Friday, November 30, 2012

A new anti-windup design paradigm for control systems with actuator saturation was developed

A new anti-windup design paradigm for control systems with actuator saturation was developed [ Back to EurekAlert! ] Public release date: 29-Nov-2012
[ | E-mail | Share Share ]

Contact: LIN Zongli
zl5y@virginia.edu
Science China Press

Actuator saturation is ubiquitous in engineering systems. Anti-windup approach to dealing with actuator saturation has been receiving considerable attention from both the industry and the academic community during the past decades. Professor Zongli Lin and his student Xiongjun Wu developed a new anti-windup design paradigm that is capable of achieving significantly improved performances of the resulting closed-loop system. Their work, entitled "Design of multiple anti-windup loops for multiple activations," was published in SCIENCE CHINA Information Sciences, 55(9), 2012.

The traditional anti-windup scheme involves a single anti-windup loop designed for activation immediately at the occurrence of actuator saturation, regardless of the facts that the system might just experience occasional slight saturation rather than operate consistently under severe actuator saturation. Realizing that, by allowing the nominal controller to act unassisted in the event of slight or moderate saturation, the robustness property of the nominal closed-loop system will have the inherent ability to overcome the adverse effects of such slight or moderate saturation, Sajjadi-Kia and Jabbari recently initiated a line of work that exploits the benefit of delayed activation of anti-windup mechanism. In particular, they have shown that significant improvement on the closed-loop transient performance can be achieved if the anti-windup loop is designed for delayed activation instead of immediate activation, and that further improvement can be achieved if two anti-windup loops are designed simultaneously, one for immediate activation and the other for delayed activation.

Subsequently, Professor Lin and his student Xiongjun Wu examined the idea of activating the anti-windup mechanism in anticipation of actuator saturation and showed that the anti-windup compensators, both static and dynamic ones, designed for anticipatory activation, will lead to significantly better closed-loop transient performance than with the designs for delayed activation. In their current SCIENCE CHINA Information Sciences paper, they report their development of a new anti-windup design paradigm, referred to as the triple loop anti-windup design that includes three anti-windup loops, simultaneously designed for immediate, delayed and anticipatory activations (see Figure 1 below).

This new design paradigm results in a closed-loop system that outperforms closed-loops systems resulting from other design methods mentioned above. Shown in Figure 2 below is a comparison of the tracking ability of the closed-loop system under the triple loop anti-windup design with those of the closed-loop systems under an anti-windup loop designed for immediate activation, delayed activation or anticipatory activation, and under two anti-windup loops, simultaneously designed for delayed and immediate activations. Also shown in the figure for reference is the response of the nominal closed-loop in the absence of actuator saturation. It is clear from this comparison that the closed-loop system with the triple loop anti-windup design demonstrates significantly stronger ability to recover the nominal closed-loop performance in the absence of actuator saturation.

###

See the article: Wu X J, Lin Z L. Design of multiple anti-windup loops for multiple activations. SCI CHINA Inf Sci, 2012, 55(9):1925, doi: 10.1007/s11432-012-4645-0


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


A new anti-windup design paradigm for control systems with actuator saturation was developed [ Back to EurekAlert! ] Public release date: 29-Nov-2012
[ | E-mail | Share Share ]

Contact: LIN Zongli
zl5y@virginia.edu
Science China Press

Actuator saturation is ubiquitous in engineering systems. Anti-windup approach to dealing with actuator saturation has been receiving considerable attention from both the industry and the academic community during the past decades. Professor Zongli Lin and his student Xiongjun Wu developed a new anti-windup design paradigm that is capable of achieving significantly improved performances of the resulting closed-loop system. Their work, entitled "Design of multiple anti-windup loops for multiple activations," was published in SCIENCE CHINA Information Sciences, 55(9), 2012.

The traditional anti-windup scheme involves a single anti-windup loop designed for activation immediately at the occurrence of actuator saturation, regardless of the facts that the system might just experience occasional slight saturation rather than operate consistently under severe actuator saturation. Realizing that, by allowing the nominal controller to act unassisted in the event of slight or moderate saturation, the robustness property of the nominal closed-loop system will have the inherent ability to overcome the adverse effects of such slight or moderate saturation, Sajjadi-Kia and Jabbari recently initiated a line of work that exploits the benefit of delayed activation of anti-windup mechanism. In particular, they have shown that significant improvement on the closed-loop transient performance can be achieved if the anti-windup loop is designed for delayed activation instead of immediate activation, and that further improvement can be achieved if two anti-windup loops are designed simultaneously, one for immediate activation and the other for delayed activation.

Subsequently, Professor Lin and his student Xiongjun Wu examined the idea of activating the anti-windup mechanism in anticipation of actuator saturation and showed that the anti-windup compensators, both static and dynamic ones, designed for anticipatory activation, will lead to significantly better closed-loop transient performance than with the designs for delayed activation. In their current SCIENCE CHINA Information Sciences paper, they report their development of a new anti-windup design paradigm, referred to as the triple loop anti-windup design that includes three anti-windup loops, simultaneously designed for immediate, delayed and anticipatory activations (see Figure 1 below).

This new design paradigm results in a closed-loop system that outperforms closed-loops systems resulting from other design methods mentioned above. Shown in Figure 2 below is a comparison of the tracking ability of the closed-loop system under the triple loop anti-windup design with those of the closed-loop systems under an anti-windup loop designed for immediate activation, delayed activation or anticipatory activation, and under two anti-windup loops, simultaneously designed for delayed and immediate activations. Also shown in the figure for reference is the response of the nominal closed-loop in the absence of actuator saturation. It is clear from this comparison that the closed-loop system with the triple loop anti-windup design demonstrates significantly stronger ability to recover the nominal closed-loop performance in the absence of actuator saturation.

###

See the article: Wu X J, Lin Z L. Design of multiple anti-windup loops for multiple activations. SCI CHINA Inf Sci, 2012, 55(9):1925, doi: 10.1007/s11432-012-4645-0


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


Source: http://www.eurekalert.org/pub_releases/2012-11/scp-ana112912.php

super bowl coin toss madonna super bowl halftime kelly clarkson super bowl giants super bowl 2012 half time show halftime show 2012 kelly clarkson super bowl 2012

NASA: Closest planet to sun, Mercury, harbors ice

CAPE CANAVERAL, Fla. (AP) ? Just in time for Christmas, scientists have confirmed a vast amount of ice at the north pole ? on Mercury, the closest planet to the sun.

The findings are from NASA's Mercury-orbiting probe, Messenger, and the subject of three scientific papers released Thursday by the journal Science.

The frozen water is located in regions of Mercury's north pole that always are in shadows, essentially impact craters. It's believed the south pole harbors ice as well, though there are no hard data to support it. Messenger orbits much closer to the north pole than the south.

"If you add it all up, you have on the order of 100 billion to 1 trillion metric tons of ice," said David Lawrence of the Applied Physics Laboratory at Johns Hopkins University. "The uncertainty on that number is just how deep it goes."

The ice is thought to be at least 1? feet deep ? and possibly as much as 65 feet deep.

There's enough polar ice at Mercury, in fact, to bury an area the size of Washington, D.C., by two to 2? miles deep, said Lawrence, the lead author of one of the papers.

"These are very exciting results," he added at a news conference.

For two decades, radar measurements taken from Earth have suggested the presence of ice at Mercury's poles. Now scientists know for sure, thanks to Messenger, the first spacecraft to orbit Mercury.

The water almost certainly came from impacting comets, or possibly asteroids. Ice is found at the surface, as well as buried under a dark material.

Messenger was launched in 2004 and went into orbit 1? years ago around Mercury, where temperatures reach 800 degrees. NASA hopes to continue observations well into next year.

Columbia University's Sean Solomon, principal scientist for Messenger, stressed that no one is suggesting that Mercury might hold evidence of life, given the presence of water. But the latest findings may help explain how water and other building blocks of life arrived elsewhere in the solar system, he said.

Mercury is becoming the subject of new interest "where it wasn't much of one before," Solomon said.

___

Online:

NASA: http://www.nasa.gov/mission_pages/messenger/main/index.html

Science: http://www.sciencemag.org/content/early/recent

Source: http://news.yahoo.com/nasa-closest-planet-sun-mercury-harbors-ice-193337172.html

nevis 2012 sports illustrated swimsuit same day flower delivery valentines day westminster dog show valentines day cards hallmark

Risk of childhood obesity can be predicted at birth

ScienceDaily (Nov. 27, 2012) ? A simple formula can predict at birth a baby's likelihood of becoming obese in childhood, according to a study published today in the open access journal PLOS ONE.

The formula, which is available as an online calculator, estimates the child's obesity risk based on its birth weight, the body mass index of the parents, the number of people in the household, the mother's professional status and whether she smoked during pregnancy.

The researchers behind the study hope their prediction method will be used to identify infants at high risk and help families take steps to prevent their children from putting on too much weight.

Childhood obesity is a leading cause of early type 2 diabetes and heart and circulatory disease, and is becoming more common in developed countries. According to NHS figures, 17 per cent of boys and 15 per cent of girls aged two to 15 in England are classified as obese.

The researchers developed the formula using data from a study set up in 1986 following 4000 children born in Finland. They initially investigated whether obesity risk could be assessed using genetic profiles, but the test they developed based on common genetic variations failed to make accurate predictions. Instead, they discovered that non-genetic information readily available at the time of birth was enough to predict which children would become obese. The formula proved accurate not just in the Finnish cohort, but in further tests using data from studies in Italy and the US.

"This test takes very little time, it doesn't require any lab tests and it doesn't cost anything," said Professor Philippe Froguel, from the School of Public Health at Imperial College London, who led the study.

"All the data we use are well-known risk factors for childhood obesity, but this is the first time they have been used together to predict from the time of birth the likelihood of a child becoming obese."

The 20 per cent of children predicted to have the highest risk at birth make up 80 per cent of obese children. The researchers suggest that services such as dieticians and psychologists could be offered to families with high-risk infants to help them prevent excessive weight gain.

"Once a young child becomes obese, it's difficult for them to lose weight, so prevention is the best strategy, and it has to begin as early as possible," said Professor Froguel. "Unfortunately, public prevention campaigns have been rather ineffective at preventing obesity in school-age children. Teaching parents about the dangers of over-feeding and bad nutritional habits at a young age would be much more effective."

Although common genetic variants did not prove to be helpful for predicting childhood obesity, the researchers say about one in 10 cases of obesity are caused by rare mutations that seriously affect appetite regulation. Tests for these mutations could become available to doctors in the next few years as the cost of DNA sequencing technology falls.

The Imperial researchers conducted the study in collaboration with colleagues at the University of Oulu, Finland; Harvard University in the US and the University of Verona, Italy. The work was funded by the Medical Research Council, Imperial College London, the University of Oulu and Centre National de la Recherche Scientifique.

The obesity risk calculator is available online at http://files-good.ibl.fr/childhood-obesity/

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by Imperial College London.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Anita Morandi, David Meyre, St?phane Lobbens, Ken Kleinman, Marika Kaakinen, Sheryl L. Rifas-Shiman, Vincent Vatin, Stefan Gaget, Anneli Pouta, Anna-Liisa Hartikainen, Jaana Laitinen, Aimo Ruokonen, Shikta Das, Anokhi Ali Khan, Paul Elliott, Claudio Maffeis, Matthew W. Gillman, Marjo-Riitta J?rvelin, Philippe Froguel. Estimation of Newborn Risk for Child or Adolescent Obesity: Lessons from Longitudinal Birth Cohorts. PLoS ONE, 2012; 7 (11): e49919 DOI: 10.1371/journal.pone.0049919

Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/most_popular/~3/3L_guxH0ow4/121128182739.htm

dr oz serena williams blake lively RG3 Espn Fantasy Football Grandparents Day 2012 army wives

Thursday, November 29, 2012

????? ???????? Lenovo P770 ???????? ??????? ?????? ????? ...

??? ?? ?????? ?? ??????? ?? ????????? ?????, ? ????????? ??? ???????? ?? ?????. (????)

???????? 133 ? 67 ? 11.9
?????????????161 ??.??( ? ????????)
????????? ???? ???????? 32 Gb microSD
? ????????? (273 USD = 210 EUR ) ?????? 8Gb??????? ??????.
???????????? ??????????? ????????? ?????????? ????????
? ?. ?.

Source: http://forums.ferra.ru/index.php?showtopic=53193

earthquake san francisco donald payne elizabeth berkley lenny dykstra jenelle evans jenelle evans mlb 12 the show

Gorgeous Photos, In Your Pocket: 500px Arrives On iPhone

500px-iphoneHot on the heels of acquiring the makers of a popular iPhone app for browsing the photos on its service, the Toronto-based photo-sharing startup 500px is debuting an iPhone application of its own today. The move comes just over a year after the company launched its first iOS application, 500px for iPad, which is also seeing a minor update today, as the two apps are now launching as a universal binary for iPhone and iPad.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/XEZIdiitRoM/

pacers undrafted free agents braveheart earthquake california earthquake california roy orbison the third man

jim halpert is supposed to be a dumb paper salesman in scranton not a hot major california babe

Sorry, Readability was unable to parse this page for content.

Source: http://t0mhanks.tumblr.com/post/36771199791

one republic michael dyer suspended new years ball drop new years rockin eve new york times square jaws first night

Wednesday, November 28, 2012

Facebook and Nokia partner to increase connections on-the-go

Using QR Codes to Deliver Maps Electronically - cartographers are tapping into technology in the form of Quick Response Codes (QR codes) to help promote, sell and deliver maps electronically. Ted Florence discusses QR codes, what they are and how they are useful for maps and map producers.?

10 Resources To Help You Get Started Programming with Python - There's no question that if you want a head start in your career as a GIS Analyst, programmer, or other technology professional that Python programming is a must. Just look around on twitter, follow some geo hacks on Google +, check out the developer resources, and attend a GeoGeek meetup of WhereCamp and you'll hear about python.

Exploring Foursquare with The Explore foursquare map - A look at some clever mapping functionality available to users of the foursquare service

58% Use Location-based Apps Despite Privacy Concerns - A telephone poll of 1,000 Americans shows that many people are concerned about geolocation, which uses data from a computer or mobile device to identify a physical location

The Really Big List of Mapping, Geo location Mobile developer resources, APIs and Tools? - The Mobile Ecosystem... no question that mobile is huge and the opportunity for developers, in particular, geo developers! There's loads of developer resources on the web so to help the developer, here's a listing of just some of the fine dev resources, blogs, toolsets and more to consider when developing or porting your app to a smartphone or Tablet.

Mobile Technology Feature - Top 10 Business Apps for Android - Android has become one of the most popular mobile operating systems in the world due to advanced software, competitive manufacturers, and an app market that is filled with exciting and useful applications. Read on for this fine Top 10 List compiled by tech writer, Blake Sanders

ArcGIS.com Mashup Tutorial with Flickr and Foursquare data - Here's a simple "how to" tutorial on working with the free ArcGIS.com to easily import KML or RSS data from Flickr and foursquare into ArcGIS to create your own custom map mashup.

Most Users of Free Photo Apps Say Adding Cool Effects is Most Useful? - Adding cool effects to photos was rated as the most useful thing by more than half of consumers surveyed using free online photography services, according to CatchFree a free online service that helps people find the best free mobile and web applications to perform useful tasks.

10 Things That You Should Be Including In Your Press Release - We'd like to share a short list of 10 items that anyone creating a press release might/should consider including in their press release.?

Flickr GPS Photo Tag Tip? - Here's a tip for Flickr users who want to share their GPS information with their photos. note, in order to do this you'll need to be capturing photos using a GPS-enabled or GPS-aware camera (see you're smartphone hardware settings to ensure that GPS or location sharing is turned "ON)".?

Source: http://www.lbszone.com/index.php?option=com_content&task=view&id=9467&Itemid=2

new dark knight rises trailer khloe and lamar oklahoma city thunder rajon rondo sunoco titanic ii babe ruth

ConAgra buying Ralcorp for about $4.95 billion

OMAHA, Neb. (AP) ? ConAgra Foods is buying private-label food producer Ralcorp for about $4.95 billion, which will make it the biggest private-label packaged food business in North America.

ConAgra says the acquisition will strengthen its overall position in the North American packaged food business. ConAgra brands include Chef Boyardee, Egg Beaters, Peter Pan and Reddi-wip.

ConAgra Foods Inc. said Tuesday that it will pay Ralcorp Holdings Inc. stockholders $90 per share, a 28 percent premium to its Monday closing price. Ralcorp's stock jumped 26.5 percent in premarket trading.

The combined company will have total sales of about $18 billion annually.

The companies value the transaction at about $6.8 billion when debt is included.

The deal is expected to close by March 31, 2013 and needs Ralcorp shareholder approval.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/f70471f764144b2fab526d39972d37b3/Article_2012-11-27-ConAgra%20Foods-Ralcorp/id-9f9b7dd4f51949acbec97f70797ea57b

justin bieber boyfriend marianas trench camille grammer camille grammer us supreme court breaking dawn part 2 trailer mississippi state

hotfile downloads: Download Panda Security Products Pack 2012 free

Pandas products include security tools for home users and enterprises, including protection against cybercrime and kinds of malware that can damage IT systems, such as spam, hackers, spyware, dialers and undesirable web content, as well as detection of WiFi intrusions.

Its trademark technology, branded TruPrevent, is a set of proactive capabilities aimed at blocking unknown viruses and intruders. Initially centered on the production of antivirus software, the company has expanded its line of applications to include firewall applications, spam and spyware detection applications, cybercrime prevention technology, and other system management and security tools for businesses and home users.

Panda Internet Security 2012

Panda Internet Security is a complete security solution for businesses and professionals to armor plate your computer.

Panda Internet Security allows you to use the Internet for anything, like shopping and banking online, with total peace of mind and without any interruption. It protects you from viruses, hackers, online fraud, identity theft and all the other known and unknown threats.

In addition, it keeps your inbox spam-free, and allows you to browse the web privately and securely with the entirely new Panda Safe Browser. With the Parental Control, your children can browse the Internet safely.

Here are some key features of Panda Internet Security:

Protection against spyware:

Protects your privacy by preventing spyware from being installed on your computer. The anti-spyware protection prevents this type of software from compiling data about your Internet habits and preferences.

Protection against unknown threats:

Thanks to the revolutionary TruPrevent Technologies now, more than ever, you will be protected against malware at all times.

Protection against all types of malware:

Not only are you protected against viruses. Now you have integrated protection capable of combating all types of malicious software: hacking tools, jokes, malicious cookies, viruses, etc.

Maintenance:

Make backup copies of your most valued documents to avoid losing them in the event of disasters. You can make backup copies of your documents easily in the location you choose: USB removable drives, CDs, DVDs, or even Internet secure servers.

Firewall:

Neutralizes network viruses and prevents possible intrusions or attacks by hackers trying to enter your computer through the Internet.

Anti-spam filter:

Protects you against junk mail, saving time and resources. The anti-spam protection will keep your inbox free from junk mail sent massively across the Internet.

Identity protection:

Protects you against the growing number of fraud attempts on the Internet. For example, you can avoid spoof bank/financial service Web pages that are really controlled by fraudsters.

Your passwords and credit card numbers will now be safer then ever. None of this data can leave you computer without your prior consent.

If you connect to the Web via modem, you wont have to worry about calls being made to premium-rate numbers without your consent.

Web content filtering:

If your computer is used by other people, you can put restrictions on the content they can access on the Internet. Configure the filters for each user and you wont have to worry about some users accessing inappropriate content.

Protection against vulnerabilities:

Protects you against security holes in certain applications that could make your computer easy prey to all types of malicious software and hackers. Now you can fix vulnerabilities detected in your computer, giving you even greater security.

Panda Global Protection 2012

Protect yourself from all kinds of online threats: virus, hackers, online fraud, identity theft and all other known and unknown malware.

Keep your inbox spam-free and navigate safely and privately on the internet with the new Panda safe Browser. Your children will navigate safely on the Internet with the improved Parental Control, while the Panda Secure Vault will allow you to encrypt private folders and files or eliminate them forever.

Panda Global Protection is a complete computer protection solution that will enable you to secure your data and keep it safe from external threats.

Here are some key features of Panda Global Protection:

Anti-Malware Engine:

Automatically detects and eliminates viruses, spyware, Trojans, rootkits, bots and other malware before they infect your computer.

Scans files in real-time and on-demand

Scans emails before they reach your inbox, regardless of your email program.

Scans Internet traffic regardless of your browser type

Scans Instant Messaging traffic in MSN Messenger, Windows Live Messenger, Yahoo Messenger and AOL.

Removes all traces of clutter left by spyware on your PC.

Advanced Proactive Protection:

Technologies from Panda Security are widely recognized as the most effective against new and unknown malware.

Genetic Heuristic Engine combines advanced algorithms to detect new variants of the most dangerous malware families.

TruPrevent Technologies 2.0 silently analyze the behavior of programs, blocking those that try to damage your PC. This last line of defence blocks zero-day targeted attacks and terminates any malicious activity that has evaded traditional protection systems.

Personal Firewall:

Protects you against Internet-borne worms and hacker attacks.

Smart auto-configuration allows good programs to run while blocking malicious ones.

Shields your PC from hackers on the Web.

Wireless Monitor protects your wireless network from intruders.

Intrusion prevention blocks known and unknown hacker attacks and vulnerability exploits.

Identity Theft Protection:

Anti-Phishing Filter

Recognizes fraudulent email and protects you from scams while you shop, bank or pay bills online.

Anti-Banking Trojan Engine

Detects the most dangerous identity theft malware used by cyber-criminals to steal banking credentials. Specialized heuristics and generic detection techniques ensure maximum protection for online transactions.

Anti-Rootkit Technology:

Detects and removes silently-installed rootkits used by malware or hackers to evade traditional antivirus products.

Safe Internet Browsing

Anti-Spam Filter:

Keeps your inbox free from junk mail. With the new spam engine detection rates are now over 97%, ensuring uninterrupted service and delivering the emails you really need.

Parental Control:

Lets your children browse the Internet safely by blocking access to violent, adult, or racist content, as well as other inappropriate websites. From the solutions control panel and regardless of the browser type- you can assign predefined filters (child, adolescent, employee) to users or customize filter rules according to your specific needs.

Web Filter:

Lets you use the Internet safely without the risk of infections, vulnerability exploits, browser hijacking or phishing websites.By analyzing website content, links and Web reputation scores, Panda Security provides protection against all types of Web-based malware and scams.

Personal Information Filter:

Prevents theft from your PC of credit card numbers, social security numbers and any other personal information you define.

PC Optimization:

Backup & Restore

Safeguards your most important files against accidental loss or damage. It prevents loss of important documents either unintentionally, or through hard disk problems or other accidents. Backup and restoration from hard drive, CD, DVD, other external media or online are both extremely simple and easy.

Premium Online Backup:

To safeguard your most important files and have access to them anytime, anywhere. Backing up your most important files online ensures the integrity of your information regardless of what happens to your PC. This ultimate safety layer provides 2 gigabytes of free, secure storage for one year.

Tune Up:

Automatically finds and fixes problems in your PC and keeps your system running smoothly. It optimizes your PC performance by removing unnecessary registry entries, deleting temporary files and speeding up your hard disk.

Panda Antivirus Pro 2012

More than a simple Antivirus! Panda Antivirus Pro offers the easiest and most intuitive protection for your computer. Install it and forget about viruses, spyware, root kits, hackers and online fraud.

Chat, share photos and videos, do online shopping and banking, read your favorite blogs or browse the web with total peace of mind and without interruptions. Thanks to the Collective Intelligence technology, this product is safer, faster and more complete than ever.

Furthermore, Panda Antivirus Pro will offer maximum protection with minimum impact on your computer via its easy-to-use and intuitive interface.

Here are some key features of Panda Antivirus Pro:

Protection against spyware:

Protects your privacy by preventing spyware from being installed on your computer. The anti-spyware protection prevents this type of software from compiling data about your Internet habits and preferences.

Protection against unknown threats:

Thanks to the revolutionary TruPrevent Technologies now, more than ever, you will be protected against malware at all times.

Protection against all types of malware:

Not only are you protected against viruses. Now you have integrated protection capable of combating all types of malicious software: hacking tools, jokes, malicious cookies, viruses, etc.

Firewall:

Neutralizes network viruses and prevents possible intrusions or attacks by hackers trying to enter your computer through the Internet.

Protection against vulnerabilities:

Protects you against security holes in certain applications that could make your computer easy prey to all types of malicious software and hackers. Now you can fix vulnerabilities detected in your computer, giving you even greater security.

Services:

Enjoy the wide range of services that we offer. Now you have a whole team of IT security experts to help you resolve any queries that could arise. In addition, on our Web page, you can access the latest versions of our products and all the information you need.

Panda Internet Security 2012 for Netbooks

PROTECTION FOR YOUR NETBOOK (valid for all kinds of PCs)

Safely browse the Internet and chat with complete peace of mind. Protect against

viruses, online fraud, identity theft, unsolicited emails and cybercriminals.

Protection for your Netbook against all kind of threats

Protect your personal data against identity theft

Protect your communications against online fraud

Protect your networks against hackers and intruders

Panda Internet Security 2012 for Netbooks allows you to get the most of your Netbook for any offline or online activity, such as buying or banking online, with confidence and without interruption.

It protects you from viruses, hackers, online fraud, identity theft and other known and unknown threats, and keeps your mailbox free from spam.

Surf the Internet safely with Panda Safe Browser and block inappropriate content for your kids with Parental Control.

Maximum Protection

The Panda Cloud Technology offers a new protection model based on a user community where everyone contributes. Your computer will always be updated and protected. Additionally, your PC wont limit detection capabilities as Pandas huge virus detection database is located on the Internet (Cloud).

Minimum Impact

Panda Internet Security 2012 for Netbooks dramatically reduces resource consumption as the malware database is on the cloud, not in your PC. Also, its lightweight protection minimizes performance impact.

Easy to use

Its intuitive interface is perfect for all types of users. Access all the information that you need with just one click.

Source: http://hotfiledownloads.blogspot.com/2012/11/download-panda-security-products-pack.html

blake lively RG3 Espn Fantasy Football Grandparents Day 2012 army wives 60 minutes go daddy

Source: http://fayufbic.posterous.com/hotfile-downloads-download-panda-security-pro

alabama vs lsu bcs championship game beyonce baby detroit auto show tebow broncos downton abbey season 2 2013 dodge dart

Source: http://mipokkemo.posterous.com/hotfile-downloads-download-panda-security-pro

cab calloway melissa gilbert deadliest catch dwts sean hannity bobby petrino fired buffett rule

Tuesday, November 27, 2012

Burning more calories is easier when working out with someone you perceive as better

ScienceDaily (Nov. 26, 2012) ? The key to motivation in physical activity may be feeling inadequate. One Kansas State University researcher found that those who exercised with a teammate whom they perceived to be better increased their workout time and intensity by as much as 200 percent.

Brandon Irwin, assistant professor of kinesiology, was the principle investigator in a study that tested whether individuals engage in more intense physical activity when alone, with a virtual partner or competing against a teammate.

"People like to exercise with others and make it a social activity," Irwin said. "We found that when you're performing with someone who you perceive as a little better than you, you tend to give more effort than you normally would alone."

For the first part of the study, college-age females exercise on a stationary bike six sessions in a four-week period. They told participants to ride the bike as long as they could. On average, each participant rode for 10 minutes.

Next, the same group of participants returned to the lab for more exercise sessions, but was told they were working out with a partner in another lab whom they could see on a screen. In reality, this was only a looped video. Participants also were told that their virtual partner was part of the first study and had ridden the bike approximately 40 percent longer than them.

"We created the impression that the virtual partner was a little better than the participant," Irwin said. "That's all they knew about their partner. In this group, participants rode an average of nine minutes longer than simply exercising alone."

While this 90 percent increase was promising, Irwin said he and his team had a hunch that the motivation could go even further. The participants were invited back to the lab for more exercise sessions with a virtual partner. This time, though, they were told they were on a team with their partner.

"We told them they were working together to achieve a team score," Irwin said. "The team score was the time of the person who quits first. The participants believed that in the previous trial, they didn't exercise as long as the other person. We created a situation where the participant was the weak link."

Participants in this team trial exercised approximately two minutes longer than simply working out alongside someone. However, Irwin added that the results look different over time.

"This was an average, but over time the difference got much bigger," he said. "In the beginning, the participants were exercising about a minute longer than the partner group. By the last session, participants in the team group were exercising almost 160 percent longer than those in the partner group, and nearly 200 percent longer than those exercising as individuals."

Irwin said this might be because those who believed they were exercising with a partner built a rapport over time and didn't want to let the partner down. He said the team was initially surprised at the drastic increase over time in participants working out with a teammate.

"If they're constantly working out with someone who's beating them, we wondered how motivated people would be to keep coming back and getting beat again," Irwin said. "It turned out to be exactly the opposite. Over time, it can be very motivating, as long as the conditions are right."

Irwin said research has shown that if an exercise partner or teammate is roughly at the same level or is exponentially better, the motivation disappears. He and his team found that a partner who worked at a level approximately 40 percent better was optimal.

"In certain fitness goals, like preparing to run a marathon, consider exercising not only with someone else, but with someone who is that much better," Irwin said. "For an extra boost, consider some type of team exercise that involves competition, like playing basketball at a regular time throughout the week."

In the future, Irwin wants to continue using virtual partners to increase the time and intensity of physical activity, but he hopes to move beyond false partners.

"I want to partner people up with actual individuals, not just prerecorded workout partners," he said. "Similar to matchmaking software for romantic relationships online, individuals from different sides of the country could be matched up based on their fitness goals and levels. Using technology, you could run with someone using your smartphones."

Irwin is currently researching this option and hopes to bring it to fruition within the next several years.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by Kansas State University, via Newswise.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/living_well/~3/Nj6YkwHzlHk/121126130938.htm

michigan primary results olympia snowe davey jones dead monsanto boston weather dr seuss birthday jennifer garner

Video: Morsi, judges to meet as Egypt protests boil



>> is still raging in egypt over the president's power graham grab there. nbc eayman mohyeldin is in cairo with the latest on this. good morning to you.

>> reporter: good morning, matt. a few days ago president morrisey of egypt was receiving praise from around the world including u.s. president barack obama for brokering that cease-fire and today he's coming under criticism that puts him in conflict with the top judges that. political fight is spilling over into the streets, claiming lives and plunging the country's economy into turmoil, and more importantly it is threatening the country's post-revolutionary progress. for a fourth straight night protest efforts attacked the offices of president mohamed morsi's freedom and justice party . the political wing of the muslim brotherhood . demonstrators are angry at president morsmorsi's latest decision, one that's reverting the country to a dictatorship.

>> we want a contry of institutions, not symbolized in one person who makes all decisions and nobody can say no.

>> reporter: morsi's decree gave him legislative powers and extended the time to write a new constitution by two months. morsi's decisions are beyond judicial challenge and dismissed the attorney general. now the attorney general backed by the country's powerful judges, many appointed by former dictator hosni mubarak , are fighting back. they have called for a nationwide strike in the courtrooms. president morsi and other islamist parties have blamed egypt 's judiciary for blocking key reforms. it's why president morsi on friday told his mainly islamic supporters he issued the sweeping decree and why many across the country are backing his decision.

>> translator: the president's decisions are good, and we support him. he's working hard and working for the people's interests. we are with him.

>> reporter: but the showdown between the executive and judicial branches of governments has pledged the country's streets and markets into it your mill. today egypt 's stock market lost 4% of its value in the opening minutes of trading. on sunday officials had to suspend trading after the market lost nearly $9 billion or 10% of its value. now the country's political opposition forces are uniting and calling for mass sieve demonstrations on tuesday.

>>> despite the tensions on the streets, there is a little bit of optimism in the air. president morsi will be meeting with some of the judges later today to try and broker some kind of an agreement to get them out of this political crisis, but if not all attention will shift to tuesday when thousands of protesters and opponents of the president are expected to hold competing rallies just a few miles away . it may be some time before calm returns to the street of egypt . matt?

>> ayman mohyeldin in cairo this morning, thank you very much.

Source: http://video.today.msnbc.msn.com/today/49963338/

kate middleton amanda bynes Revolution TV Show bankofamerica revolution rosh hashanah rosh hashanah

Pastors prey on married women - NewsDay Zimbabwe

Pastors are flock leaders who command respect among their followers and they should guide their flock into a moral lifestyle that reflects a divine calling.

Men of cloth possess a charismatic ability to influence their followers? personal decisions in life since they are regarded as father figures.

But it seems most of these respected men of cloth are
abusing the holy office as they end up having relationships with women from their churches.

The media is awash with reports of pastors impregnating church members and some getting caught pants down.

The well known is the recent case of a Marondera Pentecostal pastor who dated a number of women on Facebook. The pastor was reportedly being intimate with most of them all in the name of divine intervention and counselling.

A number of pastors and prophets have contributed much to the breaking of many marriages as they prey on married women from their conregation seeking assistance.

One wonders why this kind of intimate relationship is ignited given the trust every Christian gives to a pastor.

In an interview, a Harare woman, Tariro Makamba, said women needed people who listened to them, adding that most male pastors usually preyed on such women.

?I don?t know of anyone who really wants to have a failed marriage. Even though there are plenty of women who get involved with other men, it isn?t because they want to have an affair and ruin their marriage.?

?They would rather have their marriage work the way they
envisioned it. Often they go to pastors because they believe their husbands are not listening to them.?

?What the woman really wants is for her husband to listen to her and pastors have this characteristic.So if the pastor makes a slight move, the husband is done. It?s easy to seduce a woman who has problems.? she said.

Sarah Nyambiya (43), a Pentecostal, echoed the same sentiments.
?Those problems will come with her. When she tells him what a jerk her husband is, she is gone.

?The women who don?t have problems, who are committed to their marriage and are happy with their husbands, will not budge to seductive moves by the pastors,? she said.

According to sociologist Darlington Nyabiko, most relationships between pastors and church women emanate from the latter being easily attracted to men of cloth.

Nyabiko said women need status and they are attracted to
those of a higher status than their husbands.

?Many women value style over substance. If you look good, then you must be good.Most pastors are good looking. I am surprised at how superficial traits are valued more than more meaningful factors, like the content of a man?s character, ? said Nyabiko

?Another reason is many women falsely believe that men who go to church are better than men who don?t. And women love men who go to church.?

?Unfortunately, people consider each case of a pastor
doing dirt to be an exception to the rule, without realising that there are men like fake pastors all over the country,? he said.

However, a pastor who spoke to Newsday described men of cloth who venture into relationships with church women as messengers of the devil.

?Those pastors are wolves in sheep skin. Instead of guarding the flock, they devour. They are enemies of the word,? said Pastor Tonderai Mungani of Holy Spirit Ministries.

Source: http://www.newsday.co.zw/2012/11/26/pastors-prey-on-married-women/

department of justice doj dept of justice weather chicago swizz beatz mpaa south carolina debate

What do You Imply by Internet Hosting - jindardafon

Sorry, Readability was unable to parse this page for content.

Source: http://jindardafon.blogspot.com/2012/11/jaime-site-what-do-you-imply-by.html

Demi Lovato iOS 6 Features big brother Shakira chick fil a chick fil a survivor

Monday, November 26, 2012

ohinalbertxy: Daily Tips for Business: Workplace Communication

Well, as an entrepreneur I used to laugh at people who wanted to come to work for my company and on their resume they put that they had a Business Communications Degree. I used to think that they studied business communications because it was an easy subject in school, one that you could learn without having to deal with too much math, perhaps even taking the easy way out. Nevertheless workplace communication is an essential tool, and without it your business will not operate efficiently, and you are bound to get your wires crossed more often than not.

Source: http://dailytipsforbusiness.blogspot.com/2012/11/workplace-communication_19.html

dodgers triple play samoyed kenny powers kenny powers carl hagelin triple play virginia tech shooting

Source: http://pkydrucs.posterous.com/daily-tips-for-business-workplace-communicati

monsanto boston weather dr seuss birthday jennifer garner jennifer garner romney michigan derrick williams

Source: http://morphemic-thule.blogspot.com/2012/11/daily-tips-for-business-workplace.html

Jessie Andrews sofia vergara bloomberg bloomberg Daily Caller Staten Island Trick or Treat

Source: http://avilazachery.typepad.com/blog/2012/11/daily-tips-for-business-workplace-communication-pkydrucss.html

the descendants the descendants homeland homeland packers giants game golden globe winners 2012 ricky gervais golden globes

Source: http://seventieth-responsibility.blogspot.com/2012/11/daily-tips-for-business-workplace.html

the chronicle spinal stenosis the forgotten man mike jones just friends chronicle george lopez

Source: http://ohinalbertxy.blogspot.com/2012/11/daily-tips-for-business-workplace.html

lamichael james derrick rose acl earthquake los angeles unemployment 2012 nfl draft grades young justice

Source: http://raoulbhaneja.blogspot.com/2012/11/ohinalbertxy-daily-tips-for-business.html

denver nuggets correspondents dinner i am legend san antonio spurs greta van susteren tony parker the five year engagement

European lawmaker Strasser on trial for corruption

VIENNA (Reuters) - Disgraced Austrian politician Ernst Strasser goes on trial on Monday in a corruption case that has undermined trust in European and Austrian institutions.

The former Austrian interior minister and European lawmaker could face 10 years in jail if convicted, after being caught on camera offering to propose amendments to European laws in exchange for 100,000 euros ($130,000 a year).

Strasser, 56, was exposed last year by undercover journalists from Britain's Sunday Times posing as lobbyists. He resigned while denying wrongdoing, saying he wanted to protect his party, the Austrian conservative OVP.

"Of course I am a lobbyist," he told the journalists in a secretly filmed video. "This is a wonderful opportunity to learn all the people, to have my own network, and to use this network for my, for my companies. It's a very good combination."

Strasser, one of several once-mighty Austrian politicians brought down by recent corruption scandals, told the journalists he already had five such clients.

He later said in an interview he went along with the "lobbyists" because he believed they were secret service agents and he wanted to follow their trail.

The trial in Vienna comes as European politicians battle to keep faith with the post-war ideals of European integration and rejection of extreme nationalism that led to the founding of what would become the European Union more than 60 years ago.

As the 27 nation bloc struggles to contain a debt crisis, a gulf is widening between more affluent countries and poorer members like Greece, which faces expulsion from the euro zone if it does not maintain a course of harsh austerity measures.

Euroscepticism and nationalism are on the rise in many European countries. In Britain, which has always had a difficult relationship with its continental partners, talk that it could leave the EU has begun to shift from the fringes to the center of political debate.

Less than half of the EU's half a billion citizens voted in the last European Parliament elections in 2009, and a poll last year found that 26 percent had a negative image of the parliament, up from 17 percent three years earlier.

"Most European parliamentarians are as lazy as I am," Strasser told the Sunday Times journalists.

Three other European lawmakers were caught by the Sunday Times sting operation: Romania's Adrian Severin, Slovenia's Zoran Thaler and Spain's Pablo Zalba Bidegain.

Thaler resigned after the scandal but the other two still sit in parliament.

Eight days have been allotted for Strasser's trial, which begins at 0700 GMT and has drawn wide international interest. ($1 = 0.7717 euros)

(Reporting by Georgina Prodhan; Editing by Myra MacDonald)

Source: http://news.yahoo.com/european-lawmaker-strasser-trial-corruption-220303358.html

donovan mcnabb lottery ticket megga millions what is autism the giver march 30 rimm

Re: FTM 2012 - Sync Failure. Now FTM will not open. - Family Tree ...

Joe,

Sorry that you ended up reformatting to fix this. That's a sledgehammer approach to a surgical need, but without the know-how and with customer support being no help (some might say anti-helpful), sometimes the sledgehammer is faster and easier at the end of the day.

I had suggested to you that you search the registry to see what you could learn. Did you learn anything? Are other settings there? Do any of the settings point to other locations in the user profile than the ones that I mentioned? Did you try copying the whole working profile over the whole non-working profile? Vice versa? What effect did each copy have?

(I can't see how a 3rd party uninstaller would help here, but I've never used one.)

I don't know that this issue is the result of poor software design. *Every* software program comes with flaws, even the best ones. The difference in quality among software makers is in how much they test and fix before and after release. In this case, FTM was released too early (one might argue with known issues at that), and thereafter has been poorly supported, especially in cases like *this issue* where the support crew runs interference for the developers who are disconnected from the community with a small number of individual exceptions. If one of the developers knew that FTM would sync or run from one profile and not another, then my guess is that we'd very quickly get a list of potential causes.

Marco

Source: http://boards.ancestry.co.uk/topics.software.famtreemaker/9150.2.1.2.1.2.1.2.1/mb.ashx

slainte the quiet man yellow cab dropkick murphys guernsey nit colcannon

Sunday, November 25, 2012

Nike shoes outlet ? Blog Archive ? to make cellular devices ...

What To Do In case your Mobile Phone Is Stolen

Carol is really a writer for cellphonesnearyou who writes about and does research on the absolute best in mobile phones and accessories as well as their manufacturers for example Kyocera and just how to obtain the very best phone deals on the internet.

The field of cellular phones is definitely improving and developing. Phenominal technology today allows a lot of diverse features for such a diverse choice of consumers. Mobile phone manufacturers are often evolving and innovating to match the ever changing lifestyles of an ever developing and changing consumer base. Choosing the phone that most closely fits your way of life and requires, whether they are pretty straight forward or complicated is a significant factor in getting the most out of your wireless plan.
A small listing of companies is below to help in deciding in a cell phone the best one.
Samsung?s goal would be to become a real a part of people?s lives. Samsung prides themselves in accomplishing this ambition by progressively releasing creative mobile phones for their consumers. Their phones also provide the technology and applications to complement the needs of virtually any customer. Whether you are a mobile professional, a university student, or perhaps a provider for a family, Samsung can and will offer the perfect phone to your requirements ghd.
Siemens mobile phones and accessories will be ready to collaborate using the very best in technology to go in the next generation of mobile communications. A goal of the Siemens Company (just acquired by BENQ Corporation) is to come to know their customers, to make cellular devices specifically suiting their clients needs. Anything they may be Online Outlet Store, Siemens will have the cell phone perfectly fitting for the preferences and lifestyle.
Whatever your lifestyle, BlackBerry can synthesize all of your communications needs into one easy to use device that?ll be an essential part of your everyday lifestyle. BlackBerry has revolutionized the normal mobile phone, building a product that additionally with typical mobile phone abilities can behave as an organizer, a web browser, as well as an e-mail server with many more impressive features. Whether found in a business setting, or a busy college student, a BlackBerry mobile phone is the best choice to stay in touch with things that are most significant.
Drawing strength from 2 of the most popular manufacturers in the market, Sony Corporation and Ericsson AB, Sony ericsson smartphone presents an enormous range of mobile phones. Using both side?s experience, their business presents their consumers the very best in communications technology.
Sanyo cell phones are built to work with and fit into their customer?s busy lifestyles. Sanyo is among leaders in the market simply because they strive to adapt to their customer?s lifestyles rich in quality customer support and inventive technology. Progressively, as technology advances, Sanyo stays on top of the fast-paced world by constantly bettering cell phones for people?s needs.
Nokia is a cellular phone manufacturer that is honored in becoming diverse spyder jackets. Whether you?re a mobile professional, a high school student or perhaps a mom on the move, Nokia provides the mobile phone to fit into and service your busy lifestyle. Nokia considers their quality of phones, additionally with customer support to become the key of their company. They remember that to be able to stay ahead, they ought to have the finest in customer relations, and grow a step ahead on understanding what consumers want in a mobile phone.
The joining of Palm and cellular phones has transformed the field of cell phones. Mobile devices like the PalmOne Treo 650 unite simple to use communications and the planning devices seen on other Palm products into one. Palm?s vision to connect customers with all facets of technology puts them in the head of a growing rapidly field. Regardless if you are a mobile professional or an active high school student, Palm will suit your needs and lifestyle.
With improvements in technology, manufacturers provide you with differing creative applications featuring within their cellular phones and merchandise replica gucci. Different phone users require features in making their knowledge about a mobile phone the very best it may be. At http://cellphonesnearyou, you?ll receive data and information regarding almost any handset you are looking at, so that you can get the most out of your mobile phone.

By: gmsarticles

Source: http://goodgirl.smansara.com/2012/11/24/to-make-cellular-devices-specifically-suiting-their-clients-needs-anything-they-may-be/

Auguste Rodin Breaking Amish Indianapolis explosion anne hathaway mike brown earthquake bcs rankings

Source: http://farleykirby271.typepad.com/blog/2012/11/nike-shoes-outlet-blog-archive-to-make-cellular-devices.html

elizabeth banks battle royale key largo arnold palmer invitational ryan madson louisiana primary syracuse basketball

Saturday, November 24, 2012

Scientists describe elusive replication machinery of flu viruses

Friday, November 23, 2012

Scientists at The Scripps Research Institute (TSRI) have made a major advance in understanding how flu viruses replicate within infected cells. The researchers used cutting-edge molecular biology and electron-microscopy techniques to "see" one of influenza's essential protein complexes in unprecedented detail. The images generated in the study show flu virus proteins in the act of self-replication, highlighting the virus's vulnerabilities that are sure to be of interest to drug developers.

The report, which appears online in Science Express on November 22, 2012, focuses on influenza's ribonucleoprotein (RNP). RNPs contain the virus's genetic material plus the special enzyme that the virus needs to make copies of itself.

"Structural studies in this area had stalled because of the technical obstacles involved, and so this is a welcome advance," said Ian A. Wilson, the Hansen Professor of Structural Biology at TSRI and senior author of the report with TSRI Professors of Cell Biology Bridget Carragher and Clint Potter. "The data from this study give us a much clearer picture of the flu virus replication machinery."

Unveiling the Mystery of RNPs

At the core of any influenza virus lie eight RNPs, tiny molecular machines that are vital to the virus's ability to survive and spread in its hosts. Each RNP contains a segment?usually a single protein-coding gene?of the RNA-based viral genome. This viral RNA segment is coated with protective viral nucleoproteins and has a structure that resembles a twisted loop of chain. The free ends of this twisted loop are held by a flu-virus polymerase enzyme, which handles the two central tasks of viral reproduction: making new viral genomic RNA, and making the RNA gene-transcripts that will become new viral proteins.

Aside from its importance in ordinary infections, the flu polymerase contains some of the key "species barriers" that keep, for example, avian flu viruses from infecting mammals. Mutations at key points on the enzyme have enabled the virus to infect new species in the past. Thus researchers are eager to know the precise details of how the flu polymerase and the rest of the RNP interact.

Getting those details has been a real challenge. One reason is that flu RNPs are complex assemblies that are hard to produce efficiently in the lab. Flu polymerase genes are particularly resistant to being expressed in test cells, and their protein products exist in three separate pieces, or subunits, that have to somehow self-assemble. Until now, the only flu RNPs that have been reproduced in the laboratory are shortened versions whose structures aren't quite the same as those of native flu RNPs. Researchers also are limited in how much virus they can use for such studies.

The team nevertheless managed to develop a test-cell expression system that produced all of the protein and RNA components needed to make full-length flu RNPs. "We were able to get the cells to assemble these components properly so that we had working, self-replicating RNPs," said Robert N. Kirchdoerfer, a first author of the study. Kirchdoerfer was a PhD candidate in the Wilson laboratory during the study, and is now a postdoctoral research associate in the laboratory of TSRI Professor Erica Ollmann Saphire.

Kirchdoerfer eventually purified enough of these flu RNPs for electron microscope analysis at TSRI's Automated Molecular Imaging Group, which is run jointly by Carragher and Potter.

Never Seen Before

The imaging group's innovations enable researchers to analyze molecular samples more easily, in less time, and often with less starting material. "We were able, for example, to automatically collect data for several days in a row, which is unusual in electron microscopy work," said Arne Moeller, a postdoctoral research associate at the imaging group who was the other first author of the study.

Electron microscopes make high-resolution images of their tiny targets by hitting them with electrons rather than photons of light. The images revealed numerous well-defined RNP complexes. To Moeller and his colleagues' surprise, many of these appeared to have new, partial RNPs growing out of them. "They were branching?this was very exciting," he said.

"Essentially these were snapshots of flu RNPs being replicated, which had never been seen before," said Kirchdoerfer. These and other data, built up from images of tens of thousands of individual RNPs, allowed the team to put together the most complete model yet for flu-RNP structure and functions. The model includes details of how the viral polymerase binds to its RNA, how it accomplishes the tricky task of viral gene transcription, and how a separate copy of the viral polymerase assists in carrying out RNP replication. "We're now able to take a lot of what we knew before about flu virus RNP and map it onto specific parts of the RNP structure," said Kirchdoerfer.

The new flu RNP model highlights some viral weak points. One is a shape-change that a polymerase subunit?which grabs viral RNA and feeds it to the polymerase's active site on a second subunit?has to undergo during viral gene transcription. Another is key interaction between the polymerase and viral nucleoproteins. Flu RNPs are long and flexible, curving and bending in electron microscope images; and thus the structural model remains only modestly fine-grained. "You wouldn't be able to design drugs based on this model alone," said Kirchdoerfer, "but we now have a much better idea of how flu RNPs work, and that does suggest some possibilities for better flu drugs."

###

Scripps Research Institute: http://www.scripps.edu

Thanks to Scripps Research Institute for this article.

This press release was posted to serve as a topic for discussion. Please comment below. We try our best to only post press releases that are associated with peer reviewed scientific literature. Critical discussions of the research are appreciated. If you need help finding a link to the original article, please contact us on twitter or via e-mail.

This press release has been viewed 47 time(s).

Source: http://www.labspaces.net/125443/Scientists_describe_elusive_replication_machinery_of_flu_viruses

maryland lottery grand jury ozzie guillen fidel castro darvish george zimmerman website edmund fitzgerald uss enterprise

UK hopes Mideast nuclear talks can be held next year

LONDON (Reuters) - Britain said on Saturday it hoped a conference on banning nuclear weapons in the Middle East could take place "as soon as possible", after the United States said it would not be held next month.

The U.S. State Department said on Friday that the conference could "not be convened because of present conditions in the Middle East and the fact that states in the region have not reached agreement on acceptable conditions for a conference".

It did not spell out when or if the event, originally scheduled for December, would take place.

But Britain, which along with the United States, Russia and the United Nations is ones of the organizers, made it clear that the conference was only being postponed rather than canceled altogether, saying it backed efforts to hold it next year.

"We support the convening of a conference as soon as possible. We endorse fully the work of the Conference Facilitator, Finnish Under-Secretary of State Jaakko Laajava, to build consensus on next steps," Foreign Office Minister Alistair Burt said in a statement.

"We welcome his commitment to conduct further multilateral consultations with the countries of the region to agree arrangements for a conference in 2013," Burt said.

Washington had feared that the conference, which was to be held in Finland, could be used as a forum to bash Israel, a concern likely to have increased after eight days of Israeli-Palestinian fighting that ended with a ceasefire on Wednesday.

Iran and Arab states often say Israel's presumed nuclear arsenal poses a threat to Middle East peace and security. Israel and Western powers see Iran as the main nuclear proliferation threat, but Tehran denies any nuclear weapons ambitions.

The plan for a meeting to prepare the ground for the possible creation of a weapons of mass destruction-free Middle East was agreed to at a May 2010 conference of 189 parties to the 1970 nuclear Non-Proliferation Treaty, or NPT.

Like nuclear-armed India and Pakistan, Israel has never signed the NPT. It neither confirms nor denies having nuclear arms, although non-proliferation and security analysts believe it has several hundred nuclear weapons.

Even if the talks do occur, Western diplomats and others expect little progress any time soon due to the deep-rooted animosities in the region, notably the Arab-Israeli conflict and Israeli concerns about Iran's nuclear program.

Iran, Israel's arch foe, announced earlier this month it would attend the conference, but some Western diplomats said they thought Tehran may have only done so once it became clear that the meeting was likely to be postponed anyway.

(Additional reporting by Fredrik Dahl in Vienna; Editing by Andrew Osborn)

Source: http://news.yahoo.com/uk-hopes-mideast-nuclear-talks-held-next-125637864.html

muhammad ali Opening ceremony London 2012 Google Fiber Olympics Schedule 2012 Olympic Medal Count 2012 Olympics 2012 Olympic Schedule 2012

Are Republican immigration reform opponents losing clout? (cbsnews)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, News Feeds and News via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/265827644?client_source=feed&format=rss

timberwolves weight watchers rawhide bigfoot sandra dee twilight zone december 21 2012

Friday, November 23, 2012

Early start to "Black Friday" shopping welcomed by some, not all

NEW YORK/CHICAGO (Reuters) - The shopping frenzy known as "Black Friday" kicked off at a more civilized hour welcomed by some shoppers this year, with retailers like Target Corp and Toys R Us moving their openings earlier into Thursday night.

While the shift was denounced by some store employees and traditionalists as pulling people away from families on Thanksgiving, many shoppers welcomed the chance to shop before midnight or in the wee hours of the morning.

"I think it's better earlier. People are crazier later at midnight. And I get tired at midnight," Renee Ruhl, 52, a hotel worker, said at a Target in Orlando, Florida, where she was already heading back to her car with an air hockey game loaded in her shopping cart at 9:30 p.m., or 2-1/2 hours before the chain opened last year.

Retailers have been in a race to get a kickoff to what is considered the unofficial start of the holiday shopping season as they try to fight for consumer spending that is not expected to grow as much as last year.

Wal-Mart Stores Inc's U.S. discount stores, which have been open on Thanksgiving Day since 1988, offered some "Black Friday" deals at 8 p.m. local time and special deals on some electronics, like Apple Inc iPads, at 10 p.m. Target moved its opening from midnight to 9 p.m. on Thursday and Toys R Us is opened at 8 p.m.

The earlier hours attracted customers who had not previously considered braving the crowds on Black Friday, Jason Buechel, a senior executive in Accenture's Retail Practice, said of his observations from the malls. Warm weather was also likely helping to bring out the crowds.

Big ticket electronics were not the only hot sellers.

At Macy's in Herald Square, the line at the Estee Lauder counter was four deep shortly after its midnight opening.

And at the Target on Elston Avenue on Chicago's Northwest side, known as one of the highest-volume Target stores in the entire chain, the $25 Dirt Devil vacuum that normally goes for $39.99 was gone, while there were still several large televisions. Items such as $2 towels were selling well, so were blankets, kids' slippers and pajamas.

Store team leader Lee Crum said that it looked like people who were there for the 9 p.m. event were staying longer.

"These are the folks that are Christmas shopping, you can see it's a family event," he said. "At midnight it was one person, coming in for one item."

The stakes are obviously high for U.S. retailers, which can earn more than a third of their annual sales in the holiday season.

The National Retail Federation forecast a 4.1 percent increase in retail sales during the November-December holiday period this year, down from the 5.6 percent increase seen in 2011.

In a separate survey, NRF said 147 million people would shop Friday through Sunday, down from 152 million on Black Friday weekend last year. The survey did not say how many shoppers planned to hit the stores on Thursday.

"SAVE THANKSGIVING"

Consumers heading into the holiday shopping season remain worried about high unemployment and possible tax increases and government spending cuts in 2013. Also, lasting effects of Sandy, the storm that lashed the densely populated East Coast in late October, could cut into how much shoppers can spend.

According to a Reuters/Ipsos poll, two-thirds of shoppers said they were planning to spend the same amount as last year or were unsure about spending plans, while 21 percent intend to spend less and 11 percent plan to spend more.

Throughout stores, shoppers could be seen using smartphones or other mobile gadgets to help them navigate and look for good deals.

At a Walmart in Bloomington, Minnesota, Derek M, 26, said he has used his smartphone to compare ever since the phone had that capability.

He was at the store mainly to take advantage of a deal on a Compaq AMD laptop for $179. He said he felt the deals were slightly better this year. For instance, a basic laptop he looked at last year was $199, he said.

Not everybody was happy with Black Friday starting earlier.

A petition asking Target to "save Thanksgiving" had 371,606 supporters as of Thursday afternoon.

Mike Labounty, 34, Lyndonville, Vermont, was shopping on Thursday night for 32-inch Emerson televisions and other items on sale at the Walmart in Littleton, New Hampshire, with his partner, Darcy Mitchell.

"I think it should go back to Friday," he said. "It breaks up families. Just look at us-our kids are with their grandparents and they should be with us on Thanksgiving, but we're here getting them a TV."

Some workers were also using the day to send a message.

OUR Walmart - a coalition of current and former Wal-Mart staff seeking better wages, benefits and working conditions, has staged months of protests outside stores and has targeted "Black Friday" for action across the country.

(Writing by Brad Dorfman. Reporting by Martinne Geller in New York. Additional reporting by Jessica Wohl in Chicago, Beth Pinsker Gladstone in New York, Jason McLure in Littleton, New Hampshire, Barbara Liston in Orlando, Florida; Editing by Nick Macfie)

Source: http://news.yahoo.com/black-friday-thursday-kicks-off-u-holiday-shopping-025954866--finance.html

temperance world bank kim kardashian flour bomb hunger games box office xavier joan crawford joan crawford