219 research outputs found

    Queering Art Before, After and During the Sexual Revolution (1960-1980): A Study of Aesthetics and Subversion

    Get PDF
    Works produced by the queer artists in 1970s America is oftentimes not considered to be an integral part of the sexual revolution’s narrative. Not only is this problematic in that it demonstrates the heteronormative discourse that permeated liberatory pro-sex rhetoric of the time, but this exclusion also makes the LGBTQ struggle for visibility ahistorical. In this paper, I argue that notable artists who self-identified as lesbian, gay, bisexual, transgender or queer created art that fostered gradual acceptance of the queer community before, during and after the sexual revolution, explaining that resistance to dominant paradigms were rendered unseen due to the intertwined nature of various social movements of the time, such as second-wave feminism, a reaction that would eventually lead to LGBTQ artists being marginalized again until the AIDS epidemic of the 1980s

    Nos ancêtres, les pervers: Reading Queerly and Constructing the Homosexual Before the Closet (1810-1830)

    Get PDF
    Homosexuality is, popularly imagined, a twentieth-century phenomenon wherein medicine created homosexual identity and society worked to stigmatize it. Yet the proto-homosexual role can be traced to several notable historical figures before the rise of medicine at the end of the nineteenth century and the beginning of the twentieth century, especially through literature, and this is most apparent in France, which had been the first country to decriminalize same-sex relations in private after the adoption of the Napoleonic Code. But how do we understand same-sex desire and homosexuality before the homosexual existed as such while respecting the oftentimes-unclear nuances of human sexuality? In this paper, I argue that in the case of the Marquis de Custine and the literature that his unconventional life inspired, ambiguity or secrecy does not indicate impotence or homosexuality, and that attempts to decode and demystify these secrets by nineteenth-century and contemporary analysts alike reflects an anxiety towards sexual ambiguity, as well as changing notions of gender representation. Finding comfort and accepting this sexual ambiguity, then, mark the practice of reading queerly

    Shunting operations at flat yards : retrieving freight railcars from storage tracks

    Get PDF
    In this paper, we study the railcar retrieval problem (RRT) where specified numbers of certain types of railcars have to be withdrawn from the storage tracks of a flat yard. This task arises in the daily operations of workshop yards for railcar maintenance. The objective is to minimize the total cost of shunting via methods such as minimizing the usage of shunting engines. We describe the RRT formally, present a mixed-integer program formulation, and prove the general case to be NP-hard. For some special cases, exact algorithms with polynomial runtimes are proposed. We also analyze several intuitive heuristic solution approaches motivated by observed real-world planning routines. We evaluate their average performances in simulations with different scenarios and provide their worst-case performance guarantee. We show that although the analyzed heuristics result in much better solutions than the naive planning approach, they are still on average 30%-50% from the optimal objective value and may result in up to 14 times higher costs in the worst case. Therefore, we conclude that optimization should be implemented in practice in order to save valuable resources. Furthermore, we analyze the impacts of yard layout and the widespread organizational routine of presorting on the railcar retrieval cost

    Grover Meets Simon - Quantumly Attacking the FX-construction

    Get PDF
    Using whitening keys is a well understood mean of increasing the key-length of any given cipher. Especially as it is known ever since Grover’s seminal work that the effective key-length is reduced by a factor of two when considering quantum adversaries, it seems tempting to use this simple and elegant way of extending the key-length of a given cipher to increase the resistance against quantum adversaries. However, as we show in this work, using whitening keys does not increase the security in the quantum-CPA setting significantly. For this we present a quantum algorithm that breaks the construction with whitening keys in essentially the same time complexity as Grover’s original algorithm breaks the underlying block cipher. Technically this result is based on the combination of the quantum algorithms of Grover and Simon for the first time in the cryptographic setting

    Information transmission in oscillatory neural activity

    Full text link
    Periodic neural activity not locked to the stimulus or to motor responses is usually ignored. Here, we present new tools for modeling and quantifying the information transmission based on periodic neural activity that occurs with quasi-random phase relative to the stimulus. We propose a model to reproduce characteristic features of oscillatory spike trains, such as histograms of inter-spike intervals and phase locking of spikes to an oscillatory influence. The proposed model is based on an inhomogeneous Gamma process governed by a density function that is a product of the usual stimulus-dependent rate and a quasi-periodic function. Further, we present an analysis method generalizing the direct method (Rieke et al, 1999; Brenner et al, 2000) to assess the information content in such data. We demonstrate these tools on recordings from relay cells in the lateral geniculate nucleus of the cat.Comment: 18 pages, 8 figures, to appear in Biological Cybernetic

    Risk factors of late lesion growth after acute ischemic stroke treatment

    Get PDF
    BackgroundEven days after treatment of acute ischemic stroke due to a large vessel occlusion, the infarct lesion continues to grow. This late, subacute growth is associated with unfavorable functional outcome. In this study, we aim to identify patient characteristics that are risk factors of late, subacute lesion growth. MethodsPatients from the MR CLEAN trial cohort with good quality 24 h and 1-week follow up non-contrast CT scans were included. Late Lesion growth was defined as the difference between the ischemic lesion volume assessed after 1-week and 24-h. To identify risk factors, patient characteristics associated with lesion growth (categorized in quartiles) in univariable ordinal analysis (p < 0.1) were included in a multivariable ordinal regression model. ResultsIn the 226 patients that were included, the median lesion growth was 22 (IQR 10-45) ml. In the multivariable model, lower collateral capacity [aOR: 0.62 (95% CI: 0.44-0.87); p = 0.01], longer time to treatment [aOR: 1.04 (1-1.08); p = 0.04], unsuccessful recanalization [aOR: 0.57 (95% CI: 0.34-0.97); p = 0.04], and larger midline shift [aOR: 1.18 (95% CI: 1.02-1.36); p = 0.02] were associated with late lesion growth. ConclusionLate, subacute, lesion growth occurring between 1 day and 1 week after ischemic stroke treatment is influenced by lower collateral capacity, longer time to treatment, unsuccessful recanalization, and larger midline shift. Notably, these risk factors are similar to the risk factors of acute lesion growth, suggesting that understanding and minimizing the effects of the predictors for late lesion growth could be beneficial to mitigate the effects of ischemia

    Evaluation of a DSGE Model of Energy in the United Kingdom Using Stationary Data

    Get PDF
    I examine the impact of energy price shock (oil prices shock and gas prices shock) on the economic activities in the United Kingdom using a dynamic stochastic general equilibrium model with a New Keynesian Philips Curve. I decomposed the changes in output caused by all of the stationary structural shocks. I found that the fall in output during the financial crisis period is driven by domestic demand shock, energy prices shock and world demand shock. I found the energy prices shock’s contribution to fall in output is temporary. Such that, the UK can borrow against such a temporary fall. This estimated model can create additional input to the policymaker’s choice of models

    Which family members use the best nets? An analysis of the condition of mosquito nets and their distribution within households in Tanzania

    Get PDF
    BACKGROUND: Household ownership of insecticide-treated mosquito nets (ITNs) is increasing, and coverage targets have been revised to address universal coverage with ITNs. However, many households do not have enough nets to cover everyone, and the nets available vary in physical condition and insecticide treatment status. Since 2004, the Government of Tanzania has been implementing the Tanzania National Voucher Scheme (TNVS), which distributes vouchers for ITNs through antenatal clinics to target pregnant women and their infants. This analysis aimed to determine the following: (1) coverage patterns of bed nets within households according to physical condition and treatment status; (2) who might be at risk if mosquitoes were diverted from occupants of untreated nets to those not using nets? (3) the degree to which those at highest risk of malaria use the most protective nets. METHODS: Data from the 2006 TNVS household survey were analysed to assess within-household distribution of net use. The associations between net characteristics and net user were also evaluated. Multivariate analysis was applied to the relationship between the number of holes per net and user characteristics while adjusting for confounders. RESULTS: In households with a net:person ratio better than 1:4 (one net for every four household members), more than 80% of the people in such households reported using a net the previous night. ITNs were most likely to be used by infants, young children (1-4 y), and women of childbearing age; they were least likely to be used by older women (>or=50 y), older children (5-14 y), and adult men. The nets used by infants and women of childbearing age were in better-than-average physical condition; the nets used by older women and older children were in worse-than-average condition; while young children and adult men used nets in intermediate (average) condition. When adjusted for confounders, the nets used by young and older children had more holes than nets used by infants. CONCLUSIONS: Infants and other vulnerable groups were most likely to sleep under the most protective nets. Nevertheless, more communication efforts are needed to increase use of intact ITNs within households for children. Further research is necessary to fully understand motivations influencing within-household net distribution

    Ecto-5′-Nucleotidase: A Candidate Virulence Factor in Streptococcus sanguinis Experimental Endocarditis

    Get PDF
    Streptococcus sanguinis is the most common cause of infective endocarditis (IE). Since the molecular basis of virulence of this oral commensal bacterium remains unclear, we searched the genome of S. sanguinis for previously unidentified virulence factors. We identified a cell surface ecto-5′-nucleotidase (Nt5e), as a candidate virulence factor. By colorimetric phosphate assay, we showed that S. sanguinis Nt5e can hydrolyze extracellular adenosine triphosphate to generate adenosine. Moreover, a nt5e deletion mutant showed significantly shorter lag time (P<0.05) to onset of platelet aggregation than the wild-type strain, without affecting platelet-bacterial adhesion in vitro (P = 0.98). In the absence of nt5e, S. sanguinis caused IE (4 d) in a rabbit model with significantly decreased mass of vegetations (P<0.01) and recovered bacterial loads (log10CFU, P = 0.01), suggesting that Nt5e contributes to the virulence of S. sanguinis in vivo. As a virulence factor, Nt5e may function by (i) hydrolyzing ATP, a pro-inflammatory molecule, and generating adenosine, an immunosuppressive molecule to inhibit phagocytic monocytes/macrophages associated with valvular vegetations. (ii) Nt5e-mediated inhibition of platelet aggregation could also delay presentation of platelet microbicidal proteins to infecting bacteria on heart valves. Both plausible Nt5e-dependent mechanisms would promote survival of infecting S. sanguinis. In conclusion, we now show for the first time that streptococcal Nt5e modulates S. sanguinis-induced platelet aggregation and may contribute to the virulence of streptococci in experimental IE

    Operational accuracy and comparative persistent antigenicity of HRP2 rapid diagnostic tests for Plasmodium falciparum malaria in a hyperendemic region of Uganda

    Get PDF
    BACKGROUND: Parasite-based diagnosis of malaria by microscopy requires laboratory skills that are generally unavailable at peripheral health facilities. Rapid diagnostic tests (RDTs) require less expertise, but accuracy under operational conditions has not been fully evaluated in Uganda. There are also concerns about RDTs that use the antigen histidine-rich protein 2 (HRP2) to detect Plasmodium falciparum, because this antigen can persist after effective treatment, giving false positive test results in the absence of infection. An assessment of the accuracy of Malaria Pf immuno-chromatographic test (ICT) and description of persistent antigenicity of HRP2 RDTs was undertaken in a hyperendemic area of Uganda. METHODS: Using a cross-sectional design, a total of 357 febrile patients of all ages were tested using ICT, and compared to microscopy as the gold standard reference. Two independent RDT readings were used to assess accuracy and inter-observer reliability. With a longitudinal design to describe persistent antigenicity of ICT and Paracheck, 224 children aged 6-59 months were followed up at 7-day intervals until the HRP2 antigens where undetectable by the RDTs. RESULTS: Of the 357 patients tested during the cross-sectional component, 40% (139) had positive blood smears for asexual forms of P. falciparum. ICT had an overall sensitivity of 98%, a specificity of 72%, a negative predictive value (NPV) of 98% and a positive predictive value (PPV) of 69%. ICT showed a high inter-observer reliability under operational conditions, with 95% of readings having assigned the same results (kappa statistics 0.921, p 50,000/microl, the mean duration of persistent antigenicity was 37 days compared to 26 days for parasitaemia less than 1,000/microl (log rank 21.9, p < 0.001). CONCLUSION: ICT is an accurate and appropriate test for operational use as a diagnostic tool where microscopy is unavailable. However, persistent antigenicity reduces the accuracy of this and other HRP2-based RDTs. The low specificity continues to be of concern, especially in children below five years of age. These pose limitations that need consideration, such as their use for diagnosis of patients returning with symptoms within two to four weeks of treatment. Good clinical skills are essential to interpret test results
    corecore