382 research outputs found

    A mathematical approach to estimate the error during calculating the smoke layer height in industrial facilities

    Get PDF
    Engineering based calculation procedures in fi re safety science often consist of unknown or uncertain input data which are to be estimated by the engineer using appropriate and plausible assumptions. Thereby, errors in this data are induced in the calculation and thus, impact the number as well as the reliability of the results. In this paper a procedure is presented to directly quantify and consider unknown input properties in the process of calculation using distribution functions and Monte-Carlo Simulations. A sensitivity analysis reveals the properties which have a major impact on the calculation reliability. Furthermore, the results are compared to the numerical models of CFAST and FDS

    Implicit Attentional Selection of Bound Visual Features

    Get PDF
    SummaryTraditionally, research on visual attention has been focused on the processes involved in conscious, explicit selection of task-relevant sensory input. Recently, however, it has been shown that attending to a specific feature of an object automatically increases neural sensitivity to this feature throughout the visual field. Here we show that directing attention to a specific color of an object results in attentional modulation of the processing of task-irrelevant and not consciously perceived motion signals that are spatiotemporally associated with this color throughout the visual field. Such implicit cross-feature spreading of attention takes place according to the veridical physical associations between the color and motion signals, even under special circumstances when they are perceptually misbound. These results imply that the units of implicit attentional selection are spatiotemporally colocalized feature clusters that are automatically bound throughout the visual field

    Electis.app White Paper

    Get PDF
    The Electis voting App (Electis.app) is a web application built using Django and ElectionGuard SDK). The latter comes with homomorphic encryption and end-to-end verifiable proof of ballots and tally (initially designed for US election machines. In addition, Electis.app relies on the Tezos blockchain to generate proof of the election via a smart contract. Finally, it uses IPFS decentralized storage to share the proof and ballots with voters to allow them to verify the election was not violated. This document dives into the overall architecture of the e-voting platform and discusses the application'sapplication's key features and how the election is decentralized

    Drawing together multiple lines of evidence from assessment studies of hydropeaking pressures in impacted rivers

    Get PDF
    Hydropeaking has negative effects on aquatic biota, but the causal relationships have not been studied extensively, especially when hydropeaking occurs in combination with other environmental pressures. The available evidence comes mainly from case studies demonstrating river-specific effects of hydropeaking that result in modified microhabitat conditions and lead to declines in fish populations. We used multiple lines of evidence to attempt to strengthen the evidence base for models of ecological response to flow alteration from hydropeaking. First, we synthesized evidence of ecological responses from relevant studies published in the scientific literature. We found considerable evidence of the ecological effects of hydropeaking, but many causal pathways are poorly understood, and we found very little research on the interactive effects of hydropeaking and other pressures. As a 2nd line of evidence, we used results from analyses of large-scale data sets. These results demonstrated the extent to which hydropeaking occurs with other pressures, but did not elucidate individual or interactive effects further. Thus, the multiple lines of evidence complemented each other, but the main result was to identify knowledge gaps regarding hydropeaking and a consequent pressing need for novel approaches, new questions, and new ways of thinking that can fill them.© 2017 by The Society for Freshwater Science.publishedVersio

    Demo: iJam with Channel Randomization

    Full text link
    Physical-layer key generation methods utilize the variations of the communication channel to achieve a secure key agreement between two parties with no prior security association. Their secrecy rate (bit generation rate) depends heavily on the randomness of the channel, which may reduce significantly in a stable environment. Existing methods seek to improve the secrecy rate by injecting artificial noise into the channel. Unfortunately, noise injection cannot alter the underlying channel state, which depends on the multipath environment between the transmitter and receiver. Consequently, these methods are known to leak key bits toward multi-antenna eavesdroppers, which is capable of filtering the noise through the differential of multiple signal receptions. This work demonstrates an improved approach to reinforce physical-layer key generation schemes, e.g., channel randomization. The channel randomization approach leverages a reconfigurable antenna to rapidly change the channel state during transmission, and an angle-of-departure (AoD) based channel estimation algorithm to cancel the changing effects for the intended receiver. The combined result is a communication channel stable in the eyes of the intended receiver but randomly changing from the viewpoint of the eavesdropper. We augmented an existing physical-layer key generation protocol, iJam, with the proposed approach and developed a full-fledged remote instrumentation platform to demonstrate its performance. Our evaluations show that augmentation does not affect the bit error rate (BER) of the intended receiver during key establishment but reduces the eavesdropper's BER to the level of random guessing, regardless of the number of antennas it equips

    Radio Astronomy

    Get PDF
    Contains reports on eight research projects.National Science Foundation (Grant AST77-06052)Joint Services Electronics Program (Contract DAAG29-78-C-0020)National Aeronautics and Space Administration (Contract NAS5-21980)U. S. Department of Commerce - National Oceanic and Atmospheric Administration (Grant 04-8-M01-1)National Aeronautics and Space Administration (Contract NAS5-22929)National Aeronautics and Space Administration (Contract NAS5-23677)National Science Foundation (Grant AST77-12960)National Science Foundation (Grant AST77-26896

    Depletion-Driven Morphological Control of Bundled Actin Networks

    Full text link
    The actin cytoskeleton is a semiflexible biopolymer network whose morphology is controlled by a wide range of biochemical and physical factors. Actin is known to undergo a phase transition from a single-filament state to a bundled state by the addition of polyethylene glycol (PEG) molecules in sufficient concentration. While the depletion interaction experienced by these biopolymers is well-known, the effect of changing the molecular weight of the depletant is less well understood. Here, we experimentally identify a phase transition in solutions of actin from networks of filaments to networks of bundles by varying the molecular weight of PEG polymers, while holding the concentration of these PEG polymers constant. We examine the states straddling the phase transition in terms of micro and macroscale properties. We find that the mesh size, bundle diameter, persistence length, and intra-bundle spacing between filaments across the line of criticality do not show significant differences, while the relaxation time, storage modulus, and degree of bundling change between the two states do show significant differences. Our results demonstrate the ability to tune actin network morphology and mechanics by controlling depletant size, a property which could be exploited to develop actin-based materials with switchable rigidity.Comment: 22 pages, 10 figures. Authors James Clarke and Francis Cavanna contributed equally; Changes: Added modeling work, extended dynamic light scattering analysi

    Radio Astronomy

    Get PDF
    Contains reports on twelve research projects.National Science Foundation (Grant AST77-06052)Joint Services Electronics Program (Contract DAAB07-76-C-1400)National Aeronautics and Space Administration (Contract NAS5-21980)U.S. Air Force - Electronic Systems Division (Contract F19628-75-C-0122)U.S. Department of Commerce - National Oceanic Atmospheric Administration (Grant 04-8-M01-1)National Aeronautics and Space Administration (Contract NAS5-22929)National Aeronautics and Space Administration (Contract NAS5-23677)National Science Foundation (Grant AST73-05042-A03)National Science Foundation (Grant AST76-20376

    Flavour SU(3) Symmetry in Charmless B Decays

    Full text link
    QCD sum rules are used to estimate the flavour SU(3)-symmetry violation in two-body B decays to pions and kaons. In the factorizable amplitudes the SU(3)-violation manifests itself in the ratio of the decay constants f_K/f_pi and in the differences between the B->K, B_s->K and B->pi form factors. These effects are calculated from the QCD two-point and light-cone sum rules, respectively, in terms of the strange quark mass and the ratio of the strange and nonstrange quark-condensate densities. Importantly, QCD sum rules predict that SU(3) breaking in the heavy-to-light form factors can be substantial and does not vanish in the heavy-quark mass limit. Furthermore, we investigate the strange-quark mass dependence of nonfactorizable effects in the B->K pi decay amplitudes. Taking into account these effects we estimate the accuracy of several SU(3)-symmetry relations between charmless B-decay amplitudes.Comment: Two references added, version to be published in Phys.Rev.D, 21 pages, 12 postscript figure

    ETMR-05: Single-cell transcriptomics of ETMR reveals developmental cellular programs and tumor-pericyte communications in the microenvironment [Abstract]

    Get PDF
    BACKGROUND: Embryonal tumors with multilayered rosettes (ETMR) are pediatric brain tumors bearing a grim prognosis, despite intensive multimodal therapeutic approaches. Insights into cellular heterogeneity and cellular communication of tumor cells with cells of the tumor microenvironment (TME), by applying single-cell (sc) techniques, potentially identify mechanisms of therapy resistance and target-directed treatment approaches. MATERIAL AND METHODS: To explore ETMR cell diversity, we used single-cell RNA sequencing (scRNA-seq) in human (n=2) and murine ETMR (transgenic mode; n=4) samples, spatial transcriptomics, 2D and 3D cultures (including co-cultures with TME cells), multiplex immunohistochemistry and drug screens. RESULTS: ETMR microenvironment is composed of tumor and non-tumor cell types. The ETMR malignant compartment harbour cells representing distinct transcriptional metaprograms, (NSC-like, NProg-like and Neuroblast-like), mirroring embryonic neurogenic cell states and fuelled by neurogenic pathways (WNT, SHH, Hippo). The ETMR TME is composed of oligodendrocyte and neuronal progenitor cells, neuroblasts, microglia, and pericytes. Tumor-specific ligand-receptor interaction analysis showed enrichment of intercellular communication between NProg-like ETMR cells and pericytes (PC). Functional network analyses reveal ETMR-PC interactions related to stem-cell signalling and extracellular matrix (ECM) organization, involving factors of the WNT, BMP, and CxCl12 networks. Results from ETMR-PC co-culture and spatial transcriptomics pointed to a pivotal role of pericytes in keeping ETMR in a germinal neurogenic state, enriched in stem-cell signalling. Drug screening considering cellular heterogeneity and cellular communication suggested novel therapeutic approaches. CONCLUSION: ETMR demonstrated diversity in the microenvironment, with enrichment of cell-cell communications with pericytes, supporting stem-cell signalling and interfering in the organization of the tumor extracellular matrix. Targeting ETMR-PC interactions might bring new opportunities for target-directed therapy
    corecore