180 research outputs found

    Potential Energy Curves and Dissociation Energies of Some Diatomic Molecules

    Get PDF

    The relationship of feeding problems with the use of antiepileptic medication among persons with severe and profound mental retardation

    Get PDF
    Epilepsy and/or seizure activity are frequently occurring phenomena and a significant co-morbid condition for persons with severe to profound intellectual disability (Burke, McKee, Pathak, Donahue, Parasuraman & Baltenhorst, 1999). The majority of seizure activity leads to deficits across a number of social, physical,occupational, and personal variables, and if left untreated, may lead to death in these individuals. The treatment of this condition frequently utilizes anti-epileptic medication, but these medications are often associated with a variety of side effects such as dental complications and disturbed gait. Previous researchers have suggested that these side effects may be manifested in forms of maladaptive behaviors such as aggression and destructiveness (Matson, Mayville, Bamburg & Eckholdt, 2001), but studies have not yet been conducted to determine if side effects of antiepileptics may manifest as feeding problems in this population. Given that complications with feeding may incorporate some of the variables mentioned above (i.e., dental complications), a relationship between the two is likely. The purpose of this study was to evaluate feeding problems associated with the use of three different types of antiepileptic medications on individuals with severe to profound mental retardation as compared to their matched controls. Individuals across three groups (clients on carbamazepine, n = 20; clients on valproate, n = 18; and clients on phenytoin, n = 22) were compared to three separate control groups matched on age, gender, race, and level of MR. They were compared across items related to feeding problems on the Screening Tool of fEeding Problems (STEP). Implications of these data are discussed

    The Emission Spectrum of VO Molecule

    Get PDF

    Cryptographically Secure Information Flow Control on Key-Value Stores

    Full text link
    We present Clio, an information flow control (IFC) system that transparently incorporates cryptography to enforce confidentiality and integrity policies on untrusted storage. Clio insulates developers from explicitly manipulating keys and cryptographic primitives by leveraging the policy language of the IFC system to automatically use the appropriate keys and correct cryptographic operations. We prove that Clio is secure with a novel proof technique that is based on a proof style from cryptography together with standard programming languages results. We present a prototype Clio implementation and a case study that demonstrates Clio's practicality.Comment: Full version of conference paper appearing in CCS 201

    BMI and Risk of Serious Upper Body Injury Following Motor Vehicle Crashes: Concordance of Real-World and Computer-Simulated Observations

    Get PDF
    Shankuan Zhu and colleagues use computer crash simulations, as well as real-world data, to evaluate whether driver obesity is associated with greater risk of body injury in motor vehicle crashes

    Analysis of environmental conditions and management in a compost-bedded pack barn with tunnel ventilation

    Get PDF
    Received: January 5th, 2021 ; Accepted: March 27th, 2021 ; Published: April 16th, 2021 ; Correspondence: [email protected] housing system based on compost-bedded pack for dairy cows is spreading rapidly in Brazil. Completely open buildings without curtains and simple roofs are usually provided. However, in the last years some new completely closed barns have been realized. This study aims to analyse one of these closed barns, located in the State of Minas Gerais. The two main sides of the facility are provided with polyethylene curtains of blue colour and five deflectors. The barn is equipped with an evaporative adiabatic cooling system, associated with the tunnel-style ventilation, realized with exhaust fans, continuously operating 24 hours a day. 85 lactating Holstein cows were housed in the barn during the trials carried out in the winter season 2019. Microclimatic data were collected continuously. Air speed, illuminance and bedding temperature were measured during the farm visits. Pack moisture was calculated. The results state the importance of bedding management and climatic conditions inside the barn. It emerges that the cows housed in this kind of closed barn, with forced ventilation, are in good thermal conditions, which are fairly constant. The average illumination of the barn can be considered acceptable (55.06 lx), even if some areas of the barn present values below the minimum ones reported in literature. The bedding temperature varies between a maximum of 36.33 °C and a minimum of 25.44 °C with an average of 31.26 °C. The values of bedding moisture are between a maximum of 64.36% and a minimum of 60.81% with an average of 62.48%

    Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)

    Get PDF
    30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. ProceedingsThe main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier’s decisional composite residuosity (DCR) assumption), achieve key-dependent message security as well as high resilience to secret key leakage and high resilience to the presence of auxiliary input information. In particular, under what we call the subgroup indistinguishability assumption, of which the QR and DCR are special cases, we can construct a scheme that has: • Key-dependent message (circular) security. Achieves security even when encrypting affine functions of its own secret key (in fact, w.r.t. affine “key-cycles” of predefined length). Our scheme also meets the requirements for extending key-dependent message security to broader classes of functions beyond affine functions using previous techniques of Brakerski et al. or Barak et al. • Leakage resiliency. Remains secure even if any adversarial low-entropy (efficiently computable) function of the secret key is given to the adversary. A proper selection of parameters allows for a “leakage rate” of (1 − o(1)) of the length of the secret key. • Auxiliary-input security. Remains secure even if any sufficiently hard to invert (efficiently computable) function of the secret key is given to the adversary. Our scheme is the first to achieve key-dependent security and auxiliary-input security based on the DCR and QR assumptions. Previous schemes that achieved these properties relied either on the DDH or LWE assumptions. The proposed scheme is also the first to achieve leakage resiliency for leakage rate (1 − o(1)) of the secret key length, under the QR assumption. We note that leakage resilient schemes under the DCR and the QR assumptions, for the restricted case of composite modulus product of safe primes, were implied by the work of Naor and Segev, using hash proof systems. However, under the QR assumption, known constructions of hash proof systems only yield a leakage rate of o(1) of the secret key length.Microsoft Researc

    Extended Ensemble Theory, Spontaneous Symmetry Breaking, and Phase Transitions

    Full text link
    In this paper, we suppose a possible extension of Gibbs ensemble theory so that it can provide a reasonable description to phase transitions and spontaneous symmetry breaking. The extension is founded on three hypotheses, and can be regarded as a microscopic edition of the Landau phenomenological theory of phase transitions. Within its framework, the state of a system is determined by the evolution of order parameter with temperature according to such a principle that the entropy of the system will reach its minimum in this state. The evolution of order parameter can cause change in representation of the system Hamiltonian, different phases will realize different representations. Physically, it turns out that phase transition originates from the automatic interference among matter waves as temperature is cooled down. Typical quantum many-body systems are studied with this extended ensemble theory. In particular, the theory predicts that the specific heat Cp of liquid He II will vanish linearly as T tends to zero, which is anticipating experimental verifications.Comment: 41 pages, 8 figures, content change
    corecore