2,420 research outputs found

    Modularity and community detection in bipartite networks

    Full text link
    The modularity of a network quantifies the extent, relative to a null model network, to which vertices cluster into community groups. We define a null model appropriate for bipartite networks, and use it to define a bipartite modularity. The bipartite modularity is presented in terms of a modularity matrix B; some key properties of the eigenspectrum of B are identified and used to describe an algorithm for identifying modules in bipartite networks. The algorithm is based on the idea that the modules in the two parts of the network are dependent, with each part mutually being used to induce the vertices for the other part into the modules. We apply the algorithm to real-world network data, showing that the algorithm successfully identifies the modular structure of bipartite networks.Comment: RevTex 4, 11 pages, 3 figures, 1 table; modest extensions to conten

    Train‐the‐trainer: Methodology to learn the cognitive interview

    Full text link
    Research has indicated that police may not receive enough training in interviewing cooperative witnesses, specifically in use of the cognitive interview (CI). Practically, for the CI to be effective in real‐world investigations, police investigators must be trained by law enforcement trainers. We conducted a three‐phase experiment to examine the feasibility of training experienced law enforcement trainers who would then train others to conduct the CI. We instructed Federal Bureau of Investigation and local law enforcement trainers about the CI (Phase I); law enforcement trainers from both agencies (n = 4, 100% male, mean age = 50 years) instructed university students (n = 25, 59% female, mean age = 21 years) to conduct either the CI or a standard law enforcement interview (Phase II); the student interviewers then interviewed other student witnesses (n = 50, 73% female, mean age = 22 years), who had watched a simulated crime (phase III). Compared with standard training, interviews conducted by those trained by CI‐trained instructors contained more information and at a higher accuracy rate and with fewer suggestive questions.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/147804/1/jip1518_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/147804/2/jip1518.pd

    DDR2 expression in cancer-associated fibroblasts promotes ovarian cancer tumor invasion and metastasis through periostin-ITGB1

    Get PDF
    Ovarian cancer has the highest mortality of all gynecologic malignancies. As such, there is a need to identify molecular mechanisms that underlie tumor metastasis in ovarian cancer. Increased expression of receptor tyrosine kinase, DDR2, has been associated with worse patient survival. Identifying downstream targets of DDR2 may allow specific modulation of ovarian cancer metastatic pathways. Additionally, stromal cells play a critical role in metastasis. The crosstalk between tumor and stromal cells can lead to tumor progression. We first identified that tumor cells co-cultured with DDR2-expressing fibroblasts had lower periostin expression when compared to tumor cells co-cultured with DDR2-depleted fibroblasts. We confirmed that DDR2 regulates POSTN expression in ovarian cancer-associated fibroblasts (CAFs). We found that mesothelial cell clearance and invasion by tumor cells were enhanced three-fold when DDR2 and POSTN-expressing CAFs were present compared to DDR2 and POSTN-depleted CAFs. Furthermore, DDR2-depleted and POSTN-overexpressing CAFs co-injected with ovarian tumor cells had increased tumor burden compared to mice injected with tumor cells and DDR2 and POSTN-depleted CAFs. Furthermore, we demonstrated that DDR2 regulates periostin expression through integrin B1 (ITGB1). Stromal DDR2 is highly correlated with stromal POSTN expression in ovarian cancer patient tumors. Thus, DDR2 expression in CAFs regulates the steps of ovarian cancer metastasis through periostin

    Near-infrared thermal emissivity from ground based atmospheric dust measurements at ORM

    Full text link
    We present an analysis of the atmospheric content of aerosols measured at Observatorio del Roque de los Muchachos (ORM; Canary Islands). Using a laser diode particle counter located at the Telescopio Nazionale Galileo (TNG) we have detected particles of 0.3, 0.5, 1.0, 3.0, 5.0 and 10.0 um size. The seasonal behavior of the dust content in the atmosphere is calculated. The Spring has been found to be dustier than the Summer, but dusty conditions may also occur in Winter. A method to estimate the contribution of the aerosols emissivity to the sky brightness in the near-infrared (NIR) is presented. The contribution of dust emission to the sky background in the NIR has been found to be negligible comparable to the airglow, with a maximum contribution of about 8-10% in the Ks band in the dusty days.Comment: 6 pages, 3 figures, 6 tables, accepted for publication in MNRA

    The Peculiar Phase Structure of Random Graph Bisection

    Full text link
    The mincut graph bisection problem involves partitioning the n vertices of a graph into disjoint subsets, each containing exactly n/2 vertices, while minimizing the number of "cut" edges with an endpoint in each subset. When considered over sparse random graphs, the phase structure of the graph bisection problem displays certain familiar properties, but also some surprises. It is known that when the mean degree is below the critical value of 2 log 2, the cutsize is zero with high probability. We study how the minimum cutsize increases with mean degree above this critical threshold, finding a new analytical upper bound that improves considerably upon previous bounds. Combined with recent results on expander graphs, our bound suggests the unusual scenario that random graph bisection is replica symmetric up to and beyond the critical threshold, with a replica symmetry breaking transition possibly taking place above the threshold. An intriguing algorithmic consequence is that although the problem is NP-hard, we can find near-optimal cutsizes (whose ratio to the optimal value approaches 1 asymptotically) in polynomial time for typical instances near the phase transition.Comment: substantially revised section 2, changed figures 3, 4 and 6, made minor stylistic changes and added reference

    Universality in solar flare and earthquake occurrence

    Full text link
    Earthquakes and solar flares are phenomena involving huge and rapid releases of energy characterized by complex temporal occurrence. By analysing available experimental catalogs, we show that the stochastic processes underlying these apparently different phenomena have universal properties. Namely both problems exhibit the same distributions of sizes, inter-occurrence times and the same temporal clustering: we find afterflare sequences with power law temporal correlations as the Omori law for seismic sequences. The observed universality suggests a common approach to the interpretation of both phenomena in terms of the same driving physical mechanism

    Sorting apples from oranges in single-cell expression comparisons.

    Get PDF
    Two methods for comparing single-cell expression datasets help address the challenge of integrating data across conditions and experiments

    Provider Responses to Patients Controlling Access to their Electronic Health Records: A Prospective Cohort Study in Primary Care

    Get PDF
    Introduction: Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data. Methods: We designed a program that captures patients’ preferences for provider access to an urban health system’s EHR. Patients could allow or restrict providers’ access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patients’ preferences. Providers could “Break the Glass” to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users “Broke the Glass,” and surveyed providers about their experiences and opinions. Results: Eight of 9 eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program.. Providers did not know which of their patients were enrolled and nor their preferences for accessing their EHRs. During the six-month prospective study, 92 study patients (88%) returned 261 times during which providers viewed their EHRs 126 times (48%). Providers “broke the glass” 102 times, 92 times for patients not in the study and 10 times for 6 returning study patients, all of whom had restricted EHR access. Providers “broke the glass” for 6 (14%) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p=0.01). Although 54% of providers agreed that patients should have control over who sees their EHR information, 58% believed restricting EHR access could harm provider-patient relationships and 71% felt quality of care would suffer. Conclusions: Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patients’ preferences to view hidden data. Providers believed restricting EHR access would adversely impact patient care. Applying Fair Information Practice principles to EHRs will require balancing patient preferences, providers’ needs, and health care quality.This study was supported in part by grant number 90HT005 from the Office of the National Coordinator for Health Information Technology (ONC) to the Indiana Health Information Technology Corporation. The opinions expressed in this work are the authors’ and do not necessarily reflect the positions of ONC, IHIT, Eskenazi Health, Indiana University, or the Regenstrief Institute, Inc

    Career and leadership development in the field of violence and abuse

    Get PDF
    PowerPoint PresentationConference Theme: Future Without Violencepostprin
    • 

    corecore