419 research outputs found

    Adaptive LED Intensity Control Based on Camera Blocked State Detection

    Get PDF
    When video recording with flash is activated and the camera is placed on a surface that blocks the camera or in an enclosed space, the camera does not automatically transition to sleep mode. As a result, the LED of the flash continues to operate at full current which may cause overheating and can lead to melting of the LED lens, which is a safety concern. This disclosure describes techniques to automatically detect if a device camera is blocked during video recording or other conditions during which the flash is used. The detection is based on analysis of captured images from the camera as well as from available peripheral sensors to determine if the camera is covered. If the camera is covered, the LED current is set to a low, safe value; else, the LED continues to operate at normal current to provide flash functionality. In various implementations, detecting whether the camera is covered may be based on a voting mechanism where data from each sensor is used to produce a respective likelihood that the camera is covered, and the likelihoods are aggregated to make a determination of whether to adjust the LED current. Detection of whether the camera is blocked may be performed periodically while the LED is on. By automatically dimming the LED, the described techniques reduce power consumption and improve device safety

    On the growth of national geoparks in China: distribution, interpretation, and regional comparison

    Get PDF
    Since the year 2000 China has created 139 National Geoparks; it started under the guidance of the former UNESCO\u27s Division of Earth Science, and has therefore become one of the pioneers in this aspect. Many National Geoparks in China have been described over the past decade, but an understanding of the range of various landform features and their connection with geological and climatic constraints has not previously been published. Based on an increasing awareness of National Geoparks, the aim of this contribution is to provide a comprehensive overview of the National Geoparks of China by reviewing the geological heritage and their intrinsic linkages with geological and climatic controls. A regional comparison of the widespread clastic and karst Geopark landforms indicates that the development of these terrains can only be understood within a synthesis of tectonic constraints, climatic changes and lithological properties, whereas the variety of types, forms, scales and development patterns reflect processes in various climatic settings

    Thermodynamic and kinetic study of CO2 adsorption/desorptionon amine-functionalized sorbents

    Get PDF
    473-482The thermodynamic and kinetic characteristics of CO2 adsorption of SBA-16 loaded with pentaethylenehexamine (PEHA) have been investigated using adsorption column system. The Langmuir isotherm model fitts the CO2 adsorption isotherms well, and the average isosteric heat of adsorption is 59.6 kJ/mol, indicating that the CO2 adsorption on PEHA-loaded SBA-16 is chemisorption. The Avrami fractional dynamics model is very suitable for illustrating the adsorption behaviour of CO2 adsorption, and the results of kinetic analysis show that increasing the partial pressure of CO2 or the working temperature is beneficial to the adsorption of CO2. Three desorption methods were evaluatedto achieve the optimal desorption method. The results show that VTSA and steam stripping method are effective methods for industrial CO2 desorption. Steam stripping may be more suitable for plants that already have low-cost steam. The activation energy Ea of CO2 adsorption/desorption is calculated using Arrhenius equation. The activation energy Ea of CO2 adsorption/desorption was calculated using the Arrhenius equation. The results show that the absolute value of Ea (adsorption) decreases with the increase of CO2 partial pressure. In addition, the Ea value of vacuum rotary regeneration method and steam stripping method is smaller than the Ea value of temperature swing regeneration

    AFFIRM: Affinity Fusion-based Framework for Iteratively Random Motion correction of multi-slice fetal brain MRI

    Full text link
    Multi-slice magnetic resonance images of the fetal brain are usually contaminated by severe and arbitrary fetal and maternal motion. Hence, stable and robust motion correction is necessary to reconstruct high-resolution 3D fetal brain volume for clinical diagnosis and quantitative analysis. However, the conventional registration-based correction has a limited capture range and is insufficient for detecting relatively large motions. Here, we present a novel Affinity Fusion-based Framework for Iteratively Random Motion (AFFIRM) correction of the multi-slice fetal brain MRI. It learns the sequential motion from multiple stacks of slices and integrates the features between 2D slices and reconstructed 3D volume using affinity fusion, which resembles the iterations between slice-to-volume registration and volumetric reconstruction in the regular pipeline. The method accurately estimates the motion regardless of brain orientations and outperforms other state-of-the-art learning-based methods on the simulated motion-corrupted data, with a 48.4% reduction of mean absolute error for rotation and 61.3% for displacement. We then incorporated AFFIRM into the multi-resolution slice-to-volume registration and tested it on the real-world fetal MRI scans at different gestation stages. The results indicated that adding AFFIRM to the conventional pipeline improved the success rate of fetal brain super-resolution reconstruction from 77.2% to 91.9%

    Factors affecting the nucleolytic cleavage of DNA by (N,N′-ethylenendiaminediacetato)metal(II) complexes, M(edda). Crystal structure of Co(edda)

    Get PDF
    M(edda) complexes (Cu, Co, Ni, Zn) have been characterized by UV–visible spectroscopy and ESI-MS to study the species in aqueous solution. The Co complex crystallizes as the octahedral diaqua(N,N′-ethylenediaminediacetato)cobalt(II) monohydrate and its crystal structure is reported. Cu(edda) cleaves plasmid DNA in the presence of hydrogen peroxide better than Co(edda) while the Zn and Ni analogues are inactive. Partial and complete inhibition of DNA cleavage can be effected by radical scavengers and Na2H2EDTA, respectively. The cleavage efficiency of Cu(edda) varies with the concentration of the complex, pH of the buffer and the type of buffer. The difference in nucleolytic efficiency of Cu(edda) and other complexes studied can be explained by the difference in amount of OH radicals produced, as determined by a PNDA assay. ESI-MS and CD studies on the Cu(edda) complex confirms its binding to DNA and results in a non-denaturational type of conformation change

    HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption

    Get PDF
    Implementation of Fully Homomorphic Encryption (FHE) is challenging. Especially when considering hardware acceleration, the major performance bottleneck is data transfer. Here we propose an algebraic framework called Heterogenous Lattice Graph (HLG) to build and process computing graphs in Residue Number System (RNS), which is the basis of high performance implementation of mainstream FHE algorithms. There are three main design goals for HLG framework: • Design a dedicated IR (HLG IR) for RNS system, here splitting and combination of data placeholders has practical implications in an algebraic sense. Existing IRs cannot efficiently support these operations. • Lower the technical barriers for both crypto researchers and hardware engineers by decoupling front-end cryptographic algorithms from the back-end hardware platforms. The algorithms and solutions built on HLG framework can be written once and run everywhere. Researchers and engineers don’t need to understand each other. • Try to reduce the cost of data transfer between CPU and GPU/FPGA/dedicated hardware, by providing the intermediate representation (IR) of the computing graph for hardware compute engine, which allows task scheduling without help from CPU. We have implemented CKKS algorithm based on HLG framework, together with a compute engine for multiple CPU cores. Experiment shows that we can outperform SEAL v3 Library in several use cases in multi-threading scenarios

    Molecular characterization based on tumor microenvironment-related signatures for guiding immunotherapy and therapeutic resistance in lung adenocarcinoma

    Get PDF
    Background: Although the role of tumor microenvironment in lung adenocarcinoma (LUAD) has been explored in a number of studies, the value of TME-related signatures in immunotherapy has not been comprehensively characterized.Materials and Methods: Consensus clustering was conducted to characterize TME-based molecular subtypes using transcription data of LUAD samples. The biological pathways and immune microenvironment were assessed by CIBERSORT, ESTIMATE, and gene set enrichment analysis. A TME-related risk model was established through the algorithms of least absolute shrinkage and selection operator (Lasso) and stepwise Akaike information criterion (stepAIC).Results: Four TME-based molecular subtypes including C1, C2, C3, and C4 were identified, and they showed distinct overall survival, genomic characteristics, DNA methylation pattern, immune microenvironment, and biological pathways. C1 had the worst prognosis and high tumor proliferation rate. C3 and C4 had higher enrichment of anti-tumor signatures compared to C1 and C2. C4 had evidently low enrichment of epithelial–mesenchymal transition (EMT) signature and tumor proliferation rate. C3 was predicted to be more sensitive to immunotherapy compared with other subtypes. C1 is more sensitive to chemotherapy drugs, including Docetaxel, Vinorelbine and Cisplatin, while C3 is more sensitive to Paclitaxel. A five-gene risk model was constructed, which showed a favorable performance in three independent datasets. Low-risk group showed a longer overall survival, more infiltrated immune cells, and higher response to immunotherapy than high-risk group.Conclusion: This study comprehensively characterized the molecular features of LUAD patients based on TME-related signatures, demonstrating the potential of TME-based signatures in exploring the mechanisms of LUAD development. The TME-related risk model was of clinical value to predict LUAD prognosis and guide immunotherapy

    Identification of the phosphorylation sites on the E3 ubiquitin ligase Pellino that are critical for activation by IRAK1 and IRAK4

    Get PDF
    The E3 ubiquitin ligase Pellino can be activated by phosphorylation in vitro, catalyzed by IL-1 receptor-associated kinase 1 (IRAK1) or IRAK4. Here, we show that phosphorylation enhances the E3 ligase activity of Pellino 1 similarly with any of several E2-conjugating enzymes (Ubc13-Uev1a, UbcH4, or UbcH5a/5b) and identify 7 amino acid residues in Pellino 1 whose phosphorylation is critical for activation. Five of these sites are clustered between residues 76 and 86 (Ser-76, Ser-78, Thr-80, Ser-82, and Thr-86) and decorate a region of antiparallel β-sheet, termed the “wing,” which is an appendage of the forkhead-associated domain that is thought to interact with IRAK1. The other 2 sites are located at Thr-288 and Ser-293, just N-terminal to the RING-like domain that carries the E3 ligase activity. Unusually, the full activation of Pellino 1 can be achieved by phosphorylating any one of several different sites (Ser-76, Thr-86, Thr-288, or Ser-293) or a combination of other sites (Ser-78, Thr-80, and Ser-82). These observations imply that dephosphorylation of multiple sites is required to inactivate Pellino 1, which could be a device for prolonging Pellino's E3 ubiquitin ligase activity in vivo

    Awareness among women in Malaysia on the issue of financial abuse

    Get PDF
    Financial abuse refers to over control of a person’s money, income or asset. The problem occurs when lack of awareness about financial abuse and victims did not realize that they are experiencing it. This paper explores the issue of financial abuse among women in Malaysia and the objective is to analyze and understand the awareness of financial abuse among women in Malaysia. 231 women respondents had agreed to join a survey and data was collected through the distribution of online questionnaires using Google Forms and the data was analyzed using Google Form’s results. The result of the study shows that 40.3% of respondents understood financial abuse, while 35.9% of respondents agreed that financial abuse was incurred from individuals they knew. The study also found that 1.7% of respondents faced the issue of being forced to use their money without consent and hand over their money to certain parties. Strengthening the laws related to finance management and inheritance may protect women. Financial institutions also are expected to be the first to detect if this issue happens. The best way to overcome financial abuse against women is to seek knowledge and education. It should be considered a crime and awareness are extremely important
    corecore