2,810 research outputs found

    Asymptotic Normality of the Maximum Pseudolikelihood Estimator for Fully Visible Boltzmann Machines

    Full text link
    Boltzmann machines (BMs) are a class of binary neural networks for which there have been numerous proposed methods of estimation. Recently, it has been shown that in the fully visible case of the BM, the method of maximum pseudolikelihood estimation (MPLE) results in parameter estimates which are consistent in the probabilistic sense. In this article, we investigate the properties of MPLE for the fully visible BMs further, and prove that MPLE also yields an asymptotically normal parameter estimator. These results can be used to construct confidence intervals and to test statistical hypotheses. We support our theoretical results by showing that the estimator behaves as expected in a simulation study

    Mixtures of Spatial Spline Regressions

    Full text link
    We present an extension of the functional data analysis framework for univariate functions to the analysis of surfaces: functions of two variables. The spatial spline regression (SSR) approach developed can be used to model surfaces that are sampled over a rectangular domain. Furthermore, combining SSR with linear mixed effects models (LMM) allows for the analysis of populations of surfaces, and combining the joint SSR-LMM method with finite mixture models allows for the analysis of populations of surfaces with sub-family structures. Through the mixtures of spatial splines regressions (MSSR) approach developed, we present methodologies for clustering surfaces into sub-families, and for performing surface-based discriminant analysis. The effectiveness of our methodologies, as well as the modeling capabilities of the SSR model are assessed through an application to handwritten character recognition

    Determining Hybridization in Jack Pine and Lodgepole Pine from British Columbia

    Get PDF
    This study was conducted to find wood quality evidence of hybridization between jack pine (Pinus banksiana) and lodgepole pine (Pinus contorta var. latifolia) in northeast British Columbia (BC). To determine if wood and fiber traits could be used as distinguishing features among jack pine, lodgepole pine, and their hybrids, differences in morphology and wood and fiber traits were related to the genetic identity of each sample. Thirty samples each of pure lodgepole pine, pure jack pine, and potential hybrids were collected from the Prince George area of BC, the Smoky Lake area of Alberta, and the Fort Nelson region of BC, respectively. Two 10-mm cores (bark to bark) were taken from each tree and analyzed for fiber length and coarseness, microfibril angle (MFA), basic density, earlywood:latewood ratios, and cell dimensions. Needle and cone morphology was used to distinguish among species groups in the field. Based on genetically identified samples, the fiber traits that best differentiated among pure jack pine, lodgepole pine, and hybrids were MFA and cell area

    Four-year experience with methotrexate exposures.

    Get PDF
    INTRODUCTION: Unintentional methotrexate (MTX) acute oral overdose is rarely reported. METHODS: We conducted a retrospective chart review of all human exposure calls (\u3e150,000 charts) for MTX ingestions reported to our Poison Center during 2000-2003. RESULTS: Thirteen patients met the criteria. The average amount of MTX ingested was 13.03 mg (data from 7 cases), and the average patient age was 43 years (20 months to 80 years). No significant toxicities occurred. DISCUSSION: Although intravenous MTX toxicity can be severe, this does not appear to be a phenomenon associated with either acute unintentional or suicidal oral ingestion

    Precision Medicine in Lifestyle Medicine: The Way of the Future?

    Get PDF
    Precision medicine has captured the imagination of the medical community with visions of therapies precisely targeted to the specific individual’s genetic, biological, social, and environmental profile. However, in practice it has become synonymous with genomic medicine. As such its successes have been limited, with poor predictive or clinical value for the majority of people. It adds little to lifestyle medicine, other than in establishing why a healthy lifestyle is effective in combatting chronic disease. The challenge of lifestyle medicine remains getting people to actually adopt, sustain, and naturalize a healthy lifestyle, and this will require an approach that treats the patient as a person with individual needs and providing them with suitable types of support. The future of lifestyle medicine is holistic and person-centered rather than technological

    Inequalities in the dental health needs and access to dental services among looked after children in Scotland: a population data linkage study

    Get PDF
    Background: There is limited evidence on the health needs and service access among children and young people who are looked after by the state. The aim of this study was to compare dental treatment needs and access to dental services (as an exemplar of wider health and well-being concerns) among children and young people who are looked after with the general child population. Methods: Population data linkage study utilising national datasets of social work referrals for ‘looked after’ placements, the Scottish census of children in local authority schools, and national health service’s dental health and service datasets. Results: 633 204 children in publicly funded schools in Scotland during the academic year 2011/2012, of whom 10 927 (1.7%) were known to be looked after during that or a previous year (from 2007–2008). The children in the looked after children (LAC) group were more likely to have urgent dental treatment need at 5 years of age: 23%vs10% (n=209/16533), adjusted (for age, sex and area socioeconomic deprivation) OR 2.65 (95% CI 2.30 to 3.05); were less likely to attend a dentist regularly: 51%vs63% (n=5519/388934), 0.55 (0.53 to 0.58) and more likely to have teeth extracted under general anaesthesia: 9%vs5% (n=967/30253), 1.91 (1.78 to 2.04). Conclusions: LAC are more likely to have dental treatment needs and less likely to access dental services even when accounting for sociodemographic factors. Greater efforts are required to integrate child social and healthcare for LAC and to develop preventive care pathways on entering and throughout their time in the care system

    Plasma ATP concentration and venous oxygen content in the forearm during dynamic handgrip exercise

    Get PDF
    Background It has been proposed that adenosine triphosphate (ATP) released from red blood cells (RBCs) may contribute to the tight coupling between blood flow and oxygen demand in contracting skeletal muscle. To determine whether ATP may contribute to the vasodilatory response to exercise in the forearm, we measured arterialised and venous plasma ATP concentration and venous oxygen content in 10 healthy young males at rest, and at 30 and 180 seconds during dynamic handgrip exercise at 45% of maximum voluntary contraction (MVC). Results Venous plasma ATP concentration was elevated above rest after 30 seconds of exercise (P < 0.05), and remained at this higher level 180 seconds into exercise (P < 0.05 versus rest). The increase in ATP was mirrored by a decrease in venous oxygen content. While there was no significant relationship between ATP concentration and venous oxygen content at 30 seconds of exercise, they were moderately and inversely correlated at 180 seconds of exercise (r = -0.651, P = 0.021). Arterial ATP concentration remained unchanged throughout exercise, resulting in an increase in the venous-arterial ATP difference. Conclusions Collectively these results indicate that ATP in the plasma originated from the muscle microcirculation, and are consistent with the notion that deoxygenation of the blood perfusing the muscle acts as a stimulus for ATP release. That ATP concentration was elevated just 30 seconds after the onset of exercise also suggests that ATP may be a contributing factor to the blood flow response in the transition from rest to steady state exercise

    A meta-analytic assessment of a Thyroglobulin marker for marbling in beef cattle

    Get PDF
    A meta-analysis was undertaken reporting on the association between a polymorphism in the Thyroglobulin gene (TG5) and marbling in beef cattle. A Bayesian hierarchical model was adopted, with alternative representations assessed through sensitivity analysis. Based on the overall posterior means and posterior probabilities, there is substantial support for an additive association between the TG5 marker and marbling. The marker effect was also assessed across various breed groups, with each group displaying a high probability of positive association between the T allele and marbling. The WinBUGS program code used to simulate the model is included as an Appendix available online at

    How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy

    Get PDF
    This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a serious privacy concern. FIDO2 is a new standard specified by the FIDO industry alliance for secure token online authentication. It complements the W3C WebAuthn specification by providing means to use a USB token or other authenticator as a second factor during the authentication process. From a cryptographic perspective, the protocol is a simple challenge-response where the elliptic curve digital signature algorithm is used to sign challenges. To protect the privacy of the user the token uses unique key pairs per service. To accommodate for small memory, tokens use various techniques that make use of a special parameter called a key handle sent by the service to the token. One of the most popular techniques used by leading token manufacturers (e.g. Yubico), termed key wrapping, stores the encrypted secret key in the server’s database and provides it to the token via the key handle parameter. We identify and analyse a vulnerability in the way the processing of key handles is implemented that allows attackers to remotely link user accounts on multiple services. We show that for vulnerable authenticators there is a difference between the time it takes to process a key handle for a different service but correct authenticator, and for a different authenticator but correct service. This difference can be used to perform a timing attack allowing an adversary to link the same authenticator across different services. Two of the eight hardware authenticators we tested were vulnerable despite FIDO level 1 certification, indicating a not insignificant problem. This vulnerability cannot be easily mitigated on authenticators because, for security reasons, they usually do not allow firmware updates. In addition, we show that due to the way existing browsers implement the WebAuthn standard, the attack can be executed remotely. However, we discuss countermeasures that can be implemented by browser providers to mitigate the remote form of the attac
    corecore