Matching Items (69)
Filtering by

Clear all filters

141461-Thumbnail Image.png
Description
In the digital humanities, there is a constant need to turn images and PDF files into plain text to apply analyses such as topic modelling, named entity recognition, and other techniques. However, although there exist different solutions to extract text embedded in PDF files or run OCR on images, they

In the digital humanities, there is a constant need to turn images and PDF files into plain text to apply analyses such as topic modelling, named entity recognition, and other techniques. However, although there exist different solutions to extract text embedded in PDF files or run OCR on images, they typically require additional training (for example, scholars have to learn how to use the command line) or are difficult to automate without programming skills. The Giles Ecosystem is a distributed system based on Apache Kafka that allows users to upload documents for text and image extraction. The system components are implemented using Java and the Spring Framework and are available under an Open Source license on GitHub (https://github.com/diging/).
ContributorsLessios-Damerow, Julia (Contributor) / Peirson, Erick (Contributor) / Laubichler, Manfred (Contributor) / ASU-SFI Center for Biosocial Complex Systems (Contributor)
Created2017-09-28
141463-Thumbnail Image.png
Description

Five immunocompetent C57BL/6-cBrd/cBrd/Cr (albino C57BL/6) mice were injected with GL261-luc2 cells, a cell line sharing characteristics of human glioblastoma multiforme (GBM). The mice were imaged using magnetic resonance (MR) at five separate time points to characterize growth and development of the tumor. After 25 days, the final tumor volumes of

Five immunocompetent C57BL/6-cBrd/cBrd/Cr (albino C57BL/6) mice were injected with GL261-luc2 cells, a cell line sharing characteristics of human glioblastoma multiforme (GBM). The mice were imaged using magnetic resonance (MR) at five separate time points to characterize growth and development of the tumor. After 25 days, the final tumor volumes of the mice varied from 12 mm3 to 62 mm3, even though mice were inoculated from the same tumor cell line under carefully controlled conditions. We generated hypotheses to explore large variances in final tumor size and tested them with our simple reaction-diffusion model in both a 3-dimensional (3D) finite difference method and a 2-dimensional (2D) level set method. The parameters obtained from a best-fit procedure, designed to yield simulated tumors as close as possible to the observed ones, vary by an order of magnitude between the three mice analyzed in detail. These differences may reflect morphological and biological variability in tumor growth, as well as errors in the mathematical model, perhaps from an oversimplification of the tumor dynamics or nonidentifiability of parameters. Our results generate parameters that match other experimental in vitro and in vivo measurements. Additionally, we calculate wave speed, which matches with other rat and human measurements.

ContributorsRutter, Erica (Author) / Stepien, Tracy (Author) / Anderies, Barrett (Author) / Plasencia, Jonathan (Author) / Woolf, Eric C. (Author) / Scheck, Adrienne C. (Author) / Turner, Gregory H. (Author) / Liu, Qingwei (Author) / Frakes, David (Author) / Kodibagkar, Vikram (Author) / Kuang, Yang (Author) / Preul, Mark C. (Author) / Kostelich, Eric (Author) / College of Liberal Arts and Sciences (Contributor)
Created2017-05-31
141473-Thumbnail Image.png
Description

Critical flicker fusion thresholds (CFFTs) describe when quick amplitude modulations of a light source become undetectable as the frequency of the modulation increases and are thought to underlie a number of visual processing skills, including reading. Here, we compare the impact of two vision-training approaches, one involving contrast sensitivity training

Critical flicker fusion thresholds (CFFTs) describe when quick amplitude modulations of a light source become undetectable as the frequency of the modulation increases and are thought to underlie a number of visual processing skills, including reading. Here, we compare the impact of two vision-training approaches, one involving contrast sensitivity training and the other directional dot-motion training, compared to an active control group trained on Sudoku. The three training paradigms were compared on their effectiveness for altering CFFT. Directional dot-motion and contrast sensitivity training resulted in significant improvement in CFFT, while the Sudoku group did not yield significant improvement. This finding indicates that dot-motion and contrast sensitivity training similarly transfer to effect changes in CFFT. The results, combined with prior research linking CFFT to high-order cognitive processes such as reading ability, and studies showing positive impact of both dot-motion and contrast sensitivity training in reading, provide a possible mechanistic link of how these different training approaches impact reading abilities.

ContributorsZhou, Tianyou (Author) / Nanez, Jose (Author) / Zimmerman, Daniel (Author) / Holloway, Steven (Author) / Seitz, Aaron (Author) / New College of Interdisciplinary Arts and Sciences (Contributor)
Created2016-10-26
141474-Thumbnail Image.png
Description

Although autism spectrum disorder (ASD) is a serious lifelong condition, its underlying neural mechanism remains unclear. Recently, neuroimaging-based classifiers for ASD and typically developed (TD) individuals were developed to identify the abnormality of functional connections (FCs). Due to over-fitting and interferential effects of varying measurement conditions and demographic distributions, no

Although autism spectrum disorder (ASD) is a serious lifelong condition, its underlying neural mechanism remains unclear. Recently, neuroimaging-based classifiers for ASD and typically developed (TD) individuals were developed to identify the abnormality of functional connections (FCs). Due to over-fitting and interferential effects of varying measurement conditions and demographic distributions, no classifiers have been strictly validated for independent cohorts. Here we overcome these difficulties by developing a novel machine-learning algorithm that identifies a small number of FCs that separates ASD versus TD. The classifier achieves high accuracy for a Japanese discovery cohort and demonstrates a remarkable degree of generalization for two independent validation cohorts in the USA and Japan. The developed ASD classifier does not distinguish individuals with major depressive disorder and attention-deficit hyperactivity disorder from their controls but moderately distinguishes patients with schizophrenia from their controls. The results leave open the viable possibility of exploring neuroimaging-based dimensions quantifying the multiple-disorder spectrum.

ContributorsYahata, Noriaki (Author) / Morimoto, Jun (Author) / Hashimoto, Ryuichiro (Author) / Lisi, Giuseppe (Author) / Shibata, Kazuhisa (Author) / Kawakubo, Yuki (Author) / Kuwabara, Hitoshi (Author) / Kuroda, Miho (Author) / Yamada, Takashi (Author) / Megumi, Fukuda (Author) / Imamizu, Hiroshi (Author) / Nanez, Jose (Author) / Takahashi, Hidehiko (Author) / Okamoto, Yasumasa (Author) / Kasai, Kiyoto (Author) / Kato, Nobumasa (Author) / Sasaki, Yuka (Author) / Watanabe, Takeo (Author) / Kawato, Mitsuo (Author) / New College of Interdisciplinary Arts and Sciences (Contributor)
Created2016-04-14
130413-Thumbnail Image.png
Description
Because collective cognition emerges from local signaling among group members, deciphering communication systems is crucial to understanding the underlying mechanisms. Alarm signals are widespread in the social insects and can elicit a variety of behavioral responses to danger, but the functional plasticity of these signals has not been well studied.

Because collective cognition emerges from local signaling among group members, deciphering communication systems is crucial to understanding the underlying mechanisms. Alarm signals are widespread in the social insects and can elicit a variety of behavioral responses to danger, but the functional plasticity of these signals has not been well studied. Here we report an alarm pheromone in the ant Temnothorax rugatulus that elicits two different behaviors depending on context. When an ant was tethered inside an unfamiliar nest site and unable to move freely, she released a pheromone from her mandibular gland that signaled other ants to reject this nest as a potential new home, presumably to avoid potential danger. When the same pheromone was presented near the ants' home nest, they were instead attracted to it, presumably to respond to a threat to the colony. We used coupled gas chromatography/mass spectrometry to identify candidate compounds from the mandibular gland and tested each one in a nest choice bioassay. We found that 2,5-dimethylpyrazine was sufficient to induce rejection of a marked new nest and also to attract ants when released at the home nest. This is the first detailed investigation of chemical communication in the leptothoracine ants. We discuss the possibility that this pheromone's deterrent function can improve an emigrating colony's nest site selection performance.
Created2014-09-01
134184-Thumbnail Image.png
Description
Historically, Supreme Court interpretations of the Constitution of the United States have been significantly important, impacting the lives of every American. This honors thesis seeks to understand the ways in which the Constitution has been interpreted through the lens of political ideology. Using constitutional theory, I explain how the political

Historically, Supreme Court interpretations of the Constitution of the United States have been significantly important, impacting the lives of every American. This honors thesis seeks to understand the ways in which the Constitution has been interpreted through the lens of political ideology. Using constitutional theory, I explain how the political ideologies of classical liberalism, conservatism, libertarianism, and progressive liberalism have played a role in the interpretations of the First, Second, and Fourth Amendments. I also examine how these ideological interpretations have changed from 1776 to 2017, dividing the history of the United States into four eras: the Founding Era, the Civil War Era, the New Deal Era, and the Modern Era. First, the First Amendment's clauses on religion are examined, where I focus on the separation between church and state as well as the concepts of "establishment" and "free exercise." The First Amendment transitions from classically liberal, to conservative, to progressively liberal and classically liberal, to progressively liberal and libertarian. Next, we look at the Second Amendment's notions of a "militia" and the "right to keep and bear arms." The Second Amendment's interpretations begin classically liberal, then change to classically liberal and progressively liberal, to progressively liberal, to conservative. Finally, the analysis on the Fourth Amendment's "unreasonable searches and seizures" as well as "warrants" lends evidence to ideological interpretations. The Fourth Amendment, like the other two, starts classically liberal for two eras, then becomes libertarian, and finally ends libertarian and conservative. The implications of each of these conclusions are then discussed, with emphasis on public opinion in society during the era in question, the ways in which the ideologies in each era seem to build upon one another, the ideologies of the justices who wrote the opinions, and the ideology of the court.
Created2017-12
168323-Thumbnail Image.png
Description
Transorbital surgery has gained recent notoriety due to its incorporation into endoscopic skull base surgery. The body of published literature on the field is cadaveric and observation. The pre-clinical studies are focused on the use of the endoscope only. Furthermore the methodology utilised in the published literature is inconsistent and

Transorbital surgery has gained recent notoriety due to its incorporation into endoscopic skull base surgery. The body of published literature on the field is cadaveric and observation. The pre-clinical studies are focused on the use of the endoscope only. Furthermore the methodology utilised in the published literature is inconsistent and does not embody the optimal principles of scientific experimentation. This body of work evaluates a minimally invasive novel surgical corridor - the transorbital approach - its validity in neurosurgical practice, as well as both qualitatively and quantitatively assessing available technological advances in a robust experimental fashion. While the endoscope is an established means of visualisation used in clinical transorbital surgery, the microscope has never been assessed with respect to the transorbital approach. This question is investigated here and the anatomical and surgical benefits and limitations of microscopic visualisation demonstrated. The comparative studies provide increased knowledge on specifics pertinent to neurosurgeons and other skull base specialists when planning pre-operatively, such as pathology location, involved anatomical structures, instrument maneuvrability and the advantages and disadvantages of the distinct visualisation technologies. This is all with the intention of selecting the most suitable surgical approach and technology, specific to the patient, pathology and anatomy, so as to perform the best surgical procedure. The research findings illustrated in this body of work are diverse, reproducible and applicable. The transorbital surgical corridor has substantive potential for access to the anterior cranial fossa and specific surgical target structures. The neuroquantitative metrics investigated confirm the utility and benefits specific to the respective visualisation technologies i.e. the endoscope and microscope. The most appropriate setting wherein the approach should be used is also discussed. The transorbital corridor has impressive potential, can utilise all available technological advances, promotes multi-disciplinary co-operation and learning amongst clinicians and ultimately, is a means of improving operative patient care.
ContributorsHoulihan, Lena Mary (Author) / Preul, Mark C. (Thesis advisor) / Vernon, Brent (Thesis advisor) / O' Sullivan, Michael G.J. (Committee member) / Lawton, Michael T. (Committee member) / Santarelli, Griffin (Committee member) / Smith, Brian (Committee member) / Arizona State University (Publisher)
Created2021
187847-Thumbnail Image.png
Description
A description of numerical and analytical work pertaining to models that describe the growth and progression of glioblastoma multiforme (GBM), an aggressive form of primary brain cancer. Two reaction-diffusion models are used: the Fisher-Kolmogorov-Petrovsky-Piskunov equation and a 2-population model that divides the tumor into actively proliferating and quiescent (or necrotic)

A description of numerical and analytical work pertaining to models that describe the growth and progression of glioblastoma multiforme (GBM), an aggressive form of primary brain cancer. Two reaction-diffusion models are used: the Fisher-Kolmogorov-Petrovsky-Piskunov equation and a 2-population model that divides the tumor into actively proliferating and quiescent (or necrotic) cells. The numerical portion of this work (chapter 2) focuses on simulating GBM expansion in patients undergoing treatment for recurrence of tumor following initial surgery. The models are simulated on 3-dimensional brain geometries derived from magnetic resonance imaging (MRI) scans provided by the Barrow Neurological Institute. The study consists of 17 clinical time intervals across 10 patients that have been followed in detail, each of whom shows significant progression of tumor over a period of 1 to 3 months on sequential follow up scans. A Taguchi sampling design is implemented to estimate the variability of the predicted tumors to using 144 different choices of model parameters. In 9 cases, model parameters can be identified such that the simulated tumor contains at least 40 percent of the volume of the observed tumor. In the analytical portion of the paper (chapters 3 and 4), a positively invariant region for our 2-population model is identified. Then, a rigorous derivation of the critical patch size associated with the model is performed. The critical patch (KISS) size is the minimum habitat size needed for a population to survive in a region. Habitats larger than the critical patch size allow a population to persist, while smaller habitats lead to extinction. The critical patch size of the 2-population model is consistent with that of the Fisher-Kolmogorov-Petrovsky-Piskunov equation, one of the first reaction-diffusion models proposed for GBM. The critical patch size may indicate that GBM tumors have a minimum size depending on the location in the brain. A theoretical relationship between the size of a GBM tumor at steady-state and its maximum cell density is also derived, which has potential applications for patient-specific parameter estimation based on magnetic resonance imaging data.
ContributorsHarris, Duane C. (Author) / Kuang, Yang (Thesis advisor) / Kostelich, Eric J. (Thesis advisor) / Preul, Mark C. (Committee member) / Crook, Sharon (Committee member) / Gardner, Carl (Committee member) / Arizona State University (Publisher)
Created2023
129259-Thumbnail Image.png
Description

What's a profession without a code of ethics? Being a legitimate profession almost requires drafting a code and, at least nominally, making members follow it. Codes of ethics (henceforth “codes”) exist for a number of reasons, many of which can vary widely from profession to profession - but above all

What's a profession without a code of ethics? Being a legitimate profession almost requires drafting a code and, at least nominally, making members follow it. Codes of ethics (henceforth “codes”) exist for a number of reasons, many of which can vary widely from profession to profession - but above all they are a form of codified self-regulation. While codes can be beneficial, it argues that when we scratch below the surface, there are many problems at their root. In terms of efficacy, codes can serve as a form of ethical window dressing, rather than effective rules for behavior. But even more that, codes can degrade the meaning behind being a good person who acts ethically for the right reasons.

Created2013-11-30
Description

This essay uses census data from the eighteenth century to examine the leadership role of caciques in the Guaraní missions. Cacique succession between 1735 and 1759 confirms that the position of cacique transitioned from the Guaraníes’ flexible interpretation of hereditary succession to the Jesuits’ rigid idea of primogenitor (father to

This essay uses census data from the eighteenth century to examine the leadership role of caciques in the Guaraní missions. Cacique succession between 1735 and 1759 confirms that the position of cacique transitioned from the Guaraníes’ flexible interpretation of hereditary succession to the Jesuits’ rigid idea of primogenitor (father to eldest son) succession. This essay argues that scholars overstate the caciques’ leadership role in the Guaraní missions. Adherence to primogenitor succession did not take into account a candidate's leadership qualities, and thus, some caciques functioned as placeholders for organizing the mission population and calculating tribute and not as active leaders. An assortment of other Guaraní leadership positions compensated for this weakness by providing both access to leadership roles for non-caciques who possessed leadership qualities but not the proper bloodline and additional leadership opportunities for more capable caciques. By taking into account leadership qualities and not just descent, these positions provided flexibility and reflected continuity with pre-contact Guaraní ideas about leadership.

Created2013-11-30