4,696 research outputs found

    Detection and confirmation of toxigenic Vibrio cholerae O1 in environmental and clinical samples by a direct cell multiplex PCR

    Get PDF
    Epidemic cholera caused by toxigenic Vibrio cholerae O1 is a major health problem in several developing countries. Traditional methods for identifying V. cholerae involve cultural, biochemical and immunological assays which are cumbersome and often take several days to complete. In the present study, a direct cell multiplex PCR was developed targeting the ompW, ctxB and rfbO1 genes for confirmation of V. cholerae, its toxigenicity and serogroup O1, respectively from clinical and environmental samples. The detection sensitivity of the multiplex PCR was 1.9 x 103 V. cholerae per PCR reaction. A total of 31 environmental samples and 45 clinical V. cholerae isolates from different outbreaks were examined by the PCR. The assay was simple and specific, as there was no requirement for DNA extraction and no amplification was  observed with other homologous bacteria used. The assay can be very useful for rapid surveillance of toxigenic V. cholerae O1 in environmental water samples, as well as for confirmation of clinical isolates.Keywords: cholera, Vibrio cholerae, PCR, environmental sample

    Study and Analysis of Exhaust Emission of Diesel Vehicles using Thermal IR Imagers

    Get PDF
    Exhaust emission analysis from diesel vehicles has received a lot of attention in recent times in the context of implementation of Bharat Stage-IV norms and thermal signature analysis for civil and military applications. The exhaust emission thermal IR signatures of military diesel vehicles such as truck and bus using a gas analyser and thermal imager under idling and accelerating conditions of these vehicles is investigated. Concentration and temperature of diesel exhaust emission CO, NOx, and HC remains almost constant during engine running in idle condition and varies with the engine acceleration. Exhaust gases maximum temperature reaches in the range of 240 °C - 270 °C during engine acceleration. A detailed investigation of thermal signature in mid wave infrared, 3 µm - 5 µm waveband and long wave infrared, 8 µm - 14 µm waveband is also presented under the same engine running conditions. Thermal image analysis exhibited that the area of thermal IR image of diesel vehicles truck and bus has been increased 0.077 per cent and 0.594 per cent, respectively with the engine acceleration. It has been observed that thermal signature of exhaust gases is a good tool for vehicle exhaust emission visualisation and analysis

    Anomalous structure in the single particle spectrum of the fractional quantum Hall effect

    Get PDF
    The two-dimensional electron system (2DES) is a unique laboratory for the physics of interacting particles. Application of a large magnetic field produces massively degenerate quantum levels known as Landau levels. Within a Landau level the kinetic energy of the electrons is suppressed, and electron-electron interactions set the only energy scale. Coulomb interactions break the degeneracy of the Landau levels and can cause the electrons to order into complex ground states. In the high energy single particle spectrum of this system, we observe salient and unexpected structure that extends across a wide range of Landau level filling fractions. The structure appears only when the 2DES is cooled to very low temperature, indicating that it arises from delicate ground state correlations. We characterize this structure by its evolution with changing electron density and applied magnetic field. We present two possible models for understanding these observations. Some of the energies of the features agree qualitatively with what might be expected for composite Fermions, which have proven effective for interpreting other experiments in this regime. At the same time, a simple model with electrons localized on ordered lattice sites also generates structure similar to those observed in the experiment. Neither of these models alone is sufficient to explain the observations across the entire range of densities measured. The discovery of this unexpected prominent structure in the single particle spectrum of an otherwise thoroughly studied system suggests that there exist core features of the 2DES that have yet to be understood.Comment: 15 pages, 10 figure

    Mesoscopic structure and social aspects of human mobility

    Get PDF
    The individual movements of large numbers of people are important in many contexts, from urban planning to disease spreading. Datasets that capture human mobility are now available and many interesting features have been discovered, including the ultra-slow spatial growth of individual mobility. However, the detailed substructures and spatiotemporal flows of mobility - the sets and sequences of visited locations - have not been well studied. We show that individual mobility is dominated by small groups of frequently visited, dynamically close locations, forming primary "habitats" capturing typical daily activity, along with subsidiary habitats representing additional travel. These habitats do not correspond to typical contexts such as home or work. The temporal evolution of mobility within habitats, which constitutes most motion, is universal across habitats and exhibits scaling patterns both distinct from all previous observations and unpredicted by current models. The delay to enter subsidiary habitats is a primary factor in the spatiotemporal growth of human travel. Interestingly, habitats correlate with non-mobility dynamics such as communication activity, implying that habitats may influence processes such as information spreading and revealing new connections between human mobility and social networks.Comment: 7 pages, 5 figures (main text); 11 pages, 9 figures, 1 table (supporting information

    Confidence interval estimation for the changepoint of treatment stratification in the presence of a qualitative covariate-treatment interaction

    Get PDF
    The goal in stratified medicine is to administer the \textquotedblbest\textquotedbl treatment to a patient. Not all patients might benefit from the same treatment; the choice of best treatment can depend on certain patient characteristics. In this article, it is assumed that a time-to-event outcome is considered as a patient-relevant outcome and a qualitative interaction between a continuous covariate and treatment exists, ie,~that patients with different values of one specific covariate should be treated differently. We suggest and investigate different methods for confidence interval estimation for the covariate value, where the treatment recommendation should be changed based on data collected in a randomized clinical trial. An adaptation of Fieller's theorem, the delta method, and different bootstrap approaches (normal, percentile-based, wild bootstrap) are investigated and compared in a simulation study. Extensions to multivariable problems are presented and evaluated. We observed appropriate confidence interval coverage following Fieller's theorem irrespective of sample size but at the cost of very wide or even infinite confidence intervals. The delta method and the wild bootstrap approach provided the smallest intervals but inadequate coverage for small to moderate event numbers, also depending on the location of the true changepoint. For the percentile-based bootstrap, wide intervals were observed, and it was slightly conservative regarding coverage, whereas the normal bootstrap did not provide acceptable results for many scenarios. The described methods were also applied to data from a randomized clinical trial comparing two treatments for patients with symptomatic, severe carotid artery stenosis, considering patient's age as predictive marker

    The Pittsburgh randomized trial of tacrolimus compared to cyclosporine for hepatic transplantation

    Get PDF
    BACKGROUND: Tacrolimus (formerly FK 506) was first used clinically in 1989 to successfully replace cyclosporine in hepatic transplant recipients who were experiencing intractable rejection or as the baseline drug from the time of operation. After extensive pilot experience, an institutional review board-mandated clinical trial comparing cyclosporine with tacrolimus was performed. STUDY DESIGN: From February 16, 1990 to December 26, 1991, 154 patients were recruited. The competing drugs were combined with equal induction doses of prednisone in both arms of the study for the first 81 patients and with subsequently higher doses of prednisone in the remaining 35 patients who received cyclosporine and were entered into the trial. Drug crossover was permitted for lack of efficacy or adverse events. End points were rejection confirmed by biopsy and treatment failure leading to retransplantation or death. RESULTS: Seventy-nine patients were randomized to the tacrolimus arm and 75 to the cyclosporine arm during 1990 and 1991. All patients were available for follow-up throughout the trial, which terminated on May 30, 1995. The mean duration of follow-up was four years. Patients randomized to the tacrolimus arm were less likely to experience acute rejection than were those receiving cyclosporine, with 36.2 percent of the patients receiving tacrolimus and 16.8 percent of the patients receiving cyclosporine showing freedom from rejection at one year (p=0.003, likelihood ratio test). Survival of patients over the course of the study was virtually the same in the two groups. CONCLUSIONS: Tacrolimus was more effective than cyclosporine in preventing acute rejection

    Ward's Hierarchical Clustering Method: Clustering Criterion and Agglomerative Algorithm

    Full text link
    The Ward error sum of squares hierarchical clustering method has been very widely used since its first description by Ward in a 1963 publication. It has also been generalized in various ways. However there are different interpretations in the literature and there are different implementations of the Ward agglomerative algorithm in commonly used software systems, including differing expressions of the agglomerative criterion. Our survey work and case studies will be useful for all those involved in developing software for data analysis using Ward's hierarchical clustering method.Comment: 20 pages, 21 citations, 4 figure

    Composite Fermion Metals from Dyon Black Holes and S-Duality

    Full text link
    We propose that string theory in the background of dyon black holes in four-dimensional anti-de Sitter spacetime is holographic dual to conformally invariant composite Dirac fermion metal. By utilizing S-duality map, we show that thermodynamic and transport properties of the black hole match with those of composite fermion metal, exhibiting Fermi liquid-like. Built upon Dirac-Schwinger-Zwanziger quantization condition, we argue that turning on magnetic charges to electric black hole along the orbit of Gamma(2) subgroup of SL(2,Z) is equivalent to attaching even unit of statistical flux quanta to constituent fermions. Being at metallic point, the statistical magnetic flux is interlocked to the background magnetic field. We find supporting evidences for proposed holographic duality from study of internal energy of black hole and probe bulk fermion motion in black hole background. They show good agreement with ground-state energy of composite fermion metal in Thomas-Fermi approximation and cyclotron motion of a constituent or composite fermion excitation near Fermi-point.Comment: 30 pages, v2. 1 figure added, minor typos corrected; v3. revised version to be published in JHE

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly
    • …
    corecore