382 research outputs found
A mathematical approach to estimate the error during calculating the smoke layer height in industrial facilities
Engineering based calculation procedures in fi re safety science often consist of unknown
or uncertain input data which are to be estimated by the engineer using appropriate and
plausible assumptions. Thereby, errors in this data are induced in the calculation and
thus, impact the number as well as the reliability of the results. In this paper a procedure
is presented to directly quantify and consider unknown input properties in the process
of calculation using distribution functions and Monte-Carlo Simulations. A sensitivity
analysis reveals the properties which have a major impact on the calculation reliability.
Furthermore, the results are compared to the numerical models of CFAST and FDS
Implicit Attentional Selection of Bound Visual Features
SummaryTraditionally, research on visual attention has been focused on the processes involved in conscious, explicit selection of task-relevant sensory input. Recently, however, it has been shown that attending to a specific feature of an object automatically increases neural sensitivity to this feature throughout the visual field. Here we show that directing attention to a specific color of an object results in attentional modulation of the processing of task-irrelevant and not consciously perceived motion signals that are spatiotemporally associated with this color throughout the visual field. Such implicit cross-feature spreading of attention takes place according to the veridical physical associations between the color and motion signals, even under special circumstances when they are perceptually misbound. These results imply that the units of implicit attentional selection are spatiotemporally colocalized feature clusters that are automatically bound throughout the visual field
Electis.app White Paper
The Electis voting App (Electis.app) is a web application built using Django and ElectionGuard SDK). The latter comes with homomorphic encryption and end-to-end verifiable proof of ballots and tally (initially designed for US election machines. In addition, Electis.app relies on the Tezos blockchain to generate proof of the election via a smart contract. Finally, it uses IPFS decentralized storage to share the proof and ballots with voters to allow them to verify the election was not violated. This document dives into the overall architecture of the e-voting platform and discusses the application'sapplication's key features and how the election is decentralized
Drawing together multiple lines of evidence from assessment studies of hydropeaking pressures in impacted rivers
Hydropeaking has negative effects on aquatic biota, but the causal relationships have not been studied extensively, especially when hydropeaking occurs in combination with other environmental pressures. The available evidence comes mainly from case studies demonstrating river-specific effects of hydropeaking that result in modified microhabitat conditions and lead to declines in fish populations. We used multiple lines of evidence to attempt to strengthen the evidence base for models of ecological response to flow alteration from hydropeaking. First, we synthesized evidence of ecological responses from relevant studies published in the scientific literature. We found considerable evidence of the ecological effects of hydropeaking, but many causal pathways are poorly understood, and we found very little research on the interactive effects of hydropeaking and other pressures. As a 2nd line of evidence, we used results from analyses of large-scale data sets. These results demonstrated the extent to which hydropeaking occurs with other pressures, but did not elucidate individual or interactive effects further. Thus, the multiple lines of evidence complemented each other, but the main result was to identify knowledge gaps regarding hydropeaking and a consequent pressing need for novel approaches, new questions, and new ways of thinking that can fill them.© 2017 by The Society for Freshwater Science.publishedVersio
Demo: iJam with Channel Randomization
Physical-layer key generation methods utilize the variations of the
communication channel to achieve a secure key agreement between two parties
with no prior security association. Their secrecy rate (bit generation rate)
depends heavily on the randomness of the channel, which may reduce
significantly in a stable environment. Existing methods seek to improve the
secrecy rate by injecting artificial noise into the channel. Unfortunately,
noise injection cannot alter the underlying channel state, which depends on the
multipath environment between the transmitter and receiver. Consequently, these
methods are known to leak key bits toward multi-antenna eavesdroppers, which is
capable of filtering the noise through the differential of multiple signal
receptions. This work demonstrates an improved approach to reinforce
physical-layer key generation schemes, e.g., channel randomization. The channel
randomization approach leverages a reconfigurable antenna to rapidly change the
channel state during transmission, and an angle-of-departure (AoD) based
channel estimation algorithm to cancel the changing effects for the intended
receiver. The combined result is a communication channel stable in the eyes of
the intended receiver but randomly changing from the viewpoint of the
eavesdropper. We augmented an existing physical-layer key generation protocol,
iJam, with the proposed approach and developed a full-fledged remote
instrumentation platform to demonstrate its performance. Our evaluations show
that augmentation does not affect the bit error rate (BER) of the intended
receiver during key establishment but reduces the eavesdropper's BER to the
level of random guessing, regardless of the number of antennas it equips
Radio Astronomy
Contains reports on eight research projects.National Science Foundation (Grant AST77-06052)Joint Services Electronics Program (Contract DAAG29-78-C-0020)National Aeronautics and Space Administration (Contract NAS5-21980)U. S. Department of Commerce - National Oceanic and Atmospheric Administration (Grant 04-8-M01-1)National Aeronautics and Space Administration (Contract NAS5-22929)National Aeronautics and Space Administration (Contract NAS5-23677)National Science Foundation (Grant AST77-12960)National Science Foundation (Grant AST77-26896
Depletion-Driven Morphological Control of Bundled Actin Networks
The actin cytoskeleton is a semiflexible biopolymer network whose morphology
is controlled by a wide range of biochemical and physical factors. Actin is
known to undergo a phase transition from a single-filament state to a bundled
state by the addition of polyethylene glycol (PEG) molecules in sufficient
concentration. While the depletion interaction experienced by these biopolymers
is well-known, the effect of changing the molecular weight of the depletant is
less well understood. Here, we experimentally identify a phase transition in
solutions of actin from networks of filaments to networks of bundles by varying
the molecular weight of PEG polymers, while holding the concentration of these
PEG polymers constant. We examine the states straddling the phase transition in
terms of micro and macroscale properties. We find that the mesh size, bundle
diameter, persistence length, and intra-bundle spacing between filaments across
the line of criticality do not show significant differences, while the
relaxation time, storage modulus, and degree of bundling change between the two
states do show significant differences. Our results demonstrate the ability to
tune actin network morphology and mechanics by controlling depletant size, a
property which could be exploited to develop actin-based materials with
switchable rigidity.Comment: 22 pages, 10 figures. Authors James Clarke and Francis Cavanna
contributed equally; Changes: Added modeling work, extended dynamic light
scattering analysi
Radio Astronomy
Contains reports on twelve research projects.National Science Foundation (Grant AST77-06052)Joint Services Electronics Program (Contract DAAB07-76-C-1400)National Aeronautics and Space Administration (Contract NAS5-21980)U.S. Air Force - Electronic Systems Division (Contract F19628-75-C-0122)U.S. Department of Commerce - National Oceanic Atmospheric Administration (Grant 04-8-M01-1)National Aeronautics and Space Administration (Contract NAS5-22929)National Aeronautics and Space Administration (Contract NAS5-23677)National Science Foundation (Grant AST73-05042-A03)National Science Foundation (Grant AST76-20376
Flavour SU(3) Symmetry in Charmless B Decays
QCD sum rules are used to estimate the flavour SU(3)-symmetry violation in
two-body B decays to pions and kaons. In the factorizable amplitudes the
SU(3)-violation manifests itself in the ratio of the decay constants f_K/f_pi
and in the differences between the B->K, B_s->K and B->pi form factors. These
effects are calculated from the QCD two-point and light-cone sum rules,
respectively, in terms of the strange quark mass and the ratio of the strange
and nonstrange quark-condensate densities. Importantly, QCD sum rules predict
that SU(3) breaking in the heavy-to-light form factors can be substantial and
does not vanish in the heavy-quark mass limit. Furthermore, we investigate the
strange-quark mass dependence of nonfactorizable effects in the B->K pi decay
amplitudes. Taking into account these effects we estimate the accuracy of
several SU(3)-symmetry relations between charmless B-decay amplitudes.Comment: Two references added, version to be published in Phys.Rev.D, 21
pages, 12 postscript figure
ETMR-05: Single-cell transcriptomics of ETMR reveals developmental cellular programs and tumor-pericyte communications in the microenvironment [Abstract]
BACKGROUND: Embryonal tumors with multilayered rosettes (ETMR) are pediatric brain tumors bearing a grim prognosis, despite intensive multimodal therapeutic approaches. Insights into cellular heterogeneity and cellular communication of tumor cells with cells of the tumor microenvironment (TME), by applying single-cell (sc) techniques, potentially identify mechanisms of therapy resistance and target-directed treatment approaches. MATERIAL AND METHODS: To explore ETMR cell diversity, we used single-cell RNA sequencing (scRNA-seq) in human (n=2) and murine ETMR (transgenic mode; n=4) samples, spatial transcriptomics, 2D and 3D cultures (including co-cultures with TME cells), multiplex immunohistochemistry and drug screens. RESULTS: ETMR microenvironment is composed of tumor and non-tumor cell types. The ETMR malignant compartment harbour cells representing distinct transcriptional metaprograms, (NSC-like, NProg-like and Neuroblast-like), mirroring embryonic neurogenic cell states and fuelled by neurogenic pathways (WNT, SHH, Hippo). The ETMR TME is composed of oligodendrocyte and neuronal progenitor cells, neuroblasts, microglia, and pericytes. Tumor-specific ligand-receptor interaction analysis showed enrichment of intercellular communication between NProg-like ETMR cells and pericytes (PC). Functional network analyses reveal ETMR-PC interactions related to stem-cell signalling and extracellular matrix (ECM) organization, involving factors of the WNT, BMP, and CxCl12 networks. Results from ETMR-PC co-culture and spatial transcriptomics pointed to a pivotal role of pericytes in keeping ETMR in a germinal neurogenic state, enriched in stem-cell signalling. Drug screening considering cellular heterogeneity and cellular communication suggested novel therapeutic approaches. CONCLUSION: ETMR demonstrated diversity in the microenvironment, with enrichment of cell-cell communications with pericytes, supporting stem-cell signalling and interfering in the organization of the tumor extracellular matrix. Targeting ETMR-PC interactions might bring new opportunities for target-directed therapy
- …