119 research outputs found

    Groundwater externalities of surface irrigation transfers under National River Linking Project: Polavaram – Vijayawada link

    Get PDF
    River basin managementRiver basin developmentDevelopment projectsWater transferIrrigation canalsGroundwater irrigationTube well irrigationRiceSurface irrigationCrop managementSoil salinityWaterlogging

    The lower Krishna Basin trajectory: relationships between basin development and downstream environmental degradation

    Get PDF
    River basin development / Lakes / Environmental degradation / Ecosystems / Mangroves / Water allocation / Groundwater / Water quality / Salinity / Irrigated farming / Institutions / Irrigation canals / Rural development

    Impromptu Deployment of Wireless Relay Networks: Experiences Along a Forest Trail

    Full text link
    We are motivated by the problem of impromptu or as- you-go deployment of wireless sensor networks. As an application example, a person, starting from a sink node, walks along a forest trail, makes link quality measurements (with the previously placed nodes) at equally spaced locations, and deploys relays at some of these locations, so as to connect a sensor placed at some a priori unknown point on the trail with the sink node. In this paper, we report our experimental experiences with some as-you-go deployment algorithms. Two algorithms are based on Markov decision process (MDP) formulations; these require a radio propagation model. We also study purely measurement based strategies: one heuristic that is motivated by our MDP formulations, one asymptotically optimal learning algorithm, and one inspired by a popular heuristic. We extract a statistical model of the propagation along a forest trail from raw measurement data, implement the algorithms experimentally in the forest, and compare them. The results provide useful insights regarding the choice of the deployment algorithm and its parameters, and also demonstrate the necessity of a proper theoretical formulation.Comment: 7 pages, accepted in IEEE MASS 201

    Privacy-Preserving Predictive Models for Lung Cancer Survival Analysis

    Get PDF
    MAASTRO clinic, the Netherlands. Privacy-preserving data mining (PPDM) is a recent emergent research area that deals with the incorporation of privacy preserving concerns to data mining techniques. We consider a real clinical setting where the data is horizontally distributed among different institutions. Each one of the medical institutions involved in this work provides a database containing a subset of patients. There is recent work that shows the potential of the PPDM approach in medical applications. However, there is few work in developing/implementing PPDM for predictive personalized medicine. In this paper we use real data from several institutions across Europe to build models for survival prediction for non-small-cell lung cancer patients while addressing the potential privacy preserving issues that may arise when sharing data across institutions located in different countries. Our experiments in a real clinical setting show that the privacy preserving approach may result in improved models while avoiding the burdens of traditional data sharing (legal and/or anonymization expenses).

    Full-genome sequencing as a basis for molecular epidemiology studies of bluetongue virus in India

    Get PDF
    Since 1998 there have been significant changes in the global distribution of bluetongue virus (BTV). Ten previously exotic BTV serotypes have been detected in Europe, causing severe disease outbreaks in naïve ruminant populations. Previously exotic BTV serotypes were also identified in the USA, Israel, Australia and India. BTV is transmitted by biting midges (Culicoides spp.) and changes in the distribution of vector species, climate change, increased international travel and trade are thought to have contributed to these events. Thirteen BTV serotypes have been isolated in India since first reports of the disease in the country during 1964. Efficient methods for preparation of viral dsRNA and cDNA synthesis, have facilitated full-genome sequencing of BTV strains from the region. These studies introduce a new approach for BTV characterization, based on full-genome sequencing and phylogenetic analyses, facilitating the identification of BTV serotype, topotype and reassortant strains. Phylogenetic analyses show that most of the equivalent genome-segments of Indian BTV strains are closely related, clustering within a major eastern BTV ‘topotype’. However, genome-segment 5 (Seg-5) encoding NS1, from multiple post 1982 Indian isolates, originated from a western BTV topotype. All ten genome-segments of BTV-2 isolates (IND2003/01, IND2003/02 and IND2003/03) are closely related (>99% identity) to a South African BTV-2 vaccine-strain (western topotype). Similarly BTV-10 isolates (IND2003/06; IND2005/04) show >99% identity in all genome segments, to the prototype BTV-10 (CA-8) strain from the USA. These data suggest repeated introductions of western BTV field and/or vaccine-strains into India, potentially linked to animal or vector-insect movements, or unauthorised use of ‘live’ South African or American BTV-vaccines in the country. The data presented will help improve nucleic acid based diagnostics for Indian serotypes/topotypes, as part of control strategies

    Track D Social Science, Human Rights and Political Science

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/138414/1/jia218442.pd

    31st Annual Meeting and Associated Programs of the Society for Immunotherapy of Cancer (SITC 2016) : part two

    Get PDF
    Background The immunological escape of tumors represents one of the main ob- stacles to the treatment of malignancies. The blockade of PD-1 or CTLA-4 receptors represented a milestone in the history of immunotherapy. However, immune checkpoint inhibitors seem to be effective in specific cohorts of patients. It has been proposed that their efficacy relies on the presence of an immunological response. Thus, we hypothesized that disruption of the PD-L1/PD-1 axis would synergize with our oncolytic vaccine platform PeptiCRAd. Methods We used murine B16OVA in vivo tumor models and flow cytometry analysis to investigate the immunological background. Results First, we found that high-burden B16OVA tumors were refractory to combination immunotherapy. However, with a more aggressive schedule, tumors with a lower burden were more susceptible to the combination of PeptiCRAd and PD-L1 blockade. The therapy signifi- cantly increased the median survival of mice (Fig. 7). Interestingly, the reduced growth of contralaterally injected B16F10 cells sug- gested the presence of a long lasting immunological memory also against non-targeted antigens. Concerning the functional state of tumor infiltrating lymphocytes (TILs), we found that all the immune therapies would enhance the percentage of activated (PD-1pos TIM- 3neg) T lymphocytes and reduce the amount of exhausted (PD-1pos TIM-3pos) cells compared to placebo. As expected, we found that PeptiCRAd monotherapy could increase the number of antigen spe- cific CD8+ T cells compared to other treatments. However, only the combination with PD-L1 blockade could significantly increase the ra- tio between activated and exhausted pentamer positive cells (p= 0.0058), suggesting that by disrupting the PD-1/PD-L1 axis we could decrease the amount of dysfunctional antigen specific T cells. We ob- served that the anatomical location deeply influenced the state of CD4+ and CD8+ T lymphocytes. In fact, TIM-3 expression was in- creased by 2 fold on TILs compared to splenic and lymphoid T cells. In the CD8+ compartment, the expression of PD-1 on the surface seemed to be restricted to the tumor micro-environment, while CD4 + T cells had a high expression of PD-1 also in lymphoid organs. Interestingly, we found that the levels of PD-1 were significantly higher on CD8+ T cells than on CD4+ T cells into the tumor micro- environment (p < 0.0001). Conclusions In conclusion, we demonstrated that the efficacy of immune check- point inhibitors might be strongly enhanced by their combination with cancer vaccines. PeptiCRAd was able to increase the number of antigen-specific T cells and PD-L1 blockade prevented their exhaus- tion, resulting in long-lasting immunological memory and increased median survival

    Factors that Influence Customer Satisfaction in the Motor Vehicle Service Industry in Kenya

    No full text
    A Research Project Report by Rao Bharat R., Submitted to the Chandaria School of Business in Partial Fulfillment of the Requirement for the Degree of Master of International Business Administratio

    Inverse Engineering: A Machine Learning Approach to Support Engineering Synthesis

    No full text
    152 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1993.This research presents a knowledge processing methodology called inverse engineering, that uses machine learning techniques for early stage design in parameterized domains. This methodology functions as a model translator, changing the representation of analysis knowledge embedded in a unidirectional simulator, into a multidirectional model that supports design synthesis. This methodology requires addressing two issues.The first is the task of learning models from data in specified representations. This thesis describes an empirical learning algorithm called KEDS, the Knowledge-based Equation Discovery System. The user selects a restricted hypothesis space bias in the form of a class of parameterized (polynomial) model families, and KEDS learns accurate models that are restricted to those forms. In addition to being a model-driven empirical discovery system, KEDS is also a conceptual clustering system that partitions the problem domain based upon the relationships that it discovers among the problem variables. The use of the minimum description length (MDL) principle as a preference bias for KEDS provides a foundation for learning the &quot;best&quot; models (i.e., those that minimize predictive error on unseen data). KEDS has been applied to model three real-world domains: a diesel engine combustion chamber, a CMOS circuit for an operational amplifier, and a turning process on a lathe.The second issue is that of supporting early stage design. Current computer-aided methods for product and process design require the iterative use of computer-based analysis models in a generate-and-test fashion. While this process is essential to optimize performance during the final stages of design, it has a number of disadvantages during early design. By restricting the models families used by KEDS to forms that can provide synthesis support (hyperplanes), the user can learn a multidirectional model. The user can use this model to propagate constraints in the analysis as well as the synthesis direction. This avoids the time-consuming traditional procedure of iteratively using analysis models to support synthesis. Further this multidirectional model provides the user with great flexibility during early stage design, and the valuable ability to perform &quot;What-if?&quot; analysis. The inverse engineering methodology has been successfully applied to learn models to support early product design of combustion chambers for diesel engines, and to support process design for a turning machine.U of I OnlyRestricted to the U of I community idenfinitely during batch ingest of legacy ETD
    corecore