1,003 research outputs found

    Cantaloupe and Specialty Melon Variety Evaluation in Indiana

    Get PDF
    Thirty melon varieties including traditional eastern-type cantaloupe, non-slip muskmelon, honeydew, and other specialty type melons were evaluated in a field trial at the Southwest Purdue Agricultural Center (SWPAC) in Vincennes, IN in 2019. Yield and fruit quality attributes including fruit size, total soluble solids, firmness, etc., were recorded. This study identified promising melon cultivars for growing under Midwest open-field conditions

    Effect of hydrofracking fluid on colloid transport in the unsaturated zone

    Get PDF
    Hydraulic fracturing is expanding rapidly in the US to meet increasing energy demand and requires high volumes of hydrofracking fluid to displace natural gas from shale. Accidental spills and deliberate land application of hydrofracking fluids, which return to the surface during hydrofracking, are common causes of environmental contamination. Since the chemistry of hydrofracking fluids favors transport of colloids and mineral particles through rock cracks, it may also facilitate transport of in situ colloids and associated pollutants in unsaturated soils. We investigated this by subsequently injecting deionized water and flowback fluid at increasing flow rates into unsaturated sand columns containing colloids. Colloid retention and mobilization was measured in the column effluent and visualized in situ with bright field microscopy. While <5% of initial colloids were released by flushing with deionized water, 32–36% were released by flushing with flowback fluid in two distinct breakthrough peaks. These peaks resulted from 1) surface tension reduction and steric repulsion and 2) slow kinetic disaggregation of colloid flocs. Increasing the flow rate of the flowback fluid mobilized an additional 36% of colloids, due to the expansion of water filled pore space. This study suggests that hydrofracking fluid may also indirectly contaminate groundwater by remobilizing existing colloidal pollutants

    Synthesis and Structure of Hexatungstochromate(III), [H3CrIIIW6O24]6–

    Get PDF
    The hexatungstochromate(III) [H3CrIIIW6O24]6- (1) was synthesized in aqueous, basic medium by simple reaction of chromium(III) nitrate nonahydrate and sodium tungstate dihydrate in a 1:6 ratio. Polyanion 1 represents the first Anderson-Evans type heteropolytungstate with a trivalent hetero element. The sodium salt of 1 with the formula Na6[H3CrIIIW6O24]·22H2O (1a) was fully characterized in the solid state by single crystal XRD, FT-IR spectroscopy, and thermogravimetric analysis

    Cross-Domain Recommendation for Cold-Start Users via Neighborhood Based Feature Mapping

    Full text link
    Collaborative Filtering (CF) is a widely adopted technique in recommender systems. Traditional CF models mainly focus on predicting a user's preference to the items in a single domain such as the movie domain or the music domain. A major challenge for such models is the data sparsity problem, and especially, CF cannot make accurate predictions for the cold-start users who have no ratings at all. Although Cross-Domain Collaborative Filtering (CDCF) is proposed for effectively transferring users' rating preference across different domains, it is still difficult for existing CDCF models to tackle the cold-start users in the target domain due to the extreme data sparsity. In this paper, we propose a Cross-Domain Latent Feature Mapping (CDLFM) model for cold-start users in the target domain. Firstly, in order to better characterize users in sparse domains, we take the users' similarity relationship on rating behaviors into consideration and propose the Matrix Factorization by incorporating User Similarities (MFUS) in which three similarity measures are proposed. Next, to perform knowledge transfer across domains, we propose a neighborhood based gradient boosting trees method to learn the cross-domain user latent feature mapping function. For each cold-start user, we learn his/her feature mapping function based on the latent feature pairs of those linked users who have similar rating behaviors with the cold-start user in the auxiliary domain. And the preference of the cold-start user in the target domain can be predicted based on the mapping function and his/her latent features in the auxiliary domain. Experimental results on two real data sets extracted from Amazon transaction data demonstrate the superiority of our proposed model against other state-of-the-art methods.Comment: 16 pages, 8 figure

    Explaining the differences of gait patterns between high and low-mileage runners with machine learning

    Get PDF
    Running gait patterns have implications for revealing the causes of injuries between higher-mileage runners and low-mileage runners. However, there is limited research on the possible relationships between running gait patterns and weekly running mileages. In recent years, machine learning algorithms have been used for pattern recognition and classification of gait features to emphasize the uniqueness of gait patterns. However, they all have a representative problem of being a black box that often lacks the interpretability of the predicted results of the classifier. Therefore, this study was conducted using a Deep Neural Network (DNN) model and Layer-wise Relevance Propagation (LRP) technology to investigate the differences in running gait patterns between higher-mileage runners and low-mileage runners. It was found that the ankle and knee provide considerable information to recognize gait features, especially in the sagittal and transverse planes. This may be the reason why high-mileage and low-mileage runners have different injury patterns due to their different gait patterns. The early stages of stance are very important in gait pattern recognition because the pattern contains effective information related to gait. The findings of the study noted that LRP completes a feasible interpretation of the predicted results of the model, thus providing more interesting insights and more effective information for analyzing gait patterns

    A new critical curve for the Lane-Emden system

    Full text link
    We study stable positive radially symmetric solutions for the Lane-Emden system Δu=vp-\Delta u=v^p in RN\R^N, Δv=uq-\Delta v=u^q in RN\R^N, where p,q1p,q\geq 1. We obtain a new critical curve that optimally describes the existence of such solutions.Comment: 13 pages, 1 figur

    A splicing isoform of TEAD4 attenuates the Hippo–YAP signalling to inhibit tumour proliferation

    Get PDF
    Aberrant splicing is frequently found in cancer, yet the biological consequences of such alterations are mostly undefined. Here we report that the Hippo–YAP signalling, a key pathway that regulates cell proliferation and organ size, is under control of a splicing switch. We show that TEAD4, the transcription factor that mediates Hippo–YAP signalling, undergoes alternative splicing facilitated by the tumour suppressor RBM4, producing a truncated isoform, TEAD4-S, which lacks an N-terminal DNA-binding domain, but maintains YAP interaction domain. TEAD4-S is located in both the nucleus and cytoplasm, acting as a dominant negative isoform to YAP activity. Consistently, TEAD4-S is reduced in cancer cells, and its re-expression suppresses cancer cell proliferation and migration, inhibiting tumour growth in xenograft mouse models. Furthermore, TEAD4-S is reduced in human cancers, and patients with elevated TEAD4-S levels have improved survival. Altogether, these data reveal a splicing switch that serves to fine tune the Hippo–YAP pathway

    Privacy-Preserving Public Auditing for Secure Cloud Storage

    Get PDF
    Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient
    corecore