Frazier A.E.,State University of New York at Buffalo |
Wang L.,State University of New York at Buffalo |
Wang L.,Information and Analysis Center
Remote Sensing of Environment | Year: 2011
Invasive species disrupt landscape patterns and compromise the functionality of ecosystem processes. Non-native saltcedar poses significant threats to native vegetation and groundwater resources in the southwestern U.S. and Mexico, and quantifying spatial and temporal distribution patterns is essential for monitoring its spread. Considerable research focuses on determining the accuracy of various remote sensing techniques for distinguishing saltcedar from native woody riparian vegetation through sub-pixel, or soft classifications. However, there is a lack of research quantifying spatial distribution patterns from these classifications, mainly because landscape metrics, which are commonly used to statistically assess these patterns, require bounded classes and cannot be applied directly to soft classifications. This study tests a new method for discretizing sub-pixel data to generate landscape metrics using a continuum of fractional cover thresholds. The developed approach transforms sub-pixel classifications into discrete maps compliant with metric terms and computes and interprets metric results in the context of the region to explain patterns in the extent, distribution, and connectivity of saltcedar in the Rio Grande basin. Results indicate that landscape metrics are sensitive to sub-pixel values and can vary greatly with fractional cover. Therefore spectral unmixing should be performed prior to metric calculations. Analysis of metric trends provides evidence that saltcedar has expanded away from the immediate riparian zones and is displacing native vegetation. This information, coupled with control management strategies, can be used to target remediation activities along the Rio Grande. © 2011 Elsevier Inc.
Sharp M.W.,Information and Analysis Center
Propellants, Explosives, Pyrotechnics | Year: 2016
The NATO Munitions Safety Information Analysis Center (MSIAC) is a multinational collaboration that collects, stores, and analyses technical information related to Munitions Safety (MS) and Insensitive Munitions (IM). MSIAC supports its member nations through a variety of products and services. In addition to a core responsibility of addressing technical questions related to Munitions Safety posed by members, MSIAC has a diverse programme of work aimed at developing and sharing the related underpinning scientific knowledge. This is applied to support munition safety policy development and implementation. This article provides an overview of some of the current and future areas of work which MSIAC is involved in, with a focus on IM and energetic materials. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim
Imoto S.,Information and Analysis Center
Oncogene | Year: 2016
Metastasis is a critical factor contributing to poor prognosis in cancer, but the underlying mechanisms of metastasis are still poorly understood. We established a highly metastatic cell subline (HOC313-LM) derived from an oral squamous cell carcinoma cell line (HOC313) for uncovering the mechanisms of metastasis, and identified deoxyhypusine synthase (DHPS) as a metastasis-associated gene within the specific amplification at 19p13.2–p13.13 in HOC313-LM. DHPS-mediated hypusine-modification of eukaryotic translation factor 5A facilitated the translation of RhoA, resulting in the activation of the RhoA signaling pathway and leading to not only increased cell motility, invasion and metastasis of cancer cells in vitro, but also increased tumor growth in vivo. Moreover, the use of N1-Guanyl-1,7-diaminoheptane, a DHPS inhibitor, resulted in a significant decrease in tumor formation in vivo. In patients with esophageal squamous cell carcinoma (ESCC), overexpression of DHPS in ESCC tumors was significantly associated with worse recurrence-free survival, and correlated with distant metastasis. The elucidation of these molecular mechanisms within the hypusine cascade suggests opportunities for novel therapeutic targets in SCC.Oncogene advance online publication, 4 April 2016; doi:10.1038/onc.2016.71. © 2016 Macmillan Publishers Limited
Koch E.-C.,Information and Analysis Center |
Weiser V.,Fraunhofer Institute for Chemical Technology |
Roth E.,Fraunhofer Institute for Chemical Technology
Angewandte Chemie - International Edition | Year: 2012
Deceiving with TNT: Melt-cast pyrotechnic mixtures based on 2,4,6-trinitrotoluene (TNT)/KClO 4 (see picture for flame) spectrally matched infrared decoy flares and show superior performance and greatly reduced sensitivity in comparison to common pyrotechnic or double-base material currently in use for IR countermeasure flares. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Sharma A.,Information and Analysis Center |
Sharma A.,University of The South Pacific |
Imoto S.,Information and Analysis Center |
Miyano S.,Information and Analysis Center |
Sharma V.,CWM Hospital
International Journal of Machine Learning and Cybernetics | Year: 2012
Feature selection is quite an important process in gene expression data analysis. Feature selection methods discard unimportant genes from several thousands of genes for finding important genes or pathways for the target biological phenomenon like cancer. The obtained gene subset is used for statistical analysis for prediction such as survival as well as functional analysis for understanding biological characteristics. In this paper we propose a null space based feature selection method for gene expression data in terms of supervised classification. The proposed method discards the redundant genes by applying the information of null space of scatter matrices. We derive the method theoretically and demonstrate its effectiveness on several DNA gene expression datasets. The method is easy to implement and computationally efficient. © 2011 Springer-Verlag.
Gureyev V.N.,Information and Analysis Center |
Mazov N.A.,Russian Academy of Sciences
Information Technology and Libraries | Year: 2013
Bibliometric analyses were used to identify journals that are representative of the authors' research institutes. Methods to semiautomatically collect data for an institute's publications and which journals they cite are described. Citation analyses of lists of articles and their citations can help librarians to quickly identify the preferred journals in terms of the number of publications, and the most frequently cited journals. Librarians can use these data to generate a list of journals that an institute should subscribe to.
Koch E.-C.,Information and Analysis Center |
Klapotke T.M.,Ludwig Maximilians University of Munich
Propellants, Explosives, Pyrotechnics | Year: 2012
The detonation velocity, detonation pressure, and cylinder expansion energy of a series of boron compounds including nitroalkylborates, and mixed amino-nitrosusbtituted borazines, borazenes, iminoboranes, and azaboridines were calculated with Cheetah 2.0. The detonation velocity of the boron compounds is always superior to the all-carbon analogues at the corresponding densities. Nitro-substituted boron compounds bearing amino groups instead of hydrogen display even higher performance. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Information and Analysis Center | Date: 2016-01-07
Downloadable electronic publications in the nature of newsletters and brochures in the field of cyber and physical security threats, vulnerabilities, risks and events faced by the aviation industry. Telecommunication services, namely, providing electronic message alerts via the internet and online portals notifying individuals of cyber and physical security threats, vulnerabilities, risks and events faced by the aviation industry. Educational services, namely, conducting conferences, webinars, and workshops in the field of cyber and physical security threats, vulnerabilities, risks and events faced by the aviation industry and distribution of training material in connection therewith.
Information and Analysis Center | Date: 2013-07-25
A method for selectively permitting access over a computer network to two or more sets of information that have been assigned different confidentiality levels in which access to information having a lower level of confidentiality requires an authentication process requiring only a UserID and a password, and in which access to information having a higher level of confidentiality requires an authentication process requiring a UserID, a password, and a hard token, but no additional PIN.
Information and Analysis Center | Date: 2016-01-07
(Based on Intent to Use) Downloadable electronic publications in the nature of newsletters and brochures in the field of cyber and physical security threats, vulnerabilities, risks and events faced by the aviation industry. (Based on Use in Commerce) Telecommunication services, namely, providing electronic message alerts via the internet and online portals notifying individuals of cyber and physical security threats, vulnerabilities, risks and events faced by the aviation industry. (Based on Use in Commerce) Educational services, namely, conducting conferences, webinars, and workshops in the field of cyber and physical security threats, vulnerabilities, risks and events faced by the aviation industry and distribution of training material in connection therewith.