338 research outputs found

    RHESSys: Regional Hydro-Ecologic Simulation System—An Object-Oriented Approach to Spatially Distributed Modeling of Carbon, Water, and Nutrient Cycling

    Get PDF
    Process-based models that can represent multiple and interacting processes provide a framework for combining field-based measurements with evolving science-based models of specific hydroecological processes. Use of these models, however, requires that the representation of processes and key assumptions involved be understood by the user community. This paper provides a full description of process implementation in the most recent version of the Regional Hydro-Ecological Simulation System (RHESSys), a model that has been applied in a wide variety of research settings. An overview of the underlying (Geographic Information System) GISbased model framework is given followed by a description of the mathematical models used to represent various biogeochemical cycling and hydrologic processes including vertical and lateral hydrologic fluxes, microclimate variability, canopy radiation transfer, vegetation and soil microbial carbon and nitrogen cycling. An example application of RHESSys for a small forested watershed as part of the Baltimore Long-Term Ecological Research site is included to illustrate use of the model in exploring spatial-temporal dynamics and the coupling between hydrology and biogeochemical cycling

    Balancing Uncertainty and Complexity to Incorporate Fire Spread in an Eco-Hydrological Model

    Get PDF
    Wildfire affects the ecosystem services of watersheds, and climate change will modify fire regimes and watershed dynamics. In many eco-hydrological simulations, fire is included as an exogenous force. Rarely are the bidirectional feedbacks between watersheds and fire regimes integrated in a simulation system because the eco-hydrological model predicts variables that are incompatible with the requirements of fire models. WMFire is a fire-spread model of intermediate complexity designed to be integrated with the Regional Hydro-ecological Simulation System (RHESSys). Spread in WMFire is based on four variables that (i) represent known influences on fire spread: litter load, relative moisture deficit, wind direction and topographic slope, and (ii) are derived directly from RHESSys outputs. The probability that a fire spreads from pixel to pixel depends on these variables as predicted by RHESSys. We tested a partial integration between WMFire and RHESSys on the Santa Fe (New Mexico) and the HJ Andrews (Oregon State) watersheds. Model assessment showed correspondence between expected spatial patterns of spread and seasonality in both watersheds. These results demonstrate the efficacy of an approach to link eco-hydrologic model outputs with a fire spread model. Future work will develop a fire effects module in RHESSys for a fully coupled, bidirectional model

    In the Interests of clients or commerce? Legal aid, supply, demand, and 'ethical indeterminacy' in criminal defence work

    Get PDF
    As a professional, a lawyer's first duty is to serve the client's best interests, before simple monetary gain. In criminal defence work, this duty has been questioned in the debate about the causes of growth in legal aid spending: is it driven by lawyers (suppliers) inducing unnecessary demand for their services or are they merely responding to increased demand? Research reported here found clear evidence of a change in the handling of cases in response to new payment structures, though in ways unexpected by the policy's proponents. The paper develops the concept of 'ethical indeterminacy' as a way of understanding how defence lawyers seek to reconcile the interests of commerce and clients. Ethical indeterminacy suggests that where different courses of action could each be said to benefit the client, the lawyer will tend to advise the client to decide in the lawyer's own interests. Ethical indeterminacy is mediated by a range of competing conceptions of 'quality' and 'need'. The paper goes on to question the very distinction between 'supply' and 'demand' in the provision of legal services

    Using Web 2.0 applications to promote health-related physical activity: findings from the WALK 2.0 randomised controlled trial.

    Full text link
    BACKGROUND/AIM: Web 2.0 internet technology has great potential in promoting physical activity. This trial investigated the effectiveness of a Web 2.0-based intervention on physical activity behaviour, and the impact on website usage and engagement. METHODS: 504 (328 women, 126 men) insufficiently active adult participants were randomly allocated to one of two web-based interventions or a paper-based Logbook group. The Web 1.0 group participated in the existing 10 000 Steps programme, while the Web 2.0 group participated in a Web 2.0-enabled physical activity intervention including user-to-user interaction through social networking capabilities. ActiGraph GT3X activity monitors were used to assess physical activity at four points across the intervention (0, 3, 12 and 18 months), and usage and engagement were assessed continuously through website usage statistics. RESULTS: Treatment groups differed significantly in trajectories of minutes/day of physical activity (p=0.0198), through a greater change at 3 months for Web 2.0 than Web 1.0 (7.3 min/day, 95% CI 2.4 to 12.3). In the Web 2.0 group, physical activity increased at 3 (mean change 6.8 min/day, 95% CI 3.9 to 9.6) and 12 months (3.8 min/day, 95% CI 0.5 to 7.0), but not 18 months. The Logbook group also increased physical activity at 3 (4.8 min/day, 95% CI 1.8 to 7.7) and 12 months (4.9 min/day, 95% CI 0.7 to 9.1), but not 18 months. The Web 1.0 group increased physical activity at 12 months only (4.9 min/day, 95% CI 0.5 to 9.3). The Web 2.0 group demonstrated higher levels of website engagement (p=0.3964). CONCLUSIONS: In comparison to a Web 1.0 intervention, a more interactive Web 2.0 intervention, as well as the paper-based Logbook intervention, improved physical activity in the short term, but that effect reduced over time, despite higher levels of engagement of the Web 2.0 group. TRIAL REGISTRATION NUMBER: ACTRN12611000157976

    Increased clonal hematopoiesis involving DNA damage response genes in patients undergoing lung transplantation

    Get PDF
    BACKGROUNDCellular stressors influence the development of clonal hematopoiesis (CH). We hypothesized that environmental, inflammatory, and genotoxic stresses drive the emergence of CH in lung transplant recipients. METHODSWe performed a cross-sectional cohort study of 85 lung transplant recipients to characterize CH prevalence. We evaluated somatic variants using duplex error-corrected sequencing and germline variants using whole exome sequencing. We evaluated CH frequency and burden using χ2 and Poisson regression, and we evaluated associations with clinical and demographic variables and clinical outcomes using χ2, logistic regression, and Cox regression. RESULTSCH in DNA damage response (DDR) genes TP53, PPM1D, and ATM was increased in transplant recipients compared with a control group of older adults (28% versus 0%, adjusted OR [aOR], 12.9 [1.7-100.3], P = 0.0002). Age (OR, 1.13 [1.03-1.25], P = 0.014) and smoking history (OR 4.25 [1.02-17.82], P = 0.048) were associated with DDR CH. Germline variants predisposing to idiopathic pulmonary fibrosis were identified but not associated with CH. DDR CH was associated with increased cytomegalovirus viremia versus patients with no (OR, 7.23 [1.95-26.8], P = 0.018) or non-DDR CH (OR, 7.64 [1.77-32.89], P = 0.024) and mycophenolate discontinuation (aOR, 3.8 [1.3-12.9], P = 0.031). CONCLUSIONCH in DDR genes is prevalent in lung transplant recipients and is associated with posttransplant outcomes including cytomegalovirus activation and mycophenolate intolerance. FUNDINGNIH/NHLBI K01HL155231 (LKT), R25HL105400 (LKT), Foundation for Barnes-Jewish Hospital (LKT), Evans MDS Center at Washington University (KAO, MJW), ASH Scholar Award (KAO), NIH K12CA167540 (KAO), NIH P01AI116501 (AEG, DK), NIH R01HL094601 (AEG), and NIH P01CA101937 (DCL)

    5CM, NO IRON SSC DIPOLE 12M MODEL CRYOSTAT THERMAL PERFORMANCE*

    Get PDF
    ABSTRACT A 12 m long model of a 5 cm case dipole cryostat has been constructed and its thermal performance measured. The model utilized heat intercepted fiberglass reinforced plastic posts to support the 12 m long, 4.5 K cold mass and the 10 and 80 K thermal shields. A superinsulation blanket system utilizing aluminized polyester with fiberglass mat spacing material was developed and installed on the 10 and 80 K thermal shields. The heat gain to 4.5, 10 and 80 K was measured. We have compared the results with the analytical predicted performance and it shows good agreement. The performance of the multilayer insulation system has been measured under several different system conditions and the results are reported

    Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going To Be

    Get PDF
    Inspired by the boom of the consumer IoT market, many device manufacturers, new start-up companies and technology behemoths have jumped into the space. Indeed, in a span of less than 5 years, we have experienced the manifestation of an array of solutions for the smart home, smart cities and even smart cars. Unfortunately, the exciting utility and rapid marketization of IoTs, come at the expense of privacy and security. Online and industry reports, and academic work have revealed a number of attacks on IoT systems, resulting in privacy leakage, property loss and even large-scale availability problems on some of the most influential Internet services (e.g. Netflix, Twitter). To mitigate such threats, a few new solutions have been proposed. However, it is still less clear what are the impacts they can have on the IoT ecosystem. In this work, we aim to perform a comprehensive study on reported attacks and defenses in the realm of IoTs aiming to find out what we know, where the current studies fall short and how to move forward. To this end, we first build a toolkit that searches through massive amount of online data using semantic analysis to identify over 3000 IoT-related articles (papers, reports and news). Further, by clustering such collected data using machine learning technologies, we are able to compare academic views with the findings from industry and other sources, in an attempt to understand the gaps between them, the trend of the IoT security risks and new problems that need further attention. We systemize this process, by proposing a taxonomy for the IoT ecosystem and organizing IoT security into five problem areas. We use this taxonomy as a beacon to assess each IoT work across a number of properties we define. Our assessment reveals that despite the acknowledged and growing concerns on IoT from both industry and academia, relevant security and privacy problems are far from solved. We discuss how each proposed solution can be applied to a problem area and highlight their strengths, assumptions and constraints. We stress the need for a security framework for IoT vendors and discuss the trend of shifting security liability to external or centralized entities. We also identify open research problems and provide suggestions towards a secure IoT ecosystem
    corecore