3,794 research outputs found

    Effects of the Santa Barbara, Calif., Oil Spill on the Apparent Abundance of Pelagic Fishery Resources

    Get PDF
    Many studies have been made of the effects of oil on marine invertebrates, plants (marine algae and phytoplankton), and vertebrates such as seabirds and marine mammals. An excellent review of these findings, which includes some references to fish and pathological effects of aromatic hydrocarbons, has been published by the Royal Society, London (Clark, 1982). That review dealt with the environmental effects of such major oil spills or releases such as those by the tankers Torry Canyon (119,000 t) on the south coast of England, Metula (50-56,000 t) in the Straits of Magellan, Argo Merchant (26,000 t) off Cape Cod, and the super tanker Amoco Cadiz (223,000 t) on the coast of northern Brittany. Those spills were studied to determine their effect on living resources. In contrast there are few references on the impact of oil spills on pelagic fishery resources

    African trypanosomiasis in travelers returning to the United Kingdom.

    Get PDF
    Two returning safari tourists with African trypanosomiasis were admitted to the Hospital for Tropical Diseases, London, in a 3-day period, compared with six cases in the previous 14 years. We describe the clinical features, diagnosis, and problems encountered in accessing appropriate therapy, and discuss the potential for emergence of this disease in increasingly adventurous international travelers

    Shadow Pricing and Macroeconomic Analysis: Some Illustrations from Pakistan

    Get PDF
    Shadow prices are being used increasingly in the economic analysis of projects. The purpose of this paper, however, is to argue that shadow prices are equally relevant for certain types of analysis at the macro-economic level. In theory, macroeconomic issues can be properly analyzed, if at all, only in general equilibrium frame• work. Quantification then requires the solution of an appropriate model. But, estimable general equilibrium models can seldom include many variables, and the level of aggregation must remain high. They are general only in the very partial sense of simultaneous solution of a limited set of aggregated endogenous variables. On the other hand, some of the issues addressed by shadow pricing involve quite disaggregated variables, and, of course, project analysis itself often requires very detailed estimations

    The Hamiltonian structure and Euler-Poincar\'{e} formulation of the Vlasov-Maxwell and gyrokinetic systems

    Full text link
    We present a new variational principle for the gyrokinetic system, similar to the Maxwell-Vlasov action presented in Ref. 1. The variational principle is in the Eulerian frame and based on constrained variations of the phase space fluid velocity and particle distribution function. Using a Legendre transform, we explicitly derive the field theoretic Hamiltonian structure of the system. This is carried out with a modified Dirac theory of constraints, which is used to construct meaningful brackets from those obtained directly from Euler-Poincar\'{e} theory. Possible applications of these formulations include continuum geometric integration techniques, large-eddy simulation models and Casimir type stability methods. [1] H. Cendra et. al., Journal of Mathematical Physics 39, 3138 (1998)Comment: 36 pages, 1 figur

    Switcher-random-walks: a cognitive-inspired mechanism for network exploration

    Full text link
    Semantic memory is the subsystem of human memory that stores knowledge of concepts or meanings, as opposed to life specific experiences. The organization of concepts within semantic memory can be understood as a semantic network, where the concepts (nodes) are associated (linked) to others depending on perceptions, similarities, etc. Lexical access is the complementary part of this system and allows the retrieval of such organized knowledge. While conceptual information is stored under certain underlying organization (and thus gives rise to a specific topology), it is crucial to have an accurate access to any of the information units, e.g. the concepts, for efficiently retrieving semantic information for real-time needings. An example of an information retrieval process occurs in verbal fluency tasks, and it is known to involve two different mechanisms: -clustering-, or generating words within a subcategory, and, when a subcategory is exhausted, -switching- to a new subcategory. We extended this approach to random-walking on a network (clustering) in combination to jumping (switching) to any node with certain probability and derived its analytical expression based on Markov chains. Results show that this dual mechanism contributes to optimize the exploration of different network models in terms of the mean first passage time. Additionally, this cognitive inspired dual mechanism opens a new framework to better understand and evaluate exploration, propagation and transport phenomena in other complex systems where switching-like phenomena are feasible.Comment: 9 pages, 3 figures. Accepted in "International Journal of Bifurcations and Chaos": Special issue on "Modelling and Computation on Complex Networks

    Analysis of elementary school library web sites in southern New Jersey

    Get PDF
    Elementary school library media centers have the opportunity to utilize a Web site to promote the goals and objectives of the program, assist students with information literacy skills and encourage students to read more. Organizations such as the American Library Association and the International Association of School Librarianship provide guidelines for creating Web sites. The purpose of this study was to evaluate whether or not elementary school library media centers in southern New Jersey were using these guidelines when creating Web sites. Using a researcher designed checklist, Web sites were evaluated for information provided for all students, content for all students; content for students in grade k-2 and students in grades 3-5; ease of navigation, visual appeal and provision of information on site creation and maintenance. Results showed that the ALA and IASL guidelines were not being utilized and the Web sites were lacking in both overall content and design

    In-hospital worsening heart failure: a clinically relevant endpoint?

    Get PDF
    Outcome measures used for the clinical evaluation of patients with acute heart failure differ between studies and may neither adequately address the characteristic presenting symptoms and signs nor reflect the pathophysiological processes involved. In‐hospital worsening of heart failure (WHF) is associated with poor outcomes and thus a potential endpoint conveying clinically meaningful prognostic information.Current definitions of WHF are based on the combination of worsening symptoms and signs and the intensification of treatment during admission. Definitions vary across studies and do not fully account for baseline therapy or circumstances in which there is failure to respond to treatment. Further, there are limited data to inform healthcare professionals as to which patients are most at risk of developing in‐hospital WHF.In this opinion piece, we review the definitions for WHF used in recent and ongoing clinical trials and propose a novel definition, which captures failure to respond to treatment as well as clinical worsening (deterioration of symptoms and signs) of the patient's condition. Such a definition, applied consistently across studies, would help clarify the characteristics of patients likely to develop in‐hospital WHF, allow comparative assessments of the effectiveness of interventions, and help guide appropriate patient management in order to improve outcomes

    Naturally Rehearsing Passwords

    Full text link
    We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions. In particular, password management relies on assumptions about human memory, e.g., that a user who follows a particular rehearsal schedule will successfully maintain the corresponding memory. These assumptions are informed by research in cognitive science and validated through empirical studies. Given rehearsal requirements and a user's visitation schedule for each account, we use the total number of extra rehearsals that the user would have to do to remember all of his passwords as a measure of the usability of the password scheme. Our usability model leads us to a key observation: password reuse benefits users not only by reducing the number of passwords that the user has to memorize, but more importantly by increasing the natural rehearsal rate for each password. We also present a security model which accounts for the complexity of password management with multiple accounts and associated threats, including online, offline, and plaintext password leak attacks. Observing that current password management schemes are either insecure or unusable, we present Shared Cues--- a new scheme in which the underlying secret is strategically shared across accounts to ensure that most rehearsal requirements are satisfied naturally while simultaneously providing strong security. The construction uses the Chinese Remainder Theorem to achieve these competing goals
    corecore