2,443 research outputs found
Modularity and community detection in bipartite networks
The modularity of a network quantifies the extent, relative to a null model
network, to which vertices cluster into community groups. We define a null
model appropriate for bipartite networks, and use it to define a bipartite
modularity. The bipartite modularity is presented in terms of a modularity
matrix B; some key properties of the eigenspectrum of B are identified and used
to describe an algorithm for identifying modules in bipartite networks. The
algorithm is based on the idea that the modules in the two parts of the network
are dependent, with each part mutually being used to induce the vertices for
the other part into the modules. We apply the algorithm to real-world network
data, showing that the algorithm successfully identifies the modular structure
of bipartite networks.Comment: RevTex 4, 11 pages, 3 figures, 1 table; modest extensions to conten
Trainâtheâtrainer: Methodology to learn the cognitive interview
Research has indicated that police may not receive enough training in interviewing cooperative witnesses, specifically in use of the cognitive interview (CI). Practically, for the CI to be effective in realâworld investigations, police investigators must be trained by law enforcement trainers. We conducted a threeâphase experiment to examine the feasibility of training experienced law enforcement trainers who would then train others to conduct the CI. We instructed Federal Bureau of Investigation and local law enforcement trainers about the CI (Phase I); law enforcement trainers from both agencies (n = 4, 100% male, mean age = 50 years) instructed university students (n = 25, 59% female, mean age = 21 years) to conduct either the CI or a standard law enforcement interview (Phase II); the student interviewers then interviewed other student witnesses (n = 50, 73% female, mean age = 22 years), who had watched a simulated crime (phase III). Compared with standard training, interviews conducted by those trained by CIâtrained instructors contained more information and at a higher accuracy rate and with fewer suggestive questions.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/147804/1/jip1518_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/147804/2/jip1518.pd
DDR2 expression in cancer-associated fibroblasts promotes ovarian cancer tumor invasion and metastasis through periostin-ITGB1
Ovarian cancer has the highest mortality of all gynecologic malignancies. As such, there is a need to identify molecular mechanisms that underlie tumor metastasis in ovarian cancer. Increased expression of receptor tyrosine kinase, DDR2, has been associated with worse patient survival. Identifying downstream targets of DDR2 may allow specific modulation of ovarian cancer metastatic pathways. Additionally, stromal cells play a critical role in metastasis. The crosstalk between tumor and stromal cells can lead to tumor progression. We first identified that tumor cells co-cultured with DDR2-expressing fibroblasts had lower periostin expression when compared to tumor cells co-cultured with DDR2-depleted fibroblasts. We confirmed that DDR2 regulates POSTN expression in ovarian cancer-associated fibroblasts (CAFs). We found that mesothelial cell clearance and invasion by tumor cells were enhanced three-fold when DDR2 and POSTN-expressing CAFs were present compared to DDR2 and POSTN-depleted CAFs. Furthermore, DDR2-depleted and POSTN-overexpressing CAFs co-injected with ovarian tumor cells had increased tumor burden compared to mice injected with tumor cells and DDR2 and POSTN-depleted CAFs. Furthermore, we demonstrated that DDR2 regulates periostin expression through integrin B1 (ITGB1). Stromal DDR2 is highly correlated with stromal POSTN expression in ovarian cancer patient tumors. Thus, DDR2 expression in CAFs regulates the steps of ovarian cancer metastasis through periostin
Near-infrared thermal emissivity from ground based atmospheric dust measurements at ORM
We present an analysis of the atmospheric content of aerosols measured at
Observatorio del Roque de los Muchachos (ORM; Canary Islands). Using a laser
diode particle counter located at the Telescopio Nazionale Galileo (TNG) we
have detected particles of 0.3, 0.5, 1.0, 3.0, 5.0 and 10.0 um size. The
seasonal behavior of the dust content in the atmosphere is calculated. The
Spring has been found to be dustier than the Summer, but dusty conditions may
also occur in Winter. A method to estimate the contribution of the aerosols
emissivity to the sky brightness in the near-infrared (NIR) is presented. The
contribution of dust emission to the sky background in the NIR has been found
to be negligible comparable to the airglow, with a maximum contribution of
about 8-10% in the Ks band in the dusty days.Comment: 6 pages, 3 figures, 6 tables, accepted for publication in MNRA
The Peculiar Phase Structure of Random Graph Bisection
The mincut graph bisection problem involves partitioning the n vertices of a
graph into disjoint subsets, each containing exactly n/2 vertices, while
minimizing the number of "cut" edges with an endpoint in each subset. When
considered over sparse random graphs, the phase structure of the graph
bisection problem displays certain familiar properties, but also some
surprises. It is known that when the mean degree is below the critical value of
2 log 2, the cutsize is zero with high probability. We study how the minimum
cutsize increases with mean degree above this critical threshold, finding a new
analytical upper bound that improves considerably upon previous bounds.
Combined with recent results on expander graphs, our bound suggests the unusual
scenario that random graph bisection is replica symmetric up to and beyond the
critical threshold, with a replica symmetry breaking transition possibly taking
place above the threshold. An intriguing algorithmic consequence is that
although the problem is NP-hard, we can find near-optimal cutsizes (whose ratio
to the optimal value approaches 1 asymptotically) in polynomial time for
typical instances near the phase transition.Comment: substantially revised section 2, changed figures 3, 4 and 6, made
minor stylistic changes and added reference
Universality in solar flare and earthquake occurrence
Earthquakes and solar flares are phenomena involving huge and rapid releases
of energy characterized by complex temporal occurrence. By analysing available
experimental catalogs, we show that the stochastic processes underlying these
apparently different phenomena have universal properties. Namely both problems
exhibit the same distributions of sizes, inter-occurrence times and the same
temporal clustering: we find afterflare sequences with power law temporal
correlations as the Omori law for seismic sequences. The observed universality
suggests a common approach to the interpretation of both phenomena in terms of
the same driving physical mechanism
Sorting apples from oranges in single-cell expression comparisons.
Two methods for comparing single-cell expression datasets help address the challenge of integrating data across conditions and experiments
Provider Responses to Patients Controlling Access to their Electronic Health Records: A Prospective Cohort Study in Primary Care
Introduction: Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data.
Methods: We designed a program that captures patientsâ preferences for provider access to an urban health systemâs EHR. Patients could allow or restrict providersâ access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patientsâ preferences. Providers could âBreak the Glassâ to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users âBroke the Glass,â and surveyed providers about their experiences and opinions.
Results: Eight of 9 eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program.. Providers did not know which of their patients were enrolled and nor their preferences for accessing their EHRs. During the six-month prospective study, 92 study patients (88%) returned 261 times during which providers viewed their EHRs 126 times (48%). Providers âbroke the glassâ 102 times, 92 times for patients not in the study and 10 times for 6 returning study patients, all of whom had restricted EHR access. Providers âbroke the glassâ for 6 (14%) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p=0.01). Although 54% of providers agreed that patients should have control over who sees their EHR information, 58% believed restricting EHR access could harm provider-patient relationships and 71% felt quality of care would suffer.
Conclusions: Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patientsâ preferences to view hidden data. Providers believed restricting EHR access would adversely impact patient care. Applying Fair Information Practice principles to EHRs will require balancing patient preferences, providersâ needs, and health care quality.This study was supported in part by grant number 90HT005 from the Office of the National Coordinator for Health Information Technology (ONC) to the Indiana Health Information Technology Corporation. The opinions expressed in this work are the authorsâ and do not necessarily reflect the positions of ONC, IHIT, Eskenazi Health, Indiana University, or the Regenstrief Institute, Inc
Career and leadership development in the field of violence and abuse
PowerPoint PresentationConference Theme: Future Without Violencepostprin
- âŠ