A randomised controlled trial of an Intervention to Improve Compliance with the ARRIVE guidelines (IICARus).Ezgi Tanriver-Ayder,Laura J. Gray,Sarah K. McCann,Ian M. Devonshire,Leigh O’Connor,Zeinab Ammar,Sarah Corke,Mahmoud Warda,Evandro Araújo De-Souza,Paolo Roncon,Edward Christopher,Ryan Cheyne,Daniel Baker,Emily Wheater,Marco Cascella,Savannah A. Lynn,Emmanuel Charbonney,Kamil Laban,Cilene Lino de Oliveira,Julija Baginskaite,Joanne Storey,David Ewart Henshall,Ahmed Nazzal,Privjyot Jheeta,Arianna Rinaldi,Teja Gregorc,Anthony Shek,Jennifer Freymann,Natasha A. Karp,Terence J. Quinn,Victor Jones,Kimberley Elaine Wever,Klara Zsofia Gerlei,Mona Hosh,Victoria Hohendorf,Monica Dingwall,Timm Konold,Katrina Blazek,Sarah Antar,Daniel-Cosmin Marcu,Alexandra Bannach-Brown,Paula Grill,Zsanett Bahor,Gillian L. Currie,Fala Cramond,Rosie Moreland,Chris Sena,Jing Liao,Michelle Dohm,Gina Alvino,Alejandra Clark,Gavin Morrison,Catriona MacCallum,Cadi Irvine,Philip Bath,David Howells,Malcolm R. Macleod,Kaitlyn Hair &Emily S. Sena -2019 -Research Integrity and Peer Review 4 (1).detailsBackgroundThe ARRIVE (Animal Research: Reporting of In Vivo Experiments) guidelines are widely endorsed but compliance is limited. We sought to determine whether journal-requested completion of an ARRIVE checklist improves full compliance with the guidelines.MethodsIn a randomised controlled trial, manuscripts reporting in vivo animal research submitted to PLOS ONE (March–June 2015) were randomly allocated to either requested completion of an ARRIVE checklist or current standard practice. Authors, academic editors, and peer reviewers were blinded to group allocation. Trained reviewers performed outcome adjudication (...) in duplicate by assessing manuscripts against an operationalised version of the ARRIVE guidelines that consists 108 items. Our primary outcome was the between-group differences in the proportion of manuscripts meeting all ARRIVE guideline checklist subitems.ResultsWe randomised 1689 manuscripts (control: n = 844, intervention: n = 845), of which 1269 were sent for peer review and 762 (control: n = 340; intervention: n = 332) accepted for publication. No manuscript in either group achieved full compliance with the ARRIVE checklist. Details of animal husbandry (ARRIVE subitem 9b) was the only subitem to show improvements in reporting, with the proportion of compliant manuscripts rising from 52.1 to 74.1% (X2 = 34.0, df = 1, p = 2.1 × 10−7) in the control and intervention groups, respectively.ConclusionsThese results suggest that altering the editorial process to include requests for a completed ARRIVE checklist is not enough to improve compliance with the ARRIVE guidelines. Other approaches, such as more stringent editorial policies or a targeted approach on key quality items, may promote improvements in reporting. (shrink)
No categories
Analysis of expressed sequence tag loci on wheat chromosome group 4. Miftahudin,K. Ross,X. -F. Ma,A. A.Mahmoud,J. Layton,M. A. Rodriguez Milla,T. Chikmawati,J. Ramalingam,O. Feril,M. S. Pathan,G. Surlan Momirovic,S. Kim,K. Chema,P. Fang,L. Haule,H. Struxness,J. Birkes,C. Yaghoubian,R. Skinner,J. McAllister,V. Nguyen,L. L. Qi,B. Echalier,B. S. Gill,A. M. Linkiewicz,J. Dubcovsky,E. D. Akhunov,J. Dvorák,M. Dilbirligi,K. S. Gill,J. H. Peng,N. L. V. Lapitan,C. E. Bermudez-Kandianis,M. E. Sorrells,K. G. Hossain,V. Kalavacharla,S. F. Kianian,G. R. Lazo,S. Chao,O. D. Anderson,J. Gonzalez-Hernandez,E. J. Conley,J. A. Anderson,D. -W. Choi,R. D. Fenton,T. J. Close,P. E. McGuire,C. O. Qualset,H. T. Nguyen &J. P. Gustafson -unknowndetailsA total of 1918 loci, detected by the hybridization of 938 expressed sequence tag unigenes from 26 Triticeae cDNA libraries, were mapped to wheat homoeologous group 4 chromosomes using a set of deletion, ditelosomic, and nulli-tetrasomic lines. The 1918 EST loci were not distributed uniformly among the three group 4 chromosomes; 41, 28, and 31% mapped to chromosomes 4A, 4B, and 4D, respectively. This pattern is in contrast to the cumulative results of EST mapping in all homoeologous groups, as reported (...) elsewhere, that found the highest proportion of loci mapped to the B genome. Sixty-five percent of these 1918 loci mapped to the long arms of homoeologous group 4 chromosomes, while 35% mapped to the short arms. The distal regions of chromosome arms showed higher numbers of loci than the proximal regions, with the exception of 4DL. This study confirmed the complex structure of chromosome 4A that contains two reciprocal translocations and two inversions, previously identified. An additional inversion in the centromeric region of 4A was revealed. A consensus map for homoeologous group 4 was developed from 119 ESTs unique to group 4. Forty-nine percent of these ESTs were found to be homoologous to sequences on rice chromosome 3, 12% had matches with sequences on other rice chromosomes, and 39% had no matches with rice sequences at all. Limited homology was found between wheat ESTs on homoeologous group 4 and the Arabidopsis genome. Forty-two percent of the homoeologous group 4 ESTs could be classified into functional categories on the basis of blastX searches against all protein databases. (shrink)
No categories
Chromosome bin map of expressed sequence tags in homoeologous group 1 of hexaploid wheat and homoeology with rice and arabidopsis.J. H. Peng,H. Zadeh,G. R. Lazo,J. P. Gustafson,S. Chao,O. D. Anderson,L. L. Qi,B. Echalier,B. S. Gill,M. Dilbirligi,D. Sandhu,K. S. Gill,R. A. Greene,M. E. Sorrells,E. D. Akhunov,J. Dvorák,A. M. Linkiewicz,J. Dubcovsky,K. G. Hossain,V. Kalavacharla,S. F. Kianian,A. A.Mahmoud, Miftahudin,E. J. Conley,J. A. Anderson,M. S. Pathan,H. T. Nguyen,P. E. McGuire,C. O. Qualset &N. L. V. Lapitan -unknowndetailsA total of 944 expressed sequence tags generated 2212 EST loci mapped to homoeologous group 1 chromosomes in hexaploid wheat. EST deletion maps and the consensus map of group 1 chromosomes were constructed to show EST distribution. EST loci were unevenly distributed among chromosomes 1A, 1B, and ID with 660, 826, and 726, respectively. The number of EST loci was greater on the long arms than on the short arms for all three chromosomes. The distribution of ESTs along chromosome arms (...) was nonrandom with EST clusters occurring in the distal regions of short arms and middle regions of long arms. Duplications of group 1 ESTs in other homoeologous groups occurred at a rate of 35.5%. Seventy-five percent of wheat chromosome 1 ESTs had significant matches with rice sequences, where large regions of conservation occurred between wheat consensus chromosome 1 and rice chromosome 5 and between the proximal portion of the long arm of wheat consensus chromosome 1 and rice chromosome 10. Only 9.5% of group 1 ESTs showed significant matches to Arabidopsis genome sequences. The results presented are useful for gene mapping and evolutionary and comparative genomics of grasses. (shrink)
No categories
Development of an expressed sequence tag resource for wheat : EST generation, unigene analysis, probe selection and bioinformatics for a 16,000-locus bin-delineated map. [REVIEW]G. R. Lazo,S. Chao,D. D. Hummel,H. Edwards,C. C. Crossman,N. Lui,V. L. de MatthewsCarollo,D. L. Hane,F. M. You,G. E. Butler,R. E. Miller,T. J. Close,J. H. Peng,N. L. V. Lapitan,J. P. Gustafson,L. L. Qi,B. Echalier,B. S. Gill,M. Dilbirligi,H. S. Randhawa,K. S. Gill,R. A. Greene,M. E. Sorrells,E. D. Akhunov,J. Dvorák,A. M. Linkiewicz,J. Dubcovsky,K. G. Hossain,V. Kalavacharla,S. F. Kianian,A. A.Mahmoud, Miftahudin,X. -F. Ma,E. J. Conley,J. A. Anderson,M. S. Pathan,H. T. Nguyen,P. E. McGuire,C. O. Qualset &O. D. Anderson -unknowndetailsThis report describes the rationale, approaches, organization, and resource development leading to a large-scale deletion bin map of the hexaploid wheat genome. Accompanying reports in this issue detail results from chromosome bin-mapping of expressed sequence tags representing genes onto the seven homoeologous chromosome groups and a global analysis of the entire mapped wheat EST data set. Among the resources developed were the first extensive public wheat EST collection. Described are protocols for sequencing, sequence processing, EST nomenclature, and the assembly of (...) ESTs into contigs. These contigs plus singletons were used for selection of distinct sequence motif unigenes. Selected ESTs were rearrayed, validated by 5′ and 3′ sequencing, and amplified for probing a series of wheat aneuploid and deletion stocks. Images and data for all Southern hybridizations were deposited in databases and were used by the coordinators for each of the seven homoeologous chromosome groups to validate the mapping results. Results from this project have established the foundation for future developments in wheat genomics. (shrink)
Legal theory and sociological facts.M. Groot &O. M. -1998 -Law and Philosophy 17 (3):251-270.detailsThe authors investigate MacCormick and Weinberger's claim that the Institutional Theory of Law provides a conceptual framework for the study of legal phenomena from a socio-legal point of view. They evaluate this claim by confronting both the Institutional Theory of Law and Weinberger's theory of action with two approaches in socio-legal theory, i.e. the instrumentalist and the constitutive approach. The conclusion is that the Institutional Theory of Law lends itself to empirical research from an instrumentalist perspective, for both place the (...) concept `institution' in the context of law. Weinberger's theory of action may provide a basis for empirical research from a constitutive perspective. The authors make some suggestions for refinement of Weinberger's theory of action in order that the relation between institutions and action can be labeled dynamic. (shrink)
A SEIR Epidemic Model of Whooping Cough-Like Infections and Its Dynamically Consistent Approximation.M. M. Alqarni,Arooj Nasir,Maryam Ahmed Alyami,Ali Raza,Jan Awrejcewicz,Muhammad Rafiq,Nauman Ahmed,Tahira Sumbal Shaikh &Emad E.Mahmoud -2022 -Complexity 2022:1-13.detailsWhooping cough is a highly transmitted disease around the world. According to the World Health Organization, 0.15 million cases had reported globally in 2018. Most of the Asian and African states are infected regions. Through the study, we investigated the whole population into the four classes susceptible, exposed, infected, and vaccinated or recovered. The transmission dynamics of whooping cough disease are studied analytically and numerically. Analytical analyses are positivity, boundedness, reproduction number, equilibria, and local and global stabilities. In numerical analysis, (...) we developed an implicit numerical integration scheme consistent with the biological problem’s properties. The analysis of the implicit method for the said model is dynamically consistent, positive, and bounded. Furthermore, an implicit numerical integration scheme is suitable for studying a particular epidemic model such as the whooping cough disease. (shrink)
Cogito: From Descartes to Sartre.M. O. Weimin -2007 -Frontiers of Philosophy in China 2 (2):247-264.detailsCogito, as the first principle of Descartes’ metaphysical system, initiated the modern philosophy of consciousness, becoming both the source and subject of modern Western philosophical discourse. The philosophies of Maine de Biran, Kant, Husserl, Heidegger, Sartre, Merleau-Ponty, and others developed by answering the following questions? Is consciousness substantial or not? Does consciousness require the guarantee of a transcendental subject? Is Cogito epistemological or ontological? Am I a being-for-myself or a being-for-others? Outlining the developmental history of the idea of Cogito from (...) Descartes to Sartre is important for totally comprehending the evolution and development of Western philosophy. (shrink)
On theIvratio Italiae of 32 B.C.M. O. B. Caspari -1911 -Classical Quarterly 5 (04):230-.details‘Ivravit in mea uerba tota Italia sponte sua et me belli quo uici ad Actium ducem depoposcit.’ In these words the Emperor Augustus clearly meant to suggest that the war in which he got rid of Mark Antony was none of his making, but was imposed upon him by the free and self-determined action of the Italian nation. Modern historians have unanimously refused to regard Augustus as a passive instrument in the hands of the Roman people at large; yet they (...) have generally accepted his account of the oath-taking of 32 B.C. as the outcome of a spontaneous burst of enthusiasm in his behalf, which they interpret as the reflex result of the nation's resentment against Antony's un-Roman and treasonable behaviour. (shrink)
On the Egyptian Expedition of 459-4 B.C.M. O. B. Caspari -1913 -Classical Quarterly 7 (03):198-.detailsIt appears to be a generally accepted opinion among modern historians that the expedition which the Athenians led up-Nile in 459 B.C. in support of the Egyptian insurrection against Persia was an exceptionally large one, numbering no less than 200 sail. Modern authors also seem to imply, though they may not say so explicitly, that the whole of this armada was involved in the catastrophe which overtook the rebels in 454 B.C.
The Etruscans and the Sicilian Expedition of 414-413 B.C.M. O. B. Caspari -1911 -Classical Quarterly 5 (02):113-.detailsIt has usually been held, on the strength of several passages in Thucydides, that the Athenian army which was besieging Syracuse in 414–413 b.c. contained a contingent of Etruscans desirous of retaliating upon the Syracusans for losses inflicted upon them in past days—e.g., in 474 at Cumae and in 453 at Elba.
Encryption of graphic information by means of transformation matrixes for protection against decofing by neural algorithms.Yunak O. M.,Stryxaluk B. M. &Yunak O. P. -2020 -Artificial Intelligence Scientific Journal 25 (2):15-20.detailsThe article deals with the algorithm of encrypting graphic information using transformation matrixes. It presents the actions that can be done with the image. The article also gives algorithms for forming matrixes that are created with the use of random processes. Examples of matrixes and encryption results are shown. Calculations of the analysis of combinations and conclusions to them are carried out. The article shows the possibilities and advantages of this image encryption algorithm. The proposed algorithm will allow to transmit (...) encrypted information through open communication channels. The algorithm uses all possible actions that can be done with the image, namely: image resizing, adding redundant elements to the image, changing the location of the pixels, changing the brightness of the image pixels, inverting the image pixels, changing the colours of the images pixels. A randomized approach to matrix formation will make it impossible to use neural systems. The algorithm of the implementation of writing encryption code is rather simple. It is not possible to decrypt the image without a key as the number of possible combinations is extremely large. This algorithm can be used in the military, intelligence, information security. Encryption does not require significant computing or RAM resources. This algorithm can be implemented in WEB-technology and in mobile applications, it has no recursive functions and loop in loop. The algorithm hides the image size, which in turn adds extra protection. Redundant elements will not allow neural networks to compare pixels. Changing colors, changing brightness, inversion by random processes will not allow neural networks to find the decryption function. The article considers an image encryption algorithm that will give a possibility to generate a key. The key will be a set of two-dimensional arrays formed in a randomized manner. A randomized approach to matrix formation will make it impossible to use neural systems. The algorithm uses all possible actions that can be done with the image, namely: Image resizing. Adding redundant elements to the image. Changing the location of the pixels. Changing the brightness of the image pixels. Inverting the image pixels. Changing the colours of the images pixels. The pixel positioning matrix gives us! combinations. The pixel brightness change matrix gives us 8 *! combinations. The pixel inversion matrix gives us 8 *! combinations. The pixel colour change matrix gives us 6 *! Combinations. The total number of combinations N is equal to: It is not possible to decrypt the image without a key as the number of possible combinations is extremely large. The algorithm of the implementation of writing encryption code is rather simple. This algorithm can be used in the military, intelligence, information security. The advantage of this algorithm is the fact that the encrypted image can be transmitted through open chann. (shrink)
An islamic approach to the sustainability of democracy.M. O. Adeniyi -2004 -Sophia 43 (2):95-103.detailsThe contemporary viewpoint of many scholars is that politics and religion are two parallel discourses which never meet; or that religion is a personal matter which should not be injected into politics. Their argument for taking this stand is that the two are incongruent and therefore, it is better these are left apart. But religion is associated with morals, truthfulness, honesty and a host of moral virtues all of which are mere playthings in the hands of so-called politicians, the consequence (...) of which may affect the citizens of the country negatively. The view taken here is the relationship between religion and politics has become symmetrically impossible to divorce one from the other. More importantly, the paper brings the democratic contribution of the Prophet Mohammed towards establishing a just and equitable society through his activities and the Medina Constitution, drafted during his time. Attention is given to the democratic administration of the successors of the Prophet with a view to establishing the fact that if Islam is practiced in its truest form, there are democratic values to be found in it. And if such Islamic virtues are made use of, they can not only sustain democracy, but also improve on it. (shrink)
Reponses a Des signaux mecaniques: Communications inter et intracellulaires chez Les vegetaux.M. O. Desbiez,J. Boissay,P. Bonnin,P. Bourgeade,N. Boyer,G. Jaegher,J. M. Frachisse,C. Henry &J. L. Julien -1991 -Acta Biotheoretica 39 (3-4):299-308.detailsIn their environment, plants are continuously submitted to natural stimuli such as wind, rain, temperature changes, wounding, etc. These signals induce a cascade of events which lead to metabolic and morphogenetic responses.In this paper the different steps are described and discussed starting from the reception of the signal by a plant organ to the final morphogenetic response. In our laboratory two plants are studied: Bryonia dioica for which rubbing the internode results in reduced elongation and enhanced radial expansion and Bidens (...) pilosa for which the response occurs at distance, hence pricking the cotyledon of a plantlet induces the growth inhibition of both the hypocotyl and the axillary bud of the pricked cotyledon. (shrink)
On the Rogatio Livia de Latinis.M. O. B. Caspari -1911 -Classical Quarterly 5 (02):115-.detailsWas the above-named bill, which was brought forward in 122 b.c. by the tribune M. Liuius Drusus, and provided that the Latins should under all circumstances be exempt from the penalty of scourging, duly passed by the Roman Assembly and entered upon the statute-book?