23,410 results on '"Ullman, A"'
Search Results
202. Factors impacting emergency department clinicians’ peripheral intravenous catheter practice: A qualitative analysis
- Author
-
Xu, Hui Grace, Ullman, Amanda J., Rickard, Claire M., and Johnston, Amy
- Published
- 2023
- Full Text
- View/download PDF
203. Segmentation of high-speed flow fields using physics-informed clustering
- Author
-
Ullman, Michael, Barwey, Shivam, Lee, Gyu Sub, and Raman, Venkat
- Published
- 2023
- Full Text
- View/download PDF
204. Non-commitment in mental imagery
- Author
-
Bigelow, Eric J., McCoy, John P., and Ullman, Tomer D.
- Published
- 2023
- Full Text
- View/download PDF
205. Focused Ultrasound Ablation of an Arteriovenous Malformation Model
- Author
-
Jones, Jesse, Bolding, Mark, Ullman, Henrik, Kaneko, Naoki, and Tateshima, Satoshi
- Subjects
Biomedical and Clinical Sciences ,Clinical Sciences ,Pediatric ,Biomedical Imaging ,5.1 Pharmaceuticals ,Development of treatments and therapeutic interventions ,arteriovenous malformation ,embolization ,high intensity focus ultrasound ,non-invasive ablation ,MRI guided ablation ,Neurosciences ,Psychology ,Clinical sciences ,Biological psychology - Abstract
Brain AVMs are rare but serious vascular lesions that often pose a management dilemma between the risk of various treatment modalities and uncertain natural history during observation. We describe preliminary data on the use of focused ultrasound as a novel therapeutic strategy. In an AVM model, one session of ultrasound gradually reduced flow through the lesion without inducing rupture. Due to its non-invasive yet immediate ablative effects, focused ultrasound may allow safer treatment of AVMs. However, further studies are needed to clarify its efficacy and side effect profile.
- Published
- 2021
206. Transmission Spectroscopy for the Warm Sub-Neptune HD 3167c: Evidence for Molecular Absorption and a Possible High-metallicity Atmosphere
- Author
-
Mikal-Evans, Thomas, Crossfield, Ian JM, Benneke, Björn, Kreidberg, Laura, Moses, Julie, Morley, Caroline V, Thorngren, Daniel, Mollière, Paul, Hardegree-Ullman, Kevin K, Brewer, John, Christiansen, Jessie L, Ciardi, David R, Dragomir, Diana, Dressing, Courtney, Fortney, Jonathan J, Gorjian, Varoujan, Greene, Thomas P, Hirsch, Lea A, Howard, Andrew W, Howell, Steve B, Isaacson, Howard, Kosiarek, Molly R, Krick, Jessica, Livingston, John H, Lothringer, Joshua D, Morales, Farisa Y, Petigura, Erik A, Schlieder, Joshua E, and Werner, Michael
- Subjects
Exoplanet astronomy ,Exoplanets ,Exoplanet atmospheres ,astro-ph.EP ,Astronomical and Space Sciences ,Astronomy & Astrophysics - Abstract
We present a transmission spectrum for the warm (500-600 K) sub-Neptune HD 3167c obtained using the Hubble Space Telescope Wide Field Camera 3 infrared spectrograph. We combine these data, which span the 1.125-1.643 μm wavelength range, with broadband transit measurements made using Kepler/K2 (0.6-0.9 μm) and Spitzer/IRAC (4-5 μm). We find evidence for absorption by at least one of H2O, HCN, CO2, and CH4 (Bayes factor 7.4; 2.5σ significance), although the data precision does not allow us to unambiguously discriminate between these molecules. The transmission spectrum rules out cloud-free hydrogen-dominated atmospheres with metallicities ≤100 solar at >5.8σ confidence. In contrast, good agreement with the data is obtained for cloud-free models assuming metallicities >700 solar. However, for retrieval analyses that include the effect of clouds, a much broader range of metallicities (including subsolar) is consistent with the data, due to the degeneracy with cloud-top pressure. Self-consistent chemistry models that account for photochemistry and vertical mixing are presented for the atmosphere of HD 3167c. The predictions of these models are broadly consistent with our abundance constraints, although this is primarily due to the large uncertainties on the latter. Interior structure models suggest that the core mass fraction is >40%, independent of a rock or water core composition, and independent of atmospheric envelope metallicity up to 1000 solar. We also report abundance measurements for 15 elements in the host star, showing that it has a very nearly solar composition.
- Published
- 2021
207. Evaluation of IgA epidermal transglutaminase ELISA in suspected dermatitis herpetiformis patients
- Author
-
Betz, Jenna, Grover, Raminder K, and Ullman, Lori
- Subjects
dermatitis herpetiformis ,epidermal transglutaminase ,IgA eTG ELISA ,screening test ,serology - Published
- 2021
208. Loopholes, a Window into Value Alignment and the Learning of Meaning
- Author
-
Bridgers, Sophie, Schulz, Laura, and Ullman, Tomer D.
- Subjects
cognitive science - Abstract
Finding and exploiting loopholes is a familiar facet of fable, law, and everyday life. But cognitive, computational, and empirical work on this behavior remains scarce. Engaging with loopholes requires a nuanced understanding of goals, social ambiguity, and value alignment. We trace loophole behavior to early childhood, and we propose that exploiting loopholes results from a conflict in actors' goals combined with a pressure to cooperate. A survey of 260 parents reporting on 425 children reveals that loophole behavior is prevalent, frequent, and diverse in daily parent-child interactions, emerging around ages five to six and tapering off from around ages nine to ten into adolescence. A further experiment shows that adults consider loophole behavior in children as less costly than non-compliance, and children increasingly differentiate loophole behavior from non-compliance from ages four to ten. We discuss limitations of the current work together with a proposal for a formal framework for loophole behavior.
- Published
- 2021
209. Experiences of children with central venous access devices: a mixed-methods study
- Author
-
Ullman, Amanda J., Kleidon, Tricia M., Gibson, Victoria, Takashima, Mari, Schults, Jessica, Cattanach, Paula, Paterson, Rebecca, Cooke, Marie, Byrnes, Joshua, Saiyed, Masnoon, Chopra, Vineet, and Rickard, Claire
- Published
- 2023
- Full Text
- View/download PDF
210. In Muriel Dimen's Footsteps—Five Notes on the Politically Correct and Politically Coerced in Current Israeli Contexts
- Author
-
Ullman, Chana, primary
- Published
- 2023
- Full Text
- View/download PDF
211. Present, yet not welcomed: gender diverse teachers' experiences of discrimination
- Author
-
Ullman, Jacqueline, primary
- Published
- 2023
- Full Text
- View/download PDF
212. Parents' Perspectives on the Inclusion of Gender and Sexuality Diversity in K-12 Schooling: Results from an Australian National Study
- Author
-
Ullman, Jacqueline, Ferfolja, Tania, and Hobby, Lucy
- Abstract
While educators, curriculum authors and policy makers alike are influenced by assumptions about parents' dis/approval of gender and sexuality diversity, both generally, as well as specifically in relation to this topic's appropriateness for K-12 classrooms, little empirical data is available to support these assumptions. What data does exist suggests that parents generally support the implementation of a comprehensive sexuality curriculum, inclusive of same-sex attraction, and view sexuality education as a school-parent partnership. Surveying a sample of Australian parents of children attending a government (public) school (N = 2093), whose responses were weighted to produce nationally representative estimates, this study sought to expand on previous findings by exploring the complexities of parents' attitudes in relation to gender and sexuality diversity and its place within relationships and sexual health education. This paper provides a descriptive overview of parents' ideas about the purpose of relationships and sexual health education and their views on the importance of including gender and sexuality diversity-inclusive content within related curriculum areas. Notably, over 80% of parents supported the inclusion of gender and sexuality diversity-inclusive relationships and sexual health education topics across primary and secondary government schools.
- Published
- 2022
- Full Text
- View/download PDF
213. Predictors of Uptake and Retention in an Intervention to Improve Social Reactions to Disclosures of Sexual Assault and Partner Abuse
- Author
-
Waterman, Emily A., Edwards, Katie M., Rodriguez, Lindsey M., Ullman, Sarah E., and Dardis, Christina M.
- Abstract
Objective: Examine uptake (e.g., initial session participation) and retention (e.g., booster session participation) in an intervention about responding to sexual assault and partner abuse disclosures. Participants: Participants were 836 students (primarily White; upper-middle class) at a medium-sized university. Method: Participants completed baseline surveys, were invited to a two-session intervention, and responded to a follow-up survey. Results: Initial session attendance was 36.2% (n = 303); of those, 83.1% (n = 252) attended the booster. Female, sexual minority students, and students with fewer prior negative reactions, and higher initial session satisfaction were more likely to attend than other students. Participants' reported reasons for not attending included scheduling problems and topic discomfort. Participants reported that remote attendance and higher cash incentives would have made attendance more likely. Conclusion: Findings indicate the draw of cash incentives, a need to reach high-risk students and integrate into existing organizations, and the potential for individualized prevention.
- Published
- 2022
- Full Text
- View/download PDF
214. Correction to: Genome-enabled insights into the biology of thrips as crop pests
- Author
-
Rotenberg, Dorith, Baumann, Aaron A, Ben-Mahmoud, Sulley, Christiaens, Olivier, Dermauw, Wannes, Ioannidis, Panagiotis, Jacobs, Chris GC, Vargas Jentzsch, Iris M, Oliver, Jonathan E, Poelchau, Monica F, Rajarapu, Swapna Priya, Schneweis, Derek J, Snoeck, Simon, Taning, Clauvis NT, Wei, Dong, Widana Gamage, Shirani MK, Hughes, Daniel ST, Murali, Shwetha C, Bailey, Samuel T, Bejerman, Nicolas E, Holmes, Christopher J, Jennings, Emily C, Rosendale, Andrew J, Rosselot, Andrew, Hervey, Kaylee, Schneweis, Brandi A, Cheng, Sammy, Childers, Christopher, Simão, Felipe A, Dietzgen, Ralf G, Chao, Hsu, Dinh, Huyen, Doddapaneni, Harsha Vardhan, Dugan, Shannon, Han, Yi, Lee, Sandra L, Muzny, Donna M, Qu, Jiaxin, Worley, Kim C, Benoit, Joshua B, Friedrich, Markus, Jones, Jeffery W, Panfilio, Kristen A, Park, Yoonseong, Robertson, Hugh M, Smagghe, Guy, Ullman, Diane E, van der Zee, Maurijn, Van Leeuwen, Thomas, Veenstra, Jan A, Waterhouse, Robert M, Weirauch, Matthew T, Werren, John H, Whitfield, Anna E, Zdobnov, Evgeny M, Gibbs, Richard A, and Richards, Stephen
- Subjects
Biological Sciences ,Developmental Biology ,Biological sciences - Abstract
An amendment to this paper has been published and can be accessed via the original article.
- Published
- 2020
215. Genome-enabled insights into the biology of thrips as crop pests
- Author
-
Rotenberg, Dorith, Baumann, Aaron A, Ben-Mahmoud, Sulley, Christiaens, Olivier, Dermauw, Wannes, Ioannidis, Panagiotis, Jacobs, Chris GC, Vargas Jentzsch, Iris M, Oliver, Jonathan E, Poelchau, Monica F, Rajarapu, Swapna Priya, Schneweis, Derek J, Snoeck, Simon, Taning, Clauvis NT, Wei, Dong, Widana Gamage, Shirani MK, Hughes, Daniel ST, Murali, Shwetha C, Bailey, Samuel T, Bejerman, Nicolas E, Holmes, Christopher J, Jennings, Emily C, Rosendale, Andrew J, Rosselot, Andrew, Hervey, Kaylee, Schneweis, Brandi A, Cheng, Sammy, Childers, Christopher, Simão, Felipe A, Dietzgen, Ralf G, Chao, Hsu, Dinh, Huyen, Doddapaneni, Harsha Vardhan, Dugan, Shannon, Han, Yi, Lee, Sandra L, Muzny, Donna M, Qu, Jiaxin, Worley, Kim C, Benoit, Joshua B, Friedrich, Markus, Jones, Jeffery W, Panfilio, Kristen A, Park, Yoonseong, Robertson, Hugh M, Smagghe, Guy, Ullman, Diane E, van der Zee, Maurijn, Van Leeuwen, Thomas, Veenstra, Jan A, Waterhouse, Robert M, Weirauch, Matthew T, Werren, John H, Whitfield, Anna E, Zdobnov, Evgeny M, Gibbs, Richard A, and Richards, Stephen
- Subjects
Biological Sciences ,Bioinformatics and Computational Biology ,Genetics ,Human Genome ,Biotechnology ,Animals ,Crops ,Agricultural ,Feeding Behavior ,Food Chain ,Genome ,Insect ,Immunity ,Innate ,Life History Traits ,Perception ,Phylogeny ,Reproduction ,Thysanoptera ,Transcriptome ,Western flower thrips ,Hemipteroid assemblage ,Insect genomics ,Tospovirus ,Salivary glands ,Chemosensory receptors ,Opsins ,Detoxification ,Innate immunity ,Developmental Biology ,Biological sciences - Abstract
BackgroundThe western flower thrips, Frankliniella occidentalis (Pergande), is a globally invasive pest and plant virus vector on a wide array of food, fiber, and ornamental crops. The underlying genetic mechanisms of the processes governing thrips pest and vector biology, feeding behaviors, ecology, and insecticide resistance are largely unknown. To address this gap, we present the F. occidentalis draft genome assembly and official gene set.ResultsWe report on the first genome sequence for any member of the insect order Thysanoptera. Benchmarking Universal Single-Copy Ortholog (BUSCO) assessments of the genome assembly (size = 415.8 Mb, scaffold N50 = 948.9 kb) revealed a relatively complete and well-annotated assembly in comparison to other insect genomes. The genome is unusually GC-rich (50%) compared to other insect genomes to date. The official gene set (OGS v1.0) contains 16,859 genes, of which ~ 10% were manually verified and corrected by our consortium. We focused on manual annotation, phylogenetic, and expression evidence analyses for gene sets centered on primary themes in the life histories and activities of plant-colonizing insects. Highlights include the following: (1) divergent clades and large expansions in genes associated with environmental sensing (chemosensory receptors) and detoxification (CYP4, CYP6, and CCE enzymes) of substances encountered in agricultural environments; (2) a comprehensive set of salivary gland genes supported by enriched expression; (3) apparent absence of members of the IMD innate immune defense pathway; and (4) developmental- and sex-specific expression analyses of genes associated with progression from larvae to adulthood through neometaboly, a distinct form of maturation differing from either incomplete or complete metamorphosis in the Insecta.ConclusionsAnalysis of the F. occidentalis genome offers insights into the polyphagous behavior of this insect pest that finds, colonizes, and survives on a widely diverse array of plants. The genomic resources presented here enable a more complete analysis of insect evolution and biology, providing a missing taxon for contemporary insect genomics-based analyses. Our study also offers a genomic benchmark for molecular and evolutionary investigations of other Thysanoptera species.
- Published
- 2020
216. Turbidity removal through the application of powdered 'azadirachta indica' (neem) seeds
- Author
-
Khan, Qandeel, Imran, Uzma, Ullman, Jeffrey L, and Khokhar, Waheed Ali
- Published
- 2023
217. Experiences after the diagnosis of chronic renal failure from the perspective of patients / Vivências após o diagnóstico da insuficiência renal crônica sob a ótica dos pacientes.
- Author
-
Brenda Maria Tavares do Nascimento, Alcivan Nunes Vieira, Kalídia Felipe de Lima Costa, Luana Adrielle Leal Dantas, Mariana Mayara Medeiros Lopes, and Nicole Liv Ullman Freitas Rego
- Subjects
Doença renal crônica ,Hemodiálise ,Perfil de impacto da doença. ,Medicine ,Nursing ,RT1-120 - Abstract
Objetivo: analisar as vivências do diagnóstico de Doença Renal Crônica sob a ótica dos pacientes. Método: estudo qualitativo realizado por meio de entrevistas semiestruturadas realizadas junto aos pacientes atendidos em um serviço de hemodiálise; os dados foram submetidos à análise de Conteúdo de Bardin. Resultados: as vivências foram organizadas nas seguintes categorias significativas: Sentimentos vivenciados no momento do diagnóstico; Impactos do diagnóstico; Negação da doença; O paradoxo da gratidão e Enfrentamento da doença. Considerações finais: a vivência do diagnóstico da Doença Renal Crônica adquire uma perspectiva singular para cada paciente subsidiada por aspectos de ordem subjetiva, pelo suporte assistencial e familiar ao qual ele tem acesso.
- Published
- 2023
- Full Text
- View/download PDF
218. Ixodid tick species found in northern Sweden – Data from a frontier area
- Author
-
Anna Omazic, Seungeun Han, Ann Albihn, Karin Ullman, Phimphanit Choklikitumnuey, Debora Perissinotto, and Giulio Grandi
- Subjects
Tick ,Northern Sweden ,Ixodes ricinus ,Ixodes persulcatus ,Citizen science ,Infectious and parasitic diseases ,RC109-216 - Abstract
Environmental and climatic changes in northern Europe have shaped a geographical area in which new tick species may become established and introduce new tick-borne pathogens. In recent decades, ticks have expanded their latitudinal and altitudinal range limits in northern Sweden. In this study, ticks were collected in 2018 and 2019 in northern Sweden from different hosts, mainly from dogs, cats and humans. The ticks in 2018 (n = 2141, collected from 65 municipalities in 11 provinces) were identified as Ixodes ricinus (n = 2108, 98.5%), Ixodes persulcatus (n = 18, 0.8%), Ixodes trianguliceps (n = 14, 0.7%) and Hyalomma marginatum (n = 1, 0.05%). The ticks collected in 2019 (n = 519, across a smaller area than in 2018, i.e. Sweden's four northernmost provinces) were identified as I. ricinus (n = 242, 46.6%) and I. persulcatus (n = 277, 53.4%). Among those collected in 2019, the majority of I. ricinus (n = 111, 45.9%) were submitted from the province of Västerbotten, while most I. persulcatus (n = 259, 93.5%) were collected in the province of Norrbotten. This study provides updated figures on the geographical distribution of two Ixodes species in northern Sweden. The results confirmed I. ricinus to be the dominant species and that I. persulcatus has enlarged its distributional area compared with previous reports. Updated knowledge of tick distribution is fundamental for the creation of risk maps and will allow relevant advice to be provided to the general public, suggesting measures to prevent tick bites and consequently tick-borne diseases.
- Published
- 2023
- Full Text
- View/download PDF
219. The Calpain-7 protease functions together with the ESCRT-III protein IST1 within the midbody to regulate the timing and completion of abscission
- Author
-
Elliott L Paine, Jack J Skalicky, Frank G Whitby, Douglas R Mackay, Katharine S Ullman, Christopher P Hill, and Wesley I Sundquist
- Subjects
cytokinesis ,ESCRT-III ,abscission ,NoCut Checkpoint ,Medicine ,Science ,Biology (General) ,QH301-705.5 - Abstract
The Endosomal Sorting Complexes Required for Transport (ESCRT) machinery mediates the membrane fission step that completes cytokinetic abscission and separates dividing cells. Filaments composed of ESCRT-III subunits constrict membranes of the intercellular bridge midbody to the abscission point. These filaments also bind and recruit cofactors whose activities help execute abscission and/or delay abscission timing in response to mitotic errors via the NoCut/Abscission checkpoint. We previously showed that the ESCRT-III subunit IST1 binds the cysteine protease Calpain-7 (CAPN7) and that CAPN7 is required for both efficient abscission and NoCut checkpoint maintenance (Wenzel et al., 2022). Here, we report biochemical and crystallographic studies showing that the tandem microtubule-interacting and trafficking (MIT) domains of CAPN7 bind simultaneously to two distinct IST1 MIT interaction motifs. Structure-guided point mutations in either CAPN7 MIT domain disrupted IST1 binding in vitro and in cells, and depletion/rescue experiments showed that the CAPN7-IST1 interaction is required for (1) CAPN7 recruitment to midbodies, (2) efficient abscission, and (3) NoCut checkpoint arrest. CAPN7 proteolytic activity is also required for abscission and checkpoint maintenance. Hence, IST1 recruits CAPN7 to midbodies, where its proteolytic activity is required to regulate and complete abscission.
- Published
- 2023
- Full Text
- View/download PDF
220. The environmental footprint of Holocene societies: a multi-temporal study of trails in the Judean Desert, Israel
- Author
-
Nadav Nir, Uri Davidovich, Micka Ullman, Brigitta Schütt, and Mareike C. Stahlschmidt
- Subjects
micromorphology ,albedo ,surface ,arid ,Levant ,Roman ,Science - Abstract
The global distribution of footpaths and their inferred antiquity implies that they are widespread spatial and temporal anthropogenic landscape units. Arid environments are of special interest for investigating historically used footpaths, as older routes may preserve better due to minimal modern impact and slower pedogenic processes. Here we examine footpaths in the Judean Desert of the southern Levant, a human hotspot throughout the Holocene. We studied one modern and two archaeological footpaths (one attributed to the Early Bronze Age and one to the Roman period) using micromorphology, bulk samples laboratory analysis, and remote sensing. Field observations and color analysis indicate that footpaths in the studied arid limestone environment can result in brighter surface color than their non-path surroundings. Similar color changes are reflected using both laboratory analysis and high-resolution remote sensing, where the difference is also significant. Microscopically, the footpaths studied tend to be less porous and with fewer biogenic activities when compared to their non-path controls. However, the two ancient footpaths studied do exhibit minimal indicators of biogenic activities that are not detectable in the modern footpath sample. Our study shows that high-resolution remote sensing coupled with micromorphology, while using appropriate local modern analogies, can help to locate and assess both the environmental effect and the antiquity of footpaths.
- Published
- 2023
- Full Text
- View/download PDF
221. Segmentation of high-speed flow fields using physics-informed clustering
- Author
-
Michael Ullman, Shivam Barwey, Gyu Sub Lee, and Venkat Raman
- Subjects
Clustering ,K-means ,Flow segmentation ,High-speed combustion ,Physics-informed machine learning ,Fuel ,TP315-360 ,Energy industries. Energy policy. Fuel trade ,HD9502-9502.5 - Abstract
The advent of data-based modeling has provided new methods and algorithms for analyzing the complex flow fields in high-speed combustion applications. These techniques can be used to study the fluid dynamics and reaction progress in different regions of the flow, which can provide insight into the underlying physics of the system while helping one identify avenues for the development and application of new models. The present work implements two such algorithms – the standard K-means clustering algorithm and a modified Jacobian-scaled K-means clustering algorithm – to analyze a high-speed reacting flow field. The results show that the Jacobian-scaled K-means algorithm allocates more clusters in the regions of the thermochemical state space where chemical source term is highest. In physical space, this concentrates the flow partitions in regions where heat release rate is higher and chemical timescales are lower. This is observed for different cluster numbers and data sets. When moving between data sets that occupy different portions of the state space, the cluster centroid locations are found to be less sensitive to the data set when the Jacobian-scaled K-means algorithm is used. Altogether, the modified K-means algorithm provides a new tool for identifying thermodynamic and thermochemical similarities in and across compressible reactive flow fields.
- Published
- 2023
- Full Text
- View/download PDF
222. The Power of Factorization Mechanisms in Local and Central Differential Privacy
- Author
-
Edmonds, Alexander, Nikolov, Aleksandar, and Ullman, Jonathan
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
We give new characterizations of the sample complexity of answering linear queries (statistical queries) in the local and central models of differential privacy: *In the non-interactive local model, we give the first approximate characterization of the sample complexity. Informally our bounds are tight to within polylogarithmic factors in the number of queries and desired accuracy. Our characterization extends to agnostic learning in the local model. *In the central model, we give a characterization of the sample complexity in the high-accuracy regime that is analogous to that of Nikolov, Talwar, and Zhang (STOC 2013), but is both quantitatively tighter and has a dramatically simpler proof. Our lower bounds apply equally to the empirical and population estimation problems. In both cases, our characterizations show that a particular factorization mechanism is approximately optimal, and the optimal sample complexity is bounded from above and below by well studied factorization norms of a matrix associated with the queries.
- Published
- 2019
223. Nurses’ education, knowledge and perceptions of peripheral intravenous catheter management: A web-based, cross-sectional survey
- Author
-
Massey, Debbie, Cooke, Marie, Ray-Barruel, Gillian, Marsh, Nicole, Ullman, Amanda J., Craswell, Alison, and Wallis, Marianne
- Published
- 2023
- Full Text
- View/download PDF
224. Manipulation Attacks in Local Differential Privacy
- Author
-
Cheu, Albert, Smith, Adam, and Ullman, Jonathan
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Cryptography and Security - Abstract
Local differential privacy is a widely studied restriction on distributed algorithms that collect aggregates about sensitive user data, and is now deployed in several large systems. We initiate a systematic study of a fundamental limitation of locally differentially private protocols: they are highly vulnerable to adversarial manipulation. While any algorithm can be manipulated by adversaries who lie about their inputs, we show that any non-interactive locally differentially private protocol can be manipulated to a much greater extent. Namely, when the privacy level is high or the input domain is large, an attacker who controls a small fraction of the users in the protocol can completely obscure the distribution of the users' inputs. We also show that existing protocols differ greatly in their resistance to manipulation, even when they offer the same accuracy guarantee with honest execution. Our results suggest caution when deploying local differential privacy and reinforce the importance of efficient cryptographic techniques for emulating mechanisms from central differential privacy in distributed settings.
- Published
- 2019
225. Differentially Private Algorithms for Learning Mixtures of Separated Gaussians
- Author
-
Kamath, Gautam, Sheffet, Or, Singhal, Vikrant, and Ullman, Jonathan
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Cryptography and Security ,Computer Science - Information Theory ,Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
Learning the parameters of Gaussian mixture models is a fundamental and widely studied problem with numerous applications. In this work, we give new algorithms for learning the parameters of a high-dimensional, well separated, Gaussian mixture model subject to the strong constraint of differential privacy. In particular, we give a differentially private analogue of the algorithm of Achlioptas and McSherry. Our algorithm has two key properties not achieved by prior work: (1) The algorithm's sample complexity matches that of the corresponding non-private algorithm up to lower order terms in a wide range of parameters. (2) The algorithm does not require strong a priori bounds on the parameters of the mixture components., Comment: To appear in NeurIPS 2019
- Published
- 2019
226. Efficient Multiway Hash Join on Reconfigurable Hardware
- Author
-
Olukotun, Kunle, Prabhakar, Raghu, Singhal, Rekha, Ullman, Jeffrey D., and Zhang, Yaqi
- Subjects
Computer Science - Databases ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
We propose the algorithms for performing multiway joins using a new type of coarse grain reconfigurable hardware accelerator~-- ``Plasticine''~-- that, compared with other accelerators, emphasizes high compute capability and high on-chip communication bandwidth. Joining three or more relations in a single step, i.e. multiway join, is efficient when the join of any two relations yields too large an intermediate relation. We show at least 200X speedup for a sequence of binary hash joins execution on Plasticine over CPU. We further show that in some realistic cases, a Plasticine-like accelerator can make 3-way joins more efficient than a cascade of binary hash joins on the same hardware, by a factor of up to 45X., Comment: 20 pages
- Published
- 2019
227. Private Identity Testing for High-Dimensional Distributions
- Author
-
Canonne, Clément L., Kamath, Gautam, McMillan, Audra, Ullman, Jonathan, and Zakynthinou, Lydia
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Cryptography and Security ,Computer Science - Information Theory ,Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
In this work we present novel differentially private identity (goodness-of-fit) testers for natural and widely studied classes of multivariate product distributions: Gaussians in $\mathbb{R}^d$ with known covariance and product distributions over $\{\pm 1\}^{d}$. Our testers have improved sample complexity compared to those derived from previous techniques, and are the first testers whose sample complexity matches the order-optimal minimax sample complexity of $O(d^{1/2}/\alpha^2)$ in many parameter regimes. We construct two types of testers, exhibiting tradeoffs between sample complexity and computational complexity. Finally, we provide a two-way reduction between testing a subclass of multivariate product distributions and testing univariate distributions, and thereby obtain upper and lower bounds for testing this subclass of product distributions., Comment: Discussing a mistake in the proof of one of the algorithms (Theorem 1.2, computationally inefficient tester), and pointing to follow-up work by Narayanan (2022) who improves upon our results and fixes this mistake
- Published
- 2019
228. Characterizing K2 Candidate Planetary Systems Orbiting Low-Mass Stars IV: Updated Properties for 86 Cool Dwarfs Observed During Campaigns 1-17
- Author
-
Dressing, Courtney D., Hardegree-Ullman, Kevin, Schlieder, Joshua E., Newton, Elisabeth, Vanderburg, Andrew, Feinstein, Adina D., Duvvuri, Girish M., Arnold, Lauren, Bristow, Makennah, Thackeray, Beverly, Abrahams, Ellianna Schwab, Ciardi, David, Crossfield, Ian, Yu, Liang, Martinez, Arturo O., Christiansen, Jessie L., Crepp, Justin R., and Isaacson, Howard
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Astrophysics - Earth and Planetary Astrophysics - Abstract
We present revised stellar properties for 172 K2 target stars that were identified as possible hosts of transiting planets during Campaigns 1-17. Using medium-resolution near-infrared spectra acquired with the NASA Infrared Telescope Facility/SpeX and Palomar/TripleSpec, we found that 86 of our targets were bona fide cool dwarfs, 74 were hotter dwarfs, and 12 were giants. Combining our spectroscopic metallicities with Gaia parallaxes and archival photometry, we derived photometric stellar parameters and compared them to our spectroscopic estimates. Although our spectroscopic and photometric radius and temperature estimates are consistent, our photometric mass estimates are systematically 0.11 solar masses (34%) higher than our spectroscopic mass estimates for the least massive stars (photometric mass estimates < 0.4 solar masses). Adopting the photometric parameters and comparing our results to parameters reported in the Ecliptic Plane Input Catalog, our revised stellar radii are 0.15 solar radii (40%) larger and our revised stellar effective temperatures are roughly 65K cooler. Correctly determining the properties of K2 target stars is essential for characterizing any associated planet candidates, estimating the planet search sensitivity, and calculating planet occurrence rates. Even though Gaia parallaxes have increased the power of photometric surveys, spectroscopic characterization remains essential for determining stellar metallicities and investigating correlations between stellar metallicity and planetary properties., Comment: 45 pages, 15 figures, 7 tables, accepted to the Astronomical Journal, reduced spectra & stellar properties posted to ExoFOP-K2 at https://exofop.ipac.caltech.edu/k2/
- Published
- 2019
- Full Text
- View/download PDF
229. Efficiently Estimating Erdos-Renyi Graphs with Node Differential Privacy
- Author
-
Sealfon, Adam and Ullman, Jonathan
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Machine Learning - Abstract
We give a simple, computationally efficient, and node-differentially-private algorithm for estimating the parameter of an Erdos-Renyi graph---that is, estimating p in a G(n,p)---with near-optimal accuracy. Our algorithm nearly matches the information-theoretically optimal exponential-time algorithm for the same problem due to Borgs et al. (FOCS 2018). More generally, we give an optimal, computationally efficient, private algorithm for estimating the edge-density of any graph whose degree distribution is concentrated on a small interval.
- Published
- 2019
230. Kepler Planet Occurrence Rates for Mid-Type M Dwarfs as a Function of Spectral Type
- Author
-
Hardegree-Ullman, Kevin K., Cushing, Michael C., Muirhead, Philip S., and Christiansen, Jessie L.
- Subjects
Astrophysics - Earth and Planetary Astrophysics ,Astrophysics - Solar and Stellar Astrophysics - Abstract
Previous studies of planet occurrence rates largely relied on photometric stellar characterizations. In this paper, we present planet occurrence rates for mid-type M dwarfs using spectroscopy, parallaxes, and photometry to determine stellar characteristics. Our spectroscopic observations have allowed us to constrain spectral type, temperatures, and in some cases metallicities for 337 out of 561 probable mid-type M dwarfs in the primary Kepler field. We use a random forest classifier to assign a spectral type to the remaining 224 stars. Combining our data with Gaia parallaxes, we compute precise ($\sim$3%) stellar radii and masses, which we use to update planet parameters and planet occurrence rates for Kepler mid-type M dwarfs. Within the Kepler field, there are seven M3 V to M5 V stars which host 13 confirmed planets between 0.5 and 2.5 Earth radii and at orbital periods between 0.5 and 10 days. For this population, we compute a planet occurrence rate of $1.19^{+0.70}_{-0.49}$ planets per star. For M3 V, M4 V, and M5 V, we compute planet occurrence rates of $0.86^{+1.32}_{-0.68}$, $1.36^{+2.30}_{-1.02}$, and $3.07^{+5.49}_{-2.49}$ planets per star, respectively., Comment: 35 pages, 10 figures, 4 tables, Accepted for publication in AJ
- Published
- 2019
- Full Text
- View/download PDF
231. Catalog of New K2 Exoplanet Candidates from Citizen Scientists
- Author
-
Zink, Jon K., Hardegree-Ullman, Kevin K., Christiansen, Jessie L., Crossfield, Ian J. M., Petigura, Erik A., Lintott, Chris J., Livingston, John H., Ciardi, David R., Barentsen, Geert, Dressing, Courtney D., Ye, Alexander, Schlieder, Joshua E., Acres, Kevin, Ansorge, Peter, Arienti, Dario, Baeten, Elisabeth, Cerd, Victoriano Canales, Chitsiga, Itayi, Daly, Maxwell, Damboiu, James, Ende, Martin, Erdag, Adnan, Evstatiev, Stiliyan, Henderson, Joseph, Hine, David, Hoffman, Tony, Lambrou, Emmanuel, Murawski, Gabriel, Nicholson, Mark, Russell, Mason, Schwengeler, Hans Martin, Spencer, Alton, Tagliabue, Aaron, Tanner, Christopher, Thévenot, Melina, Unsworth, Christine, and Uusi-Simola, Jouni
- Subjects
Astrophysics - Earth and Planetary Astrophysics - Abstract
We provide 28 new planet candidates that have been vetted by citizen scientists and expert astronomers. This catalog contains 9 likely rocky candidates ($R_{pl} < 2.0R_\oplus$) and 19 gaseous candidates ($R_{pl} > 2.0R_\oplus$). Within this list we find one multi-planet system (EPIC 246042088). These two sub-Neptune ($2.99 \pm 0.02R_\oplus$ and $3.44 \pm 0.02R_\oplus$) planets exist in a near 3:2 orbital resonance. The discovery of this multi-planet system is important in its addition to the list of known multi-planet systems within the K2 catalog, and more broadly in understanding the multiplicity distribution of the exoplanet population (Zink et al. 2019). The candidates on this list are anticipated to generate RV amplitudes of 0.2-18 m/s, many within the range accessible to current facilities.
- Published
- 2019
- Full Text
- View/download PDF
232. Efficient Private Algorithms for Learning Large-Margin Halfspaces
- Author
-
Nguyen, Huy L., Ullman, Jonathan, and Zakynthinou, Lydia
- Subjects
Computer Science - Machine Learning ,Computer Science - Data Structures and Algorithms ,Statistics - Machine Learning - Abstract
We present new differentially private algorithms for learning a large-margin halfspace. In contrast to previous algorithms, which are based on either differentially private simulations of the statistical query model or on private convex optimization, the sample complexity of our algorithms depends only on the margin of the data, and not on the dimension. We complement our results with a lower bound, showing that the dependence of our upper bounds on the margin is optimal., Comment: changed title, added references and remarks
- Published
- 2019
233. Development of an IPM Strategy for Thrips and Tomato spotted wilt virus in Processing Tomatoes in the Central Valley of California.
- Author
-
Batuman, Ozgur, Turini, Thomas A, LeStrange, Michelle, Stoddard, Scott, Miyao, Gene, Aegerter, Brenna J, Chen, Li-Fang, McRoberts, Neil, Ullman, Diane E, and Gilbertson, Robert L
- Subjects
Frankliniella occidentalis ,Orthotospovirus ,Solanum lycopersicum ,epidemiology and integrated pest management ,inoculum sources ,tomato spotted wilt disease ,western flower thrips ,Immunology ,Medical Microbiology - Abstract
Tomato spotted wilt virus (TSWV; species Tomato spotted wilt orthotospovirus; genus Orthotospovirus; family Tospoviridae) is a thrips-transmitted virus that can cause substantial economic losses to many crops, including tomato (Solanum lycopersicum). Since 2005, TSWV emerged as an economically important virus of processing tomatoes in the Central Valley of California, in part due to increased populations of the primary thrips vector, western flower thrips (WFT; Frankliniella occidentalis). To develop an understanding of the epidemiology of TSWV in this region, population densities of WFT and incidence of TSWV were monitored in California's processing tomato transplant-producing greenhouses and associated open fields from 2007 to 2013. Thrips were monitored with yellow sticky cards and in tomato flowers, whereas TSWV incidence was assessed with indicator plants and field surveys for virus symptoms. All thrips identified from processing tomato fields were WFT, and females were three-fold more abundant on sticky cards than males. Symptoms of TSWV infection were observed in all monitored processing tomato fields. Incidences of TSWV ranged from 1 to 20%, with highest incidence found in late-planted fields. There was no single primary inoculum source, and inoculum sources for thrips/TSWV varied depending on the production region. These results allowed us to develop a model for TSWV infection of processing tomatoes in the Central Valley of California. The model predicts that low levels of primary TSWV inoculum are amplified in early-planted tomatoes and other susceptible crops leading to highest levels of infection in later-planted fields, especially those with high thrips populations. Based upon these findings, an integrated pest management (IPM) strategy for TSWV in processing tomatoes in California was devised. This IPM strategy focuses on strategic field placement (identification of high-risk situations), planting TSWV- and thrips-free transplants, planting resistant varieties, monitoring for TSWV symptoms and thrips, roguing infected plants, thrips management targeting early generations, extensive sanitation after harvest, and strategic cropping to avoid overlap with winter bridge crops.
- Published
- 2020
234. LEM2 phase separation promotes ESCRT-mediated nuclear envelope reformation
- Author
-
von Appen, Alexander, LaJoie, Dollie, Johnson, Isabel E, Trnka, Michael J, Pick, Sarah M, Burlingame, Alma L, Ullman, Katharine S, and Frost, Adam
- Subjects
Biochemistry and Cell Biology ,Biological Sciences ,Genetics ,1.1 Normal biological development and functioning ,Generic health relevance ,Anaphase ,Chromatin ,DNA Damage ,DNA-Binding Proteins ,Endosomal Sorting Complexes Required for Transport ,HeLa Cells ,Humans ,Membrane Proteins ,Microtubules ,Nuclear Envelope ,Nuclear Proteins ,Spindle Apparatus ,Hela Cells ,General Science & Technology - Abstract
During cell division, remodelling of the nuclear envelope enables chromosome segregation by the mitotic spindle1. The reformation of sealed nuclei requires ESCRTs (endosomal sorting complexes required for transport) and LEM2, a transmembrane ESCRT adaptor2-4. Here we show how the ability of LEM2 to condense on microtubules governs the activation of ESCRTs and coordinated spindle disassembly. The LEM motif of LEM2 binds BAF, conferring on LEM2 an affinity for chromatin5,6, while an adjacent low-complexity domain (LCD) promotes LEM2 phase separation. A proline-arginine-rich sequence within the LCD binds to microtubules and targets condensation of LEM2 to spindle microtubules that traverse the nascent nuclear envelope. Furthermore, the winged-helix domain of LEM2 activates the ESCRT-II/ESCRT-III hybrid protein CHMP7 to form co-oligomeric rings. Disruption of these events in human cells prevented the recruitment of downstream ESCRTs, compromised spindle disassembly, and led to defects in nuclear integrity and DNA damage. We propose that during nuclear reassembly LEM2 condenses into a liquid-like phase and coassembles with CHMP7 to form a macromolecular O-ring seal at the confluence between membranes, chromatin and the spindle. The properties of LEM2 described here, and the homologous architectures of related inner nuclear membrane proteins7,8, suggest that phase separation may contribute to other critical envelope functions, including interphase repair8-13 and chromatin organization14-17.
- Published
- 2020
235. A management algorithm for adult patients with both brain oxygen and intracranial pressure monitoring: the Seattle International Severe Traumatic Brain Injury Consensus Conference (SIBICC).
- Author
-
Chesnut, Randall, Aguilera, Sergio, Buki, Andras, Bulger, Eileen, Citerio, Giuseppe, Cooper, D Jamie, Arrastia, Ramon Diaz, Diringer, Michael, Figaji, Anthony, Gao, Guoyi, Geocadin, Romer, Ghajar, Jamshid, Harris, Odette, Hoffer, Alan, Hutchinson, Peter, Joseph, Mathew, Kitagawa, Ryan, Manley, Geoffrey, Mayer, Stephan, Menon, David K, Meyfroidt, Geert, Michael, Daniel B, Oddo, Mauro, Okonkwo, David, Patel, Mayur, Robertson, Claudia, Rosenfeld, Jeffrey V, Rubiano, Andres M, Sahuquillo, Juan, Servadei, Franco, Shutter, Lori, Stein, Deborah, Stocchetti, Nino, Taccone, Fabio Silvio, Timmons, Shelly, Tsai, Eve, Ullman, Jamie S, Vespa, Paul, Videtta, Walter, Wright, David W, Zammit, Christopher, and Hawryluk, Gregory WJ
- Subjects
Algorithm ,Brain injury ,Brain oxygen ,Consensus ,Head trauma ,Intracranial pressure ,PbtO2 ,Protocol ,SIBICC ,Seattle ,Tiers ,Emergency & Critical Care Medicine ,Clinical Sciences ,Public Health and Health Services - Abstract
BackgroundCurrent guidelines for the treatment of adult severe traumatic brain injury (sTBI) consist of high-quality evidence reports, but they are no longer accompanied by management protocols, as these require expert opinion to bridge the gap between published evidence and patient care. We aimed to establish a modern sTBI protocol for adult patients with both intracranial pressure (ICP) and brain oxygen monitors in place.MethodsOur consensus working group consisted of 42 experienced and actively practicing sTBI opinion leaders from six continents. Having previously established a protocol for the treatment of patients with ICP monitoring alone, we addressed patients who have a brain oxygen monitor in addition to an ICP monitor. The management protocols were developed through a Delphi-method-based consensus approach and were finalized at an in-person meeting.ResultsWe established three distinct treatment protocols, each with three tiers whereby higher tiers involve therapies with higher risk. One protocol addresses the management of ICP elevation when brain oxygenation is normal. A second addresses management of brain hypoxia with normal ICP. The third protocol addresses the situation when both intracranial hypertension and brain hypoxia are present. The panel considered issues pertaining to blood transfusion and ventilator management when designing the different algorithms.ConclusionsThese protocols are intended to assist clinicians in the management of patients with both ICP and brain oxygen monitors but they do not reflect either a standard-of-care or a substitute for thoughtful individualized management. These protocols should be used in conjunction with recommendations for basic care, management of critical neuroworsening and weaning treatment recently published in conjunction with the Seattle International Brain Injury Consensus Conference.
- Published
- 2020
236. commonsense reasoning; core knowledge; in-tuitive theories; machine learning
- Author
-
Smith, Kevin A., Kosoy, Eliza, Gopnik, Alison, Pathak, Deepak, Fern, Alan, Tenenbaum, Joshua B, and Ullman, Tomer
- Subjects
commonsense reasoning ,core knowledge ,in-tuitive theories ,machine learning - Published
- 2020
237. Look before you leap: Quantitative tradeoffs between peril and reward in actionunderstanding
- Author
-
Gjata, Nensi, Ullman, Tomer D., Spelke, Elizabeth, and Liu, Shari
- Abstract
When we reason about the goals of others, how do we balance the positive outcomes that actions led to, with the potentiallybad ways those actions could have ended? In a four-part experiment, we tested whether and how adults (full study) and6- to 8-year-old children (ongoing study) expect other agents to take account of the ways their goal-directed action couldhave failed. Across 4 different tasks, we found that adults expected others to negatively appraise perilous situations (deeptrenches), to minimize the danger of their actions, and to trade off danger and reward in their action plans. Our preliminarychildrens study shows similar trends. These results suggest that people appeal to peril-how badly things could go if onesactions fail-when explaining and predicting other peoples actions, and also make quantitative inferences that are finelytuned to the degree of peril and reward that others face.
- Published
- 2020
238. Adventures in Flatland: Perceiving Social Interactions Under Physical Dynamics
- Author
-
Shu, Tianmin, Kryven, Marta, Ullman, Tomer D., and Tenenbaum, Joshua B.
- Subjects
social perception ,theory of mind ,intuitivephysics ,Bayesian inverse planning ,hierarchical planning - Abstract
People make fast, spontaneous, and consistent judgementsof social situations, even in complex physical contexts withmultiple-body dynamics (e.g. pushing, lifting, carrying, etc.).What mental computations make such judgments possible? Dopeople rely on low-level perceptual cues, or on abstract con-cepts of agency, action, and force? We describe a new exper-imental paradigm, Flatland, for studying social inference inphysical environments, using automatically generated interac-tive scenarios. We show that human interpretations of events inFlatland can be explained by a computational model that com-bines inverse hierarchical planning with a physical simulationengine to reason about objects and agents. This model out-performs cue-based alternatives based on hand-coded (multi-nomial logistic regression) and learned (LSTM) features. Ourresults suggest that humans could use a combination of intu-itive physics and hierarchical planning to interpret complex in-teractive scenarios encountered in daily life.
- Published
- 2020
239. The fine structure of surprise in intuitive physics: when, why, and how much?
- Author
-
Smith, Kevin A., Mei, Lingjie, Yao, Shunyu, Wu, Jiajun, Spelke, Elizabeth, Tenenbaum, Joshua B., and Ullman, Tomer D.
- Subjects
Intuitive physics ,Surprise ,Violation of expecta-tion ,Generative models - Abstract
We are surprised when events violate our intuitive physicalexpectations. Even infants look longer when things seem tomagically teleport or vanish. This important surprise signalhas been used to probe what infants expect, in order to studythe most basic representations of objects. But these studiesrely on binary measures – an event is surprising, or not. Here,we study surprise in a more precise, quantitative way, usingthree distinct measures: we ask adults to judge how surprisinga scene is, when that scene is surprising, and why it is surpris-ing. We find good consistency in the level of surprise reportedacross these experiments, but also crucial differences in theimplied explanations of those scenes. Beyond this, we showthat the timing and degree of surprise can be explained by anobject-based model of intuitive physics.
- Published
- 2020
240. Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data
- Author
-
Mehrotra, Sharad, Sharma, Shantanu, Ullman, Jeffrey D., and Mishra, Anurag
- Subjects
Computer Science - Databases ,Computer Science - Cryptography and Security ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Information Retrieval - Abstract
Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome limitations of existing encryption-based approaches. We propose a new secure approach, entitled query binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by the joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). QB maps a query to a set of queries over the sensitive and non-sensitive data in a way that no leakage will occur due to the joint processing over sensitive and non-sensitive data. Interestingly, in addition to improve performance, we show that QB actually strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks., Comment: Accepted in IEEE International Conference on Data Engineering (ICDE), 2019. arXiv admin note: text overlap with arXiv:1812.01741
- Published
- 2018
241. Bright Opportunities for Atmospheric Characterization of Small Planets: Masses and Radii of K2-3 b, c, d and GJ3470 b from Radial Velocity Measurements and Spitzer Transits
- Author
-
Kosiarek, Molly R., Crossfield, Ian J. M., Hardegree-Ullman, Kevin K., Livingston, John H., Benneke, Bjorn, Blunt, Sarah, Henry, Gregory W., Howard, Ward S., Berardo, David, Fulton, Benjamin J., Hirsch, Lea A., Howard, Andrew W., Isaacson, Howard, Petigura, Erik A., Sinukoff, Evan, Weiss, Lauren, Bonfils, X., Dressing, Courtney D., Knutson, Heather A., Schlieder, Joshua E., Werner, Michael, Gorjian, Varoujan, Krick, Jessica, Morales, Farisa Y., Astudillo-Defru, Nicola, Almenara, J. -M., Delfosse, X., Forveille, T., Lovis, C., Mayor, M., Murgas, F., Pepe, F., Santos, N. C., Udry, S., Corbett, H. T., Fors, Octavi, Law, Nicholas M., Ratzloff, Jeffrey K., and del Ser, Daniel
- Subjects
Astrophysics - Earth and Planetary Astrophysics - Abstract
We report improved masses, radii, and densities for four planets in two bright M-dwarf systems, K2-3 and GJ3470, derived from a combination of new radial velocity and transit observations. Supplementing K2 photometry with follow-up Spitzer transit observations refined the transit ephemerides of K2-3 b, c, and d by over a factor of 10. We analyze ground-based photometry from the Evryscope and Fairborn Observatory to determine the characteristic stellar activity timescales for our Gaussian Process fit, including the stellar rotation period and activity region decay timescale. The stellar rotation signals for both stars are evident in the radial velocity data and are included in our fit using a Gaussian process trained on the photometry. We find the masses of K2-3 b, K2-3 c and GJ3470 b to be 6.48$^{+0.99}_{-0.93}$, 2.14$^{+1.08}_{-1.04}$, and 12.58$^{+1.31}_{-1.28}$ M$_\oplus$ respectively. K2-3 d was not significantly detected and has a 3-$\sigma$ upper limit of 2.80 M$_\oplus$. These two systems are training cases for future TESS systems; due to the low planet densities ($\rho$ $<$ 3.7 g cm$^{-3}$) and bright host stars (K $<$ 9 mag), they are among the best candidates for transmission spectroscopy in order to characterize the atmospheric compositions of small planets., Comment: 21 pages, 11 figures, accepted to AJ
- Published
- 2018
- Full Text
- View/download PDF
242. Differentially Private Fair Learning
- Author
-
Jagielski, Matthew, Kearns, Michael, Mao, Jieming, Oprea, Alina, Roth, Aaron, Sharifi-Malvajerdi, Saeed, and Ullman, Jonathan
- Subjects
Computer Science - Machine Learning ,Computer Science - Data Structures and Algorithms ,Computer Science - Computer Science and Game Theory ,Statistics - Machine Learning - Abstract
Motivated by settings in which predictive models may be required to be non-discriminatory with respect to certain attributes (such as race), but even collecting the sensitive attribute may be forbidden or restricted, we initiate the study of fair learning under the constraint of differential privacy. We design two learning algorithms that simultaneously promise differential privacy and equalized odds, a 'fairness' condition that corresponds to equalizing false positive and negative rates across protected groups. Our first algorithm is a private implementation of the equalized odds post-processing approach of [Hardt et al., 2016]. This algorithm is appealingly simple, but must be able to use protected group membership explicitly at test time, which can be viewed as a form of 'disparate treatment'. Our second algorithm is a differentially private version of the oracle-efficient in-processing approach of [Agarwal et al., 2018] that can be used to find the optimal fair classifier, given access to a subroutine that can solve the original (not necessarily fair) learning problem. This algorithm is more complex but need not have access to protected group membership at test time. We identify new tradeoffs between fairness, accuracy, and privacy that emerge only when requiring all three properties, and show that these tradeoffs can be milder if group membership may be used at test time. We conclude with a brief experimental evaluation.
- Published
- 2018
243. Characterization of the bacterial microbiome of Swedish ticks through 16S rRNA amplicon sequencing of whole ticks and of individual tick organs
- Author
-
Giulio Grandi, Giulia Chiappa, Karin Ullman, Per-Eric Lindgren, Emanuela Olivieri, Davide Sassera, Emma Östlund, Anna Omazic, Debora Perissinotto, and Robert Söderlund
- Subjects
Ixodes ricinus ,Microbiota ,Community profiling ,Tick-borne pathogens ,One Health ,NGS ,Infectious and parasitic diseases ,RC109-216 - Abstract
Abstract Background The composition of the microbial flora associated with ixodid ticks has been studied in several species, revealing the importance of geographical origin, developmental stage(s) and feeding status of the tick, as well as substantial differences between tissues and organs. Studying the microbiome in the correct context and scale is therefore necessary for understanding the interactions between tick-borne pathogens and other microorganisms as well as other aspects of tick biology. Methods In the present study the microbial flora of whole Ixodes ricinus, I. persulcatus and I. trianguliceps ticks were analyzed with 16S rRNA amplicon sequencing. Additionally, tick organs (midguts, Malpighian tubules, ovaries, salivary glands) from flat and engorged I. ricinus female ticks were examined with the same methodology. Results The most abundant bacteria belonged to the group of Proteobacteria (Cand. Midichloria mitochondrii and Cand. Lariskella). 16S amplicon sequencing of dissected tick organs provided more information on the diversity of I. ricinus-associated microbial flora, especially when organs were collected from engorged ticks. Bacterial genera significantly associated with tick feeding status as well as genera associated with the presence of tick-borne pathogens were identified. Conclusions These results contribute to the knowledge of microbial flora associated with ixodid ticks in their northernmost distribution limit in Europe and opens new perspectives for other investigations on the function of these bacteria, including those using other approaches like in vitro cultivation and in vitro models. Graphical Abstract
- Published
- 2023
- Full Text
- View/download PDF
244. Turbidity removal through the application of powdered azadirachta indica (neem) seeds
- Author
-
Qandeel Khan, Uzma Imran, Jeffrey L. Ullman, and Waheed Ali Khokhar
- Subjects
Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Science - Abstract
Various natural products used for water treatment are becoming more popular due to their general safety, eco-friendly sludge production, ease of degradation, cost-effectiveness, and local availability. This research assessed the efficiency of powdered neem (Azadirachta indica) seeds in removing turbidity from the water. Batch experiments determined the optimum coagulant dose, pH level, mixing time, and mixing speed to reduce turbidity from kaolin-based synthetic turbid water. Powdered neem seeds with a pore size of about 0.45 mm were prepared and used in water treatment under optimum conditions. Results showed that a coagulant dose of 3 g of neem seeds/L, 13.2 pH level, 60 mins mixing time at 80 rpm mixing speed could reduce turbidity levels to 35 NTU from 250 NTU (86% removal). Findings suggest that powdered neem seeds can be a potential substitute for conventional chemical coagulants for drinking water treatment.
- Published
- 2023
- Full Text
- View/download PDF
245. "I See Myself in that Career": Exploring Methods to Attract the Next Generation Transportation Workforce
- Author
-
McFadden, Marissa, Ullman, Hannah, and McRae, Glenn
- Subjects
Aged ,Best practices ,Curricula ,Graduate study ,Job opportunities ,Jobs ,Labor force ,Retirement ,Sustainable transportation ,Transportation careers ,Universities and colleges - Abstract
Predicting a workforce crisis for the past twenty years, the transportation field has launched a wide variety of initiatives to increase the future talent pipeline that would choose transportation as a field of choice for study and future careers. This project follows on the premise that increasing awareness of career opportunities is essential to attracting new entrants at an early age, and that awareness building should be dynamic. This includes providing views of who works in the transportation field, what their experiences are, and what they value about their work. This paper hypothesizes that first-person glimpses into transportation careers are just as essential for job seekers as knowing job specs, qualifications, pay scales and opportunities for advancement. In-depth career profiles of workers were developed and showcase individuals, from diverse backgrounds and interests, engaged in work critical to the future of our transportation systems and infrastructure as an inducement to consider future education and training work needed to enter such a field. A number of other initiatives have created occupation and career profiles in public and private agencies. As with other awareness building and talent pipeline development initiatives such efforts need to be made accessible to a wider more diverse audience and metrics for tracking their effectiveness should be developed and implemented. Coordinating and testing these efforts are part of a future stage of program.View the NCST Project Webpage
- Published
- 2019
246. A management algorithm for patients with intracranial pressure monitoring: the Seattle International Severe Traumatic Brain Injury Consensus Conference (SIBICC).
- Author
-
Hawryluk, Gregory WJ, Aguilera, Sergio, Buki, Andras, Bulger, Eileen, Citerio, Giuseppe, Cooper, D Jamie, Arrastia, Ramon Diaz, Diringer, Michael, Figaji, Anthony, Gao, Guoyi, Geocadin, Romergryko, Ghajar, Jamshid, Harris, Odette, Hoffer, Alan, Hutchinson, Peter, Joseph, Mathew, Kitagawa, Ryan, Manley, Geoffrey, Mayer, Stephan, Menon, David K, Meyfroidt, Geert, Michael, Daniel B, Oddo, Mauro, Okonkwo, David, Patel, Mayur, Robertson, Claudia, Rosenfeld, Jeffrey V, Rubiano, Andres M, Sahuquillo, Juan, Servadei, Franco, Shutter, Lori, Stein, Deborah, Stocchetti, Nino, Taccone, Fabio Silvio, Timmons, Shelly, Tsai, Eve, Ullman, Jamie S, Vespa, Paul, Videtta, Walter, Wright, David W, Zammit, Christopher, and Chesnut, Randall M
- Subjects
Humans ,Intracranial Hypertension ,Monitoring ,Physiologic ,Algorithms ,Adult ,Aged ,Aged ,80 and over ,Middle Aged ,Female ,Male ,Consensus Development Conferences as Topic ,Practice Guidelines as Topic ,Brain Injuries ,Traumatic ,Algorithm ,Brain injury ,Consensus ,Head trauma ,Intracranial pressure ,Protocol ,SIBICC ,Seattle ,Tiers ,Traumatic Brain Injury (TBI) ,Neurosciences ,Traumatic Head and Spine Injury ,Brain Disorders ,Physical Injury - Accidents and Adverse Effects ,Clinical Sciences ,Public Health and Health Services ,Emergency & Critical Care Medicine - Abstract
BackgroundManagement algorithms for adult severe traumatic brain injury (sTBI) were omitted in later editions of the Brain Trauma Foundation's sTBI Management Guidelines, as they were not evidence-based.MethodsWe used a Delphi-method-based consensus approach to address management of sTBI patients undergoing intracranial pressure (ICP) monitoring. Forty-two experienced, clinically active sTBI specialists from six continents comprised the panel. Eight surveys iterated queries and comments. An in-person meeting included whole- and small-group discussions and blinded voting. Consensus required 80% agreement. We developed heatmaps based on a traffic-light model where panelists' decision tendencies were the focus of recommendations.ResultsWe provide comprehensive algorithms for ICP-monitor-based adult sTBI management. Consensus established 18 interventions as fundamental and ten treatments not to be used. We provide a three-tier algorithm for treating elevated ICP. Treatments within a tier are considered empirically equivalent. Higher tiers involve higher risk therapies. Tiers 1, 2, and 3 include 10, 4, and 3 interventions, respectively. We include inter-tier considerations, and recommendations for critical neuroworsening to assist the recognition and treatment of declining patients. Novel elements include guidance for autoregulation-based ICP treatment based on MAP Challenge results, and two heatmaps to guide (1) ICP-monitor removal and (2) consideration of sedation holidays for neurological examination.ConclusionsOur modern and comprehensive sTBI-management protocol is designed to assist clinicians managing sTBI patients monitored with ICP-monitors alone. Consensus-based (class III evidence), it provides management recommendations based on combined expert opinion. It reflects neither a standard-of-care nor a substitute for thoughtful individualized management.
- Published
- 2019
247. Plans or Outcomes: How Do We Attribute Intelligence to Others?
- Author
-
Kryven, Marta, Ullman, Tomer D., Cowan, William, and Tenenbaum, Joshua B.
- Abstract
Humans routinely make inferences about both the contents and the workings of other minds based on observed actions. People consider what others want or know, but also how intelligent, rational, or attentive they might be. Here, we introduce a new methodology for quantitatively studying the mechanisms people use to attribute intelligence to others based on their behavior. We focus on two key judgments previously proposed in the literature: judgments based on observed outcomes (you're smart if you won the game) and judgments based on evaluating the quality of an agent's planning that led to their outcomes (you're smart if you made the right choice, even if you didn't succeed). We present a novel task, the maze search task (MST), in which participants rate the intelligence of agents searching a maze for a hidden goal. We model outcome-based attributions based on the observed utility of the agent upon achieving a goal, with higher utilities indicating higher intelligence, and model planning-based attributions by measuring the proximity of the observed actions to an ideal planner, such that agents who produce closer approximations of optimal plans are seen as more intelligent. We examine human attributions of intelligence in three experiments that use MST and find that participants used both outcome and planning as indicators of intelligence. However, observing the outcome was not necessary, and participants still made planning-based attributions of intelligence when the outcome was not observed. We also found that the weights individuals placed on plans and on outcome correlated with an individual's ability to engage in cognitive reflection. Our results suggest that people attribute intelligence based on plans given sufficient context and cognitive resources and rely on the outcome when computational resources or context are limited.
- Published
- 2021
- Full Text
- View/download PDF
248. The mass of TOI-519 b: A close-in giant planet transiting a metal-rich mid-M dwarf
- Author
-
Taiki Kagetani, Norio Narita, Tadahiro Kimura, Teruyuki Hirano, Masahiro Ikoma, Hiroyuki Tako Ishikawa, Steven Giacalone, Akihiko Fukui, Takanori Kodama, Rebecca Gore, Ashley Schroeder, Yasunori Hori, Kiyoe Kawauchi, Noriharu Watanabe, Mayuko Mori, Yujie Zou, Kai Ikuta, Vigneshwaran Krishnamurthy, Jon Zink, Kevin Hardegree-Ullman, Hiroki Harakawa, Tomoyuki Kudo, Takayuki Kotani, Takashi Kurokawa, Nobuhiko Kusakabe, Masayuki Kuzuhara, Jerome P de Leon, John H Livingston, Jun Nishikawa, Masashi Omiya, Enric Palle, Hannu Parviainen, Takuma Serizawa, Huan-Yu Teng, Akitoshi Ueda, and Motohide Tamura
- Published
- 2023
- Full Text
- View/download PDF
249. Barriers and Facilitators of Evidence-Based Psychotherapies for Chronic Pain in Adults: A Systematic Review
- Author
-
Goldsmith, Elizabeth S., Miller, Wendy A., Koffel, Erin, Ullman, Kristen, Landsteiner, Adrienne, Stroebel, Benjamin, Hill, Jessica, Ackland, Princess E., Wilt, Timothy J., and Duan-Porter, Wei
- Published
- 2023
- Full Text
- View/download PDF
250. Patient blood management in critically ill children undergoing cardiac surgery: A cohort study
- Author
-
Long, Debbie A., Slaughter, Eugene, Mihala, Gabor, Macfarlane, Fiona, Ullman, Amanda J., Keogh, Samantha, and Stocker, Christian
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.