditionally associated with substantial morbidity, may also be performed laparoscopically. The authors briefly review patient selection, preparation, and indications, and focus primarily on surgical techniques and results of minimally invasive stoma creation and Hartmann's reversal.

  20. Minimally invasive lumbar foraminotomy.

    PubMed

    Deutsch, Harel

    2013-07-01

    Lumbar radiculopathy is a common problem. Nerve root compression can occur at different places along a nerve root's course including in the foramina. Minimal invasive approaches allow easier exposure of the lateral foramina and decompression of the nerve root in the foramina. This video demonstrates a minimally invasive approach to decompress the lumbar nerve root in the foramina with a lateral to medial decompression. The video can be found here: http://youtu.be/jqa61HSpzIA.

  1. Minimally invasive procedures

    PubMed Central

    Baltayiannis, Nikolaos; Michail, Chandrinos; Lazaridis, George; Anagnostopoulos, Dimitrios; Baka, Sofia; Mpoukovinas, Ioannis; Karavasilis, Vasilis; Lampaki, Sofia; Papaiwannou, Antonis; Karavergou, Anastasia; Kioumis, Ioannis; Pitsiou, Georgia; Katsikogiannis, Nikolaos; Tsakiridis, Kosmas; Rapti, Aggeliki; Trakada, Georgia; Zissimopoulos, Athanasios; Zarogoulidis, Konstantinos

    2015-01-01

    Minimally invasive procedures, which include laparoscopic surgery, use state-of-the-art technology to reduce the damage to human tissue when performing surgery. Minimally invasive procedures require small “ports” from which the surgeon inserts thin tubes called trocars. Carbon dioxide gas may be used to inflate the area, creating a space between the internal organs and the skin. Then a miniature camera (usually a laparoscope or endoscope) is placed through one of the trocars so the surgical team can view the procedure as a magnified image on video monitors in the operating room. Specialized equipment is inserted through the trocars based on the type of surgery. There are some advanced minimally invasive surgical procedures that can be performed almost exclusively through a single point of entry—meaning only one small incision, like the “uniport” video-assisted thoracoscopic surgery (VATS). Not only do these procedures usually provide equivalent outcomes to traditional “open” surgery (which sometimes require a large incision), but minimally invasive procedures (using small incisions) may offer significant benefits as well: (I) faster recovery; (II) the patient remains for less days hospitalized; (III) less scarring and (IV) less pain. In our current mini review we will present the minimally invasive procedures for thoracic surgery. PMID:25861610

  2. Minimal gaugino mediation

    SciTech Connect

    Schmaltz, Martin; Skiba, Witold

    2000-11-01

    We propose minimal gaugino mediation as the simplest known solution to the supersymmetric flavor and CP problems. The framework predicts a very minimal structure for the soft parameters at ultrahigh energies: gaugino masses are unified and non-vanishing whereas all other soft supersymmetry breaking parameters vanish. We show that this boundary condition naturally arises from a small extra dimension and present a complete model which includes a new extra-dimensional solution to the {mu} problem. We briefly discuss the predicted superpartner spectrum as a function of the two parameters of the model. The commonly ignored renormalization group evolution above the GUT scale is crucial to the viability of minimal gaugino mediation but does not introduce new model dependence.

  3. Minimal Gaugino Mediation

    SciTech Connect

    Schmaltz, M.

    2000-01-19

    The authors propose Minimal Gaugino Mediation as the simplest known solution to the supersymmetric flavor and CP problems. The framework predicts a very minimal structure for the soft parameters at ultra-high energies: gaugino masses are unified and non-vanishing whereas all other soft supersymmetry breaking parameters vanish. The authors show that this boundary condition naturally arises from a small extra dimension and present a complete model which includes a new extra-dimensional solution to the mu problem. The authors briefly discuss the predicted superpartner spectrum as a function of the two parameters of the model. The commonly ignored renormalization group evolution above the GUT scale is crucial to the viability of Minimal Gaugino Mediation but does not introduce new model dependence.

  4. Periodic minimal surfaces

    NASA Astrophysics Data System (ADS)

    Mackay, Alan L.

    1985-04-01

    A minimal surface is one for which, like a soap film with the same pressure on each side, the mean curvature is zero and, thus, is one where the two principal curvatures are equal and opposite at every point. For every closed circuit in the surface, the area is a minimum. Schwarz1 and Neovius2 showed that elements of such surfaces could be put together to give surfaces periodic in three dimensions. These periodic minimal surfaces are geometrical invariants, as are the regular polyhedra, but the former are curved. Minimal surfaces are appropriate for the description of various structures where internal surfaces are prominent and seek to adopt a minimum area or a zero mean curvature subject to their topology; thus they merit more complete numerical characterization. There seem to be at least 18 such surfaces3, with various symmetries and topologies, related to the crystallographic space groups. Recently, glyceryl mono-oleate (GMO) was shown by Longley and McIntosh4 to take the shape of the F-surface. The structure postulated is shown here to be in good agreement with an analysis of the fundamental geometry of periodic minimal surfaces.

  5. CONMIN- CONSTRAINED FUNCTION MINIMIZATION

    NASA Technical Reports Server (NTRS)

    Vanderplaats, G. N.

    1994-01-01

    In many mathematical problems, it is necessary to determine the minimum and maximum of a function of several variables, limited by various linear and nonlinear inequality constraints. It is seldom possible, in practical applications, to solve these problems directly. In most cases, an iterative method must be used to numerically obtain a solution. The CONMIN program was developed to numerically perform the minimization of a multi-variable function subject to a set of inequality constraints. The function need not be a simple analytical equation; it may be any function which can be numerically evaluated. The basic analytic technique used by CONMIN is to minimize the function until one or more of the constraints become active. The minimization process then continues by following the constraint boundaries in a direction such that the value of the function continues to decrease. When a point is reached where no further decrease in the function can be obtained, the process is terminated. Function maximization may be achieved by minimizing the negative of the function. This program is written in FORTRAN IV for batch execution and has been implemented on a CDC 6000 series computer with a central memory requirement of approximately 43K (octal) of 60 bit words. The CONMIN program was originally developed in 1973 and last updated in 1978.

  6. Minimally invasive valve surgery.

    PubMed

    Woo, Y Joseph

    2009-08-01

    Traditional cardiac valve replacement surgery is being rapidly supplanted by innovative, minimally invasive approaches toward the repair of these valves. Patients are experiencing benefits ranging from less bleeding and pain to faster recovery and greater satisfaction. These operations are proving to be safe, highly effective, and durable, and their use will likely continue to increase and become even more widely applicable.

  7. Minimal hepatic encephalopathy.

    PubMed

    Zamora Nava, Luis Eduardo; Torre Delgadillo, Aldo

    2011-06-01

    The term minimal hepatic encephalopathy (MHE) refers to the subtle changes in cognitive function, electrophysiological parameters, cerebral neurochemical/neurotransmitter homeostasis, cerebral blood flow, metabolism, and fluid homeostasis that can be observed in patients with cirrhosis who have no clinical evidence of hepatic encephalopathy; the prevalence is as high as 84% in patients with hepatic cirrhosis. Physician does generally not perceive cirrhosis complications, and neuropsychological tests and another especial measurement like evoked potentials and image studies like positron emission tomography can only make diagnosis. Diagnosis of minimal hepatic encephalopathy may have prognostic and therapeutic implications in cirrhotic patients. The present review pretends to explore the clinic, therapeutic, diagnosis and prognostic aspects of this complication.

  8. Discrete Minimal Surface Algebras

    NASA Astrophysics Data System (ADS)

    Arnlind, Joakim; Hoppe, Jens

    2010-05-01

    We consider discrete minimal surface algebras (DMSA) as generalized noncommutative analogues of minimal surfaces in higher dimensional spheres. These algebras appear naturally in membrane theory, where sequences of their representations are used as a regularization. After showing that the defining relations of the algebra are consistent, and that one can compute a basis of the enveloping algebra, we give several explicit examples of DMSAs in terms of subsets of sln (any semi-simple Lie algebra providing a trivial example by itself). A special class of DMSAs are Yang-Mills algebras. The representation graph is introduced to study representations of DMSAs of dimension d ≤ 4, and properties of representations are related to properties of graphs. The representation graph of a tensor product is (generically) the Cartesian product of the corresponding graphs. We provide explicit examples of irreducible representations and, for coinciding eigenvalues, classify all the unitary representations of the corresponding algebras.

  9. Minimally symmetric Higgs boson

    SciTech Connect

    Low, Ian

    2015-06-17

    Models addressing the naturalness of a light Higgs boson typically employ symmetries, either bosonic or fermionic, to stabilize the Higgs mass. We consider a setup with the minimal amount of symmetries: four shift symmetries acting on the four components of the Higgs doublet, subject to the constraints of linearly realized SU(2)(L) x U(1)(Y) electroweak symmetry. Up to terms that explicitly violate the shift symmetries, the effective Lagrangian can be derived, irrespective of the spontaneously broken group G in the ultraviolet, and is universal among all models where the Higgs arises as a pseudo-Nambu-Goldstone boson. Very high energy scatterings of vector bosons could provide smoking gun signals of a minimally symmetric Higgs boson.

  10. Waste Minimization Crosscut Plan

    SciTech Connect

    Not Available

    1992-05-13

    On November 27, 1991, the Secretary of Energy directed that a Department of Energy (DOE) crosscut plan for waste minimization (WMin) be prepared and submitted by March 1, 1992. This Waste Minimization Crosscut Plan responds to the Secretary's direction and supports the National Energy Strategy (NES) goals of achieving greater energy security, increasing energy and economic efficiency, and enhancing environmental quality. It provides a DOE-wide planning framework for effective coordination of all DOE WMin activities. This Plan was jointly prepared by the following Program Secretarial Officer (PSO) organizations: Civilian Radioactive Waste Management (RW); Conservation and Renewable Energy (CE); Defense Programs (DP); Environmental Restoration and Waste Management (EM), lead; Energy Research (ER); Fossil Energy (FE); Nuclear Energy (NE); and New Production Reactors (NP). Assistance and guidance was provided by the offices of Policy, Planning, and Analysis (PE) and Environment, Safety and Health (EH). Comprehensive application of waste minimization within the Department and in both the public and private sectors will provide significant benefits and support National Energy Strategy goals. These benefits include conservation of a substantial proportion of the energy now used by industry and Government, improved environmental quality, reduced health risks, improved production efficiencies, and longer useful life of disposal capacity. Taken together, these benefits will mean improved US global competitiveness, expanded job opportunities, and a better quality of life for all citizens.

  11. Waste Minimization Crosscut Plan

    SciTech Connect

    Not Available

    1992-05-13

    On November 27, 1991, the Secretary of Energy directed that a Department of Energy (DOE) crosscut plan for waste minimization (WMin) be prepared and submitted by March 1, 1992. This Waste Minimization Crosscut Plan responds to the Secretary`s direction and supports the National Energy Strategy (NES) goals of achieving greater energy security, increasing energy and economic efficiency, and enhancing environmental quality. It provides a DOE-wide planning framework for effective coordination of all DOE WMin activities. This Plan was jointly prepared by the following Program Secretarial Officer (PSO) organizations: Civilian Radioactive Waste Management (RW); Conservation and Renewable Energy (CE); Defense Programs (DP); Environmental Restoration and Waste Management (EM), lead; Energy Research (ER); Fossil Energy (FE); Nuclear Energy (NE); and New Production Reactors (NP). Assistance and guidance was provided by the offices of Policy, Planning, and Analysis (PE) and Environment, Safety and Health (EH). Comprehensive application of waste minimization within the Department and in both the public and private sectors will provide significant benefits and support National Energy Strategy goals. These benefits include conservation of a substantial proportion of the energy now used by industry and Government, improved environmental quality, reduced health risks, improved production efficiencies, and longer useful life of disposal capacity. Taken together, these benefits will mean improved US global competitiveness, expanded job opportunities, and a better quality of life for all citizens.

  12. Minimal surfaces over stars

    NASA Astrophysics Data System (ADS)

    McDougall, Jane; Schaubroeck, Lisbeth

    2008-04-01

    A JS surface is a minimal graph over a polygonal domain that becomes infinite in magnitude at the domain boundary. Jenkins and Serrin characterized the existence of these minimal graphs in terms of the signs of the boundary values and the side-lengths of the polygon. For a convex polygon, there can be essentially only one JS surface, but a non-convex domain may admit several distinct JS surfaces. We consider two families of JS surfaces corresponding to different boundary values, namely JS0 and JS1, over domains in the form of regular stars. We give parameterizations for these surfaces as lifts of harmonic maps, and observe that all previously constructed JS surfaces have been of type JS0. We give an example of a JS1 surface that is a new complete embedded minimal surface generalizing Scherk's doubly periodic surface, and show also that the JS0 surface over a regular convex 2n-gon is the limit of JS1 surfaces over non-convex stars. Finally we consider the construction of other JS surfaces over stars that belong neither to JS0 nor to JS1.

  13. [Minimally invasive thymus surgery].

    PubMed

    Rückert, J C; Ismail, M; Swierzy, M; Braumann, C; Badakhshi, H; Rogalla, P; Meisel, A; Rückert, R I; Müller, J M

    2008-01-01

    There are absolute and relative indications for complete removal of the thymus gland. In the complex therapy of autoimmune-related myasthenia gravis, thymectomy plays a central role and is performed with relative indication. In case of thymoma with or without myasthenia, thymectomy is absolutely indicated. Thymus resection is further necessary for cases of hyperparathyroidism with ectopic intrathymic parathyroids or with certain forms of multiple endocrine neoplasia. The transcervical operation technique traditionally reflected the well-founded desire for minimal invasiveness for thymectomy. Due to the requirement of radicality however, most of these operations were performed using sternotomy. With the evolution of therapeutic thoracoscopy in thoracic surgery, several pure or extended minimally invasive operation techniques for thymectomy have been developed. At present uni- or bilateral, subxiphoid, and modified transcervical single or combination thoracoscopic techniques are in use. Recently a very precise new level of thoracoscopic operation technique was developed using robotic-assisted surgery. There are special advantages of this technique for thymectomy. An overview of the development and experiences with minimally invasive thymectomy is presented, including data from the largest series published so far.

  14. Minimally invasive mediastinal surgery

    PubMed Central

    Melfi, Franca M. A.; Mussi, Alfredo

    2016-01-01

    In the past, mediastinal surgery was associated with the necessity of a maximum exposure, which was accomplished through various approaches. In the early 1990s, many surgical fields, including thoracic surgery, observed the development of minimally invasive techniques. These included video-assisted thoracic surgery (VATS), which confers clear advantages over an open approach, such as less trauma, short hospital stay, increased cosmetic results and preservation of lung function. However, VATS is associated with several disadvantages. For this reason, it is not routinely performed for resection of mediastinal mass lesions, especially those located in the anterior mediastinum, a tiny and remote space that contains vital structures at risk of injury. Robotic systems can overcome the limits of VATS, offering three-dimensional (3D) vision and wristed instrumentations, and are being increasingly used. With regards to thymectomy for myasthenia gravis (MG), unilateral and bilateral VATS approaches have demonstrated good long-term neurologic results with low complication rates. Nevertheless, some authors still advocate the necessity of maximum exposure, especially when considering the distribution of normal and ectopic thymic tissue. In recent studies, the robotic approach has shown to provide similar neurological outcomes when compared to transsternal and VATS approaches, and is associated with a low morbidity. Importantly, through a unilateral robotic technique, it is possible to dissect and remove at least the same amount of mediastinal fat tissue. Preliminary results on early-stage thymomatous disease indicated that minimally invasive approaches are safe and feasible, with a low rate of pleural recurrence, underlining the necessity of a “no-touch” technique. However, especially for thymomatous disease characterized by an indolent nature, further studies with long follow-up period are necessary in order to assess oncologic and neurologic results through minimally

  15. Minimally refined biomass fuel

    DOEpatents

    Pearson, Richard K.; Hirschfeld, Tomas B.

    1984-01-01

    A minimally refined fluid composition, suitable as a fuel mixture and derived from biomass material, is comprised of one or more water-soluble carbohydrates such as sucrose, one or more alcohols having less than four carbons, and water. The carbohydrate provides the fuel source; water solubilizes the carbohydrates; and the alcohol aids in the combustion of the carbohydrate and reduces the vicosity of the carbohydrate/water solution. Because less energy is required to obtain the carbohydrate from the raw biomass than alcohol, an overall energy savings is realized compared to fuels employing alcohol as the primary fuel.

  16. Wake Vortex Minimization

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A status report is presented on research directed at reducing the vortex disturbances of aircraft wakes. The objective of such a reduction is to minimize the hazard to smaller aircraft that might encounter these wakes. Inviscid modeling was used to study trailing vortices and viscous effects were investigated. Laser velocimeters were utilized in the measurement of aircraft wakes. Flight and wind tunnel tests were performed on scale and full model scale aircraft of various design. Parameters investigated included the effect of wing span, wing flaps, spoilers, splines and engine thrust on vortex attenuation. Results indicate that vortives may be alleviated through aerodynamic means.

  17. The ZOOM minimization package

    SciTech Connect

    Fischler, Mark S.; Sachs, D.; /Fermilab

    2004-11-01

    A new object-oriented Minimization package is available for distribution in the same manner as CLHEP. This package, designed for use in HEP applications, has all the capabilities of Minuit, but is a re-write from scratch, adhering to modern C++ design principles. A primary goal of this package is extensibility in several directions, so that its capabilities can be kept fresh with as little maintenance effort as possible. This package is distinguished by the priority that was assigned to C++ design issues, and the focus on producing an extensible system that will resist becoming obsolete.

  18. Logarithmic superconformal minimal models

    NASA Astrophysics Data System (ADS)

    Pearce, Paul A.; Rasmussen, Jørgen; Tartaglia, Elena

    2014-05-01

    The higher fusion level logarithmic minimal models {\\cal LM}(P,P';n) have recently been constructed as the diagonal GKO cosets {(A_1^{(1)})_k\\oplus (A_1^ {(1)})_n}/ {(A_1^{(1)})_{k+n}} where n ≥ 1 is an integer fusion level and k = nP/(P‧- P) - 2 is a fractional level. For n = 1, these are the well-studied logarithmic minimal models {\\cal LM}(P,P')\\equiv {\\cal LM}(P,P';1). For n ≥ 2, we argue that these critical theories are realized on the lattice by n × n fusion of the n = 1 models. We study the critical fused lattice models {\\cal LM}(p,p')_{n\\times n} within a lattice approach and focus our study on the n = 2 models. We call these logarithmic superconformal minimal models {\\cal LSM}(p,p')\\equiv {\\cal LM}(P,P';2) where P = |2p - p‧|, P‧ = p‧ and p, p‧ are coprime. These models share the central charges c=c^{P,P';2}=\\frac {3}{2}\\big (1-{2(P'-P)^2}/{P P'}\\big ) of the rational superconformal minimal models {\\cal SM}(P,P'). Lattice realizations of these theories are constructed by fusing 2 × 2 blocks of the elementary face operators of the n = 1 logarithmic minimal models {\\cal LM}(p,p'). Algebraically, this entails the fused planar Temperley-Lieb algebra which is a spin-1 Birman-Murakami-Wenzl tangle algebra with loop fugacity β2 = [x]3 = x2 + 1 + x-2 and twist ω = x4 where x = eiλ and λ = (p‧- p)π/p‧. The first two members of this n = 2 series are superconformal dense polymers {\\cal LSM}(2,3) with c=-\\frac {5}{2}, β2 = 0 and superconformal percolation {\\cal LSM}(3,4) with c = 0, β2 = 1. We calculate the bulk and boundary free energies analytically. By numerically studying finite-size conformal spectra on the strip with appropriate boundary conditions, we argue that, in the continuum scaling limit, these lattice models are associated with the logarithmic superconformal models {\\cal LM}(P,P';2). For system size N, we propose finitized Kac character formulae of the form q^{-{c^{P,P';2}}/{24}+\\Delta ^{P,P';2} _{r

  19. Transanal Minimally Invasive Surgery

    PubMed Central

    deBeche-Adams, Teresa; Nassif, George

    2015-01-01

    Transanal minimally invasive surgery (TAMIS) was first described in 2010 as a crossover between single-incision laparoscopic surgery and transanal endoscopic microsurgery (TEM) to allow access to the proximal and mid-rectum for resection of benign and early-stage malignant rectal lesions. The TAMIS technique can also be used for noncurative intent surgery of more advanced lesions in patients who are not candidates for radical surgery. Proper workup and staging should be done before surgical decision-making. In addition to the TAMIS port, instrumentation and set up include readily available equipment found in most operating suites. TAMIS has proven its usefulness in a wide range of applications outside of local excision, including repair of rectourethral fistula, removal of rectal foreign body, control of rectal hemorrhage, and as an adjunct in total mesorectal excision for rectal cancer. TAMIS is an easily accessible, technically feasible, and cost-effective alternative to TEM. PMID:26491410

  20. Membranes minimize liquid discharge

    SciTech Connect

    Cappos, S.

    1995-07-01

    Zero discharge is a matter of concentration. Liquid and solid waste are repeatedly reduced to minimize or eliminate their discharge. But the process is intense, requiring an array of filtering and purifying technologies to achieve discharge goals. One of the most productive and effective technologies for this purpose is reverse osmosis (RO). Developed in the 1960s, RO produces a high-quality permeate for reuse, and a small concentrated stream for further treatment. The addition of RO to a wastewater treatment system can reduce overall operating costs and the capital costs of other components, as well as reduce a waste treatment system`s reliance on chemical treatment. The paper discusses how RO works, when RO is the best solution, where the waste goes, alternative technologies (clarifiers, vapor compression evaporators, and ion exchange demineralizers), and recent advances in membrane technology.

  1. Minimally invasive esophagectomy

    PubMed Central

    Herbella, Fernando A; Patti, Marco G

    2010-01-01

    Esophageal resection is associated with a high morbidity and mortality rate. Minimally invasive esophagectomy (MIE) might theoretically decrease this rate. We reviewed the current literature on MIE, with a focus on the available techniques, outcomes and comparison with open surgery. This review shows that the available literature on MIE is still crowded with heterogeneous studies with different techniques. There are no controlled and randomized trials, and the few retrospective comparative cohort studies are limited by small numbers of patients and biased by historical controls of open surgery. Based on the available literature, there is no evidence that MIE brings clear benefits compared to conventional esophagectomy. Increasing experience and the report of larger series might change this scenario. PMID:20698044

  2. Minimally invasive valve surgery.

    PubMed

    Woo, Y Joseph; Seeburger, Joerg; Mohr, Friedrich W

    2007-01-01

    As alternatives to standard sternotomy, surgeons have developed innovative, minimally invasive approaches to conducting valve surgery. Through very small skin incisions and partial upper sternal division for aortic valve surgery and right minithoracotomy for mitral surgery, surgeons have become adept at performing complex valve procedures. Beyond cosmetic appeal, apparent benefits range from decreased pain and bleeding to improved respiratory function and recovery time. The large retrospective studies and few small prospective randomized studies are herein briefly summarized. The focus is then directed toward describing specific intraoperative technical details in current clinical use, covering anesthetic preparation, incision, mediastinal access, cardiovascular cannulation, valve exposure, and valve reconstruction. Finally, unique situations such as pulmonic valve surgery, reoperations, beating heart surgery, and robotics are discussed.

  3. Minimally invasive parathyroid surgery

    PubMed Central

    Noureldine, Salem I.; Gooi, Zhen

    2015-01-01

    Traditionally, bilateral cervical exploration for localization of all four parathyroid glands and removal of any that are grossly enlarged has been the standard surgical treatment for primary hyperparathyroidism (PHPT). With the advances in preoperative localization studies and greater public demand for less invasive procedures, novel targeted, minimally invasive techniques to the parathyroid glands have been described and practiced over the past 2 decades. Minimally invasive parathyroidectomy (MIP) can be done either through the standard Kocher incision, a smaller midline incision, with video assistance (purely endoscopic and video-assisted techniques), or through an ectopically placed, extracervical, incision. In current practice, once PHPT is diagnosed, preoperative evaluation using high-resolution radiographic imaging to localize the offending parathyroid gland is essential if MIP is to be considered. The imaging study results suggest where the surgeon should begin the focused procedure and serve as a road map to allow tailoring of an efficient, imaging-guided dissection while eliminating the unnecessary dissection of multiple glands or a bilateral exploration. Intraoperative parathyroid hormone (IOPTH) levels may be measured during the procedure, or a gamma probe used during radioguided parathyroidectomy, to ascertain that the correct gland has been excised and that no other hyperfunctional tissue is present. MIP has many advantages over the traditional bilateral, four-gland exploration. MIP can be performed using local anesthesia, requires less operative time, results in fewer complications, and offers an improved cosmetic result and greater patient satisfaction. Additional advantages of MIP are earlier hospital discharge and decreased overall associated costs. This article aims to address the considerations for accomplishing MIP, including the role of preoperative imaging studies, intraoperative adjuncts, and surgical techniques. PMID:26425454

  4. Minimal Marking: A Success Story

    ERIC Educational Resources Information Center

    McNeilly, Anne

    2014-01-01

    The minimal-marking project conducted in Ryerson's School of Journalism throughout 2012 and early 2013 resulted in significantly higher grammar scores in two first-year classes of minimally marked university students when compared to two traditionally marked classes. The "minimal-marking" concept (Haswell, 1983), which requires…

  5. Exploration, novelty, surprise, and free energy minimization.

    PubMed

    Schwartenbeck, Philipp; Fitzgerald, Thomas; Dolan, Raymond J; Friston, Karl

    2013-01-01

    This paper reviews recent developments under the free energy principle that introduce a normative perspective on classical economic (utilitarian) decision-making based on (active) Bayesian inference. It has been suggested that the free energy principle precludes novelty and complexity, because it assumes that biological systems-like ourselves-try to minimize the long-term average of surprise to maintain their homeostasis. However, recent formulations show that minimizing surprise leads naturally to concepts such as exploration and novelty bonuses. In this approach, agents infer a policy that minimizes surprise by minimizing the difference (or relative entropy) between likely and desired outcomes, which involves both pursuing the goal-state that has the highest expected utility (often termed "exploitation") and visiting a number of different goal-states ("exploration"). Crucially, the opportunity to visit new states increases the value of the current state. Casting decision-making problems within a variational framework, therefore, predicts that our behavior is governed by both the entropy and expected utility of future states. This dissolves any dialectic between minimizing surprise and exploration or novelty seeking.

  6. Minimal Higgs inflation

    NASA Astrophysics Data System (ADS)

    Maity, Debaprasad

    2017-06-01

    In this paper we propose minimal Higgs inflation scenarios by non-polynomial modification of the Higgs potential. The modification is done in such a way that it creates a flat plateau for a huge range of field values at the inflationary energy scale μ ≃(λ) 1 / 4 α. Assuming the perturbative Higgs quartic coupling, λ ≃ O (1), our model prediction for all the cosmologically relevant quantities, (ns , r , dnsk), fit extremely well with observations made by PLANCK. For both the models the inflation energy scale turned out to be μ ≃ (1014 ,1015) GeV. Considering observed central value of the scalar spectral index, ns = 0.968, models predict efolding number, N = (52 , 47). Within a wide range of viable parameter space, we found that the prediction of tensor to scalar ratio r (≤10-5) is far below the current experimental limit. The prediction for the running of scalar spectral index, dnsk, remains very small. We also computed the background field dependent unitarity scale Λ (h), which turned out to be much larger than the aforementioned inflationary energy scale.

  7. Discrete minimal flavor violation

    SciTech Connect

    Zwicky, Roman; Fischbacher, Thomas

    2009-10-01

    We investigate the consequences of replacing the global flavor symmetry of minimal flavor violation (MFV) SU(3){sub Q}xSU(3){sub U}xSU(3){sub D}x{center_dot}{center_dot}{center_dot} by a discrete D{sub Q}xD{sub U}xD{sub D}x{center_dot}{center_dot}{center_dot} symmetry. Goldstone bosons resulting from the breaking of the flavor symmetry generically lead to bounds on new flavor structure many orders of magnitude above the TeV scale. The absence of Goldstone bosons for discrete symmetries constitute the primary motivation of our work. Less symmetry implies further invariants and renders the mass-flavor basis transformation observable in principle and calls for a hierarchy in the Yukawa matrix expansion. We show, through the dimension of the representations, that the (discrete) symmetry in principle does allow for additional {delta}F=2 operators. If though the {delta}F=2 transitions are generated by two subsequent {delta}F=1 processes, as, for example, in the standard model, then the four crystal-like groups {sigma}(168){approx_equal}PSL(2,F{sub 7}), {sigma}(72{phi}), {sigma}(216{phi}) and especially {sigma}(360{phi}) do provide enough protection for a TeV-scale discrete MFV scenario. Models where this is not the case have to be investigated case by case. Interestingly {sigma}(216{phi}) has a (nonfaithful) representation corresponding to an A{sub 4} symmetry. Moreover we argue that the, apparently often omitted, (D) groups are subgroups of an appropriate {delta}(6g{sup 2}). We would like to stress that we do not provide an actual model that realizes the MFV scenario nor any other theory of flavor.

  8. Minimal Change Disease.

    PubMed

    Vivarelli, Marina; Massella, Laura; Ruggiero, Barbara; Emma, Francesco

    2017-02-07

    Minimal change disease (MCD) is a major cause of idiopathic nephrotic syndrome (NS), characterized by intense proteinuria leading to edema and intravascular volume depletion. In adults, it accounts for approximately 15% of patients with idiopathic NS, reaching a much higher percentage at younger ages, up to 70%-90% in children >1 year of age. In the pediatric setting, a renal biopsy is usually not performed if presentation is typical and the patient responds to therapy with oral prednisone at conventional doses. Therefore, in this setting steroid-sensitive NS can be considered synonymous with MCD. The pathologic hallmark of disease is absence of visible alterations by light microscopy and effacement of foot processes by electron microscopy. Although the cause is unknown and it is likely that different subgroups of disease recognize a different pathogenesis, immunologic dysregulation and modifications of the podocyte are thought to synergize in altering the integrity of the glomerular basement membrane and therefore determining proteinuria. The mainstay of therapy is prednisone, but steroid-sensitive forms frequently relapse and this leads to a percentage of patients requiring second-line steroid-sparing immunosuppression. The outcome is variable, but forms of MCD that respond to steroids usually do not lead to chronic renal damage, whereas forms that are unresponsive to steroids may subsequently reveal themselves as FSGS. However, in a substantial number of patients the disease is recurrent and requires long-term immunosuppression, with significant morbidity because of side effects. Recent therapeutic advances, such as the use of anti-CD20 antibodies, have provided long-term remission off-therapy and suggest new hypotheses for disease pathogenesis. Copyright © 2017 by the American Society of Nephrology.

  9. Guidelines for mixed waste minimization

    SciTech Connect

    Owens, C.

    1992-02-01

    Currently, there is no commercial mixed waste disposal available in the United States. Storage and treatment for commercial mixed waste is limited. Host States and compacts region officials are encouraging their mixed waste generators to minimize their mixed wastes because of management limitations. This document provides a guide to mixed waste minimization.

  10. Influenza SIRS with Minimal Pneumonitis.

    PubMed

    Erramilli, Shruti; Mannam, Praveen; Manthous, Constantine A

    2016-01-01

    Although systemic inflammatory response syndrome (SIRS) is a known complication of severe influenza pneumonia, it has been reported very rarely in patients with minimal parenchymal lung disease. We here report a case of severe SIRS, anasarca, and marked vascular phenomena with minimal or no pneumonitis. This case highlights that viruses, including influenza, may cause vascular dysregulation causing SIRS, even without substantial visceral organ involvement.

  11. Minimal walking technicolor: Setup for collider physics

    SciTech Connect

    Foadi, Roshan; Frandsen, Mads T.; Ryttov, Thomas A.; Sannino, Francesco

    2007-09-01

    Different theoretical and phenomenological aspects of the minimal and nonminimal walking technicolor theories have recently been studied. The goal here is to make the models ready for collider phenomenology. We do this by constructing the low energy effective theory containing scalars, pseudoscalars, vector mesons, and other fields predicted by the minimal walking theory. We construct their self-interactions and interactions with standard model fields. Using the Weinberg sum rules, opportunely modified to take into account the walking behavior of the underlying gauge theory, we find interesting relations for the spin-one spectrum. We derive the electroweak parameters using the newly constructed effective theory and compare the results with the underlying gauge theory. Our analysis is sufficiently general such that the resulting model can be used to represent a generic walking technicolor theory not at odds with precision data.

  12. Waste minimization handbook, Volume 1

    SciTech Connect

    Boing, L.E.; Coffey, M.J.

    1995-12-01

    This technical guide presents various methods used by industry to minimize low-level radioactive waste (LLW) generated during decommissioning and decontamination (D and D) activities. Such activities generate significant amounts of LLW during their operations. Waste minimization refers to any measure, procedure, or technique that reduces the amount of waste generated during a specific operation or project. Preventive waste minimization techniques implemented when a project is initiated can significantly reduce waste. Techniques implemented during decontamination activities reduce the cost of decommissioning. The application of waste minimization techniques is not limited to D and D activities; it is also useful during any phase of a facility`s life cycle. This compendium will be supplemented with a second volume of abstracts of hundreds of papers related to minimizing low-level nuclear waste. This second volume is expected to be released in late 1996.

  13. The minimal length and quantum partition functions

    NASA Astrophysics Data System (ADS)

    Abbasiyan-Motlaq, M.; Pedram, P.

    2014-08-01

    We study the thermodynamics of various physical systems in the framework of the generalized uncertainty principle that implies a minimal length uncertainty proportional to the Planck length. We present a general scheme to analytically calculate the quantum partition function of the physical systems to first order of the deformation parameter based on the behavior of the modified energy spectrum and compare our results with the classical approach. Also, we find the modified internal energy and heat capacity of the systems for the anti-Snyder framework.

  14. Minimal relativistic three-particle equations

    SciTech Connect

    Lindesay, J.

    1981-07-01

    A minimal self-consistent set of covariant and unitary three-particle equations is presented. Numerical results are obtained for three-particle bound states, elastic scattering and rearrangement of bound pairs with a third particle, and amplitudes for breakup into states of three free particles. The mathematical form of the three-particle bound state equations is explored; constraints are set upon the range of eigenvalues and number of eigenstates of these one parameter equations. The behavior of the number of eigenstates as the two-body binding energy decreases to zero in a covariant context generalizes results previously obtained non-relativistically by V. Efimov.

  15. Minimizing waste in environmental restoration

    SciTech Connect

    Moos, L.; Thuot, J.R.

    1996-07-01

    Environmental restoration, decontamination and decommissioning and facility dismantelment projects are not typically known for their waste minimization and pollution prevention efforts. Typical projects are driven by schedules and milestones with little attention given to cost or waste minimization. Conventional wisdom in these projects is that the waste already exists and cannot be reduced or minimized. In fact, however, there are three significant areas where waste and cost can be reduced. Waste reduction can occur in three ways: beneficial reuse or recycling; segregation of waste types; and reducing generation of secondary waste. This paper will discuss several examples of reuse, recycle, segregation, and secondary waste reduction at ANL restoration programs.

  16. Aortic valve surgery - minimally invasive

    MedlinePlus

    ... of the heart is reduced. This is called aortic stenosis. The aortic valve can be replaced using: Minimally ... RN, Wang A. Percutaneous heart valve replacement for aortic stenosis: state of the evidence. Ann Intern Med . 2010; ...

  17. Constrained minimization for monotonic reconstruction

    SciTech Connect

    Rider, W.J.; Kothe, D.B.

    1996-08-20

    The authors present several innovations in a method for monotonic reconstructions. It is based on the application of constrained minimization techniques for the imposition of monotonicity on a reconstruction. In addition, they present extensions of several classical TVD limiters to a genuinely multidimensional setting. In this case the linear least squares reconstruction method is expanded upon. They also clarify data dependent weighting techniques used with the minimization process.

  18. Shapes of embedded minimal surfaces.

    PubMed

    Colding, Tobias H; Minicozzi, William P

    2006-07-25

    Surfaces that locally minimize area have been extensively used to model physical phenomena, including soap films, black holes, compound polymers, protein folding, etc. The mathematical field dates to the 1740s but has recently become an area of intense mathematical and scientific study, specifically in the areas of molecular engineering, materials science, and nanotechnology because of their many anticipated applications. In this work, we show that all minimal surfaces are built out of pieces of the surfaces in Figs. 1 and 2.

  19. Probabilistic Characterization of Adversary Behavior in Cyber Security

    SciTech Connect

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  20. Minimal but non-minimal inflation and electroweak symmetry breaking

    SciTech Connect

    Marzola, Luca; Racioppi, Antonio

    2016-10-07

    We consider the most minimal scale invariant extension of the standard model that allows for successful radiative electroweak symmetry breaking and inflation. The framework involves an extra scalar singlet, that plays the rôle of the inflaton, and is compatibile with current experimental bounds owing to the non-minimal coupling of the latter to gravity. This inflationary scenario predicts a very low tensor-to-scalar ratio r≈10{sup −3}, typical of Higgs-inflation models, but in contrast yields a scalar spectral index n{sub s}≃0.97 which departs from the Starobinsky limit. We briefly discuss the collider phenomenology of the framework.

  1. Minimal Erythema Dose (MED) Testing

    PubMed Central

    Heckman, Carolyn J.; Chandler, Rachel; Kloss, Jacqueline D.; Benson, Amy; Rooney, Deborah; Munshi, Teja; Darlow, Susan D.; Perlis, Clifford; Manne, Sharon L.; Oslin, David W.

    2013-01-01

    Ultraviolet radiation (UV) therapy is sometimes used as a treatment for various common skin conditions, including psoriasis, acne, and eczema. The dosage of UV light is prescribed according to an individual's skin sensitivity. Thus, to establish the proper dosage of UV light to administer to a patient, the patient is sometimes screened to determine a minimal erythema dose (MED), which is the amount of UV radiation that will produce minimal erythema (sunburn or redness caused by engorgement of capillaries) of an individual's skin within a few hours following exposure. This article describes how to conduct minimal erythema dose (MED) testing. There is currently no easy way to determine an appropriate UV dose for clinical or research purposes without conducting formal MED testing, requiring observation hours after testing, or informal trial and error testing with the risks of under- or over-dosing. However, some alternative methods are discussed. PMID:23748556

  2. [Vegetative or minimally conscious state?].

    PubMed

    Overbeek, Berno U H; Lavrijsen, Jan C M; Eilander, Henk J

    2010-01-01

    We describe the clinical course of a 51-year-old woman in a vegetative state and of a 63-year-old woman in a minimally conscious state. The difference between these two states is an important one, as clinical course, prognosis and medical-ethical considerations of both are different. In practice it is difficult to distinguish between a vegetative state and a minimally conscious state, but the use of a Post-Acute Level of Consciousness scale helps to illustrate the differences. Expertise, research, and application of functional neuro-imaging techniques (PET, fMRI) might also be useful. The differences between these two states regarding rehabilitation, pain management and medical-ethical decisions are important. The effects of neuro-rehabilitation and the implications of a minimally conscious state for patients and their proxies need further investigation.

  3. The New Minimal Standard Model

    SciTech Connect

    Davoudiasl, Hooman; Kitano, Ryuichiro; Li, Tianjun; Murayama, Hitoshi

    2005-01-13

    We construct the New Minimal Standard Model that incorporates the new discoveries of physics beyond the Minimal Standard Model (MSM): Dark Energy, non-baryonic Dark Matter, neutrino masses, as well as baryon asymmetry and cosmic inflation, adopting the principle of minimal particle content and the most general renormalizable Lagrangian. We base the model purely on empirical facts rather than aesthetics. We need only six new degrees of freedom beyond the MSM. It is free from excessive flavor-changing effects, CP violation, too-rapid proton decay, problems with electroweak precision data, and unwanted cosmological relics. Any model of physics beyond the MSM should be measured against the phenomenological success of this model.

  4. Incentives, Behavior, and Risk Management

    ERIC Educational Resources Information Center

    Liu, Debin

    2011-01-01

    Insiders are one of the most serious threats to an organization's information assets. Generally speaking, there are two types of insider threats based on the insiders' intents. Malicious Insiders are individuals with varying degrees of harmful intentions. Inadvertent Insiders are individuals without malicious intent. In this dissertation, I…

  5. Incentives, Behavior, and Risk Management

    ERIC Educational Resources Information Center

    Liu, Debin

    2011-01-01

    Insiders are one of the most serious threats to an organization's information assets. Generally speaking, there are two types of insider threats based on the insiders' intents. Malicious Insiders are individuals with varying degrees of harmful intentions. Inadvertent Insiders are individuals without malicious intent. In this dissertation, I…

  6. Does Minimally Invasive Spine Surgery Minimize Surgical Site Infections?

    PubMed Central

    Patel, Ravish Shammi; Dutta, Shumayou

    2016-01-01

    Study Design Retrospective review of prospectively collected data. Purpose To evaluate the incidence of surgical site infections (SSIs) in minimally invasive spine surgery (MISS) in a cohort of patients and compare with available historical data on SSI in open spinal surgery cohorts, and to evaluate additional direct costs incurred due to SSI. Overview of Literature SSI can lead to prolonged antibiotic therapy, extended hospitalization, repeated operations, and implant removal. Small incisions and minimal dissection intrinsic to MISS may minimize the risk of postoperative infections. However, there is a dearth of literature on infections after MISS and their additional direct financial implications. Methods All patients from January 2007 to January 2015 undergoing posterior spinal surgery with tubular retractor system and microscope in our institution were included. The procedures performed included tubular discectomies, tubular decompressions for spinal stenosis and minimal invasive transforaminal lumbar interbody fusion (TLIF). The incidence of postoperative SSI was calculated and compared to the range of cited SSI rates from published studies. Direct costs were calculated from medical billing for index cases and for patients with SSI. Results A total of 1,043 patients underwent 763 noninstrumented surgeries (discectomies, decompressions) and 280 instrumented (TLIF) procedures. The mean age was 52.2 years with male:female ratio of 1.08:1. Three infections were encountered with fusion surgeries (mean detection time, 7 days). All three required wound wash and debridement with one patient requiring unilateral implant removal. Additional direct cost due to infection was $2,678 per 100 MISS-TLIF. SSI increased hospital expenditure per patient 1.5-fold after instrumented MISS. Conclusions Overall infection rate after MISS was 0.29%, with SSI rate of 0% in non-instrumented MISS and 1.07% with instrumented MISS. MISS can markedly reduce the SSI rate and can be an

  7. Shapes of embedded minimal surfaces

    PubMed Central

    Colding, Tobias H.; Minicozzi, William P.

    2006-01-01

    Surfaces that locally minimize area have been extensively used to model physical phenomena, including soap films, black holes, compound polymers, protein folding, etc. The mathematical field dates to the 1740s but has recently become an area of intense mathematical and scientific study, specifically in the areas of molecular engineering, materials science, and nanotechnology because of their many anticipated applications. In this work, we show that all minimal surfaces are built out of pieces of the surfaces in Figs. 1 and 2. PMID:16847265

  8. Minimal Incision Congenital Cardiac Surgery

    PubMed Central

    del Nido, Pedro J.

    2008-01-01

    Minimally invasive techniques have had limited application in congenital cardiac surgery, primarily due to the complexity of the defects, small working area, and the fact that most defects require exposure to intracardiac structures. Advances in cannula design and instrumentation have allowed application of minimal incision techniques but in most cases, cardiopulmonary bypass is still required. Image guided surgery, which uses non-invasive imaging to guide intracardiac procedures, holds the promise of permitting performance of reconstructive surgery in the beating heart in children. PMID:18395631

  9. Do chimpanzees (Pan troglodytes schweinfurthii) exhibit sleep related behaviors that minimize exposure to parasitic arthropods? A preliminary report on the possible anti-vector function of chimpanzee sleeping platforms.

    PubMed

    Samson, David R; Muehlenbein, Michael P; Hunt, Kevin D

    2013-01-01

    Great apes spend half of their lives in a nightly "nest" or sleeping platform (SP), a complex object created by modifying foliage, which functions as a stable substrate on which to sleep. Of the several purported functions of SPs, one hypothesis is that they protect against parasitic infection. Here we investigate the role of SP site choice in avoiding molestation by arthropods. This study presents preliminary data on the insect-repellent properties of preferred sleeping tree species Cynometra alexandri. Insect traps were deployed in gallery forest habitats in which chimpanzees typically "nest." We compared traps placed adjacent to SPs artificially manufactured with C. alexandri trees to an open area within the same habitat. Multiple measures of arthropod counts indicate that simulated C. alexandri SP sites have fewer arthropods than similar non-SP sites. Volatile compounds secreted by C. alexandri foliage are hypothesized to repel annoying arthropods and/or mask chimpanzee olfactory signals. Of the total insects captured (n = 6,318), n = 145 were mosquitoes. Of the total mosquitoes captured, n = 47 were identified as Anopheles (female, n = 12). The prominent malarial vector Anopheles gambiae was identified among the captured mosquito sample. These results suggest that the presence of broken branches of the tree species C. alexandri reduce the amount of insects a chimpanzee is exposed to throughout a night's sleep. This great ape behavioral and socio-technological adaptation may have evolved, in part, to increase quality of sleep as well as decrease exposure to vectors of disease.

  10. LLNL Waste Minimization Program Plan

    SciTech Connect

    Not Available

    1990-02-14

    This document is the February 14, 1990 version of the LLNL Waste Minimization Program Plan (WMPP). The Waste Minimization Policy field has undergone continuous changes since its formal inception in the 1984 HSWA legislation. The first LLNL WMPP, Revision A, is dated March 1985. A series of informal revision were made on approximately a semi-annual basis. This Revision 2 is the third formal issuance of the WMPP document. EPA has issued a proposed new policy statement on source reduction and recycling. This policy reflects a preventative strategy to reduce or eliminate the generation of environmentally-harmful pollutants which may be released to the air, land surface, water, or ground water. In accordance with this new policy new guidance to hazardous waste generators on the elements of a Waste Minimization Program was issued. In response to these policies, DOE has revised and issued implementation guidance for DOE Order 5400.1, Waste Minimization Plan and Waste Reduction reporting of DOE Hazardous, Radioactive, and Radioactive Mixed Wastes, final draft January 1990. This WMPP is formatted to meet the current DOE guidance outlines. The current WMPP will be revised to reflect all of these proposed changes when guidelines are established. Updates, changes and revisions to the overall LLNL WMPP will be made as appropriate to reflect ever-changing regulatory requirements. 3 figs., 4 tabs.

  11. A Defense of Semantic Minimalism

    ERIC Educational Resources Information Center

    Kim, Su

    2012-01-01

    Semantic Minimalism is a position about the semantic content of declarative sentences, i.e., the content that is determined entirely by syntax. It is defined by the following two points: "Point 1": The semantic content is a complete/truth-conditional proposition. "Point 2": The semantic content is useful to a theory of…

  12. Wilson loops in minimal surfaces

    SciTech Connect

    Drukker, Nadav; Gross, David J.; Ooguri, Hirosi

    1999-04-27

    The AdS/CFT correspondence suggests that the Wilson loop of the large N gauge theory with N = 4 supersymmetry in 4 dimensions is described by a minimal surface in AdS{sub 5} x S{sup 5}. The authors examine various aspects of this proposal, comparing gauge theory expectations with computations of minimal surfaces. There is a distinguished class of loops, which the authors call BPS loops, whose expectation values are free from ultra-violet divergence. They formulate the loop equation for such loops. To the extent that they have checked, the minimal surface in AdS{sub 5} x S{sup 5} gives a solution of the equation. The authors also discuss the zig-zag symmetry of the loop operator. In the N = 4 gauge theory, they expect the zig-zag symmetry to hold when the loop does not couple the scalar fields in the supermultiplet. They will show how this is realized for the minimal surface.

  13. Dubin's Minimal Linkage Construct Revisited.

    ERIC Educational Resources Information Center

    Rogers, Donald P.

    This paper contains a theoretical analysis and empirical study that support the major premise of Robert Dubin's minimal-linkage construct-that restricting communication links increases organizational stability. The theoretical analysis shows that fewer communication links are associated with less uncertainty, more redundancy, and greater…

  14. Minimally invasive aortic valve surgery

    PubMed Central

    Castrovinci, Sebastiano; Emmanuel, Sam; Moscarelli, Marco; Murana, Giacomo; Caccamo, Giuseppa; Bertolino, Emanuela Clara; Nasso, Giuseppe; Speziale, Giuseppe; Fattouch, Khalil

    2016-01-01

    Aortic valve disease is a prevalent disorder that affects approximately 2% of the general adult population. Surgical aortic valve replacement is the gold standard treatment for symptomatic patients. This treatment has demonstrably proven to be both safe and effective. Over the last few decades, in an attempt to reduce surgical trauma, different minimally invasive approaches for aortic valve replacement have been developed and are now being increasingly utilized. A narrative review of the literature was carried out to describe the surgical techniques for minimally invasive aortic valve surgery and report the results from different experienced centers. Minimally invasive aortic valve replacement is associated with low perioperative morbidity, mortality and a low conversion rate to full sternotomy. Long-term survival appears to be at least comparable to that reported for conventional full sternotomy. Minimally invasive aortic valve surgery, either with a partial upper sternotomy or a right anterior minithoracotomy provides early- and long-term benefits. Given these benefits, it may be considered the standard of care for isolated aortic valve disease. PMID:27582764

  15. A Defense of Semantic Minimalism

    ERIC Educational Resources Information Center

    Kim, Su

    2012-01-01

    Semantic Minimalism is a position about the semantic content of declarative sentences, i.e., the content that is determined entirely by syntax. It is defined by the following two points: "Point 1": The semantic content is a complete/truth-conditional proposition. "Point 2": The semantic content is useful to a theory of…

  16. What is minimally invasive dentistry?

    PubMed

    Ericson, Dan

    2004-01-01

    Minimally Invasive Dentistry is the application of "a systematic respect for the original tissue." This implies that the dental profession recognizes that an artifact is of less biological value than the original healthy tissue. Minimally invasive dentistry is a concept that can embrace all aspects of the profession. The common delineator is tissue preservation, preferably by preventing disease from occurring and intercepting its progress, but also removing and replacing with as little tissue loss as possible. It does not suggest that we make small fillings to restore incipient lesions or surgically remove impacted third molars without symptoms as routine procedures. The introduction of predictable adhesive technologies has led to a giant leap in interest in minimally invasive dentistry. The concept bridges the traditional gap between prevention and surgical procedures, which is just what dentistry needs today. The evidence-base for survival of restorations clearly indicates that restoring teeth is a temporary palliative measure that is doomed to fail if the disease that caused the condition is not addressed properly. Today, the means, motives and opportunities for minimally invasive dentistry are at hand, but incentives are definitely lacking. Patients and third parties seem to be convinced that the only things that count are replacements. Namely, they are prepared to pay for a filling but not for a procedure that can help avoid having one.

  17. Reheating in non-minimal derivative coupling model

    SciTech Connect

    Sadjadi, H. Mohseni; Goodarzi, Parviz E-mail: p_goodarzi@ut.ac.ir

    2013-02-01

    We consider a model with non-minimal derivative coupling of inflaton to gravity. The reheating process during rapid oscillation of the inflaton is studied and the reheating temperature is obtained. Behaviors of the inflaton and produced radiation in this era are discussed.

  18. Minimal formulation of joint motion for biomechanisms

    PubMed Central

    Seth, Ajay; Sherman, Michael; Eastman, Peter; Delp, Scott

    2010-01-01

    Biomechanical systems share many properties with mechanically engineered systems, and researchers have successfully employed mechanical engineering simulation software to investigate the mechanical behavior of diverse biological mechanisms, ranging from biomolecules to human joints. Unlike their man-made counterparts, however, biomechanisms rarely exhibit the simple, uncoupled, pure-axial motion that is engineered into mechanical joints such as sliders, pins, and ball-and-socket joints. Current mechanical modeling software based on internal-coordinate multibody dynamics can formulate engineered joints directly in minimal coordinates, but requires additional coordinates restricted by constraints to model more complex motions. This approach can be inefficient, inaccurate, and difficult for biomechanists to customize. Since complex motion is the rule rather than the exception in biomechanisms, the benefits of minimal coordinate modeling are not fully realized in biomedical research. Here we introduce a practical implementation for empirically-defined internal-coordinate joints, which we call “mobilizers.” A mobilizer encapsulates the observations, measurement frame, and modeling requirements into a hinge specification of the permissible-motion manifold for a minimal set of internal coordinates. Mobilizers support nonlinear mappings that are mathematically equivalent to constraint manifolds but have the advantages of fewer coordinates, no constraints, and exact representation of the biomechanical motion-space—the benefits long enjoyed for internal-coordinate models of mechanical joints. Hinge matrices within the mobilizer are easily specified by user-supplied functions, and provide a direct means of mapping permissible motion derived from empirical data. We present computational results showing substantial performance and accuracy gains for mobilizers versus equivalent joints implemented with constraints. Examples of mobilizers for joints from human biomechanics

  19. Perceptions of Sexual Orientation From Minimal Cues.

    PubMed

    Rule, Nicholas O

    2017-01-01

    People derive considerable amounts of information about each other from minimal nonverbal cues. Apart from characteristics typically regarded as obvious when encountering another person (e.g., age, race, and sex), perceivers can identify many other qualities about a person that are typically rather subtle. One such feature is sexual orientation. Here, I review the literature documenting the accurate perception of sexual orientation from nonverbal cues related to one's adornment, acoustics, actions, and appearance. In addition to chronicling studies that have demonstrated how people express and extract sexual orientation in each of these domains, I discuss some of the basic cognitive and perceptual processes that support these judgments, including how cues to sexual orientation manifest in behavioral (e.g., clothing choices) and structural (e.g., facial morphology) signals. Finally, I attend to boundary conditions in the accurate perception of sexual orientation, such as the states, traits, and group memberships that moderate individuals' ability to reliably decipher others' sexual orientation.

  20. Power Minimization techniques for Networked Data Centers.

    SciTech Connect

    Low, Steven; Tang, Kevin

    2011-09-28

    Our objective is to develop a mathematical model to optimize energy consumption at multiple levels in networked data centers, and develop abstract algorithms to optimize not only individual servers, but also coordinate the energy consumption of clusters of servers within a data center and across geographically distributed data centers to minimize the overall energy cost and consumption of brown energy of an enterprise. In this project, we have formulated a variety of optimization models, some stochastic others deterministic, and have obtained a variety of qualitative results on the structural properties, robustness, and scalability of the optimal policies. We have also systematically derived from these models decentralized algorithms to optimize energy efficiency, analyzed their optimality and stability properties. Finally, we have conducted preliminary numerical simulations to illustrate the behavior of these algorithms. We draw the following conclusion. First, there is a substantial opportunity to minimize both the amount and the cost of electricity consumption in a network of datacenters, by exploiting the fact that traffic load, electricity cost, and availability of renewable generation fluctuate over time and across geographical locations. Judiciously matching these stochastic processes can optimize the tradeoff between brown energy consumption, electricity cost, and response time. Second, given the stochastic nature of these three processes, real-time dynamic feedback should form the core of any optimization strategy. The key is to develop decentralized algorithms that can be implemented at different parts of the network as simple, local algorithms that coordinate through asynchronous message passing.

  1. Minimal universal quantum heat machine.

    PubMed

    Gelbwaser-Klimovsky, D; Alicki, R; Kurizki, G

    2013-01-01

    In traditional thermodynamics the Carnot cycle yields the ideal performance bound of heat engines and refrigerators. We propose and analyze a minimal model of a heat machine that can play a similar role in quantum regimes. The minimal model consists of a single two-level system with periodically modulated energy splitting that is permanently, weakly, coupled to two spectrally separated heat baths at different temperatures. The equation of motion allows us to compute the stationary power and heat currents in the machine consistent with the second law of thermodynamics. This dual-purpose machine can act as either an engine or a refrigerator (heat pump) depending on the modulation rate. In both modes of operation, the maximal Carnot efficiency is reached at zero power. We study the conditions for finite-time optimal performance for several variants of the model. Possible realizations of the model are discussed.

  2. Anaesthesia for minimally invasive surgery

    PubMed Central

    Dec, Marta

    2015-01-01

    Minimally invasive surgery (MIS) is rising in popularity. It offers well-known benefits to the patient. However, restricted access to the surgical site and gas insufflation into the body cavities may result in severe complications. From the anaesthetic point of view MIS poses unique challenges associated with creation of pneumoperitoneum, carbon dioxide absorption, specific positioning and monitoring a patient to whom the anaesthetist has often restricted access, in a poorly lit environment. Moreover, with refinement of surgical procedures and growing experience the anaesthetist is presented with patients from high-risk groups (obese, elderly, with advanced cardiac and respiratory disease) who once were deemed unsuitable for the laparoscopic technique. Anaesthetic management is aimed at getting the patient safely through the procedure, minimizing the specific risks arising from laparoscopy and the patient's coexisting medical problems, ensuring quick recovery and a relatively pain-free postoperative course with early return to normal function. PMID:26865885

  3. Minimal Doubling and Point Splitting

    SciTech Connect

    Creutz, M.

    2010-06-14

    Minimally-doubled chiral fermions have the unusual property of a single local field creating two fermionic species. Spreading the field over hypercubes allows construction of combinations that isolate specific modes. Combining these fields into bilinears produces meson fields of specific quantum numbers. Minimally-doubled fermion actions present the possibility of fast simulations while maintaining one exact chiral symmetry. They do, however, introduce some peculiar aspects. An explicit breaking of hyper-cubic symmetry allows additional counter-terms to appear in the renormalization. While a single field creates two different species, spreading this field over nearby sites allows isolation of specific states and the construction of physical meson operators. Finally, lattice artifacts break isospin and give two of the three pseudoscalar mesons an additional contribution to their mass. Depending on the sign of this mass splitting, one can either have a traditional Goldstone pseudoscalar meson or a parity breaking Aoki-like phase.

  4. Optimizing Processes to Minimize Risk

    NASA Technical Reports Server (NTRS)

    Loyd, David

    2017-01-01

    NASA, like the other hazardous industries, has suffered very catastrophic losses. Human error will likely never be completely eliminated as a factor in our failures. When you can't eliminate risk, focus on mitigating the worst consequences and recovering operations. Bolstering processes to emphasize the role of integration and problem solving is key to success. Building an effective Safety Culture bolsters skill-based performance that minimizes risk and encourages successful engagement.

  5. Principle of minimal work fluctuations

    NASA Astrophysics Data System (ADS)

    Xiao, Gaoyang; Gong, Jiangbin

    2015-08-01

    Understanding and manipulating work fluctuations in microscale and nanoscale systems are of both fundamental and practical interest. For example, in considering the Jarzynski equality =e-β Δ F , a change in the fluctuations of e-β W may impact how rapidly the statistical average of e-β W converges towards the theoretical value e-β Δ F, where W is the work, β is the inverse temperature, and Δ F is the free energy difference between two equilibrium states. Motivated by our previous study aiming at the suppression of work fluctuations, here we obtain a principle of minimal work fluctuations. In brief, adiabatic processes as treated in quantum and classical adiabatic theorems yield the minimal fluctuations in e-β W. In the quantum domain, if a system initially prepared at thermal equilibrium is subjected to a work protocol but isolated from a bath during the time evolution, then a quantum adiabatic process without energy level crossing (or an assisted adiabatic process reaching the same final states as in a conventional adiabatic process) yields the minimal fluctuations in e-β W, where W is the quantum work defined by two energy measurements at the beginning and at the end of the process. In the classical domain where the classical work protocol is realizable by an adiabatic process, then the classical adiabatic process also yields the minimal fluctuations in e-β W. Numerical experiments based on a Landau-Zener process confirm our theory in the quantum domain, and our theory in the classical domain explains our previous numerical findings regarding the suppression of classical work fluctuations [G. Y. Xiao and J. B. Gong, Phys. Rev. E 90, 052132 (2014), 10.1103/PhysRevE.90.052132].

  6. Principle of minimal work fluctuations.

    PubMed

    Xiao, Gaoyang; Gong, Jiangbin

    2015-08-01

    Understanding and manipulating work fluctuations in microscale and nanoscale systems are of both fundamental and practical interest. For example, in considering the Jarzynski equality 〈e-βW〉=e-βΔF, a change in the fluctuations of e-βW may impact how rapidly the statistical average of e-βW converges towards the theoretical value e-βΔF, where W is the work, β is the inverse temperature, and ΔF is the free energy difference between two equilibrium states. Motivated by our previous study aiming at the suppression of work fluctuations, here we obtain a principle of minimal work fluctuations. In brief, adiabatic processes as treated in quantum and classical adiabatic theorems yield the minimal fluctuations in e-βW. In the quantum domain, if a system initially prepared at thermal equilibrium is subjected to a work protocol but isolated from a bath during the time evolution, then a quantum adiabatic process without energy level crossing (or an assisted adiabatic process reaching the same final states as in a conventional adiabatic process) yields the minimal fluctuations in e-βW, where W is the quantum work defined by two energy measurements at the beginning and at the end of the process. In the classical domain where the classical work protocol is realizable by an adiabatic process, then the classical adiabatic process also yields the minimal fluctuations in e-βW. Numerical experiments based on a Landau-Zener process confirm our theory in the quantum domain, and our theory in the classical domain explains our previous numerical findings regarding the suppression of classical work fluctuations [G. Y. Xiao and J. B. Gong, Phys. Rev. E 90, 052132 (2014)].

  7. Outcomes After Minimally Invasive Esophagectomy

    PubMed Central

    Luketich, James D.; Pennathur, Arjun; Awais, Omar; Levy, Ryan M.; Keeley, Samuel; Shende, Manisha; Christie, Neil A.; Weksler, Benny; Landreneau, Rodney J.; Abbas, Ghulam; Schuchert, Matthew J.; Nason, Katie S.

    2014-01-01

    Background Esophagectomy is a complex operation and is associated with significant morbidity and mortality. In an attempt to lower morbidity, we have adopted a minimally invasive approach to esophagectomy. Objectives Our primary objective was to evaluate the outcomes of minimally invasive esophagectomy (MIE) in a large group of patients. Our secondary objective was to compare the modified McKeown minimally invasive approach (videothoracoscopic surgery, laparoscopy, neck anastomosis [MIE-neck]) with our current approach, a modified Ivor Lewis approach (laparoscopy, videothoracoscopic surgery, chest anastomosis [MIE-chest]). Methods We reviewed 1033 consecutive patients undergoing MIE. Elective operation was performed on 1011 patients; 22 patients with nonelective operations were excluded. Patients were stratified by surgical approach and perioperative outcomes analyzed. The primary endpoint studied was 30-day mortality. Results The MIE-neck was performed in 481 (48%) and MIE-Ivor Lewis in 530 (52%). Patients undergoing MIE-Ivor Lewis were operated in the current era. The median number of lymph nodes resected was 21. The operative mortality was 1.68%. Median length of stay (8 days) and ICU stay (2 days) were similar between the 2 approaches. Mortality rate was 0.9%, and recurrent nerve injury was less frequent in the Ivor Lewis MIE group (P < 0.001). Conclusions MIE in our center resulted in acceptable lymph node resection, postoperative outcomes, and low mortality using either an MIE-neck or an MIE-chest approach. The MIE Ivor Lewis approach was associated with reduced recurrent laryngeal nerve injury and mortality of 0.9% and is now our preferred approach. Minimally invasive esophagectomy can be performed safely, with good results in an experienced center. PMID:22668811

  8. Minimal massive 3D gravity

    NASA Astrophysics Data System (ADS)

    Bergshoeff, Eric; Hohm, Olaf; Merbis, Wout; Routh, Alasdair J.; Townsend, Paul K.

    2014-07-01

    We present an alternative to topologically massive gravity (TMG) with the same ‘minimal’ bulk properties; i.e. a single local degree of freedom that is realized as a massive graviton in linearization about an anti-de Sitter (AdS) vacuum. However, in contrast to TMG, the new ‘minimal massive gravity’ has both a positive energy graviton and positive central charges for the asymptotic AdS-boundary conformal algebra.

  9. Construction schedules slack time minimizing

    NASA Astrophysics Data System (ADS)

    Krzemiński, Michał

    2017-07-01

    The article presents two copyright models for minimizing downtime working brigades. Models have been developed for construction schedules performed using the method of work uniform. Application of flow shop models is possible and useful for the implementation of large objects, which can be divided into plots. The article also presents a condition describing gives which model should be used, as well as a brief example of optimization schedule. The optimization results confirm the legitimacy of the work on the newly-developed models.

  10. Minimally invasive surgery. Future developments.

    PubMed Central

    Wickham, J. E.

    1994-01-01

    The rapid development of minimally invasive surgery means that there will be fundamental changes in interventional treatment. Technological advances will allow new minimally invasive procedures to be developed. Application of robotics will allow some procedures to be done automatically, and coupling of slave robotic instruments with virtual reality images will allow surgeons to perform operations by remote control. Miniature motors and instruments designed by microengineering could be introduced into body cavities to perform operations that are currently impossible. New materials will allow changes in instrument construction, such as use of memory metals to make heat activated scissors or forceps. With the reduced trauma associated with minimally invasive surgery, fewer operations will require long hospital stays. Traditional surgical wards will become largely redundant, and hospitals will need to cope with increased through-put of patients. Operating theatres will have to be equipped with complex high technology equipment, and hospital staff will need to be trained to manage it. Conventional nursing care will be carried out more in the community. Many traditional specialties will be merged, and surgical training will need fundamental revision to ensure that surgeons are competent to carry out the new procedures. Images Fig 1 Fig 2 Fig 3 Fig 4 Fig 5 PMID:8312776

  11. Minimally invasive paediatric cardiac surgery.

    PubMed

    Bacha, Emile; Kalfa, David

    2014-01-01

    The concept of minimally invasive surgery for congenital heart disease in paediatric patients is broad, and has the aim of reducing the trauma of the operation at each stage of management. Firstly, in the operating room using minimally invasive incisions, video-assisted thoracoscopic and robotically assisted surgery, hybrid procedures, image-guided intracardiac surgery, and minimally invasive cardiopulmonary bypass strategies. Secondly, in the intensive-care unit with neuroprotection and 'fast-tracking' strategies that involve early extubation, early hospital discharge, and less exposure to transfused blood products. Thirdly, during postoperative mid-term and long-term follow-up by providing the children and their families with adequate support after hospital discharge. Improvement of these strategies relies on the development of new devices, real-time multimodality imaging, aids to instrument navigation, miniaturized and specialized instrumentation, robotic technology, and computer-assisted modelling of flow dynamics and tissue mechanics. In addition, dedicated multidisciplinary co-ordinated teams involving congenital cardiac surgeons, perfusionists, intensivists, anaesthesiologists, cardiologists, nurses, psychologists, and counsellors are needed before, during, and after surgery to go beyond apparent technological and medical limitations with the goal to 'treat more while hurting less'.

  12. Minimally invasive therapy in Denmark.

    PubMed

    Schou, I

    1993-01-01

    Minimally invasive therapy (MIT) is beginning to have impacts on health care in Denmark, although diffusion has been delayed compared to diffusion in other European countries. Now policy makers are beginning to appreciate the potential advantages in terms of closing hospitals and shifting treatment to the out-patient setting, and diffusion will probably go faster in the future. Denmark does not have a system for technology assessment, neither central nor regional, and there is no early warning mechanism to survey international developments. This implies lack of possibilities for the planning of diffusion, training, and criteria for treatment.

  13. Risk minimization through portfolio replication

    NASA Astrophysics Data System (ADS)

    Ciliberti, S.; Mã©Zard, M.

    2007-05-01

    We use a replica approach to deal with portfolio optimization problems. A given risk measure is minimized using empirical estimates of asset values correlations. We study the phase transition which happens when the time series is too short with respect to the size of the portfolio. We also study the noise sensitivity of portfolio allocation when this transition is approached. We consider explicitely the cases where the absolute deviation and the conditional value-at-risk are chosen as a risk measure. We show how the replica method can study a wide range of risk measures, and deal with various types of time series correlations, including realistic ones with volatility clustering.

  14. Prepulse minimization in KALI-5000.

    PubMed

    Kumar, D Durga Praveen; Mitra, S; Senthil, K; Sharma, Vishnu K; Singh, S K; Roy, A; Sharma, Archana; Nagesh, K V; Chakravarthy, D P

    2009-07-01

    A pulse power system (1 MV, 50 kA, and 100 ns) based on Marx generator and Blumlein pulse forming line has been built for generating high power microwaves. The Blumlein configuration poses a prepulse problem and hence the diode gap had to be increased to match the diode impedance to the Blumlein impedance during the main pulse. A simple method to eliminate prepulse voltage using a vacuum sparkgap and a resistor is given. Another fundamental approach of increasing the inductance of Marx generator to minimize the prepulse voltage is also presented. Experimental results for both of these configurations are given.

  15. Prepulse minimization in KALI-5000

    NASA Astrophysics Data System (ADS)

    Kumar, D. Durga Praveen; Mitra, S.; Senthil, K.; Sharma, Vishnu K.; Singh, S. K.; Roy, A.; Sharma, Archana; Nagesh, K. V.; Chakravarthy, D. P.

    2009-07-01

    A pulse power system (1 MV, 50 kA, and 100 ns) based on Marx generator and Blumlein pulse forming line has been built for generating high power microwaves. The Blumlein configuration poses a prepulse problem and hence the diode gap had to be increased to match the diode impedance to the Blumlein impedance during the main pulse. A simple method to eliminate prepulse voltage using a vacuum sparkgap and a resistor is given. Another fundamental approach of increasing the inductance of Marx generator to minimize the prepulse voltage is also presented. Experimental results for both of these configurations are given.

  16. About the ZOOM minimization package

    SciTech Connect

    Fischler, M.; Sachs, D.; /Fermilab

    2004-11-01

    A new object-oriented Minimization package is available for distribution in the same manner as CLHEP. This package, designed for use in HEP applications, has all the capabilities of Minuit, but is a re-write from scratch, adhering to modern C++ design principles. A primary goal of this package is extensibility in several directions, so that its capabilities can be kept fresh with as little maintenance effort as possible. This package is distinguished by the priority that was assigned to C++ design issues, and the focus on producing an extensible system that will resist becoming obsolete.

  17. Crisis behavior

    SciTech Connect

    Grinspoon, L.

    1984-04-01

    The Department of Defense has rules and procedures to minimize the opportunity for error and improper behavior among those with access to strategic weapons, but no psychiatric screening system can predict with assurance who will or will not behave rationally during a crisis. Personal problems and institutional decision-making pressures may destroy nuclear deterrence. Certain features of military life, including drug and alcohol abuse, heavy responsibility, tension, and group decision making, can destreoy rationality. 12 references.

  18. Insights on raft behavior from minimal phenomenological models

    NASA Astrophysics Data System (ADS)

    Garbès Putzel, G.; Schick, M.

    2011-07-01

    We construct a simple phenomenological theory of phase separation in ternary mixtures of cholesterol and saturated and unsaturated lipids. Such separation is relevant to the formation of 'rafts' in the plasma membrane. We also show how simple cross-linking of proteins which prefer one form of lipid to the other can trigger raft-formation, the first step in a signaling pathway.

  19. Visualization and minimization of disruptive bubble behavior in ultrasonic field.

    PubMed

    Kim, Wonjung; Park, Keunhwan; Oh, Jongkeun; Choi, Jaehyuck; Kim, Ho-Young

    2010-08-01

    Although ultrasonic technology has been successfully adopted for semiconductor cleaning, a recent trend of extreme miniaturization of patterns calls for a novel process that can remove contaminant particles without damaging nanoscale patterns. Unstable bubble oscillations have been hypothesized to cause such surface damages, and here we show direct visualization results that a high acoustic pressure induces bubble instability leading to pattern damages. As a remedy for the conventional ultrasonic cleaning scheme, we introduce a novel cleaning system using dual transducers, in which one transducer generates bubbles with a high acoustic pressure in an acoustically isolated sub-chamber and the other drives the oscillation of bubbles around the cleaning area at a low acoustic pressure. The system is shown to achieve a high cleaning efficiency for submicron-sized particles while significantly suppressing the disruptive bubble instability thereby reducing the detachment of firmly attached nanoparticles. Comparison of the adhesion force of the firmly attached nanoparticles and the yield strength of nanopatterns allows us to anticipate that this scheme is capable of reducing damages of nanopatterns on semiconductor wafers and photomasks.

  20. Nonequilibrium Phase Behavior from Minimization of Free Power Dissipation

    NASA Astrophysics Data System (ADS)

    Krinninger, Philip; Schmidt, Matthias; Brader, Joseph M.

    2016-11-01

    We develop a general theory for describing phase coexistence between nonequilibrium steady states in Brownian systems, based on power functional theory [M. Schmidt and J. M. Brader, J. Chem. Phys. 138, 214101 (2013)]. We apply the framework to the special case of fluid-fluid phase separation of active soft sphere swimmers. The central object of the theory, the dissipated free power, is calculated via computer simulations and compared to a simple analytical approximation. The theory describes well the simulation data and predicts motility-induced phase separation due to avoidance of dissipative clusters.

  1. Minimizing travel claims cost with minimal-spanning tree model

    NASA Astrophysics Data System (ADS)

    Jamalluddin, Mohd Helmi; Jaafar, Mohd Azrul; Amran, Mohd Iskandar; Ainul, Mohd Sharizal; Hamid, Aqmar; Mansor, Zafirah Mohd; Nopiah, Zulkifli Mohd

    2014-06-01

    Travel demand necessitates a big expenditure in spending, as has been proven by the National Audit Department (NAD). Every year the auditing process is carried out throughout the country involving official travel claims. This study focuses on the use of the Spanning Tree model to determine the shortest path to minimize the cost of the NAD's official travel claims. The objective is to study the possibility of running a network based in the Kluang District Health Office to eight Rural Clinics in Johor state using the Spanning Tree model applications for optimizing travelling distances and make recommendations to the senior management of the Audit Department to analyze travelling details before an audit is conducted. Result of this study reveals that there were claims of savings of up to 47.4% of the original claims, over the course of the travel distance.

  2. Microrover Operates With Minimal Computation

    NASA Technical Reports Server (NTRS)

    Miller, David P.; Loch, John L.; Gat, Erann; Desai, Rajiv S.; Angle, Colin; Bickler, Donald B.

    1992-01-01

    Small, light, highly mobile robotic vehicles called "microrovers" use sensors and artificial intelligence to perform complicated tasks autonomously. Vehicle navigates, avoids obstacles, and picks up objects using reactive control scheme selected from among few preprogrammed behaviors to respond to environment while executing assigned task. Under development for exploration and mining of other planets. Also useful in firefighting, cleaning up chemical spills, and delivering materials in factories. Reactive control scheme and principle of behavior-description language useful in reducing computational loads in prosthetic limbs and automotive collision-avoidance systems.

  3. Microrover Operates With Minimal Computation

    NASA Technical Reports Server (NTRS)

    Miller, David P.; Loch, John L.; Gat, Erann; Desai, Rajiv S.; Angle, Colin; Bickler, Donald B.

    1992-01-01

    Small, light, highly mobile robotic vehicles called "microrovers" use sensors and artificial intelligence to perform complicated tasks autonomously. Vehicle navigates, avoids obstacles, and picks up objects using reactive control scheme selected from among few preprogrammed behaviors to respond to environment while executing assigned task. Under development for exploration and mining of other planets. Also useful in firefighting, cleaning up chemical spills, and delivering materials in factories. Reactive control scheme and principle of behavior-description language useful in reducing computational loads in prosthetic limbs and automotive collision-avoidance systems.

  4. Minimal model for anomalous diffusion

    NASA Astrophysics Data System (ADS)

    Flekkøy, Eirik G.

    2017-01-01

    A random walk model with a local probability of removal is solved exactly and shown to exhibit subdiffusive behavior with a mean square displacement the evolves as ˜t1 /2 at late times. This model is shown to be well described by a diffusion equation with a sink term, which also describes the evolution of a pressure or temperature field in a leaky environment. For this reason a number of physical processes are shown to exhibit anomalous diffusion. The presence of the sink term is shown to change the late time behavior of the field from 1 /t1 /2 to 1 /t3 /2 .

  5. Detecting and classifying method based on similarity matching of Android malware behavior with profile.

    PubMed

    Jang, Jae-Wook; Yun, Jaesung; Mohaisen, Aziz; Woo, Jiyoung; Kim, Huy Kang

    2016-01-01

    Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples.

  6. The minimal time detection algorithm

    NASA Technical Reports Server (NTRS)

    Kim, Sungwan

    1995-01-01

    An aerospace vehicle may operate throughout a wide range of flight environmental conditions that affect its dynamic characteristics. Even when the control design incorporates a degree of robustness, system parameters may drift enough to cause its performance to degrade below an acceptable level. The object of this paper is to develop a change detection algorithm so that we can build a highly adaptive control system applicable to aircraft systems. The idea is to detect system changes with minimal time delay. The algorithm developed is called Minimal Time-Change Detection Algorithm (MT-CDA) which detects the instant of change as quickly as possible with false-alarm probability below a certain specified level. Simulation results for the aircraft lateral motion with a known or unknown change in control gain matrices, in the presence of doublet input, indicate that the algorithm works fairly well as theory indicates though there is a difficulty in deciding the exact amount of change in some situations. One of MT-CDA distinguishing properties is that detection delay of MT-CDA is superior to that of Whiteness Test.

  7. Less minimal supersymmetric standard model

    SciTech Connect

    de Gouvea, Andre; Friedland, Alexander; Murayama, Hitoshi

    1998-03-28

    Most of the phenomenological studies of supersymmetry have been carried out using the so-called minimal supergravity scenario, where one assumes a universal scalar mass, gaugino mass, and trilinear coupling at M{sub GUT}. Even though this is a useful simplifying assumption for phenomenological analyses, it is rather too restrictive to accommodate a large variety of phenomenological possibilities. It predicts, among other things, that the lightest supersymmetric particle (LSP) is an almost pure B-ino, and that the {mu}-parameter is larger than the masses of the SU(2){sub L} and U(1){sub Y} gauginos. We extend the minimal supergravity framework by introducing one extra parameter: the Fayet'Iliopoulos D-term for the hypercharge U(1), D{sub Y}. Allowing for this extra parameter, we find a much more diverse phenomenology, where the LSP is {tilde {nu}}{sub {tau}}, {tilde {tau}} or a neutralino with a large higgsino content. We discuss the relevance of the different possibilities to collider signatures. The same type of extension can be done to models with the gauge mediation of supersymmetry breaking. We argue that it is not wise to impose cosmological constraints on the parameter space.

  8. Annual Waste Minimization Summary Report

    SciTech Connect

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit (No. NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO.

  9. Next-to-minimal SOFTSUSY

    NASA Astrophysics Data System (ADS)

    Allanach, B. C.; Athron, P.; Tunstall, Lewis C.; Voigt, A.; Williams, A. G.

    2014-09-01

    We describe an extension to the SOFTSUSY program that provides for the calculation of the sparticle spectrum in the Next-to-Minimal Supersymmetric Standard Model (NMSSM), where a chiral superfield that is a singlet of the Standard Model gauge group is added to the Minimal Supersymmetric Standard Model (MSSM) fields. Often, a Z3 symmetry is imposed upon the model. SOFTSUSY can calculate the spectrum in this case as well as the case where general Z3 violating (denoted as =) terms are added to the soft supersymmetry breaking terms and the superpotential. The user provides a theoretical boundary condition for the couplings and mass terms of the singlet. Radiative electroweak symmetry breaking data along with electroweak and CKM matrix data are used as weak-scale boundary conditions. The renormalisation group equations are solved numerically between the weak scale and a high energy scale using a nested iterative algorithm. This paper serves as a manual to the NMSSM mode of the program, detailing the approximations and conventions used. Catalogue identifier: ADPM_v4_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADPM_v4_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 154886 No. of bytes in distributed program, including test data, etc.: 1870890 Distribution format: tar.gz Programming language: C++, fortran. Computer: Personal computer. Operating system: Tested on Linux 3.x. Word size: 64 bits Classification: 11.1, 11.6. Does the new version supersede the previous version?: Yes Catalogue identifier of previous version: ADPM_v3_0 Journal reference of previous version: Comput. Phys. Comm. 183 (2012) 785 Nature of problem: Calculating supersymmetric particle spectrum and mixing parameters in the next-to-minimal supersymmetric standard model. The solution to the

  10. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral “triggers” to help focus the analyst’s attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  11. Finding minimal action sequences with a simple evaluation of actions

    PubMed Central

    Shah, Ashvin; Gurney, Kevin N.

    2014-01-01

    Animals are able to discover the minimal number of actions that achieves an outcome (the minimal action sequence). In most accounts of this, actions are associated with a measure of behavior that is higher for actions that lead to the outcome with a shorter action sequence, and learning mechanisms find the actions associated with the highest measure. In this sense, previous accounts focus on more than the simple binary signal of “was the outcome achieved?”; they focus on “how well was the outcome achieved?” However, such mechanisms may not govern all types of behavioral development. In particular, in the process of action discovery (Redgrave and Gurney, 2006), actions are reinforced if they simply lead to a salient outcome because biological reinforcement signals occur too quickly to evaluate the consequences of an action beyond an indication of the outcome's occurrence. Thus, action discovery mechanisms focus on the simple evaluation of “was the outcome achieved?” and not “how well was the outcome achieved?” Notwithstanding this impoverishment of information, can the process of action discovery find the minimal action sequence? We address this question by implementing computational mechanisms, referred to in this paper as no-cost learning rules, in which each action that leads to the outcome is associated with the same measure of behavior. No-cost rules focus on “was the outcome achieved?” and are consistent with action discovery. No-cost rules discover the minimal action sequence in simulated tasks and execute it for a substantial amount of time. Extensive training, however, results in extraneous actions, suggesting that a separate process (which has been proposed in action discovery) must attenuate learning if no-cost rules participate in behavioral development. We describe how no-cost rules develop behavior, what happens when attenuation is disrupted, and relate the new mechanisms to wider computational and biological context. PMID:25506326

  12. Update on designing and building minimal cells

    PubMed Central

    Jewett, Michael C.; Forster, Anthony C.

    2010-01-01

    Summary Minimal cells comprise only the genes and biomolecular machinery necessary for basic life. Synthesizing minimal and minimized cells will improve understanding of core biology, enhance development of biotechnology strains of bacteria, and enable evolutionary optimization of natural and unnatural biopolymers. Design and construction of minimal cells is proceeding in two different directions: “top-down” reduction of bacterial genomes in vivo and “bottom-up” integration of DNA/RNA/protein/membrane syntheses in vitro. Major progress in the last 5 years has occurred in synthetic genomics, minimization of the Escherichia coli genome, sequencing of minimal bacterial endosymbionts, identification of essential genes, and integration of biochemical systems. PMID:20638265

  13. Strategies to Minimize Antibiotic Resistance

    PubMed Central

    Lee, Chang-Ro; Cho, Ill Hwan; Jeong, Byeong Chul; Lee, Sang Hee

    2013-01-01

    Antibiotic resistance can be reduced by using antibiotics prudently based on guidelines of antimicrobial stewardship programs (ASPs) and various data such as pharmacokinetic (PK) and pharmacodynamic (PD) properties of antibiotics, diagnostic testing, antimicrobial susceptibility testing (AST), clinical response, and effects on the microbiota, as well as by new antibiotic developments. The controlled use of antibiotics in food animals is another cornerstone among efforts to reduce antibiotic resistance. All major resistance-control strategies recommend education for patients, children (e.g., through schools and day care), the public, and relevant healthcare professionals (e.g., primary-care physicians, pharmacists, and medical students) regarding unique features of bacterial infections and antibiotics, prudent antibiotic prescribing as a positive construct, and personal hygiene (e.g., handwashing). The problem of antibiotic resistance can be minimized only by concerted efforts of all members of society for ensuring the continued efficiency of antibiotics. PMID:24036486

  14. Minimally Invasive Spigelian Hernia Repair

    PubMed Central

    Baucom, Catherine; Nguyen, Quan D.; Hidalgo, Marco

    2009-01-01

    Introduction: Spigelian hernia is an uncommon ventral hernia characterized by a defect in the linea semilunaris. Repair of spigelian hernia has traditionally been accomplished via an open transverse incision and primary repair. The purpose of this article is to present 2 case reports of incarcerated spigelian hernia that were successfully repaired laparoscopically using Gortex mesh and to present a review of the literature regarding laparoscopic repair of spigelian hernias. Methods: Retrospective chart review and Medline literature search. Results: Two patients underwent laparoscopic mesh repair of incarcerated spigelian hernias. Both were started on a regular diet on postoperative day 1 and discharged on postoperative days 2 and 3. One patient developed a seroma that resolved without intervention. There was complete resolution of preoperative symptoms at the 12-month follow-up. Conclusion: Minimally invasive repair of spigelian hernias is an alternative to the traditional open surgical technique. Further studies are needed to directly compare the open and the laparoscopic repair. PMID:19660230

  15. [MINIMALLY INVASIVE AORTIC VALVE REPLACEMENT].

    PubMed

    Tabata, Minoru

    2016-03-01

    Minimally invasive aortic valve replacement (MIAVR) is defined as aortic valve replacement avoiding full sternotomy. Common approaches include a partial sternotomy right thoracotomy, and a parasternal approach. MIAVR has been shown to have advantages over conventional AVR such as shorter length of stay and smaller amount of blood transfusion and better cosmesis. However, it is also known to have disadvantages such as longer cardiopulmonary bypass and aortic cross-clamp times and potential complications related to peripheral cannulation. Appropriate patient selection is very important. Since the procedure is more complex than conventional AVR, more intensive teamwork in the operating room is essential. Additionally, a team approach during postoperative management is critical to maximize the benefits of MIAVR.

  16. Minimally packed phases in holography

    NASA Astrophysics Data System (ADS)

    Donos, Aristomenis; Gauntlett, Jerome P.

    2016-03-01

    We numerically construct asymptotically AdS black brane solutions of D = 4 Einstein-Maxwell theory coupled to a pseudoscalar. The solutions are holographically dual to d = 3 CFTs at finite chemical potential and in a constant magnetic field, which spontaneously break translation invariance leading to the spontaneous formation of abelian and momentum magnetisation currents flowing around the plaquettes of a periodic Bravais lattice. We analyse the three-dimensional moduli space of lattice solutions, which are generically oblique, and show, for a specific value of the magnetic field, that the free energy is minimised by the triangular lattice, associated with minimal packing of circles in the plane. We show that the average stress tensor for the thermodynamically preferred phase is that of a perfect fluid and that this result applies more generally to spontaneously generated periodic phases. The triangular structure persists at low temperatures indicating the existence of novel crystalline ground states.

  17. Strategies to minimize antibiotic resistance.

    PubMed

    Lee, Chang-Ro; Cho, Ill Hwan; Jeong, Byeong Chul; Lee, Sang Hee

    2013-09-12

    Antibiotic resistance can be reduced by using antibiotics prudently based on guidelines of antimicrobial stewardship programs (ASPs) and various data such as pharmacokinetic (PK) and pharmacodynamic (PD) properties of antibiotics, diagnostic testing, antimicrobial susceptibility testing (AST), clinical response, and effects on the microbiota, as well as by new antibiotic developments. The controlled use of antibiotics in food animals is another cornerstone among efforts to reduce antibiotic resistance. All major resistance-control strategies recommend education for patients, children (e.g., through schools and day care), the public, and relevant healthcare professionals (e.g., primary-care physicians, pharmacists, and medical students) regarding unique features of bacterial infections and antibiotics, prudent antibiotic prescribing as a positive construct, and personal hygiene (e.g., handwashing). The problem of antibiotic resistance can be minimized only by concerted efforts of all members of society for ensuring the continued efficiency of antibiotics.

  18. Simulating granular materials by energy minimization

    NASA Astrophysics Data System (ADS)

    Krijgsman, D.; Luding, S.

    2016-11-01

    Discrete element methods are extremely helpful in understanding the complex behaviors of granular media, as they give valuable insight into all internal variables of the system. In this paper, a novel discrete element method for performing simulations of granular media is presented, based on the minimization of the potential energy in the system. Contrary to most discrete element methods (i.e., soft-particle method, event-driven method, and non-smooth contact dynamics), the system does not evolve by (approximately) integrating Newtons equations of motion in time, but rather by searching for mechanical equilibrium solutions for the positions of all particles in the system, which is mathematically equivalent to locally minimizing the potential energy. The new method allows for the rapid creation of jammed initial conditions (to be used for further studies) and for the simulation of quasi-static deformation problems. The major advantage of the new method is that it allows for truly static deformations. The system does not evolve with time, but rather with the externally applied strain or load, so that there is no kinetic energy in the system, in contrast to other quasi-static methods. The performance of the algorithm for both types of applications of the method is tested. Therefore we look at the required number of iterations, for the system to converge to a stable solution. For each single iteration, the required computational effort scales linearly with the number of particles. During the process of creating initial conditions, the required number of iterations for two-dimensional systems scales with the square root of the number of particles in the system. The required number of iterations increases for systems closer to the jamming packing fraction. For a quasi-static pure shear deformation simulation, the results of the new method are validated by regular soft-particle dynamics simulations. The energy minimization algorithm is able to capture the evolution of the

  19. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.

    PubMed

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-04-06

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  20. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors

    PubMed Central

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-01-01

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission. PMID:28383501

  1. Advantages of rhythmic movements at resonance: minimal active degrees of freedom, minimal noise, and maximal predictability.

    PubMed

    Goodman, L; Riley, M A; Mitra, S; Turvey, M T

    2000-03-01

    Using time delay embedding, the authors applied phase space reconstruction to the time series of rhythmic movements of a hand-held pendulum. Subjects (N = 6) produced the manual oscillations about the wrist at the pendulum's resonant frequency and at a higher and a lower frequency. The number of active degrees of freedom required to capture the dynamics of the rhythmic behavior was 3 for the resonant frequency and 4 for each of the nonresonant frequencies. The residual high-dimensional noise was similarly lowest for the resonant frequency. Whereas 33% and 20%, respectively, of the vectors in the phase spaces of the dynamics higher and lower than resonance were unpredictable, only 12% were unpredictable at resonance. Finally, the predictability of the evolving dynamics extended farther into the future for oscillations at the resonant frequency. At resonance, the prediction horizon was 5 times farther than the prediction horizon for the higher than resonance behavior and 2.5 times farther than that for the lower than resonance behavior. The results suggest that, in pendular oscillations of a limb or limb segment, attunement of the central nervous system to the resonant frequency minimizes the variables to be controlled and maximizes the predictability of the rhythmic movement's chaotic dynamics.

  2. Mini-Med School Planning Guide

    ERIC Educational Resources Information Center

    National Institutes of Health, Office of Science Education, 2008

    2008-01-01

    Mini-Med Schools are public education programs now offered by more than 70 medical schools, universities, research institutions, and hospitals across the nation. There are even Mini-Med Schools in Ireland, Malta, and Canada! The program is typically a lecture series that meets once a week and provides "mini-med students" information on some of the…

  3. Minimally Invasive Mitral Valve Surgery II

    PubMed Central

    Wolfe, J. Alan; Malaisrie, S. Chris; Farivar, R. Saeid; Khan, Junaid H.; Hargrove, W. Clark; Moront, Michael G.; Ryan, William H.; Ailawadi, Gorav; Agnihotri, Arvind K.; Hummel, Brian W.; Fayers, Trevor M.; Grossi, Eugene A.; Guy, T. Sloane; Lehr, Eric J.; Mehall, John R.; Murphy, Douglas A.; Rodriguez, Evelio; Salemi, Arash; Segurola, Romualdo J.; Shemin, Richard J.; Smith, J. Michael; Smith, Robert L.; Weldner, Paul W.; Lewis, Clifton T. P.; Barnhart, Glenn R.; Goldman, Scott M.

    2016-01-01

    Abstract Techniques for minimally invasive mitral valve repair and replacement continue to evolve. This expert opinion, the second of a 3-part series, outlines current best practices for nonrobotic, minimally invasive mitral valve procedures, and for postoperative care after minimally invasive mitral valve surgery. PMID:27654406

  4. Cyclone Simulation via Action Minimization

    NASA Astrophysics Data System (ADS)

    Plotkin, D. A.; Weare, J.; Abbot, D. S.

    2016-12-01

    A postulated impact of climate change is an increase in intensity of tropical cyclones (TCs). This hypothesized effect results from the fact that TCs are powered subsaturated boundary layer air picking up water vapor from the surface ocean as it flows inwards towards the eye. This water vapor serves as the energy input for TCs, which can be idealized as heat engines. The inflowing air has a nearly identical temperature as the surface ocean; therefore, warming of the surface leads to a warmer atmospheric boundary layer. By the Clausius-Clapeyron relationship, warmer boundary layer air can hold more water vapor and thus results in more energetic storms. Changes in TC intensity are difficult to predict due to the presence of fine structures (e.g. convective structures and rainbands) with length scales of less than 1 km, while general circulation models (GCMs) generally have horizontal resolutions of tens of kilometers. The models are therefore unable to capture these features, which are critical to accurately simulating cyclone structure and intensity. Further, strong TCs are rare events, meaning that long multi-decadal simulations are necessary to generate meaningful statistics about intense TC activity. This adds to the computational expense, making it yet more difficult to generate accurate statistics about long-term changes in TC intensity due to global warming via direct simulation. We take an alternative approach, applying action minimization techniques developed in molecular dynamics to the WRF weather/climate model. We construct artificial model trajectories that lead from quiescent (TC-free) states to TC states, then minimize the deviation of these trajectories from true model dynamics. We can thus create Monte Carlo model ensembles that are biased towards cyclogenesis, which reduces computational expense by limiting time spent in non-TC states. This allows for: 1) selective interrogation of model states with TCs; 2) finding the likeliest paths for

  5. The Impact of Emotions and Empathy-Related Traits on Punishment Behavior: Introduction and Validation of the Inequality Game

    PubMed Central

    Klimecki, Olga M.; Vuilleumier, Patrik; Sander, David

    2016-01-01

    In the prevention and resolution of conflicts in social contexts, an important step is to understand how different emotions and empathic traits are linked to punishment behaviors. Unfortunately, few paradigms exist to study these phenomena. Here, we developed the Inequality Game (IG) as an economic and verbal interaction paradigm in which participants are faced with an “unfair other” as opposed to a “fair other” and subsequently have the opportunity to engage in a range of social behaviors. These social behaviors include cooperative or competitive economic choices and nice or derogatory verbal behavior toward the unfair and fair other. Participants could thus engage in punishment or forgiveness behavior toward the unfair other as well as in cooperative or aggressive behavior toward the fair other. We validated the IG through multimodal measures comprising the assessment of personality traits, emotions (by means of facial expressions and self-reports), arousal (by means of skin conductance responses), physical effort (force exertion), and behavioral reactions. Second, we examined the influence of emotions and empathy-related traits on punishment behavior. With regard to emotions, we observed a positive relation between malicious joy and punishment behavior. This result highlights the role of reward-related mechanisms in favoring punishment behavior. In addition, different empathic traits had opposing effects on antisocial behavior. Whereas personal distress predicted aggressive verbal behavior, perspective taking and empathic concern predicted a reduction in punishment behavior. Empathic traits also modulated emotional experience and person evaluations, such that perspective taking was related to more positive affect (less frowning and more smiling) and a more favorable evaluation of the unfair other. The current data validate the IG, reveal that malicious joy is positively related to punishment behavior, and show that different types of empathic traits can

  6. The Impact of Emotions and Empathy-Related Traits on Punishment Behavior: Introduction and Validation of the Inequality Game.

    PubMed

    Klimecki, Olga M; Vuilleumier, Patrik; Sander, David

    2016-01-01

    In the prevention and resolution of conflicts in social contexts, an important step is to understand how different emotions and empathic traits are linked to punishment behaviors. Unfortunately, few paradigms exist to study these phenomena. Here, we developed the Inequality Game (IG) as an economic and verbal interaction paradigm in which participants are faced with an "unfair other" as opposed to a "fair other" and subsequently have the opportunity to engage in a range of social behaviors. These social behaviors include cooperative or competitive economic choices and nice or derogatory verbal behavior toward the unfair and fair other. Participants could thus engage in punishment or forgiveness behavior toward the unfair other as well as in cooperative or aggressive behavior toward the fair other. We validated the IG through multimodal measures comprising the assessment of personality traits, emotions (by means of facial expressions and self-reports), arousal (by means of skin conductance responses), physical effort (force exertion), and behavioral reactions. Second, we examined the influence of emotions and empathy-related traits on punishment behavior. With regard to emotions, we observed a positive relation between malicious joy and punishment behavior. This result highlights the role of reward-related mechanisms in favoring punishment behavior. In addition, different empathic traits had opposing effects on antisocial behavior. Whereas personal distress predicted aggressive verbal behavior, perspective taking and empathic concern predicted a reduction in punishment behavior. Empathic traits also modulated emotional experience and person evaluations, such that perspective taking was related to more positive affect (less frowning and more smiling) and a more favorable evaluation of the unfair other. The current data validate the IG, reveal that malicious joy is positively related to punishment behavior, and show that different types of empathic traits can have

  7. Identifying compromised systems through correlation of suspicious traffic from malware behavioral analysis

    NASA Astrophysics Data System (ADS)

    Camilo, Ana E. F.; Grégio, André; Santos, Rafael D. C.

    2016-05-01

    Malware detection may be accomplished through the analysis of their infection behavior. To do so, dynamic analysis systems run malware samples and extract their operating system activities and network traffic. This traffic may represent malware accessing external systems, either to steal sensitive data from victims or to fetch other malicious artifacts (configuration files, additional modules, commands). In this work, we propose the use of visualization as a tool to identify compromised systems based on correlating malware communications in the form of graphs and finding isomorphisms between them. We produced graphs from over 6 thousand distinct network traffic files captured during malware execution and analyzed the existing relationships among malware samples and IP addresses.

  8. Rovers minimize human disturbance in research on wild animals.

    PubMed

    Le Maho, Yvon; Whittington, Jason D; Hanuise, Nicolas; Pereira, Louise; Boureau, Matthieu; Brucker, Mathieu; Chatelain, Nicolas; Courtecuisse, Julien; Crenner, Francis; Friess, Benjamin; Grosbellet, Edith; Kernaléguen, Laëtitia; Olivier, Frédérique; Saraux, Claire; Vetter, Nathanaël; Viblanc, Vincent A; Thierry, Bernard; Tremblay, Pascale; Groscolas, René; Le Bohec, Céline

    2014-12-01

    Investigating wild animals while minimizing human disturbance remains an important methodological challenge. When approached by a remote-operated vehicle (rover) which can be equipped to make radio-frequency identifications, wild penguins had significantly lower and shorter stress responses (determined by heart rate and behavior) than when approached by humans. Upon immobilization, the rover-unlike humans-did not disorganize colony structure, and stress rapidly ceased. Thus, rovers can reduce human disturbance of wild animals and the resulting scientific bias.

  9. Life after Misconduct: Promoting Rehabilitation while Minimizing Damage.

    PubMed

    Stemwedel, Janet D

    2014-12-01

    The scientific community has an interest in dealing with misconduct, but also in providing a path to rehabilitation in the aftermath of misconduct. The prospect of rehabilitation could minimize harms by improving reporting of misconduct, rebuilding damaged trust, and providing more insight into the conditions that led to unethical behavior, allowing scientists to work collectively to create conditions in which scientific misconduct is less likely.

  10. Against Explanatory Minimalism in Psychiatry

    PubMed Central

    Thornton, Tim

    2015-01-01

    The idea that psychiatry contains, in principle, a series of levels of explanation has been criticized not only as empirically false but also, by Campbell, as unintelligible because it presupposes a discredited pre-Humean view of causation. Campbell’s criticism is based on an interventionist-inspired denial that mechanisms and rational connections underpin physical and mental causation, respectively, and hence underpin levels of explanation. These claims echo some superficially similar remarks in Wittgenstein’s Zettel. But attention to the context of Wittgenstein’s remarks suggests a reason to reject explanatory minimalism in psychiatry and reinstate a Wittgensteinian notion of levels of explanation. Only in a context broader than the one provided by interventionism is that the ascription of propositional attitudes, even in the puzzling case of delusions, justified. Such a view, informed by Wittgenstein, can reconcile the idea that the ascription mental phenomena presupposes a particular level of explanation with the rejection of an a priori claim about its connection to a neurological level of explanation. PMID:26696908

  11. Differentially Private Empirical Risk Minimization

    PubMed Central

    Chaudhuri, Kamalika; Monteleoni, Claire; Sarwate, Anand D.

    2011-01-01

    Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed. We provide general techniques to produce privacy-preserving approximations of classifiers learned via (regularized) empirical risk minimization (ERM). These algorithms are private under the ε-differential privacy definition due to Dwork et al. (2006). First we apply the output perturbation ideas of Dwork et al. (2006), to ERM classification. Then we propose a new method, objective perturbation, for privacy-preserving machine learning algorithm design. This method entails perturbing the objective function before optimizing over classifiers. If the loss and regularizer satisfy certain convexity and differentiability criteria, we prove theoretical results showing that our algorithms preserve privacy, and provide generalization bounds for linear and nonlinear kernels. We further present a privacy-preserving technique for tuning the parameters in general machine learning algorithms, thereby providing end-to-end privacy guarantees for the training process. We apply these results to produce privacy-preserving analogues of regularized logistic regression and support vector machines. We obtain encouraging results from evaluating their performance on real demographic and benchmark data sets. Our results show that both theoretically and empirically, objective perturbation is superior to the previous state-of-the-art, output perturbation, in managing the inherent tradeoff between privacy and learning performance. PMID:21892342

  12. Differentially Private Empirical Risk Minimization.

    PubMed

    Chaudhuri, Kamalika; Monteleoni, Claire; Sarwate, Anand D

    2011-03-01

    Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed. We provide general techniques to produce privacy-preserving approximations of classifiers learned via (regularized) empirical risk minimization (ERM). These algorithms are private under the ε-differential privacy definition due to Dwork et al. (2006). First we apply the output perturbation ideas of Dwork et al. (2006), to ERM classification. Then we propose a new method, objective perturbation, for privacy-preserving machine learning algorithm design. This method entails perturbing the objective function before optimizing over classifiers. If the loss and regularizer satisfy certain convexity and differentiability criteria, we prove theoretical results showing that our algorithms preserve privacy, and provide generalization bounds for linear and nonlinear kernels. We further present a privacy-preserving technique for tuning the parameters in general machine learning algorithms, thereby providing end-to-end privacy guarantees for the training process. We apply these results to produce privacy-preserving analogues of regularized logistic regression and support vector machines. We obtain encouraging results from evaluating their performance on real demographic and benchmark data sets. Our results show that both theoretically and empirically, objective perturbation is superior to the previous state-of-the-art, output perturbation, in managing the inherent tradeoff between privacy and learning performance.

  13. Minimal hepatic encephalopathy: A review.

    PubMed

    Nardone, Raffaele; Taylor, Alexandra C; Höller, Yvonne; Brigo, Francesco; Lochner, Piergiorgio; Trinka, Eugen

    2016-10-01

    Minimal hepatic encephalopathy (MHE) is the earliest form of hepatic encephalopathy and can affect up to 80% of patients with liver cirrhosis. By definition, MHE is characterized by cognitive function impairment in the domains of attention, vigilance and integrative function, but obvious clinical manifestation are lacking. MHE has been shown to affect daily functioning, quality of life, driving and overall mortality. The diagnosis can be achieved through neuropsychological testing, recently developed computerized psychometric tests, such as the critical flicker frequency and the inhibitory control tests, as well as neurophysiological procedures. Event related potentials can reveal subtle changes in patients with normal neuropsychological performances. Spectral analysis of electroencephalography (EEG) and quantitative analysis of sleep EEG provide early markers of cerebral dysfunction in cirrhotic patients with MHE. Neuroimaging, in particular MRI, also increasingly reveals diffuse abnormalities in intrinsic brain activity and altered organization of functional connectivity networks. Medical treatment for MHE to date has been focused on reducing serum ammonia levels and includes non-absorbable disaccharides, probiotics or rifaximin. Liver transplantation may not reverse the cognitive deficits associated with MHE. We performed here an updated review on epidemiology, burden and quality of life, neuropsychological testing, neuroimaging, neurophysiology and therapy in subjects with MHE. Copyright © 2016 Elsevier Ireland Ltd and Japan Neuroscience Society. All rights reserved.

  14. Against Explanatory Minimalism in Psychiatry.

    PubMed

    Thornton, Tim

    2015-01-01

    The idea that psychiatry contains, in principle, a series of levels of explanation has been criticized not only as empirically false but also, by Campbell, as unintelligible because it presupposes a discredited pre-Humean view of causation. Campbell's criticism is based on an interventionist-inspired denial that mechanisms and rational connections underpin physical and mental causation, respectively, and hence underpin levels of explanation. These claims echo some superficially similar remarks in Wittgenstein's Zettel. But attention to the context of Wittgenstein's remarks suggests a reason to reject explanatory minimalism in psychiatry and reinstate a Wittgensteinian notion of levels of explanation. Only in a context broader than the one provided by interventionism is that the ascription of propositional attitudes, even in the puzzling case of delusions, justified. Such a view, informed by Wittgenstein, can reconcile the idea that the ascription mental phenomena presupposes a particular level of explanation with the rejection of an a priori claim about its connection to a neurological level of explanation.

  15. Minimal realistic SU(5) Grand Unified Theory

    NASA Astrophysics Data System (ADS)

    Assad, Nima

    2016-03-01

    Despite making predictions in unprecedented agreement with experiment, such as the magnetic dipole moment of the electron to one part in a billion, the experimental confirmation of neutrino flavor oscillations, and thus of massive neutrinos, implies that the Standard Model (SM) of particle physics is incomplete. An extension of the SM, which retains its low energy predictions while accounting for massive neutrinos, is achieved through the introduction of the dimension 5 Weinberg operator and its associated energy scale above the electroweak (102 GeV), but below the Planck scale (1019 GeV). The Beyond Standard Model (BSM) class of Grand Unified Theories (GUTs) implicates such a scale (1016 GeV) in the unification of the three SM gauge couplings, thus making the origin of neutrino mass a theoretically appealing probe into particle behavior at energies currently inaccessible experimentally. Here, we compare the 24F and 15H extensions of the Georgi-Glashow SU(5) GUT to accommodate massive neutrinos and to unify SM gauge couplings while minimizing the theory's additional field content. Using the Monte Carlo event generator MadGraph, each extension is found to produce distinct signatures at the run II of the LHC.

  16. Minimal modeling of the extratropical general circulation

    NASA Technical Reports Server (NTRS)

    O'Brien, Enda; Branscome, Lee E.

    1989-01-01

    The ability of low-order, two-layer models to reproduce basic features of the mid-latitude general circulation is investigated. Changes in model behavior with increased spectral resolution are examined in detail. Qualitatively correct time-mean heat and momentum balances are achieved in a beta-plane channel model which includes the first and third meridional modes. This minimal resolution also reproduces qualitatively realistic surface and upper-level winds and mean meridional circulations. Higher meridional resolution does not result in substantial changes in the latitudinal structure of the circulation. A qualitatively correct kinetic energy spectrum is produced when the resolution is high enough to include several linearly stable modes. A model with three zonal waves and the first three meridional modes has a reasonable energy spectrum and energy conversion cycle, while also satisfying heat and momentum budget requirements. This truncation reproduces the basic mechanisms and zonal circulation features that are obtained at higher resolution. The model performance improves gradually with higher resolution and is smoothly dependent on changes in external parameters.

  17. Minimal flow units for magnetohydrodynamic turbulence

    NASA Astrophysics Data System (ADS)

    Orlandi, P.

    2016-08-01

    We present direct numerical simulations of two minimal flow units (MFUs) to investigate the differences between inviscid and viscous simulations, and the different behavior of the evolution for conducting fluids. In these circumstances the introduction of the Lorentz force in the momentum equation produces different scenarios. The Taylor-Green vortex, in the past, was an MFU widely considered for both conducting and non-conducting fluids. The simulations were performed by pseudo-spectral numerical methods; these are repeated here by using a finite difference second-order accurate, energy-conserving scheme for ν =0. Having observed that this initial condition could be inefficient for capturing the eventual occurrence of a finite time singularity a potentially more efficient MFU consisting of two interacting Lamb dipoles was considered. It was found that the two flows have a different time evolution in the vortical dominated stage. In this stage, turbulent structures of different size are generated leading to spectra, in the inviscid conditions, with a {k}-3 range. In real conditions the viscosity produces smaller scales characteristic of fully developed turbulence with energy spectra with well defined exponential and inertial ranges. In the presence of non-conducting conditions the passive vector behaves as the vorticity. The evolution is different in the presence of conducting conditions. Although the time evolution is different, both flows lead to spectra in Kolmogorov units with the same shape at high and intermediate wave numbers.

  18. Minimal breast cancer: a clinical appraisal.

    PubMed Central

    Peters, T G; Donegan, W L; Burg, E A

    1977-01-01

    Eighty-five patients with a diagnosis of minimal breast cancer were evaluated. The predominant lesion was intraductal carcinoma, and axillary metastases occurred in association with minimal breast cancer in seven of 96 cases. One death occurred due to minimal breast cancer. Bilateral mammary carcinoma was evident in 24% and bilateral minimal breast cancer in 13% of the patients. The component lesions of minimal breast cancer have varied biologic activity, but prognosis is good with a variety of operations. The multifocal nature of minimal breast cancer and the potential for metastases should be recognized. Therapy should include removal of the entire mammary parenchyma and low axillary nodes. The high incidence of bilateral malignancy supports elective contralateral biopsy at the time of therapy for minimal breast cancer. Images Fig. 1. Fig. 2. Fig. 3. Fig. 5. PMID:203233

  19. Minimal Models of Multidimensional Computations

    PubMed Central

    Fitzgerald, Jeffrey D.; Sincich, Lawrence C.; Sharpee, Tatyana O.

    2011-01-01

    The multidimensional computations performed by many biological systems are often characterized with limited information about the correlations between inputs and outputs. Given this limitation, our approach is to construct the maximum noise entropy response function of the system, leading to a closed-form and minimally biased model consistent with a given set of constraints on the input/output moments; the result is equivalent to conditional random field models from machine learning. For systems with binary outputs, such as neurons encoding sensory stimuli, the maximum noise entropy models are logistic functions whose arguments depend on the constraints. A constraint on the average output turns the binary maximum noise entropy models into minimum mutual information models, allowing for the calculation of the information content of the constraints and an information theoretic characterization of the system's computations. We use this approach to analyze the nonlinear input/output functions in macaque retina and thalamus; although these systems have been previously shown to be responsive to two input dimensions, the functional form of the response function in this reduced space had not been unambiguously identified. A second order model based on the logistic function is found to be both necessary and sufficient to accurately describe the neural responses to naturalistic stimuli, accounting for an average of 93% of the mutual information with a small number of parameters. Thus, despite the fact that the stimulus is highly non-Gaussian, the vast majority of the information in the neural responses is related to first and second order correlations. Our results suggest a principled and unbiased way to model multidimensional computations and determine the statistics of the inputs that are being encoded in the outputs. PMID:21455284

  20. Robotic assisted minimally invasive surgery

    PubMed Central

    Palep, Jaydeep H

    2009-01-01

    The term “robot” was coined by the Czech playright Karel Capek in 1921 in his play Rossom's Universal Robots. The word “robot” is from the check word robota which means forced labor. The era of robots in surgery commenced in 1994 when the first AESOP (voice controlled camera holder) prototype robot was used clinically in 1993 and then marketed as the first surgical robot ever in 1994 by the US FDA. Since then many robot prototypes like the Endoassist (Armstrong Healthcare Ltd., High Wycombe, Buck, UK), FIPS endoarm (Karlsruhe Research Center, Karlsruhe, Germany) have been developed to add to the functions of the robot and try and increase its utility. Integrated Surgical Systems (now Intuitive Surgery, Inc.) redesigned the SRI Green Telepresence Surgery system and created the daVinci Surgical System® classified as a master-slave surgical system. It uses true 3-D visualization and EndoWrist®. It was approved by FDA in July 2000 for general laparoscopic surgery, in November 2002 for mitral valve repair surgery. The da Vinci robot is currently being used in various fields such as urology, general surgery, gynecology, cardio-thoracic, pediatric and ENT surgery. It provides several advantages to conventional laparoscopy such as 3D vision, motion scaling, intuitive movements, visual immersion and tremor filtration. The advent of robotics has increased the use of minimally invasive surgery among laparoscopically naïve surgeons and expanded the repertoire of experienced surgeons to include more advanced and complex reconstructions. PMID:19547687

  1. [History of minimally invasive surgery].

    PubMed

    Radojcić, Branka; Jokić, Radoica; Grebeldinger, Slobodan; Meljnikov, Igor; Radojić, Nikola

    2009-01-01

    This paper presents a historical review and development of minimally invasive surgery. The interest of physicians to "look into the internal organs" has existed since the ancient time. The first described endoscopy was by Hippocrates. He made reference to a rectal speculum. The credit for modern endoscopy belongs to Bozzini. He developed a light conductor which he called "Lichleiter" to avoid the problems of inadequate illumination. In 1853, Desormeaux first introduced the "Lichtleiter" of Bozzini to a patient. Many developments, which occurred independently but almost simultaneously, produced breakthroughs for endoscopy and laparoscopy that were bases for modern instruments. In 1901, Kelling coined the term "coelioskope" to describe the technique that used a cystoscope to examine the abdominal cavity of dogs. In 1910, Jacobaeus used the term "laparothorakoskopie" for the fist time. In 1938, Veress developed the spring-loaded needle for draining ascites and evacuating fluid and air from the chest. Its current modifications make the "Veress" needle a perfect tool to achieve pneumnoperitoneum during laparoscopic surgery. In 1970, Hasson developed a technique performing laparoscopy through a miniature leparotomy incision. The first solid state camera was introduced in 1982 that was the start of "video-laparoscopy". In 1981 Kurt Semm performed first laparoscopic appendectomy. Within a year, all standard surgical procedures were performed laparoscopically. The authors also analyzed the new surgical techniques, such as telesurgery, robotics and virtual reality in current surgical practice. They specially enmphasized the use of laparoscopic access in pediatric surgery which has become a new gold standard in surgical treatment of pediatric patients.

  2. A minimal axisymmetric hurricane model

    NASA Astrophysics Data System (ADS)

    Mai, Nguyen Chi; Smith, Roger K.; Zhu, Hongyan; Ulrich, Wolfgang

    2002-10-01

    Solutions of an axisymmetric version of the minimal three-dimensional numerical model of a tropical cyclone developed by Zhu et al. (2001) are described and compared with those of the three-dimensional model. Vortex evolution is similar in the two models during the early stages of intensification, but the period of rapid intensification occurs earlier in the axisymmetric model due to the higher effective resolution obtained using a staggered grid. There are marked differences at later times, when, in the three-dimensional model, asymmetric structures develop. The findings are compared with those of an earlier study by Anthes (1972). The axisymmetric model is used to investigate certain fundamental aspects of tropical-cyclone dynamics, including the emergence of a region of supergradient winds in the boundary layer and the evolution of regions satisfying necessary conditions for inertial and barotropic instability.Supergradient winds develop in the boundary layer within a radius of about 100 km of the vortex axis at an early stage of evolution and appear to be a natural feature of the vortex boundary layer. The development of flow regions satisfying necessary conditions for inertial and barotropic instability occur later, and may be attributed inter alia to the upward transfer of air with relatively high angular momentum, from the boundary layer to the middle and upper layers, by the secondary circulation of the vortex, and the downward transfer of air with relatively low angular momentum to the middle layer. A linear analysis of a two-layer slab-symmetric flow suggests why inertial instability does not occur in the axisymmetric model. Barotropic instability does not appear to be the mechanism responsible for the growth of asymmetries in the calculations using the three-dimensional version of the model.

  3. Minimal complexity control law synthesis

    NASA Technical Reports Server (NTRS)

    Bernstein, Dennis S.; Haddad, Wassim M.; Nett, Carl N.

    1989-01-01

    A paradigm for control law design for modern engineering systems is proposed: Minimize control law complexity subject to the achievement of a specified accuracy in the face of a specified level of uncertainty. Correspondingly, the overall goal is to make progress towards the development of a control law design methodology which supports this paradigm. Researchers achieve this goal by developing a general theory of optimal constrained-structure dynamic output feedback compensation, where here constrained-structure means that the dynamic-structure (e.g., dynamic order, pole locations, zero locations, etc.) of the output feedback compensation is constrained in some way. By applying this theory in an innovative fashion, where here the indicated iteration occurs over the choice of the compensator dynamic-structure, the paradigm stated above can, in principle, be realized. The optimal constrained-structure dynamic output feedback problem is formulated in general terms. An elegant method for reducing optimal constrained-structure dynamic output feedback problems to optimal static output feedback problems is then developed. This reduction procedure makes use of star products, linear fractional transformations, and linear fractional decompositions, and yields as a byproduct a complete characterization of the class of optimal constrained-structure dynamic output feedback problems which can be reduced to optimal static output feedback problems. Issues such as operational/physical constraints, operating-point variations, and processor throughput/memory limitations are considered, and it is shown how anti-windup/bumpless transfer, gain-scheduling, and digital processor implementation can be facilitated by constraining the controller dynamic-structure in an appropriate fashion.

  4. Minimal Cells-Real and Imagined.

    PubMed

    Glass, John I; Merryman, Chuck; Wise, Kim S; Hutchison, Clyde A; Smith, Hamilton O

    2017-03-27

    A minimal cell is one whose genome only encodes the minimal set of genes necessary for the cell to survive. Scientific reductionism postulates the best way to learn the first principles of cellular biology would be to use a minimal cell in which the functions of all genes and components are understood. The genes in a minimal cell are, by definition, essential. In 2016, synthesis of a genome comprised of only the set of essential and quasi-essential genes encoded by the bacterium Mycoplasma mycoides created a near-minimal bacterial cell. This organism performs the cellular functions common to all organisms. It replicates DNA, transcribes RNA, translates proteins, undergoes cell division, and little else. In this review, we examine this organism and contrast it with other bacteria that have been used as surrogates for a minimal cell.

  5. Minimal model for short-time diffusion in periodic potentials.

    PubMed

    Emary, Clive; Gernert, Robert; Klapp, Sabine H L

    2012-12-01

    We investigate the dynamics of a single, overdamped colloidal particle, which is driven by a constant force through a one-dimensional periodic potential. We focus on systems with large barrier heights where the lowest-order cumulants of the density field, that is, average position and the mean-squared displacement, show nontrivial (nondiffusive) short-time behavior characterized by the appearance of plateaus. We demonstrate that this "cage-like" dynamics can be well described by a discretized master equation model involving two states (related to two positions) within each potential valley. Nontrivial predictions of our approach include analytic expressions for the plateau heights and an estimate of the "de-caging time" obtained from the study of deviations from Gaussian behavior. The simplicity of our approach means that it offers a minimal model to describe the short-time behavior of systems with hindered dynamics.

  6. Minimal normal measurement models of quantum instruments

    NASA Astrophysics Data System (ADS)

    Pellonpää, Juha-Pekka; Tukiainen, Mikko

    2017-06-01

    In this work we study the minimal normal measurement models of quantum instruments. We show that usually the apparatus' Hilbert space in such a model is unitarily isomorphic to the minimal Stinespring dilation space of the instrument. However, if the Hilbert space of the system is infinite-dimensional and the multiplicities of the outcomes of the associated observable (POVM) are all infinite then this may not be the case. In these pathological cases the minimal apparatus' Hilbert space is shown to be unitarily isomorphic to the instrument's minimal dilation space augmented by one extra dimension.

  7. MACT: A Manageable Minimization Allocation System

    PubMed Central

    Cui, Yan; Bu, Huaien; Liao, Shizhong

    2014-01-01

    Background. Minimization is a case allocation method for randomized controlled trials (RCT). Evidence suggests that the minimization method achieves balanced groups with respect to numbers and participant characteristics, and can incorporate more prognostic factors compared to other randomization methods. Although several automatic allocation systems exist (e.g., randoWeb, and MagMin), the minimization method is still difficult to implement, and RCTs seldom employ minimization. Therefore, we developed the minimization allocation controlled trials (MACT) system, a generic manageable minimization allocation system. System Outline. The MACT system implements minimization allocation by Web and email. It has a unified interface that manages trials, participants, and allocation. It simultaneously supports multitrials, multicenters, multigrouping, multiple prognostic factors, and multilevels. Methods. Unlike previous systems, MACT utilizes an optimized database that greatly improves manageability. Simulations and Results. MACT was assessed in a series of experiments and evaluations. Relative to simple randomization, minimization produces better balance among groups and similar unpredictability. Applications. MACT has been employed in two RCTs that lasted three years. During this period, MACT steadily and simultaneously satisfied the requirements of the trial. Conclusions. MACT is a manageable, easy-to-use case allocation system. Its outstanding features are attracting more RCTs to use the minimization allocation method. PMID:24701251

  8. Correlates of Adaptive Functioning in Minimally Verbal Children with Autism Spectrum Disorder

    ERIC Educational Resources Information Center

    Frost, Kyle M.; Hong, Natalie; Lord, Catherine

    2017-01-01

    Individuals with autism spectrum disorder (ASD) tend to have significant delays in adaptive functioning. In this study, the relationship between adaptive behavior and ASD symptomatology was investigated in minimally verbal, school-aged children with ASD (n = 333). Both the social affect (SA) and restricted and repetitive behavior (RRB) domains…

  9. Correlates of Adaptive Functioning in Minimally Verbal Children with Autism Spectrum Disorder

    ERIC Educational Resources Information Center

    Frost, Kyle M.; Hong, Natalie; Lord, Catherine

    2017-01-01

    Individuals with autism spectrum disorder (ASD) tend to have significant delays in adaptive functioning. In this study, the relationship between adaptive behavior and ASD symptomatology was investigated in minimally verbal, school-aged children with ASD (n = 333). Both the social affect (SA) and restricted and repetitive behavior (RRB) domains…

  10. A strategy for minimizing common mode human error in executing critical functions and tasks

    SciTech Connect

    Beltracchi, L.; Lindsay, R.W.

    1992-05-01

    Human error in execution of critical functions and tasks can be costly. The Three Mile Island and the Chernobyl Accidents are examples of results from human error in the nuclear industry. There are similar errors that could no doubt be cited from other industries. This paper discusses a strategy to minimize common mode human error in the execution of critical functions and tasks. The strategy consists of the use of human redundancy, and also diversity in human cognitive behavior: skill-, rule-, and knowledge-based behavior. The authors contend that the use of diversity in human cognitive behavior is possible, and it minimizes common mode error.

  11. A strategy for minimizing common mode human error in executing critical functions and tasks

    SciTech Connect

    Beltracchi, L. ); Lindsay, R.W. )

    1992-01-01

    Human error in execution of critical functions and tasks can be costly. The Three Mile Island and the Chernobyl Accidents are examples of results from human error in the nuclear industry. There are similar errors that could no doubt be cited from other industries. This paper discusses a strategy to minimize common mode human error in the execution of critical functions and tasks. The strategy consists of the use of human redundancy, and also diversity in human cognitive behavior: skill-, rule-, and knowledge-based behavior. The authors contend that the use of diversity in human cognitive behavior is possible, and it minimizes common mode error.

  12. An H-infinity norm minimization approach

    NASA Astrophysics Data System (ADS)

    Muse, Jonathan A.

    This dissertation seeks to merge the ideas from robust control theory such as Hinfinity control design and the Small Gain Theorem, L stability theory and Lyapunov stability from nonlinear control, and recent theoretical achievements in adaptive control. The fusion of frequency domain and linear time domain ideas allows the derivation of an H infinity Norm Minimization Approach (H infinity-NMA) for adaptive control architecture that permits a control designer to simplify the adaptive tuning process and tune the uncertainty compensation characteristics via linear control design techniques, band limit the adaptive control signal, efficiently handle redundant actuators, and handle unmatched uncertainty and matched uncertainty in a single design framework. The two stage design framework is similar to that used in robust control, but without sacrificing performance. The first stage of the design considers an ideal system with the system uncertainty completely known. For this system, a control law is designed using linear Hinfinity theory. Then in the second stage, an adaptive process is implemented that emulates the behavior of the ideal system. If the linear Hinfinity design is applied to control the emulated system, it then guarantees closed loop system stability of the actual system. All of this is accomplished while providing notions of transient performance bounds between the ideal system and the true system. Extensions to the theory include architectures for a class of output feedback systems, limiting the authority of an adaptive control system, and a method for improving the performance of an adaptive system with slow dynamics without any modification terms. Applications focus on using aerodynamic flow control for aircraft flight control and the Crew Launch Vehicle.

  13. Contemporary review of minimally invasive pancreaticoduodenectomy

    PubMed Central

    Dai, Rui; Turley, Ryan S; Blazer, Dan G

    2016-01-01

    AIM To assess the current literature describing various minimally invasive techniques for and to review short-term outcomes after minimally invasive pancreaticoduodenectomy (PD). METHODS PD remains the only potentially curative treatment for periampullary malignancies, including, most commonly, pancreatic adenocarcinoma. Minimally invasive approaches to this complex operation have begun to be increasingly reported in the literature and are purported by some to reduce the historically high morbidity of PD associated with the open technique. In this systematic review, we have searched the literature for high-quality publications describing minimally invasive techniques for PD-including laparoscopic, robotic, and laparoscopic-assisted robotic approaches (hybrid approach). We have identified publications with the largest operative experiences from well-known centers of excellence for this complex procedure. We report primarily short term operative and perioperative results and some short term oncologic endpoints. RESULTS Minimally invasive techniques include laparoscopic, robotic and hybrid approaches and each of these techniques has strong advocates. Consistently, across all minimally invasive modalities, these techniques are associated less intraoperative blood loss than traditional open PD (OPD), but in exchange for longer operating times. These techniques are relatively equivalent in terms of perioperative morbidity and short term oncologic outcomes. Importantly, pancreatic fistula rate appears to be comparable in most minimally invasive series compared to open technique. Impact of minimally invasive technique on length of stay is mixed compared to some traditional open series. A few series have suggested that initiation of and time to adjuvant therapy may be improved with minimally invasive techniques, however this assertion remains controversial. In terms of short-terms costs, minimally invasive PD is significantly higher than that of OPD. CONCLUSION Minimally

  14. Obesity: can behavioral economics help?

    PubMed

    Just, David R; Payne, Collin R

    2009-12-01

    Consumers regularly and predictably behave in ways that contradict standard assumptions of economic analysis such that they make decisions that prevent them from reaching rationally intended goals. These contradictions play a significant role with respect to consumers' food decisions and the effect these decisions have on their health. Food decisions that are rationally derived include those that trade short-term gains of sensory pleasure (hedonic) for longer term gains of health and wellness (utilitarian). However, extra-rational food decisions are much more common. They can occur because of the contexts in which they are made--such as being distracted or pressed for time. In these contexts, heuristics (or rules of thumb) are used. Because food decisions are made with little cognitive involvement, food policies designed to appeal to highly cognitive thought (e.g., fat taxes, detailed information labels) are likely to have little impact. Furthermore, food marketing environments influence not only what foods consumers buy but also how much. As a general principle, when individuals do not behave in their own interest, markets will feed perverse and sub-optimal behaviors. Given the limited ability of individuals to retain and use accurate health information coupled with varying levels of self control, profit motivations of marketers can become predatory--though not necessarily malicious. Alternative policy options that do not restrict choice are outlined, which enable consumers to make better decisions. These options allow for profit motivations of marketers to align with the long-term well being of the consumer.

  15. Minimizing electrode contamination in an electrochemical cell

    DOEpatents

    Kim, Yu Seung; Zelenay, Piotr; Johnston, Christina

    2014-12-09

    An electrochemical cell assembly that is expected to prevent or at least minimize electrode contamination includes one or more getters that trap a component or components leached from a first electrode and prevents or at least minimizes them from contaminating a second electrode.

  16. Minimally Invasive Mitral Valve Surgery I

    PubMed Central

    Ailawadi, Gorav; Agnihotri, Arvind K.; Mehall, John R.; Wolfe, J. Alan; Hummel, Brian W.; Fayers, Trevor M.; Farivar, R. Saeid; Grossi, Eugene A.; Guy, T. Sloane; Hargrove, W. Clark; Khan, Junaid H.; Lehr, Eric J.; Malaisrie, S. Chris; Murphy, Douglas A.; Rodriguez, Evelio; Ryan, William H.; Salemi, Arash; Segurola, Romualdo J.; Shemin, Richard J.; Smith, J. Michael; Smith, Robert L.; Weldner, Paul W.; Goldman, Scott M.; Lewis, Clifton T. P.; Barnhart, Glenn R.

    2016-01-01

    Abstract Widespread adoption of minimally invasive mitral valve repair and replacement may be fostered by practice consensus and standardization. This expert opinion, first of a 3-part series, outlines current best practices in patient evaluation and selection for minimally invasive mitral valve procedures, and discusses preoperative planning for cannulation and myocardial protection. PMID:27654407

  17. Cosmological models with non-minimal derivative coupling

    NASA Astrophysics Data System (ADS)

    Sushkov, Sergey

    2011-11-01

    We investigate cosmological scenarios with a non-minimal derivative coupling between the scalar field and the curvature, examining both the quintessence and the phantom cases with zero and constant potentials. In general, we find that the universe transits from one de Sitter solution to another, determined by the coupling parameter. Furthermore, according to the parameter choices and without the need for matter, we can obtain a Big Bang, an expanding universe with no beginning, a cosmological turnaround, an eternally contracting universe, a Big Crunch, a Big Rip avoidance and a cosmological bounce. This variety of behaviors reveals the capabilities of the present scenario.

  18. Maximizing Performance Of A Telerobot With Minimal Software

    NASA Technical Reports Server (NTRS)

    Backes, Paul G.; Long, Mark K.; Steele, Robert D.

    1994-01-01

    Control software system of seven-degree-of-freedom telerobot designed to elicit maximum performance from minimal, fixed-software computer at remote robot site. Includes multiple control modules, each providing parameter-driven control of specified aspect of behavior of telerobot. Software system runs in Ada language on multiple 68020 processors or potentially on single central processing unit. Conceived for use in outer space, also proves useful in underwater construction and inspection, handling of materials in nuclear facilities, and cleaning up hazardous materials.

  19. Minimal representations, geometric quantization, and unitarity.

    PubMed Central

    Brylinski, R; Kostant, B

    1994-01-01

    In the framework of geometric quantization we explicitly construct, in a uniform fashion, a unitary minimal representation pio of every simply-connected real Lie group Go such that the maximal compact subgroup of Go has finite center and Go admits some minimal representation. We obtain algebraic and analytic results about pio. We give several results on the algebraic and symplectic geometry of the minimal nilpotent orbits and then "quantize" these results to obtain the corresponding representations. We assume (Lie Go)C is simple. PMID:11607478

  20. Minimal covariant observables identifying all pure states

    NASA Astrophysics Data System (ADS)

    Carmeli, Claudio; Heinosaari, Teiko; Toigo, Alessandro

    2013-09-01

    It has been recently shown by Heinosaari, Mazzarella and Wolf (2013) [1] that an observable that identifies all pure states of a d-dimensional quantum system has minimally 4d-4 outcomes or slightly less (the exact number depending on d). However, no simple construction of this type of minimal observable is known. We investigate covariant observables that identify all pure states and have minimal number of outcomes. It is shown that the existence of this kind of observables depends on the dimension of the Hilbert space.

  1. Minimal representations, geometric quantization, and unitarity.

    PubMed

    Brylinski, R; Kostant, B

    1994-06-21

    In the framework of geometric quantization we explicitly construct, in a uniform fashion, a unitary minimal representation pio of every simply-connected real Lie group Go such that the maximal compact subgroup of Go has finite center and Go admits some minimal representation. We obtain algebraic and analytic results about pio. We give several results on the algebraic and symplectic geometry of the minimal nilpotent orbits and then "quantize" these results to obtain the corresponding representations. We assume (Lie Go)C is simple.

  2. An algorithm for constructing minimal order inverses

    NASA Technical Reports Server (NTRS)

    Patel, R. V.

    1976-01-01

    In this paper an algorithm is presented for constructing minimal order inverses of linear, time invariant, controllable and observable, multivariable systems. By means of simple matrix operations, a 'state-overdescribed' system is first constructed which is an inverse of the given multivariable system. A simple Gauss-Jordan type reduction procedure is then used to remove the redundancy in the state vector of the inverse system to obtain a minimal order inverse. When the given multivariable system is not invertible, the algorithm enables a minimal order inverse of an invertible subsystem to be constructed. Numerical examples are given to illustrate the use of the algorithm.

  3. Technology applications for radioactive waste minimization

    SciTech Connect

    Devgun, J.S.

    1994-07-01

    The nuclear power industry has achieved one of the most successful examples of waste minimization. The annual volume of low-level radioactive waste shipped for disposal per reactor has decreased to approximately one-fifth the volume about a decade ago. In addition, the curie content of the total waste shipped for disposal has decreased. This paper will discuss the regulatory drivers and economic factors for waste minimization and describe the application of technologies for achieving waste minimization for low-level radioactive waste with examples from the nuclear power industry.

  4. Warding off the evil eye: when the fear of being envied increases prosocial behavior.

    PubMed

    van de Ven, Niels; Zeelenberg, Marcel; Pieters, Rik

    2010-11-01

    The fear of being envied makes people act prosocially, in an attempt to ward off the potentially destructive effects of envy. In three experiments, people who were in a superior position and could be envied were more likely than control participants to give time-consuming advice to a potentially envious person or to help a potentially envious person pick up erasers she had accidentally scattered. However, helping behavior increased only if envy was likely to be malicious rather than benign. People who were better off did not increase their helping behavior toward people in general, but increased their helping only toward the potentially envious. This finding is consistent with the idea that the better off act more prosocially as an appeasement strategy. The fear of being envied serves useful group functions, because it triggers prosocial behavior that is likely to dampen the potentially destructive effects of envy and simultaneously helps to improve the situation of people who are worse off.

  5. Minimally invasive surgery for Achilles tendon pathologies

    PubMed Central

    Maffulli, Nicola; Longo, Umile Giuseppe; Spiezia, Filippo; Denaro, Vincenzo

    2010-01-01

    Minimally invasive trauma and orthopedic surgery is increasingly common, though technically demanding. Its use for pathologies of the Achilles tendon (AT) hold the promise to allow faster recovery times, shorter hospital stays, and improved functional outcomes when compared to traditional open procedures, which can lead to difficulty with wound healing because of the tenuous blood supply and increased chance of wound breakdown and infection. We present the recent advances in the field of minimally invasive AT surgery for tendinopathy, acute ruptures, chronic tears, and chronic avulsions of the AT. In our hands, minimally invasive surgery has provided similar results to those obtained with open surgery, with decreased perioperative morbidity, decreased duration of hospital stay, and reduced costs. So far, the studies on minimally invasive orthopedic techniques are of moderate scientific quality with short follow-up periods. Multicenter studies with longer follow-up are needed to justify the long-term advantages of these techniques over traditional ones. PMID:24198547

  6. Waste minimization and pollution prevention awareness plan

    SciTech Connect

    Not Available

    1991-05-31

    The purpose of this plan is to document the Lawrence Livermore National Laboratory (LLNL) Waste Minimization and Pollution Prevention Awareness Program. The plan specifies those activities and methods that are or will be employed to reduce the quantity and toxicity of wastes generated at the site. The intent of this plan is to respond to and comply with (DOE's) policy and guidelines concerning the need for pollution prevention. The Plan is composed of a LLNL Waste Minimization and Pollution Prevention Awareness Program Plan and, as attachments, Program- and Department-specific waste minimization plans. This format reflects the fact that waste minimization is considered a line management responsibility and is to be addressed by each of the Programs and Departments. 14 refs.

  7. Controlling molecular transport in minimal emulsions

    PubMed Central

    Gruner, Philipp; Riechers, Birte; Semin, Benoît; Lim, Jiseok; Johnston, Abigail; Short, Kathleen; Baret, Jean-Christophe

    2016-01-01

    Emulsions are metastable dispersions in which molecular transport is a major mechanism driving the system towards its state of minimal energy. Determining the underlying mechanisms of molecular transport between droplets is challenging due to the complexity of a typical emulsion system. Here we introduce the concept of ‘minimal emulsions', which are controlled emulsions produced using microfluidic tools, simplifying an emulsion down to its minimal set of relevant parameters. We use these minimal emulsions to unravel the fundamentals of transport of small organic molecules in water-in-fluorinated-oil emulsions, a system of great interest for biotechnological applications. Our results are of practical relevance to guarantee a sustainable compartmentalization of compounds in droplet microreactors and to design new strategies for the dynamic control of droplet compositions. PMID:26797564

  8. Heart bypass surgery - minimally invasive - discharge

    MedlinePlus

    ... thrombosis, 9th ed: American College of Chest Physicians evidence-based clinical practice guidelines. Chest . 2012;141(2 ... bypass surgery - minimally invasive Heart failure - overview High blood cholesterol ...

  9. Genetic algorithms for minimal source reconstructions

    SciTech Connect

    Lewis, P.S.; Mosher, J.C.

    1993-12-01

    Under-determined linear inverse problems arise in applications in which signals must be estimated from insufficient data. In these problems the number of potentially active sources is greater than the number of observations. In many situations, it is desirable to find a minimal source solution. This can be accomplished by minimizing a cost function that accounts from both the compatibility of the solution with the observations and for its ``sparseness``. Minimizing functions of this form can be a difficult optimization problem. Genetic algorithms are a relatively new and robust approach to the solution of difficult optimization problems, providing a global framework that is not dependent on local continuity or on explicit starting values. In this paper, the authors describe the use of genetic algorithms to find minimal source solutions, using as an example a simulation inspired by the reconstruction of neural currents in the human brain from magnetoencephalographic (MEG) measurements.

  10. Minimally Invasive Transcatheter Aortic Valve Replacement (TAVR)

    MedlinePlus Videos and Cool Tools

    Watch a Broward Health surgeon perform a minimally invasive Transcatheter Aortic Valve Replacement (TAVR) Click Here to view the BroadcastMed, Inc. Privacy Policy and Legal Notice © 2017 BroadcastMed, Inc. ...

  11. Academic Achievement and Minimal Brain Dysfunction

    ERIC Educational Resources Information Center

    Edwards, R. Philip; And Others

    1971-01-01

    The investigation provided no evidence that a diagnosis of minimal brain dysfunction based on a pediatric neurological evaluation and/or visual-motor impairment as measured by the Bender-Gestalt, is a useful predictor of academic achievement. (Author)

  12. Mixed waste minimization in a research environment

    SciTech Connect

    Kirner, N.

    1994-12-31

    This presentation describes minimization efforts and processes for mixed waste generated by research facilities. Waste stream assessment and treatment, and database management for various research-related waste streams is detailed.

  13. Degreasing of titanium to minimize stress corrosion

    NASA Technical Reports Server (NTRS)

    Carpenter, S. R.

    1967-01-01

    Stress corrosion of titanium and its alloys at elevated temperatures is minimized by replacing trichloroethylene with methanol or methyl ethyl ketone as a degreasing agent. Wearing cotton gloves reduces stress corrosion from perspiration before the metal components are processed.

  14. Bi-quartic parametric polynomial minimal surfaces

    NASA Astrophysics Data System (ADS)

    Kassabov, O.; Vlachkova, K.

    2015-10-01

    Minimal surfaces with isothermal parameters admitting Bézier representation were studied by Cosín and Monterde. They showed that, up to an affine transformation, the Enneper surface is the only bi-cubic isothermal minimal surface. Here we study bi-quartic isothermal minimal surfaces and establish the general form of their generating functions in the Weierstrass representation formula. We apply an approach proposed by Ganchev to compute the normal curvature and show that, in contrast to the bi-cubic case, there is a variety of bi-quartic isothermal minimal surfaces. Based on the Bézier representation we establish some geometric properties of the bi-quartic harmonic surfaces. Numerical experiments are visualized and presented to illustrate and support our results.

  15. Controlling molecular transport in minimal emulsions

    NASA Astrophysics Data System (ADS)

    Gruner, Philipp; Riechers, Birte; Semin, Benoît; Lim, Jiseok; Johnston, Abigail; Short, Kathleen; Baret, Jean-Christophe

    2016-01-01

    Emulsions are metastable dispersions in which molecular transport is a major mechanism driving the system towards its state of minimal energy. Determining the underlying mechanisms of molecular transport between droplets is challenging due to the complexity of a typical emulsion system. Here we introduce the concept of `minimal emulsions', which are controlled emulsions produced using microfluidic tools, simplifying an emulsion down to its minimal set of relevant parameters. We use these minimal emulsions to unravel the fundamentals of transport of small organic molecules in water-in-fluorinated-oil emulsions, a system of great interest for biotechnological applications. Our results are of practical relevance to guarantee a sustainable compartmentalization of compounds in droplet microreactors and to design new strategies for the dynamic control of droplet compositions.

  16. A modified secant method for unconstrained minimization

    NASA Technical Reports Server (NTRS)

    Polak, E.

    1972-01-01

    A gradient-secant algorithm for unconstrained optimization problems is presented. The algorithm uses Armijo gradient method iterations until it reaches a region where the Newton method is more efficient, and then switches over to a secant form of operation. It is concluded that an efficient method for unconstrained minimization has been developed, and that any convergent minimization method can be substituted for the Armijo gradient method.

  17. Future of Minimally Invasive Colorectal Surgery

    PubMed Central

    Whealon, Matthew; Vinci, Alessio; Pigazzi, Alessio

    2016-01-01

    Minimally invasive surgery is slowly taking over as the preferred operative approach for colorectal diseases. However, many of the procedures remain technically difficult. This article will give an overview of the state of minimally invasive surgery and the many advances that have been made over the last two decades. Specifically, we discuss the introduction of the robotic platform and some of its benefits and limitations. We also describe some newer techniques related to robotics. PMID:27582647

  18. Gravitino problem in minimal supergravity inflation

    NASA Astrophysics Data System (ADS)

    Hasegawa, Fuminori; Mukaida, Kyohei; Nakayama, Kazunori; Terada, Takahiro; Yamada, Yusuke

    2017-04-01

    We study non-thermal gravitino production in the minimal supergravity inflation. In this minimal model utilizing orthogonal nilpotent superfields, the particle spectrum includes only graviton, gravitino, inflaton, and goldstino. We find that a substantial fraction of the cosmic energy density can be transferred to the longitudinal gravitino due to non-trivial change of its sound speed. This implies either a breakdown of the effective theory after inflation or a serious gravitino problem.

  19. Minimally Invasive Forefoot Surgery in France.

    PubMed

    Meusnier, Tristan; Mukish, Prikesht

    2016-06-01

    Study groups have been formed in France to advance the use of minimally invasive surgery. These techniques are becoming more frequently used and the technique nuances are continuing to evolve. The objective of this article was to advance the awareness of the current trends in minimally invasive surgery for common diseases of the forefoot. The percutaneous surgery at the forefoot is less developed at this time, but also will be discussed.

  20. Current research in sonic-boom minimization

    NASA Technical Reports Server (NTRS)

    Darden, C. M.; Mack, R. J.

    1976-01-01

    A review is given of several questions as yet unanswered in the area of sonic-boom research. Efforts, both here at Langley and elsewhere, in the area of minimization, human response, design techniques and in developing higher order propagation methods are discussed. In addition, a wind-tunnel test program being conducted to assess the validity of minimization methods based on a forward spike in the F-function is described.

  1. Minimally invasive treatment of infected pancreatic necrosis

    PubMed Central

    Cebulski, Włodzimierz; Słodkowski, Maciej; Krasnodębski, Ireneusz W.

    2014-01-01

    Infected pancreatic necrosis is a challenging complication that worsens prognosis in acute pancreatitis. For years, open necrosectomy has been the mainstay treatment option in infected pancreatic necrosis, although surgical debridement still results in high morbidity and mortality rates. Recently, many reports on minimally invasive treatment in infected pancreatic necrosis have been published. This paper presents a review of minimally invasive techniques and attempts to define their role in the management of infected pancreatic necrosis. PMID:25653725

  2. Mesonic spectroscopy of minimal walking technicolor

    SciTech Connect

    Del Debbio, Luigi; Lucini, Biagio; Patella, Agostino; Pica, Claudio; Rago, Antonio

    2010-07-01

    We investigate the structure and the novel emerging features of the mesonic nonsinglet spectrum of the minimal walking technicolor theory. Precision measurements in the nonsinglet pseudoscalar and vector channels are compared to the expectations for an IR-conformal field theory and a QCD-like theory. Our results favor a scenario in which minimal walking technicolor is (almost) conformal in the infrared, while spontaneous chiral symmetry breaking seems less plausible.

  3. Minimally invasive osteosynthesis technique for articular fractures.

    PubMed

    Beale, Brian S; Cole, Grayson

    2012-09-01

    Articular fractures require accurate reduction and rigid stabilization to decrease the chance of osteoarthritis and joint dysfunction. Articular fractures have been traditionally repaired by arthrotomy and internal fixation. Recently, minimally invasive techniques have been introduced to treat articular fractures, reducing patient morbidity and improving the accuracy of reduction. A variety of techniques, including distraction, radiographic imaging, and arthroscopy, are used with the minimally invasive osteosynthesis technique of articular fractures to achieve a successful repair and outcome.

  4. Alternating minimization and Boltzmann machine learning.

    PubMed

    Byrne, W

    1992-01-01

    Training a Boltzmann machine with hidden units is appropriately treated in information geometry using the information divergence and the technique of alternating minimization. The resulting algorithm is shown to be closely related to gradient descent Boltzmann machine learning rules, and the close relationship of both to the EM algorithm is described. An iterative proportional fitting procedure for training machines without hidden units is described and incorporated into the alternating minimization algorithm.

  5. Minimally Invasive Osteotomies of the Calcaneus.

    PubMed

    Guyton, Gregory P

    2016-09-01

    Osteotomies of the calcaneus are powerful surgical tools, representing a critical component of the surgical reconstruction of pes planus and pes cavus deformity. Modern minimally invasive calcaneal osteotomies can be performed safely with a burr through a lateral incision. Although greater kerf is generated with the burr, the effect is modest, can be minimized, and is compatible with many fixation techniques. A hinged jig renders the procedure more reproducible and accessible.

  6. Minimal basilar membrane motion in low-frequency hearing.

    PubMed

    Warren, Rebecca L; Ramamoorthy, Sripriya; Ciganović, Nikola; Zhang, Yuan; Wilson, Teresa M; Petrie, Tracy; Wang, Ruikang K; Jacques, Steven L; Reichenbach, Tobias; Nuttall, Alfred L; Fridberger, Anders

    2016-07-26

    Low-frequency hearing is critically important for speech and music perception, but no mechanical measurements have previously been available from inner ears with intact low-frequency parts. These regions of the cochlea may function in ways different from the extensively studied high-frequency regions, where the sensory outer hair cells produce force that greatly increases the sound-evoked vibrations of the basilar membrane. We used laser interferometry in vitro and optical coherence tomography in vivo to study the low-frequency part of the guinea pig cochlea, and found that sound stimulation caused motion of a minimal portion of the basilar membrane. Outside the region of peak movement, an exponential decline in motion amplitude occurred across the basilar membrane. The moving region had different dependence on stimulus frequency than the vibrations measured near the mechanosensitive stereocilia. This behavior differs substantially from the behavior found in the extensively studied high-frequency regions of the cochlea.

  7. Minimal basilar membrane motion in low-frequency hearing

    PubMed Central

    Warren, Rebecca L.; Ramamoorthy, Sripriya; Ciganović, Nikola; Zhang, Yuan; Wilson, Teresa M.; Petrie, Tracy; Wang, Ruikang K.; Jacques, Steven L.; Reichenbach, Tobias; Nuttall, Alfred L.; Fridberger, Anders

    2016-01-01

    Low-frequency hearing is critically important for speech and music perception, but no mechanical measurements have previously been available from inner ears with intact low-frequency parts. These regions of the cochlea may function in ways different from the extensively studied high-frequency regions, where the sensory outer hair cells produce force that greatly increases the sound-evoked vibrations of the basilar membrane. We used laser interferometry in vitro and optical coherence tomography in vivo to study the low-frequency part of the guinea pig cochlea, and found that sound stimulation caused motion of a minimal portion of the basilar membrane. Outside the region of peak movement, an exponential decline in motion amplitude occurred across the basilar membrane. The moving region had different dependence on stimulus frequency than the vibrations measured near the mechanosensitive stereocilia. This behavior differs substantially from the behavior found in the extensively studied high-frequency regions of the cochlea. PMID:27407145

  8. Minimalism in Art, Medical Science and Neurosurgery.

    PubMed

    Ökten, Ali İhsan

    2016-12-21

    The word ''minimalism'' is a word derived from French the word ''minimum''. Whereas the lexical meaning of minimum is ''the least or the smallest quantity necessary for something'', its expression in mathematics can be described as ''the lowest step a variable number can descend, least, minimal''. Minimalism, which advocates an extreme simplicity of the artistic form, is a current in modern art and music whose origins go to 1960s and which features simplicity and objectivity. Although art, science and philosophy are different disciplines, they support each other from time to time, sometimes they intertwine and sometimes they copy each other. A periodic schools or teaching in one of them can take the others into itself, so, they proceed on their ways empowering each other. It is also true for the minimalism in art and the minimal invasive surgical approaches in science. Concepts like doing with less, avoiding unnecessary materials and reducing the number of the elements in order to increase the effect in the expression which are the main elements of the minimalism in art found their equivalents in medicine and neurosurgery. Their equivalents in medicine or neurosurgery have been to protect the physical integrity of the patient with less iatrogenic injury, minimum damage and the same therapeutic effect in the most effective way and to enable the patient to regain his health in the shortest span of time.

  9. Economic impact of minimally invasive lumbar surgery

    PubMed Central

    Hofstetter, Christoph P; Hofer, Anna S; Wang, Michael Y

    2015-01-01

    Cost effectiveness has been demonstrated for traditional lumbar discectomy, lumbar laminectomy as well as for instrumented and noninstrumented arthrodesis. While emerging evidence suggests that minimally invasive spine surgery reduces morbidity, duration of hospitalization, and accelerates return to activites of daily living, data regarding cost effectiveness of these novel techniques is limited. The current study analyzes all available data on minimally invasive techniques for lumbar discectomy, decompression, short-segment fusion and deformity surgery. In general, minimally invasive spine procedures appear to hold promise in quicker patient recovery times and earlier return to work. Thus, minimally invasive lumbar spine surgery appears to have the potential to be a cost-effective intervention. Moreover, novel less invasive procedures are less destabilizing and may therefore be utilized in certain indications that traditionally required arthrodesis procedures. However, there is a lack of studies analyzing the economic impact of minimally invasive spine surgery. Future studies are necessary to confirm the durability and further define indications for minimally invasive lumbar spine procedures. PMID:25793159

  10. Minimally Invasive Surgery in Gynecologic Oncology

    PubMed Central

    Mori, Kristina M.; Neubauer, Nikki L.

    2013-01-01

    Minimally invasive surgery has been utilized in the field of obstetrics and gynecology as far back as the 1940s when culdoscopy was first introduced as a visualization tool. Gynecologists then began to employ minimally invasive surgery for adhesiolysis and obtaining biopsies but then expanded its use to include procedures such as tubal sterilization (Clyman (1963), L. E. Smale and M. L. Smale (1973), Thompson and Wheeless (1971), Peterson and Behrman (1971)). With advances in instrumentation, the first laparoscopic hysterectomy was successfully performed in 1989 by Reich et al. At the same time, minimally invasive surgery in gynecologic oncology was being developed alongside its benign counterpart. In the 1975s, Rosenoff et al. reported using peritoneoscopy for pretreatment evaluation in ovarian cancer, and Spinelli et al. reported on using laparoscopy for the staging of ovarian cancer. In 1993, Nichols used operative laparoscopy to perform pelvic lymphadenectomy in cervical cancer patients. The initial goals of minimally invasive surgery, not dissimilar to those of modern medicine, were to decrease the morbidity and mortality associated with surgery and therefore improve patient outcomes and patient satisfaction. This review will summarize the history and use of minimally invasive surgery in gynecologic oncology and also highlight new minimally invasive surgical approaches currently in development. PMID:23997959

  11. Robust dynamical pattern formation from a multifunctional minimal genetic circuit

    PubMed Central

    2010-01-01

    Background A practical problem during the analysis of natural networks is their complexity, thus the use of synthetic circuits would allow to unveil the natural mechanisms of operation. Autocatalytic gene regulatory networks play an important role in shaping the development of multicellular organisms, whereas oscillatory circuits are used to control gene expression under variable environments such as the light-dark cycle. Results We propose a new mechanism to generate developmental patterns and oscillations using a minimal number of genes. For this, we design a synthetic gene circuit with an antagonistic self-regulation to study the spatio-temporal control of protein expression. Here, we show that our minimal system can behave as a biological clock or memory, and it exhibites an inherent robustness due to a quorum sensing mechanism. We analyze this property by accounting for molecular noise in an heterogeneous population. We also show how the period of the oscillations is tunable by environmental signals, and we study the bifurcations of the system by constructing different phase diagrams. Conclusions As this minimal circuit is based on a single transcriptional unit, it provides a new mechanism based on post-translational interactions to generate targeted spatio-temporal behavior. PMID:20412565

  12. Sequential unconstrained minimization algorithms for constrained optimization

    NASA Astrophysics Data System (ADS)

    Byrne, Charles

    2008-02-01

    The problem of minimizing a function f(x):RJ → R, subject to constraints on the vector variable x, occurs frequently in inverse problems. Even without constraints, finding a minimizer of f(x) may require iterative methods. We consider here a general class of iterative algorithms that find a solution to the constrained minimization problem as the limit of a sequence of vectors, each solving an unconstrained minimization problem. Our sequential unconstrained minimization algorithm (SUMMA) is an iterative procedure for constrained minimization. At the kth step we minimize the function G_k(x)=f(x)+g_k(x), to obtain xk. The auxiliary functions gk(x):D ⊆ RJ → R+ are nonnegative on the set D, each xk is assumed to lie within D, and the objective is to minimize the continuous function f:RJ → R over x in the set C=\\overline D , the closure of D. We assume that such minimizers exist, and denote one such by \\hat x . We assume that the functions gk(x) satisfy the inequalities 0\\leq g_k(x)\\leq G_{k-1}(x)-G_{k-1}(x^{k-1}), for k = 2, 3, .... Using this assumption, we show that the sequence {f(xk)} is decreasing and converges to f({\\hat x}) . If the restriction of f(x) to D has bounded level sets, which happens if \\hat x is unique and f(x) is closed, proper and convex, then the sequence {xk} is bounded, and f(x^*)=f({\\hat x}) , for any cluster point x*. Therefore, if \\hat x is unique, x^*={\\hat x} and \\{x^k\\}\\rightarrow {\\hat x} . When \\hat x is not unique, convergence can still be obtained, in particular cases. The SUMMA includes, as particular cases, the well-known barrier- and penalty-function methods, the simultaneous multiplicative algebraic reconstruction technique (SMART), the proximal minimization algorithm of Censor and Zenios, the entropic proximal methods of Teboulle, as well as certain cases of gradient descent and the Newton-Raphson method. The proof techniques used for SUMMA can be extended to obtain related results for the induced proximal

  13. Minimally invasive procedures on the lumbar spine

    PubMed Central

    Skovrlj, Branko; Gilligan, Jeffrey; Cutler, Holt S; Qureshi, Sheeraz A

    2015-01-01

    Degenerative disease of the lumbar spine is a common and increasingly prevalent condition that is often implicated as the primary reason for chronic low back pain and the leading cause of disability in the western world. Surgical management of lumbar degenerative disease has historically been approached by way of open surgical procedures aimed at decompressing and/or stabilizing the lumbar spine. Advances in technology and surgical instrumentation have led to minimally invasive surgical techniques being developed and increasingly used in the treatment of lumbar degenerative disease. Compared to the traditional open spine surgery, minimally invasive techniques require smaller incisions and decrease approach-related morbidity by avoiding muscle crush injury by self-retaining retractors, preventing the disruption of tendon attachment sites of important muscles at the spinous processes, using known anatomic neurovascular and muscle planes, and minimizing collateral soft-tissue injury by limiting the width of the surgical corridor. The theoretical benefits of minimally invasive surgery over traditional open surgery include reduced blood loss, decreased postoperative pain and narcotics use, shorter hospital length of stay, faster recover and quicker return to work and normal activity. This paper describes the different minimally invasive techniques that are currently available for the treatment of degenerative disease of the lumbar spine. PMID:25610845

  14. Blackfolds, plane waves and minimal surfaces

    NASA Astrophysics Data System (ADS)

    Armas, Jay; Blau, Matthias

    2015-07-01

    Minimal surfaces in Euclidean space provide examples of possible non-compact horizon geometries and topologies in asymptotically flat space-time. On the other hand, the existence of limiting surfaces in the space-time provides a simple mechanism for making these configurations compact. Limiting surfaces appear naturally in a given space-time by making minimal surfaces rotate but they are also inherent to plane wave or de Sitter space-times in which case minimal surfaces can be static and compact. We use the blackfold approach in order to scan for possible black hole horizon geometries and topologies in asymptotically flat, plane wave and de Sitter space-times. In the process we uncover several new configurations, such as black helicoids and catenoids, some of which have an asymptotically flat counterpart. In particular, we find that the ultraspinning regime of singly-spinning Myers-Perry black holes, described in terms of the simplest minimal surface (the plane), can be obtained as a limit of a black helicoid, suggesting that these two families of black holes are connected. We also show that minimal surfaces embedded in spheres rather than Euclidean space can be used to construct static compact horizons in asymptotically de Sitter space-times.

  15. Minimally invasive optical biopsy for oximetry

    NASA Astrophysics Data System (ADS)

    van der Putten, Marieke A.; Brewer, James M.; Harvey, Andrew R.

    2017-02-01

    The study of localised oxygen saturation in blood vessels can shed light on the etiology and progression of many diseases with which hypoxia is associated. For example, hypoxia in the tendon has been linked to early stages of rheumatoid arthritis, an auto-immune inflammatory disease. Vascular oximetry of deep tissue presents significant challenges as vessels are not optically accessible. In this paper, we present a novel multispectral imaging technique for vascular oximetry, and recent developments made towards its adaptation for minimally invasive imaging. We present proof-of-concept of the system and illumination scheme as well as the analysis technique. We present results of a validation study performed in vivo on mice with acutely inflamed tendons. Adaptation of the technique for minimally invasive microendoscopy is also presented, along with preliminary results of minimally invasive ex vivo vascular oximetry.

  16. Minimal perceptrons for memorizing complex patterns

    NASA Astrophysics Data System (ADS)

    Pastor, Marissa; Song, Juyong; Hoang, Danh-Tai; Jo, Junghyo

    2016-11-01

    Feedforward neural networks have been investigated to understand learning and memory, as well as applied to numerous practical problems in pattern classification. It is a rule of thumb that more complex tasks require larger networks. However, the design of optimal network architectures for specific tasks is still an unsolved fundamental problem. In this study, we consider three-layered neural networks for memorizing binary patterns. We developed a new complexity measure of binary patterns, and estimated the minimal network size for memorizing them as a function of their complexity. We formulated the minimal network size for regular, random, and complex patterns. In particular, the minimal size for complex patterns, which are neither ordered nor disordered, was predicted by measuring their Hamming distances from known ordered patterns. Our predictions agree with simulations based on the back-propagation algorithm.

  17. Minimal Length Scale Scenarios for Quantum Gravity.

    PubMed

    Hossenfelder, Sabine

    2013-01-01

    We review the question of whether the fundamental laws of nature limit our ability to probe arbitrarily short distances. First, we examine what insights can be gained from thought experiments for probes of shortest distances, and summarize what can be learned from different approaches to a theory of quantum gravity. Then we discuss some models that have been developed to implement a minimal length scale in quantum mechanics and quantum field theory. These models have entered the literature as the generalized uncertainty principle or the modified dispersion relation, and have allowed the study of the effects of a minimal length scale in quantum mechanics, quantum electrodynamics, thermodynamics, black-hole physics and cosmology. Finally, we touch upon the question of ways to circumvent the manifestation of a minimal length scale in short-distance physics.

  18. Minimally invasive neurosurgery for cerebrospinal fluid disorders.

    PubMed

    Guillaume, Daniel J

    2010-10-01

    This article focuses on minimally invasive approaches used to address disorders of cerebrospinal fluid (CSF) circulation. The author covers the primary CSF disorders that are amenable to minimally invasive treatment, including aqueductal stenosis, fourth ventricular outlet obstruction (including Chiari malformation), isolated lateral ventricle, isolated fourth ventricle, multiloculated hydrocephalus, arachnoid cysts, and tumors that block CSF flow. General approaches to evaluating disorders of CSF circulation, including detailed imaging studies, are discussed. Approaches to minimally invasive management of such disorders are described in general, and for each specific entity. For each procedure, indications, surgical technique, and known outcomes are detailed. Specific complications as well as strategies for their avoidance and management are addressed. Lastly, future directions and the need for structured outcome studies are discussed.

  19. Genetic Research on Biospecimens Poses Minimal Risk

    PubMed Central

    Wendler, David S.; Rid, Annette

    2014-01-01

    Genetic research on human biospecimens is increasingly common. Yet, debate continues over the level of risk that this research poses to sample donors. Some argue that genetic research on biospecimens poses minimal risk; others argue that it poses greater than minimal risk and therefore needs additional requirements and limitations. This debate raises concern that some donors are not receiving appropriate protection or, conversely, that valuable research is being subject to unnecessary requirements and limitations. The present paper attempts to address this concern using the widely-endorsed ‘risks of daily life’ standard. The three extant versions of this standard all suggest that, with proper measures in place to protect donor confidentiality, most genetic research on human biospecimens poses minimal risk to donors. PMID:25530152

  20. Approximate error conjugation gradient minimization methods

    DOEpatents

    Kallman, Jeffrey S

    2013-05-21

    In one embodiment, a method includes selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, calculating an approximate error using the subset of rays, and calculating a minimum in a conjugate gradient direction based on the approximate error. In another embodiment, a system includes a processor for executing logic, logic for selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, logic for calculating an approximate error using the subset of rays, and logic for calculating a minimum in a conjugate gradient direction based on the approximate error. In other embodiments, computer program products, methods, and systems are described capable of using approximate error in constrained conjugate gradient minimization problems.

  1. PRIME: Phase Retrieval via Majorization-Minimization

    NASA Astrophysics Data System (ADS)

    Qiu, Tianyu; Babu, Prabhu; Palomar, Daniel P.

    2016-10-01

    This paper considers the phase retrieval problem in which measurements consist of only the magnitude of several linear measurements of the unknown, e.g., spectral components of a time sequence. We develop low-complexity algorithms with superior performance based on the majorization-minimization (MM) framework. The proposed algorithms are referred to as PRIME: Phase Retrieval vIa the Majorization-minimization techniquE. They are preferred to existing benchmark methods since at each iteration a simple surrogate problem is solved with a closed-form solution that monotonically decreases the original objective function. In total, four algorithms are proposed using different majorization-minimization techniques. Experimental results validate that our algorithms outperform existing methods in terms of successful recovery and mean square error under various settings.

  2. Responsible gambling: general principles and minimal requirements.

    PubMed

    Blaszczynski, Alex; Collins, Peter; Fong, Davis; Ladouceur, Robert; Nower, Lia; Shaffer, Howard J; Tavares, Hermano; Venisse, Jean-Luc

    2011-12-01

    Many international jurisdictions have introduced responsible gambling programs. These programs intend to minimize negative consequences of excessive gambling, but vary considerably in their aims, focus, and content. Many responsible gambling programs lack a conceptual framework and, in the absence of empirical data, their components are based only on general considerations and impressions. This paper outlines the consensus viewpoint of an international group of researchers suggesting fundamental responsible gambling principles, roles of key stakeholders, and minimal requirements that stakeholders can use to frame and inform responsible gambling programs across jurisdictions. Such a framework does not purport to offer value statements regarding the legal status of gambling or its expansion. Rather, it proposes gambling-related initiatives aimed at government, industry, and individuals to promote responsible gambling and consumer protection. This paper argues that there is a set of basic principles and minimal requirements that should form the basis for every responsible gambling program.

  3. On Equilibria for ADM Minimization Games

    NASA Astrophysics Data System (ADS)

    Epstein, Leah; Levin, Asaf

    In the ADM minimization problem, the input is a set of arcs along a directed ring. The input arcs need to be partitioned into non-overlapping chains and cycles so as to minimize the total number of endpoints, where a k-arc cycle contributes k endpoints and a k-arc chain contains k + 1 endpoints. We study ADM minimization problem both as a non-cooperative and a cooperative games. In these games, each arc corresponds to a player, and the players share the cost of the ADM switches. We consider two cost allocation models, a model which was considered by Flammini et al., and a new cost allocation model, which is inspired by congestion games. We compare the price of anarchy and price of stability in the two cost allocation models, as well as the strong price of anarchy and the strong price of stability.

  4. Waste Minimization Measurement and Progress Reporting

    SciTech Connect

    Stone, K.A.

    1995-02-13

    Westinghouse Savannah River Company is implementing productivity improvement concepts into the Waste Minimization Program by focusing on the positive initiatives taken to reduce waste generation at the Savannah River Site. Previous performance measures, based only on waste generation rates, proved to be an ineffective metric for measuring performance and promoting continuous improvements within the Program. Impacts of mission changes and non-routine operations impeded development of baseline waste generation rates and often negated waste generation trending reports. A system was developed to quantify, document and track innovative activities that impact waste volume and radioactivity/toxicity reductions. This system coupled with Management-driven waste disposal avoidance goals is proving to be a powerful tool to promote waste minimization awareness and the implementation of waste reduction initiatives. Measurement of waste not generated, in addition to waste generated, increases the credibility of the Waste Minimization Program, improves sharing of success stories, and supports development of regulatory and management reports

  5. One-dimensional Gromov minimal filling problem

    NASA Astrophysics Data System (ADS)

    Ivanov, Alexandr O.; Tuzhilin, Alexey A.

    2012-05-01

    The paper is devoted to a new branch in the theory of one-dimensional variational problems with branching extremals, the investigation of one-dimensional minimal fillings introduced by the authors. On the one hand, this problem is a one-dimensional version of a generalization of Gromov's minimal fillings problem to the case of stratified manifolds. On the other hand, this problem is interesting in itself and also can be considered as a generalization of another classical problem, the Steiner problem on the construction of a shortest network connecting a given set of terminals. Besides the statement of the problem, we discuss several properties of the minimal fillings and state several conjectures. Bibliography: 38 titles.

  6. Advanced pyrochemical technologies for minimizing nuclear waste

    SciTech Connect

    Bronson, M.C.; Dodson, K.E.; Riley, D.C.

    1994-12-31

    The US Department of Energy (DOE) is seeking to reduce the size of the current nuclear weapons complex and consequently minimize operating costs. To meet this DOE objective, the national laboratories have been asked to develop advanced technologies that take uranium and plutonium from retired weapons and prepare it for new weapons, long-term storage, and/or final disposition. Current pyrochemical processes generate residue salts and ceramic wastes that require aqueous processing to remove and recover the actinides. However, the aqueous treatment of these residues generates an estimated 100 l of acidic transuranic (TRU) waste per kilogram of plutonium in the residue. Lawrence Livermore National Laboratory (LLNL) is developing pyrochemical techniques to eliminate, minimize, or more efficiently treat these residue streams. This paper presents technologies being developed at LLNL on advanced materials for actinide containment, reactors that minimize residues, and pyrochemical processes that remove actinides from waste salts.

  7. Finding Malicious Cyber Discussions in Social Media

    DTIC Science & Technology

    2016-02-02

    explore in this paper is to supplement metadata analysis with direct mining of discussion text using machine-learning and human language technology (HLT...dramatically reduced using natural lan- guage machine learning techniques. Using a new English text corpus containing more than 250k dis- cussions...domain. In Section 3, use-cases, text corpora, features, and classifiers are described. In Section 4, experiments and performance results are presented

  8. Preventing and Profiling Malicious Insider Attacks

    DTIC Science & Technology

    2012-04-01

    passive, easily influenced and with very low self - esteem . Many of these personality characteristics are similar to those presented in the insider threat...judgement in highly stressful situations (Fischer, 2008). Many were victims of child abuse and suffered severe self - esteem problems, while others were...information security industry itself are of grave concern. The industry is well known for hiring former hackers in esteemed positions which clearly

  9. Malicious Activity Simulation Tool (MAST) and Trust

    DTIC Science & Technology

    2015-06-01

    research will enable a more secure implementation of MAST. 14. SUBJECT TERMS Malware , network security, training, Security Control...operational information systems that they manage day-to-day. MAST is a software suite that allows for simulated malware activity on operational...discussed in [1]. Particular emphasis is on the unique risk MAST represents as a malware simulation platform designed to run on production and

  10. Automated Attacker Correlation for Malicious Code

    DTIC Science & Technology

    2010-03-22

    Thomas Dullien, Ero Carrera, Soeren-Meyer Eppler, Sebastian Porst Ruhr-University Bochum zynamics GmbH Grosse Beck Str 3. 44787 Bochum Germany March...TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Ruhr-University Bochum,zynamics GmbH,Grosse Beck Str 3,44787...Halvar Flake. Structural comparison of executable objects. In Ulrich Flegel and Michael Meier, editors, DIMVA, volume 46 of LNI, pages 161–173. GI

  11. Indicator Expansion in Structured Malicious Documents

    DTIC Science & Technology

    2015-05-01

    such as the Blackhole Exploit Kit, to find related documents within the data set. We classify a document as being related to an exploit kit if it...JavaScript from“a69e72586b- aa6b6cfb69d1106f014469” matches Blackhole PDF exploit Type 1 and “15171cb907dfdd161c6125ff35dea40f” matches Blackhole PDF exploit... Blackhole Hashes from IP An IP address can indicate a server associated with a specific malware family. In this section, we use an IP address associ- ated

  12. Power Grid Defense Against Malicious Cascading Failure

    DTIC Science & Technology

    2014-05-01

    proprietary computer hardware and software [26]. In this paper , we extend the work on cascading failure models to a two-player game where an attacker...information. However, in this paper , we use the following proxy (similar to [8]). cij(G0) = (1 + α)loadG0(ij) where α is a non-negative real that...NetworkX library2 as well as the PuLP library for linear programming3. All statistics presented in this section were calculated using the R statistics

  13. Minimally invasive surgical techniques in periodontal regeneration.

    PubMed

    Cortellini, Pierpaolo

    2012-09-01

    A review of the current scientific literature was undertaken to evaluate the efficacy of minimally invasive periodontal regenerative surgery in the treatment of periodontal defects. The impact on clinical outcomes, surgical chair-time, side effects and patient morbidity were evaluated. An electronic search of PUBMED database from January 1987 to December 2011 was undertaken on dental journals using the key-word "minimally invasive surgery". Cohort studies, retrospective studies and randomized controlled clinical trials referring to treatment of periodontal defects with at least 6 months of follow-up were selected. Quality assessment of the selected studies was done through the Strength of Recommendation Taxonomy Grading (SORT) System. Ten studies (1 retrospective, 5 cohorts and 4 RCTs) were included. All the studies consistently support the efficacy of minimally invasive surgery in the treatment of periodontal defects in terms of clinical attachment level gain, probing pocket depth reduction and minimal gingival recession. Six studies reporting on side effects and patient morbidity consistently indicate very low levels of pain and discomfort during and after surgery resulting in a reduced intake of pain-killers and very limited interference with daily activities in the post-operative period. Minimally invasive surgery might be considered a true reality in the field of periodontal regeneration. The observed clinical improvements are consistently associated with very limited morbidity to the patient during the surgical procedure as well as in the post-operative period. Minimally invasive surgery, however, cannot be applied at all cases. A stepwise decisional algorithm should support clinicians in choosing the treatment approach.

  14. Minimizing radiation damage in nonlinear optical crystals

    DOEpatents

    Cooke, D.W.; Bennett, B.L.; Cockroft, N.J.

    1998-09-08

    Methods are disclosed for minimizing laser induced damage to nonlinear crystals, such as KTP crystals, involving various means for electrically grounding the crystals in order to diffuse electrical discharges within the crystals caused by the incident laser beam. In certain embodiments, electrically conductive material is deposited onto or into surfaces of the nonlinear crystals and the electrically conductive surfaces are connected to an electrical ground. To minimize electrical discharges on crystal surfaces that are not covered by the grounded electrically conductive material, a vacuum may be created around the nonlinear crystal. 5 figs.

  15. Minimizing radiation damage in nonlinear optical crystals

    DOEpatents

    Cooke, D. Wayne; Bennett, Bryan L.; Cockroft, Nigel J.

    1998-01-01

    Methods are disclosed for minimizing laser induced damage to nonlinear crystals, such as KTP crystals, involving various means for electrically grounding the crystals in order to diffuse electrical discharges within the crystals caused by the incident laser beam. In certain embodiments, electrically conductive material is deposited onto or into surfaces of the nonlinear crystals and the electrically conductive surfaces are connected to an electrical ground. To minimize electrical discharges on crystal surfaces that are not covered by the grounded electrically conductive material, a vacuum may be created around the nonlinear crystal.

  16. Reversible Rings with Involutions and Some Minimalities

    PubMed Central

    Fakieh, W. M.; Nauman, S. K.

    2013-01-01

    In continuation of the recent developments on extended reversibilities on rings, we initiate here a study on reversible rings with involutions, or, in short, ∗-reversible rings. These rings are symmetric, reversible, reflexive, and semicommutative. In this note we will study some properties and examples of ∗-reversible rings. It is proved here that the polynomial rings of ∗-reversible rings may not be ∗-reversible. A criterion for rings which cannot adhere to any involution is developed and it is observed that a minimal noninvolutary ring is of order 4 and that a minimal noncommutative ∗-reversible ring is of order 16. PMID:24489510

  17. Linearized non-minimal higher curvature supergravity

    NASA Astrophysics Data System (ADS)

    Farakos, Fotis; Kehagias, Alex; Koutrolikos, Konstantinos

    2015-05-01

    In the framework of linearized non-minimal supergravity (20/20), we present the embedding of the R +R2 model and we analyze its field spectrum. As usual, the auxiliary fields of the Einstein theory now become propagating, giving rise to additional degrees of freedom, which organize themselves into on-shell irreducible supermultiplets. By performing the analysis both in component and superspace formulations we identify the new supermultiplets. On top of the two massive chiral superfields reminiscent of the old-minimal supergravity embedding, the spectrum contains also a consistent physical, massive, vector supermultiplet and a tachyonic ghost, massive, vector supermultiplet.

  18. Pattern Search Methods for Linearly Constrained Minimization

    NASA Technical Reports Server (NTRS)

    Lewis, Robert Michael; Torczon, Virginia

    1998-01-01

    We extend pattern search methods to linearly constrained minimization. We develop a general class of feasible point pattern search algorithms and prove global convergence to a Karush-Kuhn-Tucker point. As in the case of unconstrained minimization, pattern search methods for linearly constrained problems accomplish this without explicit recourse to the gradient or the directional derivative. Key to the analysis of the algorithms is the way in which the local search patterns conform to the geometry of the boundary of the feasible region.

  19. Minimally invasive treatments for venous compression syndromes

    PubMed Central

    Hulsberg, Paul C.; McLoney, Eric; Partovi, Sasan; Davidson, Jon C.

    2016-01-01

    The management of venous compression syndromes has historically been reliant on surgical treatment when conservative measures fail. There are, however, several settings in which endovascular therapy can play a significant role as an adjunct or even a replacement to more invasive surgical methods. We explore the role of minimally invasive treatment options for three of the most well-studied venous compression syndromes. The clinical aspects and pathophysiology of Paget-Schroetter syndrome (PSS), nutcracker syndrome, and May-Thurner syndrome are discussed in detail, with particular emphasis on the role that interventionalists can play in minimally invasive treatment. PMID:28123978

  20. Minimal String Theory and the Douglas Equation

    NASA Astrophysics Data System (ADS)

    Belavin, A. A.; Belavin, V. A.

    We use the connection between the Frobenius manifold and the Douglas string equation to further investigate Minimal Liouville gravity. We search for a solution of the Douglas string equation and simultaneously a proper transformation from the KdV to the Liouville frame which ensures the fulfilment of the conformal and fusion selection rules. We find that the desired solution of the string equation has an explicit and simple form in the flat coordinates on the Frobenius manifold in the general case of (p,q) Minimal Liouville gravity.

  1. MINIMAL IMMERSIONS OF SPHERES INTO SPHERES

    PubMed Central

    Do Carmo, Manfredo P.; Wallach, Nolan R.

    1969-01-01

    In this paper we announce a qualitative description of an important class of closed n-dimensional submanifolds of the m-dimensional sphere, namely, those which locally minimize the n-area in the same way that geodesics minimize the arc length and are themselves locally n-spheres of constant radius r; those r that may appear are called admissible. It is known that for n = 2 each admissible r determines a unique element of the above class. The main result here is that for each n ≥ 3 and each admissible r ≥ [unk]8 there exists a continuum of distinct such submanifolds. PMID:16591771

  2. The Parisi Formula has a Unique Minimizer

    NASA Astrophysics Data System (ADS)

    Auffinger, Antonio; Chen, Wei-Kuo

    2015-05-01

    In 1979, Parisi (Phys Rev Lett 43:1754-1756, 1979) predicted a variational formula for the thermodynamic limit of the free energy in the Sherrington-Kirkpatrick model, and described the role played by its minimizer. This formula was verified in the seminal work of Talagrand (Ann Math 163(1):221-263, 2006) and later generalized to the mixed p-spin models by Panchenko (Ann Probab 42(3):946-958, 2014). In this paper, we prove that the minimizer in Parisi's formula is unique at any temperature and external field by establishing the strict convexity of the Parisi functional.

  3. Minimally Invasive Treatment of Spine Trauma.

    PubMed

    McGowan, Jason E; Ricks, Christian B; Kanter, Adam S

    2017-01-01

    The role for minimally invasive surgery (MIS) continues to expand in the management of spinal pathology. In the setting of trauma, operative techniques that can minimize morbidity without compromising clinical efficacy have significant value. MIS techniques are associated with decreased intraoperative blood loss, operative time, and morbidity, while providing patients with comparable outcomes when compared with conventional open procedures. MIS interventions further enable earlier mobilization, decreased hospital stay, decreased pain, and an earlier return to baseline function when compared with traditional techniques. This article reviews patient selection and select MIS techniques for those who have suffered traumatic spinal injury.

  4. Instabilities and Solitons in Minimal Strips

    NASA Astrophysics Data System (ADS)

    Machon, Thomas; Alexander, Gareth P.; Goldstein, Raymond E.; Pesci, Adriana I.

    2016-07-01

    We show that highly twisted minimal strips can undergo a nonsingular transition, unlike the singular transitions seen in the Möbius strip and the catenoid. If the strip is nonorientable, this transition is topologically frustrated, and the resulting surface contains a helicoidal defect. Through a controlled analytic approximation, the system can be mapped onto a scalar ϕ4 theory on a nonorientable line bundle over the circle, where the defect becomes a topologically protected kink soliton or domain wall, thus establishing their existence in minimal surfaces. Demonstrations with soap films confirm these results and show how the position of the defect can be controlled through boundary deformation.

  5. Minimally invasive treatments for perforator vein insufficiency.

    PubMed

    Kuyumcu, Gokhan; Salazar, Gloria Maria; Prabhakar, Anand M; Ganguli, Suvranu

    2016-12-01

    Incompetent superficial veins are the most common cause of lower extremity superficial venous reflux and varicose veins; however, incompetent or insufficient perforator veins are the most common cause of recurrent varicose veins after treatment, often unrecognized. Perforator vein insufficiency can result in pain, skin changes, and skin ulcers, and often merit intervention. Minimally invasive treatments have replaced traditional surgical treatments for incompetent perforator veins. Current minimally invasive treatment options include ultrasound guided sclerotherapy (USGS) and endovascular thermal ablation (EVTA) with either laser or radiofrequency energy sources. Advantages and disadvantages of each modality and knowledge on these treatments are required to adequately address perforator venous disease.

  6. Design of batch minimal bromate oscillator

    NASA Astrophysics Data System (ADS)

    Li, Jun; Wang, Jichang

    2011-05-01

    A new type of minimal bromate oscillator that could exhibit spontaneous oscillations in a closed system was developed in this research. The newly developed oscillator contains a reagent benzoquinone, which does not react with metal catalyst ferroin/ferriin, but modulates the evolution of bromide ions. Since the role of the organic substrate is only the bromine removal, we define this system as a batch minimal bromate oscillator. The bromination of benzoquinone was confirmed with NMR and mass spectrometry measurements. Experiments showed that transient oscillations emerged in a closed reactor when benzoquinone concentration was above a threshold level.

  7. Instabilities and Solitons in Minimal Strips.

    PubMed

    Machon, Thomas; Alexander, Gareth P; Goldstein, Raymond E; Pesci, Adriana I

    2016-07-01

    We show that highly twisted minimal strips can undergo a nonsingular transition, unlike the singular transitions seen in the Möbius strip and the catenoid. If the strip is nonorientable, this transition is topologically frustrated, and the resulting surface contains a helicoidal defect. Through a controlled analytic approximation, the system can be mapped onto a scalar ϕ^{4} theory on a nonorientable line bundle over the circle, where the defect becomes a topologically protected kink soliton or domain wall, thus establishing their existence in minimal surfaces. Demonstrations with soap films confirm these results and show how the position of the defect can be controlled through boundary deformation.

  8. Minimally invasive treatments for perforator vein insufficiency

    PubMed Central

    Salazar, Gloria Maria; Prabhakar, Anand M.; Ganguli, Suvranu

    2016-01-01

    Incompetent superficial veins are the most common cause of lower extremity superficial venous reflux and varicose veins; however, incompetent or insufficient perforator veins are the most common cause of recurrent varicose veins after treatment, often unrecognized. Perforator vein insufficiency can result in pain, skin changes, and skin ulcers, and often merit intervention. Minimally invasive treatments have replaced traditional surgical treatments for incompetent perforator veins. Current minimally invasive treatment options include ultrasound guided sclerotherapy (USGS) and endovascular thermal ablation (EVTA) with either laser or radiofrequency energy sources. Advantages and disadvantages of each modality and knowledge on these treatments are required to adequately address perforator venous disease. PMID:28123979

  9. Minimally invasive plate osteosynthesis: tibia and fibula.

    PubMed

    Beale, Brian S; McCally, Ryan

    2012-09-01

    Fractures of the tibia and fibula are common in dogs and cats and occur most commonly as a result of substantial trauma. Tibial fractures are often amenable to repair using the minimally invasive plate osteosynthesis (MIPO) technique because of the minimal soft tissue covering of the tibia and relative ease of indirect reduction and application of the implant system on the tibia. Treatment of tibial fractures by MIPO has been found to reduce surgical time, reduce the time for fracture healing, and decrease patient morbidity, while at the same time reducing complications compared with traditional open reduction and internal fixation.

  10. Teacher Behavior as Preventive Discipline.

    ERIC Educational Resources Information Center

    DeLuke, Susan V.; Knoblock, Peter

    1987-01-01

    Teacher behaviors which foster preventive discipline include communicating respect to each student, seeking out diverse sources of information, developing curricula that prevent behavior problems, and implementing instructional procedures that minimize misbehaviors. A learning environment inventory which includes student assessment information and…

  11. Minimizing risk in anonymous egg donation.

    PubMed

    Ahuja, K K; Simons, E G; Nair, S; Rimington, M R; Armar, N A

    2003-11-01

    Assisted conception carries with it known and putative medical and surgical risks. Exposing healthy women to these risks in order to harvest eggs for donation when a safer alternative exists is morally and ethically unacceptable. Egg sharing minimizes risk and provides a source of eggs for donation. Anonymity protects all parties involved and should not be removed.

  12. Platform Technologies for Minimally Invasive Physiological Monitoring

    DTIC Science & Technology

    2006-11-01

    Platform Technologies for Minimally Invasive Physiological Monitoring Mingui Sun1,2,3,4, Steven A. Hackworth1,2,4, Zhide Tang1, Jun Zhao1,4, Daliang...Light, W. G. Berger, “Medical devices of the head, neck, and spine,” Radiographics, Jan-Feb 2004 24(1):257-85. [2] W. Liu, M. Sivaprakasam, G. Wang

  13. Minimally Invasive Surgery for Inflammatory Bowel Disease

    PubMed Central

    Holder-Murray, Jennifer; Marsicovetere, Priscilla

    2015-01-01

    Abstract: Surgical management of inflammatory bowel disease is a challenging endeavor given infectious and inflammatory complications, such as fistula, and abscess, complex often postoperative anatomy, including adhesive disease from previous open operations. Patients with Crohn's disease and ulcerative colitis also bring to the table the burden of their chronic illness with anemia, malnutrition, and immunosuppression, all common and contributing independently as risk factors for increased surgical morbidity in this high-risk population. However, to reduce the physical trauma of surgery, technologic advances and worldwide experience with minimally invasive surgery have allowed laparoscopic management of patients to become standard of care, with significant short- and long-term patient benefits compared with the open approach. In this review, we will describe the current state-of the-art for minimally invasive surgery for inflammatory bowel disease and the caveats inherent with this practice in this complex patient population. Also, we will review the applicability of current and future trends in minimally invasive surgical technique, such as laparoscopic “incisionless,” single-incision laparoscopic surgery (SILS), robotic-assisted, and other techniques for the patient with inflammatory bowel disease. There can be no doubt that minimally invasive surgery has been proven to decrease the short- and long-term burden of surgery of these chronic illnesses and represents high-value care for both patient and society. PMID:25989341

  14. Fractality in selfsimilar minimal mass structures

    NASA Astrophysics Data System (ADS)

    De Tommasi, D.; Maddalena, F.; Puglisi, G.; Trentadue, F.

    2017-10-01

    In this paper we study the diffusely observed occurrence of Fractality and Self-organized Criticality in mechanical systems. We analytically show, based on a prototypical compressed tensegrity structure, that these phenomena can be viewed as the result of the contemporary attainment of mass minimization and global stability in elastic systems.

  15. New Diagnostic Terminology for Minimal Brain Dysfunction.

    ERIC Educational Resources Information Center

    Shaywitz, Bennett A.; And Others

    1979-01-01

    Minimal brain dysfunction has been redefined by the American Psychological Association as attention deficit disorder (ADD) and subdivided into categories with and without hyperactivity. The revised 'Diagnostic and Statistical Manual' (DSM III) is now undergoing field trials. Journal Availability: C. V. Mosby Company, 11830 Westline Industrial…

  16. Minimal Interventions in the Teaching of Mathematics

    ERIC Educational Resources Information Center

    Foster, Colin

    2014-01-01

    This paper addresses ways in which mathematics pedagogy can benefit from insights gleaned from counselling. Person-centred counselling stresses the value of genuineness, warm empathetic listening and minimal intervention to support people in solving their own problems and developing increased autonomy. Such an approach contrasts starkly with the…

  17. Using silviculture to minimize gypsy moth impacts

    Treesearch

    Kurt W. Gottschalk

    1989-01-01

    Silvicultural treatments can be used to minimize gypsy moth impacts on hardwood stands. There are two major strategies of these treatments: (1) to decrease susceptibility to defoliation by gypsy moth and (2) to strengthen the stand against mortality and encourage growth after defoliation.

  18. Using silviculture to minimize gypsy moth impacts

    Treesearch

    Kurt W. Gottschalk

    1991-01-01

    Several studies are underway to test and evaluate the use of silvicultural treatments to minimize gypsy moth impacts. Treatment objectives are to change stand susceptibility to gypsy moth defoliation or stand vulnerability to damage after defoliation. Decision charts have been developed to help forest and land managers to select the appropriate treatment for their...

  19. Minimally invasive excision of thoracic arachnoid web.

    PubMed

    Vergara, Pierluigi; Barone, Damiano Giuseppe

    2017-09-23

    Arachnoid webs are rare intradural lesions which can cause direct spinal cord compression and/or alteration of the CSF flow with syringomielia. Surgery has been historically performed via wide open laminectomies. The aim of this study is to prove the feasibility of minimally invasive techniques for the excision of arachnoid webs. A retrospective review of two cases of minimally invasive excision of thoracic arachnoid webs was performed. Surgery was carried out through expandable tubular retractors. Complete excision was achieved through the described approach, with minimal bony removal and soft tissue disruption. There were no intra- or peri- operative complications. Both patients were mobilised early and discharged home within 24hrs post-surgery. Postoperative imaging showed good re-expansion of the spinal cord, with no evidence of residual compression or tethering. For symptomatic arachnoid webs, surgery remains the only definitive treatment. In expert hands, the excision of arachnoid webs can be successfully achieved with tubular retractors and minimally invasive techniques. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Minimization of Salmonella Contamination on Raw Poultry

    USDA-ARS?s Scientific Manuscript database

    Many reviews have discussed Salmonella in poultry and suggested best practices to minimize this organism on raw poultry meat. Despite years of research and conscientious control efforts by industry and regulatory agencies, human salmonellosis rates have declined only modestly and Salmonella is stil...

  1. Data clustering and visualization via energy minimization

    NASA Astrophysics Data System (ADS)

    Andrecut, M.

    2011-09-01

    We discuss a stochastic method for configurational energy minimization, with applications to high-dimensional data clustering and visualization. Also, we demonstrate numerically the ability of the method to capture meaningful biological information from cancer-related microarray data, and to differentiate between different leukemia cancer subtypes.

  2. Minimizing emissions from existing ESP equipped MWCs

    SciTech Connect

    Rigo, H.G.; Chandler, A.J.

    1996-09-01

    A number of municipal waste combustors (MWCs) built before the mid-1980`s, when local permitting processes resulted in the application of acid gas control technology, were equipped with electrostatic precipitators to minimize particulate emissions and comply with the then applicable New Source Performance Standards for Municipal Waste Incinerators (40 CFR 60, Subpart C). Polychlorinated dibenzo-p-dioxins and dibenzo-furans (PCDD/F) emissions can be minimized from these facilities by improving combustion to minimize furnace carryover and flame formation. Unfortunately, this can do nothing about the gas and particle phase formation of PCDD/F when the products of combustion are held in the dioxin formation window--250 to 400 C or 482 to 752 F. A proof-of-concept demonstration test program to demonstrate that flue gas temperature entering existing ESPs can be practically reduced below 175 C (350 F) to minimize PCDD/F formation in the air pollution control system (APCS). At the same time, the performance of powdered activated carbon (PAC) and dry acid gas control reagent injection are demonstrated to establish the practicability of bringing existing ESP-equipped MWCs into compliance with the USEPA`s Emissions Guidelines without scrapping the sunk investment in functional, high efficiency ESPs.

  3. Minimally inconsistent reasoning in Semantic Web.

    PubMed

    Zhang, Xiaowang

    2017-01-01

    Reasoning with inconsistencies is an important issue for Semantic Web as imperfect information is unavoidable in real applications. For this, different paraconsistent approaches, due to their capacity to draw as nontrivial conclusions by tolerating inconsistencies, have been proposed to reason with inconsistent description logic knowledge bases. However, existing paraconsistent approaches are often criticized for being too skeptical. To this end, this paper presents a non-monotonic paraconsistent version of description logic reasoning, called minimally inconsistent reasoning, where inconsistencies tolerated in the reasoning are minimized so that more reasonable conclusions can be inferred. Some desirable properties are studied, which shows that the new semantics inherits advantages of both non-monotonic reasoning and paraconsistent reasoning. A complete and sound tableau-based algorithm, called multi-valued tableaux, is developed to capture the minimally inconsistent reasoning. In fact, the tableaux algorithm is designed, as a framework for multi-valued DL, to allow for different underlying paraconsistent semantics, with the mere difference in the clash conditions. Finally, the complexity of minimally inconsistent description logic reasoning is shown on the same level as the (classical) description logic reasoning.

  4. Minimal Guidelines for Authors of Web Pages.

    ERIC Educational Resources Information Center

    ADE Bulletin, 2002

    2002-01-01

    Presents guidelines that recommend the minimal reference information that should be provided on Web pages intended for use by students, teachers, and scholars in the modern languages. Suggests the inclusion of information about responsible parties, copyright declaration, privacy statements, and site information. Makes a note on Web page style. (SG)

  5. DUPONT CHAMBERS WORKS WASTE MINIMIZATION PROJECT

    EPA Science Inventory

    In a joint U.S. Environmental Protection Agency (EPA) and DuPont waste minimization project, fifteen waste streams were-selected for assessment. The intent was to develop assessments diverse in terms of process type, mode of operation, waste type, disposal needed, and relative s...

  6. Minimal theory of quasidilaton massive gravity

    NASA Astrophysics Data System (ADS)

    De Felice, Antonio; Mukohyama, Shinji; Oliosi, Michele

    2017-07-01

    We introduce a quasidilaton scalar field to the minimal theory of massive gravity with the Minkowski fiducial metric, in such a way that the quasidilaton global symmetry is maintained and that the theory admits a stable self-accelerating de Sitter solution. We start with a precursor theory that contains three propagating gravitational degrees of freedom without a quasidilaton scalar and introduce Stückelberg fields to covariantize its action. This makes it possible for us to formulate the quasidilaton global symmetry that mixes the Stückelberg fields and the quasidilaton scalar field. By the Hamiltonian analysis we confirm that the precursor theory with the quasidilaton scalar contains 4 degrees of freedom, three from the precursor massive gravity and one from the quasidilaton scalar. We further remove one propagating degree of freedom to construct the minimal quasidilaton theory with three propagating degrees of freedom, corresponding to two polarizations of gravitational waves from the minimal theory of massive gravity and one scalar from the quasidilaton field, by carefully introducing two additional constraints to the system in the Hamiltonian language. Switching to the Lagrangian language, we find self-accelerating de Sitter solutions in the minimal quasidilaton theory and analyze their stability. It is found that the self-accelerating de Sitter solution is stable in a wide range of parameters.

  7. Minimal Mimicry: Mere Effector Matching Induces Preference

    ERIC Educational Resources Information Center

    Sparenberg, Peggy; Topolinski, Sascha; Springer, Anne; Prinz, Wolfgang

    2012-01-01

    Both mimicking and being mimicked induces preference for a target. The present experiments investigate the minimal sufficient conditions for this mimicry-preference link to occur. We argue that mere effector matching between one's own and the other person's movement is sufficient to induce preference, independent of which movement is actually…

  8. Kundt spacetimes minimally coupled to scalar field

    NASA Astrophysics Data System (ADS)

    Tahamtan, T.; Svítek, O.

    2017-06-01

    We derive an exact solution belonging to the Kundt class of spacetimes both with and without a cosmological constant that are minimally coupled to a free massless scalar field. We show the algebraic type of these solutions and give interpretation of the results. Subsequently, we look for solutions additionally containing an electromagnetic field satisfying nonlinear field equations.

  9. New Diagnostic Terminology for Minimal Brain Dysfunction.

    ERIC Educational Resources Information Center

    Shaywitz, Bennett A.; And Others

    1979-01-01

    Minimal brain dysfunction has been redefined by the American Psychological Association as attention deficit disorder (ADD) and subdivided into categories with and without hyperactivity. The revised 'Diagnostic and Statistical Manual' (DSM III) is now undergoing field trials. Journal Availability: C. V. Mosby Company, 11830 Westline Industrial…

  10. The Biochemical Basis of Minimal Brain Dysfunction

    ERIC Educational Resources Information Center

    Shaywitz, Sally E.; And Others

    1978-01-01

    Available from: C. V. Mosby Company 11830 Westline Industrial Drive St. Louis, Missouri 63141 The research review examines evidence suggesting a biochemical basis for minimal brain dysfunction (MBD), which includes both a relationship between MBD and metabolic abnormalities and a significant genetic influence on the disorder in children. (IM)

  11. Botulinum toxin to minimize facial scarring.

    PubMed

    Jablonka, Eric M; Sherris, David A; Gassner, Holger G

    2012-10-01

    Chemoimmobilization with botulinum toxin A is an ideal biochemical agent that allows near-total elimination of muscle pull on the healing facial wound. The goal of chemoimmobilization of facial cutaneous wounds is to eliminate dynamic tension on the healing tissues to improve wound healing and minimize scarring for optimal aesthetic results.

  12. Probabilistic inspection strategies for minimizing service failures

    NASA Astrophysics Data System (ADS)

    Brot, Abraham

    1994-09-01

    The INSIM computer program is described which simulates the 'limited fatigue life' environment in which aircraft structures generally operate. The use of INSIM to develop inspection strategies which aim to minimize service failures is demonstrated. Damage-tolerance methodology, inspection thresholds and customized inspections are simulated using the probability of failure as the driving parameter.

  13. Mixed waste minimization/mixed waste avoidance

    SciTech Connect

    Todisco, L.R.

    1994-12-31

    This presentation describes methods for the minimization and volume reduction of low-level radioactive and mixed wastes. Many methods are presented including: source reduction, better waste monitoring activities, waste segregation, recycling, administrative controls, and optimization of waste-generating processes.

  14. Minimally Invasive Mitral Valve Surgery III

    PubMed Central

    Lehr, Eric J.; Guy, T. Sloane; Smith, Robert L.; Grossi, Eugene A.; Shemin, Richard J.; Rodriguez, Evelio; Ailawadi, Gorav; Agnihotri, Arvind K.; Fayers, Trevor M.; Hargrove, W. Clark; Hummel, Brian W.; Khan, Junaid H.; Malaisrie, S. Chris; Mehall, John R.; Murphy, Douglas A.; Ryan, William H.; Salemi, Arash; Segurola, Romualdo J.; Smith, J. Michael; Wolfe, J. Alan; Weldner, Paul W.; Barnhart, Glenn R.; Goldman, Scott M.; Lewis, Clifton T. P.

    2016-01-01

    Abstract Minimally invasive mitral valve operations are increasingly common in the United States, but robotic-assisted approaches have not been widely adopted for a variety of reasons. This expert opinion reviews the state of the art and defines best practices, training, and techniques for developing a successful robotics program. PMID:27662478

  15. DUPONT CHAMBERS WORKS WASTE MINIMIZATION PROJECT

    EPA Science Inventory

    In a joint U.S. Environmental Protection Agency (EPA) and DuPont waste minimization project, fifteen waste streams were-selected for assessment. The intent was to develop assessments diverse in terms of process type, mode of operation, waste type, disposal needed, and relative s...

  16. Minimally inconsistent reasoning in Semantic Web

    PubMed Central

    Zhang, Xiaowang

    2017-01-01

    Reasoning with inconsistencies is an important issue for Semantic Web as imperfect information is unavoidable in real applications. For this, different paraconsistent approaches, due to their capacity to draw as nontrivial conclusions by tolerating inconsistencies, have been proposed to reason with inconsistent description logic knowledge bases. However, existing paraconsistent approaches are often criticized for being too skeptical. To this end, this paper presents a non-monotonic paraconsistent version of description logic reasoning, called minimally inconsistent reasoning, where inconsistencies tolerated in the reasoning are minimized so that more reasonable conclusions can be inferred. Some desirable properties are studied, which shows that the new semantics inherits advantages of both non-monotonic reasoning and paraconsistent reasoning. A complete and sound tableau-based algorithm, called multi-valued tableaux, is developed to capture the minimally inconsistent reasoning. In fact, the tableaux algorithm is designed, as a framework for multi-valued DL, to allow for different underlying paraconsistent semantics, with the mere difference in the clash conditions. Finally, the complexity of minimally inconsistent description logic reasoning is shown on the same level as the (classical) description logic reasoning. PMID:28750030

  17. MULTIOBJECTIVE PARALLEL GENETIC ALGORITHM FOR WASTE MINIMIZATION

    EPA Science Inventory

    In this research we have developed an efficient multiobjective parallel genetic algorithm (MOPGA) for waste minimization problems. This MOPGA integrates PGAPack (Levine, 1996) and NSGA-II (Deb, 2000) with novel modifications. PGAPack is a master-slave parallel implementation of a...

  18. Banach spaces that realize minimal fillings

    SciTech Connect

    Bednov, B. B.; Borodin, P. A. E-mail: pborodin@inbox.ru

    2014-04-30

    It is proved that a real Banach space realizes minimal fillings for all its finite subsets (a shortest network spanning a fixed finite subset always exists and has the minimum possible length) if and only if it is a predual of L{sub 1}. The spaces L{sub 1} are characterized in terms of Steiner points (medians). Bibliography: 25 titles. (paper)

  19. Banach spaces that realize minimal fillings

    NASA Astrophysics Data System (ADS)

    Bednov, B. B.; Borodin, P. A.

    2014-04-01

    It is proved that a real Banach space realizes minimal fillings for all its finite subsets (a shortest network spanning a fixed finite subset always exists and has the minimum possible length) if and only if it is a predual of L_1. The spaces L_1 are characterized in terms of Steiner points (medians). Bibliography: 25 titles.

  20. MULTIOBJECTIVE PARALLEL GENETIC ALGORITHM FOR WASTE MINIMIZATION

    EPA Science Inventory

    In this research we have developed an efficient multiobjective parallel genetic algorithm (MOPGA) for waste minimization problems. This MOPGA integrates PGAPack (Levine, 1996) and NSGA-II (Deb, 2000) with novel modifications. PGAPack is a master-slave parallel implementation of a...

  1. Minimal Mimicry: Mere Effector Matching Induces Preference

    ERIC Educational Resources Information Center

    Sparenberg, Peggy; Topolinski, Sascha; Springer, Anne; Prinz, Wolfgang

    2012-01-01

    Both mimicking and being mimicked induces preference for a target. The present experiments investigate the minimal sufficient conditions for this mimicry-preference link to occur. We argue that mere effector matching between one's own and the other person's movement is sufficient to induce preference, independent of which movement is actually…

  2. Minimal Brain Dysfunction: Associations with Perinatal Complications.

    ERIC Educational Resources Information Center

    Nichols, Paul L.

    Examined with over 28,000 7-year-old children whose mothers registered for prenatal care was the relationship between perinatal complications and such characteristics as poor school achievement, hyperactivity, and neurological soft signs associated with the diagnosis of minimal brain dysfunction (MBD). Ten perinatal antecedents were studied:…

  3. Challenging the minimal supersymmetric SU(5) model

    SciTech Connect

    Bajc, Borut; Lavignac, Stéphane; Mede, Timon

    2014-06-24

    We review the main constraints on the parameter space of the minimal renormalizable supersymmetric SU(5) grand unified theory. They consist of the Higgs mass, proton decay, electroweak symmetry breaking and fermion masses. Superpartner masses are constrained both from below and from above, giving hope for confirming or definitely ruling out the theory in the future. This contribution is based on Ref. [1].

  4. On minimal energy dipole moment distributions in regular polygonal agglomerates

    NASA Astrophysics Data System (ADS)

    Rosa, Adriano Possebon; Cunha, Francisco Ricardo; Ceniceros, Hector Daniel

    2017-01-01

    Static, regular polygonal and close-packed clusters of spherical magnetic particles and their energy-minimizing magnetic moments are investigated in a two-dimensional setting. This study focuses on a simple particle system which is solely described by the dipole-dipole interaction energy, both without and in the presence of an in-plane magnetic field. For a regular polygonal structure of n sides with n ≥ 3 , and in the absence of an external field, it is proved rigorously that the magnetic moments given by the roots of unity, i.e. tangential to the polygon, are a minimizer of the dipole-dipole interaction energy. Also, for zero external field, new multiple local minima are discovered for the regular polygonal agglomerates. The number of found local extrema is proportional to [ n / 2 ] and these critical points are characterized by the presence of a pair of magnetic moments with a large deviation from the tangential configuration and whose particles are at least three diameters apart. The changes induced by an in-plane external magnetic field on the minimal energy, tangential configurations are investigated numerically. The two critical fields, which correspond to a crossover with the linear chain minimal energy and with the break-up of the agglomerate, respectively are examined in detail. In particular, the numerical results are compared directly with the asymptotic formulas of Danilov et al. (2012) [23] and a remarkable agreement is found even for moderate to large fields. Finally, three examples of close-packed structures are investigated: a triangle, a centered hexagon, and a 19-particle close packed cluster. The numerical study reveals novel, illuminating characteristics of these compact clusters often seen in ferrofluids. The centered hexagon is energetically favorable to the regular hexagon and the minimal energy for the larger 19-particle cluster is even lower than that of the close packed hexagon. In addition, this larger close packed agglomerate has two

  5. Waste minimization applications at a remediation site

    SciTech Connect

    Allmon, L.A.

    1995-01-23

    The Fernald Environmental Management Project (FEMP) owned by the Department of Energy was used for the processing of uranium. In 1989 Fernald suspended production of uranium metals and was placed on the National Priorities List (NPL). The site`s mission has changed from one of production to environmental restoration. Many groups necessary for producing a product were deemed irrelevant for remediation work, including Waste Minimization. Waste Minimization does not readily appear to be applicable to remediation work. Environmental remediation is designed to correct adverse impacts to the environment from past operations and generates significant amounts of waste requiring management. The premise of pollution prevention is to avoid waste generation, thus remediation is in direct conflict with this premise. Although greater amounts of waste will be generated during environmental remediation, treatment capacities are not always available and disposal is becoming more difficult and costly. This creates the need for pollution prevention and waste minimization. Applying waste minimization principles at a remediation site is an enormous challenge. If the remediation site is also radiologically contaminated it is even a bigger challenge. Innovative techniques and ideas must be utilized to achieve reductions in the amount of waste that must be managed or dispositioned. At Fernald the waste minimization paradigm was shifted from focusing efforts on source reduction to focusing efforts on recycle/reuse by inverting the EPA waste management hierarchy. A fundamental difference at remediation sites is that source reduction has limited applicability to legacy wastes but can be applied successfully on secondary waste generation. The bulk of measurable waste reduction will be achieved by the recycle/reuse of primary wastes and by segregation and decontamination of secondary wastestreams. Each effort must be measured in terms of being economically and ecologically beneficial.

  6. Waste minimization in environmental sampling and analysis

    SciTech Connect

    Brice, D.A.; Nixon, J. . Fernald Environmental Management Project); Lewis, E.T. )

    1992-01-01

    Environmental investigations of the extent and effect of contamination, and projects to remediate such contamination, are designed to mitigate perceived threats to human health and the environment. During the course of these investigations, excavations, borings, and monitoring wells are constructed: monitoring wells are developed and purged prior to sampling; samples are collected; equipment is decontaminated; constituents extracted and analyzed; and personal protective equipment is used to keep workers safe. All of these activities generate waste. A large portion of this waste may be classified as hazardous based on characteristics or constituent components. Waste minimization is defined as reducing the volume and/or toxicity of waste generated by a process. Waste minimization has proven to be an effective means of cost reduction and improving worker health, safety, and environmental awareness in the industrial workplace through pollution prevention. Building waste minimization goals into a project during the planning phase is both cost effective and consistent with total quality management principles. Application of waste minimization principles should be an integral part of the planning and conduct of environmental investigations. Current regulatory guidance on planning environmental investigations focuses on data quality and risk assessment objectives. Waste minimization should also be a scoping priority, along with meeting worker protection requirements, protection of human health and the environment, and achieving data quality objectives. Waste volume or toxicity can be reduced through the use of smaller sample sizes, less toxic extraction solvents, less hazardous decontamination materials, smaller excavations and borings, smaller diameter monitoring wells, dedicated sampling equipment, well-fitting personal protective equipment, judicious use of screening technologies, and analyzing only for parameters of concern.

  7. Waste minimization in environmental sampling and analysis

    SciTech Connect

    Brice, D.A.; Nixon, J.; Lewis, E.T.

    1992-03-01

    Environmental investigations of the extent and effect of contamination, and projects to remediate such contamination, are designed to mitigate perceived threats to human health and the environment. During the course of these investigations, excavations, borings, and monitoring wells are constructed: monitoring wells are developed and purged prior to sampling; samples are collected; equipment is decontaminated; constituents extracted and analyzed; and personal protective equipment is used to keep workers safe. All of these activities generate waste. A large portion of this waste may be classified as hazardous based on characteristics or constituent components. Waste minimization is defined as reducing the volume and/or toxicity of waste generated by a process. Waste minimization has proven to be an effective means of cost reduction and improving worker health, safety, and environmental awareness in the industrial workplace through pollution prevention. Building waste minimization goals into a project during the planning phase is both cost effective and consistent with total quality management principles. Application of waste minimization principles should be an integral part of the planning and conduct of environmental investigations. Current regulatory guidance on planning environmental investigations focuses on data quality and risk assessment objectives. Waste minimization should also be a scoping priority, along with meeting worker protection requirements, protection of human health and the environment, and achieving data quality objectives. Waste volume or toxicity can be reduced through the use of smaller sample sizes, less toxic extraction solvents, less hazardous decontamination materials, smaller excavations and borings, smaller diameter monitoring wells, dedicated sampling equipment, well-fitting personal protective equipment, judicious use of screening technologies, and analyzing only for parameters of concern.

  8. How do we assign punishment? The impact of minimal and maximal standards on the evaluation of deviants.

    PubMed

    Kessler, Thomas; Neumann, Jörg; Mummendey, Amélie; Berthold, Anne; Schubert, Thomas; Waldzus, Sven

    2010-09-01

    To explain the determinants of negative behavior toward deviants (e.g., punishment), this article examines how people evaluate others on the basis of two types of standards: minimal and maximal. Minimal standards focus on an absolute cutoff point for appropriate behavior; accordingly, the evaluation of others varies dichotomously between acceptable or unacceptable. Maximal standards focus on the degree of deviation from that standard; accordingly, the evaluation of others varies gradually from positive to less positive. This framework leads to the prediction that violation of minimal standards should elicit punishment regardless of the degree of deviation, whereas punishment in response to violations of maximal standards should depend on the degree of deviation. Four studies assessed or manipulated the type of standard and degree of deviation displayed by a target. Results consistently showed the expected interaction between type of standard (minimal and maximal) and degree of deviation on punishment behavior.

  9. Representations in Dynamical Embodied Agents: Re-Analyzing a Minimally Cognitive Model Agent

    ERIC Educational Resources Information Center

    Mirolli, Marco

    2012-01-01

    Understanding the role of "representations" in cognitive science is a fundamental problem facing the emerging framework of embodied, situated, dynamical cognition. To make progress, I follow the approach proposed by an influential representational skeptic, Randall Beer: building artificial agents capable of minimally cognitive behaviors and…

  10. How Minimal Grade Goals and Self-Control Capacity Interact in Predicting Test Grades

    ERIC Educational Resources Information Center

    Bertrams, Alex

    2012-01-01

    The present research examined the prediction of school students' grades in an upcoming math test via their minimal grade goals (i.e., the minimum grade in an upcoming test one would be satisfied with). Due to its significance for initiating and maintaining goal-directed behavior, self-control capacity was expected to moderate the relation between…

  11. Rapid brain responses independently predict gain maximization and loss minimization during economic decision making.

    PubMed

    San Martín, René; Appelbaum, Lawrence G; Pearson, John M; Huettel, Scott A; Woldorff, Marty G

    2013-04-17

    Success in many decision-making scenarios depends on the ability to maximize gains and minimize losses. Even if an agent knows which cues lead to gains and which lead to losses, that agent could still make choices yielding suboptimal rewards. Here, by analyzing event-related potentials (ERPs) recorded in humans during a probabilistic gambling task, we show that individuals' behavioral tendencies to maximize gains and to minimize losses are associated with their ERP responses to the receipt of those gains and losses, respectively. We focused our analyses on ERP signals that predict behavioral adjustment: the frontocentral feedback-related negativity (FRN) and two P300 (P3) subcomponents, the frontocentral P3a and the parietal P3b. We found that, across participants, gain maximization was predicted by differences in amplitude of the P3b for suboptimal versus optimal gains (i.e., P3b amplitude difference between the least good and the best gains). Conversely, loss minimization was predicted by differences in the P3b amplitude to suboptimal versus optimal losses (i.e., difference between the worst and the least bad losses). Finally, we observed that the P3a and P3b, but not the FRN, predicted behavioral adjustment on subsequent trials, suggesting a specific adaptive mechanism by which prior experience may alter ensuing behavior. These findings indicate that individual differences in gain maximization and loss minimization are linked to individual differences in rapid neural responses to monetary outcomes.

  12. Representations in Dynamical Embodied Agents: Re-Analyzing a Minimally Cognitive Model Agent

    ERIC Educational Resources Information Center

    Mirolli, Marco

    2012-01-01

    Understanding the role of "representations" in cognitive science is a fundamental problem facing the emerging framework of embodied, situated, dynamical cognition. To make progress, I follow the approach proposed by an influential representational skeptic, Randall Beer: building artificial agents capable of minimally cognitive behaviors and…

  13. Minimally Verbal School-Aged Children with Autism: Communication, Academic Engagement and Classroom Quality

    ERIC Educational Resources Information Center

    Krueger, Kathryne Kelley

    2013-01-01

    Minimally verbal school aged children with autism (MVSACwA) receive the bulk of their behavioral and academic support in schools yet we know little about the environments to which they are exposed. This population of children has often been excluded from studies and thus, underrepresented in current data on autism. As increasing numbers of…

  14. How Minimal Grade Goals and Self-Control Capacity Interact in Predicting Test Grades

    ERIC Educational Resources Information Center

    Bertrams, Alex

    2012-01-01

    The present research examined the prediction of school students' grades in an upcoming math test via their minimal grade goals (i.e., the minimum grade in an upcoming test one would be satisfied with). Due to its significance for initiating and maintaining goal-directed behavior, self-control capacity was expected to moderate the relation between…

  15. Learning weighted metrics to minimize nearest-neighbor classification error.

    PubMed

    Paredes, Roberto; Vidal, Enrique

    2006-07-01

    In order to optimize the accuracy of the Nearest-Neighbor classification rule, a weighted distance is proposed, along with algorithms to automatically learn the corresponding weights. These weights may be specific for each class and feature, for each individual prototype, or for both. The learning algorithms are derived by (approximately) minimizing the Leaving-One-Out classification error of the given training set. The proposed approach is assessed through a series of experiments with UCI/STATLOG corpora, as well as with a more specific task of text classification which entails very sparse data representation and huge dimensionality. In all these experiments, the proposed approach shows a uniformly good behavior, with results comparable to or better than state-of-the-art results published with the same data so far.

  16. The problems of the minimal surface and minimal lineal measure in three dimensions

    SciTech Connect

    Christensen, R.M.

    1994-02-01

    A solution is given to the classical problem of the minimal surface in three dimensions formed from a repeating cell microstructure under isotropic conditions. The solution is found through a global/local minimization procedure and the resulting basic cell is composed of 14 faces. At the junctions where the intersections between faces meet at a point, half of the junctions involve 4 intersections and half involve 3 intersections. The same general solution also applies tot he related minimal lineal measure problem where the measure is that of the length of the intersections connecting the junctions. Some implications and applications for materials science are given.

  17. Live minimal path for interactive segmentation of medical images

    NASA Astrophysics Data System (ADS)

    Chartrand, Gabriel; Tang, An; Chav, Ramnada; Cresson, Thierry; Chantrel, Steeve; De Guise, Jacques A.

    2015-03-01

    Medical image segmentation is nowadays required for medical device development and in a growing number of clinical and research applications. Since dedicated automatic segmentation methods are not always available, generic and efficient interactive tools can alleviate the burden of manual segmentation. In this paper we propose an interactive segmentation tool based on image warping and minimal path segmentation that is efficient for a wide variety of segmentation tasks. While the user roughly delineates the desired organs boundary, a narrow band along the cursors path is straightened, providing an ideal subspace for feature aligned filtering and minimal path algorithm. Once the segmentation is performed on the narrow band, the path is warped back onto the original image, precisely delineating the desired structure. This tool was found to have a highly intuitive dynamic behavior. It is especially efficient against misleading edges and required only coarse interaction from the user to achieve good precision. The proposed segmentation method was tested for 10 difficult liver segmentations on CT and MRI images, and the resulting 2D overlap Dice coefficient was 99% on average..

  18. Local empathy provides global minimization of congestion in communication networks

    NASA Astrophysics Data System (ADS)

    Meloni, Sandro; Gómez-Gardeñes, Jesús

    2010-11-01

    We present a mechanism to avoid congestion in complex networks based on a local knowledge of traffic conditions and the ability of routers to self-coordinate their dynamical behavior. In particular, routers make use of local information about traffic conditions to either reject or accept information packets from their neighbors. We show that when nodes are only aware of their own congestion state they self-organize into a hierarchical configuration that delays remarkably the onset of congestion although leading to a sharp first-order-like congestion transition. We also consider the case when nodes are aware of the congestion state of their neighbors. In this case, we show that empathy between nodes is strongly beneficial to the overall performance of the system and it is possible to achieve larger values for the critical load together with a smooth, second-order-like, transition. Finally, we show how local empathy minimize the impact of congestion as much as global minimization. Therefore, here we present an outstanding example of how local dynamical rules can optimize the system’s functioning up to the levels reached using global knowledge.

  19. Minimal model for collective kinetochore–microtubule dynamics

    PubMed Central

    Banigan, Edward J.; Chiou, Kevin K.; Ballister, Edward R.; Mayo, Alyssa M.; Lampson, Michael A.; Liu, Andrea J.

    2015-01-01

    Chromosome segregation during cell division depends on interactions of kinetochores with dynamic microtubules (MTs). In many eukaryotes, each kinetochore binds multiple MTs, but the collective behavior of these coupled MTs is not well understood. We present a minimal model for collective kinetochore–MT dynamics, based on in vitro measurements of individual MTs and their dependence on force and kinetochore phosphorylation by Aurora B kinase. For a system of multiple MTs connected to the same kinetochore, the force–velocity relation has a bistable regime with two possible steady-state velocities: rapid shortening or slow growth. Bistability, combined with the difference between the growing and shrinking speeds, leads to center-of-mass and breathing oscillations in bioriented sister kinetochore pairs. Kinetochore phosphorylation shifts the bistable region to higher tensions, so that only the rapidly shortening state is stable at low tension. Thus, phosphorylation leads to error correction for kinetochores that are not under tension. We challenged the model with new experiments, using chemically induced dimerization to enhance Aurora B activity at metaphase kinetochores. The model suggests that the experimentally observed disordering of the metaphase plate occurs because phosphorylation increases kinetochore speeds by biasing MTs to shrink. Our minimal model qualitatively captures certain characteristic features of kinetochore dynamics, illustrates how biochemical signals such as phosphorylation may regulate the dynamics, and provides a theoretical framework for understanding other factors that control the dynamics in vivo. PMID:26417109

  20. Local empathy provides global minimization of congestion in communication networks.

    PubMed

    Meloni, Sandro; Gómez-Gardeñes, Jesús

    2010-11-01

    We present a mechanism to avoid congestion in complex networks based on a local knowledge of traffic conditions and the ability of routers to self-coordinate their dynamical behavior. In particular, routers make use of local information about traffic conditions to either reject or accept information packets from their neighbors. We show that when nodes are only aware of their own congestion state they self-organize into a hierarchical configuration that delays remarkably the onset of congestion although leading to a sharp first-order-like congestion transition. We also consider the case when nodes are aware of the congestion state of their neighbors. In this case, we show that empathy between nodes is strongly beneficial to the overall performance of the system and it is possible to achieve larger values for the critical load together with a smooth, second-order-like, transition. Finally, we show how local empathy minimize the impact of congestion as much as global minimization. Therefore, here we present an outstanding example of how local dynamical rules can optimize the system's functioning up to the levels reached using global knowledge.

  1. Advances in minimally invasive neonatal colorectal surgery

    PubMed Central

    Bandi, Ashwath S; Bradshaw, Catherine J; Giuliani, Stefano

    2016-01-01

    Over the last two decades, advances in laparoscopic surgery and minimally invasive techniques have transformed the operative management of neonatal colorectal surgery for conditions such as anorectal malformations (ARMs) and Hirschsprung’s disease. Evolution of surgical care has mainly occurred due to the use of laparoscopy, as opposed to a laparotomy, for intra-abdominal procedures and the development of trans-anal techniques. This review describes these advances and outlines the main minimally invasive techniques currently used for management of ARMs and Hirschsprung’s disease. There does still remain significant variation in the procedures used and this review aims to report the current literature comparing techniques with an emphasis on the short- and long-term clinical outcomes. PMID:27830038

  2. Advances in minimally invasive neonatal colorectal surgery.

    PubMed

    Bandi, Ashwath S; Bradshaw, Catherine J; Giuliani, Stefano

    2016-10-27

    Over the last two decades, advances in laparoscopic surgery and minimally invasive techniques have transformed the operative management of neonatal colorectal surgery for conditions such as anorectal malformations (ARMs) and Hirschsprung's disease. Evolution of surgical care has mainly occurred due to the use of laparoscopy, as opposed to a laparotomy, for intra-abdominal procedures and the development of trans-anal techniques. This review describes these advances and outlines the main minimally invasive techniques currently used for management of ARMs and Hirschsprung's disease. There does still remain significant variation in the procedures used and this review aims to report the current literature comparing techniques with an emphasis on the short- and long-term clinical outcomes.

  3. Mirror glasses for minimally invasive surgery.

    PubMed

    Ishikawa, Norihiko; Sun, You Su; Nifong, L Wiley; Oda, Makoto; Ohta, Yasuhiko; Watanabe, Go; Chitwood, W Randolph

    2007-07-01

    The operator performing minimally invasive surgery is prevented from seeing the whole field with both eyes by the restricted small thoracotomy incision. To overcome this problem, we developed mirror glasses. Use of these glasses was evaluated in terms of the time required for threading of sutures with endoscopic forceps. Three surgeon ligated thread a suture five times with and without use of the glasses in the box, and the mean time was calculated for each surgeon. The time required for ligation (mean +/- SD) was 24.2 +/- 2.9 s with mirror glasses and 27.0 +/- 2.5 s without the glasses (p = 0.01). The mirror glasses may be found useful for fine manipulation for minimally invasive surgery.

  4. [Minimally invasive operations in vascular surgery].

    PubMed

    Stádler, Petr; Sedivý, Petr; Dvorácek, Libor; Slais, Marek; Vitásek, Petr; El Samman, Khaled; Matous, Pavel

    2011-01-01

    Minimally invasive surgery provides an attractive alternative compared with conventional surgical approaches and is popular with patients, particularly because of its favourable cosmetic results. Vascular surgery has taken its inspiration from general surgery and, over the past few years, has also been reducing the invasiveness of its operating methods. In addition to traditional laparoscopic techniques, we most frequently encounter the endovascular treatment of aneurysms of the thoracic and abdominal aorta and, most recently, robot-assisted surgery in the area of the abdominal aorta and pelvic arteries. Minimally invasive surgical interventions also have other advantages, including less operative trauma, a reduction in post-operative pain, shorter periods spent in the intensive care unit and overall hospitalization times, an earlier return to normal life and, finally, a reduction in total treatment costs.

  5. Minimally Disruptive Medicine for Patients with Diabetes.

    PubMed

    Serrano, Valentina; Spencer-Bonilla, Gabriela; Boehmer, Kasey R; Montori, Victor M

    2017-09-23

    Patients with diabetes must deal with the burden of symptoms and complications (burden of illness). Simultaneously, diabetes care demands practical and emotional work from patients and their families, work to access and use healthcare and to enact self-care (burden of treatment). Patient work must compete with the demands of family, job, and community life. Overwhelmed patients may not have the capacity to access care or enact self-care and will thus experience suboptimal diabetes outcomes. Minimally disruptive medicine (MDM) is a patient-centered approach to healthcare that prioritizes patients' goals for life and health while minimizing the healthcare disruption on patients' lives. In patients with diabetes, particularly in those with complex lives and multimorbidity, MDM coordinates healthcare and community responses to improve outcomes, reduce treatment burden, and enable patients to pursue their life's hopes and dreams.

  6. A perturbation technique for shield weight minimization

    SciTech Connect

    Watkins, E.F.; Greenspan, E. )

    1993-01-01

    The radiation shield optimization code SWAN (Ref. 1) was originally developed for minimizing the thickness of a shield that will meet a given dose (or another) constraint or for extremizing a performance parameter of interest (e.g., maximizing energy multiplication or minimizing dose) while maintaining the shield volume constraint. The SWAN optimization process proved to be highly effective (e.g., see Refs. 2, 3, and 4). The purpose of this work is to investigate the applicability of the SWAN methodology to problems in which the weight rather than the volume is the relevant shield characteristic. Such problems are encountered in shield design for space nuclear power systems. The investigation is carried out using SWAN with the coupled neutron-photon cross-section library FLUNG (Ref. 5).

  7. Topological minimally entangled states via geometric measure

    NASA Astrophysics Data System (ADS)

    Buerschaper, Oliver; García-Saez, Artur; Orús, Román; Wei, Tzu-Chieh

    2014-11-01

    Here we show how the Minimally Entangled States (MES) of a 2d system with topological order can be identified using the geometric measure of entanglement. We show this by minimizing this measure for the doubled semion, doubled Fibonacci and toric code models on a torus with non-trivial topological partitions. Our calculations are done either quasi-exactly for small system sizes, or using the tensor network approach in Orús et al (arXiv:1406.0585) for large sizes. As a byproduct of our methods, we see that the minimisation of the geometric entanglement can also determine the number of Abelian quasiparticle excitations in a given model. The results in this paper provide a very efficient and accurate way of extracting the full topological information of a 2d quantum lattice model from the multipartite entanglement structure of its ground states.

  8. Minimal Left-Right Symmetric Dark Matter.

    PubMed

    Heeck, Julian; Patra, Sudhanwa

    2015-09-18

    We show that left-right symmetric models can easily accommodate stable TeV-scale dark matter particles without the need for an ad hoc stabilizing symmetry. The stability of a newly introduced multiplet either arises accidentally as in the minimal dark matter framework or comes courtesy of the remaining unbroken Z_{2} subgroup of B-L. Only one new parameter is introduced: the mass of the new multiplet. As minimal examples, we study left-right fermion triplets and quintuplets and show that they can form viable two-component dark matter. This approach is, in particular, valid for SU(2)×SU(2)×U(1) models that explain the recent diboson excess at ATLAS in terms of a new charged gauge boson of mass 2 TeV.

  9. Activity recognition from minimal distinguishing subsequence mining

    NASA Astrophysics Data System (ADS)

    Iqbal, Mohammad; Pao, Hsing-Kuo

    2017-08-01

    Human activity recognition is one of the most important research topics in the era of Internet of Things. To separate different activities given sensory data, we utilize a Minimal Distinguishing Subsequence (MDS) mining approach to efficiently find distinguishing patterns among different activities. We first transform the sensory data into a series of sensor triggering events and operate the MDS mining procedure afterwards. The gap constraints are also considered in the MDS mining. Given the multi-class nature of most activity recognition tasks, we modify the MDS mining approach from a binary case to a multi-class one to fit the need for multiple activity recognition. We also study how to select the best parameter set including the minimal and the maximal support thresholds in finding the MDSs for effective activity recognition. Overall, the prediction accuracy is 86.59% on the van Kasteren dataset which consists of four different activities for recognition.

  10. The Sense of Commitment: A Minimal Approach

    PubMed Central

    Michael, John; Sebanz, Natalie; Knoblich, Günther

    2016-01-01

    This paper provides a starting point for psychological research on the sense of commitment within the context of joint action. We begin by formulating three desiderata: to illuminate the motivational factors that lead agents to feel and act committed, to pick out the cognitive processes and situational factors that lead agents to sense that implicit commitments are in place, and to illuminate the development of an understanding of commitment in ontogeny. In order to satisfy these three desiderata, we propose a minimal framework, the core of which is an analysis of the minimal structure of situations which can elicit a sense of commitment. We then propose a way of conceptualizing and operationalizing the sense of commitment, and discuss cognitive and motivational processes which may underpin the sense of commitment. PMID:26779080

  11. The method of minimal normal forms

    SciTech Connect

    Mane, S.R.; Weng, W.T.

    1992-01-01

    Normal form methods for solving nonlinear differential equations are reviewed and the comparative merits of three methods are evaluated. The concept of the minimal normal form is explained and is shown to be superior to other choices. The method is then extended to apply to the evaluation of discrete maps of an accelerator or storage ring. Such an extension, as suggested in this paper, is more suited for accelerator-based applications than a formulation utilizing continuous differential equations. A computer code has been generated to systematically implement various normal form formulations for maps in two-dimensional phase space. Specific examples of quadratic and cubic nonlinear fields were used and solved by the method developed. The minimal normal form method shown here gives good results using relatively low order expansions.

  12. The method of minimal normal forms

    SciTech Connect

    Mane, S.R.; Weng, W.T.

    1992-12-31

    Normal form methods for solving nonlinear differential equations are reviewed and the comparative merits of three methods are evaluated. The concept of the minimal normal form is explained and is shown to be superior to other choices. The method is then extended to apply to the evaluation of discrete maps of an accelerator or storage ring. Such an extension, as suggested in this paper, is more suited for accelerator-based applications than a formulation utilizing continuous differential equations. A computer code has been generated to systematically implement various normal form formulations for maps in two-dimensional phase space. Specific examples of quadratic and cubic nonlinear fields were used and solved by the method developed. The minimal normal form method shown here gives good results using relatively low order expansions.

  13. The Minimal Supersymmetric Fat Higgs Model

    SciTech Connect

    Harnik, Roni; Kribs, Graham D.; Larson, Daniel T.; Murayama, Hitoshi

    2003-11-26

    We present a calculable supersymmetric theory of a composite"fat'" Higgs boson. Electroweak symmetry is broken dynamically through a new gauge interaction that becomes strong at an intermediate scale. The Higgs mass can easily be 200-450 GeV along with the superpartner masses, solving the supersymmetric little hierarchy problem. We explicitly verify that the model is consistent with precision electroweak data without fine-tuning. Gauge coupling unification can be maintained despite the inherently strong dynamics involved in electroweak symmetry breaking. Supersymmetrizing the Standard Model therefore does not imply a light Higgs mass, contrary to the lore in the literature. The Higgs sector of the minimal Fat Higgs model has a mass spectrum that is distinctly different from the Minimal Supersymmetric Standard Model.

  14. Minimizing broadband excitation under dissipative conditions

    NASA Astrophysics Data System (ADS)

    Gelman, David; Kosloff, Ronnie

    2005-12-01

    Optimal control theory is employed for the task of minimizing the excited-state population of a dye molecule in solution. The spectrum of the excitation pulse is contained completely in the absorption band of the molecule. Only phase control is studied which is equivalent to optimizing the transmission of the pulse through the medium. The molecular model explicitly includes two electronic states and a single vibrational mode. The other degrees of freedom are classified as bath modes. The surrogate Hamiltonian method is employed to incorporate these bath degrees of freedom. Their influence can be classified as electronic dephasing and vibrational relaxation. In accordance with experimental results, minimal excitation is associated with a negatively chirped pulses. Optimal pulses with more complex transient structure are found to be superior to linearly chirped pulses. The difference is enhanced when the fluence is increased. The improvement degrades when dissipative effects become more dominant.

  15. A Minimal Periods Algorithm with Applications

    NASA Astrophysics Data System (ADS)

    Xu, Zhi

    Kosaraju in "Computation of squares in a string" briefly described a linear-time algorithm for computing the minimal squares starting at each position in a word. Using the same construction of suffix trees, we generalize his result and describe in detail how to compute the minimal α power, with a period of length longer than s, starting at each position in a word w for arbitrary exponent α> 1 and integer s ≥ 0. The algorithm runs in O(α|w|)-time for s = 0 and in O(|w|2)-time otherwise. We provide a complete proof of the correctness and computational complexity of the algorithm. The algorithm can be used to detect certain types of pseudo-patterns in words, which was our original goal in studying this generalization.

  16. Facets of the balanced minimal evolution polytope.

    PubMed

    Forcey, Stefan; Keefe, Logan; Sands, William

    2016-08-01

    The balanced minimal evolution (BME) method of creating phylogenetic trees can be formulated as a linear programming problem, minimizing an inner product over the vertices of the BME polytope. In this paper we undertake the project of describing the facets of this polytope. We classify and identify the combinatorial structure and geometry (facet inequalities) of all the facets in dimensions up to five, and classify even more facets in all dimensions. A full set of facet inequalities would allow a full implementation of the simplex method for finding the BME tree-although there are reasons to think this an unreachable goal. However, our results provide the crucial first steps for a more likely-to-be-successful program: finding efficient relaxations of the BME polytope.

  17. [Invasive and minimally invasive hemodynamic monitoring].

    PubMed

    Hansen, Matthias

    2016-10-01

    Advanced hemodynamic monitoring is necessary for adequate management of high-risk patients or patients with derangement of circulation. Studies demonstrate a benefit of early goal directed therapy in unstable cardiopulmonary situations. In these days we have different possibilities of minimally invasive or invasive hemodynamic monitoring. Minimally invasive measurements like pulse conture analysis or pulse wave analysis being less accurate under some circumstances, however only an artery catheter is needed for cardiac output monitoring. Pulmonary artery, transpulmonary thermodilution and lithium dilution technology have acceptable accuracy in cardiac output measurement. For therapy of unstable circulation there are additionally parameters to obtain. The pulmonary artery catheter is the device with the largest rate of complications, used by a trained crew and with a correct indication, his use is unchained justified.

  18. Commercial radioactive waste minimization program development guidance

    SciTech Connect

    Fischer, D.K.

    1991-01-01

    This document is one of two prepared by the EG&G Idaho, Inc., Waste Management Technical Support Program Group, National Low-Level Waste Management Program Unit. One of several Department of Energy responsibilities stated in the Amendments Act of 1985 is to provide technical assistance to compact regions Host States, and nonmember States (to the extent provided in appropriations acts) in establishing waste minimization program plans. Technical assistance includes, among other things, the development of technical guidelines for volume reduction options. Pursuant to this defined responsibility, the Department of Energy (through EG&G Idaho, Inc.) has prepared this report, which includes guidance on defining a program, State/compact commission participation, and waste minimization program plans.

  19. Commercial radioactive waste minimization program development guidance

    SciTech Connect

    Fischer, D.K.

    1991-01-01

    This document is one of two prepared by the EG G Idaho, Inc., Waste Management Technical Support Program Group, National Low-Level Waste Management Program Unit. One of several Department of Energy responsibilities stated in the Amendments Act of 1985 is to provide technical assistance to compact regions Host States, and nonmember States (to the extent provided in appropriations acts) in establishing waste minimization program plans. Technical assistance includes, among other things, the development of technical guidelines for volume reduction options. Pursuant to this defined responsibility, the Department of Energy (through EG G Idaho, Inc.) has prepared this report, which includes guidance on defining a program, State/compact commission participation, and waste minimization program plans.

  20. Minimally Invasive Surgical Therapies for Atrial Fibrillation

    PubMed Central

    Nakamura, Yoshitsugu; Kiaii, Bob; Chu, Michael W. A.

    2012-01-01

    Atrial fibrillation is the most common sustained arrhythmia and is associated with significant risks of thromboembolism, stroke, congestive heart failure, and death. There have been major advances in the management of atrial fibrillation including pharmacologic therapies, antithrombotic therapies, and ablation techniques. Surgery for atrial fibrillation, including both concomitant and stand-alone interventions, is an effective therapy to restore sinus rhythm. Minimally invasive surgical ablation is an emerging field that aims for the superior results of the traditional Cox-Maze procedure through a less invasive operation with lower morbidity, quicker recovery, and improved patient satisfaction. These novel techniques utilize endoscopic or minithoracotomy approaches with various energy sources to achieve electrical isolation of the pulmonary veins in addition to other ablation lines. We review advancements in minimally invasive techniques for atrial fibrillation surgery, including management of the left atrial appendage. PMID:22666609

  1. Towards synthesis of a minimal cell.

    PubMed

    Forster, Anthony C; Church, George M

    2006-01-01

    Construction of a chemical system capable of replication and evolution, fed only by small molecule nutrients, is now conceivable. This could be achieved by stepwise integration of decades of work on the reconstitution of DNA, RNA and protein syntheses from pure components. Such a minimal cell project would initially define the components sufficient for each subsystem, allow detailed kinetic analyses and lead to improved in vitro methods for synthesis of biopolymers, therapeutics and biosensors. Completion would yield a functionally and structurally understood self-replicating biosystem. Safety concerns for synthetic life will be alleviated by extreme dependence on elaborate laboratory reagents and conditions for viability. Our proposed minimal genome is 113 kbp long and contains 151 genes. We detail building blocks already in place and major hurdles to overcome for completion.

  2. Essential genes of a minimal bacterium.

    PubMed

    Glass, John I; Assad-Garcia, Nacyra; Alperovich, Nina; Yooseph, Shibu; Lewis, Matthew R; Maruf, Mahir; Hutchison, Clyde A; Smith, Hamilton O; Venter, J Craig

    2006-01-10

    Mycoplasma genitalium has the smallest genome of any organism that can be grown in pure culture. It has a minimal metabolism and little genomic redundancy. Consequently, its genome is expected to be a close approximation to the minimal set of genes needed to sustain bacterial life. Using global transposon mutagenesis, we isolated and characterized gene disruption mutants for 100 different nonessential protein-coding genes. None of the 43 RNA-coding genes were disrupted. Herein, we identify 382 of the 482 M. genitalium protein-coding genes as essential, plus five sets of disrupted genes that encode proteins with potentially redundant essential functions, such as phosphate transport. Genes encoding proteins of unknown function constitute 28% of the essential protein-coding genes set. Disruption of some genes accelerated M. genitalium growth.

  3. Essential genes of a minimal bacterium

    PubMed Central

    Glass, John I.; Assad-Garcia, Nacyra; Alperovich, Nina; Yooseph, Shibu; Lewis, Matthew R.; Maruf, Mahir; Hutchison, Clyde A.; Smith, Hamilton O.; Venter, J. Craig

    2006-01-01

    Mycoplasma genitalium has the smallest genome of any organism that can be grown in pure culture. It has a minimal metabolism and little genomic redundancy. Consequently, its genome is expected to be a close approximation to the minimal set of genes needed to sustain bacterial life. Using global transposon mutagenesis, we isolated and characterized gene disruption mutants for 100 different nonessential protein-coding genes. None of the 43 RNA-coding genes were disrupted. Herein, we identify 382 of the 482 M. genitalium protein-coding genes as essential, plus five sets of disrupted genes that encode proteins with potentially redundant essential functions, such as phosphate transport. Genes encoding proteins of unknown function constitute 28% of the essential protein-coding genes set. Disruption of some genes accelerated M. genitalium growth. PMID:16407165

  4. Minimal conformal extensions of the Higgs sector

    NASA Astrophysics Data System (ADS)

    Helmboldt, Alexander J.; Humbert, Pascal; Lindner, Manfred; Smirnov, Juri

    2017-07-01

    In this work we find the minimal extension of the Standard Model's Higgs sector which can lead to a light Higgs boson via radiative symmetry breaking and is consistent with the phenomenological requirements for a low-energy realization of a conformal theory. The model which turns out to be stable under renormalization group translations is an extension of the Standard Model by two scalar fields, one of which acquires a finite vacuum expectation value and therefore mixes into the physical Higgs. We find that the minimal model predicts a sizable amount of mixing which makes it testable at a collider. In addition to the physical Higgs, the theory's scalar spectrum contains one light and one heavy boson. The heavy scalar's properties render it a potential dark matter candidate.

  5. Tall sections from non-minimal transformations

    NASA Astrophysics Data System (ADS)

    Morrison, David R.; Park, Daniel S.

    2016-10-01

    In previous work, we have shown that elliptic fibrations with two sections, or Mordell-Weil rank one, can always be mapped birationally to a Weierstrass model of a certain form, namely, the Jacobian of a P^{112} model. Most constructions of elliptically fibered Calabi-Yau manifolds with two sections have been carried out assuming that the image of this birational map was a "minimal" Weierstrass model. In this paper, we show that for some elliptically fibered Calabi-Yau manifolds with Mordell-Weil rank-one, the Jacobian of the P^{112} model is not minimal. Said another way, starting from a Calabi-Yau Weierstrass model, the total space must be blown up (thereby destroying the "Calabi-Yau" property) in order to embed the model into P^{112} . In particular, we show that the elliptic fibrations studied recently by Klevers and Taylor fall into this class of models.

  6. Cigarette price minimization strategies used by adults.

    PubMed

    Pesko, Michael F; Kruger, Judy; Hyland, Andrew

    2012-09-01

    We used multivariate logistic regressions to analyze data from the 2006 to 2007 Tobacco Use Supplement of the Current Population Survey, a nationally representative sample of adults. We explored use of cigarette price minimization strategies, such as purchasing cartons of cigarettes, purchasing in states with lower after-tax cigarette prices, and purchasing on the Internet. Racial/ethnic minorities and persons with low socioeconomic status used these strategies less frequently at last purchase than did White and high-socioeconomic-status respondents.

  7. Minimal Basis for Gauge Theory Amplitudes

    SciTech Connect

    Bjerrum-Bohr, N. E. J.; Damgaard, Poul H.; Vanhove, Pierre

    2009-10-16

    Identities based on monodromy for integrations in string theory are used to derive relations between different color-ordered tree-level amplitudes in both bosonic and supersymmetric string theory. These relations imply that the color-ordered tree-level n-point gauge theory amplitudes can be expanded in a minimal basis of (n-3)exclamation amplitudes. This result holds for any choice of polarizations of the external states and in any number of dimensions.

  8. Minimally Invasive Diagnosis of Secondary Intracranial Lymphoma

    PubMed Central

    Healy, G. M.; Redmond, C. E.; Stocker, E.; Connaghan, G.; Skehan, S. J.; Killeen, R. P.

    2016-01-01

    Diffuse large B cell lymphomas (DLBCL) are an aggressive group of non-Hodgkin lymphoid malignancies which have diverse presentation and can have high mortality. Central nervous system relapse is rare but has poor survival. We present the diagnosis of primary mandibular DLBCL and a unique minimally invasive diagnosis of secondary intracranial recurrence. This case highlights the manifold radiological contributions to the diagnosis and management of lymphoma. PMID:28018686

  9. Minimally processed vegetable salads: microbial quality evaluation.

    PubMed

    Fröder, Hans; Martins, Cecília Geraldes; De Souza, Katia Leani Oliveira; Landgraf, Mariza; Franco, Bernadette D G M; Destro, Maria Teresa

    2007-05-01

    The increasing demand for fresh fruits and vegetables and for convenience foods is causing an expansion of the market share for minimally processed vegetables. Among the more common pathogenic microorganisms that can be transmitted to humans by these products are Listeria monocytogenes, Escherichia coli O157:H7, and Salmonella. The aim of this study was to evaluate the microbial quality of a selection of minimally processed vegetables. A total of 181 samples of minimally processed leafy salads were collected from retailers in the city of Sao Paulo, Brazil. Counts of total coliforms, fecal coliforms, Enterobacteriaceae, psychrotrophic microorganisms, and Salmonella were conducted for 133 samples. L. monocytogenes was assessed in 181 samples using the BAX System and by plating the enrichment broth onto Palcam and Oxford agars. Suspected Listeria colonies were submitted to classical biochemical tests. Populations of psychrotrophic microorganisms >10(6) CFU/g were found in 51% of the 133 samples, and Enterobacteriaceae populations between 10(5) and 106 CFU/g were found in 42% of the samples. Fecal coliform concentrations higher than 10(2) CFU/g (Brazilian standard) were found in 97 (73%) of the samples, and Salmonella was detected in 4 (3%) of the samples. Two of the Salmonella-positive samples had <10(2) CFU/g concentrations of fecal coliforms. L. monocytogenes was detected in only 1 (0.6%) of the 181 samples examined. This positive sample was simultaneously detected by both methods. The other Listeria species identified by plating were L. welshimeri (one sample of curly lettuce) and L. innocua (2 samples of watercress). The results indicate that minimally processed vegetables had poor microbiological quality, and these products could be a vehicle for pathogens such as Salmonella and L. monocytogenes.

  10. Minimally invasive aesthetic procedures in young adults

    PubMed Central

    Wollina, Uwe; Goldman, Alberto

    2011-01-01

    Age is a significant factor in modifying specific needs when it comes to medical aesthetic procedures. In this review we will focus on young adults in their third decade of life and review minimally invasive aesthetic procedures other than cosmetics and cosmeceuticals. Correction of asymmetries, correction after body modifying procedures, and facial sculpturing are important issues for young adults. The implication of aesthetic medicine as part of preventive medicine is a major ethical challenge that differentiates aesthetic medicine from fashion. PMID:21673871

  11. Heroin-associated anthrax with minimal morbidity.

    PubMed

    Black, Heather; Chapman, Ann; Inverarity, Donald; Sinha, Satyajit

    2017-03-08

    In 2010, during an outbreak of anthrax affecting people who inject drugs, a heroin user aged 37 years presented with soft tissue infection. He subsequently was found to have anthrax. We describe his management and the difficulty in distinguishing anthrax from non-anthrax lesions. His full recovery, despite an overall mortality of 30% for injectional anthrax, demonstrates that some heroin-related anthrax cases can be managed predominately with oral antibiotics and minimal surgical intervention. 2017 BMJ Publishing Group Ltd.

  12. The theory of Minimal Massive Gravity

    NASA Astrophysics Data System (ADS)

    De Felice, Antonio

    2017-08-01

    Here we give a short summary of the the theory of minimal massive gravity. This theory, by construction, possesses only two tensor modes, exactly as in General Relativity. This theory is able to reconcile the original background of dRGT - which was proven to possess a ghost - with a stable homogeneous and isotropic cosmological evolution. The theory is constructed by imposing two constraints in a non-linear, background-independent way. The phenomenology of the theory is also briefly discussed.

  13. Isolated subtalar arthrodesis through minimal incision surgery.

    PubMed

    Carranza-Bencano, A; Tejero-García, S; Del Castillo-Blanco, G; Fernández-Torres, J J; Alegrete-Parra, A

    2013-08-01

    In recent years there has been an increase in the use of minimally invasive techniques, such as arthroscopy, percutaneous, and minimally invasive incisions, for foot and ankle surgery. The purpose of this study was to analyze the fusion rate and clinical results of isolated subtalar arthrodesis (ISA) using the novel and original technique of minimal incision surgery (MIS). There were a total of 77 feet in 76 patients who underwent ISA and were followed for 50 months on average (range, 15-108). The first 30 cases were evaluated retrospectively, and 47 cases were evaluated prospectively. MIS without tourniquet was used in all cases and fusion was assessed radiographically and clinically. Clinical outcome measures used were the Angus and Cowell Scoring System, AOFAS Ankle-Hindfoot, the SF-36, and a patient satisfaction questionnaire 12 months after the intervention. Radiographic and clinical consolidation was achieved in 92% of cases. Main outcomes were "good" in 57 patients as determined by the Angus and Cowell criteria, with 13 "fair" and 7 "poor" results. In the prospective group, AOFAS scores improved by 47.6 points (95% CI: 50.7-42.5) 12 months after surgical intervention. SF-36 outcomes improved by 14.5 points (95% CI: 11.58-17.31) in the mental summary component and 4.2 points (95% CI: 2.2-6.1) in the physical summary component. We recorded no cases of early complications such as wound infections, neurovascular damage, or delayed wound healing. To our knowledge, the present series represents the largest study on subtalar arthrodesis using minimally invasive surgery. The data obtained showed a similar rate of bony union and clinical outcomes compared with the literature, but without early wound complications. ISA using the MIS technique was a good option for patients at greater risk of wound healing complications. Level IV, case series.

  14. Asymptotic safety, emergence and minimal length

    NASA Astrophysics Data System (ADS)

    Percacci, Roberto; Vacca, Gian Paolo

    2010-12-01

    There seems to be a common prejudice that asymptotic safety is either incompatible with, or at best unrelated to, the other topics in the title. This is not the case. In fact, we show that (1) the existence of a fixed point with suitable properties is a promising way of deriving emergent properties of gravity, and (2) there is a sense in which asymptotic safety implies a minimal length. In doing so we also discuss possible signatures of asymptotic safety in scattering experiments.

  15. [Minimally invasive spine surgery: past and present].

    PubMed

    Corniola, M V; Stienen, M N; Tessitore, E; Schaller, K; Gautschi, O P

    2015-11-18

    In the early twentieth century, the understanding of spine biomechanics and the advent of surgical techniques of the lumbar spine, led to the currently emerging concept of minimal invasive spine surgery, By reducing surgical access, blood loss, infection rate and general morbidity, functional prognosis of patients is improved. This is a real challenge for the spine surgeon, who has to maintain a good operative result by significantly reducing surgical collateral damages due to the relatively traumatic conventional access.

  16. Acoustic spectrometer with minimized background dissipation.

    PubMed

    Driaev, D; Iashvili, A; Kankadze, L; Tsakadze, S

    2017-05-01

    Apparatus for measurements of internal friction from Q(-1)∼10(-6) and elastic moduli in the kilohertz frequency range in which external friction losses were minimized using a new-type of three-reed tuning fork as a sample under study is described. High sensitivity of the apparatus made it possible to observe a resonance plasticization of diamagnetic LiF crystals under the action of crossed magnetic fields (≈100 μT) in the EPR conditions.

  17. Telementoring and Telesurgery for Minimally Invasive Surgery.

    PubMed

    Hung, Andrew J; Chen, Jian; Shah, Ankeet; Gill, Inderbir S

    2017-06-24

    Tremendous interest and need lie in the intersection of telemedicine and minimally invasive surgery. Robotics provides an ideal environment for surgical telementoring and telesurgery, given its endoscopic optics and mechanized instrument movement. We review the current status, challenges and future promise of telemedicine in endoscopic and minimally invasive surgery, with particular focus on urologic applications. Two paired investigators screened Pubmed(®), Scopus(®) and Web of Science(®) databases for all full-text English language articles published between 1995 and 2016, using the keywords: telemedicine, minimally invasive surgical procedure, robotic surgical procedure, education, distance. We categorized and included studies on level of interaction between proctors and trainees. Research design, special equipment, telecommunicating network bandwidth, and research outcomes of each study were demonstrated and analyzed. Of 65 identified articles, 38 peer-reviewed manuscripts qualified for inclusion. Studies were categorized into four advancing levels: verbal guidance, guidance with telestration, guidance with tele-assist, and telesurgery. More advanced levels of surgical telementoring provides more effective and experiential teaching, but are associated with higher telecommunicating network bandwidth requirement and expense. Concerns from patient safety, legal, financial, economic, and ethical standpoints remain to be reconciled. Telementoring and telesurgery in minimally invasive surgery are becoming more practical and cost-effective in facilitating the teaching of advanced surgical skills worldwide and the delivery of surgical care to underserved areas. Yet, many challenges remain. Maturity of these modalities depends on financial incentives, favorable legislation and collaboration with cybersecurity experts to ensure safety and cost-effectiveness. Copyright © 2017 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All

  18. Reaction torque minimization techniques for articulated payloads

    NASA Technical Reports Server (NTRS)

    Kral, Kevin; Aleman, Roberto M.

    1988-01-01

    Articulated payloads on spacecraft, such as antenna telemetry systems and robotic elements, impart reaction torques back into the vehicle which can significantly affect the performance of other payloads. This paper discusses ways to minimize the reaction torques of articulated payloads through command-shaping algorithms and unique control implementations. The effects of reaction torques encountered on Landsat are presented and compared with simulated and measured data of prototype systems employing these improvements.

  19. Smooth GERBS, orthogonal systems and energy minimization

    NASA Astrophysics Data System (ADS)

    Dechevsky, Lubomir T.; Zanaty, Peter

    2013-12-01

    New results are obtained in three mutually related directions of the rapidly developing theory of generalized expo-rational B-splines (GERBS) [7, 6]: closed-form computability of C∞-smooth GERBS in terms of elementary and special functions, Hermite interpolation and least-squares best approximation via smooth GERBS, energy minimizing properties of smooth GERBS similar to those of the classical cubic polynomial B-splines.

  20. On 3D minimal massive gravity

    NASA Astrophysics Data System (ADS)

    Alishahiha, Mohsen; Qaemmaqami, Mohammad M.; Naseh, Ali; Shirzad, Ahmad

    2014-12-01

    We study linearized equations of motion of the newly proposed three dimensional gravity, known as minimal massive gravity, using its metric formulation. By making use of a redefinition of the parameters of the model, we observe that the resulting linearized equations are exactly the same as that of TMG. In particular the model admits logarithmic modes at critical points. We also study several vacuum solutions of the model, specially at a certain limit where the contribution of Chern-Simons term vanishes.

  1. Smooth GERBS, orthogonal systems and energy minimization

    SciTech Connect

    Dechevsky, Lubomir T. E-mail: pza@hin.no; Zanaty, Peter E-mail: pza@hin.no

    2013-12-18

    New results are obtained in three mutually related directions of the rapidly developing theory of generalized expo-rational B-splines (GERBS) [7, 6]: closed-form computability of C{sup ∞}-smooth GERBS in terms of elementary and special functions, Hermite interpolation and least-squares best approximation via smooth GERBS, energy minimizing properties of smooth GERBS similar to those of the classical cubic polynomial B-splines.

  2. Nonlinear transient analysis via energy minimization

    NASA Technical Reports Server (NTRS)

    Kamat, M. P.; Knight, N. F., Jr.

    1978-01-01

    The formulation basis for nonlinear transient analysis of finite element models of structures using energy minimization is provided. Geometric and material nonlinearities are included. The development is restricted to simple one and two dimensional finite elements which are regarded as being the basic elements for modeling full aircraft-like structures under crash conditions. The results indicate the effectiveness of the technique as a viable tool for this purpose.

  3. The non-minimal ekpyrotic trispectrum

    NASA Astrophysics Data System (ADS)

    Fertig, Angelika; Lehners, Jean-Luc

    2016-01-01

    Employing the covariant formalism, we derive the evolution equations for two scalar fields with non-canonical field space metric up to third order in perturbation theory. These equations can be used to derive predictions for local bi- and trispectra of multi-field cosmological models. Our main application is to ekpyrotic models in which the primordial curvature perturbations are generated via the non-minimal entropic mechanism. In these models, nearly scale-invariant entropy perturbations are generated first due to a non-minimal kinetic coupling between two scalar fields, and subsequently these perturbations are converted into curvature perturbations. Remarkably, the entropy perturbations have vanishing bi- and trispectra during the ekpyrotic phase. However, as we show, the conversion process to curvature perturbations induces local non-Gaussianity parameters fNL and gNL at levels that should be detectable by near-future observations. In fact, in order to obtain a large enough amplitude and small enough bispectrum of the curvature perturbations, as seen in current measurements, the conversion process must be very efficient. Interestingly, for such efficient conversions the trispectrum parameter gNL remains negative and typically of a magnitude Script O(102)-Script O(103), resulting in a distinguishing feature of non-minimally coupled ekpyrotic models.

  4. What kind of consciousness is minimal?

    PubMed

    Kotchoubey, Boris; Vogel, Dominik; Lang, Simone; Müller, Friedemann

    2014-01-01

    A comparison between unitary and non-unitary views on minimal consciousness. First, unitary (all-or-none) and non-unitary (gradual or continuous) models of consciousness are defined as they have been developed in both philosophy and neurophysiology. Then, the implications of these ideas to the notion the minimally conscious state (MCS) are discussed. Review and analysis of theoretical conceptions and empirical data. Both kinds of models are compatible with the actual definitions of MCS. Although unitary views may seem to contradict the description of the MCS in 'Neurology' 2002, the apparent contradiction can easily be solved. Most recent data, particularly those obtained using fMRI and concerning learning, emotional responsiveness and pain and suffering, speak for non-unitary models. Most evidence speaks for non-unitary models of minimal consciousness. If these models are correct, patients with MCS may have, in addition to temporal fluctuations, a lower level of consciousness compared with fully conscious individuals. A still lower level could characterize patients diagnosed as unresponsive wakefulness syndrome (UWS). From this point of view, therefore, the difference between UWS and MCS is gradual rather than qualitative. However, due to methodological limitations of the available studies, the evidence for non-unitary models cannot be regarded as definite.

  5. The non-minimal ekpyrotic trispectrum

    SciTech Connect

    Fertig, Angelika; Lehners, Jean-Luc E-mail: jlehners@aei.mpg.de

    2016-01-01

    Employing the covariant formalism, we derive the evolution equations for two scalar fields with non-canonical field space metric up to third order in perturbation theory. These equations can be used to derive predictions for local bi- and trispectra of multi-field cosmological models. Our main application is to ekpyrotic models in which the primordial curvature perturbations are generated via the non-minimal entropic mechanism. In these models, nearly scale-invariant entropy perturbations are generated first due to a non-minimal kinetic coupling between two scalar fields, and subsequently these perturbations are converted into curvature perturbations. Remarkably, the entropy perturbations have vanishing bi- and trispectra during the ekpyrotic phase. However, as we show, the conversion process to curvature perturbations induces local non-Gaussianity parameters f{sub NL} and g{sub NL} at levels that should be detectable by near-future observations. In fact, in order to obtain a large enough amplitude and small enough bispectrum of the curvature perturbations, as seen in current measurements, the conversion process must be very efficient. Interestingly, for such efficient conversions the trispectrum parameter g{sub NL} remains negative and typically of a magnitude O(10{sup 2})–O(10{sup 3}), resulting in a distinguishing feature of non-minimally coupled ekpyrotic models.

  6. Esophageal surgery in minimally invasive era

    PubMed Central

    Bencini, Lapo; Moraldi, Luca; Bartolini, Ilenia; Coratti, Andrea

    2016-01-01

    The widespread popularity of new surgical technologies such as laparoscopy, thoracoscopy and robotics has led many surgeons to treat esophageal diseases with these methods. The expected benefits of minimally invasive surgery (MIS) mainly include reductions of postoperative complications, length of hospital stay, and pain and better cosmetic results. All of these benefits could potentially be of great interest when dealing with the esophagus due to the potentially severe complications that can occur after conventional surgery. Moreover, robotic platforms are expected to reduce many of the difficulties encountered during advanced laparoscopic and thoracoscopic procedures such as anastomotic reconstructions, accurate lymphadenectomies, and vascular sutures. Almost all esophageal diseases are approachable in a minimally invasive way, including diverticula, gastro-esophageal reflux disease, achalasia, perforations and cancer. Nevertheless, while the limits of MIS for benign esophageal diseases are mainly technical issues and costs, oncologic outcomes remain the cornerstone of any procedure to cure malignancies, for which the long-term results are critical. Furthermore, many of the minimally invasive esophageal operations should be compared to pharmacologic interventions and advanced pure endoscopic procedures; such a comparison requires a difficult literature analysis and leads to some confounding results of clinical trials. This review aims to examine the evidence for the use of MIS in both malignancies and more common benign disease of the esophagus, with a particular emphasis on future developments and ongoing areas of research. PMID:26843913

  7. Waste minimization in an autobody repair shop

    SciTech Connect

    Baria, D.N.; Dorland, D.; Bergeron, J.T.

    1994-12-31

    This work was done to document the waste minimization incorporated in a new autobody repair facility in Hermantown, Minnesota. Humes Collision Center incorporated new waste reduction techniques when it expanded its old facilities in 1992 and it was able to achieve the benefits of cost reduction and waste reduction. Humes Collision Center repairs an average of 500 cars annually and is a very small quantity generator (VSQG) of hazardous waste, as defined by the Minnesota Pollution Control Agency (MPCA). The hazardous waste consists of antifreeze, batteries, paint sludge, refrigerants, and used oil, while the nonhazardous waste consists of cardboard, glass, paint filters, plastic, sanding dust, scrap metal, and wastewater. The hazardous and nonhazardous waste output were decreased by 72%. In addition, there was a 63% reduction in the operating costs. The waste minimization includes antifreeze recovery and recycling, reduction in unused waste paint, reduction, recovery and recycle of waste lacquer thinner for cleaning spray guns and paint cups, elimination of used plastic car bags, recovery and recycle of refrigerant, reduction in waste sandpaper and elimination of sanding dust, and elimination of waste paint filters. The rate of return on the investment in waste minimization equipment is estimated from 37% per year for the distillation unit, 80% for vacuum sanding, 146% for computerized paint mixing, 211% for the refrigerant recycler, to 588% per year for the gun washer. The corresponding payback time varies from 3 years to 2 months.

  8. Minimally invasive thyroidectomy: a ten years experience

    PubMed Central

    Viani, Lorenzo; Montana, Chiara Montana; Cozzani, Federico; Sianesi, Mario

    2016-01-01

    Background The conventional thyroidectomy is the most frequent surgical procedure for thyroidal surgical disease. From several years were introduced minimally invasive approaches to thyroid surgery. These new procedures improved the incidence of postoperative pain, cosmetic results, patient’s quality of life, postoperative morbidity. The mini invasive video-assisted thyroidectomy (MIVAT) is a minimally invasive procedure that uses a minicervicotomy to treat thyroidal diseases. Methods We present our experience on 497 consecutively treated patients with MIVAT technique. We analyzed the mean age, sex, mean operative time, rate of bleeding, hypocalcemia, transitory and definitive nerve palsy (6 months after the procedure), postoperative pain scale from 0 to 10 at 1 hour and 24 hours after surgery, mean hospital stay. Results The indications to treat were related to preoperative diagnosis: 182 THYR 6, 184 THYR 3–4, 27 plummer, 24 basedow, 28 toxic goiter, 52 goiter. On 497 cases we have reported 1 case of bleeding (0,2%), 12 (2,4%) cases of transitory nerve palsy and 4 (0,8%) definitive nerve palsy. The rate of serologic hypocalcemia was 24.9% (124 cases) and clinical in 7.2% (36 cases); 1 case of hypoparathyroidism (0.2%). Conclusions The MIVAT is a safe approach to surgical thyroid disease, the cost are similar to CT as the adverse events. The minicervicotomy is really a minimally invasive tissue dissection. PMID:27294036

  9. Minimally invasive local therapies for liver cancer

    PubMed Central

    Li, David; Kang, Josephine; Golas, Benjamin J.; Yeung, Vincent W.; Madoff, David C.

    2014-01-01

    Primary and metastatic liver tumors are an increasing global health problem, with hepatocellular carcinoma (HCC) now being the third leading cause of cancer-related mortality worldwide. Systemic treatment options for HCC remain limited, with Sorafenib as the only prospectively validated agent shown to increase overall survival. Surgical resection and/or transplantation, locally ablative therapies and regional or locoregional therapies have filled the gap in liver tumor treatments, providing improved survival outcomes for both primary and metastatic tumors. Minimally invasive local therapies have an increasing role in the treatment of both primary and metastatic liver tumors. For patients with low volume disease, these therapies have now been established into consensus practice guidelines. This review highlights technical aspects and outcomes of commonly utilized, minimally invasive local therapies including laparoscopic liver resection (LLR), radiofrequency ablation (RFA), microwave ablation (MWA), high-intensity focused ultrasound (HIFU), irreversible electroporation (IRE), and stereotactic body radiation therapy (SBRT). In addition, the role of combination treatment strategies utilizing these minimally invasive techniques is reviewed. PMID:25610708

  10. Direct energy functional minimization under orthogonality constraints

    NASA Astrophysics Data System (ADS)

    Weber, Valéry; VandeVondele, Joost; Hutter, Jürg; Niklasson, Anders M. N.

    2008-02-01

    The direct energy functional minimization problem in electronic structure theory, where the single-particle orbitals are optimized under the constraint of orthogonality, is explored. We present an orbital transformation based on an efficient expansion of the inverse factorization of the overlap matrix that keeps orbitals orthonormal. The orbital transformation maps the orthogonality constrained energy functional to an approximate unconstrained functional, which is correct to some order in a neighborhood of an orthogonal but approximate solution. A conjugate gradient scheme can then be used to find the ground state orbitals from the minimization of a sequence of transformed unconstrained electronic energy functionals. The technique provides an efficient, robust, and numerically stable approach to direct total energy minimization in first principles electronic structure theory based on tight-binding, Hartree-Fock, or density functional theory. For sparse problems, where both the orbitals and the effective single-particle Hamiltonians have sparse matrix representations, the effort scales linearly with the number of basis functions N in each iteration. For problems where only the overlap and Hamiltonian matrices are sparse the computational cost scales as O(M2N ), where M is the number of occupied orbitals. We report a single point density functional energy calculation of a DNA decamer hydrated with 4003 water molecules under periodic boundary conditions. The DNA fragment containing a cis-syn thymine dimer is composed of 634 atoms and the whole system contains a total of 12 661 atoms and 103 333 spherical Gaussian basis functions.

  11. Minimally radiating sources for personal audio.

    PubMed

    Elliott, Stephen J; Cheer, Jordan; Murfet, Harry; Holland, Keith R

    2010-10-01

    In order to reduce annoyance from the audio output of personal devices, it is necessary to maintain the sound level at the user position while minimizing the levels elsewhere. If the dark zone, within which the sound is to be minimized, extends over the whole far field of the source, the problem reduces to that of minimizing the radiated sound power while maintaining the pressure level at the user position. It is shown analytically that the optimum two-source array then has a hypercardioid directivity and gives about 7 dB reduction in radiated sound power, compared with a monopole producing the same on-axis pressure. The performance of other linear arrays is studied using monopole simulations for the motivating example of a mobile phone. The trade-off is investigated between the performance in reducing radiated noise, and the electrical power required to drive the array for different numbers of elements. It is shown for both simulations and experiments conducted on a small array of loudspeakers under anechoic conditions, that both two and three element arrays provide a reasonable compromise between these competing requirements. The implementation of the two-source array in a coupled enclosure is also shown to reduce the electrical power requirements.

  12. [Minimally Invasive Treatment of Esophageal Benign Diseases].

    PubMed

    Inoue, Haruhiro

    2016-07-01

    As a minimally invasive treatment of esophageal achalasia per-oral endoscopic myotomy( POEM) was developed in 2008. More than 1,100 cases of achalasia-related diseases received POEM. Success rate of the procedure was more than 95%(Eckerdt score improvement 3 points and more). No serious( Clavian-Dindo classification III b and more) complication was experienced. These results suggest that POEM becomes a standard minimally invasive treatment for achalasia-related diseases. As an off-shoot of POEM submucosal tumor removal through submucosal tunnel (per-oral endoscopic tumor resection:POET) was developed and safely performed. Best indication of POET is less than 5 cm esophageal leiomyoma. A novel endoscopic treatment of gastroesophageal reflux disease (GERD) was developed. Anti-reflux mucosectomy( ARMS) is nearly circumferential mucosal reduction of gastric cardia mucosa. ARMS is performed in 56 consecutive cases of refractory GERD. No major complications were encountered and excellent clinical results. Best indication of ARMS is a refractory GERD without long sliding hernia. Longest follow-up case is more than 10 years. Minimally invasive treatments for esophageal benign diseases are currently performed by therapeutic endoscopy.

  13. [Minimal cerebral dysfunctions and ADHD in adulthood].

    PubMed

    Linden, M; Weddigen, J

    2016-11-01

    Attention deficit hyperactivity disorder (ADHD) is of great importance not only in children but also in adults; however, despite extensive research there are still many unsolved questions with respect to the diagnosis. Patients not only suffer from attention deficits and hyperactivity but also a variety of other problems, such as dyspraxia, problems with stimulus discrimination, dysgrammatism, legasthenia, or motor coordination problems. Furthermore, there are also psychopathological disorders, such as problems with memory, formal thinking, emotional modulation, drive and vegetative stability, in the sense of a psycho-organic syndrome. Such syndromes have long been known in psychiatry under terms, such as complex capacity disorders, minimal cerebral dysfunction (MCD), minimal brain dysfunction (MBD), mild psycho-organic syndrome, psycho-organic axis syndrome, mild cognitive impairment, developmental disorder and developmental biological syndrome. Etiological data with respect to genetics and early childhood brain trauma support the notion of a psychobiological disorder for complex cerebral dysfunction in the sense of a psycho-organic syndrome. Depending on the individual life and work situation, these additional symptoms of ADHD are in many cases of greater relevance for life adjustment than the core symptoms, depending on the individual life and work situations. The concept of minimal cerebral dysfunction describes the ADHD problem better and has a direct bearing on the diagnosis, therapy and sociomedical care of the patients.

  14. Religion as Schedule-Induced Behavior

    ERIC Educational Resources Information Center

    Strand, Paul S.

    2009-01-01

    In this article, I argue that a class of religious behaviors exists that is induced, for prepared organisms, by specific stimuli that are experienced according to a response-independent schedule. Like other schedule-induced behaviors, the members of this class serve as minimal units out of which functional behavior may arise. In this way, there…

  15. Minimal entropy probability paths between genome families.

    PubMed

    Ahlbrandt, Calvin; Benson, Gary; Casey, William

    2004-05-01

    We develop a metric for probability distributions with applications to biological sequence analysis. Our distance metric is obtained by minimizing a functional defined on the class of paths over probability measures on N categories. The underlying mathematical theory is connected to a constrained problem in the calculus of variations. The solution presented is a numerical solution, which approximates the true solution in a set of cases called rich paths where none of the components of the path is zero. The functional to be minimized is motivated by entropy considerations, reflecting the idea that nature might efficiently carry out mutations of genome sequences in such a way that the increase in entropy involved in transformation is as small as possible. We characterize sequences by frequency profiles or probability vectors, in the case of DNA where N is 4 and the components of the probability vector are the frequency of occurrence of each of the bases A, C, G and T. Given two probability vectors a and b, we define a distance function based as the infimum of path integrals of the entropy function H( p) over all admissible paths p(t), 0 < or = t< or =1, with p(t) a probability vector such that p(0)=a and p(1)=b. If the probability paths p(t) are parameterized as y(s) in terms of arc length s and the optimal path is smooth with arc length L, then smooth and "rich" optimal probability paths may be numerically estimated by a hybrid method of iterating Newton's method on solutions of a two point boundary value problem, with unknown distance L between the abscissas, for the Euler-Lagrange equations resulting from a multiplier rule for the constrained optimization problem together with linear regression to improve the arc length estimate L. Matlab code for these numerical methods is provided which works only for "rich" optimal probability vectors. These methods motivate a definition of an elementary distance function which is easier and faster to calculate, works on non

  16. CONTROLLING BEHAVIOR CHANGERS' BEHAVIOR.

    ERIC Educational Resources Information Center

    MARKLE, DAVID G.

    AN EMERGING METHODOLOGY OF PROGRAMING AVOIDS SOME OF THE UNFORTUNATE EFFECTS ON PROGRAMER BEHAVIOR PRODUCED BY INTERPRETATIONS OF TWO EARLIER METHODOLOGIES. WHILE SKINNERIAN PROGRAMING OFTEN HAS LED TO TRIVIAL PROGRAMS THROUGH PROBLEMS OF APPLICATION OF THE CRITERIA OF SPECIFIED BEHAVIORAL OBJECTIVES AND LOW ERROR RATES, CROWDERIAN PROGRAMING HAS…

  17. Micromanipulator: effectiveness in minimally invasive neurosurgery.

    PubMed

    Jain, R; Kato, Y; Sano, H; Imizu, S; Watanabe, S; Yamaguchi, S; Shinya, N; Jindal, V; Kanno, T

    2003-08-01

    Minimally invasive surgeries by innovative approaches are practiced in all fields. The evolution of microneurosurgery has revolutionized the results in neurosurgery. Use of endoscopes and navigation has made microsurgery less invasive. Another development to make minimally invasive microneurosurgery further lesser invasive is the use of micromanipulator. The use and effectiveness of manually controlled micromanipulator system is presented. The manually controlled micromanipulator system consists of three parts, i.e., a basic micromanipulator, manipulator supporting device and the manual control. The micromanipulator fitted in supporting device is arranged before the start of surgery. The supporting device used is pneumatically driven powered endoscopic holding device (Mitaka Kohki Co., Tokyo) In maximum number of times we used the system for endoscopic assisted cerebrovascular microneurosurgery. In a span of two months we used it in thirty aneurysm clipping surgeries. The endoscope fitted in system has three ranges of motions (forward/backward, upside/down and sideways). We use MACHIDA rigid endoscope with internal diameter of 2.7 mm (smallest diameter endoscope available). Special features of this endoscope are accurate visualization at a deeper plane, stable movements and availability of single focus point for long time. All these features are valuable during pre- and postoperative clipping observation. The aim of development of micromanipulator system was to further reduce invasiveness. A significant improvement in manual dexterity is possible when working through the micromanipulator interface, which dampens human physiological tremor. The physiological tremor would render the manual dexterity unsafe at the end of lever arm of long instruments. Thus, the use endoscope becomes practical. The minimally invasive microneurosurgery can be further made lesser invasive by use of micromanipulator and we are convinced that this will facilitate more accurate and

  18. Fusion algebras of logarithmic minimal models

    NASA Astrophysics Data System (ADS)

    Rasmussen, Jørgen; Pearce, Paul A.

    2007-11-01

    We present explicit conjectures for the chiral fusion algebras of the logarithmic minimal models {\\cal LM}(p,p^{\\prime}) considering Virasoro representations with no enlarged or extended symmetry algebra. The generators of fusion are countably infinite in number but the ensuing fusion rules are quasi-rational in the sense that the fusion of a finite number of representations decomposes into a finite direct sum of representations. The fusion rules are commutative, associative and exhibit an sell(2) structure but require so-called Kac representations which are typically reducible yet indecomposable representations of rank 1. In particular, the identity of the fundamental fusion algebra p ≠ 1 is a reducible yet indecomposable Kac representation of rank 1. We make detailed comparisons of our fusion rules with the results of Gaberdiel and Kausch for p = 1 and with Eberle and Flohr for (p, p') = (2, 5) corresponding to the logarithmic Yang-Lee model. In the latter case, we confirm the appearance of indecomposable representations of rank 3. We also find that closure of a fundamental fusion algebra is achieved without the introduction of indecomposable representations of rank higher than 3. The conjectured fusion rules are supported, within our lattice approach, by extensive numerical studies of the associated integrable lattice models. Details of our lattice findings and numerical results will be presented elsewhere. The agreement of our fusion rules with the previous fusion rules lends considerable support for the identification of the logarithmic minimal models {\\cal LM}(p,p^{\\prime}) with the augmented c_{p,p^{\\prime}} (minimal) models defined algebraically.

  19. Minimally invasive surgery for atrial fibrillation

    PubMed Central

    Suwalski, Piotr

    2013-01-01

    Atrial fibrillation (AF) remains the most common cardiac arrhythmia, affecting nearly 2% of the general population worldwide. Minimally invasive surgical ablation remains one of the most dynamically evolving fields of modern cardiac surgery. While there are more than a dozen issues driving this development, two seem to play the most important role: first, there is lack of evidence supporting percutaneous catheter based approach to treat patients with persistent and long-standing persistent AF. Paucity of this data offers surgical community unparalleled opportunity to challenge guidelines and change indications for surgical intervention. Large, multicenter prospective clinical studies are therefore of utmost importance, as well as honest, clear data reporting. Second, a collaborative methodology started a long-awaited debate on a Heart Team approach to AF, similar to the debate on coronary artery disease and transcatheter valves. Appropriate patient selection and tailored treatment options will most certainly result in better outcomes and patient satisfaction, coupled with appropriate use of always-limited institutional resources. The aim of this review, unlike other reviews of minimally invasive surgical ablation, is to present medical professionals with two distinctly different, approaches. The first one is purely surgical, Standalone surgical isolation of the pulmonary veins using bipolar energy source with concomitant amputation of the left atrial appendage—a method of choice in one of the most important clinical trials on AF—The Atrial Fibrillation Catheter Ablation Versus Surgical Ablation Treatment (FAST) Trial. The second one represents the most complex approach to this problem: a multidisciplinary, combined effort of a cardiac surgeon and electrophysiologist. The Convergent Procedure, which includes both endocardial and epicardial unipolar ablation bonds together minimally invasive endoscopic surgery with electroanatomical mapping, to deliver best of

  20. Minimally Invasive Approach of a Retrocaval Ureter

    PubMed Central

    Pinheiro, Hugo; Ferronha, Frederico; Morales, Jorge; Campos Pinheiro, Luís

    2016-01-01

    The retrocaval ureter is a rare congenital entity, classically managed with open pyeloplasty techniques. The experience obtained with the laparoscopic approach of other more frequent causes of ureteropelvic junction (UPJ) obstruction has opened the method for the minimally invasive approach of the retrocaval ureter. In our paper, we describe a clinical case of a right retrocaval ureter managed successfully with laparoscopic dismembered pyeloplasty. The main standpoints of the procedure are described. Our results were similar to others published by other urologic centers, which demonstrates the safety and feasibility of the procedure for this condition. PMID:27635277

  1. Minimal model for spoof acoustoelastic surface states

    SciTech Connect

    Christensen, J. Willatzen, M.; Liang, Z.

    2014-12-15

    Similar to textured perfect electric conductors for electromagnetic waves sustaining artificial or spoof surface plasmons we present an equivalent phenomena for the case of sound. Aided by a minimal model that is able to capture the complex wave interaction of elastic cavity modes and airborne sound radiation in perfect rigid panels, we construct designer acoustoelastic surface waves that are entirely controlled by the geometrical environment. Comparisons to results obtained by full-wave simulations confirm the feasibility of the model and we demonstrate illustrative examples such as resonant transmissions and waveguiding to show a few examples of many where spoof elastic surface waves are useful.

  2. Mercury Contamination: Fate and Risk Minimization Strategies

    NASA Astrophysics Data System (ADS)

    Charlet, L.

    Two river basins have been studied in French Guyana, which are subject to heavy mercury contamination, due to illegal gold mining. Within the framework of an interdisciplinary European project, the fate of mercury in water, air, soil, sediment has been studied, as well as its bio-accumulation in the food chain. This bioaccumulation results in the contamination of amerindian populations, through fish consumption. This study has been done in close contact with the economic and political actors. The results of the scientific interdisciplinary study has been translated in terms of risk minimization strategies, which are analyzed in the framework of the European Water Framework Directive.

  3. Qualifying and quantifying minimal hepatic encephalopathy.

    PubMed

    Morgan, Marsha Y; Amodio, Piero; Cook, Nicola A; Jackson, Clive D; Kircheis, Gerald; Lauridsen, Mette M; Montagnese, Sara; Schiff, Sami; Weissenborn, Karin

    2016-12-01

    Minimal hepatic encephalopathy is the term applied to the neuropsychiatric status of patients with cirrhosis who are unimpaired on clinical examination but show alterations in neuropsychological tests exploring psychomotor speed/executive function and/or in neurophysiological variables. There is no gold standard for the diagnosis of this syndrome. As these patients have, by definition, no recognizable clinical features of brain dysfunction, the primary prerequisite for the diagnosis is careful exclusion of clinical symptoms and signs. A large number of psychometric tests/test systems have been evaluated in this patient group. Of these the best known and validated is the Portal Systemic Hepatic Encephalopathy Score (PHES) derived from a test battery of five paper and pencil tests; normative reference data are available in several countries. The electroencephalogram (EEG) has been used to diagnose hepatic encephalopathy since the 1950s but, once popular, the technology is not as accessible now as it once was. The performance characteristics of the EEG are critically dependent on the type of analysis undertaken; spectral analysis has better performance characteristics than visual analysis; evolving analytical techniques may provide better diagnostic information while the advent of portable wireless headsets may facilitate more widespread use. A large number of other diagnostic tools have been validated for the diagnosis of minimal hepatic encephalopathy including Critical Flicker Frequency, the Inhibitory Control Test, the Stroop test, the Scan package and the Continuous Reaction Time; each has its pros and cons; strengths and weaknesses; protagonists and detractors. Recent AASLD/EASL Practice Guidelines suggest that the diagnosis of minimal hepatic encephalopathy should be based on the PHES test together with one of the validated alternative techniques or the EEG. Minimal hepatic encephalopathy has a detrimental effect on the well-being of patients and their care

  4. Strategies for minimizing nosocomial measles transmission.

    PubMed Central

    Biellik, R. J.; Clements, C. J.

    1997-01-01

    As a result of the highly contagious nature of measles before the onset of rash, nosocomial transmission will remain a threat until the disease is eradicated. However, a number of strategies can minimize its nosocomial spread. It is therefore vital to maximize awareness among health care staff that an individual with measles can enter a health facility at any time and that a continual risk of the nosocomial transmission of measles exists. The present review makes two groups of recommendations: those which are generally applicable to all countries, and certain additional recommendations which may be suitable only for industrialized countries. PMID:9342896

  5. Lowered ultraviolet minimal erythema dose in hemiplegia.

    PubMed Central

    Cox, N. H.; Williams, S. J.

    1985-01-01

    In view of recent reports of increased tanning in hemiplegic limbs, we have investigated ultraviolet (u.v.) minimal erythema dose (MED) in hemiplegia using the bilateral comparison technique. Seven of 10 patients had a lower MED in the hemiplegic arm compared to the normal side, the mean reduction being 16% (range 0-33%, P = 0.003). No patients had a higher MED in the hemiplegic arm. We review the literature regarding other non-neurological features of hemiplegia, in particular asymmetry of temperature, oedema, and finger clubbing, and we propose a vasomotor or trophic aetiology for these findings. PMID:4022889

  6. Minimizing Occupational Exposure to Antineoplastic Agents.

    PubMed

    Polovich, Martha

    2016-01-01

    The inherent toxicity of antineoplastic drugs used for the treatment of cancer makes them harmful to healthy cells as well as to cancer cells. Nurses who prepare and/or administer the agents potentially are exposed to the drugs and their negative effects. Knowledge about these drugs and the precautions aimed at reducing exposure are essential aspects of infusion nursing practice. This article briefly reviews the mechanisms of action of common antineoplastic drugs, the adverse outcomes associated with exposure, the potential for occupational exposure from preparation and administration, and recommended strategies for minimizing occupational exposure.

  7. Reducing robotic prostatectomy costs by minimizing instrumentation.

    PubMed

    Delto, Joan C; Wayne, George; Yanes, Rafael; Nieder, Alan M; Bhandari, Akshay

    2015-05-01

    Since the introduction of robotic surgery for radical prostatectomy, the cost-benefit of this technology has been under scrutiny. While robotic surgery professes to offer multiple advantages, including reduced blood loss, reduced length of stay, and expedient recovery, the associated costs tend to be significantly higher, secondary to the fixed cost of the robot as well as the variable costs associated with instrumentation. This study provides a simple framework for the careful consideration of costs during the selection of equipment and materials. Two experienced robotic surgeons at our institution as well as several at other institutions were queried about their preferred instrument usage for robot-assisted prostatectomy. Costs of instruments and materials were obtained and clustered by type and price. A minimal set of instruments was identified and compared against alternative instrumentation. A retrospective review of 125 patients who underwent robotically assisted laparoscopic prostatectomy for prostate cancer at our institution was performed to compare estimated blood loss (EBL), operative times, and intraoperative complications for both surgeons. Our surgeons now conceptualize instrument costs as proportional changes to the cost of the baseline minimal combination. Robotic costs at our institution were reduced by eliminating an energy source like the Ligasure or vessel sealer, exploiting instrument versatility, and utilizing inexpensive tools such as Hem-o-lok clips. Such modifications reduced surgeon 1's cost of instrumentation to ∼40% less compared with surgeon 2 and up to 32% less than instrumentation used by surgeons at other institutions. Surgeon 1's combination may not be optimal for all robotic surgeons; however, it establishes a minimally viable toolbox for our institution through a rudimentary cost analysis. A similar analysis may aid others in better conceptualizing long-term costs not as nominal, often unwieldy prices, but as percent changes in

  8. Nonunity gain minimal-disturbance measurement

    SciTech Connect

    Sabuncu, Metin; Andersen, Ulrik L.; Mista, Ladislav Jr.; Fiurasek, Jaromir; Filip, Radim; Leuchs, Gerd

    2007-09-15

    We propose and experimentally demonstrate an optimal nonunity gain Gaussian scheme for partial measurement of an unknown coherent state that causes minimal disturbance of the state. The information gain and the state disturbance are quantified by the noise added to the measurement outcomes and to the output state, respectively. We derive the optimal trade-off relation between the two noises and we show that the tradeoff is saturated by nonunity gain teleportation. Optimal partial measurement is demonstrated experimentally using a linear optics scheme with feedforward.

  9. Minimally invasive splenectomy: an update and review.

    PubMed

    Gamme, Gary; Birch, Daniel W; Karmali, Shahzeer

    2013-08-01

    Laparoscopic splenectomy (LS) has become an established standard of care in the management of surgical diseases of the spleen. The present article is an update and review of current procedures and controversies regarding minimally invasive splenectomy. We review the indications and contraindications for LS as well as preoperative considerations. An individual assessment of the procedures and outcomes of multiport laparoscopic splenectomy, hand-assisted laparoscopic splenectomy, robotic splenectomy, natural orifice transluminal endoscopic splenectomy and single-port splenectomy is included. Furthermore, this review examines postoperative considerations after LS, including the postoperative course of uncomplicated patients, postoperative portal vein thrombosis, infections and malignancy.

  10. Sensorless Force Sensing for Minimally Invasive Surgery

    PubMed Central

    Zhao, Baoliang; Nelson, Carl A.

    2015-01-01

    Robotic minimally invasive surgery (R-MIS) has achieved success in various procedures; however, the lack of haptic feedback is considered by some to be a limiting factor. The typical method to acquire tool–tissue reaction forces is attaching force sensors on surgical tools, but this complicates sterilization and makes the tool bulky. This paper explores the feasibility of using motor current to estimate tool-tissue forces and demonstrates acceptable results in terms of time delay and accuracy. This sensorless force estimation method sheds new light on the possibility of equipping existing robotic surgical systems with haptic interfaces that require no sensors and are compatible with existing sterilization methods. PMID:27222680

  11. Area Minimizing Discs in Metric Spaces

    NASA Astrophysics Data System (ADS)

    Lytchak, Alexander; Wenger, Stefan

    2017-03-01

    We solve the classical problem of Plateau in the setting of proper metric spaces. Precisely, we prove that among all disc-type surfaces with prescribed Jordan boundary in a proper metric space there exists an area minimizing disc which moreover has a quasi-conformal parametrization. If the space supports a local quadratic isoperimetric inequality for curves we prove that such a solution is locally Hölder continuous in the interior and continuous up to the boundary. Our results generalize corresponding results of Douglas Radò and Morrey from the setting of Euclidean space and Riemannian manifolds to that of proper metric spaces.

  12. Minimal Hepatic Encephalopathy Impairs Quality of Life

    PubMed Central

    Agrawal, Swastik; Umapathy, Sridharan; Dhiman, Radha K.

    2015-01-01

    Minimal hepatic encephalopathy (MHE) is the mildest form of the spectrum of neurocognitive impairment in cirrhosis. It is a frequent occurrence in patients of cirrhosis and is detectable only by specialized neurocognitive testing. MHE is a clinically significant disorder which impairs daily functioning, driving performance, work capability and learning ability. It also predisposes to the development of overt hepatic encephalopathy, increased falls and increased mortality. This results in impaired quality of life for the patient as well as significant social and economic burden for health providers and care givers. Early detection and treatment of MHE with ammonia lowering therapy can reverse MHE and improve quality of life. PMID:26041957

  13. Minimizing Variation In Outdoor CPV Power Ratings

    NASA Astrophysics Data System (ADS)

    Muller, Matthew; Marion, Bill; Rodriguez, Jose; Kurtz, Sarah

    2011-12-01

    The CPV community has agreed to have both indoor and outdoor module power ratings. The indoor rating provides a repeatable measurement off the factory line while the outdoor rating provides a measure of true on-sun performance. The challenge with an outdoor rating is that conditions that impact the measurement such as the spectrum, temperature, wind speed, etc are constantly in flux. This work examines methodologies for determining the outdoor power rating with the goal of minimizing variation even if data are collected under changing meteorological conditions.

  14. Functional minimization problems in image processing

    NASA Astrophysics Data System (ADS)

    Kim, Yunho; Vese, Luminita A.

    2008-02-01

    In this work we wish to recover an unknown image from a blurry version. We solve this inverse problem by energy minimization and regularization. We seek a solution of the form u + v, where u is a function of bounded variation (cartoon component), while v is an oscillatory component (texture), modeled by a Sobolev function with negative degree of differentiability. Experimental results show that this cartoon + texture model better recovers textured details in natural images, by comparison with the more standard models where the unknown is restricted only to the space of functions of bounded variation.

  15. Minimally invasive surgery for esophageal achalasia.

    PubMed

    Chen, Huan-Wen; Du, Ming

    2016-07-01

    Esophageal achalasia is due to the esophagus of neuromuscular dysfunction caused by esophageal functional disease. Its main feature is the lack of esophageal peristalsis, the lower esophageal sphincter pressure and to reduce the swallow's relaxation response. Lower esophageal muscular dissection is one of the main ways to treat esophageal achalasia. At present, the period of muscular layer under the thoracoscope esophagus dissection is one of the treatment of esophageal achalasia. Combined with our experience in minimally invasive esophageal surgery, to improved incision and operation procedure, and adopts the model of the complete period of muscular layer under the thoracoscope esophagus dissection in the treatment of esophageal achalasia.

  16. Periodical cicadas: A minimal automaton model

    NASA Astrophysics Data System (ADS)

    de O. Cardozo, Giovano; de A. M. M. Silvestre, Daniel; Colato, Alexandre

    2007-08-01

    The Magicicada spp. life cycles with its prime periods and highly synchronized emergence have defied reasonable scientific explanation since its discovery. During the last decade several models and explanations for this phenomenon appeared in the literature along with a great deal of discussion. Despite this considerable effort, there is no final conclusion about this long standing biological problem. Here, we construct a minimal automaton model without predation/parasitism which reproduces some of these aspects. Our results point towards competition between different strains with limited dispersal threshold as the main factor leading to the emergence of prime numbered life cycles.

  17. Solar array stepping to minimize array excitation

    NASA Technical Reports Server (NTRS)

    Bhat, Mahabaleshwar K. P. (Inventor); Liu, Tung Y. (Inventor); Plescia, Carl T. (Inventor)

    1989-01-01

    Mechanical oscillations of a mechanism containing a stepper motor, such as a solar-array powered spacecraft, are reduced and minimized by the execution of step movements in pairs of steps, the period between steps being equal to one-half of the period of torsional oscillation of the mechanism. Each pair of steps is repeated at needed intervals to maintain desired continuous movement of the portion of elements to be moved, such as the solar array of a spacecraft. In order to account for uncertainty as well as slow change in the period of torsional oscillation, a command unit may be provided for varying the interval between steps in a pair.

  18. Weight minimization of structural components for launch in space shuttle

    NASA Technical Reports Server (NTRS)

    Patnaik, Surya N.; Gendy, Atef S.; Hopkins, Dale A.; Berke, Laszlo

    1994-01-01

    Minimizing the weight of structural components of the space station launched into orbit in a space shuttle can save cost, reduce the number of space shuttle missions, and facilitate on-orbit fabrication. Traditional manual design of such components, although feasible, cannot represent a minimum weight condition. At NASA Lewis Research Center, a design capability called CometBoards (Comparative Evaluation Test Bed of Optimization and Analysis Routines for the Design of Structures) has been developed especially for the design optimization of such flight components. Two components of the space station - a spacer structure and a support system - illustrate the capability of CometBoards. These components are designed for loads and behavior constraints that arise from a variety of flight accelerations and maneuvers. The optimization process using CometBoards reduced the weights of the components by one third from those obtained with traditional manual design. This paper presents a brief overview of the design code CometBoards and a description of the space station components, their design environments, behavior limitations, and attributes of their optimum designs.

  19. Imaging Live Bee Brains using Minimally-Invasive Diagnostic Radioentomology

    PubMed Central

    Greco, Mark K; Tong, Jenna; Soleimani, Manucher; Bell, Duncan; Schäfer, Marc O

    2012-01-01

    The sensitivity of the honey bee, Apis mellifera L. (Hymeonoptera: Apidae), brain volume and density to behavior (plasticity) makes it a great model for exploring the interactions between experience, behavior, and brain structure. Plasticity in the adult bee brain has been demonstrated in previous experiments. This experiment was conducted to identify the potentials and limitations of MicroCT (micro computed tomograpy) scanning “live” bees as a more comprehensive, non-invasive method for brain morphology and physiology. Bench-top and synchrotron MicroCT were used to scan live bees. For improved tissue differentiation, bees were fed and injected with radiographic contrast. Images of optic lobes, ocelli, antennal lobes, and mushroom bodies were visualized in 2D and 3D rendering modes. Scanning of live bees (for the first time) enabled minimally-invasive imaging of physiological processes such as passage of contrast from gut to haemolymph, and preliminary brain perfusion studies. The use of microCT scanning for studying insects (collectively termed ‘diagnostic radioentomology’, or DR) is increasing. Our results indicate that it is feasible to observe plasticity of the honey bee brain in vivo using diagnostic radioentomology, and that progressive, real-time observations of these changes can be followed in individual live bees. Limitations of live bee scanning, such as movement errors and poor tissue differentiation, were identified; however, there is great potential for in-vivo, non-invasive diagnostic radioentomology imaging of the honey bee for brain morphology and physiology. PMID:23421752

  20. Assessing the Minimally Verbal School-Aged Child with Autism Spectrum Disorder

    PubMed Central

    Kasari, Connie; Brady, Nancy; Lord, Catherine; Tager-Flusberg, Helen

    2014-01-01

    This paper addresses the issue of assessing communication, language, and associated cognitive and behavioral abilities of minimally verbal children with Autism Spectrum Disorder (ASD), presenting a summary of a year-long series of meetings held by a group of experts in the field of ASD and NIH staff. In this paper, our goals were to first define the population and then present general guidelines for optimizing assessment sessions for this challenging population. We then summarize the available measures that can be used across a variety of behavioral domains that are most directly relevant to developing language skills, including: oral motor skills, vocal repertoire, receptive and expressive language, imitation, intentional communication, play, social behavior, repetitive and sensory behaviors, special interests, atypical behavior and nonverbal cognition. We conclude with a discussion of some of the limitations in the available measures and highlight recommendations for future research in this area. PMID:24353165

  1. Minimizing solids buildup in cooling towers

    SciTech Connect

    Barzuza, I.

    1995-10-01

    The quality of water passing through a cooling tower affects its operation and performance as a heat exchanger. Since evaporative cooling is usually the primary mode of operation, any dirt or solid impurity in the water tends to become concentrated in the closed-cycle tower as the water is evaporated. To reduce the buildup of impurities and thus minimize fouling, the cooling tower is periodically or continuously discharged or blown down and fresh makeup water added. An effective technique used to further minimize dirt load is to install a filter on a side stream of the tower. But it is often difficult to prove any cost justification for a particular type of filtration equipment. Presented below is an algorithm to calculate the changes in solids load in a cooling tower after the installation of a filtration system of known performance. This calculation constitutes the first step toward full-fledged economic evaluation of a filter`s cost-effectiveness. Furthermore, a method is introduced to operate self-cleaning strainers installed on the side stream of a cooling tower. The method increases the removal efficiency of particles smaller than the mesh size of the filter cake.

  2. Minimally invasive treatment options in fixed prosthodontics.

    PubMed

    Edelhoff, Daniel; Liebermann, Anja; Beuer, Florian; Stimmelmayr, Michael; Güth, Jan-Frederik

    2016-03-01

    Minimally invasive treatment options have become increasingly feasible in restorative dentistry, due to the introduction of the adhesive technique in combination with restorative materials featuring translucent properties similar to those of natural teeth. Mechanical anchoring of restorations via conventional cementation represents a predominantly subtractive treatment approach that is gradually being superseded by a primarily defect-oriented additive method in prosthodontics. Modifications of conventional treatment procedures have led to the development of an economical approach to the removal of healthy tooth structure. This is possible because the planned treatment outcome is defined in a wax-up before the treatment is commenced and this wax-up is subsequently used as a reference during tooth preparation. Similarly, resin- bonded FDPs and implants have made it possible to preserve the natural tooth structure of potential abutment teeth. This report describes a number of clinical cases to demonstrate the principles of modern prosthetic treatment strategies and discusses these approaches in the context of minimally invasive prosthetic dentistry.

  3. Navy Shipboard Hazardous Material Minimization Program

    SciTech Connect

    Bieberich, M.J.; Robinson, P.; Chastain, B.

    1994-12-31

    The use of hazardous (and potentially hazardous) materials in shipboard cleaning applications has proliferated as new systems and equipments have entered the fleet to reside alongside existing equipments. With the growing environmental awareness (and additional, more restrictive regulations) at all levels/echelon commands of the DoD, the Navy has initiated a proactive program to undertake the minimization/elimination of these hazardous materials in order to eliminate HMs at the source. This paper will focus on the current Shipboard Hazardous Materials Minimization Program initiatives including the identification of authorized HM currently used onboard, identification of potential substitute materials for HM replacement, identification of new cleaning technologies and processes/procedures, and identification of technical documents which will require revision to eliminate the procurement of HMs into the federal supply system. Also discussed will be the anticipated path required to implement the changes into the fleet and automated decision processes (substitution algorithm) currently employed. The paper will also present the most recent technologies identified for approval or additional testing and analysis including: supercritical CO{sub 2} cleaning, high pressure blasting (H{sub 2}O + baking soda), aqueous and semi-aqueous cleaning materials and processes, solvent replacements and dedicated parts washing systems with internal filtering capabilities, automated software for solvent/cleaning process substitute selection. Along with these technological advances, data availability (from on-line databases and CDROM Database libraries) will be identified and discussed.

  4. Surgical efficacy of minimally invasive thoracic discectomy.

    PubMed

    Elhadi, Ali M; Zehri, Aqib H; Zaidi, Hasan A; Almefty, Kaith K; Preul, Mark C; Theodore, Nicholas; Dickman, Curtis A

    2015-11-01

    We aimed to determine the clinical indications and surgical outcomes for thoracoscopic discectomy. Thoracic disc disease is a rare degenerative process. Thoracoscopic approaches serve to minimize tissue injury during the approach, but critics argue that this comes at the cost of surgical efficacy. Current reports in the literature are limited to small institutional patient series. We systematically identified all English language articles on thoracoscopic discectomy with at least two patients, published from 1994 to 2013 on MEDLINE, Science Direct, and Google Scholar. We analyzed 12 articles that met the inclusion criteria, five prospective and seven retrospective studies comprising 545 surgical patients. The overall complication rate was 24% (n=129), with reported complications ranging from intercostal neuralgia (6.1%), atelectasis (2.8%), and pleural effusion (2.6%), to more severe complications such as pneumonia (0.8%), pneumothorax (1.3%), and venous thrombosis (0.2%). The average reported postoperative follow-up was 20.5 months. Complete resolution of symptoms was reported in 79% of patients, improvement with residual symptoms in 10.2%, no change in 9.6%, and worsening in 1.2%. The minimally invasive endoscopic approaches to the thoracic spine among selected patients demonstrate excellent clinical efficacy and acceptable complication rates, comparable to the open approaches. Disc herniations confined to a single level, with small or no calcifications, are ideal for such an approach, whereas patients with calcified discs adherent to the dura would benefit from an open approach.

  5. Utilization of biocatalysts in cellulose waste minimization

    SciTech Connect

    Woodward, J.; Evans, B.R.

    1996-09-01

    Cellulose, a polymer of glucose, is the principal component of biomass and, therefore, a major source of waste that is either buried or burned. Examples of biomass waste include agricultural crop residues, forestry products, and municipal wastes. Recycling of this waste is important for energy conservation as well as waste minimization and there is some probability that in the future biomass could become a major energy source and replace fossil fuels that are currently used for fuels and chemicals production. It has been estimated that in the United States, between 100-450 million dry tons of agricultural waste are produced annually, approximately 6 million dry tons of animal waste, and of the 190 million tons of municipal solid waste (MSW) generated annually, approximately two-thirds is cellulosic in nature and over one-third is paper waste. Interestingly, more than 70% of MSW is landfilled or burned, however landfill space is becoming increasingly scarce. On a smaller scale, important cellulosic products such as cellulose acetate also present waste problems; an estimated 43 thousand tons of cellulose ester waste are generated annually in the United States. Biocatalysts could be used in cellulose waste minimization and this chapter describes their characteristics and potential in bioconversion and bioremediation processes.

  6. Minimally invasive thyroidectomy (MIT): indications and results.

    PubMed

    Docimo, Giovanni; Salvatore Tolone, Salvatore; Gili, Simona; d'Alessandro, A; Casalino, G; Brusciano, L; Ruggiero, Roberto; Docimo, Ludovico

    2013-01-01

    To establish if the indication for different approaches for thyroidectomy and the incision length provided by means of pre-operative assessment of gland volume and size of nodules resulted in safe and effective outcomes and in any notable aesthetic or quality-of-life impact on patients. Ninehundred eightytwo consecutive patients, undergoing total thyroidectomy, were enrolled. The thyroid volume and maximal nodule diameter were measured by means of ultrasounds. Based on ultrasounds findings, patients were divided into three groups: minimally invasive video assisted thyroidectomy (MIVAT), minimally invasive thyroidectomy (MIT) and conventional thyroidectomy (CT) groups. The data concerning the following parameters were collected: operative time, postoperative complications, postoperative pain and cosmetic results. The MIVAT group included 179 patients, MIT group included 592 patients and CT group included 211 patients. Incidence of complications did not differ significantly in each group. In MIVAT and MIT group, the perception of postoperative pain was less intense than CT group. The patients in the MIVAT (7±1.5) and MIT (8±2) groups were more satisfied with the cosmetic results than those in CT group (5±1.3) (p= <0.05). The MIT is a technique totally reproducible, and easily convertible to perform surgical procedures in respect of the patient, without additional complications, increased costs, and with better aesthetic results.

  7. Singlet-stabilized minimal gauge mediation

    SciTech Connect

    Curtin, David; Tsai, Yuhsin

    2011-04-01

    We propose singlet-stabilized minimal gauge mediation as a simple Intriligator, Seiberg and Shih-based model of direct gauge mediation which avoids both light gauginos and Landau poles. The hidden sector is a massive s-confining supersymmetric QCD that is distinguished by a minimal SU(5) flavor group. The uplifted vacuum is stabilized by coupling the meson to an additional singlet sector with its own U(1) gauge symmetry via nonrenormalizable interactions suppressed by a higher scale {Lambda}{sub UV} in the electric theory. This generates a nonzero vacuum expectation value for the singlet meson via the inverted hierarchy mechanism, but requires tuning to a precision {approx}({Lambda}/{Lambda}{sub UV}){sup 2}, which is {approx}10{sup -4}. In the course of this analysis we also outline some simple model-building rules for stabilizing uplifted-ISS models, which lead us to conclude that meson deformations are required (or at least heavily favored) to stabilize the adjoint component of the magnetic meson.

  8. Osmosis in a minimal model system

    NASA Astrophysics Data System (ADS)

    Lion, Thomas W.; Allen, Rosalind J.

    2012-12-01

    Osmosis is one of the most important physical phenomena in living and soft matter systems. While the thermodynamics of osmosis is well understood, the underlying microscopic dynamical mechanisms remain the subject of discussion. Unravelling these mechanisms is a prerequisite for understanding osmosis in non-equilibrium systems. Here, we investigate the microscopic basis of osmosis, in a system at equilibrium, using molecular dynamics simulations of a minimal model in which repulsive solute and solvent particles differ only in their interactions with an external potential. For this system, we can derive a simple virial-like relation for the osmotic pressure. Our simulations support an intuitive picture in which the solvent concentration gradient, at osmotic equilibrium, arises from the balance between an outward force, caused by the increased total density in the solution, and an inward diffusive flux caused by the decreased solvent density in the solution. While more complex effects may occur in other osmotic systems, our results suggest that they are not required for a minimal picture of the dynamic mechanisms underlying osmosis.

  9. Flavored dark matter beyond Minimal Flavor Violation

    SciTech Connect

    Agrawal, Prateek; Blanke, Monika; Gemmler, Katrin

    2014-10-13

    We study the interplay of flavor and dark matter phenomenology for models of flavored dark matter interacting with quarks. We allow an arbitrary flavor structure in the coupling of dark matter with quarks. This coupling is assumed to be the only new source of violation of the Standard Model flavor symmetry extended by a U(3) χ associated with the dark matter. We call this ansatz Dark Minimal Flavor Violation (DMFV) and highlight its various implications, including an unbroken discrete symmetry that can stabilize the dark matter. As an illustration we study a Dirac fermionic dark matter χ which transforms as triplet under U(3) χ , and is a singlet under the Standard Model. The dark matter couples to right-handed down-type quarks via a colored scalar mediator Φ with a coupling λ. We identify a number of “flavor-safe” scenarios for the structure of λ which are beyond Minimal Flavor Violation. Also, for dark matter and collider phenomenology we focus on the well-motivated case of b-flavored dark matter. Furthermore, the combined flavor and dark matter constraints on the parameter space of λ turn out to be interesting intersections of the individual ones. LHC constraints on simplified models of squarks and sbottoms can be adapted to our case, and monojet searches can be relevant if the spectrum is compressed.

  10. Gamma ray tests of Minimal Dark Matter

    SciTech Connect

    Cirelli, Marco; Sala, Filippo; Taoso, Marco; Hambye, Thomas; Panci, Paolo E-mail: thambye@ulb.ac.be E-mail: filippo.sala@cea.fr

    2015-10-01

    We reconsider the model of Minimal Dark Matter (a fermionic, hypercharge-less quintuplet of the EW interactions) and compute its gamma ray signatures. We compare them with a number of gamma ray probes: the galactic halo diffuse measurements, the galactic center line searches and recent dwarf galaxies observations. We find that the original minimal model, whose mass is fixed at 9.4 TeV by the relic abundance requirement, is constrained by the line searches from the Galactic Center: it is ruled out if the Milky Way possesses a cuspy profile such as NFW but it is still allowed if it has a cored one. Observations of dwarf spheroidal galaxies are also relevant (in particular searches for lines), and ongoing astrophysical progresses on these systems have the potential to eventually rule out the model. We also explore a wider mass range, which applies to the case in which the relic abundance requirement is relaxed. Most of our results can be safely extended to the larger class of multi-TeV WIMP DM annihilating into massive gauge bosons.

  11. Environmental projects. Volume 16: Waste minimization assessment

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The Goldstone Deep Space Communications Complex (GDSCC), located in the MoJave Desert, is part of the National Aeronautics and Space Administration's (NASA's) Deep Space Network (DSN), the world's largest and most sensitive scientific telecommunications and radio navigation network. The Goldstone Complex is operated for NASA by the Jet Propulsion Laboratory. At present, activities at the GDSCC support the operation of nine parabolic dish antennas situated at five separate locations known as 'sites.' Each of the five sites at the GDSCC has one or more antennas, called 'Deep Space Stations' (DSS's). In the course of operation of these DSS's, various hazardous and non-hazardous wastes are generated. In 1992, JPL retained Kleinfelder, Inc., San Diego, California, to quantify the various streams of hazardous and non-hazardous wastes generated at the GDSCC. In June 1992, Kleinfelder, Inc., submitted a report to JPL entitled 'Waste Minimization Assessment.' This present volume is a JPL-expanded version of the Kleinfelder, Inc. report. The 'Waste Minimization Assessment' report did not find any deficiencies in the various waste-management programs now practiced at the GDSCC, and it found that these programs are being carried out in accordance with environmental rules and regulations.

  12. Minimally invasive "pocket incision" aortic valve surgery.

    PubMed

    Yakub, M A; Pau, K K; Awang, Y

    1999-02-01

    A minimally invasive approach to aortic valve surgery through a transverse incision ("pocket incision") at the right second intercostal space was examined. Sixteen patients with a mean age of 30 years underwent this approach. The third costal cartilage was either excised (n = 5) or dislocated (n = 11). The right internal mammary artery was preserved. Cardiopulmonary bypass (CPB) was established with aortic-right atrial cannulation in all except the first case. Aortic valve replacements (AVR) were performed in 15 patients and one had aortic valve repair with concomitant ventricular septal defect closure. There was no mortality and no major complications. The aortic cross-clamp, CPB and operative times were 72 +/- 19 mins, 105 +/- 26 mins and 3 hrs 00 min +/- 29 mins respectively. The mean time to extubation was 5.7 +/- 4.0 hrs, ICU stay of 27 +/- 9 hrs and postoperative hospital stay of 5.1 +/- 1.2 days. Minimally invasive "pocket incision" aortic valve surgery is technically feasible and safe. It has the advantages of central cannulation for CPB, preservation of the internal mammary artery and avoiding sternotomy. This approach is cosmetically acceptable and allows rapid patient recovery.

  13. Flavored dark matter beyond Minimal Flavor Violation

    DOE PAGES

    Agrawal, Prateek; Blanke, Monika; Gemmler, Katrin

    2014-10-13

    We study the interplay of flavor and dark matter phenomenology for models of flavored dark matter interacting with quarks. We allow an arbitrary flavor structure in the coupling of dark matter with quarks. This coupling is assumed to be the only new source of violation of the Standard Model flavor symmetry extended by a U(3) χ associated with the dark matter. We call this ansatz Dark Minimal Flavor Violation (DMFV) and highlight its various implications, including an unbroken discrete symmetry that can stabilize the dark matter. As an illustration we study a Dirac fermionic dark matter χ which transforms asmore » triplet under U(3) χ , and is a singlet under the Standard Model. The dark matter couples to right-handed down-type quarks via a colored scalar mediator Φ with a coupling λ. We identify a number of “flavor-safe” scenarios for the structure of λ which are beyond Minimal Flavor Violation. Also, for dark matter and collider phenomenology we focus on the well-motivated case of b-flavored dark matter. Furthermore, the combined flavor and dark matter constraints on the parameter space of λ turn out to be interesting intersections of the individual ones. LHC constraints on simplified models of squarks and sbottoms can be adapted to our case, and monojet searches can be relevant if the spectrum is compressed.« less

  14. Gamma ray tests of Minimal Dark Matter

    SciTech Connect

    Cirelli, Marco; Hambye, Thomas; Panci, Paolo; Sala, Filippo; Taoso, Marco

    2015-10-12

    We reconsider the model of Minimal Dark Matter (a fermionic, hypercharge-less quintuplet of the EW interactions) and compute its gamma ray signatures. We compare them with a number of gamma ray probes: the galactic halo diffuse measurements, the galactic center line searches and recent dwarf galaxies observations. We find that the original minimal model, whose mass is fixed at 9.4 TeV by the relic abundance requirement, is constrained by the line searches from the Galactic Center: it is ruled out if the Milky Way possesses a cuspy profile such as NFW but it is still allowed if it has a cored one. Observations of dwarf spheroidal galaxies are also relevant (in particular searches for lines), and ongoing astrophysical progresses on these systems have the potential to eventually rule out the model. We also explore a wider mass range, which applies to the case in which the relic abundance requirement is relaxed. Most of our results can be safely extended to the larger class of multi-TeV WIMP DM annihilating into massive gauge bosons.

  15. One hospital's road to waste minimization.

    PubMed

    Hooper, D M

    1994-05-01

    There are many new and exciting waste minimization programs being offered to healthcare facilities. Companies are now making reusable operating packs and gowns that are more efficient than disposables. The selling point is that the system will save healthcare money! The reusable programs do save disposal costs for an institution. Shore Memorial has scheduled a trial evaluation for reusable operating room linens to begin May 1, 1994. The concept has not been difficult to sell to physicians and staff. Perhaps this is because people are generally more aware of their environment and the reasons why it should be protected. The hospital will also be evaluating an IV bottle and bag recycling program. The New Jersey Department of Environmental Protection Agency has given approval to proceed with this type of recycling program, and Shore Memorial is in the process of scheduling this trial program with a local vendor. Waste reduction and recycling in healthcare settings will continue to be challenging because of the diversity of the wastestream and the changing environment facing healthcare. Certainly, healthcare has as much of a responsibility to the well-being of patients as it does to keeping the environment healthy. Returning to the "old way" of doing things, such as reusables, does not have a negative impact on people, but it does have an impact on the environment. Shore Memorial believes it is moving in the right direction with its waste minimization program to make a positive environmental impact.

  16. Direct solution to the minimal generalized pose.

    PubMed

    Miraldo, Pedro; Araujo, Helder

    2015-03-01

    Pose estimation is a relevant problem for imaging systems whose applications range from augmented reality to robotics. In this paper we propose a novel solution for the minimal pose problem, within the framework of generalized camera models and using a planar homography. Within this framework and considering only the geometric elements of the generalized camera models, an imaging system can be modeled by a set of mappings associating image pixels to 3-D straight lines. This mapping is defined in a 3-D world coordinate system. Pose estimation performs the computation of the rigid transformation between the original 3-D world coordinate system and the one in which the camera was calibrated. Using synthetic data, we compare the proposed minimal-based method with the state-of-the-art methods in terms of numerical errors, number of solutions and processing time. From the experiments, we conclude that the proposed method performs better, especially because there is a smaller variation in numerical errors, while results are similar in terms of number of solutions and computation time. To further evaluate the proposed approach we tested our method with real data. One of the relevant contributions of this paper is theoretical. When compared to the state-of-the-art approaches, we propose a completely new parametrization of the problem that can be solved in four simple steps. In addition, our approach does not require any predefined transformation of the dataset, which yields a simpler solution for the problem.

  17. [Theory and practice of minimally invasive endodontics].

    PubMed

    Jiang, H W

    2016-08-01

    The primary goal of modern endodontic therapy is to achieve the long-term retention of a functional tooth by preventing or treating pulpitis or apical periodontitis is. The long-term retention of endodontically treated tooth is correlated with the remaining amount of tooth tissue and the quality of the restoration after root canal filling. In recent years, there has been rapid progress and development in the basic research of endodontic biology, instrument and applied materials, making treatment procedures safer, more accurate, and more efficient. Thus, minimally invasive endodontics(MIE)has received increasing attention at present. MIE aims to preserve the maximum of tooth structure during root canal therapy, and the concept covers the whole process of diagnosis and treatment of teeth. This review article focuses on describing the minimally invasive concepts and operating essentials in endodontics, from diagnosis and treatment planning to the access opening, pulp cavity finishing, root canal cleaning and shaping, 3-dimensional root canal filling and restoration after root canal treatment.

  18. Minimally Invasive Laminectomy in Spondylolisthetic Lumbar Stenosis

    PubMed Central

    Caralopoulos, Ilias N.; Bui, Cuong J.

    2014-01-01

    Background Degenerative lumbar stenosis associated with spondylolisthesis is common in elderly patients. The most common symptoms are those of neurogenic claudication with leg pain. Surgery is indicated for those who fail conservative management. The generally accepted recommendation is to perform a laminectomy and a fusion at the involved level. Methods We reviewed our results for minimally invasive single-level decompression without fusion performed by the senior author in patients with symptomatic lumbar stenosis with spondylolisthesis with no dynamic instability from 2008 to 2011 at a single institution. Outcomes were measured using the visual analog scale (VAS), Prolo Economic Functional Rating Scale, and revised Oswestry Disability Index (ODI) at initial presentation and at 3-month, 6-month, and 1-year follow-up time points. Results Records for 28 patients (19 males, 9 females) were reviewed. The success rate, defined as improvement in pain and functional outcome without the need for surgical fusion, was 86%. VAS scores decreased by 6.3 points, Prolo scores increased by 3.5 points, and the ODI decreased by 31% at 1 year. All changes were statistically significant. Conclusion Minimally invasive decompression alone can be a reasonable alternative to decompression and fusion for patients with spondylolisthetic lumbar stenosis and neurogenic claudication with leg pain. Decompression without fusion should be considered for older patients and for patients who are not ideal fusion candidates. PMID:24688331

  19. Minimal size of a barchan dune.

    PubMed

    Parteli, E J R; Durán, O; Herrmann, H J

    2007-01-01

    Barchans are dunes of high mobility which have a crescent shape and propagate under conditions of unidirectional wind. However, sand dunes only appear above a critical size, which scales with the saturation distance of the sand flux [P. Hersen, S. Douady, and B. Andreotti, Phys. Rev. Lett. 89, 264301 (2002); B. Andreotti, P. Claudin, and S. Douady, Eur. Phys. J. B 28, 321 (2002); G. Sauermann, K. Kroy, and H. J. Herrmann, Phys. Rev. E 64, 31305 (2001)]. It has been suggested by P. Hersen, S. Douady, and B. Andreotti, Phys. Rev. Lett. 89, 264301 (2002)] that this flux fetch distance is itself constant. Indeed, this could not explain the protosize of barchan dunes, which often occur in coastal areas of high litoral drift, and the scale of dunes on Mars. In the present work, we show from three-dimensional calculations of sand transport that the size and the shape of the minimal barchan dune depend on the wind friction speed and the sand flux on the area between dunes in a field. Our results explain the common appearance of barchans a few tens of centimeter high which are observed along coasts. Furthermore, we find that the rate at which grains enter saltation on Mars is one order of magnitude higher than on Earth, and is relevant to correctly obtain the minimal dune size on Mars.

  20. Singlet-stabilized minimal gauge mediation

    NASA Astrophysics Data System (ADS)

    Curtin, David; Tsai, Yuhsin

    2011-04-01

    We propose singlet-stabilized minimal gauge mediation as a simple Intriligator, Seiberg and Shih-based model of direct gauge mediation which avoids both light gauginos and Landau poles. The hidden sector is a massive s-confining supersymmetric QCD that is distinguished by a minimal SU(5) flavor group. The uplifted vacuum is stabilized by coupling the meson to an additional singlet sector with its own U(1) gauge symmetry via nonrenormalizable interactions suppressed by a higher scale ΛUV in the electric theory. This generates a nonzero vacuum expectation value for the singlet meson via the inverted hierarchy mechanism, but requires tuning to a precision ˜(Λ/ΛUV)2, which is ˜10-4. In the course of this analysis we also outline some simple model-building rules for stabilizing uplifted-ISS models, which lead us to conclude that meson deformations are required (or at least heavily favored) to stabilize the adjoint component of the magnetic meson.