scispace - formally typeset
Search or ask a question

Showing papers by "Florida Atlantic University published in 2013"


01 Jan 2013
TL;DR: In this article, Aviles et al. present a review of the state of the art in the field of test data analysis, which includes the following institutions: Stanford University, Stanford Graduate School of Education, Stanford University and the University of Southern California.
Abstract: EDITORIAL BOARD Robert Davison Aviles, Bradley University Harley E. Baker, California State University–Channel Islands Jean-Guy Blais, Universite de Montreal, Canada Catherine Y. Chang, Georgia State University Robert C. Chope, San Francisco State University Kevin O. Cokley, University of Missouri, Columbia Patricia B. Elmore, Southern Illinois University Shawn Fitzgerald, Kent State University John J. Fremer, Educational Testing Service Vicente Ponsoda Gil, Universidad Autonoma de Madrid, Spain Jo-Ida C. Hansen, University of Minnesota Charles C. Healy, University of California at Los Angeles Robin K. Henson, University of North Texas Flaviu Adrian Hodis, Victoria University of Wellington, New Zealand Janet K. Holt, Northern Illinois University David A. Jepsen, The University of Iowa Gregory Arief D. Liem, National Institute of Education, Nanyang Technological University Wei-Cheng J. Mau, Wichita State University Larry Maucieri, Governors State College Patricia Jo McDivitt, Data Recognition Corporation Peter F. Merenda, University of Rhode Island Matthew J. Miller, University of Maryland Ralph O. Mueller, University of Hartford Jane E. Myers, The University of North Carolina at Greensboro Philip D. Parker, University of Western Sydney Ralph L. Piedmont, Loyola College in Maryland Alex L. Pieterse, University at Albany, SUNY Nicholas J. Ruiz, Winona State University James P. Sampson, Jr., Florida State University William D. Schafer, University of Maryland, College Park William E. Sedlacek, University of Maryland, College Park Marie F. Shoffner, University of Virginia Len Sperry, Florida Atlantic University Kevin Stoltz, University of Mississippi Jody L. Swartz-Kulstad, Seton Hall University Bruce Thompson, Texas A&M University Timothy R. Vansickle, Minnesota Department of Education Steve Vensel, Palm Beach Atlantic University Dan Williamson, Lindsey Wilson College F. Robert Wilson, University of Cincinnati

1,306 citations


Journal ArticleDOI
TL;DR: Declaring all developmental trajectories to be equally valid would not change the robust relation between English oral language skills and academic achievement and would not help children with poor English skills to be successful in school.
Abstract: On average, children from low socioeconomic status (SES) homes and children from homes in which a language other than English is spoken have language development trajectories that are different from those of children from middle-class, monolingual English-speaking homes. Children from low-SES and language minority homes have unique linguistic strengths, but many reach school age with lower levels of English language skill than do middle-class, monolingual children. Because early differences in English oral languageskill have consequences for academic achievement, low levels of English language skill constitute a deficit for children about to enter school in the United States. Declaring all developmental trajectories to be equally valid would not change the robust relation between English oral language skills and academic achievement and would not help children with poor English skills to be successful in school. Remedies aimed at supporting the development of the English skills required for academic success need not and should not entail devaluing or diminishing children’s other language skills.

768 citations


Journal ArticleDOI
TL;DR: Photosynthetic and growth rates of marine macro-autotrophs are likely to increase under elevated [CO2 ] similar to terrestrial C3 species, and fluxes control micro-environments that promote calcification over dissolution and may be more important than CaCO3 mineralogy in predicting macroalgal responses to OA.
Abstract: Although seagrasses and marine macroalgae (macro-autotrophs) play critical ecological roles in reef, lagoon, coastal and open-water ecosystems, their response to ocean acidification (OA) and climate change is not well understood. In this review, we examine marine macro-autotroph biochemistry and physiology relevant to their response to elevated dissolved inorganic carbon [DIC], carbon dioxide [CO2 ], and lower carbonate [CO3 (2-) ] and pH. We also explore the effects of increasing temperature under climate change and the interactions of elevated temperature and [CO2 ]. Finally, recommendations are made for future research based on this synthesis. A literature review of >100 species revealed that marine macro-autotroph photosynthesis is overwhelmingly C3 (≥ 85%) with most species capable of utilizing HCO3 (-) ; however, most are not saturated at current ocean [DIC]. These results, and the presence of CO2 -only users, lead us to conclude that photosynthetic and growth rates of marine macro-autotrophs are likely to increase under elevated [CO2 ] similar to terrestrial C3 species. In the tropics, many species live close to their thermal limits and will have to up-regulate stress-response systems to tolerate sublethal temperature exposures with climate change, whereas elevated [CO2 ] effects on thermal acclimation are unknown. Fundamental linkages between elevated [CO2 ] and temperature on photorespiration, enzyme systems, carbohydrate production, and calcification dictate the need to consider these two parameters simultaneously. Relevant to calcifiers, elevated [CO2 ] lowers net calcification and this effect is amplified by high temperature. Although the mechanisms are not clear, OA likely disrupts diffusion and transport systems of H(+) and DIC. These fluxes control micro-environments that promote calcification over dissolution and may be more important than CaCO3 mineralogy in predicting macroalgal responses to OA. Calcareous macroalgae are highly vulnerable to OA, and it is likely that fleshy macroalgae will dominate in a higher CO2 ocean; therefore, it is critical to elucidate the research gaps identified in this review.

675 citations


Journal ArticleDOI
TL;DR: This work identifies the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.
Abstract: Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.

665 citations


Journal ArticleDOI
TL;DR: Assessment of general surgery graduate trainees entering accredited surgical subspecialty fellowships in North America revealed deficits in domains of operative autonomy, progressive responsibility, longitudinal follow-up, and scholarly focus after general surgery education.
Abstract: Objective:To assess readiness of general surgery graduate trainees entering accredited surgical subspecialty fellowships in North America.Methods:A multidomain, global assessment survey designed by the Fellowship Council research committee was electronically sent to all subspecialty program director

641 citations


Journal ArticleDOI
TL;DR: Analysis of clade-specific shifts in diversification rates reveal that the hyperdiversity of living acanthomorphs is highlighted by several rapidly radiating lineages including tunas, gobies, blennies, snailfishes, and Afro-American cichlids, indicating there is no single explanation for the success of acanthomorphics.
Abstract: Spiny-rayed fishes, or acanthomorphs, comprise nearly one-third of all living vertebrates. Despite their dominant role in aquatic ecosystems, the evolutionary history and tempo of acanthomorph diversification is poorly understood. We investigate the pattern of lineage diversification in acanthomorphs by using a well-resolved time-calibrated phylogeny inferred from a nuclear gene supermatrix that includes 520 acanthomorph species and 37 fossil age constraints. This phylogeny provides resolution for what has been classically referred to as the “bush at the top” of the teleost tree, and indicates acanthomorphs originated in the Early Cretaceous. Paleontological evidence suggests acanthomorphs exhibit a pulse of morphological diversification following the end Cretaceous mass extinction; however, the role of this event on the accumulation of living acanthomorph diversity remains unclear. Lineage diversification rates through time exhibit no shifts associated with the end Cretaceous mass extinction, but there is a global decrease in lineage diversification rates 50 Ma that occurs during a period when morphological disparity among fossil acanthomorphs increases sharply. Analysis of clade-specific shifts in diversification rates reveal that the hyperdiversity of living acanthomorphs is highlighted by several rapidly radiating lineages including tunas, gobies, blennies, snailfishes, and Afro-American cichlids. These lineages with high diversification rates are not associated with a single habitat type, such as coral reefs, indicating there is no single explanation for the success of acanthomorphs, as exceptional bouts of diversification have occurred across a wide array of marine and freshwater habitats.

435 citations



Journal ArticleDOI
TL;DR: This study develops and tests a framework of information privacy and its correlates, based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework, that is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.
Abstract: Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.

347 citations


Journal ArticleDOI
TL;DR: Results indicate that cyberbullying offending is associated with perceptions of peers behaving similarly, and the likelihood of sanction by adults, and that youth who believed that many of their friends were involved in bullying and cyber Bullying were themselves more likely to report cyberbullies behaviors.
Abstract: Cyberbullying is a problem affecting a mean- ingful proportion of youth as they embrace online com- munication and interaction. Research has identified a number of real-world negative ramifications for both the targets and those who bully. During adolescence, many behavioral choices are influenced and conditioned by the role of major socializing agents, including friends, family, and adults at school. The purpose of this study was to determine the extent to which peers, parents, and educators influence the cyberbullying behaviors of adolescents. To explore this question, data were analyzed from a random sample of approximately 4,400 sixth through twelfth grade students (49 % female; 63 % nonwhite) from thirty-three schools in one large school district in the southern United States. Results indicate that cyberbullying offending is associated with perceptions of peers behaving similarly, and the likelihood of sanction by adults. Specifically, youth who believed that many of their friends were involved in bullying and cyberbullying were themselves more likely to report cyberbullying behaviors. At the same time, respon- dents who believed that the adults in their life would punish them for cyberbullying were less likely to participate. Implications for schools and families are discussed with the goal of mitigating this behavior and its negative outcomes among adolescent populations.

337 citations


Proceedings ArticleDOI
04 Nov 2013
TL;DR: This paper proposes to combine permission and API (Application Program Interface) calls and use machine learning methods to detect malicious Android Apps and can be generalized to all mobile applications.
Abstract: The Google Android mobile phone platform is one of the most anticipated smartphone operating systems on the market. The open source Android platform allows developers to take full advantage of the mobile operation system, but also raises significant issues related to malicious applications. On one hand, the popularity of Android absorbs attention of most developers for producing their applications on this platform. The increased numbers of applications, on the other hand, prepares a suitable prone for some users to develop different kinds of malware and insert them in Google Android market or other third party markets as safe applications. In this paper, we propose to combine permission and API (Application Program Interface) calls and use machine learning methods to detect malicious Android Apps. In our design, the permission is extracted from each App's profile information and the APIs are extracted from the packed App file by using packages and classes to represent API calls. By using permissions and API calls as features to characterize each Apps, we can learn a classifier to identify whether an App is potentially malicious or not. An inherent advantage of our method is that it does not need to involve any dynamical tracing of the system calls but only uses simple static analysis to find system functions involved in each App. In addition, because permission settings and APIs are alwaysavailable for each App, our method can be generalized to all mobile applications. Experiments on real-world Apps with more than 1200 malware and 1200 benign samples validate the algorithm performance.

307 citations


Journal ArticleDOI
TL;DR: A clear and compelling role is revealed for the rodent hippocampus in nonspatial object memory during object memory encoding and consolidation, just consolidation, and/or retrieval.

Journal ArticleDOI
TL;DR: The aim of this review is to highlight recent developments in the study of hnRNP A1 and to describe its functions in cellular and viral gene expression and its role in human pathologies.
Abstract: Eukaryotic cells express a large variety of RNA binding proteins (RBPs), with diverse affinities and specificities towards target RNAs. These proteins play a crucial role in almost every aspect of RNA biogenesis, expression and function. The heterogeneous nuclear ribonucleoproteins (hnRNPs) are a complex and diverse family of RNA binding proteins. hnRNPs display multiple functions in the processing of heterogeneous nuclear RNAs into mature messenger RNAs. hnRNP A1 is one of the most abundant and ubiquitously expressed members of this protein family. hnRNP A1 plays multiple roles in gene expression by regulating major steps in the processing of nascent RNA transcripts. The transcription, splicing, stability, export through nuclear pores and translation of cellular and viral transcripts are all mechanisms modulated by this protein. The diverse functions played by hnRNP A1 are not limited to mRNA biogenesis, but extend to the processing of microRNAs, telomere maintenance and the regulation of transcription factor activity. Genomic approaches have recently uncovered the extent of hnRNP A1 roles in the development and differentiation of living organisms. The aim of this review is to highlight recent developments in the study of this protein and to describe its functions in cellular and viral gene expression and its role in human pathologies.

Journal ArticleDOI
TL;DR: This review will examine stress-induced cardiovascular reactivity and plausible explanations for how exercise training and physical fitness (aerobic and resistance exercise) can attenuate cardiovascular responses to stress to facilitate a reduction in the incidence of stroke and myocardial infarction.
Abstract: Psychological stress has been proposed as a major contributor to the progression of cardiovascular disease (CVD). Acute mental stress can activate the sympathetic-adrenal-medullary (SAM) axis, eliciting the release of catecholamines (NE and EPI) resulting in the elevation of heart rate (HR) and blood pressure (BP). Combined stress (psychological and physical) can exacerbate these cardiovascular responses, which may partially contribute to the elevated risk of CVD and increased proportionate mortality risks experienced by some occupations (e.g., firefighting and law enforcement). Studies have supported the benefits of physical activity on physiological and psychological health, including the cardiovascular response to acute stress. Aerobically trained individuals exhibit lower sympathetic nervous system (e.g., HR) reactivity and enhanced cardiovascular efficiency (e.g., lower vascular reactivity and decreased recovery time) in response to physical and/or psychological stress. In addition, resistance training has been demonstrated to attenuate cardiovascular responses and improve mental health. This review will examine stress-induced cardiovascular reactivity and plausible explanations for how exercise training and physical fitness (aerobic and resistance exercise) can attenuate cardiovascular responses to stress. This enhanced functionality may facilitate a reduction in the incidence of stroke and myocardial infarction. Finally, this review will also address the interaction of obesity and physical activity on cardiovascular reactivity and CVD.

Journal ArticleDOI
TL;DR: In this article, four axisymmetric core-collapse supernova simulations employing detailed spectral neutrino transport computed with CHIMERA code and initiated from Woosley and Heger progenitors of mass 12, 15, 20, and 25 M{sub Sun } are presented.
Abstract: We present an overview of four ab initio axisymmetric core-collapse supernova simulations employing detailed spectral neutrino transport computed with our CHIMERA code and initiated from Woosley and Heger progenitors of mass 12, 15, 20, and 25 M{sub Sun }. All four models exhibit shock revival over {approx}200 ms (leading to the possibility of explosion), driven by neutrino energy deposition. Hydrodynamic instabilities that impart substantial asymmetries to the shock aid these revivals, with convection appearing first in the 12 M{sub Sun} model and the standing accretion shock instability appearing first in the 25 M{sub Sun} model. Three of the models have developed pronounced prolate morphologies (the 20 M{sub Sun} model has remained approximately spherical). By 500 ms after bounce the mean shock radii in all four models exceed 3000 km and the diagnostic explosion energies are 0.33, 0.66, 0.65, and 0.70 Bethe (B = 10{sup 51} erg) for the 12, 15, 20, and 25 M{sub Sun} models, respectively, and are increasing. The three least massive of our models are already sufficiently energetic to completely unbind the envelopes of their progenitors (i.e., to explode), as evidenced by our best estimate of their explosion energies, which first become positive at 320, 380, andmore » 440 ms after bounce. By 850 ms the 12 M{sub Sun} diagnostic explosion energy has saturated at 0.38 B, and our estimate for the final kinetic energy of the ejecta is {approx}0.3 B, which is comparable to observations for lower mass progenitors.« less

Journal ArticleDOI
TL;DR: In this paper, the authors take a somewhat different approach, describing loneliness in terms of perceived social isolation, and identify unique properties of adolescence that carry special risk for perceived social isolate, such as (but are not limited to) developmental changes in companions, developmental change in autonomy and individuation, identity exploration, cognitive maturation, and physical maturity.

Journal ArticleDOI
TL;DR: By conducting a statistical significance analysis of density values, it is now possible to evaluate formally the statistical significance of the extensiveness of locations with high density values in order to allocate limited resources for accident prevention and safety improvement effectively.

Journal ArticleDOI
TL;DR: In this article, a content analysis of 1,095 traveler comments posted between 2010 and 2013 on an airport review web site was performed in order to identify satisfiers/dissatisfiers.
Abstract: Purpose – Considering the complexity of the airport industry service palette, it is important to identify which air travel factors are distractors and which factors are enhancers of passenger satisfaction. Building on Herzberg's two-factor motivation theory, this study aims to explore most frequently mentioned attributes of airport service quality and distinguish key drivers for passenger satisfaction/dissatisfaction in the airport context. Design/methodology/approach – A content analysis of 1,095 traveler comments posted between 2010 and 2013 on an airport review web site was performed in order to identify satisfiers/dissatisfiers. The web spider randomly selected consumer comments related to 33 popular destinations. Findings – The study results indicated key satisfiers in the airport context such as cleanliness and pleasant environment to spend time in. On the other side, security-check, confusing signage and poor dining offer are recognized as major dissatisfiers in the airport setting. Practical impli...

Journal ArticleDOI
TL;DR: The analysis revealed several myths about the nature and extent of cyberbullying that are being fueled by media headlines and unsubstantiated public declarations and are clarified using data that are currently available so that adults who work with youth will have an accurate understanding of cyber Bullying to better assist them in effective prevention and response.

Journal ArticleDOI
TL;DR: In this article, the authors examined whether the servicescape should be subsumed as a dimension within service quality or whether it is a unique construct in itself which precedes service quality evaluations and behavioral intentions.
Abstract: Purpose – The purpose of this paper is to examine whether the servicescape should be subsumed as a dimension within service quality conceptualizations or whether it is a unique construct in itself which precedes service quality evaluations and behavioral intentions. The authors both propose and operationalize this model and in doing so make a theoretical contribution by demonstrating how a delineation between these two constructs is necessary in order for theory to progress in this area. Design/methodology/approach – A total of 355 customers were intercepted as they exited a retail store and surveyed using a structured questionnaire. The data were then analyzed using structural equation modeling to test the research hypotheses. Findings – This paper finds that it is more appropriate to model the servicescape as a separate construct which precedes service quality thus highlighting a need for a demarcation to be made between these important constructs. In addition, the authors find that design is a significant contributor to behavioral intentions further confirming the necessity to manage service environments in order to generate repatronage behaviors. Practical implications – Service providers should consider the influence of store environments in shaping service quality perceptions and their subsequent impact on behavioral intentions. Originality/value – The paper adds to the existing literature by disentangling the complicated relationships between service environments, service quality and behavioral intentions. Furthermore, the findings indicate to practitioners which aspects of the servicescape require attention so as to maximize repatronage intentions.

Journal Article
TL;DR: This paper gives an overview of Vehicular ad hoc networks (VANETs) and the existing VANET routing protocols; mainly it focused on vehicle to vehicle (V2V) communication and protocols.
Abstract: In recent years, the aspect of vehicular ad hoc network (VANET) is becoming an interesting research area; VANET is a mobile ad hoc network considered as a special case of mobile ad hoc network (MANET). Similar to MANET, VANET is characterized as autonomous and self-configured wireless network. However, VANET has very dynamic topology, large and variable network size, and constrained mobility; these characteristics led to the need for efficient routing and resource saving VANET protocols, to fit with different VANET environments. These differences render traditional MANET's protocols unsuitable for VANET. The aim of this work is to give a survey of the VANETs routing mechanisms, this paper gives an overview of Vehicular ad hoc networks (VANETs) and the existing VANET routing protocols; mainly it focused on vehicle to vehicle (V2V) communication and protocols. The paper also represents the general outlines and goals of VANETs, investigates different routing schemes that have been developed for VANETs, as well as providing classifications of VANET routing protocols (focusing on two classification forms), and gives summarized comparisons between different classes in the context of their methodologies used, strengths, and limitations of each class scheme compared to other classes. Finally, it extracts the current trends and the challenges for efficient routing mechanisms in VANETs.

Journal ArticleDOI
TL;DR: The results support the use of total vocabulary as a means of assessing early language development in young bilingual Spanish-English speaking children.
Abstract: Purpose Vocabulary assessment holds promise as a way to identify young bilingual children at risk for language delay. This study compares 2 measures of vocabulary in a group of young Spanish–Englis...

Journal ArticleDOI
TL;DR: In this study, a multi-scale approach was used for classifying land cover in a high resolution image of an urban area using pixels and image segments assigned the spectral, texture, size, and shape information of their super-objects from coarser segmentations of the same scene.
Abstract: In this study, a multi-scale approach was used for classifying land cover in a high resolution image of an urban area. Pixels and image segments were assigned the spectral, texture, size, and shape information of their super-objects (i.e. the segments that they are located within) from coarser segmentations of the same scene, and this set of super-object information was used as additional input data for image classification. The accuracies of classifications that included super-object variables were compared with the classification accuracies of image segmentations that did not include super-object information. The highest overall accuracy and kappa coefficient achieved without super-object information was 78.11% and 0.727%, respectively. When single pixels or fine-scale image segments were assigned the statistics of their super-objects prior to classification, overall accuracy increased to 84.42% and the kappa coefficient increased to 0.804.

Journal ArticleDOI
TL;DR: The first stage of the NRAR project focused on producing an initial set of numerical waveforms from binary black holes with moderate mass ratios and spins, as well as one non-spinning binary configuration which has a mass ratio of 10 as mentioned in this paper.
Abstract: The Numerical–Relativity–Analytical–Relativity (NRAR) collaboration is a joint effort between members of the numerical relativity, analytical relativity and gravitational-wave data analysis communities. The goal of the NRAR collaboration is to produce numerical-relativity simulations of compact binaries and use them to develop accurate analytical templates for the LIGO/Virgo Collaboration to use in detecting gravitational-wave signals and extracting astrophysical information from them. We describe the results of the first stage of the NRAR project, which focused on producing an initial set of numerical waveforms from binary black holes with moderate mass ratios and spins, as well as one non-spinning binary configuration which has a mass ratio of 10. All of the numerical waveforms are analysed in a uniform and consistent manner, with numerical errors evaluated using an analysis code created by members of the NRAR collaboration. We compare previously-calibrated, non-precessing analytical waveforms, notably the effective-one-body (EOB) and phenomenological template families, to the newly-produced numerical waveforms. We find that when the binary's total mass is ~100–200M⊙, current EOB and phenomenological models of spinning, non-precessing binary waveforms have overlaps above 99% (for advanced LIGO) with all of the non-precessing-binary numerical waveforms with mass ratios ≤4, when maximizing over binary parameters. This implies that the loss of event rate due to modelling error is below 3%. Moreover, the non-spinning EOB waveforms previously calibrated to five non-spinning waveforms with mass ratio smaller than 6 have overlaps above 99.7% with the numerical waveform with a mass ratio of 10, without even maximizing on the binary parameters.

Journal ArticleDOI
TL;DR: It is shown that substoichiometric concentrations of T TR tetramers suppress Aβ aggregation in vitro via an interaction between the thyroxine binding pocket of the TTR tetramer and Aβ residues 18–21.
Abstract: Tissue-specific overexpression of the human systemic amyloid precursor transthyretin (TTR) ameliorates Alzheimer's disease (AD) phenotypes in APP23 mice. TTR-β-amyloid (Aβ) complexes have been isolated from APP23 and some human AD brains. We now show that substoichiometric concentrations of TTR tetramers suppress Aβ aggregation in vitro via an interaction between the thyroxine binding pocket of the TTR tetramer and Aβ residues 18-21 (nuclear magnetic resonance and epitope mapping). The K(D) is micromolar, and the stoichiometry is <1 for the interaction (isothermal titration calorimetry). Similar experiments show that engineered monomeric TTR, the best inhibitor of Aβ fibril formation in vitro, did not bind Aβ monomers in liquid phase, suggesting that inhibition of fibrillogenesis is mediated by TTR tetramer binding to Aβ monomer and both tetramer and monomer binding of Aβ oligomers. The thousand-fold greater concentration of tetramer relative to monomer in vivo makes it the likely suppressor of Aβ aggregation and disease in the APP23 mice.

Journal ArticleDOI
TL;DR: In this paper, the authors compared the Z4c and Baumgarte-Shapiro-Shibata-Nakamura-Oohara-Kojima (BSSNOK) formulations for the numerical solution of the $3+1$ Einstein equations with the puncture gauge.
Abstract: Numerical relativity simulations of compact binaries with the Z4c and Baumgarte-Shapiro-Shibata-Nakamura-Oohara-Kojima (BSSNOK) formulations are compared. The Z4c formulation is advantageous in every case considered. In simulations of nonvacuum spacetimes, the constraint violations due to truncation errors are between 1 and 3 orders of magnitude lower in the Z4c evolutions. Improvements are also found in the accuracy of the computed gravitational radiation. For equal-mass irrotational binary neutron star evolutions, we find that the absolute errors in phase and amplitude of the waveforms can be up to a factor of 4 smaller. The quality of the Z4c numerical data is also demonstrated by a remarkably accurate computation of the Arnowitt-Deser-Misner mass from surface integrals. For equal-mass nonspinning binary puncture black hole evolutions, we find that the absolute errors in phase and amplitude of the waveforms can be up to a factor of 2 smaller. In the same evolutions, we find that away from the punctures the Hamiltonian constraint violation is reduced by between 1 and 2 orders of magnitude. Furthermore, the utility of gravitational radiation controlling, constraint preserving boundary conditions for the Z4c formulation is demonstrated. The evolution of spacetimes containing a single compact object confirms earlier results in spherical symmetry. The boundary conditions avoid spurious and nonconvergent effects present in high resolution runs with either formulation with a more naive boundary treatment. We conclude that Z4c is preferable to BSSNOK for the numerical solution of the $3+1$ Einstein equations with the puncture gauge.

Journal ArticleDOI
TL;DR: The presence of autophagic vesicles containing mitochondria in lens epithelial cells, immature lens fiber cells and during early stages of lens fiber cell differentiation is demonstrated to provide evidence that autophagy occurs throughout the lens and that mitophagy functions in the lens to remove damaged mitochondria from the lens epithelium.

Journal ArticleDOI
TL;DR: The results suggest that the 5HT2AR may be a potential therapeutic target for enhancing hippocampal and amygdala-dependent memory and the view that serotonergic activation of the 5 HT2AR provides an important modulatory influence on circuits engaged during extinction learning.

Journal ArticleDOI
TL;DR: In this article, the authors evaluated the durability characteristics of low-calcium fly ash-based geopolymer concrete that was subjected to a corrosive marine environment and found that fly ash is more resistant to corrosion than portland cement.
Abstract: The use of supplementary cementitious materials as partial replacements of the cement in concrete will play a significant role with respect to the environmental control of greenhouse effects and global temperature reduction. The development of geopolymer concrete (GPC), in which all of the portland cement is replaced with fly ash (in combination with sodium hydroxide and sodium silicate solutions), offers a promising alternative to ordinary portland cement concrete. This paper evaluates the durability characteristics of low-calcium fly ash–based geopolymer concrete that was subjected to a corrosive marine environment. A series of GPC beams, which contained fly ash with 8- and 14-M concentrations of NaOH and SiO2/Na2O solutions, respectively, and were centrally reinforced with a 13-mm rebar, were tested for accelerated corrosion exposure with wet and dry cycling in artificial seawater and an induced current. A sudden rise in the current intensity that is attributable to specimen cracking was indica...

Journal ArticleDOI
TL;DR: The present findings show that cues to forget benefit the remaining information in visual working memory by fundamentally improving their quality relative to conditions in which just as many items are encoded but no cue is provided.
Abstract: Recent research using change-detection tasks has shown that a directed-forgetting cue, indicating that a subset of the information stored in memory can be forgotten, significantly benefits the other information stored in visual working memory. How do these directed-forgetting cues aid the memory representations that are retained? We addressed this question in the present study by using a recall paradigm to measure the nature of the retained memory representations. Our results demonstrated that a directed-forgetting cue leads to higher-fidelity representations of the remaining items and a lower probability of dropping these representations from memory. Next, we showed that this is made possible by the to-be-forgotten item being expelled from visual working memory following the cue, allowing maintenance mechanisms to be focused on only the items that remain in visual working memory. Thus, the present findings show that cues to forget benefit the remaining information in visual working memory by fundamentally improving their quality relative to conditions in which just as many items are encoded but no cue is provided.

Journal ArticleDOI
TL;DR: The authors developed an activity-focused process model of how new ideas can be transformed into front line practice by reviving attention to the importance of habitualization as a key component of institutionalization.
Abstract: We develop an activity-focused process model of how new ideas can be transformed into front line practice by reviving attention to the importance of habitualization as a key component of institutionalization. In contrast to established models that explain how ideas diffuse or spread from one organization to another, we employ a micro-level perspective to study the subsequent intra-organizational processes through which these ideas are transformed into new workplace practices. We followed efforts to transform the organizationally accepted idea of �interdisciplinary teamwork� into new everyday practices in four cases over a six year time period. We contribute to the literature by focusing on de-habitualizing and re-habitualizing behaviours that connect micro-level actions with organizational level theorizing. Our model illuminates three phases that we propose are essential to creating and sustaining this connection: micro-level theorizing, encouraging trying the new practices, and facilitating collective meaning-making.