188 research outputs found

    From liminoid to limivoid: Understanding contemporary bungee jumping from a cross-cultural perspective

    Get PDF
    This article is about bungee jumping and how it reflects the world in which we live. During the 1980s bungee jumping became one of the most popular ways of seeking a ‘real experience’, when the practice was commercialised and introduced as a leisure activity all around the world. This happened in the same period as outdoor sport activities or ‘outdoor recreation’ exploded in kinds and numbers, clearly linked to the ‘experiential turn in tourism’ and the proliferation of ‘adventure tourism’. A key feature of these activities is the experience of danger: going to the limits, or indeed, standing on the limit. Hence, bungee jumping can be seen as an apt metaphor for understanding liminality in contemporary tourism and leisure. The bungee jumping adventure quite literally positions the subject standing on an edge, facing an abyss, jumping into a void. But what kind of limit experiences are these? This question can be addressed, we argue, by matching contemporary bungee jumping experiences against practices of jumping rituals in non-modern societies, which seem to contain some common features with the modern bungee jump. In contrast to more ‘classical’ ritual passages, contemporary bungee jumping is clearly an example of what Turner called the liminoid. Furthermore, it can be argued that insofar as these experiences involve no transformation of subjectivity or no passage to the ‘other world’, bungee jumping signifies a further shift from the liminoid to what we call the ‘limivoid’: the inciting of near-death experiences, a jump into nothingness, a desperate search for experience in a world of ontological excess

    Private Aggregation from Fewer Anonymous Messages

    Get PDF
    Consider the setup where nn parties are each given a number xiFqx_i \in \mathbb{F}_q and the goal is to compute the sum ixi\sum_i x_i in a secure fashion and with as little communication as possible. We study this problem in the anonymized model of Ishai et al. (FOCS 2006) where each party may broadcast anonymous messages on an insecure channel. We present a new analysis of the one-round "split and mix" protocol of Ishai et al. In order to achieve the same security parameter, our analysis reduces the required number of messages by a Θ(logn)\Theta(\log n) multiplicative factor. We complement our positive result with lower bounds showing that the dependence of the number of messages on the domain size, the number of parties, and the security parameter is essentially tight. Using a reduction of Balle et al. (2019), our improved analysis of the protocol of Ishai et al. yields, in the same model, an (ε,δ)\left(\varepsilon, \delta\right)-differentially private protocol for aggregation that, for any constant ε>0\varepsilon > 0 and any δ=1poly(n)\delta = \frac{1}{\mathrm{poly}(n)}, incurs only a constant error and requires only a constant number of messages per party. Previously, such a protocol was known only for Ω(logn)\Omega(\log n) messages per party.Comment: 31 pages; 1 tabl

    Can Weakness in End-Range Plantar Flexion After Achilles Tendon Repair Be Prevented?

    Get PDF
    Background: Disproportionate end-range plantar flexion weakness, decreased passive stiffness, and inability to perform a heel rise on a decline after Achilles tendon repair are thought to reflect increased tendon compliance or tendon lengthening. Since this was first noted, we have performed stronger repairs and avoided stretching into dorsiflexion for the first 12 weeks after surgery. Hypothesis: Using stronger repairs and avoiding stretching into dorsiflexion would eliminate end-range plantar flexion weakness and normalize passive stiffness. Study Design: Case series; Level of evidence, 4. Methods: Achilles repairs with epitendinous augmentation were performed on 18 patients. Plantar flexion torque, dorsiflexion range of motion (ROM), passive joint stiffness, and standing single-legged heel rise on a decline were assessed at 43 ± 24 months after surgery (range, 9 months to 8 years). Maximum isometric plantar flexion torque was measured at 20° and 10° of dorsiflexion, neutral position, and 10° and 20° of plantar flexion. Passive dorsiflexion ROM was measured with a goniometer. Passive joint stiffness was computed from the increase in passive torque from 10° to 20° of dorsiflexion. Tendon thickness was measured by use of digital calipers. Plantar flexion electromyographic (EMG) data were recorded during strength and functional tests. Analysis of variance and chi-square tests were used to assess weakness and function. Results: Marked weakness was evident on the involved side at 20° of plantar flexion (deficit, 26% ± 18%; Conclusion: The use of stronger repair techniques and attempts to limit tendon elongation by avoiding dorsiflexion stretching did not eliminate weakness in end-range plantar flexion. EMG data confirmed that end-range weakness was not due to neural inhibition. Physiological changes that alter the force transmission capability of the healing tendon may be responsible for this continued impairment. This weakness has implications for high-demand jumping and sprinting after Achilles tendon repair

    On the Round Complexity of the Shuffle Model

    Get PDF
    The shuffle model of differential privacy was proposed as a viable model for performing distributed differentially private computations. Informally, the model consists of an untrusted analyzer that receives messages sent by participating parties via a shuffle functionality, the latter potentially disassociates messages from their senders. Prior work focused on one-round differentially private shuffle model protocols, demonstrating that functionalities such as addition and histograms can be performed in this model with accuracy levels similar to that of the curator model of differential privacy, where the computation is performed by a fully trusted party. Focusing on the round complexity of the shuffle model, we ask in this work what can be computed in the shuffle model of differential privacy with two rounds. Ishai et al. [FOCS 2006] showed how to use one round of the shuffle to establish secret keys between every two parties. Using this primitive to simulate a general secure multi-party protocol increases its round complexity by one. We show how two parties can use one round of the shuffle to send secret messages without having to first establish a secret key, hence retaining round complexity. Combining this primitive with the two-round semi-honest protocol of Applebaun et al. [TCC 2018], we obtain that every randomized functionality can be computed in the shuffle model with an honest majority, in merely two rounds. This includes any differentially private computation. We then move to examine differentially private computations in the shuffle model that (i) do not require the assumption of an honest majority, or (ii) do not admit one-round protocols, even with an honest majority. For that, we introduce two computational tasks: the common-element problem and the nested-common-element problem, for which we show separations between one-round and two-round protocols

    Increase Productivity Through Knowledge Management

    Get PDF
    Increase in competition level requires companies to improve the efficiency of work force use characterized by labor productivity. Professional knowledge of staff and its experience play the key role in it. The results of Extrusion Line operator's working time analysis are performed in this article. The analysis revealed that the reasons of working time ineffective use connected with inadequate information exchange and knowledge management in the company. Authors suggest the way to solve this problem: the main sources of knowledge in engineering enterprise have been defined, the conditions of success and the stages of knowledge management control have been stated

    Genome sequences of anelloviruses, a genomovirus, microviruses, polyomaviruses, and an unclassified caudovirus identified in vaginal secretions from South African adolescents

    Get PDF
    Other than for papillomaviruses, there is a paucity of whole-genome sequences for bacteriophages and eukaryote-infecting viruses isolated from the female genital tract. Here, we report the genome sequences of 16 microviruses, 3 anelloviruses, 2 polyomaviruses, 1 genomovirus, and 1 caudovirus that were identified in vaginal secretion samples from adolescents in South Africa

    A RT-qPCR system using a degenerate probe for specific identification and differentiation of SARS-CoV-2 Omicron (B.1.1.529) variants of concern

    Get PDF
    Fast surveillance strategies are needed to control the spread of new emerging SARS-CoV-2 variants and gain time for evaluation of their pathogenic potential. This was essential for the Omicron variant (B.1.1.529) that replaced the Delta variant (B.1.617.2) and is currently the dominant SARS-CoV-2 variant circulating worldwide. RT-qPCR strategies complement whole genome sequencing, especially in resource lean countries, but mutations in the targeting primer and probe sequences of new emerging variants can lead to a failure of the existing RT-qPCRs. Here, we introduced an RT-qPCR platform for detecting the Delta- and the Omicron variant simultaneously using a degenerate probe targeting the key ΔH69/V70 mutation in the spike protein. By inclusion of the L452R mutation into the RT-qPCR platform, we could detect not only the Delta and the Omicron variants, but also the Omicron sub-lineages BA.1, BA.2 and BA.4/BA.5. The RT-qPCR platform was validated in small- and large-scale. It can easily be incorporated for continued monitoring of Omicron sub-lineages, and offers a fast adaption strategy of existing RT-qPCRs to detect new emerging SARS-CoV-2 variants using degenerate probes.</p

    Visiting the iron cage: Bureaucracy and the contemporary workplace

    Get PDF
    Bureaucracy as an organizational form has always been a controversial issue and placed at the very heart of most discussions within organizational theory. One side of this prolonged discussion praises this administrative form as the ‘rational’ way to run an organization. It provides needed guidance and clarifies responsibilities, which enables employees to become more efficient. However, the opposition claims that in a non-linear world, where industrial organizations are forced to confront the challenging task of sensing and responding to unpredictable, novel situations of highly competitive markets, such an organizational form stifles creativity, fosters de-motivation and causes pressure on employees. Dealing with a bureaucratic form of organization and its consequences begs for a context. It would be appropriate to quit ‘taking sides’ and develop a sound analysis of this phenomenon under the conditions of today’s global workplace environment. This chapter intends to delineate the conditions under which bureaucracy has emerged and the way it has been interpreted since its inception and develop a sound and appropriate analytical approach to its functioning given the prevailing conditions of the contemporary workplace.Publisher's VersionAuthor Post Prin

    A Unified Model of the GABA(A) Receptor Comprising Agonist and Benzodiazepine Binding Sites

    Get PDF
    We present a full-length α(1)β(2)γ(2) GABA receptor model optimized for agonists and benzodiazepine (BZD) allosteric modulators. We propose binding hypotheses for the agonists GABA, muscimol and THIP and for the allosteric modulator diazepam (DZP). The receptor model is primarily based on the glutamate-gated chloride channel (GluCl) from C. elegans and includes additional structural information from the prokaryotic ligand-gated ion channel ELIC in a few regions. Available mutational data of the binding sites are well explained by the model and the proposed ligand binding poses. We suggest a GABA binding mode similar to the binding mode of glutamate in the GluCl X-ray structure. Key interactions are predicted with residues α(1)R66, β(2)T202, α(1)T129, β(2)E155, β(2)Y205 and the backbone of β(2)S156. Muscimol is predicted to bind similarly, however, with minor differences rationalized with quantum mechanical energy calculations. Muscimol key interactions are predicted to be α(1)R66, β(2)T202, α(1)T129, β(2)E155, β(2)Y205 and β(2)F200. Furthermore, we argue that a water molecule could mediate further interactions between muscimol and the backbone of β(2)S156 and β(2)Y157. DZP is predicted to bind with interactions comparable to those of the agonists in the orthosteric site. The carbonyl group of DZP is predicted to interact with two threonines α(1)T206 and γ(2)T142, similar to the acidic moiety of GABA. The chlorine atom of DZP is placed near the important α(1)H101 and the N-methyl group near α(1)Y159, α(1)T206, and α(1)Y209. We present a binding mode of DZP in which the pending phenyl moiety of DZP is buried in the binding pocket and thus shielded from solvent exposure. Our full length GABA(A) receptor is made available as Model S1

    The international WAO/EAACI guideline for the management of hereditary angioedema—The 2021 revision and update

    Get PDF
    Hereditary angioedema (HAE) is a rare and disabling disease for which early diagnosis and effective therapy are critical. This revision and update of the global WAO/EAACI guideline on the diagnosis and management of HAE provides up-to-date guidance for the management of HAE. For this update and revision of the guideline, an international panel of experts reviewed the existing evidence, developed 28 recommendations, and established consensus by an online DELPHI process. The goal of these recommendations and guideline is to help physicians and their patients in making rational decisions in the management of HAE with deficient C1 inhibitor (type 1) and HAE with dysfunctional C1 inhibitor (type 2), by providing guidance on common and important clinical issues, such as: (1) How should HAE be diagnosed? (2) When should HAE patients receive prophylactic on top of on-demand treatment and what treatments should be used? (3) What are the goals of treatment? (4) Should HAE management be different for special HAE patient groups such as children or pregnant/breast-feeding women? and (5) How should HAE patients monitor their disease activity, impact, and control? It is also the intention of this guideline to help establish global standards for the management of HAE and to encourage and facilitate the use of recommended diagnostics and therapies for all patients
    corecore